You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## BAND 4 - TOOLS ###########################################################################################################################################
332
335
tools:
333
-
title: Easy app integration with Microsoft Authentication Libraries (MSAL)
336
+
title: Use Microsoft Authentication Libraries (MSAL) for easy app integration
334
337
summary: >
335
-
GitHub hosts the open-source Microsoft Authentication Library (MSAL). Microsoft builds and supports MSAL. Access and use our MSAL samples for the most popular programming languages and frameworks.
338
+
GitHub hosts the open-source Microsoft Authentication Library (MSAL). Microsoft builds and supports MSAL. We recommend MSAL for any app type that uses Azure AD B2C for authentication and authorization.
## BAND 4 - TOOLS END #######################################################################################################################################
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.workload: identity
10
10
ms.topic: tutorial
11
-
ms.date: 03/07/2023
11
+
ms.date: 03/08/2023
12
12
ms.author: kenwith
13
13
ms.reviewer: arvinh
14
14
---
@@ -222,7 +222,7 @@ Use the general guidelines when implementing a SCIM endpoint to ensure compatibi
222
222
* If a value isn't present, don't send null values.
223
223
* Property values should be camel cased (for example, readWrite).
224
224
* Must return a list response.
225
-
* The Azure AD Provisioning Service makes the /schemas request every time someone saves the provisioning configuration in the Azure portal or every time a user lands on the edit provisioning page in the Azure portal. Other attributes discovered are surfaced to customers in the attribute mappings under the target attribute list. Schema discovery only leads to more target attributes being added. Attributes aren't removed.
225
+
* The Azure AD Provisioning Service makes the /schemas request when you save the provisioning configuration in the Azure portal. The request is also made when you open the edit provisioning page in the Azure portal. Other attributes discovered are surfaced to customers in the attribute mappings under the target attribute list. Schema discovery only leads to more target attributes being added. Attributes aren't removed.
226
226
227
227
### User provisioning and deprovisioning
228
228
@@ -275,7 +275,7 @@ This article provides example SCIM requests emitted by the Azure Active Director
275
275
276
276
### User Operations
277
277
278
-
*Users can be queried by `userName` or `emails[type eq "work"]` attributes.
278
+
*Use `userName` or `emails[type eq "work"]` attributes to query users.
279
279
280
280
#### Create User
281
281
@@ -606,8 +606,8 @@ This article provides example SCIM requests emitted by the Azure Active Director
606
606
607
607
### Group Operations
608
608
609
-
* Groups shall always be created with an empty members list.
610
-
*Groups can be queried by the `displayName` attribute.
609
+
* Groups are created with an empty members list.
610
+
*Use the `displayName` attribute to query groups.
611
611
* Update to the group PATCH request should yield an *HTTP 204 No Content* in the response. Returning a body with a list of all the members isn't advisable.
612
612
* It isn't necessary to support returning all the members of the group.
613
613
@@ -924,7 +924,7 @@ Now that you've designed your schema and understood the Azure AD SCIM implementa
924
924
925
925
For guidance on how to build a SCIM endpoint including examples, see [Develop a sample SCIM endpoint](use-scim-to-build-users-and-groups-endpoints.md).
926
926
927
-
The open source .NET Core [reference code example](https://aka.ms/SCIMReferenceCode) published by the Azure AD provisioning team is one such resource that can jump start your development. Once you have built your SCIM endpoint, you'll want to test it out. You can use the collection of [Postman tests](https://github.com/AzureAD/SCIMReferenceCode/wiki/Test-Your-SCIM-Endpoint) provided as part of the reference code or run through the sample requests / responses provided [above](#user-operations).
927
+
The open source .NET Core [reference code example](https://aka.ms/SCIMReferenceCode) published by the Azure AD provisioning team is one such resource that can jump start your development. Build a SCIM endpoint, then test it out. Use the collection of [Postman tests](https://github.com/AzureAD/SCIMReferenceCode/wiki/Test-Your-SCIM-Endpoint) provided as part of the reference code or run through the sample requests / responses [provided](#user-operations).
928
928
929
929
> [!Note]
930
930
> The reference code is intended to help you get started building your SCIM endpoint and is provided "AS IS." Contributions from the community are welcome to help build and maintain the code.
@@ -968,7 +968,7 @@ The SCIM endpoint must have an HTTP address and server authentication certificat
968
968
* WoSign
969
969
* DST Root CAX3
970
970
971
-
The .NET Core SDK includes an HTTPS development certificate that can be used duringdevelopment, thecertificateisinstalledaspartofthefirst-runexperience. DependingonhowyouruntheASP.NETCoreWebApplicationitwilllistentoadifferentport:
971
+
The .NET Core SDK includes an HTTPS development certificate that is used during development. The certificate is installed as part of the first-run experience. Depending on how you run the ASP.NET Core Web Application it listens to a different port:
@@ -1351,10 +1351,10 @@ Once the initial cycle has started, you can select **Provisioning logs** in the
1351
1351
1352
1352
## Publish your application to the Azure AD application gallery
1353
1353
1354
-
Ifyou'rebuildinganapplicationthatwillbeusedbymorethanonetenant, youcanmakeitavailableintheAzureADapplicationgallery. It's easy for organizations to discover the application and configure provisioning. Publishing your app in the Azure AD gallery and making provisioning available to others is easy. Check out the steps [here](../manage-apps/v2-howto-app-gallery-listing.md). Microsoft will work with you to integrate your application into our gallery, test your endpoint, and release onboarding [documentation](../saas-apps/tutorial-list.md) for customers to use.
1354
+
Ifyou'rebuildinganapplicationusedbymorethanonetenant, makeitavailableintheAzureADapplicationgallery. It's easy for organizations to discover the application and configure provisioning. Publishing your app in the Azure AD gallery and making provisioning available to others is easy. Check out the steps [here](../manage-apps/v2-howto-app-gallery-listing.md). Microsoft works with you to integrate your application into the gallery, test your endpoint, and release onboarding [documentation](../saas-apps/tutorial-list.md) for customers.
Usethechecklisttoonboardyourapplicationquicklyandcustomershaveasmoothdeploymentexperience. Theinformationisgatheredfromyou when onboarding to the gallery.
@@ -1418,7 +1418,7 @@ Best practices (recommended, but not required):
1418
1418
> [!NOTE]
1419
1419
>Whileit's not possible to setup OAuth on the non-gallery applications, you can manually generate an access token from your authorization server and input it as the secret token to a non-gallery application. This allows you to verify compatibility of your SCIM server with the Azure AD Provisioning Service before onboarding to the app gallery, which does support the OAuth code grant.
1420
1420
1421
-
**Long-livedOAuthbearertokens:**Ifyourapplicationdoesn't support the OAuth authorization code grant flow, instead generate a long lived OAuth bearer token that an administrator can use to set up the provisioning integration. The token should be perpetual, or else the provisioning job will be [quarantined](application-provisioning-quarantine-status.md) when the token expires.
1421
+
**Long-livedOAuthbearertokens:**Ifyourapplicationdoesn't support the OAuth authorization code grant flow, instead generate a long lived OAuth bearer token that an administrator can use to set up the provisioning integration. The token should be perpetual, or else the provisioning job is [quarantined](application-provisioning-quarantine-status.md) when the token expires.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/howto-add-terms-of-service-privacy-statement.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: how-to
11
11
ms.workload: identity
12
-
ms.date: 09/27/2021
12
+
ms.date: 03/07/2023
13
13
ms.author: ryanwi
14
14
ms.reviewer: sureshja
15
15
ms.custom: aaddev
@@ -56,7 +56,7 @@ Follow these steps in the Azure portal.
56
56
57
57
1. Sign in to the <ahref="https://portal.azure.com/"target="_blank">Azure portal</a> and select the correct Azure AD tenant(not B2C).
58
58
2. Navigate to the **App registrations** section and select your app.
59
-
3. Under **Manage**, select **Branding**.
59
+
3. Under **Manage**, select **Branding & properties**.
60
60
4. Fill out the **Terms of service URL** and **Privacy statement URL** fields.
61
61
5. Select **Save**.
62
62
@@ -66,10 +66,10 @@ Follow these steps in the Azure portal.
66
66
67
67
If you prefer to modify the app object JSON directly, you can use the manifest editor in the Azure portal or Application Registration Portal to include links to your app's terms of service and privacy statement.
68
68
69
-
1.Navigating to the **App Registrations** section and select your app.
69
+
1.Navigate to the **App Registrations** section and select your app.
70
70
2. Open the **Manifest** pane.
71
71
3. Ctrl+F, Search for "informationalUrls". Fill in the information.
72
-
4. Save your changes.
72
+
4. Save your changes by downloading the app manifest, modifying it, and uploading it.
73
73
74
74
```json
75
75
"informationalUrls": {
@@ -80,12 +80,12 @@ If you prefer to modify the app object JSON directly, you can use the manifest e
80
80
81
81
### <aname="msgraph-rest-api"></a>Using the Microsoft Graph API
82
82
83
-
To programmatically update all your apps, you can use the Microsoft Graph API to update all your apps to include links to the terms of service and privacy statement documents.
83
+
To programmatically [update your app](/graph/api/application-update?view=graph-rest-1.0&tabs=http), you can use the Microsoft Graph API to update all your apps to include links to the terms of service and privacy statement documents.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/reply-url.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,7 +116,7 @@ To add a redirect URI that uses the `http` scheme with the `127.0.0.1` loopback
116
116
117
117
## Restrictions on wildcards in redirect URIs
118
118
119
-
Wildcard URIs like `https://*.contoso.com` may seem convenient, but should be avoided due to security implications. According to the OAuth 2.0 specification ([section 3.1.2 of RFC 6749](https://tools.ietf.org/html/rfc6749#section-3.1.2)), a redirection endpoint URI must be an absolute URI.
119
+
Wildcard URIs like `https://*.contoso.com` may seem convenient, but should be avoided due to security implications. According to the OAuth 2.0 specification ([section 3.1.2 of RFC 6749](https://tools.ietf.org/html/rfc6749#section-3.1.2)), a redirection endpoint URI must be an absolute URI. As such, when a configured wildcard URI matches a redirect URI, query strings and fragments in the redirect URI are stripped.
120
120
121
121
Wildcard URIs are currently unsupported in app registrations configured to sign in personal Microsoft accounts and work or school accounts. Wildcard URIs are allowed, however, for apps that are configured to sign in only work or school accounts in an organization's Azure AD tenant.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/security-operations-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,7 @@ Microsoft has many products and services that enable you to customize your IT en
82
82
*[Monitor sign-ins with the Azure AD sign-in log](../reports-monitoring/concept-all-sign-ins.md)
83
83
*[Audit activity reports in the Azure Active Directory portal](../reports-monitoring/concept-audit-logs.md)
84
84
*[Investigate risk with Azure Active Directory Identity Protection](../identity-protection/howto-identity-protection-investigate-risk.md)
85
-
*[Connect Azure AD Identity Protection data to Microsoft Sentinel](../../sentinel/data-connectors-reference.md#azure-active-directory-identity-protection)
85
+
*[Connect Azure AD Identity Protection data to Microsoft Sentinel](../../sentinel/data-connectors/azure-active-directory-identity-protection.md)
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/howto-export-risk-data.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,14 +69,14 @@ Azure Event Hubs can look at incoming data from sources like Azure AD Identity P
69
69
70
70
## Other options
71
71
72
-
Organizations can choose to [connect Azure AD data to Microsoft Sentinel](../../sentinel/data-connectors-reference.md#azure-active-directory-identity-protection) as well for further processing.
72
+
Organizations can choose to [connect Azure AD data to Microsoft Sentinel](../../sentinel/data-connectors/azure-active-directory-identity-protection.md) as well for further processing.
73
73
74
74
Organizations can use the [Microsoft Graph API to programatically interact with risk events](howto-identity-protection-graph-api.md).
75
75
76
76
## Next steps
77
77
78
78
-[What is Azure Active Directory monitoring?](../reports-monitoring/overview-monitoring.md)
79
79
-[Install and use the log analytics views for Azure Active Directory](../reports-monitoring/howto-install-use-log-analytics-views.md)
80
-
-[Connect data from Azure Active Directory (Azure AD) Identity Protection](../../sentinel/data-connectors-reference.md#azure-active-directory-identity-protection)
80
+
-[Connect data from Azure Active Directory (Azure AD) Identity Protection](../../sentinel/data-connectors/azure-active-directory-identity-protection.md)
81
81
-[Azure Active Directory Identity Protection and the Microsoft Graph PowerShell SDK](howto-identity-protection-graph-api.md)
82
82
-[Tutorial: Stream Azure Active Directory logs to an Azure event hub](../reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md)
0 commit comments