Skip to content

Commit 8cc412f

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 09c05d0 + 4847c55 commit 8cc412f

File tree

379 files changed

+2078
-781
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

379 files changed

+2078
-781
lines changed

articles/active-directory/app-proxy/application-proxy-faq.yml

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ metadata:
99
ms.subservice: app-proxy
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/27/2021
12+
ms.date: 12/17/2021
1313
ms.author: kenwith
1414
ms.reviewer: ashishj
1515

@@ -270,11 +270,14 @@ sections:
270270
- name: WebSocket
271271
questions:
272272
- question: |
273-
Does WebSocket support work for applications other than QlikSense and Remote Desktop Web Client (HTML5)?
273+
Does Azure AD Application Proxy support the WebSocket protocol?
274274
answer: |
275-
Currently, WebSocket protocol support is still in public preview and it may not work for other applications. Some customers have had mixed success using WebSocket protocol with other applications.
276-
277-
Features (Eventlogs, PowerShell and Remote Desktop Services) in Windows Admin Center (WAC) do not work through Azure AD Application Proxy presently.
275+
Applications that use the WebSocket protocol, for example QlikSense and Remote Desktop Web Client (HTML5), are now supported. The following are known limitations:
276+
* Application proxy discards the cookie that is set on the server response while opening the WebSocket connection.
277+
* There is no SSO applied to the WebSocket request.
278+
* Features (Eventlogs, PowerShell and Remote Desktop Services) in the Windows Admin Center (WAC) do not work through Azure AD Application Proxy.
279+
280+
The WebSocket application doesn't have any unique publishing requirements, and can be [published](application-proxy-add-on-premises-application.md) the same way as all your other Application Proxy applications.
278281
279282
- name: Link translation
280283
questions:

articles/active-directory/develop/reference-claims-mapping-policy-type.md

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -332,6 +332,29 @@ The ID element identifies which property on the source provides the value for th
332332
> [!NOTE]
333333
> Names and URIs of claims in the restricted claim set cannot be used for the claim type elements. For more information, see the "Exceptions and restrictions" section later in this article.
334334
335+
### Group Filter (Preview)
336+
337+
**String:** GroupFilter
338+
339+
**Data type:** JSON blob
340+
341+
**Summary:** Use this property to apply a filter on the user’s groups to be included in the group claim. This can be a useful means of reducing the token size.
342+
343+
**MatchOn:** The **MatchOn** property identifies the group attribute on which to apply the filter.
344+
345+
Set the **MatchOn** property to one of the follwoing values:
346+
347+
- "displayname": The group display name.
348+
- "samaccountname": The On-premises SAM Account Name
349+
350+
**Type:** The **Type** property selects the type of filter you wish to apply to the attribute selected by the **MatchOn** property.
351+
352+
Set the **Type** property to one of the following values:
353+
354+
- "prefix": Include groups where the **MatchOn** property starts with the provided **Value** property.
355+
- "suffix": Include groups where the **MatchOn** property ends with the provided **Value** property.
356+
- "contains": Include groups where the **MatchOn** property contains with the provided **Value** property.
357+
335358
### Claims transformation
336359

337360
**String:** ClaimsTransformation
@@ -353,10 +376,11 @@ Based on the method chosen, a set of inputs and outputs is expected. Define the
353376
|Join|string1, string2, separator|outputClaim|Joins input strings by using a separator in between. For example: string1:"[email protected]" , string2:"sandbox" , separator:"." results in outputClaim:"[email protected]"|
354377
|ExtractMailPrefix|Email or UPN|extracted string|ExtensionAttributes 1-15 or any other Schema Extensions which are storing a UPN or email address value for the user e.g. [email protected]. Extracts the local part of an email address. For example: mail:"[email protected]" results in outputClaim:"foo". If no \@ sign is present, then the original input string is returned as is.|
355378

356-
**InputClaims:** Use an InputClaims element to pass the data from a claim schema entry to a transformation. It has two attributes: **ClaimTypeReferenceId** and **TransformationClaimType**.
379+
**InputClaims:** Use an InputClaims element to pass the data from a claim schema entry to a transformation. It has three attributes: **ClaimTypeReferenceId**, **TransformationClaimType** and **TreatAsMultiValue** (Preview)
357380

358381
- **ClaimTypeReferenceId** is joined with ID element of the claim schema entry to find the appropriate input claim.
359382
- **TransformationClaimType** is used to give a unique name to this input. This name must match one of the expected inputs for the transformation method.
383+
- **TreatAsMultiValue** is a Boolean flag indicating if the transform should be applied to all values or just the first. By default, transformations will only be applied to the first element in a multi value claim, by setting this value to true it ensures it is applied to all. ProxyAddresses and groups are 2 examples for input claims that you would likely want to treat as a multi value.
360384

361385
**InputParameters:** Use an InputParameters element to pass a constant value to a transformation. It has two attributes: **Value** and **ID**.
362386

articles/active-directory/fundamentals/service-accounts-principal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ Mitigate potential challenges using the following information.
9696

9797
|Challenges | Mitigations|
9898
| - | - |
99-
| Detect the user that consented to a multi-tenant app​, and detect illicit consent grants to a multi-tenant app | Run the following PowerShell to find multi-tenant apps.<br>`Get-AzureADServicePrincipal -All:$true ? {$_.Tags -eq WindowsAzureActiveDirectoryIntegratedApp"}`<br>Disable user consent. ​<br>Allow user consent from verified publishers, for selected permissions (recommended) <br> Use conditional access to block service principals from untrusted locations. Configure them under the user context, and their tokens should be used to trigger the service principal.|
99+
| Detect the user that consented to a multi-tenant app​, and detect illicit consent grants to a multi-tenant app | Run the following PowerShell to find multi-tenant apps.<br>`Get-AzureADServicePrincipal -All:$true ? {$_.Tags -eq WindowsAzureActiveDirectoryIntegratedApp"}`<br>Disable user consent. ​<br>Allow user consent from verified publishers, for selected permissions (recommended) <br> Configure them under the user context, and their tokens should be used to trigger the service principal.|
100100
|Use of a hard-coded shared secret in a script using a service principal.|Use a certificate or Azure Key Vault​.|
101101
|Tracking who is using the certificate or the secret​| Monitor the service principal's sign-ins using the Azure AD sign-in logs.|
102102
Can't manage service principals' sign-in with Conditional Access.| Monitor the sign-ins using the Azure AD sign-in logs

0 commit comments

Comments
 (0)