Skip to content

Commit 8fa8e21

Browse files
authored
Merge pull request #204897 from MicrosoftDocs/main
7/15 AM Publish
2 parents cc235c0 + acf1bd4 commit 8fa8e21

File tree

52 files changed

+403
-189
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+403
-189
lines changed

articles/active-directory/develop/msal-client-application-configuration.md

Lines changed: 25 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 11/20/2020
12+
ms.date: 07/15/2022
1313
ms.author: marsma
1414
ms.reviewer: saeeda
1515
ms.custom: aaddev, has-adal-ref
@@ -33,12 +33,12 @@ The authority is a URL that indicates a directory that MSAL can request tokens f
3333

3434
Common authorities are:
3535

36-
| Common authority URLs | When to use |
37-
|--|--|
38-
| `https://login.microsoftonline.com/<tenant>/` | Sign in users of a specific organization only. The `<tenant>` in the URL is the tenant ID of the Azure Active Directory (Azure AD) tenant (a GUID), or its tenant domain. |
39-
| `https://login.microsoftonline.com/common/` | Sign in users with work and school accounts or personal Microsoft accounts. |
40-
| `https://login.microsoftonline.com/organizations/` | Sign in users with work and school accounts. |
41-
| `https://login.microsoftonline.com/consumers/` | Sign in users with personal Microsoft accounts (MSA) only. |
36+
| Common authority URLs | When to use |
37+
| -------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
38+
| `https://login.microsoftonline.com/<tenant>/` | Sign in users of a specific organization only. The `<tenant>` in the URL is the tenant ID of the Azure Active Directory (Azure AD) tenant (a GUID), or its tenant domain. |
39+
| `https://login.microsoftonline.com/common/` | Sign in users with work and school accounts or personal Microsoft accounts. |
40+
| `https://login.microsoftonline.com/organizations/` | Sign in users with work and school accounts. |
41+
| `https://login.microsoftonline.com/consumers/` | Sign in users with personal Microsoft accounts (MSA) only. |
4242

4343
The authority you specify in your code needs to be consistent with the **Supported account types** you specified for the app in **App registrations** in the Azure portal.
4444

@@ -50,16 +50,16 @@ The authority can be:
5050

5151
Azure AD cloud authorities have two parts:
5252

53-
- The identity provider *instance*
54-
- The sign-in *audience* for the app
53+
- The identity provider _instance_
54+
- The sign-in _audience_ for the app
5555

5656
The instance and audience can be concatenated and provided as the authority URL. This diagram shows how the authority URL is composed:
5757

5858
![How the authority URL is composed](media/msal-client-application-configuration/authority.png)
5959

6060
## Cloud instance
6161

62-
The *instance* is used to specify if your app is signing users from the Azure public cloud or from national clouds. Using MSAL in your code, you can set the Azure cloud instance by using an enumeration or by passing the URL to the [national cloud instance](authentication-national-cloud.md#azure-ad-authentication-endpoints) as the `Instance` member (if you know it).
62+
The _instance_ is used to specify if your app is signing users from the Azure public cloud or from national clouds. Using MSAL in your code, you can set the Azure cloud instance by using an enumeration or by passing the URL to the [national cloud instance](authentication-national-cloud.md#azure-ad-authentication-endpoints) as the `Instance` member.
6363

6464
MSAL.NET will throw an explicit exception if both `Instance` and `AzureCloudInstance` are specified.
6565

@@ -100,7 +100,7 @@ Currently, the only way to get an app to sign in users with only personal Micros
100100

101101
## Client ID
102102

103-
The client ID is the unique application (client) ID assigned to your app by Azure AD when the app was registered.
103+
The client ID is the unique **Application (client) ID** assigned to your app by Azure AD when the app was registered.
104104

105105
## Redirect URI
106106

@@ -110,40 +110,41 @@ The redirect URI is the URI the identity provider will send the security tokens
110110

111111
If you're a public client app developer who's using MSAL:
112112

113-
- You'd want to use `.WithDefaultRedirectUri()` in desktop or UWP applications (MSAL.NET 4.1+). This method will set the public client application's redirect URI property to the default recommended redirect URI for public client applications.
113+
- You'd want to use `.WithDefaultRedirectUri()` in desktop or Universal Windows Platform (UWP) applications (MSAL.NET 4.1+). The `.WithDefaultRedirectUri()` method will set the public client application's redirect URI property to the default recommended redirect URI for public client applications.
114114

115-
| Platform | Redirect URI |
116-
|--|--|
117-
| Desktop app (.NET FW) | `https://login.microsoftonline.com/common/oauth2/nativeclient` |
118-
| UWP | value of `WebAuthenticationBroker.GetCurrentApplicationCallbackUri()`. This enables SSO with the browser by setting the value to the result of WebAuthenticationBroker.GetCurrentApplicationCallbackUri() which you need to register |
119-
| .NET Core | `https://localhost`. This enables the user to use the system browser for interactive authentication since .NET Core doesn't have a UI for the embedded web view at the moment. |
115+
| Platform | Redirect URI |
116+
| --------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
117+
| Desktop app (.NET FW) | `https://login.microsoftonline.com/common/oauth2/nativeclient` |
118+
| UWP | value of `WebAuthenticationBroker.GetCurrentApplicationCallbackUri()`. This enables single sign-on (SSO) with the browser by setting the value to the result of WebAuthenticationBroker.GetCurrentApplicationCallbackUri(), which you need to register |
119+
| .NET Core | `https://localhost` enables the user to use the system browser for interactive authentication since .NET Core doesn't have a UI for the embedded web view at the moment. |
120120

121-
- You don't need to add a redirect URI if you're building a Xamarin Android and iOS application that doesn't support the broker redirect URI. It is automatically set to `msal{ClientId}://auth` for Xamarin Android and iOS.
121+
- You don't need to add a redirect URI if you're building a Xamarin Android and iOS application that doesn't support the broker redirect URI. It's automatically set to `msal{ClientId}://auth` for Xamarin Android and iOS.
122122

123123
- Configure the redirect URI in [App registrations](https://aka.ms/appregistrations):
124124

125-
![Redirect URI in App registrations](media/msal-client-application-configuration/redirect-uri.png)
125+
![Redirect URI in App registrations](media/msal-client-application-configuration/redirect-uri.png)
126126

127127
You can override the redirect URI by using the `RedirectUri` property (for example, if you use brokers). Here are some examples of redirect URIs for that scenario:
128128

129129
- `RedirectUriOnAndroid` = "msauth-5a434691-ccb2-4fd1-b97b-b64bcfbc03fc://com.microsoft.identity.client.sample";
130130
- `RedirectUriOnIos` = $"msauth.{Bundle.ID}://auth";
131131

132-
For additional iOS details, see [Migrate iOS applications that use Microsoft Authenticator from ADAL.NET to MSAL.NET](msal-net-migration-ios-broker.md) and [Leveraging the broker on iOS](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/Leveraging-the-broker-on-iOS).
133-
For additional Android details, see [Brokered auth in Android](msal-android-single-sign-on.md).
132+
For more iOS details, see [Migrate iOS applications that use Microsoft Authenticator from ADAL.NET to MSAL.NET](msal-net-migration-ios-broker.md) and [Leveraging the broker on iOS](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/Leveraging-the-broker-on-iOS).
133+
For more Android details, see [Brokered auth in Android](msal-android-single-sign-on.md).
134134

135135
### Redirect URI for confidential client apps
136136

137-
For web apps, the redirect URI (or reply URL) is the URI that Azure AD will use to send the token back to the application. This URI can be the URL of the web app/web API if the confidential app is one of these. The redirect URI needs to be registered in app registration. This registration is especially important when you deploy an app that you've initially tested locally. You then need to add the reply URL of the deployed app in the application registration portal.
137+
For web apps, the redirect URI (or reply URL) is the URI that Azure AD will use to send the token back to the application. The URI can be the URL of the web app/web API if the confidential app is one of them. The redirect URI needs to be registered in app registration. The registration is especially important when you deploy an app that you've initially tested locally. You then need to add the reply URL of the deployed app in the application registration portal.
138138

139139
For daemon apps, you don't need to specify a redirect URI.
140140

141141
## Client secret
142142

143-
This option specifies the client secret for the confidential client app. This secret (app password) is provided by the application registration portal or provided to Azure AD during app registration with PowerShell AzureAD, PowerShell AzureRM, or Azure CLI.
143+
This option specifies the client secret for the confidential client app. The client secret (app password) is provided by the application registration portal or provided to Azure AD during app registration with PowerShell AzureAD, PowerShell AzureRM, or Azure CLI.
144144

145145
## Logging
146-
To help in debugging and authentication failure troubleshooting scenarios, the Microsoft Authentication Library provides built-in logging support. Logging is each library is covered in the following articles:
146+
147+
To help in debugging and authentication failure troubleshooting scenarios, the MSAL provides built-in logging support. Logging in each library is covered in the following articles:
147148

148149
:::row:::
149150
:::column:::

articles/active-directory/manage-apps/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@
4343
items:
4444
- name: Application gallery
4545
href: overview-application-gallery.md
46+
- name: Request to publish applications
47+
href: v2-howto-app-gallery-listing.md
4648
- name: Application integration
4749
href: plan-an-application-integration.md
4850
- name: Application ownership
@@ -152,8 +154,6 @@
152154
href: migrate-okta-sync-provisioning-to-azure-active-directory.md
153155
- name: Migrate Okta federation to Azure AD managed authentication
154156
href: migrate-okta-federation-to-azure-active-directory.md
155-
- name: Request to publish applications
156-
href: v2-howto-app-gallery-listing.md
157157
- name: Secure legacy apps
158158
items:
159159
- name: Secure hybrid access with Azure AD

articles/active-directory/manage-apps/v2-howto-app-gallery-listing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.workload: identity
1111
ms.date: 6/2/2022
1212
ms.author: ergreenl
13-
ms.custom: kr2b-contr-experiment
13+
ms.custom: kr2b-contr-experiment, contperf-fy22q4
1414
---
1515

1616
# Submit a request to publish your application in Azure Active Directory application gallery

articles/active-directory/saas-apps/docusign-tutorial.md

Lines changed: 47 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 03/16/2022
12+
ms.date: 07/14/2022
1313
ms.author: jeedes
1414
---
1515

@@ -27,6 +27,7 @@ To get started, you need the following items:
2727

2828
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
2929
* A DocuSign subscription that's single sign-on (SSO) enabled.
30+
* Control over your domain DNS. This is needed to claim domain on DocuSign.
3031

3132
> [!NOTE]
3233
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
@@ -142,68 +143,94 @@ In this section, you'll grant B.Simon access to DocuSign so that this user can u
142143

143144
3. If you want to set up DocuSign manually, open a new web browser window and sign in to your DocuSign company site as an administrator.
144145

145-
4. In the upper-right corner of the page, select the profile logo, and then select **Go to Admin**.
146+
4. In the upper-left corner of the page, select the app launcher (9 dots), and then select **Admin**.
146147

147-
![Go to Admin under Profile][51]
148+
![Screenshot of Go to Admin under Profile.](media/docusign-tutorial/docusign-admin.png)
148149

149150
5. On your domain solutions page, select **Domains**.
150151

151-
![Domain Solutions/Domains][50]
152+
![Screenshot of Select_Domains.](media/docusign-tutorial/domains.png)
153+
152154

153155
6. In the **Domains** section, select **CLAIM DOMAIN**.
154156

155-
![Claim Domain option][52]
157+
![Screenshot of Claim_domain.](media/docusign-tutorial/claim-domain.png)
158+
156159

157160
7. In the **Claim a Domain** dialog box, in the **Domain Name** box, type your company domain, and then select **CLAIM**. Make sure you verify the domain and that its status is active.
158161

159-
![Claim a Domain/Domain Name dialog][53]
162+
![Screenshot of Claim a Domain/Domain Name dialog.](media/docusign-tutorial/claim-a-domain.png)
163+
164+
8. In the **Domains** section, select **Get Validation Token** of new domain added in the claim list.
165+
166+
![Screenshot of pending_Identity_provider.](media/docusign-tutorial/pending-Identity-provider.png)
167+
168+
9. Copy the **TXT Token**
169+
170+
![Screenshot of TXT_token.](media/docusign-tutorial/token.png)
171+
172+
10. Configure your DNS provider with the **TXT Token** by following these steps:
160173

161-
8. On the domain solutions page, select **Identity Providers**.
174+
a. Navigate to your domain's DNS record management page.
175+
b. Add a new TXT record.
176+
c. Name: @ or *
177+
d. Text: paste the **TXT Token** value, which you copied from the earlier step.
178+
e. TTL: Default or 1 hour / 3600 seconds
179+
180+
181+
11. On the domain solutions page, select **Identity Providers**.
162182

163-
![Identity Providers option][54]
183+
![Screenshot of Identity Providers option.](media/docusign-tutorial/identity-providers.png)
164184

165-
9. In the **Identity Providers** section, select **ADD IDENTITY PROVIDER**.
185+
12. In the **Identity Providers** section, select **ADD IDENTITY PROVIDER**.
166186

167-
![Add Identity Provider option][55]
187+
![Screenshot of Add Identity Provider option.](media/docusign-tutorial/add-identity-provider-option.png)
168188

169-
10. On the **Identity Provider Settings** page, follow these steps:
170189

171-
![Identity Provider Settings fields][56]
190+
13. On the **Identity Provider Settings** page, follow these steps:
172191

173-
a. In the **Name** box, type a unique name for your configuration. Don't use spaces.
192+
a. In the **Custom Name** box, type a unique name for your configuration. Don't use spaces.
193+
194+
![Screenshot of name_Identity_provider.](media/docusign-tutorial/add-identity-providers.png)
174195

175196
b. In the **Identity Provider Issuer box**, paste the **Azure AD Identifier** value, which you copied from the Azure portal.
176197

198+
![Screenshot of urls_Identity_provider.](media/docusign-tutorial/idp-urls.png)
199+
200+
177201
c. In the **Identity Provider Login URL** box, paste the **Login URL** value, which you copied from Azure portal.
178202

179203
d. In the **Identity Provider Logout URL** box, paste the value of **Logout URL**, which you copied from Azure portal.
204+
205+
![Screenshot of settings_Identity_provider.](media/docusign-tutorial/settings-Identity-provider.png)
206+
180207

181208
e. For **Send AuthN request by**, select **POST**.
182209

183210
f. For **Send logout request by**, select **GET**.
184211

185212
g. In the **Custom Attribute Mapping** section, select **ADD NEW MAPPING**.
186213

187-
![Custom Attribute Mapping UI][62]
214+
![Screenshot of Custom Attribute Mapping UI.](media/docusign-tutorial/add-new-mapping.png)
188215

189216
h. Choose the field you want to map to the Azure AD claim. In this example, the **emailaddress** claim is mapped with the value of `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress`. That's the default claim name from Azure AD for the email claim. Select **SAVE**.
190217

191-
![Custom Attribute Mapping fields][57]
218+
![Screenshot of Custom Attribute Mapping fields.](media/docusign-tutorial/email-address.png)
192219

193220
> [!NOTE]
194-
> Use the appropriate **User identifier** to map the user from Azure AD to DocuSign user mapping. Select the proper field, and enter the appropriate value based on your organization settings.
221+
> Use the appropriate **User identifier** to map the user from Azure AD to DocuSign user mapping. Select the proper field, and enter the appropriate value based on your organization settings. Custom Attribute Mapping setting is not mandatory.
195222
196223
i. In the **Identity Provider Certificates** section, select **ADD CERTIFICATE**, upload the certificate you downloaded from Azure AD portal, and select **SAVE**.
197224

198-
![Identity Provider Certificates/Add Certificate][58]
225+
![Screenshot of Identity Provider Certificates/Add Certificate.](media/docusign-tutorial/certificates.png)
199226

200227
j. In the **Identity Providers** section, select **ACTIONS**, and then select **Endpoints**.
201228

202-
![Identity Providers/Endpoints][59]
229+
![Screenshot of Identity Providers/Endpoints.](media/docusign-tutorial/identity-providers-endpoints.png)
203230

204231
k. In the **View SAML 2.0 Endpoints** section of the DocuSign admin portal, follow these steps:
205232

206-
![View SAML 2.0 Endpoints][60]
233+
![Screenshot of View SAML 2.0 Endpoints.](media/docusign-tutorial/saml-endpoints.png)
207234

208235
1. Copy the **Service Provider Issuer URL**, and then paste it into the **Identifier** box in **Basic SAML Configuration** section in the Azure portal.
209236

@@ -230,22 +257,6 @@ In this section, you test your Azure AD single sign-on configuration with follow
230257

231258
* You can use Microsoft My Apps. When you click the DocuSign tile in the My Apps, you should be automatically signed in to the DocuSign for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
232259

233-
## Next Steps
260+
## Next steps
234261

235262
Once you configure DocuSign you can enforce Session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
236-
237-
<!--Image references-->
238-
239-
[50]: ./media/docusign-tutorial/tutorial-docusign-18.png
240-
[51]: ./media/docusign-tutorial/tutorial-docusign-21.png
241-
[52]: ./media/docusign-tutorial/tutorial-docusign-22.png
242-
[53]: ./media/docusign-tutorial/tutorial-docusign-23.png
243-
[54]: ./media/docusign-tutorial/tutorial-docusign-19.png
244-
[55]: ./media/docusign-tutorial/tutorial-docusign-20.png
245-
[56]: ./media/docusign-tutorial/request.png
246-
[57]: ./media/docusign-tutorial/tutorial-docusign-25.png
247-
[58]: ./media/docusign-tutorial/tutorial-docusign-26.png
248-
[59]: ./media/docusign-tutorial/tutorial-docusign-27.png
249-
[60]: ./media/docusign-tutorial/tutorial-docusign-28.png
250-
[61]: ./media/docusign-tutorial/tutorial-docusign-29.png
251-
[62]: ./media/docusign-tutorial/tutorial-docusign-30.png
10.5 KB
Loading
14.1 KB
Loading
17.2 KB
Loading
9.85 KB
Loading
12.8 KB
Loading
3.97 KB
Loading

0 commit comments

Comments
 (0)