Skip to content

Commit 9007340

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 5f2ef80 + 1224e47 commit 9007340

File tree

145 files changed

+3786
-1962
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

145 files changed

+3786
-1962
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6160,6 +6160,11 @@
61606160
"source_path_from_root": "/articles/azure-monitor/logs/api/app-insights-azure-ad-api.md",
61616161
"redirect_url": "/azure/azure-monitor/app/app-insights-azure-ad-api",
61626162
"redirect_document_id": false
6163+
},
6164+
{
6165+
"source_path_from_root": "/articles/azure-monitor/app/javascript-sdk-advanced.md",
6166+
"redirect_url": "/azure/azure-monitor/app/javascript-sdk-configuration",
6167+
"redirect_document_id": false
61636168
}
61646169
]
61656170
}

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
- name: Permissions Management
1+
- name: Microsoft Entra Permissions Management
22
href: index.yml
33
- name: Overview
44
expanded: true
55
items:
6-
- name: What's Permissions Management?
6+
- name: What's Microsoft Entra Permissions Management?
77
href: overview.md
88
- name: How-to guides
99
expanded: true

articles/active-directory/cloud-infrastructure-entitlement-management/index.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
### YamlMime:Landing
22

3-
title: Permissions Management
4-
summary: Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities (users and workloads), actions, and resources across cloud infrastructures. It detects, right-sizes, and monitors unused and excessive permissions and enables Zero Trust security through least privilege access in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
3+
title: Microsoft Entra Permissions Management
4+
summary: Microsoft Entra Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities (users and workloads), actions, and resources across cloud infrastructures. It detects, right-sizes, and monitors unused and excessive permissions and enables Zero Trust security through least privilege access in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
55

66
metadata:
7-
title: Permissions Management
7+
title: Microsoft Entra Permissions Management
88
description: Learn how to use Permissions Management and Cloud Infrastructure Entitlement Management (CIEM)
99
services: active-directory
1010
author: jenniferf-skc
@@ -13,7 +13,7 @@ metadata:
1313
ms.subservice: ciem
1414
ms.workload: identity
1515
ms.topic: landing-page
16-
ms.date: 03/09/2022
16+
ms.date: 06/16/2023
1717
ms.author: jfields
1818

1919

@@ -24,7 +24,7 @@ landingContent:
2424
# Cards and links should be based on top customer tasks or top subjects
2525
# Start card title with a verb
2626
# Card
27-
- title: What's Permissions Management?
27+
- title: What's Microsoft Entra Permissions Management?
2828
linkLists:
2929
- linkListType: overview
3030
links:

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,13 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/24/2023
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

15-
# Enable Permissions Management in your organization
15+
# Enable Microsoft Entra Permissions Management in your organization
1616

17-
This article describes how to enable Permissions Management in your organization. Once you've enabled Permissions Management, you can connect it to your Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) platforms.
17+
This article describes how to enable Microsoft Entra Permissions Management in your organization. Once you've enabled Permissions Management, you can connect it to your Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) platforms.
1818

1919
> [!NOTE]
2020
> To complete this task, you must have *Microsoft Entra Permissions Management Administrator* permissions. You can't enable Permissions Management as a user from another tenant who has signed in via B2B or via Azure Lighthouse.

articles/active-directory/cloud-infrastructure-entitlement-management/overview.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: overview
11-
ms.date: 04/20/2022
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

15-
# What's Permissions Management?
15+
# What's Microsoft Entra Permissions Management?
1616

1717
## Overview
1818

19-
Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
19+
Microsoft Entra Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
2020

2121
Permissions Management detects, automatically right-sizes, and continuously monitors unused and excessive permissions.
2222

@@ -70,5 +70,6 @@ Once your organization has explored and implemented the discover, remediation an
7070

7171
## Next steps
7272

73-
- For information on how to onboard Permissions Management for your organization, see [Enable Permissions Management in your organization](onboard-enable-tenant.md).
73+
- Deepen your learning with the [Introduction to Microsoft Entra Permissions Management](https://go.microsoft.com/fwlink/?linkid=2240016) learn module.
74+
- Sign up for a [45-day free trial](https://aka.ms/TryPermissionsManagement) of Permissions Management.
7475
- For a list of frequently asked questions (FAQs) about Permissions Management, see [FAQs](faqs.md).

articles/active-directory/develop/scenario-web-app-call-api-acquire-token.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -199,6 +199,16 @@ public ModelAndView getUserFromGraph(HttpServletRequest httpRequest, HttpServlet
199199
// Code omitted here
200200
```
201201

202+
# [Node.js](#tab/nodejs)
203+
204+
In the Node.js sample, the code that acquires a token is in the *acquireToken* method of the **AuthProvider** class.
205+
206+
:::code language="js" source="~/ms-identity-node/App/auth/AuthProvider.js" range="79-121":::
207+
208+
This access token is then used to handle requests to the `/profile` endpoint:
209+
210+
:::code language="js" source="~/ms-identity-node/App/routes/users.js" range="29-39":::
211+
202212
# [Python](#tab/python)
203213

204214
In the Python sample, the code that calls the API is in `app.py`.
@@ -226,6 +236,11 @@ Move on to the next article in this scenario,
226236
Move on to the next article in this scenario,
227237
[Call a web API](scenario-web-app-call-api-call-api.md?tabs=java).
228238

239+
# [Node.js](#tab/nodejs)
240+
241+
Move on to the next article in this scenario,
242+
[Call a web API](scenario-web-app-call-api-call-api.md?tabs=nodejs).
243+
229244
# [Python](#tab/python)
230245

231246
Move on to the next article in this scenario,

articles/active-directory/develop/scenario-web-app-call-api-app-configuration.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -261,6 +261,14 @@ Code examples in this article and the following one are extracted from the [ASP.
261261
Code examples in this article and the following one are extracted from the [Java web application that calls Microsoft Graph](https://github.com/Azure-Samples/ms-identity-java-webapp), a web-app sample that uses MSAL for Java.
262262
The sample currently lets MSAL for Java produce the authorization-code URL and handles the navigation to the authorization endpoint for the Microsoft identity platform. It's also possible to use Sprint security to sign the user in. You might want to refer to the sample for full implementation details.
263263

264+
# [Node.js](#tab/nodejs)
265+
266+
Code examples in this article and the following one are extracted from the [Node.js & Express.js web application that calls Microsoft Graph](https://github.com/Azure-Samples/ms-identity-node), a web app sample that uses MSAL Node.
267+
268+
The sample currently lets MSAL Node produce the authorization-code URL and handles the navigation to the authorization endpoint for the Microsoft identity platform. This is shown below:
269+
270+
:::code language="js" source="~/ms-identity-node/App/auth/AuthProvider.js" range="187-232":::
271+
264272
# [Python](#tab/python)
265273

266274
Code snippets in this article and the following are extracted from the [Python web application calling Microsoft graph](https://github.com/Azure-Samples/ms-identity-python-webapp) sample using the [identity package](https://pypi.org/project/identity/) (a wrapper around MSAL Python).
@@ -279,6 +287,12 @@ Microsoft.Identity.Web simplifies your code by setting the correct OpenID Connec
279287

280288
*Microsoft.Identity.Web.OWIN* simplifies your code by setting the correct OpenID Connect settings, subscribing to the code received event, and redeeming the code. No extra code is required to redeem the authorization code. See [Microsoft.Identity.Web source code](https://github.com/AzureAD/microsoft-identity-web/blob/9fdcf15c66819b31b1049955eed5d3e5391656f5/src/Microsoft.Identity.Web.OWIN/AppBuilderExtension.cs#L95) for details on how this works.
281289

290+
# [Node.js](#tab/nodejs)
291+
292+
The *handleRedirect* method in **AuthProvider** class processes the authorization code received from Azure AD. This is shown below:
293+
294+
:::code language="js" source="~/ms-identity-node/App/auth/AuthProvider.js" range="123-155":::
295+
282296
# [Java](#tab/java)
283297

284298
See [Web app that signs in users: Code configuration](scenario-web-app-sign-user-app-configuration.md?tabs=java#initialization-code) to understand how the Java sample gets the authorization code. After the app receives the code, the [AuthFilter.java#L51-L56](https://github.com/Azure-Samples/ms-identity-java-webapp/blob/d55ee4ac0ce2c43378f2c99fd6e6856d41bdf144/src/main/java/com/microsoft/azure/msalwebsample/AuthFilter.java#L51-L56):
@@ -468,6 +482,12 @@ IAuthenticationResult getAuthResultBySilentFlow(HttpServletRequest httpRequest,
468482

469483
The detail of the `SessionManagementHelper` class is provided in the [MSAL sample for Java](https://github.com/Azure-Samples/ms-identity-java-webapp/blob/d55ee4ac0ce2c43378f2c99fd6e6856d41bdf144/src/main/java/com/microsoft/azure/msalwebsample/SessionManagementHelper.java).
470484

485+
# [Node.js](#tab/nodejs)
486+
487+
In the Node.js sample, the application session is used to store the token cache. Using MSAL Node cache methods, the token cache in session is read before a token request is made, and then updated once the token request is successfully completed. This is shown below:
488+
489+
:::code language="js" source="~/ms-identity-node/App/auth/AuthProvider.js" range="79-121":::
490+
471491
# [Python](#tab/python)
472492

473493
In the Python sample, the identity package takes care of the token cache, using the global `session` object for storage.
@@ -501,6 +521,11 @@ Move on to the next article in this scenario,
501521
Move on to the next article in this scenario,
502522
[Remove accounts from the cache on global sign out](scenario-web-app-call-api-sign-in.md?tabs=java).
503523

524+
# [Node.js](#tab/nodejs)
525+
526+
Move on to the next article in this scenario,
527+
[Remove accounts from the cache on global sign out](scenario-web-app-call-api-sign-in.md?tabs=nodejs).
528+
504529
# [Python](#tab/python)
505530

506531
Move on to the next article in this scenario,

articles/active-directory/develop/scenario-web-app-call-api-call-api.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -295,6 +295,12 @@ private String getUserInfoFromGraph(String accessToken) throws Exception {
295295
}
296296
```
297297

298+
# [Node.js](#tab/nodejs)
299+
300+
After successfully retrieving a token, the code uses the **axios** package to query the API endpoint and retrieve a JSON result.
301+
302+
:::code language="js" source="~/ms-identity-node/App/fetch.js" range="8-28":::
303+
298304
# [Python](#tab/python)
299305

300306
After successfully retrieving a token, the code uses the requests package to query the API endpoint and retrieve a JSON result.

articles/active-directory/develop/scenario-web-app-call-api-sign-in.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,10 @@ The ASP.NET sample doesn't remove accounts from the cache on global sign-out.
3838

3939
The Java sample doesn't remove accounts from the cache on global sign-out.
4040

41+
# [Node.js](#tab/nodejs)
42+
43+
The Node sample doesn't remove accounts from the cache on global sign-out.
44+
4145
# [Python](#tab/python)
4246

4347
The Python sample doesn't remove accounts from the cache on global sign-out.
@@ -61,6 +65,11 @@ Move on to the next article in this scenario,
6165
Move on to the next article in this scenario,
6266
[Acquire a token for the web app](./scenario-web-app-call-api-acquire-token.md?tabs=java).
6367

68+
# [Node.js](#tab/nodejs)
69+
70+
Move on to the next article in this scenario,
71+
[Acquire a token for the web app](./scenario-web-app-call-api-acquire-token.md?tabs=nodejs).
72+
6473
# [Python](#tab/python)
6574

6675
Move on to the next article in this scenario,

articles/active-directory/develop/scenario-web-app-sign-user-app-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -167,9 +167,9 @@ In the Azure portal, the reply URIs that you register on the **Authentication**
167167

168168
# [Node.js](#tab/nodejs)
169169

170-
Here, the configuration parameters reside in *.env* as environment variables:
170+
Here, the configuration parameters reside in *.env.dev* as environment variables:
171171

172-
:::code language="text" source="~/ms-identity-node/App/.env":::
172+
:::code language="text" source="~/ms-identity-node/App/.env.dev":::
173173

174174
These parameters are used to create a configuration object in *authConfig.js* file, which will eventually be used to initialize MSAL Node:
175175

0 commit comments

Comments
 (0)