Skip to content

Commit 90c4eea

Browse files
authored
Merge pull request #239509 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 5/28
2 parents 19d1f24 + 4b7cc08 commit 90c4eea

File tree

167 files changed

+2913
-2286
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

167 files changed

+2913
-2286
lines changed

articles/active-directory/develop/TOC.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -581,6 +581,12 @@
581581
href: ./howto-restore-app.md
582582
- name: Reference
583583
items:
584+
- name: Token claims reference
585+
items:
586+
- name: Access token
587+
href: access-token-claims-reference.md
588+
- name: SAML token
589+
href: reference-saml-tokens.md
584590
- name: Microsoft Authentication Library (MSAL) reference
585591
displayName: SDK, library, msal, auth
586592
items:
@@ -830,8 +836,6 @@
830836
href: single-sign-on-saml-protocol.md
831837
- name: Sign out (SAML)
832838
href: single-sign-out-saml-protocol.md
833-
- name: SAML tokens
834-
href: reference-saml-tokens.md
835839
- name: Token exchange scenarios
836840
href: scenario-token-exchange-saml-oauth.md
837841
- name: App registration reference

articles/active-directory/develop/access-token-claims-reference.md

Lines changed: 128 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/access-tokens.md

Lines changed: 14 additions & 123 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/configurable-token-lifetimes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ You can set token lifetime policies for access tokens, SAML tokens, and ID token
4242

4343
Clients use access tokens to access a protected resource. An access token can be used only for a specific combination of user, client, and resource. Access tokens cannot be revoked and are valid until their expiry. A malicious actor that has obtained an access token can use it for extent of its lifetime. Adjusting the lifetime of an access token is a trade-off between improving system performance and increasing the amount of time that the client retains access after the user's account is disabled. Improved system performance is achieved by reducing the number of times a client needs to acquire a fresh access token.
4444

45-
The default lifetime of an access token is variable. When issued, an access token's default lifetime is assigned a random value ranging between 60-90 minutes (75 minutes on average). The default lifetime also varies depending on the client application requesting the token or if conditional access is enabled in the tenant. For more information, see [Access token lifetime](access-tokens.md#access-token-lifetime).
45+
The default lifetime of an access token is variable. When issued, an access token's default lifetime is assigned a random value ranging between 60-90 minutes (75 minutes on average). The default lifetime also varies depending on the client application requesting the token or if conditional access is enabled in the tenant. For more information, see [Access token lifetime](access-tokens.md#token-lifetime).
4646

4747
### SAML tokens
4848

articles/active-directory/develop/custom-rbac-for-developers.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -43,20 +43,20 @@ Developers have the flexibility to provide their own implementation for how role
4343

4444
Azure AD allows you to [define app roles](./howto-add-app-roles-in-azure-ad-apps.md) for your application and assign those roles to users and other applications. The roles you assign to a user or application define their level of access to the resources and operations in your application.
4545

46-
When Azure AD issues an access token for an authenticated user or application, it includes the names of the roles you've assigned the entity (the user or application) in the access token's [`roles`](./access-tokens.md#payload-claims) claim. An application like a web API that receives that access token in a request can then make authorization decisions based on the values in the `roles` claim.
46+
When Azure AD issues an access token for an authenticated user or application, it includes the names of the roles you've assigned the entity (the user or application) in the access token's [`roles`](./access-token-claims-reference.md#payload-claims) claim. An application like a web API that receives that access token in a request can then make authorization decisions based on the values in the `roles` claim.
4747

4848
### Groups
4949

50-
Developers can also use [Azure AD groups](../fundamentals/active-directory-manage-groups.md) to implement RBAC in their applications, where the memberships of the user in specific groups are interpreted as their role memberships. When an organization uses Azure AD groups, a [groups claim](./access-tokens.md#payload-claims) is included in the token that specifies the identifiers of all of the groups to which the user is assigned within the current Azure AD tenant.
50+
Developers can also use [Azure AD groups](../fundamentals/active-directory-manage-groups.md) to implement RBAC in their applications, where the memberships of the user in specific groups are interpreted as their role memberships. When an organization uses groups, the token includes a [groups claim](./access-token-claims-reference.md#payload-claims). The group claim specifies the identifiers of all of the assigned groups of the user within the tenant.
5151

5252
> [!IMPORTANT]
53-
> When working with groups, developers need to be aware of the concept of an [overage claim](./access-tokens.md#payload-claims). By default, if a user is a member of more than the overage limit (150 for SAML tokens, 200 for JWT tokens, 6 if using the implicit flow), Azure AD doesn't emit a groups claim in the token. Instead, it includes an "overage claim" in the token that indicates the consumer of the token needs to query the Microsoft Graph API to retrieve the group memberships of the user. For more information about working with overage claims, see [Claims in access tokens](./access-tokens.md#claims-in-access-tokens). It's possible to only emit groups that are assigned to an application, though [group-based assignment](../manage-apps/assign-user-or-group-access-portal.md) does require Azure Active Directory Premium P1 or P2 edition.
53+
> When working with groups, developers need to be aware of the concept of an [overage claim](./access-token-claims-reference.md#payload-claims). By default, if a user is a member of more than the overage limit (150 for SAML tokens, 200 for JWT tokens, 6 if using the implicit flow), Azure AD doesn't emit a groups claim in the token. Instead, it includes an "overage claim" in the token that indicates the consumer of the token needs to query the Microsoft Graph API to retrieve the group memberships of the user. For more information about working with overage claims, see [Claims in access tokens](./access-token-claims-reference.md). It's possible to only emit groups that are assigned to an application, though [group-based assignment](../manage-apps/assign-user-or-group-access-portal.md) does require Azure Active Directory Premium P1 or P2 edition.
5454
5555
### Custom data store
5656

57-
App roles and groups both store information about user assignments in the Azure AD directory. Another option for managing user role information that is available to developers is to maintain the information outside of the directory in a custom data store. For example, in a SQL database, Azure Table storage, or Azure Cosmos DB for Table.
57+
App roles and groups both store information about user assignments in the Azure AD directory. Another option for managing user role information that is available to developers is to maintain the information outside of the directory in a custom data store. For example, in an SQL database, Azure Table storage, or Azure Cosmos DB for Table.
5858

59-
Using custom storage allows developers extra customization and control over how to assign roles to users and how to represent them. However, the extra flexibility also introduces more responsibility. For example, there's no mechanism currently available to include this information in tokens returned from Azure AD. If developers maintain role information in a custom data store, they'll need to have the applications retrieve the roles. Retrieving the roles is typically done using extensibility points defined in the middleware available to the platform that's being used to develop the application. Developers are responsible for properly securing the custom data store.
59+
Using custom storage allows developers extra customization and control over how to assign roles to users and how to represent them. However, the extra flexibility also introduces more responsibility. For example, there's no mechanism currently available to include this information in tokens returned from Azure AD. Applications must retrieve the roles if role information is maintained in a custom data store. Retrieving the roles is typically done using extensibility points defined in the middleware available to the platform that's being used to develop the application. Developers are responsible for properly securing the custom data store.
6060

6161
Using [Azure AD B2C Custom policies](../../active-directory-b2c/custom-policy-overview.md) it's possible to interact with custom data stores and to include custom claims within a token.
6262

articles/active-directory/fundamentals/whats-deprecated-azure-ad.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ Use the following table to learn about changes including deprecations, retiremen
2929
3030
|Functionality, feature, or service|Change|Change date |
3131
|---|---|---:|
32-
|Microsoft Authenticator app [Number matching](../authentication/how-to-mfa-number-match.md)|Feature change|May 8, 2023|
3332
|[My Groups experience](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-march-2023-train/ba-p/2967448)|Feature change|May 2023|
3433
|[My Apps browser extension](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-march-2023-train/ba-p/2967448)|Feature change|May 2023|
34+
|[Microsoft Authenticator Lite for Outlook mobile](../../active-directory/authentication/how-to-mfa-authenticator-lite.md)|Feature change|Jun 9, 2023|
3535
|[System-preferred authentication methods](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-march-2023-train/ba-p/2967448)|Feature change|Sometime after GA|
3636
|[Azure AD Authentication Library (ADAL)](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-march-2023-train/ba-p/2967448)|Retirement|Jun 30, 2023|
3737
|[Azure AD Graph API](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-march-2023-train/ba-p/2967448)|Deprecation|Jun 30, 2023|
@@ -47,6 +47,7 @@ Use the following table to learn about changes including deprecations, retiremen
4747

4848
|Functionality, feature, or service|Change|Change date |
4949
|---|---|---:|
50+
|Microsoft Authenticator app [Number matching](../authentication/how-to-mfa-number-match.md)|Feature change|May 8, 2023|
5051
|[Azure AD Domain Services virtual network deployments](../../active-directory-domain-services/overview.md)|Retirement|Mar 1, 2023|
5152
|[License management API, PowerShell](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/migrate-your-apps-to-access-the-license-managements-apis-from/ba-p/2464366)|Retirement|*Mar 31, 2023|
5253

articles/active-directory/governance/entitlement-management-group-licenses.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ title: Manage the lifecycle of group-based licenses in Azure AD
33
description: This step-by-step tutorial shows how to create an access package for managing group-based licenses in entitlement management.
44
services: active-directory
55
documentationCenter: ''
6-
author: sama
6+
author: owinfreyATL
77
ms.service: active-directory
88
ms.workload: identity
99
ms.tgt_pltfrm: na
1010
ms.topic: tutorial
1111
ms.subservice: compliance
12-
ms.date: 01/25/2023
12+
ms.date: 05/25/2023
1313
ms.author: owinfrey
1414
ms.collection: M365-identity-device-management
1515

@@ -60,7 +60,7 @@ For more information, see [License requirements](entitlement-management-overview
6060

6161
1. Select **Next: Requests** to go to the **Requests** tab.
6262

63-
On this tab, you create a request policy. A *policy* defines the rules for access to an access package. You'll create a policy that allows employees in the resource directory to request the access package.
63+
On this tab, you create a request policy. A *policy* defines the rules for access to an access package. You create a policy that allows employees in the resource directory to request the access package.
6464

6565
3. In the **Users who can request access** section, select **For users in your directory** and then select **All members (excluding guests)**. These settings make it so that only members of your directory can request Office licenses.
6666

@@ -90,16 +90,16 @@ For more information, see [License requirements](entitlement-management-overview
9090

9191
2. In the **Expiration** section, for **Access package assignments expire**, select **Number of days**.
9292

93-
3. In **Assignments expire after**, enter **365**. This box specifies when members who have access to the access package will need to renew their access.
93+
3. In **Assignments expire after**, enter **365**. This box specifies when members who have access to the access package needs to renew their access.
9494

9595
4. You can also configure access reviews, which allow periodic checks of whether the employee still needs access to the access package. A review can be a self-review performed by the employee. Or you can set the employee's manager or another person as the reviewer. For more information, see [Access reviews](entitlement-management-access-reviews-create.md).
9696

9797
In this scenario, you want all employees to review whether they still need a license for Office each year.
9898

9999
1. Under **Require access reviews**, select **Yes**.
100-
2. You can leave **Starting on** set to the current date. This date is when the access review will start. After you create an access review, you can't update its start date.
101-
3. Under **Review frequency**, select **Annually**, because the review will occur once per year. The **Review frequency** box is where you determine how often the access review runs.
102-
4. Specify a **Duration (in days)**. The duration box is where you indicate how many days each occurrence of the access review series will run.
100+
2. You can leave **Starting on** set to the current date. This date is when the access review starts. After you create an access review, you can't update its start date.
101+
3. Under **Review frequency**, select **Annually**, because the review occurs once per year. The **Review frequency** box is where you determine how often the access review runs.
102+
4. Specify a **Duration (in days)**. The duration box is where you indicate how many days each occurrence of the access review series runs.
103103
5. Under **Reviewers**, select **Manager**.
104104

105105
## Step 6: Review and create your access package

0 commit comments

Comments
 (0)