Skip to content

Commit 940712a

Browse files
authored
Merge pull request #192867 from MicrosoftDocs/main
3/24 PM Publish
2 parents 5de7a10 + c8838ff commit 940712a

File tree

177 files changed

+1607
-872
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

177 files changed

+1607
-872
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -340,6 +340,11 @@
340340
"redirect_url": "/articles/active-directory/saas-apps/miro-tutorial",
341341
"redirect_document_id": false
342342
},
343+
{
344+
"source_path_from_root": "/articles/active-directory/saas-apps/mimecast-admin-console-tutorial.md",
345+
"redirect_url": "/azure/active-directory/saas-apps/mimecast-personal-portal-tutorial",
346+
"redirect_document_id": false
347+
},
343348
{
344349
"source_path_from_root": "/articles/active-directory/active-directory-saas-fax.plus-tutorial.md",
345350
"redirect_url": "/articles/active-directory/saas-apps/fax-plus-tutorial",

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28318,6 +28318,11 @@
2831828318
"redirect_url": "/azure/frontdoor/standard-premium/how-to-enable-private-link-web-app",
2831928319
"redirect_document_id": false
2832028320
},
28321+
{
28322+
"source_path_from_root": "/articles/frontdoor/front-door-tutorial-geo-filtering.md",
28323+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-tutorial-geo-filtering",
28324+
"redirect_document_id": false
28325+
},
2832128326
{
2832228327
"source_path_from_root": "/articles/application-gateway/application-gateway-webapplicationfirewall-overview.md",
2832328328
"redirect_url": "/azure/web-application-firewall/ag/ag-overview",
@@ -43785,7 +43790,12 @@
4378543790
},
4378643791
{
4378743792
"source_path_from_root": "/articles/aks/open-service-mesh-open-source-observability.md",
43788-
"redirect_url": "/azure/aks/open-service-mesh-azure-monitor",
43793+
"redirect_url": "/azure/aks/open-service-mesh-integrations",
43794+
"redirect_document_id": false
43795+
},
43796+
{
43797+
"source_path_from_root": "/articles/aks/open-service-mesh-azure-monitor.md",
43798+
"redirect_url": "/azure/aks/open-service-mesh-integrations",
4378943799
"redirect_document_id": false
4379043800
},
4379143801
{

articles/active-directory/app-proxy/application-proxy-release-version-history.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenhoran
77
ms.service: active-directory
88
ms.topic: reference
99
ms.workload: identity
10-
ms.date: 04/27/2021
10+
ms.date: 03/24/2022
1111
ms.subservice: app-proxy
1212
ms.author: kenwith
1313
ms.reviewer: ashishj
@@ -26,6 +26,22 @@ Here is a list of related resources:
2626
| Understand Azure AD Application Proxy connectors | Find out more about [connector management](application-proxy-connectors.md) and how connectors [auto-upgrade](application-proxy-connectors.md#automatic-updates). |
2727
| Azure AD Application Proxy Connector Download | [Download the latest connector](https://download.msappproxy.net/subscription/d3c8b69d-6bf7-42be-a529-3fe9c2e70c90/connector/download). |
2828

29+
## 1.5.2846.0
30+
31+
### Release status
32+
33+
March 22, 2022: Released for download. This version is only available for install via the download page.
34+
35+
### New features and improvements
36+
37+
- Increased the number of HTTP headers supported on HTTP requests from 41 to 60.
38+
- Improved error handling of SSL failures between the connector and Azure services.
39+
- Updated the default connection limit to 200 for connector traffic when going through outbound proxy. To learn more about outbound proxy, see [Work with existing on-premises proxy servers](application-proxy-configure-connectors-with-proxy-servers.md#use-the-outbound-proxy-server).
40+
- Deprecated the use of ADAL and implemented MSAL as part of the connector installation flow.
41+
42+
### Fixed issues
43+
- Return original error code and response instead of a 400 Bad Request code for failing websocket connect attempts.
44+
2945
## 1.5.1975.0
3046

3147
### Release status

articles/active-directory/authentication/fido2-compatibility.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,8 @@ This table shows support for authenticating Azure Active Directory (Azure AD) an
2727
|:---:|:---:|:---:|:---:|:---:|:---:|:---:|:---:|:---:|:---:|
2828
| | USB | NFC | BLE | USB | NFC | BLE | USB | NFC | BLE |
2929
| **Windows** | ![Chrome supports USB on Windows for AAD accounts.][y] | ![Chrome supports NFC on Windows for AAD accounts.][y] | ![Chrome supports BLE on Windows for AAD accounts.][y] | ![Edge supports USB on Windows for AAD accounts.][y] | ![Edge supports NFC on Windows for AAD accounts.][y] | ![Edge supports BLE on Windows for AAD accounts.][y] | ![Firefox supports USB on Windows for AAD accounts.][y] | ![Firefox supports NFC on Windows for AAD accounts.][y] | ![Firefox supports BLE on Windows for AAD accounts.][y] |
30-
| **macOS** | ![Chrome supports USB on macOS for AAD accounts.][y] | ![Chrome does not support NFC on macOS for AAD accounts.][n] | ![Chrome does not support BLE on macOS for AAD accounts.][n] | ![Edge supports USB on macOS for AAD accounts.][y] | ![Edge does not support NFC on macOS for AAD accounts.][n] | ![Edge does not support BLE on macOS for AAD accounts.][n] | ![Firefox does not support USB on macOS for AAD accounts.][n] | ![Firefox does not support NFC on macOS for AAD accounts.][n] | ![Firefox does not support BLE on macOS for AAD accounts.][n] |
30+
| **MacOS** | ![Chrome supports USB on MacOS for AAD accounts.][y] | ![Chrome does not support NFC on MacOS for AAD accounts.][n] | ![Chrome does not support BLE on MacOS for AAD accounts.][n] | ![Edge supports USB on MacOS for AAD accounts.][y] | ![Edge does not support NFC on MacOS for AAD accounts.][n] | ![Edge does not support BLE on MacOS for AAD accounts.][n] | ![Firefox supports USB on MacOS for AAD accounts.][y] | ![Firefox does not support NFC on MacOS for AAD accounts.][n] | ![Firefox does not support BLE on MacOS for AAD accounts.][n] |
31+
| **ChromeOS** | ![Chrome supports USB on ChromeOS for AAD accounts.][y] | ![Chrome supports NFC on ChromeOS for AAD accounts.][n] | ![Chrome supports BLE on ChromeOS for AAD accounts.][n] | ![Edge supports USB on ChromeOS for AAD accounts.][n] | ![Edge supports NFC on ChromeOS for AAD accounts.][n] | ![Edge supports BLE on ChromeOS for AAD accounts.][n] | ![Firefox supports USB on ChromeOS for AAD accounts.][n] | ![Firefox supports NFC on ChromeOS for AAD accounts.][n] | ![Firefox supports BLE on ChromeOS for AAD accounts.][n] |
3132
| **Linux** | ![Chrome supports USB on Linux for AAD accounts.][y] | ![Chrome does not support NFC on Linux for AAD accounts.][n] | ![Chrome does not support BLE on Linux for AAD accounts.][n] | ![Edge does not support USB on Linux for AAD accounts.][n] | ![Edge does not support NFC on Linux for AAD accounts.][n] | ![Edge does not support BLE on Linux for AAD accounts.][n] | ![Firefox does not support USB on Linux for AAD accounts.][n] | ![Firefox does not support NFC on Linux for AAD accounts.][n] | ![Firefox does not support BLE on Linux for AAD accounts.][n] |
3233

3334

@@ -41,7 +42,6 @@ The following operating system and browser combinations are not supported, but f
4142
| iOS | Safari, Brave |
4243
| macOS | Safari |
4344
| Android | Chrome |
44-
| ChromeOS | Chrome |
4545

4646
## Minimum browser version
4747

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -463,6 +463,14 @@ Solution 2: Perform these actions:
463463
464464
Virtual machine scale set VM connections may fail if the virtual machine scale set instances are running an old model. Upgrading virtual machine scale set instances to the latest model may resolve issues, especially if an upgrade hasn’t been done since the Azure AD Login extension was installed. Upgrading an instance applies a standard virtual machine scale set configuration to the individual instance.
465465
466+
### AllowGroups / DenyGroups statements in sshd_config cause first login to fail for Azure AD users
467+
468+
Cause 1: If sshd_config contains either AllowGroups or DenyGroups statements, the very first login fails for Azure AD users. If the statement was added after a user already has a successful login, they can log in.
469+
470+
Solution 1: Remove AllowGroups and DenyGroups statements from sshd_config.
471+
472+
Solution 2: Move AllowGroups and DenyGroups to a "match user" section in sshd_config. Make sure the match template excludes Azure AD users.
473+
466474
## Next steps
467475
468476
[What is a device identity?](overview.md)

articles/active-directory/governance/entitlement-management-access-package-approval-policy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -115,18 +115,18 @@ If you selected a multi-stage approval, you'll need to add an approver for each
115115

116116
1. Set the Require approver justification toggle to **Yes** or **No**.
117117

118-
You also have the option to add an additional stage for a three-stage approval process. For example, you might want an employee’s manager to be the first stage approver for an access package. But, one of the resources in the access package contains confidential information. In this case, you could designate the resource owner as a second approver and a security reviewer as the third approver (Preview).
118+
You also have the option to add an additional stage for a three-stage approval process. For example, you might want an employee’s manager to be the first stage approver for an access package. But, one of the resources in the access package contains confidential information. In this case, you could designate the resource owner as a second approver and a security reviewer as the third approver. That allows a security team to have oversight into the process and the ability to, for example, reject a request based on risk criteria not known to the resource owner.
119119

120-
1. Add the **Third Approver (Preview)**:
120+
1. Add the **Third Approver**:
121121

122122
If the users are in your directory, add a specific user as the third approver by clicking **Add approvers** under Choose specific approvers.
123123

124-
If the users aren't in your directory, select **Internal sponsor** or **External sponsor** as the third approver. After selecting the approver, add the fallback approvers.
124+
If the users aren't in your directory, you also have the option to select **Internal sponsor** or **External sponsor** as the third approver. After selecting the approver, add the fallback approvers.
125125

126126
> [!NOTE]
127127
> <ul>Like the second stage, if the users are in your directory and **Manager as approver** is selected in either the first or second stage of approval, you will only see an option to select specific approvers for the third stage of approval.</ul><ul>If you want to designate the manager as a third approver, you can adjust your selections in the previous approval stages to ensure that **Manager as approver** isn’t selected. Then, you should see **Manager as approver** as an option in the dropdown.</ul><ul>If the users aren’t in your directory and you have not selected **Internal sponsor** or **External sponsor** as approvers in previous stages, you will see them as options for **Third Approver**. Otherwise, you will only be able to select **Choose specific approvers**.</ul>
128128
129-
1. Specify the number of days the third approver (Preview) has to approve the request in the box under **Decision must be made in how many days?**.
129+
1. Specify the number of days the third approver has to approve the request in the box under **Decision must be made in how many days?**.
130130

131131
1. Set the Require approver justification toggle to **Yes** or **No**.
132132

articles/active-directory/saas-apps/amazon-web-service-tutorial.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 03/08/2022
12+
ms.date: 03/24/2022
1313
ms.author: jeedes
1414
---
1515

@@ -67,7 +67,9 @@ We recommend this approach for the following reasons:
6767
To get started, you need the following items:
6868

6969
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
70-
* An AWS single sign-on (SSO) enabled subscription.
70+
* An AWS IAM IdP enabled subscription.
71+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
72+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
7173

7274
> [!Note]
7375
> Roles should not be manually edited in Azure AD when doing role imports.

articles/active-directory/saas-apps/clarizen-tutorial.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with Clarizen One | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Clarizen One'
33
description: Learn how to configure single sign-on between Azure Active Directory and Clarizen One.
44
services: active-directory
55
author: jeevansd
@@ -9,10 +9,10 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 04/08/2021
12+
ms.date: 03/24/2022
1313
ms.author: jeedes
1414
---
15-
# Tutorial: Azure Active Directory integration with Clarizen One
15+
# Tutorial: Azure AD SSO integration with Clarizen One
1616

1717
In this tutorial, you'll learn how to integrate Clarizen One with Azure Active Directory (Azure AD). When you integrate Clarizen One with Azure AD, you can:
1818

@@ -26,6 +26,8 @@ To get started, you need the following items:
2626

2727
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
2828
* Clarizen One single sign-on (SSO) enabled subscription.
29+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
30+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
2931

3032
## Scenario description
3133

@@ -71,13 +73,16 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7173

7274
![Edit Basic SAML Configuration](common/edit-urls.png)
7375

74-
4. On the **Set up Single Sign-On with SAML** page, perform the following steps:
76+
4. On the **Basic SAML Configuration** section, perform the following steps:
7577

7678
a. In the **Identifier** text box, type the value:
7779
`Clarizen`
7880

79-
b. In the **Reply URL** text box, type the URL:
80-
`https://.clarizen.com/Clarizen/Pages/Integrations/SAML/SamlResponse.aspx`
81+
b. In the **Reply URL** text box, type a URL using the following pattern:
82+
`https://<SUBDOMAIN>.clarizen.com/Clarizen/Pages/Integrations/SAML/SamlResponse.aspx`
83+
84+
> [!NOTE]
85+
> This value is not real. Update this value with the actual Reply URL. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8186

8287
4. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
8388

@@ -178,4 +183,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
178183

179184
## Next steps
180185

181-
Once you configure Clarizen One you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
186+
Once you configure Clarizen One you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

articles/active-directory/saas-apps/iauditor-tutorial.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with iAuditor | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with iAuditor'
33
description: Learn how to configure single sign-on between Azure Active Directory and iAuditor.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 09/01/2021
12+
ms.date: 03/24/2022
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with iAuditor
17+
# Tutorial: Azure AD SSO integration with iAuditor
1818

1919
In this tutorial, you'll learn how to integrate iAuditor with Azure Active Directory (Azure AD). When you integrate iAuditor with Azure AD, you can:
2020

@@ -28,6 +28,8 @@ To get started, you need the following items:
2828

2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3030
* iAuditor single sign-on (SSO) enabled subscription.
31+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
32+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
3133

3234
## Scenario description
3335

@@ -75,7 +77,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7577
`urn:auth0:safetyculture:<CustomerName>`
7678

7779
b. In the **Reply URL** text box, type a URL using the following pattern:
78-
`https://safetyculture.au.auth0.com/login/callback?connection=<CustomerName>`
80+
`https://auth.safetyculture.com/login/callback?connection=<CustomerName>`
7981

8082
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
8183

@@ -134,7 +136,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
134136

135137
## Configure iAuditor SSO
136138

137-
To configure single sign-on on **iAuditor** side, you need to send the **Certificate (PEM)** to [iAuditor support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
139+
To configure single sign-on on **iAuditor** side, you need to send the **Certificate (PEM)** and sign in URL to [iAuditor support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
138140

139141
### Create iAuditor test user
140142

0 commit comments

Comments
 (0)