Skip to content

Commit 9bbcbd8

Browse files
committed
Merge branch 'main' into release-preview-azure-operator-distributed-services
2 parents 766e8b6 + 2b94af7 commit 9bbcbd8

File tree

182 files changed

+24312
-23759
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

182 files changed

+24312
-23759
lines changed

.openpublishing.redirection.json

Lines changed: 21985 additions & 21980 deletions
Large diffs are not rendered by default.

articles/active-directory/cloud-infrastructure-entitlement-management/partner-list.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Microsoft verified partners can help you onboard Microsoft Entra Permissions Man
3131
* **Onboarding and Deployment Support**
3232

3333
Partners can guide you through the entire onboarding and deployment process for
34-
ermissions Management across AWS, Azure, and GCP.
34+
Permissions Management across AWS, Azure, and GCP.
3535

3636

3737
## Partner list

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,6 @@ To apply this grant control, the device must be registered in Azure AD, which re
9494
The following client apps support this setting, this list isn't exhaustive and is subject to change::
9595

9696
- Microsoft Azure Information Protection
97-
- Microsoft Bookings
9897
- Microsoft Cortana
9998
- Microsoft Dynamics 365
10099
- Microsoft Edge
@@ -114,7 +113,6 @@ The following client apps support this setting, this list isn't exhaustive and i
114113
- Microsoft PowerPoint
115114
- Microsoft SharePoint
116115
- Microsoft Skype for Business
117-
- Microsoft StaffHub
118116
- Microsoft Stream
119117
- Microsoft Teams
120118
- Microsoft To-Do

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ Networks and network services used by clients connecting to identity and resourc
206206

207207
### Supported location policies
208208

209-
CAE only has insight into [IP-based named locations](../conditional-access/location-condition.md#ip-address-ranges). CAE doesn't have insight into other location conditions like [MFA trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips) or country-based locations. When a user comes from an MFA trusted IP, trusted location that includes MFA Trusted IPs, or country location, CAE won't be enforced after that user moves to a different location. In those cases, Azure AD will issue a one-hour access token without instant IP enforcement check.
209+
CAE only has insight into [IP-based named locations](../conditional-access/location-condition.md#ipv4-and-ipv6-address-ranges). CAE doesn't have insight into other location conditions like [MFA trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips) or country-based locations. When a user comes from an MFA trusted IP, trusted location that includes MFA Trusted IPs, or country location, CAE won't be enforced after that user moves to a different location. In those cases, Azure AD will issue a one-hour access token without instant IP enforcement check.
210210

211211
> [!IMPORTANT]
212212
> If you want your location policies to be enforced in real time by continuous access evaluation, use only the [IP based Conditional Access location condition](../conditional-access/location-condition.md) and configure all IP addresses, **including both IPv4 and IPv6**, that can be seen by your identity provider and resources provider. Do not use country location conditions or the trusted ips feature that is available in Azure AD Multi-Factor Authentication's service settings page.

articles/active-directory/conditional-access/howto-conditional-access-policy-location.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 08/22/2022
9+
ms.date: 02/23/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Conditional Access: Block access by location
1919

20-
With the location condition in Conditional Access, you can control access to your cloud apps based on the network location of a user. The location condition is commonly used to block access from countries/regions where your organization knows traffic shouldn't come from.
20+
With the location condition in Conditional Access, you can control access to your cloud apps based on the network location of a user. The location condition is commonly used to block access from countries/regions where your organization knows traffic shouldn't come from. For more information about IPv6 support, see the article [IPv6 support in Azure Active Directory](/troubleshoot/azure/active-directory/azure-ad-ipv6-support).
2121

2222
> [!NOTE]
2323
> Conditional Access policies are enforced after first-factor authentication is completed. Conditional Access isn't intended to be an organization's first line of defense for scenarios like denial-of-service (DoS) attacks, but it can use signals from these events to determine access.

articles/active-directory/conditional-access/location-condition.md

Lines changed: 51 additions & 75 deletions
Large diffs are not rendered by default.
Loading

articles/active-directory/develop/console-quickstart-portal-nodejs.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ ms.custom: mode-api
3535
> * [Node.js](https://nodejs.org/en/download/)
3636
> * [Visual Studio Code](https://code.visualstudio.com/download) or another code editor
3737
>
38-
>
3938
> ### Download and configure the sample app
4039
>
4140
> #### Step 1: Configure the application in Azure portal

articles/active-directory/develop/workload-identity-federation-create-trust.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -431,7 +431,7 @@ The Microsoft Graph endpoint (`https://graph.microsoft.com`) exposes REST APIs t
431431
Run the following method to [create a new federated identity credential](/graph/api/application-post-federatedidentitycredentials) on your app (specified by the object ID of the app). The *issuer* identifies GitHub as the external token issuer. *subject* identifies the GitHub organization, repo, and environment for your GitHub Actions workflow. When the GitHub Actions workflow requests Microsoft identity platform to exchange a GitHub token for an access token, the values in the federated identity credential are checked against the provided GitHub token.
432432

433433
```azurecli
434-
az rest --method POST --uri 'https://graph.microsoft.com/applications/f6475511-fd81-4965-a00e-41e7792b7b9c/federatedIdentityCredentials' --body '{"name":"Testing","issuer":"https://token.actions.githubusercontent.com/","subject":"repo:octo-org/octo-repo:environment:Production","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
434+
az rest --method POST --uri 'https://graph.microsoft.com/applications/f6475511-fd81-4965-a00e-41e7792b7b9c/federatedIdentityCredentials' --body '{"name":"Testing","issuer":"https://token.actions.githubusercontent.com","subject":"repo:octo-org/octo-repo:environment:Production","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
435435
```
436436

437437
And you get the response:
@@ -443,15 +443,15 @@ And you get the response:
443443
],
444444
"description": "Testing",
445445
"id": "1aa3e6a7-464c-4cd2-88d3-90db98132755",
446-
"issuer": "https://token.actions.githubusercontent.com/",
446+
"issuer": "https://token.actions.githubusercontent.com",
447447
"name": "Testing",
448448
"subject": "repo:octo-org/octo-repo:environment:Production"
449449
}
450450
```
451451

452452
*name*: The name of your Azure application.
453453

454-
*issuer*: The path to the GitHub OIDC provider: `https://token.actions.githubusercontent.com/`. This issuer will become trusted by your Azure application.
454+
*issuer*: The path to the GitHub OIDC provider: `https://token.actions.githubusercontent.com`. This issuer will become trusted by your Azure application.
455455

456456
*subject*: Before Azure will grant an access token, the request must match the conditions defined here.
457457
- For Jobs tied to an environment: `repo:< Organization/Repository >:environment:< Name >`

articles/active-directory/fundamentals/1-secure-access-posture.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 02/03/2023
11+
ms.date: 02/23/2023
1212
ms.author: jricketts
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
@@ -24,6 +24,10 @@ As you consider the governance of external access, assess your organization's se
2424
> [!NOTE]
2525
> A high degree of control over collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as onerous, end users tend to evade official channels. An example is end users sending unsecured documents by email.
2626
27+
## Before you begin
28+
29+
This article is number 1 in a series of 10 articles. We recommend you review the articles in order. Go to the **Next steps** section to see the entire series.
30+
2731
## Scenario-based planning
2832

2933
IT teams can delegate partner access to empower employees to collaborate with partners. This delegation can occur while maintaining sufficient security to protect intellectual property.
@@ -77,22 +81,24 @@ IT teams can delegate access decisions to business owners through entitlement ma
7781

7882
## Next steps
7983

80-
See the following articles to learn more about securing external access to resources. We recommend you follow the listed order.
84+
Use the following series of articles to learn about securing external access to resources. We recommend you follow the listed order.
8185

8286
1. [Determine your security posture for external access with Azure AD](1-secure-access-posture.md) (You're here)
8387

8488
2. [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
8589

86-
3. [Create a security plan for external access](3-secure-access-plan.md)
90+
3. [Create a security plan for external access to resources](3-secure-access-plan.md)
8791

8892
4. [Secure external access with groups in Azure AD and Microsoft 365](4-secure-access-groups.md)
8993

9094
5. [Transition to governed collaboration with Azure AD B2B collaboration](5-secure-access-b2b.md)
9195

9296
6. [Manage external access with Azure AD entitlement management](6-secure-access-entitlement-managment.md)
9397

94-
7. [Manage external access with Conditional Access policies](7-secure-access-conditional-access.md)
98+
7. [Manage external access to resources with Conditional Access policies](7-secure-access-conditional-access.md)
9599

96100
8. [Control external access to resources in Azure AD with sensitivity labels](8-secure-access-sensitivity-labels.md)
97101

98-
9. [Secure external access to Microsoft Teams, SharePoint, and OneDrive with Azure AD](9-secure-access-teams-sharepoint.md)
102+
9. [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business with Azure AD](9-secure-access-teams-sharepoint.md)
103+
104+
10. [Convert local guest accounts to Azure Active Directory B2B guest accounts](10-secure-local-guest.md)

0 commit comments

Comments
 (0)