You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-sms-signin.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 04/13/2020
9
+
ms.date: 04/24/2020
10
10
11
11
ms.author: iainfou
12
12
author: iainfoulds
@@ -36,9 +36,9 @@ To complete this article, you need the following resources and privileges:
36
36
* An Azure Active Directory tenant associated with your subscription.
37
37
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
38
38
* You need *global administrator* privileges in your Azure AD tenant to enable SMS-based authentication.
39
-
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
39
+
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD, Office 365, or Microsoft 365 licenses:
40
40
*[Azure AD Premium P1 or P2][azuread-licensing]
41
-
*[Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing]
41
+
*[Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing] or [Office 365 F1][o365-f1] or [F3][o365-f3]
42
42
*[Enterprise Mobility + Security (EMS) E3 or E5][ems-licensing] or [Microsoft 365 (M365) E3 or E5][m365-licensing]
43
43
44
44
## Limitations
@@ -162,3 +162,5 @@ For additional ways to sign in to Azure AD without a password, such as the Micro
Copy file name to clipboardExpand all lines: articles/active-directory/develop/reference-breaking-changes.md
+20-2Lines changed: 20 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 3/13/2020
12
+
ms.date: 5/4/2020
13
13
ms.author: ryanwi
14
14
ms.reviewer: hirsin
15
15
ms.custom: aaddev
@@ -33,13 +33,31 @@ The authentication system alters and adds features on an ongoing basis to improv
33
33
34
34
None scheduled at this time. Please see below for the changes that are in or are coming to production.
35
35
36
+
## May 2020
37
+
38
+
### Azure Government endpoints are changing
39
+
40
+
**Effective date**: May 5th (Finishing June 2020)
41
+
42
+
**Endpoints impacted**: All
43
+
44
+
**Protocol impacted**: All flows
45
+
46
+
On 1 June 2018, the official Azure Active Directory (AAD) Authority for Azure Government changed from `https://login-us.microsoftonline.com` to `https://login.microsoftonline.us`. This change also applied to Microsoft 365 GCC High and DoD, which Azure Government AAD also services. If you own an application within a US Government tenant, you must update your application to sign users in on the `.us` endpoint.
47
+
48
+
Starting May 5th, Azure AD will begin enforcing the endpoint change, blocking government users from signing into apps hosted in US Government tenants using the public endpoint (`microsoftonline.com`). Impacted apps will begin seeing an error `AADSTS900439` - `USGClientNotSupportedOnPublicEndpoint`. This error indicates that the app is attempting to sign in a US Government user on the public cloud endpoint. If your app is in a public cloud tenant and intended to support US Government users, you will need to [update your app to support them explicitly](https://docs.microsoft.com/azure/active-directory/develop/authentication-national-cloud). This may require creating a new app registration in the US Government cloud.
49
+
50
+
Enforcement of this change will be done using a gradual rollout based on how frequently users from the US Government cloud sign in to the application - apps signing in US Government users infrequently will see enforcement first, and apps frequently used by US Government users will be last to have enforcement applied. We expect enforcement to be complete across all apps in June 2020.
51
+
52
+
For more details, please see the [Azure Government blog post on this migration](https://devblogs.microsoft.com/azuregov/azure-government-aad-authority-endpoint-update/).
53
+
36
54
## March 2020
37
55
38
56
### User passwords will be restricted to 256 characters.
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Profit.co SAML App
22
+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Profit.co
23
23
24
-
In this tutorial, you'll learn how to integrate Profit.co SAML App with Azure Active Directory (Azure AD). When you integrate Profit.co SAML App with Azure AD, you can:
24
+
In this tutorial, you'll learn how to integrate Profit.co with Azure Active Directory (Azure AD). When you integrate Profit.co with Azure AD, you can:
25
25
26
-
* Control in Azure AD who has access to Profit.co SAML App.
27
-
* Enable your users to be automatically signed in to Profit.co SAML App with their Azure AD accounts.
26
+
* Control in Azure AD who has access to Profit.co.
27
+
* Enable your users to be automatically signed in to Profit.co with their Azure AD accounts.
28
28
* Manage your accounts in one central location, the Azure portal.
29
29
30
30
To learn more about software as a service (SaaS) app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
@@ -34,45 +34,45 @@ To learn more about software as a service (SaaS) app integration with Azure AD,
34
34
To get started, you need the following items:
35
35
36
36
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37
-
* Profit.co SAML App single sign-on (SSO) enabled subscription.
37
+
* Profit.co single sign-on (SSO) enabled subscription.
38
38
39
39
## Scenario description
40
40
41
41
In this tutorial, you configure and test Azure AD SSO in a test environment.
42
42
43
-
* Profit.co SAML App supports IDP initiated SSO.
43
+
* Profit.co supports IDP initiated SSO.
44
44
45
-
* After you configure Profit.co SAML App, you can enforce session control. This protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from conditional access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
45
+
* After you configure Profit.co, you can enforce session control. This protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from conditional access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
46
46
47
-
## Add Profit.co SAML App from the gallery
47
+
## Add Profit.co from the gallery
48
48
49
-
To configure the integration of Profit.co SAML App into Azure AD, you need to add Profit.co SAML App from the gallery to your list of managed SaaS apps.
49
+
To configure the integration of Profit.co into Azure AD, you need to add Profit.co from the gallery to your list of managed SaaS apps.
50
50
51
51
1. Sign in to the [Azure portal](https://portal.azure.com) by using either a work or school account, or a personal Microsoft account.
52
52
1. On the left navigation pane, select the **Azure Active Directory** service.
53
53
1. Go to **Enterprise Applications**, and then select **All Applications**.
54
54
1. To add a new application, select **New application**.
55
-
1. In the **Add from the gallery** section, type **Profit.co SAML App** in the search box.
56
-
1. Select **Profit.co SAML App** from the results panel, and then add the app. Wait a few seconds while the app is added to your tenant.
55
+
1. In the **Add from the gallery** section, type **Profit.co** in the search box.
56
+
1. Select **Profit.co** from the results panel, and then add the app. Wait a few seconds while the app is added to your tenant.
57
57
58
-
## Configure and test Azure AD single sign-on for Profit.co SAML App
58
+
## Configure and test Azure AD single sign-on for Profit.co
59
59
60
-
Configure and test Azure AD SSO with Profit.co SAML App by using a test user called **B.Simon**. For SSO to work, establish a linked relationship between an Azure AD user and the related user in Profit.co SAML App.
60
+
Configure and test Azure AD SSO with Profit.co by using a test user called **B.Simon**. For SSO to work, establish a linked relationship between an Azure AD user and the related user in Profit.co.
61
61
62
-
Here are the general steps to configure and test Azure AD SSO with Profit.co SAML App:
62
+
Here are the general steps to configure and test Azure AD SSO with Profit.co:
63
63
64
64
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
65
65
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B.Simon.
66
66
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B.Simon to use Azure AD single sign-on.
67
-
1.**[Configure Profit.co SAML App SSO](#configure-profitco-saml-app-sso)** to configure the single sign-on settings on the application side.
68
-
1.**[Create Profit.co SAML App test user](#create-a-profitco-saml-app-test-user)** to have a counterpart of B.Simon in Profit.co SAML App. This counterpart is linked to the Azure AD representation of the user.
67
+
1.**[Configure Profit.co SSO](#configure-profitco-sso)** to configure the single sign-on settings on the application side.
68
+
1.**[Create Profit.co test user](#create-a-profitco-test-user)** to have a counterpart of B.Simon in Profit.co. This counterpart is linked to the Azure AD representation of the user.
69
69
1.**[Test SSO](#test-sso)** to verify whether the configuration works.
70
70
71
71
## Configure Azure AD SSO
72
72
73
73
Follow these steps to enable Azure AD SSO in the Azure portal.
74
74
75
-
1. In the [Azure portal](https://portal.azure.com/), on the **Profit.co SAML App** application integration page, find the **Manage** section. Select **single sign-on**.
75
+
1. In the [Azure portal](https://portal.azure.com/), on the **Profit.co** application integration page, find the **Manage** section. Select **single sign-on**.
76
76
1. On the **Select a single sign-on method** page, select **SAML**.
77
77
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
78
78
@@ -98,10 +98,10 @@ In this section, you create a test user in the Azure portal called B.Simon.
98
98
99
99
### Assign the Azure AD test user
100
100
101
-
In this section, you enable B.Simon to use Azure single sign-on by granting access to Profit.co SAML App.
101
+
In this section, you enable B.Simon to use Azure single sign-on by granting access to Profit.co.
102
102
103
103
1. In the Azure portal, select **Enterprise Applications** > **All applications**.
104
-
1. In the applications list, select **Profit.co SAML App**.
104
+
1. In the applications list, select **Profit.co**.
105
105
1. In the app's overview page, find the **Manage** section, and select **Users and groups**.
106
106
107
107

@@ -114,19 +114,19 @@ In this section, you enable B.Simon to use Azure single sign-on by granting acce
114
114
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog box, select the appropriate role for the user from the list. Then choose the **Select** button at the bottom of the screen.
115
115
1. In the **Add Assignment** dialog box, select **Assign**.
116
116
117
-
## Configure Profit.co SAML App SSO
117
+
## Configure Profit.co SSO
118
118
119
-
To configure single sign-on on the Profit.co SAML App side, you need to send the App Federation Metadata URL to the [Profit.co SAML App support team](mailto:[email protected]). They configure this setting to have the SAML SSO connection set properly on both sides.
119
+
To configure single sign-on on the Profit.co side, you need to send the App Federation Metadata URL to the [Profit.co support team](mailto:[email protected]). They configure this setting to have the SAML SSO connection set properly on both sides.
120
120
121
-
### Create a Profit.co SAML App test user
121
+
### Create a Profit.co test user
122
122
123
-
In this section, you create a user called B.Simon in Profit.co SAML App. Work with the[Profit.co SAML App support team](mailto:[email protected]) to add the users in the Profit.co SAML App platform. You can't use single sign-on until you create and activate users.
123
+
In this section, you create a user called B.Simon in Profit.co. Work with the[Profit.co support team](mailto:[email protected]) to add the users in the Profit.co platform. You can't use single sign-on until you create and activate users.
124
124
125
125
## Test SSO
126
126
127
127
In this section, you test your Azure AD single sign-on configuration by using Access Panel.
128
128
129
-
When you select the Profit.co SAML App tile in Access Panel, you should be automatically signed in to the Profit.co SAML App for which you set up SSO. For more information, see [Introduction to Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
129
+
When you select the Profit.co tile in Access Panel, you should be automatically signed in to the Profit.co for which you set up SSO. For more information, see [Introduction to Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
130
130
131
131
## Additional resources
132
132
@@ -136,8 +136,8 @@ When you select the Profit.co SAML App tile in Access Panel, you should be autom
136
136
137
137
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
138
138
139
-
-[Try Profit.co SAML App with Azure AD](https://aad.portal.azure.com/)
139
+
-[Try Profit.co with Azure AD](https://aad.portal.azure.com/)
140
140
141
141
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
142
142
143
-
-[How to protect Profit.co SAML App with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
143
+
-[How to protect Profit.co with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
0 commit comments