You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Create folders to organize your Authorization Systems
3
+
description: How to create folders to organize Authorization Systems - accounts, subscriptions, and projects - in Microsoft Entra Permissions Management.
4
+
services: active-directory
5
+
author: jenniferf-skc
6
+
manager: amycolannino
7
+
ms.service: active-directory
8
+
ms.subservice: ciem
9
+
ms.workload: identity
10
+
ms.topic: how-to
11
+
ms.date: 08/09/2023
12
+
ms.author: jfields
13
+
---
14
+
15
+
# Create folders to organize your authorization systems
16
+
17
+
After onboarding your cloud environment to Permissions Management, you might have multiple authorization systems (AWS accounts, Azure subscriptions, or GCP projets) that you need to manage. You can create folders to organize and group together your list of accounts, subscriptions, or projects to manage your workflow more efficiently.
18
+
19
+
## Create a folder
20
+
21
+
1. On the Permissions Management home page, select the **Data Collectors** tab and make sure that the **Status** for your cloud environment is **Onboarded**.
22
+
1. Select the **Authorization Systems** subtab, then **Folders**.
23
+
1. Click **Create Folder**.
24
+
1. In the **Folder Name** field, enter a name for the folder you want to create.
25
+
1. From the list of names, select all Authorization Systems (accounts, subscriptions, or projects) you want to add to this folder.
26
+
1. Click **Save**. Your folder is created.
27
+
1. Repeat these steps to create as many folders as you need.
28
+
29
+
## Next steps
30
+
31
+
-[View key statistics and data about your authorization systems](ui-dashboard.md)
32
+
-[View data about the activity in your authorization system](product-dashboard.md)
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/customers/how-to-customize-languages-customers.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,20 +9,20 @@ ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.subservice: ciam
11
11
ms.topic: how-to
12
-
ms.date: 07/12/2023
12
+
ms.date: 08/09/2023
13
13
ms.custom: it-pro
14
14
15
15
#Customer intent: As a dev, devops, or it admin, I want to learn about how to add customized browser languages to my app's authentication experience.
16
16
---
17
17
# Customize the language of the authentication experience
18
18
19
-
You can create a personalized sign-in experience for users who sign in using a specific browser language by customizing the branding elements. If you don't make any changes to the elements, the default elements will be displayed.
19
+
You can create a personalized sign-in experience for users who sign in using a specific browser language by customizing the branding elements for that browser language. This customization overrides any configurations made to the default branding. If you don't make any changes to the elements, the default elements are displayed.
20
20
21
21
## Prerequisites
22
22
23
23
- If you haven't already created your own Azure AD customer tenant, create one now.
24
24
-[Register an application](how-to-register-ciam-app.md).
25
-
-[Create a user flow](how-to-user-flow-sign-up-sign-in-customers.md)
25
+
-[Create a user flow](how-to-user-flow-sign-up-sign-in-customers.md).
26
26
- Review the file size requirements for each image you want to add. You may need to use a photo editor to create the right-sized images. The preferred image type for all images is PNG, but JPG is accepted.
27
27
28
28
## Add browser language under Company branding
@@ -99,7 +99,7 @@ Language customization in the customer tenant allows your user flow to accommoda
99
99
100
100
:::image type="content" source="media/how-to-customize-languages-customers/language-customization-flow.png" alt-text="Screenshot the shows how to add languages under a user flow." lightbox="media/how-to-customize-languages-customers/language-customization-flow.png":::
101
101
102
-
The downloaded file will be in JSON format and will include both built-in and custom attributes, as well as other page-level and error strings:
102
+
The downloaded file is in JSON format and includes both built-in and custom attributes, as well as other page-level and error strings:
103
103
104
104
```http
105
105
{
@@ -156,12 +156,12 @@ You can modify any or all of these attributes in the downloaded file. For exampl
156
156
}
157
157
```
158
158
159
-
10. After making the necessary changes, you can upload the new overrides file. The changes are saved to your user flow automatically and you'll find the override under the **Configured** tab.
159
+
10. After making the necessary changes, you can upload the new overrides file. The changes are saved to your user flow automatically. The override appears under the **Configured** tab.
160
160
11. To double-check your changes, select the language under the **Configured** tab and expand the **Sign up and sign in (Preview)** option. You can view your customized language file by selecting Download overrides. To remove your customized override file, select **Remove overrides**.
161
161
162
162
:::image type="content" source="media/how-to-customize-languages-customers/remove-download-override-file.png" alt-text="Screenshot the shows how to remove or download the modified JSON file." lightbox="media/how-to-customize-languages-customers/remove-download-override-file.png":::
163
163
164
-
12. Go to the sign-in page of your customer tenant. Make sure you have the right locale and market in your URLs, for example: ui_locales=de-DE and mkt=de-DE. You'll see the updated attributes on the sign-up page:
164
+
12. Go to the sign-in page of your customer tenant. Make sure you have the right locale and market in your URLs, for example: ui_locales=de-DE and mkt=de-DE. The updated attributes on the sign-up page appear as follows:
165
165
166
166
:::image type="content" source="media/how-to-customize-languages-customers/customized-attributes.png" alt-text="Screenshot of the modified sign-up page attributes.":::
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/how-to-customize-branding.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,16 +9,14 @@ ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.subservice: fundamentals
11
11
ms.topic: how-to
12
-
ms.date: 07/13/2023
12
+
ms.date: 08/09/2023
13
13
ms.author: sarahlipsey
14
14
ms.reviewer: almars
15
-
ms.custom: "it-pro, seodec18, fasttrack-edit"
16
-
ms.collection: M365-identity-device-management
17
15
---
18
16
19
17
# Configure your company branding
20
18
21
-
When users authenticate into your corporate intranet or web-based applications, Azure Active Directory (Azure AD) provides the identity and access management (IAM) service. You can add company branding that applies to all these sign-in experiences to create a consistent experience for your users.
19
+
When users authenticate into your corporate intranet or web-based applications, Azure Active Directory (Azure AD) provides the identity and access management (IAM) service. You can add company branding that applies to all these experiences to create a consistent sign-in experience for your users.
22
20
23
21
The default sign-in experience is the global look and feel that applies across all sign-ins to your tenant. Before you customize any settings, the default Microsoft branding appears in your sign-in pages. You can customize this default experience with a custom background image and/or color, favicon, layout, header, and footer. You can also upload a custom CSS.
24
22
@@ -42,7 +40,7 @@ The **Global Administrator** role is required to customize company branding.
42
40
43
41
## Before you begin
44
42
45
-
**All branding elements are optional. Default settings will remain, if left unchanged.** For example, if you specify a banner logo but no background image, the sign-in page shows your logo with a default background image from the destination site such as Microsoft 365. Additionally, sign-in page branding doesn't carry over to personal Microsoft accounts. If your users or guests authenticate using a personal Microsoft account, the sign-in page won't reflect the branding of your organization.
43
+
**All branding elements are optional. Default settings will remain, if left unchanged.** For example, if you specify a banner logo but no background image, the sign-in page shows your logo with a default background image from the destination site such as Microsoft 365. Additionally, sign-in page branding doesn't carry over to personal Microsoft accounts. If your users or guests authenticate using a personal Microsoft account, the sign-in page doesn't reflect the branding of your organization.
46
44
47
45
**Images have different image and file size requirements.** Take note of the image requirements for each option. You may need to use a photo editor to create the right size images. The preferred image type for all images is PNG, but JPG is accepted.
48
46
@@ -58,22 +56,22 @@ The branding elements are called out in the following example. Text descriptions
58
56
1.**Page background color**: The entire space behind the sign-in box.
59
57
1.**Banner logo**: The logo that appears in the upper-left corner of the sign-in box.
60
58
1.**Username hint and text**: The text that appears before a user enters their information.
61
-
1.**Sign-in page text**: Additional text you can add below the username field.
59
+
1.**Sign-in page text**: Text you can add below the username field.
62
60
1.**Self-service password reset**: A link you can add below the sign-in page text for password resets.
63
61
1.**Template**: The layout of the page and sign-in boxes.
64
62
1.**Footer**: Text in the lower-right corner of the page where you can add Terms of use or privacy information.
65
63
66
64
### User experience
67
65
68
-
When customizing the sign-in pages that users see when accessing your organization's tenant-specific applications, there are some user experience scenarios you may need to consider.
66
+
There are some scenarios you to consider when you customize the sign-in pages for your organization's tenant-specific applications.
69
67
70
68
For Microsoft, Software as a Service (SaaS), and multi-tenant applications such as <https://myapps.microsoft.com>, or <https://outlook.com>, the customized sign-in page appears only after the user types their **Email** or **Phone number** and selects the **Next** button.
71
69
72
70
Some Microsoft applications support [Home Realm Discovery](../manage-apps/home-realm-discovery-policy.md) for authentication. In these scenarios, when a customer signs in to an Azure AD common sign-in page, Azure AD can use the customer's user name to determine where they should sign in.
73
71
74
72
For customers who access applications from a custom URL, the `whr` query string parameter, or a domain variable, can be used to apply company branding at the initial sign-in screen, not just after adding the email or phone number. For example, `whr=contoso.com` would appear in the custom URL for the app. With the Home Realm Discover and domain parameter included, the company branding appears immediately in the first sign-in step. Other domain hints can be included.
75
73
76
-
In the following examples replace the contoso.com with your own tenant name, or verified domain name:
74
+
In the following examples, replace the contoso.com with your own tenant name, or verified domain name:
77
75
78
76
- For Microsoft Outlook `https://outlook.com/contoso.com`
79
77
- For SharePoint online `https://contoso.sharepoint.com`
@@ -104,7 +102,7 @@ The sign-in experience process is grouped into sections. At the end of each sect
104
102
105
103

106
104
107
-
-**Background image**: Select a PNG or JPG to display as the main image on your sign-in page. This image scales and crops according to the window size, but may be partially blocked by the sign-in prompt.
105
+
-**Background image**: Select a PNG or JPG to display as the main image on your sign-in page. This image scales and crops according to the window size, but the sign-in prompt may partially block it.
108
106
109
107
-**Page background color**: If the background image isn't able to load because of a slower connection, your selected background color appears instead.
110
108
@@ -183,7 +181,7 @@ Once your default sign-in experience is created, select the **Edit** button to m
183
181
184
182
## Customize the sign-in experience by browser language
185
183
186
-
To create an inclusive experience for all of your users, you can customize the sign-in experience based on browser language.
184
+
You can create a personalized sign-in experience for users who sign in using a specific browser language by customizing the branding elements for that browser language. This customization overrides any configurations made to the default branding. If you don't make any changes to the elements, the default elements are displayed.
187
185
188
186
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global Administrator account for the directory.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/how-to-manage-stay-signed-in-prompt.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,11 +9,10 @@ ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.subservice: fundamentals
11
11
ms.topic: how-to
12
-
ms.date: 07/12/2023
12
+
ms.date: 08/09/2023
13
13
ms.author: sarahlipsey
14
14
ms.reviewer: almars
15
-
ms.custom: "it-pro"
16
-
ms.collection: M365-identity-device-management
15
+
17
16
---
18
17
# Manage the 'Stay signed in?' prompt
19
18
@@ -23,9 +22,9 @@ This article covers how the KMSI process works, how to enable it for customers,
23
22
24
23
## How does it work?
25
24
26
-
If a user answers **Yes** to the **'Stay signed in?'** prompt, a persistent authentication cookie is issued. The cookie must be stored in session for KMSI to work. KMSI won't work with locally stored cookies. If KMSI isn't enabled, a non-persistent cookie is issued and lasts for 24 hours or until the browser is closed.
25
+
If a user answers **Yes** to the **'Stay signed in?'** prompt, a persistent authentication cookie is issued. The cookie must be stored in session for KMSI to work. KMSI doesn't work with locally stored cookies. If KMSI isn't enabled, a non-persistent cookie is issued and lasts for 24 hours or until the browser is closed.
27
26
28
-
The following diagram shows the user sign-in flow for a managed tenant and federated tenant using the KMSI in prompt. This flow contains smart logic so that the **Stay signed in?** option won't be displayed if the machine learning system detects a high-risk sign-in or a sign-in from a shared device. For federated tenants, the prompt will show after the user successfully authenticates with the federated identity service.
27
+
The following diagram shows the user sign-in flow for a managed tenant and federated tenant using the KMSI in prompt. This flow contains smart logic so that the **Stay signed in?** option isn't displayed if the machine learning system detects a high-risk sign-in or a sign-in from a shared device. For federated tenants, the prompt will show after the user successfully authenticates with the federated identity service.
29
28
30
29
Some features of SharePoint Online and Office 2010 depend on users being able to choose to remain signed in. If you uncheck the **Show option to remain signed in** option, your users may see other unexpected prompts during the sign-in process.
0 commit comments