Skip to content

Commit a46d154

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into pim3
2 parents 075a9de + 5818168 commit a46d154

File tree

105 files changed

+849
-620
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+849
-620
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1715,6 +1715,21 @@
17151715
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-daemon-node-call-api-prepare-tenant",
17161716
"redirect_document_id": false
17171717
},
1718+
{
1719+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-prepare-tenant.md",
1720+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-prepare-tenant",
1721+
"redirect_document_id": false
1722+
},
1723+
{
1724+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-prepare-app.md",
1725+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-prepare-app",
1726+
"redirect_document_id": false
1727+
},
1728+
{
1729+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-sign-out.md",
1730+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-sign-out",
1731+
"redirect_document_id": false
1732+
},
17181733
{
17191734
"source_path_from_root": "/articles/active-directory/external-identities/conditional-access.md",
17201735
"redirect_url": "/azure/active-directory/external-identities/authentication-conditional-access",
@@ -13561,6 +13576,11 @@
1356113576
"source_path_from_root": "/articles/active-directory/fundamentals/add-users-azure-active-directory.md",
1356213577
"redirect_url": "/azure/active-directory/fundamentals/add-users",
1356313578
"redirect_document_id": false
13579+
},
13580+
{
13581+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/subscription-requirements.md",
13582+
"redirect_url": "/azure/active-directory/governance/licensing-fundamentals",
13583+
"redirect_document_id": false
1356413584
}
1356513585

1356613586
]

articles/active-directory-b2c/enable-authentication-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ To specify your Azure AD B2C user flows, do the following:
215215

216216
1. Replace `B2C_1_SUSI` with your sign-in Azure AD B2C Policy name.
217217
1. Replace `B2C_1_EditProfile` with your edit profile Azure AD B2C policy name.
218-
1. Replace all instances of `contoso` with your [Azure AD B2C tenant name](./ tenant-management-read-tenant-name.md#get-your-tenant-name).
218+
1. Replace all instances of `contoso` with your [Azure AD B2C tenant name](./tenant-management-read-tenant-name.md#get-your-tenant-name).
219219

220220
## Step 7: Use the MSAL to sign in the user
221221

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -348,7 +348,7 @@ Selecting this option forces a resynchronization of all users while the provisio
348348
- The attribute `IsSoftDeleted` is often part of the default mappings for an application. `IsSoftdeleted` can be true in one of four scenarios: 1) The user is out of scope due to being unassigned from the application. 2) The user is out of scope due to not meeting a scoping filter. 3) The user has been soft deleted in Azure AD. 4) The property `AccountEnabled` is set to false on the user. It's not recommended to remove the `IsSoftDeleted` attribute from your attribute mappings.
349349
- The Azure AD provisioning service doesn't support provisioning null values.
350350
- They primary key, typically "ID", shouldn't be included as a target attribute in your attribute mappings.
351-
- The role attribute typically needs to be mapped using an expression, rather than a direct mapping. For more information about role mapping, see [Provisioning a role to a SCIM app](#Provisioning a role to a SCIM app).
351+
- The role attribute typically needs to be mapped using an expression, rather than a direct mapping. For more information about role mapping, see [Provisioning a role to a SCIM app](#provisioning-a-role-to-a-scim-app).
352352
- While you can disable groups from your mappings, disabling users isn't supported.
353353

354354
## Next steps

articles/active-directory/architecture/deployment-plans.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Azure Active Directory deployment plans
33
description: Guidance on Azure Active Directory deployment, such as authentication, devices, hybrid scenarios, governance, and more.
44
services: active-directory
5-
author: gargisinha
5+
author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.subservice: fundamentals

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,12 +81,12 @@ To enable Controller mode **On** for any projects, add these roles to the specif
8181
- Role Administrators
8282
- Security Admin
8383

84-
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GPC console.
84+
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GCP console.
8585

8686
3. Select **Next**.
8787

8888
#### Option 2: Enter authorization systems
89-
You have the ability to specify only certain GCP member projects to manage and monitor with MEPM (up to 100 per collector). Follow the steps to configure these GCP member projects to be monitored:
89+
You have the ability to specify only certain GCP member projects to manage and monitor with Permissions Management (up to 100 per collector). Follow the steps to configure these GCP member projects to be monitored:
9090
1. In the **Permissions Management Onboarding - GCP Project Ids** page, enter the **Project IDs**.
9191

9292
You can enter up to comma separated 100 GCP project IDs.
@@ -109,7 +109,7 @@ To enable Controller mode **On** for any projects, add these roles to the specif
109109
- Role Administrators
110110
- Security Admin
111111

112-
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GPC console.
112+
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GCP console.
113113

114114
3. Select **Next**.
115115

articles/active-directory/develop/quickstart-v2-netcore-daemon.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ ms.custom: devx-track-csharp, aaddev, identityplatformtop40, "scenarios:getting-
100100
> > [!div class="sxs-lookup"]
101101
> ### How the sample works
102102
>
103-
> ![Diagram that shows how the sample app generated by this quickstart works.](./configure-app-multi-instancing.md netcore-daemon-intro.svg)
103+
> ![Diagram that shows how the sample app generated by this quickstart works.](./media/quickstart-v2-netcore-daemon/netcore-daemon-intro.svg)
104104
>
105105
> ### Microsoft.Identity.Web.GraphServiceClient
106106
>

articles/active-directory/develop/quickstart-web-app-python-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ You can also use an integrated development environment to open the folder.
8989

9090
1. Create a virtual environment for the app:
9191

92-
[!INCLUDE [Virtual environment setup](<../../app-service/includes/quickstart-python/virtual-environment-setup.md>)]
92+
[!INCLUDE [Virtual environment setup](../../app-service/includes/quickstart-python/virtual-environment-setup.md)]
9393

9494
1. Install the requirements using `pip`:
9595

articles/active-directory/external-identities/cross-cloud-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ After each organization has completed these steps, Azure AD B2B collaboration be
4949

5050
In your Microsoft cloud settings, enable the Microsoft Azure cloud you want to collaborate with.
5151

52-
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
52+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator, Security administrator, or an account with a [custom role](cross-tenant-access-overview.md#custom-roles-for-managing-cross-tenant-access-settings) you've created. Then open the **Azure Active Directory** service.
5353
1. Select **External Identities**, and then select **Cross-tenant access settings**.
5454
1. Select **Microsoft cloud settings**.
5555
1. Select the checkboxes next to the external Microsoft Azure clouds you want to enable.

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 73 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ To collaborate with a partner tenant in a different Microsoft Azure cloud, both
123123
> [!IMPORTANT]
124124
> Changing the default inbound or outbound settings to block access could block existing business-critical access to apps in your organization or partner organizations. Be sure to use the tools described in this article and consult with your business stakeholders to identify the required access.
125125
126-
- To configure cross-tenant access settings in the Azure portal, you'll need an account with a Global administrator or Security administrator role.
126+
- To configure cross-tenant access settings in the Azure portal, you'll need an account with a Global administrator, Security administrator, or a [custom role](#custom-roles-for-managing-cross-tenant-access-settings) you've defined.
127127

128128
- To configure trust settings or apply access settings to specific users, groups, or applications, you'll need an Azure AD Premium P1 license. The license is required on the tenant that you configure. For B2B direct connect, where mutual trust relationship with another Azure AD organization is required, you'll need an Azure AD Premium P1 license in both tenants.
129129

@@ -144,6 +144,78 @@ To collaborate with a partner tenant in a different Microsoft Azure cloud, both
144144

145145
- If you block access to all apps by default, users will be unable to read emails encrypted with Microsoft Rights Management Service (also known as Office 365 Message Encryption or OME). To avoid this issue, we recommend configuring your outbound settings to allow your users to access this app ID: 00000012-0000-0000-c000-000000000000. If this is the only application you allow, access to all other apps will be blocked by default.
146146

147+
## Custom roles for managing cross-tenant access settings
148+
149+
Cross-tenant access settings can be managed with custom roles defined by your organization. This enables you to [define your own finely-scoped roles](../roles/custom-create.md) to manage cross-tenant access settings instead of using one of the built-in roles for management.
150+
Your organization can define custom roles to manage cross-tenant access settings. This allows you to create [your own finely-scoped roles](../roles/custom-create.md) to manage cross-tenant access settings instead of using built-in roles for management.
151+
### Recommended custom roles
152+
153+
#### Cross-tenant access administrator
154+
155+
This role can manage everything in cross-tenant access settings, including default and organizational based settings. This role should be assigned to users who need to manage all settings in cross-tenant access settings.
156+
157+
Please find the list of recommended actions for this role below.
158+
159+
| Actions |
160+
| ------- |
161+
| microsoft.directory.tenantRelationships/standard/read |
162+
| microsoft.directory/crossTenantAccessPolicy/standard/read |
163+
| microsoft.directory/crossTenantAccessPolicy/allowedCloudEndpoints/update |
164+
| microsoft.directory/crossTenantAccessPolicy/basic/update |
165+
| microsoft.directory/crossTenantAccessPolicy/default/b2bCollaboration/update |
166+
| microsoft.directory/crossTenantAccessPolicy/default/b2bDirectConnect/update |
167+
| microsoft.directory/crossTenantAccessPolicy/default/crossCloudMeetings/update |
168+
| microsoft.directory/crossTenantAccessPolicy/default/standard/read |
169+
| microsoft.directory/crossTenantAccessPolicy/default/tenantRestrictions/update |
170+
| microsoft.directory/crossTenantAccessPolicy/partners/b2bCollaboration/update |
171+
| microsoft.directory/crossTenantAccessPolicy/partners/b2bDirectConnect/update |
172+
| microsoft.directory/crossTenantAccessPolicy/partners/create |
173+
| microsoft.directory/crossTenantAccessPolicy/partners/crossCloudMeetings/update |
174+
| microsoft.directory/crossTenantAccessPolicy/partners/delete |
175+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/basic/update |
176+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/create |
177+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/standard/read |
178+
| microsoft.directory/crossTenantAccessPolicy/partners/standard/read |
179+
| microsoft.directory/crossTenantAccessPolicy/partners/tenantRestrictions/update |
180+
181+
#### Cross-tenant access reader
182+
This role can read everything in cross-tenant access settings, including default and organizational based settings. This role should be assigned to users who only need to review settings in cross-tenant access settings, but not manage them.
183+
184+
Please find the list of recommended actions for this role below.
185+
186+
| Actions |
187+
| ------- |
188+
| microsoft.directory.tenantRelationships/standard/read |
189+
| microsoft.directory/crossTenantAccessPolicy/standard/read |
190+
| microsoft.directory/crossTenantAccessPolicy/default/standard/read |
191+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/standard/read |
192+
| microsoft.directory/crossTenantAccessPolicy/partners/standard/read |
193+
194+
#### Cross-tenant access partner administrator
195+
This role can manage everything relating to partners and read the default settings. This role should be assigned to users who need to manage organizational based settings but not be able to change default settings.
196+
197+
Please find the list of recommended actions for this role below.
198+
199+
| Actions |
200+
| ------- |
201+
| microsoft.directory.tenantRelationships/standard/read |
202+
| microsoft.directory/crossTenantAccessPolicy/standard/read |
203+
| microsoft.directory/crossTenantAccessPolicy/basic/update |
204+
| microsoft.directory/crossTenantAccessPolicy/default/standard/read |
205+
| microsoft.directory/crossTenantAccessPolicy/partners/b2bCollaboration/update |
206+
| microsoft.directory/crossTenantAccessPolicy/partners/b2bDirectConnect/update |
207+
| microsoft.directory/crossTenantAccessPolicy/partners/create |
208+
| microsoft.directory/crossTenantAccessPolicy/partners/crossCloudMeetings/update |
209+
| microsoft.directory/crossTenantAccessPolicy/partners/delete |
210+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/basic/update |
211+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/create |
212+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/standard/read |
213+
| microsoft.directory/crossTenantAccessPolicy/partners/standard/read |
214+
| microsoft.directory/crossTenantAccessPolicy/partners/tenantRestrictions/update |
215+
216+
## Protect cross-tenant access administrative actions
217+
Any actions that modify cross-tenant access settings are considered protected actions and can be additionally protected with Conditional Access policies. For more information and configuration steps see [protected actions](../roles/protected-actions-overview.md).
218+
147219
## Identify inbound and outbound sign-ins
148220

149221
Several tools are available to help you identify the access your users and partners need before you set inbound and outbound access settings. To ensure you don’t remove access that your users and partners need, you should examine current sign-in behavior. Taking this preliminary step will help prevent loss of desired access for your end users and partner users. However, in some cases these logs are only retained for 30 days, so we strongly recommend you speak with your business stakeholders to ensure required access isn't lost.

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Use External Identities cross-tenant access settings to manage how you collabora
3737

3838
Default cross-tenant access settings apply to all external tenants for which you haven't created organization-specific customized settings. If you want to modify the Azure AD-provided default settings, follow these steps.
3939

40-
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
40+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator, Security administrator, or an account with a [custom role](cross-tenant-access-overview.md#custom-roles-for-managing-cross-tenant-access-settings) you've created. Then open the **Azure Active Directory** service.
4141
1. Select **External Identities**, and then select **Cross-tenant access settings**.
4242
1. Select the **Default settings** tab and review the summary page.
4343

0 commit comments

Comments
 (0)