Skip to content

Commit a7f9af7

Browse files
authored
Merge pull request #214836 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 10/18
2 parents 380ee4c + 666c692 commit a7f9af7

File tree

84 files changed

+1032
-1005
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+1032
-1005
lines changed

articles/active-directory/develop/configure-token-lifetimes.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,29 +9,30 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/08/2021
12+
ms.date: 10/17/2022
1313
ms.author: ryanwi
14-
ms.custom: aaddev, contperf-fy21q1
14+
ms.custom: identityplatformtop40, contperf-fy21q2, engagement-fy23
1515
ms.reviewer: ludwignick, jlu, annaba
1616
---
1717
# Configure token lifetime policies (preview)
18-
You can specify the lifetime of an access, SAML, or ID token issued by Microsoft identity platform. You can set token lifetimes for all apps in your organization, for a multi-tenant (multi-organization) application, or for a specific service principal in your organization. For more info, read [configurable token lifetimes](active-directory-configurable-token-lifetimes.md).
1918

20-
In this section, we walk through a common policy scenario that can help you impose new rules for token lifetime. In the example, you learn how to create a policy that requires users to authenticate more frequently in your web app.
19+
In the following steps, you'll implement a common policy scenario that imposes new rules for token lifetime. It's possible to specify the lifetime of an access, SAML, or ID token issued by the Microsoft identity platform. This can be set for all apps in your organization or for a specific service principal. They can also be set for multi-organizations (multi-tenant application).
20+
21+
For more information, see [configurable token lifetimes](active-directory-configurable-token-lifetimes.md).
2122

2223
## Get started
2324

2425
To get started, download the latest [Azure AD PowerShell Module Public Preview release](https://www.powershellgallery.com/packages/AzureADPreview).
2526

26-
Next, run the `Connect` command to sign in to your Azure AD admin account. Run this command each time you start a new session.
27+
Next, run the `Connect-AzureAD` command to sign in to your Azure Active Directory (Azure AD) admin account. Run this command each time you start a new session.
2728

2829
```powershell
2930
Connect-AzureAD -Confirm
3031
```
3132

3233
## Create a policy for web sign-in
3334

34-
In this example, you create a policy that requires users to authenticate more frequently in your web app. This policy sets the lifetime of the access/ID tokens to the service principal of your web app.
35+
In the following steps, you'll create a policy that requires users to authenticate more frequently in your web app. This policy sets the lifetime of the access/ID tokens to the service principal of your web app.
3536

3637
1. Create a token lifetime policy.
3738

@@ -73,7 +74,7 @@ To see all policies that have been created in your organization, run the [Get-Az
7374
Get-AzureADPolicy -All $true
7475
```
7576

76-
To see which apps and service principals are linked to a specific policy you identified run the following [Get-AzureADPolicyAppliedObject](/powershell/module/azuread/get-azureadpolicyappliedobject?view=azureadps-2.0-preview&preserve-view=true) cmdlet by replacing **1a37dad8-5da7-4cc8-87c7-efbc0326cf20** with any of your policy IDs. Then you can decide whether to configure Conditional Access sign-in frequency or remain with the Azure AD defaults.
77+
To see which apps and service principals are linked to a specific policy that you identified, run the following [`Get-AzureADPolicyAppliedObject`](/powershell/module/azuread/get-azureadpolicyappliedobject?view=azureadps-2.0-preview&preserve-view=true) cmdlet by replacing `1a37dad8-5da7-4cc8-87c7-efbc0326cf20` with any of your policy IDs. Then you can decide whether to configure Conditional Access sign-in frequency or remain with the Azure AD defaults.
7778

7879
```powershell
7980
Get-AzureADPolicyAppliedObject -id 1a37dad8-5da7-4cc8-87c7-efbc0326cf20
@@ -82,7 +83,7 @@ Get-AzureADPolicyAppliedObject -id 1a37dad8-5da7-4cc8-87c7-efbc0326cf20
8283
If your tenant has policies which define custom values for the refresh and session token configuration properties, Microsoft recommends you update those policies to values that reflect the defaults described above. If no changes are made, Azure AD will automatically honor the default values.
8384

8485
### Troubleshooting
85-
Some users have reported a `Get-AzureADPolicy : The term 'Get-AzureADPolicy' is not recognized` error after running the `Get-AzureADPolicy` cmdlet. As a workaround, run the following to uninstall/re-install the AzureAD module and then install the AzureADPreview module:
86+
Some users have reported a `Get-AzureADPolicy : The term 'Get-AzureADPolicy' is not recognized` error after running the `Get-AzureADPolicy` cmdlet. As a workaround, run the following to uninstall/re-install the AzureAD module, and then install the AzureADPreview module:
8687

8788
```powershell
8889
# Uninstall the AzureAD Module

articles/active-directory/develop/v2-overview.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,37 +9,37 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: overview
1111
ms.workload: identity
12-
ms.date: 09/13/2021
12+
ms.date: 10/18/2022
1313
ms.author: ryanwi
1414
ms.reviewer: agirling, saeeda, benv
15-
ms.custom: identityplatformtop40, contperf-fy21q2
15+
ms.custom: identityplatformtop40, contperf-fy21q2, engagement-fy23
1616
# Customer intent: As an application developer, I want a quick introduction to the Microsoft identity platform so I can decide if this platform meets my application development requirements.
1717
---
1818

1919
# What is the Microsoft identity platform?
2020

21-
The Microsoft identity platform helps you build applications your users and customers can sign in to using their Microsoft identities or social accounts, and provide authorized access to your own APIs or Microsoft APIs like Microsoft Graph.
21+
The Microsoft identity platform helps you build applications your users and customers can sign in to using their Microsoft identities or social accounts. It authorizes access to your own APIs or Microsoft APIs like Microsoft Graph.
2222

2323
There are several components that make up the Microsoft identity platform:
2424

2525
- **OAuth 2.0 and OpenID Connect standard-compliant authentication service** enabling developers to authenticate several identity types, including:
2626
- Work or school accounts, provisioned through Azure AD
27-
- Personal Microsoft account, like Skype, Xbox, and Outlook.com
27+
- Personal Microsoft accounts (Skype, Xbox, Outlook.com)
2828
- Social or local accounts, by using Azure AD B2C
29-
- **Open-source libraries**: Microsoft Authentication Libraries (MSAL) and support for other standards-compliant libraries
29+
- **Open-source libraries**: Microsoft Authentication Library (MSAL) and support for other standards-compliant libraries.
3030
- **Application management portal**: A registration and configuration experience in the Azure portal, along with the other Azure management capabilities.
3131
- **Application configuration API and PowerShell**: Programmatic configuration of your applications through the Microsoft Graph API and PowerShell so you can automate your DevOps tasks.
3232
- **Developer content**: Technical documentation including quickstarts, tutorials, how-to guides, and code samples.
3333

34-
For developers, the Microsoft identity platform offers integration of modern innovations in the identity and security space like passwordless authentication, step-up authentication, and Conditional Access. You don't need to implement such functionality yourself: applications integrated with the Microsoft identity platform natively take advantage of such innovations.
34+
For developers, the Microsoft identity platform offers integration of modern innovations in the identity and security space like passwordless authentication, step-up authentication, and Conditional Access. You don't need to implement such functionality yourself. Applications integrated with the Microsoft identity platform natively take advantage of such innovations.
3535

36-
With the Microsoft identity platform, you can write code once and reach any user. You can build an app once and have it work across many platforms, or build an app that functions as a client as well as a resource application (API).
36+
With the Microsoft identity platform, you can write code once and reach any user. You can build an app once and have it work across many platforms, or build an app that functions as both a client and a resource application (API).
3737

3838
For a video overview of the platform and a demo of the authentication experience, see [What is the Microsoft identity platform for developers?](https://youtu.be/uDU1QTSw7Ps).
3939

4040
## Getting started
4141

42-
Choose the [application scenario](authentication-flows-app-scenarios.md) you'd like to build. Each of these scenario paths starts with an overview and links to a quickstart to help you get up and running:
42+
Choose your preferred [application scenario](authentication-flows-app-scenarios.md). Each of these scenario paths has an overview and links to a quickstart to help you get started:
4343

4444
- [Single-page app (SPA)](scenario-spa-overview.md)
4545
- [Web app that signs in users](scenario-web-app-sign-user-overview.md)
@@ -72,12 +72,13 @@ Learn how core authentication and Azure AD concepts apply to the Microsoft ident
7272

7373
[Azure AD B2B](../external-identities/what-is-b2b.md) - Invite external users into your Azure AD tenant as "guest" users, and assign permissions for authorization while they use their existing credentials for authentication.
7474

75-
[Azure Active Directory for developers (v1.0)](../azuread-dev/v1-overview.md) - Shown here for developers with existing apps that use the older v1.0 endpoint. **Do not** use v1.0 for new projects.
75+
[Azure Active Directory for developers (v1.0)](../azuread-dev/v1-overview.md) - Exclusively for developers with existing apps that use the older v1.0 endpoint. **Do not** use v1.0 for new projects.
7676

7777
## Next steps
7878

79-
If you have an Azure account you already have access to an Azure Active Directory tenant, but most Microsoft identity platform developers need their own Azure AD tenant for use while developing applications, a "dev tenant."
79+
If you have an Azure account, then you have access to an Azure Active Directory tenant. However, most Microsoft identity platform developers need their own Azure AD tenant for use while developing applications, known as a *dev tenant*.
8080

8181
Learn how to create your own tenant for use while building your applications:
8282

83-
[Quickstart: Set up an Azure AD tenant](quickstart-create-new-tenant.md)
83+
> [!div class="nextstepaction"]
84+
> [Quickstart: Set up an Azure AD tenant](quickstart-create-new-tenant.md)
15.3 KB
Loading
Loading
163 KB
Loading

articles/active-directory/external-identities/user-flow-add-custom-attributes.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,13 @@ ms.collection: M365-identity-device-management
1818

1919
For each application, you might have different requirements for the information you want to collect during sign-up. Azure AD comes with a built-in set of information stored in attributes, such as Given Name, Surname, City, and Postal Code. With Azure AD, you can extend the set of attributes stored on a guest account when the external user signs up through a user flow.
2020

21-
You can create custom attributes in the Azure portal and use them in your self-service sign-up user flows. You can also read and write these attributes by using the [Microsoft Graph API](../../active-directory-b2c/microsoft-graph-operations.md). Microsoft Graph API supports creating and updating a user with extension attributes. Extension attributes in the Graph API are named by using the convention `extension_<extensions-app-id>_attributename`. For example:
21+
You can create custom attributes in the Azure portal and use them in your [self-service sign-up user flows](self-service-sign-up-user-flow.md). You can also read and write these attributes by using the [Microsoft Graph API](../../active-directory-b2c/microsoft-graph-operations.md). Microsoft Graph API supports creating and updating a user with extension attributes. Extension attributes in the Graph API are named by using the convention `extension_<extensions-app-id>_attributename`. For example:
2222

2323
```JSON
2424
"extension_831374b3bd5041bfaa54263ec9e050fc_loyaltyNumber": "212342"
2525
```
2626

27-
The `<extensions-app-id>` is specific to your tenant. To find this identifier, navigate to Azure Active Directory > App registrations > All applications. Search for the app that starts with "aad-extensions-app" and select it. On the app's Overview page, note the Application (client) ID.
27+
The `<extensions-app-id>` is specific to your tenant. To find this identifier, navigate to **Azure Active Directory** > **App registrations** > **All applications**. Search for the app that starts with "aad-extensions-app" and select it. On the app's Overview page, note the Application (client) ID.
2828

2929
## Create a custom attribute
3030

@@ -33,23 +33,24 @@ The `<extensions-app-id>` is specific to your tenant. To find this identifier, n
3333
3. In the left menu, select **External Identities**.
3434
4. Select **Custom user attributes**. The available user attributes are listed.
3535

36-
![Select user attributes for sign-up](media/user-flow-add-custom-attributes/user-attributes.png)
36+
:::image type="content" source="media/user-flow-add-custom-attributes/user-attributes.png" alt-text="Screenshot of selecting custom user attributes for sign-up." lightbox="media/user-flow-add-custom-attributes/user-attributes-large-image.png":::
37+
3738

3839
5. To add an attribute, select **Add**.
3940
6. In the **Add an attribute** pane, enter the following values:
4041

41-
- **Name** - Provide a name for the custom attribute (for example, "Shoesize").
42+
- **Name** - Provide a name for the custom attribute (for example, "Shoe size").
4243
- **Data Type** - Choose a data type (**String**, **Boolean**, or **Int**).
43-
- **Description** - Optionally, enter a description of the custom attribute for internal use. This description is not visible to the user.
44+
- **Description** - Optionally, enter a description of the custom attribute for internal use. This description isn't visible to the user.
4445

45-
![Add an attribute](media/user-flow-add-custom-attributes/add-an-attribute.png)
46+
:::image type="content" source="media/user-flow-add-custom-attributes/add-an-attribute.png" alt-text="Screenshot of adding a custom attribute.":::
4647

4748
7. Select **Create**.
4849

49-
The custom attribute is now available in the list of user attributes and for use in your user flows. A custom attribute is only created the first time it is used in any user flow, and not when you add it to the list of user attributes.
50+
The custom attribute is now available in the list of user attributes and for use in your user flows. A custom attribute is only created the first time it's used in any user flow, and not when you add it to the list of user attributes.
5051

51-
Once you've created a new user using a user flow that uses the newly created custom attribute, the object can be queried in [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer). You should now see **ShoeSize** in the list of attributes collected during the sign-up journey on the user object. You can call the Graph API from your application to get the data from this attribute after it is added to the user object.
52+
Once you've created a new user using a user flow that uses the newly created custom attribute, the object can be queried in [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer). You should now see **ShoeSize** in the list of attributes collected during the sign-up journey on the user object. You can call the Graph API from your application to get the data from this attribute after it's added to the user object.
5253

5354
## Next steps
5455

55-
[Add a self-service sign-up user flow to an app](self-service-sign-up-user-flow.md)
56+
[Add a self-service sign-up user flow to an app](self-service-sign-up-user-flow.md)

articles/active-directory/fundamentals/secure-with-azure-ad-best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -276,7 +276,7 @@ Below are some considerations when designing a governed subscription lifecycle p
276276

277277
## Operations
278278

279-
The following are additional operational considerations for Azure AD, specific to multiple isolated environments. Check the [Azure Cloud Adoption Framework](/azure/cloud-adoption-framework/manage/), [Azure Security Benchmark](/security/benchmark/azure/) and [Azure AD Operations guide](./active-directory-ops-guide-ops.md) for detailed guidance to operate individual environments.
279+
The following are additional operational considerations for Azure AD, specific to multiple isolated environments. Check the [Azure Cloud Adoption Framework](/azure/cloud-adoption-framework/manage/), the [Microsoft cloud security benchmark](/security/benchmark/azure/) and [Azure AD Operations guide](./active-directory-ops-guide-ops.md) for detailed guidance to operate individual environments.
280280

281281
### Cross-environment roles and responsibilities
282282

articles/active-directory/verifiable-credentials/plan-issuance-solution.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -285,7 +285,7 @@ For security logging and monitoring, we recommend the following:
285285

286286
* Mitigate distributed denial of service (DDOS) and Key Vault resource exhaustion risks. Every request that triggers a VC issuance request generates Key Vault signing operations that accrue towards service limits. We recommend protecting traffic by incorporating authentication or captcha before generating issuance requests.
287287

288-
For guidance on managing your Azure environment, we recommend you review [Azure Security Benchmark](/security/benchmark/azure/) and [Securing Azure environments with Azure Active Directory](https://aka.ms/AzureADSecuredAzure). These guides provide best practices for managing the underlying Azure resources, including Azure Key Vault, Azure Storage, websites, and other Azure-related services and capabilities.
288+
For guidance on managing your Azure environment, we recommend you review the [Microsoft cloud security benchmark](/security/benchmark/azure/) and [Securing Azure environments with Azure Active Directory](https://aka.ms/AzureADSecuredAzure). These guides provide best practices for managing the underlying Azure resources, including Azure Key Vault, Azure Storage, websites, and other Azure-related services and capabilities.
289289

290290
## Additional considerations
291291

articles/aks/supported-kubernetes-versions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,7 @@ For the past release history, see [Kubernetes](https://en.wikipedia.org/wiki/Kub
191191
| 1.22 | Aug-04-21 | Sept 2021 | Dec 2021 | 1.25 GA |
192192
| 1.23 | Dec 2021 | Jan 2022 | Apr 2022 | 1.26 GA |
193193
| 1.24 | Apr-22-22 | May 2022 | Jul 2022 | 1.27 GA
194-
| 1.25 | Aug 2022 | Oct 2022 | Nov 2022 | 1.28 GA
194+
| 1.25 | Aug 2022 | Oct 2022 | Dec 2022 | 1.28 GA
195195
| 1.26 | Dec 2022 | Jan 2023 | Mar 2023 | 1.29 GA
196196

197197
## FAQ

0 commit comments

Comments
 (0)