You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/single-sign-on-saml-protocol.md
+48-42Lines changed: 48 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
11
11
ms.subservice: develop
12
12
ms.workload: identity
13
13
ms.topic: conceptual
14
-
ms.date: 08/24/2021
14
+
ms.date: 02/05/2022
15
15
ms.author: kenwith
16
16
ms.custom: aaddev
17
17
ms.reviewer: paulgarn
@@ -32,13 +32,13 @@ The protocol diagram below describes the single sign-on sequence. The cloud serv
32
32
33
33
To request a user authentication, cloud services send an `AuthnRequest` element to Azure AD. A sample SAML 2.0 `AuthnRequest` could look like the following example:
@@ -87,23 +87,28 @@ If `SPNameQualifier` is specified, Azure AD will include the same `SPNameQualifi
87
87
Azure AD ignores the `AllowCreate` attribute.
88
88
89
89
### RequestedAuthnContext
90
+
90
91
The `RequestedAuthnContext` element specifies the desired authentication methods. It is optional in `AuthnRequest` elements sent to Azure AD. Azure AD supports `AuthnContextClassRef` values such as `urn:oasis:names:tc:SAML:2.0:ac:classes:Password`.
91
92
92
93
### Scoping
94
+
93
95
The `Scoping` element, which includes a list of identity providers, is optional in `AuthnRequest` elements sent to Azure AD.
94
96
95
97
If provided, don't include the `ProxyCount` attribute, `IDPListOption` or `RequesterID` element, as they aren't supported.
96
98
97
99
### Signature
100
+
98
101
A `Signature` element in `AuthnRequest` elements is optional. Azure AD does not validate signed authentication requests if a signature is present. Requestor verification is provided for by only responding to registered Assertion Consumer Service URLs.
99
102
100
103
### Subject
104
+
101
105
Don't include a `Subject` element. Azure AD doesn't support specifying a subject for a request and will return an error if one is provided.
102
106
103
107
## Response
108
+
104
109
When a requested sign-on completes successfully, Azure AD posts a response to the cloud service. A response to a successful sign-on attempt looks like the following sample:
<samlp:StatusMessage>AADSTS75006: An error occurred while processing a SAML2 Authentication request. AADSTS90011: The SAML authentication request property 'NameIdentifierPolicy/SPNameQualifier' is not supported.
@@ -244,9 +250,9 @@ The `NotBefore` and `NotOnOrAfter` attributes specify the interval during which
244
250
245
251
This contains a URI that identifies an intended audience. Azure AD sets the value of this element to the value of `Issuer` element of the `AuthnRequest` that initiated the sign-on. To evaluate the `Audience` value, use the value of the `App ID URI` that was specified during application registration.
246
252
247
-
```
253
+
```xml
248
254
<AudienceRestriction>
249
-
<Audience>https://www.contoso.com</Audience>
255
+
<Audience>https://www.contoso.com</Audience>
250
256
</AudienceRestriction>
251
257
```
252
258
@@ -256,15 +262,15 @@ Like the `Issuer` value, the `Audience` value must exactly match one of the serv
256
262
257
263
This contains claims about the subject or user. The following excerpt contains a sample `AttributeStatement` element. The ellipsis indicates that the element can include multiple attributes and attribute values.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md
+16-1Lines changed: 16 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: active-directory
5
5
ms.service: active-directory
6
6
ms.subservice: B2B
7
7
ms.topic: how-to
8
-
ms.date: 03/21/2022
8
+
ms.date: 05/02/2022
9
9
10
10
ms.author: mimart
11
11
author: msmimart
@@ -262,6 +262,21 @@ With outbound settings, you select which of your users and groups will be able t
262
262
263
263
1. Select **Save**.
264
264
265
+
## Remove an organization
266
+
267
+
When you remove an organization from your Organizational settings, the default cross-tenant access settings will go into effect for that organization.
268
+
269
+
> [!NOTE]
270
+
> If the organization is a cloud service provider for your organization (the isServiceProvider property in the Microsoft Graph [partner-specific configuration](/graph/api/resources/crosstenantaccesspolicyconfigurationpartner) is true), you won't be able to remove the organization.
271
+
272
+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
273
+
274
+
1. Select **External Identities**, and then select **Cross-tenant access settings (Preview)**.
275
+
276
+
1. Select the **Organizational settings** tab.
277
+
278
+
1. Find the organization in the list, and then select the trash can icon on that row.
279
+
265
280
## Next steps
266
281
267
282
- See [Configure external collaboration settings](external-collaboration-settings-configure.md) for B2B collaboration with non-Azure AD identities, social identities, and non-IT managed external accounts.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-settings-b2b-direct-connect.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -259,7 +259,7 @@ With outbound settings, you select which of your users and groups will be able t
259
259
260
260
## Remove an organization
261
261
262
-
When you remove an organization from your Organizational settings, the default cross-tenant access settings will go into effect for all B2B collaboration with that organization.
262
+
When you remove an organization from your Organizational settings, the default cross-tenant access settings will go into effect for that organization.
263
263
264
264
> [!NOTE]
265
265
> If the organization is a cloud service provider for your organization (the isServiceProvider property in the Microsoft Graph [partner-specific configuration](/graph/api/resources/crosstenantaccesspolicyconfigurationpartner) is true), you won't be able to remove the organization.
@@ -270,7 +270,7 @@ When you remove an organization from your Organizational settings, the default c
270
270
271
271
1. Select the **Organizational settings** tab.
272
272
273
-
2. Find the organization in the list, and then select the trash can icon on that row.
273
+
1. Find the organization in the list, and then select the trash can icon on that row.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/adobe-echosign-tutorial.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,7 +81,7 @@ To configure Azure AD single sign-on with Adobe Sign, perform the following step
81
81
`https://<companyname>.echosign.com`
82
82
83
83
> [!NOTE]
84
-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Adobe Sign Client support team](https://helpx.adobe.com/in/contact/support.html) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
84
+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Adobe Sign Client support team](https://helpx.adobe.com/support.html) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
85
85
86
86
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
87
87
@@ -117,16 +117,16 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
117
117
118
118
## Configure Adobe Sign SSO
119
119
120
-
1. Before configuration, contact the [Adobe Sign Client support team](https://helpx.adobe.com/in/contact/support.html) to add your domain in the Adobe Sign allowlist. Here's how to add the domain:
120
+
1. Before configuration, contact the [Adobe Sign Client support team](https://helpx.adobe.com/support.html) to add your domain in the Adobe Sign allowlist. Here's how to add the domain:
121
121
122
-
a. The [Adobe Sign Client support team](https://helpx.adobe.com/in/contact/support.html) sends you a randomly generated token. For your domain, the token will be like the following: **adobe-sign-verification= xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx**
122
+
a. The [Adobe Sign Client support team](https://helpx.adobe.com/support.html) sends you a randomly generated token. For your domain, the token will be like the following: **adobe-sign-verification= xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx**
123
123
124
-
b. Publish the verification token in a DNS text record, and notify the [Adobe Sign Client support team](https://helpx.adobe.com/in/contact/support.html).
124
+
b. Publish the verification token in a DNS text record, and notify the [Adobe Sign Client support team](https://helpx.adobe.com/support.html).
125
125
126
126
> [!NOTE]
127
127
> This can take a few days, or longer. Note that DNS propagation delays mean that a value published in DNS might not be visible for an hour or more. Your IT administrator should be knowledgeable about how to publish this token in a DNS text record.
128
128
129
-
c. When you notify the [Adobe Sign Client support team](https://helpx.adobe.com/in/contact/support.html) through the support ticket, after the token is published, they validate the domain and add it to your account.
129
+
c. When you notify the [Adobe Sign Client support team](https://helpx.adobe.com/support.html) through the support ticket, after the token is published, they validate the domain and add it to your account.
130
130
131
131
d. Generally, here's how to publish the token on a DNS record:
Copy file name to clipboardExpand all lines: articles/azure-arc/resource-bridge/overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,7 +89,7 @@ The following private cloud environments and their versions are officially suppo
89
89
90
90
* To onboard the Arc resource bridge, you are a member of the [Contributor](../../role-based-access-control/built-in-roles.md#contributor) role in the resource group.
91
91
92
-
* To read, modify, and delete the resource bridge, you are a member of the **Name of role** role in the resource group.
92
+
* To read, modify, and delete the resource bridge, you are a member of the [Contributor](../../role-based-access-control/built-in-roles.md#contributor) role in the resource group.
0 commit comments