Skip to content

Commit a951959

Browse files
authored
Merge branch 'MicrosoftDocs:main' into master
2 parents 8b8c634 + 43effca commit a951959

File tree

161 files changed

+1244
-596
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

161 files changed

+1244
-596
lines changed

articles/active-directory-b2c/identity-provider-microsoft-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To enable sign-in for users with a Microsoft account in Azure Active Directory B
4040
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
4141
1. Select **New registration**.
4242
1. Enter a **Name** for your application. For example, *MSAapp1*.
43-
1. Under **Supported account types**, select **Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox)**.
43+
1. Under **Supported account types**, select **personal Microsoft accounts (e.g. Skype, Xbox)**.
4444

4545
For more information on the different account type selections, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
4646
1. Under **Redirect URI (optional)**, select **Web** and enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your Azure AD B2C tenant, and `your-domain-name` with your custom domain.

articles/active-directory-b2c/manage-users-portal.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,17 @@ To reset a user's password:
7373

7474
For details about restoring a user within the first 30 days after deletion, or for permanently deleting a user, see [Restore or remove a recently deleted user using Azure Active Directory](../active-directory/fundamentals/active-directory-users-restore.md).
7575

76+
77+
## Export consumer users
78+
79+
1. In your Azure AD B2C directory, search for **Azure Active Directory**.
80+
2. Select **Users**, and then select **Bulk Operations** and **Download Users**.
81+
3. Select **Start**, and then select **File is ready! Click here to download**.
82+
83+
84+
When downloading users via Bulk Operations option, the CSV file will bring users with their UPN attribute with the format *objectID@B2CDomain*. This is by design since that's the way the UPN information is stored in the B2C tenant.
85+
86+
7687
## Next steps
7788

7889
For automated user management scenarios, for example migrating users from another identity provider to your Azure AD B2C directory, see [Azure AD B2C: User migration](user-migration.md).
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: Azure AD provisioning to applications using custom connectors
3+
description: This document describes how to configure Azure AD to provision users with external systems that offer REST and SOAP APIs.
4+
services: active-directory
5+
author: billmath
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.subservice: app-provisioning
9+
ms.topic: how-to
10+
ms.workload: identity
11+
ms.date: 05/19/2023
12+
ms.author: billmath
13+
ms.reviewer: arvinh
14+
---
15+
16+
17+
# Provisioning with the custom connectors
18+
19+
Azure AD supports preintegrated connectors for applications that support the following protocols and standards:
20+
21+
> [!div class="checklist"]
22+
> - [SCIM 2.0](on-premises-scim-provisioning.md)
23+
> - [SQL](tutorial-ecma-sql-connector.md)
24+
> - [LDAP](on-premises-ldap-connector-configure.md)
25+
> - [REST](on-premises-ldap-connector-configure.md)
26+
> - [SOAP](on-premises-ldap-connector-configure.md)
27+
28+
For connectivity to applications that don't support the aforementioned protocols and standards, customers and [partners](https://social.technet.microsoft.com/wiki/contents/articles/1589.fim-2010-mim-2016-management-agents-from-partners.aspx) have built custom [ECMA 2.0](https://learn.microsoft.com/previous-versions/windows/desktop/forefront-2010/hh859557(v=vs.100)) connectors for Microsoft Identity Manager (MIM) 2016. You can now use those ECMA 2.0 connectors with the lightweight Azure AD provisioning agent, without needing MIM sync deployed.
29+
30+
## Limitations
31+
32+
Custom connectors built for MIM rely on the [ECMA framework](https://learn.microsoft.com/previous-versions/windows/desktop/forefront-2010/hh859557(v=vs.100)). The following table includes capabilities of the ECMA framework that are either partially supported or not supported by the Azure AD provisioning agent. For a list of known limitations for the Azure AD provisioning service and on-premises application provisioning, see [here](https://learn.microsoft.com/azure/active-directory/app-provisioning/known-issues?pivots=app-provisioning#on-premises-application-provisioning).
33+
34+
35+
| **Capability / feature** | **Support** | **Comments** |
36+
| --- | --- | --- |
37+
| Object type | Partially supported | Supports one object type |
38+
| Partitions | Partially supported | Supports one partition |
39+
| Hierarchies | Not supported | |
40+
| Full export | Not supported | |
41+
| DeleteAddAsReplace | Not supported | |
42+
| ExportPasswordInFirstPass | Not supported | |
43+
| Normalizations | Not supported | |
44+
| Concurrent operations | Not supported | |
45+
46+
47+
## Next steps
48+
49+
- [App provisioning](user-provisioning.md)
50+
- [ECMA Connector Host generic SQL connector](tutorial-ecma-sql-connector.md)
51+
- [ECMA Connector Host LDAP connector](on-premises-ldap-connector-configure.md)
52+
53+

articles/active-directory/app-provisioning/on-premises-ldap-connector-prepare-directory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Now that we have configured the certificate and granted the network service acco
8080
- Place a check in the SSL box
8181
[![Screenshot that shows the Ldp tool connection configuration.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-2.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-2.png#lightbox)</br>
8282
5. You should see a response similar to the screenshot below.
83-
[![Screenshot taht shows the Ldp tool connection configuration success.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-3.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-3.png#lightbox)</br>
83+
[![Screenshot that shows the Ldp tool connection configuration success.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-3.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-3.png#lightbox)</br>
8484
6. At the top, under **Connection** select **Bind**.
8585
7. Leave the defaults and click **OK**.
8686
[![Screenshot that shows the Ldp tool bind operation.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-4.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-4.png#lightbox)</br>
@@ -137,7 +137,7 @@ New-SelfSignedCertificate -DnsName $DNSName -CertStoreLocation $CertLocation
137137
#Create directory
138138
New-Item -Path $logpath -Name $dirname -ItemType $dirtype
139139
140-
#Export the certifcate from the local machine personal store
140+
#Export the certificate from the local machine personal store
141141
Get-ChildItem -Path cert:\LocalMachine\my | Export-Certificate -FilePath c:\test\allcerts.sst -Type SST
142142
143143
#Import the certificate in to the trusted root

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Once the agent is installed, no further configuration is necessary on-premises,
5757
6. In the **Tenant URL** field, provide the SCIM endpoint URL for your application. The URL is typically unique to each target application and must be resolvable by DNS. An example for a scenario where the agent is installed on the same host as the application is https://localhost:8585/scim ![Screenshot that shows assigning an agent.](./media/on-premises-scim-provisioning/scim-2.png)
5858
7. Select **Test Connection**, and save the credentials. The application SCIM endpoint must be actively listening for inbound provisioning requests, otherwise the test will fail. Use the steps [here](on-premises-ecma-troubleshoot.md#troubleshoot-test-connection-issues) if you run into connectivity issues.
5959
>[!NOTE]
60-
> If the test connection fails, you will see the request made. Please note that while the URL in the test connection error message is truncated, the actual request sent to the aplication contains the entire URL provided above.
60+
> If the test connection fails, you will see the request made. Please note that while the URL in the test connection error message is truncated, the actual request sent to the application contains the entire URL provided above.
6161
6262
8. Configure any [attribute mappings](customize-application-attributes.md) or [scoping](define-conditional-rules-for-provisioning-user-accounts.md) rules required for your application.
6363
9. Add users to scope by [assigning users and groups](../../active-directory/manage-apps/add-application-portal-assign-users.md) to the application.

articles/active-directory/app-provisioning/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,8 @@ items:
3333
href: on-premises-powershell-connector.md
3434
- name: Provisioning with the web services connector
3535
href: on-premises-web-services-connector.md
36+
- name: Provisioning with custom connectors
37+
href: on-premises-custom-connector.md
3638
- name: Customize attribute mappings
3739
href: customize-application-attributes.md
3840
- name: Concepts

articles/active-directory/app-proxy/application-proxy-deployment-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -292,7 +292,7 @@ These logs provide detailed information about logins to applications configured
292292

293293
#### Application Proxy Connector monitoring
294294

295-
The connectors and the service take care of all the high availability tasks. You can monitor the status of your connectors from the Application Proxy page in the Azure portal. For more information about connector maintainence see [Understand Azure AD Application Proxy Connectors](./application-proxy-connectors.md#maintenance).
295+
The connectors and the service take care of all the high availability tasks. You can monitor the status of your connectors from the Application Proxy page in the Azure portal. For more information about connector maintenance see [Understand Azure AD Application Proxy Connectors](./application-proxy-connectors.md#maintenance).
296296

297297
![Example: Azure AD Application Proxy connectors](./media/application-proxy-connectors/app-proxy-connectors.png)
298298

articles/active-directory/authentication/concept-authentication-web-browser-cookies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Persistent session tokens are stored as persistent cookies on the web browser's
3030
| ESTSAUTHLIGHT | Common | Contains Session GUID Information. Lite session state cookie used exclusively by client-side JavaScript in order to facilitate OIDC sign-out. Security feature. |
3131
| SignInStateCookie | Common | Contains list of services accessed to facilitate sign-out. No user information. Security feature. |
3232
| CCState | Common | Contains session information state to be used between Azure AD and the [Azure AD Backup Authentication Service](../conditional-access/resilience-defaults.md). |
33-
| buid | Common | Tracks browser related information. Used for service telemetry and protection mechanisms. |
33+
| build | Common | Tracks browser related information. Used for service telemetry and protection mechanisms. |
3434
| fpc | Common | Tracks browser related information. Used for tracking requests and throttling. |
3535
| esctx | Common | Session context cookie information. For CSRF protection. Binds a request to a specific browser instance so the request can't be replayed outside the browser. No user information. |
3636
| ch | Common | ProofOfPossessionCookie. Stores the Proof of Possession cookie hash to the user agent. |

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ For step-by-step directions on this process, see [Configure the AD FS servers](/
166166

167167
Once you've configured the servers, you can add Azure AD MFA as an additional authentication method.
168168

169-
![Screen shot showing the Edit authentication methods screen with Azure AD MFA and Azure Mutli-factor authentication Server selected](./media/how-to-migrate-mfa-server-to-mfa-user-authentication/edit-authentication-methods.png)
169+
![Screen shot showing the Edit authentication methods screen with Azure AD MFA and Azure Multi-factor authentication Server selected](./media/how-to-migrate-mfa-server-to-mfa-user-authentication/edit-authentication-methods.png)
170170

171171
## Prepare Azure AD and implement migration
172172

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ To support this hybrid authentication approach, you synchronize your on-premises
112112

113113
In both configuration options, the user submits their username and password to Azure AD, which validates the credentials and issues a ticket. When users sign in to Azure AD, it removes the need for your organization to host and manage an AD FS infrastructure.
114114

115-
One of the user attributes that's automatically synchronized by Azure AD Connect is *ProxyAddresses*. If users have an email address defined in the on-premesis AD DS environment as part of the *ProxyAddresses* attribute, it's automatically synchronized to Azure AD. This email address can then be used directly in the Azure AD sign-in process as an alternate login ID.
115+
One of the user attributes that's automatically synchronized by Azure AD Connect is *ProxyAddresses*. If users have an email address defined in the on-premises AD DS environment as part of the *ProxyAddresses* attribute, it's automatically synchronized to Azure AD. This email address can then be used directly in the Azure AD sign-in process as an alternate login ID.
116116

117117
> [!IMPORTANT]
118118
> Only emails in verified domains for the tenant are synchronized to Azure AD. Each Azure AD tenant has one or more verified domains, for which you have proven ownership, and are uniquely bound to your tenant.

0 commit comments

Comments
 (0)