Skip to content

Commit abfcbe3

Browse files
authored
Merge pull request #193369 from MicrosoftDocs/main
Merge Main to Live, 4 AM
2 parents ffe15b3 + 3905920 commit abfcbe3

File tree

119 files changed

+2020
-1020
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

119 files changed

+2020
-1020
lines changed

articles/active-directory/develop/sample-v2-code.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,20 +9,20 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: sample
1111
ms.workload: identity
12-
ms.date: 08/27/2021
12+
ms.date: 03/29/2022
1313
ms.author: marsma
1414
ms.reviewer: jmprieur
1515
ms.custom: aaddev, identityplatformtop40
1616
---
1717

1818
# Microsoft identity platform code samples
1919

20-
These code samples, built and maintained by Microsoft, demonstrate authentication and authorization by using Azure AD and the Microsoft identity platform in several [application types](v2-app-types.md), development languages, and frameworks.
20+
These code samples are built and maintained by Microsoft to demonstrate usage of our authentication libraries with the Microsoft identity platform. Common authentication and authorization scenarios are implemented in several [application types](v2-app-types.md), development languages, and frameworks.
2121

2222
- Sign in users to web applications and provide authorized access to protected web APIs.
2323
- Protect a web API by requiring an access token to perform API operations.
2424

25-
Each code sample includes a _README.md_ file that describes how to build the project (if applicable) and run the sample application. Comments in the code help you understand critical sections that implementing authentication and authorization using authentication libraries and the identity platform.
25+
Each code sample includes a _README.md_ file describing how to build the project (if applicable) and run the sample application. Comments in the code help you understand how these libraries are used in the application to perform authentication and authorization by using the identity platform.
2626

2727
## Single-page applications
2828

articles/active-directory/develop/v2-admin-consent.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,21 +9,21 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 12/18/2020
12+
ms.date: 3/29/2022
1313
ms.author: ryanwi
1414
ms.reviewer: ludwignick
1515
ms.custom: aaddev
1616
---
1717

1818
# Admin consent on the Microsoft identity platform
1919

20-
Some permissions require consent from an administrator before they can be granted within a tenant. You can also use the admin consent endpoint to grant permissions to an entire tenant.
20+
Some permissions require consent from an administrator before they can be granted within a tenant. You can also use the admin consent endpoint to grant permissions to an entire tenant.
2121

2222
## Recommended: Sign the user into your app
2323

2424
Typically, when you build an application that uses the admin consent endpoint, the app needs a page or view in which the admin can approve the app's permissions. This page can be part of the app's sign-up flow, part of the app's settings, or it can be a dedicated "connect" flow. In many cases, it makes sense for the app to show this "connect" view only after a user has signed in with a work or school Microsoft account.
2525

26-
When you sign the user into your app, you can identify the organization to which the admin belongs before asking them to approve the necessary permissions. Although not strictly necessary, it can help you create a more intuitive experience for your organizational users. To sign the user in, follow the [Microsoft identity platform protocol tutorials](active-directory-v2-protocols.md).
26+
When you sign the user into your app, you can identify the organization to which the admin belongs before asking them to approve the necessary permissions. Although not strictly necessary, it can help you create a more intuitive experience for your organizational users.
2727

2828
## Request the permissions from a directory admin
2929

articles/active-directory/external-identities/direct-federation.md

Lines changed: 12 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: how-to
9-
ms.date: 02/18/2022
9+
ms.date: 03/29/2022
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -18,13 +18,16 @@ ms.collection: M365-identity-device-management
1818
# Federation with SAML/WS-Fed identity providers for guest users (preview)
1919

2020
> [!NOTE]
21+
>
2122
>- *Direct federation* in Azure Active Directory is now referred to as *SAML/WS-Fed identity provider (IdP) federation*.
2223
>- SAML/WS-Fed IdP federation is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2324
2425
This article describes how to set up federation with any organization whose identity provider (IdP) supports the SAML 2.0 or WS-Fed protocol. When you set up federation with a partner's IdP, new guest users from that domain can use their own IdP-managed organizational account to sign in to your Azure AD tenant and start collaborating with you. There's no need for the guest user to create a separate Azure AD account.
2526

2627
> [!IMPORTANT]
27-
> - In the SAML request sent by Azure AD for external federations, the Issuer URL is a tenanted endpoint. For any new federations, we recommend that all our partners set the audience of the SAML or WS-Fed based IdP to a tenanted endpoint. Refer to the [SAML 2.0](#required-saml-20-attributes-and-claims) and [WS-Fed](#required-ws-fed-attributes-and-claims) required attributes and claims sections below. Any existing federations configured with the global endpoint will continue to work, but new federations will stop working if your external IdP is expecting a global issuer URL in the SAML request.
28+
>
29+
>- We no longer support an allowlist of IdPs for new SAML/WS-Fed IdP federations. When you're setting up a new external federation, refer to [Step 1: Determine if the partner needs to update their DNS text records](#step-1-determine-if-the-partner-needs-to-update-their-dns-text-records).
30+
>- In the SAML request sent by Azure AD for external federations, the Issuer URL is a tenanted endpoint. For any new federations, we recommend that all our partners set the audience of the SAML or WS-Fed based IdP to a tenanted endpoint. Refer to the [SAML 2.0](#required-saml-20-attributes-and-claims) and [WS-Fed](#required-ws-fed-attributes-and-claims) required attributes and claims sections below. Any existing federations configured with the global endpoint will continue to work, but new federations will stop working if your external IdP is expecting a global issuer URL in the SAML request.
2831
> - We've removed the limitation that required the authentication URL domain to match the target domain or be from an allowed IdP. For details, see [Step 1: Determine if the partner needs to update their DNS text records](#step-1-determine-if-the-partner-needs-to-update-their-dns-text-records).
2932
3033
## When is a guest user authenticated with SAML/WS-Fed IdP federation?
@@ -39,7 +42,7 @@ In any of these scenarios, you can update a guest user’s authentication method
3942

4043
SAML/WS-Fed IdP federation is tied to domain namespaces, such as contoso.com and fabrikam.com. When establishing federation with AD FS or a third-party IdP, organizations associate one or more domain namespaces to these IdPs.
4144

42-
## End-user experience
45+
## End-user experience
4346

4447
With SAML/WS-Fed IdP federation, guest users sign into your Azure AD tenant using their own organizational account. When they are accessing shared resources and are prompted for sign-in, users are redirected to their IdP. After successful sign-in, users are returned to Azure AD to access resources. Their refresh tokens are valid for 12 hours, the [default length for passthrough refresh token](../develop/active-directory-configurable-token-lifetimes.md#configurable-token-lifetime-properties) in Azure AD. If the federated IdP has SSO enabled, the user will experience SSO and will not see any sign-in prompt after initial authentication.
4548

@@ -88,26 +91,15 @@ Currently, the Azure AD SAML/WS-Fed federation feature doesn't support sending a
8891

8992
Depending on the partner's IdP, the partner might need to update their DNS records to enable federation with you. Use the following steps to determine if DNS updates are needed.
9093

91-
1. If the partner's IdP is one of these allowed IdPs, no DNS changes are needed (this list is subject to change):
92-
93-
- accounts.google.com
94-
- pingidentity.com
95-
- login.pingone.com
96-
- okta.com
97-
- oktapreview.com
98-
- okta-emea.com
99-
- my.salesforce.com
100-
- federation.exostar.com
101-
- federation.exostartest.com
102-
- idaptive.app
103-
- idaptive.qa
94+
> [!NOTE]
95+
> We no longer support an allowlist of IdPs for new SAML/WS-Fed IdP federations.
10496
105-
2. If the IdP is not one of the allowed providers listed in the previous step, check the partner's IdP passive authentication URL to see if the domain matches the target domain or a host within the target domain. In other words, when setting up federation for `fabrikam.com`:
97+
1. Check the partner's IdP passive authentication URL to see if the domain matches the target domain or a host within the target domain. In other words, when setting up federation for `fabrikam.com`:
10698

107-
- If the authentication URL is `https://fabrikam.com` or `https://sts.fabrikam.com/adfs` (a host in the same domain), no DNS changes are needed.
108-
- If the authentication URL is `https://fabrikamconglomerate.com/adfs` or `https://fabrikam.com.uk/adfs`, the domain doesn't match the fabrikam.com domain, so the partner will need to add a text record for the authentication URL to their DNS configuration.
99+
- If the passive authentication endpoint is `https://fabrikam.com` or `https://sts.fabrikam.com/adfs` (a host in the same domain), no DNS changes are needed.
100+
- If the passive authentication endpoint is `https://fabrikamconglomerate.com/adfs` or `https://fabrikam.com.uk/adfs`, the domain doesn't match the fabrikam.com domain, so the partner will need to add a text record for the authentication URL to their DNS configuration.
109101

110-
3. If DNS changes are needed based on the previous step, ask the partner to add a TXT record to their domain's DNS records, like the following example:
102+
1. If DNS changes are needed based on the previous step, ask the partner to add a TXT record to their domain's DNS records, like the following example:
111103

112104
`fabrikam.com.  IN   TXT   DirectFedAuthUrl=https://fabrikamconglomerate.com/adfs`
113105

articles/active-directory/hybrid/how-to-connect-pta-faq.yml

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,21 @@ sections:
6262
What versions of Azure AD Connect and Pass-through Authentication Agent do you need?
6363
answer: |
6464
For this feature to work, you need version 1.1.750.0 or later for Azure AD Connect and 1.5.193.0 or later for the Pass-through Authentication Agent. Install all the software on servers with Windows Server 2012 R2 or later.
65+
66+
- question: |
67+
Why is my connector still using an older version and not auto-upgraded to latest version?
68+
answer: |
69+
This may be due to either the updater service not working correctly or if there are no new updates available that the service can install.
70+
The updater service is healthy if it’s running and there are no errors recorded in the event log (Applications and Services logs -> Microsoft -> AzureADConnect-Agent -> Updater -> Admin).
71+
72+
73+
Only major versions are released for auto-upgrade. We recommend updating your Agent manually only if it's necessary. For example, you cannot wait for a major release, because you must fix a known problem or you want to use a new feature. For more information on new releases, the type of the release (download, auto-upgrade), bug fixes and new features see, [Azure AD Pass-through Authentication agent: Version release history](./reference-connect-pta-version-history.md).
74+
75+
To manually upgrade a connector:
76+
77+
- Download the latest version of the Agent. (You will find it under Azure AD connect Pass-through Authentication on the Azure portal. You can also find the link at Azure AD Pass-through Authentication: Version release history | Microsoft Docs..
78+
- The installer restarts the Microsoft Azure AD Connect Authentication Agent services. In some cases, a reboot of the server might be required if the installer cannot replace all files. Therefore we recommend closing all applications (i.e. Event Viewer) before you start the upgrade.
79+
- Run the installer. The upgrade process is quick and does not require providing any credentials and the Agent will not be re-registered.
6580
6681
- question: |
6782
What happens if my user's password has expired and they try to sign in by using Pass-through Authentication?

0 commit comments

Comments
 (0)