Skip to content

Commit ac6e0b6

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-bug-note
2 parents 0366826 + 4f9a2b0 commit ac6e0b6

File tree

148 files changed

+2286
-955
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

148 files changed

+2286
-955
lines changed

articles/active-directory/app-proxy/application-proxy-configure-complex-application.md

Lines changed: 43 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -22,11 +22,11 @@ When applications are made up of multiple individual web application using diffe
2222

2323
The following figure shows an example for complex application domain structure.
2424

25-
![Diagram of domain structure for a complex application showing resource sharing between primary and secondary application.](./media/application-proxy-configure-complex-application/complex-app-structure.png)
25+
:::image type="content" source="./media/application-proxy-configure-complex-application/complex-app-structure-1.png" alt-text="Diagram of domain structure for a complex application showing resource sharing between primary and secondary application.":::
2626

2727
With [Azure AD Application Proxy](application-proxy.md), you can address this issue by using complex application publishing that is made up of multiple URLs across various domains.
2828

29-
![Diagram of a Complex application with multiple application segments definition.](./media/application-proxy-configure-complex-application/complex-app-flow.png)
29+
:::image type="content" source="./media/application-proxy-configure-complex-application/complex-app-flow-1.png" alt-text="Diagram of a Complex application with multiple application segments definition.":::
3030

3131
A complex app has multiple app segments, with each app segment being a pair of an internal & external URL.
3232
There is one conditional access policy associated with the app and access to any of the external URLs work with pre-authentication with the same set of policies that are enforced for all.
@@ -42,7 +42,7 @@ This article provides you with the information you need to configure wildcard ap
4242
## Characteristics of application segment(s) for complex application.
4343
1. Application segments can be configured only for a wildcard application.
4444
2. External and alternate URL should match the wildcard external and alternate URL domain of the application respectively.
45-
3. Application segment URL’s (internal and external) need to maintain uniqueness across complex applications.
45+
3. Application segment URLs (internal and external) need to maintain uniqueness across complex applications.
4646
4. CORS Rules (optional) can be configured per application segment.
4747
5. Access will only be granted to defined application segments for a complex application.
4848
- Note - If all application segments are deleted, a complex application will behave as a wildcard application opening access to all valid URL by specified domain.
@@ -56,61 +56,48 @@ Before you get started with Application Proxy Complex application scenario apps,
5656

5757
## Configure application segment(s) for complex application.
5858

59-
To configure (and update) Application Segments for a complex app using the API, you first [create a wildcard application](application-proxy-wildcard.md#create-a-wildcard-application), and then update the application's onPremisesPublishing property to configure the application segments and respective CORS settings.
60-
6159
> [!NOTE]
62-
> 2 application segment per complex application are supported for [Microsoft Azure AD premium subscription](https://azure.microsoft.com/pricing/details/active-directory). Licence requirement for more than 2 application segments per complex application to be announced soon.
63-
64-
If successful, this method returns a `204 No Content` response code and does not return anything in the response body.
65-
## Example
66-
67-
##### Request
68-
Here is an example of the request.
69-
70-
```http
71-
PATCH https://graph.microsoft.com/beta/applications/{<object-id-of--the-complex-app-under-APP-Registrations}
72-
Content-type: application/json
73-
74-
{
75-
"onPremisesPublishing": {
76-
"onPremisesApplicationSegments": [
77-
{
78-
"externalUrl": "https://home.contoso.net/",
79-
"internalUrl": "https://home.test.com/",
80-
"alternateUrl": "",
81-
"corsConfigurations": []
82-
},
83-
{
84-
"externalUrl": "https://assets.constoso.net/",
85-
"internalUrl": "https://assets.test.com",
86-
"alternateUrl": "",
87-
"corsConfigurations": [
88-
{
89-
"resource": "/",
90-
"allowedOrigins": [
91-
"https://home.contoso.net/"
92-
],
93-
"allowedHeaders": [
94-
"*"
95-
],
96-
"allowedMethods": [
97-
"*"
98-
],
99-
"maxAgeInSeconds": 0
100-
}
101-
]
102-
}
103-
]
104-
}
105-
}
106-
107-
```
108-
##### Response
109-
110-
```http
111-
HTTP/1.1 204 No Content
112-
```
60+
> Two application segment per complex distributed application are supported for [Microsoft Azure AD premium subscription](https://azure.microsoft.com/pricing/details/active-directory). License requirement for more than two application segments per complex application to be announced soon.
61+
62+
To publish complex distributed app through Application Proxy with application segments:
63+
64+
1. [Create a wildcard application.](application-proxy-wildcard.md#create-a-wildcard-application)
65+
66+
1. On the Application Proxy Basic settings page, select "Add application segments".
67+
68+
:::image type="content" source="./media/application-proxy-configure-complex-application/add-application-segments.png" alt-text="Screenshot of link to add an application segment.":::
69+
70+
3. On the Manage and configure application segments page, select "+ Add app segment"
71+
72+
:::image type="content" source="./media/application-proxy-configure-complex-application/add-application-segment-1.png" alt-text="Screenshot pf Manage and configure application segment blade.":::
73+
74+
4. In the Internal Url field, enter the internal URL for your app.
75+
76+
5. In the External Url field, drop down the list and select the custom domain you want to use.
77+
78+
6. Add CORS Rules (optional). For more information see [Configuring CORS Rule](https://learn.microsoft.com/graph/api/resources/corsconfiguration_v2?view=graph-rest-beta)
79+
80+
7. Select Create.
81+
82+
:::image type="content" source="./media/application-proxy-configure-complex-application/create-app-segment.png" alt-text="Screenshot of add or edit application segment context plane.":::
83+
84+
Your application is now set up to use the configured application segments. Be sure to assign users to your application before you test or release it.
85+
86+
To edit/update an application segment, select respective application segment from the list in Manage and configure application segments page. Upload a certificate for the updated domain, if necessary, and update the DNS record.
87+
88+
## DNS updates
89+
90+
When using custom domains, you need to create a DNS entry with a CNAME record for the external URL (for example, `*.adventure-works.com`) pointing to the external URL of the application proxy endpoint. For wildcard applications, the CNAME record needs to point to the relevant external URL:
91+
92+
> `<yourAADTenantId>.tenant.runtime.msappproxy.net`
93+
94+
Alternatively, a DNS entry with a CNAME record for every individual application segment can be created as follows:
95+
96+
> `'External URL of application segment'` > `'<External URL without domain>-<tenantname>.msapproxy.net'` <br>
97+
for example in above instance >`'home.contoso.ashcorp.us'` points to > `home-ashcorp1.msappproxy.net`
98+
11399

100+
For more detailed instructions for Application Proxy, see [Tutorial: Add an on-premises application for remote access through Application Proxy in Azure Active Directory](../app-proxy/application-proxy-add-on-premises-application.md).
114101

115102
## See also
116103
- [Tutorial: Add an on-premises application for remote access through Application Proxy in Azure Active Directory](../app-proxy/application-proxy-add-on-premises-application.md)
Loading
Loading
48.3 KB
Loading
Loading
64.4 KB
Loading

articles/active-directory/app-proxy/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,8 @@
9595
href: application-proxy-configure-cookie-settings.md
9696
- name: Publish using wildcards
9797
href: application-proxy-wildcard.md
98+
- name: Publish complex distributed application using application segments
99+
href: application-proxy-configure-complex-application.md
98100
- name: Configure custom domain
99101
href: application-proxy-configure-custom-domain.md
100102
- name: Translate inline links
Loading

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: jfields
1717
This article describes how to onboard an Amazon Web Services (AWS) account on Permissions Management.
1818

1919
> [!NOTE]
20-
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20+
> A *global administrator* or *root user* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2121
2222
## Explanation
2323

articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,10 @@ Use the **Activity triggers** dashboard to view information and set alerts and t
216216
- See data for **identity governance** to ensure inactive users are decommissioned because they left the company or to remove vendor accounts that have been left behind, old consultant accounts, or users who as parts of the Joiner/Mover/Leaver process have moved onto another role and are no longer using their access. Consider this a fail-safe to ensure dormant accounts are removed.
217217
- Identify over-permissioned access to later use the Remediation to pursue **Zero Trust and least privileges.**
218218

219-
**Example of** [**Permissions Management Report**](https://microsoft.sharepoint.com/:v:/t/MicrosoftEntraPermissionsManagementAssets/EQWmUsMsdkZEnFVv-M9ZoagBd4B6JUQ2o7zRTupYrfxbGA)
219+
**Example of Permissions Management Analytics Report**
220+
221+
> [!div class="mx-imgBorder"]
222+
> :::image type="content" source="media/permissions-management-trial-user-guide/permissions-management-report-example.png" alt-text="Example of Permissions Management Analytics Report." lightbox="media/permissions-management-trial-user-guide/permissions-management-report-example.png":::
220223
221224
**Actions to try**
222225
- [View system reports in the Reports dashboard](../cloud-infrastructure-entitlement-management/product-reports.md)

0 commit comments

Comments
 (0)