You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/page-layout.md
+35Lines changed: 35 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,6 +59,35 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
59
59
60
60
## Self-asserted page (selfasserted)
61
61
62
+
**2.1.20**
63
+
- Fixed an XSS issue on input from textbox
64
+
65
+
**2.1.19**
66
+
- Fixed accessibility bugs
67
+
- Handle Undefined Error message for existing user sign up
68
+
- Move Password Mismatch Error to Inline instead of Page Level
69
+
- Accessibility changes related to High Contrast button display and anchor focus improvements
70
+
71
+
**2.1.18**
72
+
- Add asterisk for required fields
73
+
- TOTP Store Icons position fixes for Classic Template
74
+
- Activate input items only when verification code is verified
75
+
- Add Alt Text for Background Image
76
+
- Added customization for server errors by TOTP verification
77
+
78
+
**2.1.17**
79
+
- Add descriptive error message and fixed forgotPassword link
80
+
- Make checkbox as group
81
+
- Enforce Validation Error Update on control change and enable continue on email verified
82
+
- Added additional field to error code to validation failure response
83
+
84
+
**2.1.16**
85
+
- Fixed "Claims for verification control have not been verified" bug while verifying code.
86
+
- Hide error message on validation succeeds and send code to verify
87
+
88
+
**2.1.15**
89
+
- Fixed QR code generation bug due to QR text length
90
+
62
91
**2.1.14**
63
92
- Fixed WCAG 2.1 accessibility bug for the TOTP multifactor authentication screens.
64
93
@@ -158,6 +187,12 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
158
187
> [!TIP]
159
188
> If you localize your page to support multiple locales, or languages in a user flow. The [localization IDs](localization-string-ids.md) article provides the list of localization IDs that you can use for the page version you select.
160
189
190
+
**2.1.9**
191
+
- Fix accessibility bugs
192
+
- Accessibility changes related to High Contrast button display and anchor focus improvements
193
+
194
+
**2.1.8**
195
+
- Add descriptive error message and fixed forgotPassword link!
Copy file name to clipboardExpand all lines: articles/active-directory/devices/troubleshoot-mac-sso-extension-plugin.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,8 +93,8 @@ Work with your MDM administrator (or Device Management team) to ensure that the
93
93
94
94
The following table provides specific MDM installation guidance depending on which OS you're deploying the extension to:
95
95
96
-
-[**iOS/iPadOS**: Deploy the Microsoft Enterprise SSO plug-in](/mem/intune/configuration/use-enterprise-sso-plug-in-macos-with-intune)
97
-
-[**macOS**: Deploy the Microsoft Enterprise SSO plug-in](/mem/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-with-intune)
96
+
-[**iOS/iPadOS**: Deploy the Microsoft Enterprise SSO plug-in](/mem/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-with-intune)
97
+
-[**macOS**: Deploy the Microsoft Enterprise SSO plug-in](/mem/intune/configuration/use-enterprise-sso-plug-in-macos-with-intune)
98
98
99
99
> [!IMPORTANT]
100
100
> Although, any MDM is supported for deploying the SSO Extension, many organizations implement [**device-based conditional access polices**](../conditional-access/concept-conditional-access-grant.md#require-device-to-be-marked-as-compliant) by way of evaluating MDM compliance policies. If a third-party MDM is being used, ensure that the MDM vendor supports [**Intune Partner Compliance**](/mem/intune/protect/device-compliance-partners) if you would like to use device-based Conditional Access policies. When the SSO Extension is deployed via Intune or an MDM provider that supports Intune Partner Compliance, the extension can pass the device certificate to Azure AD so that device authentication can be completed.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-pta-quick-start.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,7 +99,7 @@ If you have already installed Azure AD Connect by using the [express installatio
99
99
100
100
Follow these instructions to verify that you have enabled Pass-through Authentication correctly:
101
101
102
-
1. Sign in to the [Azure Active Directory admin center](https://aad.portal.azure.com) with the Hybrid Identity Administratoristrator credentials for your tenant.
102
+
1. Sign in to the [Azure Active Directory admin center](https://aad.portal.azure.com) with the Hybrid Identity Administrator credentials for your tenant.
103
103
2. Select **Azure Active Directory** in the left pane.
104
104
3. Select **Azure AD Connect**.
105
105
4. Verify that the **Pass-through authentication** feature appears as **Enabled**.
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
82
-
83
-
In the **Sign-on URL** text box, type a URL using the following pattern:
84
-
`https://<SUBDOMAIN>.alertops.com/login.aspx`
81
+
1. In the **Logout Url (Optional)** text box, type a URL using the following pattern:
82
+
`https://app.alertops.com/<SUBDOMAIN>`
85
83
86
84
> [!NOTE]
87
-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [AlertOps Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
85
+
> These values are not real. Update these values with the actual Identifier, Reply URL and Logout Url. Contact [AlertOps Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
88
86
89
87
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
90
88
@@ -130,33 +128,35 @@ In this section, you'll enable Britta Simon to use Azure single sign-on by grant
130
128
131
129
3. If you want to setup AlertOps manually, open a new web browser window and sign into your AlertOps company site as an administrator and perform the following steps:
132
130
133
-
4. Click on the **Account settings** from the left navigation panel.
131
+
4. Click on the **Account settings** from the user profile.
134
132
135
133

136
134
137
-
5. On the **Subscription Settings** page select**SSO** and perform the following steps:
135
+
5. On the **Account Settings** page, click**Update SSO** and select **Use single sign-on (SSO)**
138
136
139
-

137
+

140
138
141
-
a. Select**Use Single Sign-On(SSO)**checkbox.
139
+
1. In**SSO**section, perform the following steps:
142
140
143
-
b. Select **Azure Active Directory** as an **SSO Provider** from the dropdown.
141
+

144
142
145
-
c. In the **Issuer URL** textbox, use the identifier value, which you have used in the **Basic SAML Configuration** section in the Azure portal.
143
+
a. In the **Issuer URL** textbox, use the identifier value, which you have used in the **Basic SAML Configuration** section in the Azure portal.
146
144
147
-
d. In the **SAML endpoint URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
145
+
b. In the **SAML endpoint URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
148
146
149
-
e. In the **SLO endpoint URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
147
+
c. In the **SLO endpoint URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
150
148
151
-
f. Select **SHA256** as a **SAML Signature Algorithm** from the dropdown.
149
+
d. Select **SHA256** as a **SAML Signature Algorithm** from the dropdown.
152
150
153
-
g. Open your downloaded Certificate(Base64) file in Notepad. Copy the content of it into your clipboard, and then paste it to the X.509 Certificate text box.
151
+
e. Open your downloaded **Certificate(Base64)** file in Notepad. Copy the content of it into your clipboard, and then paste it to the **X.509 Certificate** text box.
152
+
153
+
f. Enable **Allow username/password login**.
154
154
155
155
### Create AlertOps test user
156
156
157
157
1. In a different browser window, sign in to your AlertOps company site as administrator.
158
158
159
-
2. Click on the **Users**from the left navigation panel.
159
+
2. Click on the **Configuration**and then **Users** from navigation panel.
160
160
161
161

162
162
@@ -168,19 +168,17 @@ In this section, you'll enable Britta Simon to use Azure single sign-on by grant
168
168
169
169

170
170
171
-
a. In the **Login User Name** textbox, enter the user name of the user like **Brittasimon**.
172
-
173
-
b. In the **Official Email** textbox, enter the email address of the user like **Brittasimon\@contoso.com**.
171
+
a. In the **User Name** textbox, enter the user name of the user like **Brittasimon**.
174
172
175
-
c. In the **First Name** textbox, enter the first name of user like **Britta**.
173
+
b. In the **First Name** textbox, enter the first name of user like **Britta**.
176
174
177
-
d. In the **Last Name** textbox, enter the first name of user like **Simon**.
175
+
c. In the **Last Name** textbox, enter the first name of user like **Simon**.
178
176
179
-
e. Select the **Type**value from the dropdown as per your organization.
177
+
d. In the **Email**textbox, enter the email address of the user like `[email protected]`.
180
178
181
-
f. Select the **Role** of the user from the dropdown as per your organization.
179
+
f. Select the **User Role** of the user from the dropdown as per your organization.
0 commit comments