Skip to content

Commit ae245e4

Browse files
authored
Merge pull request #193567 from MicrosoftDocs/main
3/31 AM Publish
2 parents a788191 + 513517c commit ae245e4

File tree

224 files changed

+1220
-278
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

224 files changed

+1220
-278
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10779,6 +10779,11 @@
1077910779
"source_path": "articles/active-directory/manage-apps/get-it-now-azure-marketplace.md",
1078010780
"redirect_url": "/azure/active-directory/manage-apps/add-application-portal",
1078110781
"redirect_document_id": false
10782+
},
10783+
{
10784+
"source_path": "articles/active-directory/manage-apps/manage-certificates-for-federated-single-sign-on.md",
10785+
"redirect_url": "/azure/active-directory/manage-apps/tutorial-manage-certificates-for-federated-single-sign-on",
10786+
"redirect_document_id": false
1078210787
}
1078310788

1078410789
]

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27798,6 +27798,11 @@
2779827798
"redirect_url": "/azure/storsimple/storsimple-virtual-array-update-06-release-notes",
2779927799
"redirect_document_id": false
2780027800
},
27801+
{
27802+
"source_path_from_root": "/articles/private-5g-core/activate-sims.md",
27803+
"redirect_url": "/azure/private-5g-core/provision-sims-azure-portal",
27804+
"redirect_document_id": false
27805+
},
2780127806
{
2780227807
"source_path_from_root": "/articles/azure-resource-manager/resource-manager-template-lock.md",
2780327808
"redirect_url": "/azure/templates/microsoft.authorization/locks",

articles/active-directory/hybrid/tshoot-connect-connectivity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This article explains how connectivity between Azure AD Connect and Azure AD wor
2626
Azure AD Connect uses the MSAL library for authentication. The installation wizard and the sync engine proper require machine.config to be properly configured since these two are .NET applications.
2727

2828
>[!NOTE]
29-
>Azure AD Connect v1.6.xx.x uses the ADAL library. The ADAL library is being depricated and support will end in June 2022. Microsot recommendeds that you upgrade to the latest version of [Azure AD Connect v2](whatis-azure-ad-connect-v2.md).
29+
>Azure AD Connect v1.6.xx.x uses the ADAL library. The ADAL library is being depricated and support will end in June 2022. Microsoft recommends that you upgrade to the latest version of [Azure AD Connect v2](whatis-azure-ad-connect-v2.md).
3030
3131
In this article, we show how Fabrikam connects to Azure AD through its proxy. The proxy server is named fabrikamproxy and is using port 8080.
3232

articles/active-directory/manage-apps/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@
2626
href: tutorial-manage-access-security.md
2727
- name: Govern and monitor
2828
href: tutorial-govern-monitor.md
29+
- name: Manage certificates
30+
href: tutorial-manage-certificates-for-federated-single-sign-on.md
2931
- name: Samples
3032
items:
3133
- name: Overview of App Management samples
@@ -53,8 +55,6 @@
5355
href: what-is-access-management.md
5456
- name: Certificate signing options
5557
href: certificate-signing-options.md
56-
- name: Manage certificates
57-
href: manage-certificates-for-federated-single-sign-on.md
5858
- name: Tenant restrictions
5959
href: tenant-restrictions.md
6060
- name: Configure SAML token encryption

articles/active-directory/manage-apps/manage-certificates-for-federated-single-sign-on.md renamed to articles/active-directory/manage-apps/tutorial-manage-certificates-for-federated-single-sign-on.md

Lines changed: 23 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,39 +1,39 @@
11
---
2-
title: Manage federation certificates
3-
description: Learn how to customize the expiration date for your federation certificates, and how to renew certificates that will soon expire.
2+
title: "Tutorial: Manage federation certificates"
3+
description: In this tutorial, you'll learn how to customize the expiration date for your federation certificates, and how to renew certificates that will soon expire.
44
titleSuffix: Azure AD
55
services: active-directory
66
author: davidmu1
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: app-mgmt
1010
ms.workload: identity
11-
ms.topic: conceptual
12-
ms.date: 04/04/2019
11+
ms.topic: tutorial
12+
ms.date: 03/31/2022
1313
ms.author: davidmu
14-
ms.reviewer: saumadan
14+
ms.reviewer: jeedes
1515
ms.collection: M365-identity-device-management
16+
17+
#customer intent: As an admin of an application, I want to learn how to manage federated SAML certificates by customizing expiration dates and renewing certificates.
1618
---
1719

18-
# Manage certificates for federated single sign-on
20+
# Tutorial: Manage certificates for federated single sign-on
1921

2022
In this article, we cover common questions and information related to certificates that Azure Active Directory (Azure AD) creates to establish federated single sign-on (SSO) to your software as a service (SaaS) applications. Add applications from the Azure AD app gallery or by using a non-gallery application template. Configure the application by using the federated SSO option.
2123

22-
This article is relevant only to apps that are configured to use Azure AD SSO through [Security Assertion Markup Language](https://wikipedia.org/wiki/Security_Assertion_Markup_Language) (SAML) federation.
24+
This tutorial is relevant only to apps that are configured to use Azure AD SSO through [Security Assertion Markup Language](https://wikipedia.org/wiki/Security_Assertion_Markup_Language) (SAML) federation.
2325

2426
## Auto-generated certificate for gallery and non-gallery applications
2527

2628
When you add a new application from the gallery and configure a SAML-based sign-on (by selecting **Single sign-on** > **SAML** from the application overview page), Azure AD generates a certificate for the application that is valid for three years. To download the active certificate as a security certificate (**.cer**) file, return to that page (**SAML-based sign-on**) and select a download link in the **SAML Signing Certificate** heading. You can choose between the raw (binary) certificate or the Base64 (base 64-encoded text) certificate. For gallery applications, this section might also show a link to download the certificate as federation metadata XML (an **.xml** file), depending on the requirement of the application.
2729

28-
![SAML active signing certificate download options](./media/manage-certificates-for-federated-single-sign-on/active-certificate-download-options.png)
29-
3030
You can also download an active or inactive certificate by selecting the **SAML Signing Certificate** heading's **Edit** icon (a pencil), which displays the **SAML Signing Certificate** page. Select the ellipsis (**...**) next to the certificate you want to download, and then choose which certificate format you want. You have the additional option to download the certificate in privacy-enhanced mail (PEM) format. This format is identical to Base64 but with a **.pem** file name extension, which isn't recognized in Windows as a certificate format.
3131

32-
![SAML signing certificate download options (active and inactive)](./media/manage-certificates-for-federated-single-sign-on/all-certificate-download-options.png)
32+
:::image type="content" source="media/manage-certificates-for-federated-single-sign-on/all-certificate-download-options.png" alt-text="SAML signing certificate download options (active and inactive).":::
3333

3434
## Customize the expiration date for your federation certificate and roll it over to a new certificate
3535

36-
By default, Azure configures a certificate to expire after three years when it is created automatically during SAML single sign-on configuration. Because you can't change the date of a certificate after you save it, you have to:
36+
By default, Azure configures a certificate to expire after three years when it's created automatically during SAML single sign-on configuration. Because you can't change the date of a certificate after you save it, you have to:
3737

3838
1. Create a new certificate with the desired date.
3939
1. Save the new certificate.
@@ -48,16 +48,18 @@ The following two sections help you perform these steps.
4848
First, create and save new certificate with a different expiration date:
4949

5050
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com/). The **Azure Active Directory admin center** page appears.
51-
1. In the left pane, select **Enterprise applications**. A list of the enterprise applications in your account appears.
52-
1. Select the affected application. An overview page for the application appears.
53-
1. In the left pane of the application overview page, select **Single sign-on**.
51+
1. Select **Enterprise applications**.
52+
1. From the list of applications, select your desired application.
53+
1. Under the **Manage** section, select **Single sign-on**.
5454
1. If the **Select a single sign-on method** page appears, select **SAML**.
55-
1. In the **Set up Single Sign-On with SAML - Preview** page, find the **SAML Signing Certificate** heading and select the **Edit** icon (a pencil). The **SAML Signing Certificate** page appears, which displays the status (**Active** or **Inactive**), expiration date, and thumbprint (a hash string) of each certificate.
55+
1. In the **Set up Single Sign-On with SAML** page, find the **SAML Signing Certificate** heading and select the **Edit** icon (a pencil). The **SAML Signing Certificate** page appears, which displays the status (**Active** or **Inactive**), expiration date, and thumbprint (a hash string) of each certificate.
5656
1. Select **New Certificate**. A new row appears below the certificate list, where the expiration date defaults to exactly three years after the current date. (Your changes haven't been saved yet, so you can still modify the expiration date.)
5757
1. In the new certificate row, hover over the expiration date column and select the **Select Date** icon (a calendar). A calendar control appears, displaying the days of a month of the new row's current expiration date.
5858
1. Use the calendar control to set a new date. You can set any date between the current date and three years after the current date.
59-
1. Select **Save**. The new certificate now appears with a status of **Inactive**, the expiration date that you chose, and a thumbprint. **Note**- When you have an existing certificate that is already expired and you generate a new certificate, the new certificate will be considered for signing tokens, even though you have not activated it yet.
60-
1. Select the **X** to return to the **Set up Single Sign-On with SAML - Preview** page.
59+
1. Select **Save**. The new certificate now appears with a status of **Inactive**, the expiration date that you chose, and a thumbprint.
60+
> [!NOTE]
61+
> When you have an existing certificate that is already expired and you generate a new certificate, the new certificate will be considered for signing tokens, even though you haven't activated it yet.
62+
1. Select the **X** to return to the **Set up Single Sign-On with SAML** page.
6163

6264
### Upload and activate a certificate
6365

@@ -73,7 +75,7 @@ Next, download the new certificate in the correct format, upload it to the appli
7375
1. When you want to roll over to the new certificate, go back to the **SAML Signing Certificate** page, and in the newly saved certificate row, select the ellipsis (**...**) and select **Make certificate active**. The status of the new certificate changes to **Active**, and the previously active certificate changes to a status of **Inactive**.
7476
1. Continue following the application's SAML sign-on configuration instructions that you displayed earlier, so that you can upload the SAML signing certificate in the correct encoding format.
7577

76-
If your application does not have any validation for the certificate's expiration, and the certificate matches in both Azure Active Directory and your application, your app is still accessible despite having an expired certificate. Please ensure your application can validate the certificate's expiration date.
78+
If your application doesn't have any validation for the certificate's expiration, and the certificate matches in both Azure Active Directory and your application, your app is still accessible despite having an expired certificate. Ensure your application can validate the certificate's expiration date.
7779

7880
## Add email notification addresses for certificate expiration
7981

@@ -85,9 +87,9 @@ Azure AD will send an email notification 60, 30, and 7 days before the SAML cert
8587
1. For each email address you want to delete, select the **Delete** icon (a garbage can) next to the email address.
8688
1. Select **Save**.
8789

88-
You can add up to 5 email addresses to the Notification list (including the email address of the admin who added the application). If you need more people to be notified, use the distribution list emails.
90+
You can add up to five email addresses to the Notification list (including the email address of the admin who added the application). If you need more people to be notified, use the distribution list emails.
8991

90-
You will receive the notification email from [email protected]. To avoid the email going to your spam location, add this email to your contacts.
92+
You'll receive the notification email from [email protected]. To avoid the email going to your spam location, add this email to your contacts.
9193

9294
## Renew a certificate that will soon expire
9395

@@ -103,7 +105,7 @@ If a certificate is about to expire, you can renew it using a procedure that res
103105
1. Before the old certificate expires, follow the instructions in the [Upload and activate a certificate](#upload-and-activate-a-certificate) section earlier. If your application certificate isn't updated after a new certificate is updated in Azure Active Directory, authentication on your app may fail.
104106
1. Sign in to the application to make sure that the certificate works correctly.
105107

106-
If your application does not validate the certificate expiration configured in Azure Active Directory, and the certificate matches in both Azure Active Directory and your application, your app is still accessible despite having an expired certificate. Please ensure your application can validate certificate expiration.
108+
If your application doesn't validate the certificate expiration configured in Azure Active Directory, and the certificate matches in both Azure Active Directory and your application, your app is still accessible despite having an expired certificate. Ensure your application can validate certificate expiration.
107109

108110
## Related articles
109111

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: Azure Active Directory recommendation - Migrate apps from ADFS to Azure AD in Azure AD | Microsoft Docs
3+
description: Learn why you should migrate apps from ADFS to Azure AD in Azure AD
4+
services: active-directory
5+
documentationcenter: ''
6+
author: MarkusVi
7+
manager: karenhoran
8+
editor: ''
9+
10+
ms.assetid: 9b88958d-94a2-4f4b-a18c-616f0617a24e
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.tgt_pltfrm: na
14+
ms.workload: identity
15+
ms.subservice: report-monitor
16+
ms.date: 03/31/2022
17+
ms.author: markvi
18+
ms.reviewer: hafowler
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Azure AD recommendation: Migrate apps from ADFS to Azure AD
24+
25+
[Azure AD recommendations](overview-recommendations.md) is a feature that provides you with personalized insights and actionable guidance to align your tenant with recommended best practices.
26+
27+
28+
This article covers the recommendation to migrate apps from ADFS to Azure AD.
29+
30+
31+
## Description
32+
33+
As an admin responsible for managing applications, I want my applications to use Azure AD’s security features and maximize their value.
34+
35+
36+
37+
38+
## Logic
39+
40+
If a tenant has apps on AD FS, and any of these apps are deemed 100% migratable, this recommendation shows up.
41+
42+
## Value
43+
44+
Using Azure AD gives you granular per-application access controls to secure access to applications. With Azure AD's B2B collaboration, you can increase user productivity. Automated app provisioning automates the user identity lifecycle in cloud SaaS apps such as Dropbox, Salesforce and more.
45+
46+
## Action plan
47+
48+
1. [Install Azure AD Connect Health](../hybrid/how-to-connect-install-roadmap.md) on your AD FS server. Azure AD Connect Health installation.
49+
50+
2. [Review the AD FS application activity report](../manage-apps/migrate-adfs-application-activity.md) to get insights about your AD FS applications.
51+
52+
3. Read the solution guide for [migrating applications to Azure AD](../manage-apps/migrate-adfs-apps-to-azure.md).
53+
54+
4. Migrate applications to Azure AD. For more information, use [the deployment plan for enabling single sign-on](https://go.microsoft.com/fwlink/?linkid=2110877&clcid=0x409).
55+
56+
57+
58+
59+
## Next steps
60+
61+
- [What is Azure Active Directory recommendations](overview-recommendations.md)
62+
63+
- [Azure AD reports overview](overview-reports.md)
Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure Active Directory recommendation - Convert from per-user MFA to conditional access MFA in Azure AD | Microsoft Docs
3-
description: Learn why you should convert from per-user MFA to conditional access MFA in Azure AD
2+
title: Azure Active Directory recommendation - Turn off per user MFA in Azure AD | Microsoft Docs
3+
description: Learn why you should turn off per user MFA in Azure AD
44
services: active-directory
55
documentationcenter: ''
66
author: MarkusVi
@@ -13,19 +13,19 @@ ms.topic: reference
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
1515
ms.subservice: report-monitor
16-
ms.date: 03/21/2022
16+
ms.date: 03/31/2022
1717
ms.author: markvi
1818
ms.reviewer: hafowler
1919

2020
ms.collection: M365-identity-device-management
2121
---
2222

23-
# Azure AD recommendation: Convert from per-user MFA to conditional access MFA
23+
# Azure AD recommendation: Turn off per user MFA
2424

2525
[Azure AD recommendations](overview-recommendations.md) is a feature that provides you with personalized insights and actionable guidance to align your tenant with recommended best practices.
2626

2727

28-
This article covers the recommendation to convert from per-user MFA to conditional access MFA.
28+
This article covers the recommendation to turn off per user MFA.
2929

3030

3131
## Description

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -140,9 +140,13 @@
140140
href: workbook-sensitive-operations-report.md
141141
- name: Recommendations
142142
items:
143+
- name: Convert to conditional access MFA
144+
href: recommendation-turn-off-per-user-mfa.md
143145
- name: Integrate your third party apps
144146
href: recommendation-integrate-third-party-apps.md
145-
- name: Minimize MFA prompts from known devices
146-
href: recommendation-mfa-from-known-devices.md
147147
- name: Migrate to Microsoft authenticator
148-
href: recommendation-migrate-to-authenticator.md
148+
href: recommendation-migrate-to-authenticator.md
149+
- name: Migrate apps from AD FS to Azure AD
150+
href: recommendation-migrate-apps-from-adfs-to-azure-ad.md
151+
- name: Minimize MFA prompts from known devices
152+
href: recommendation-mfa-from-known-devices.md

articles/app-service/app-service-web-tutorial-custom-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ In this tutorial, you learn how to:
2525
## 1. Prepare your environment
2626

2727
* [Create an App Service app](./index.yml), or use an app that you created for another tutorial. The web app's [App Service plan](overview-hosting-plans.md) must be a paid tier and not **Free (F1)**. See [Scale up an app](manage-scale-up.md#scale-up-your-pricing-tier) to update the tier.
28-
* Make sure you can edit DNS records for your custom domain. To edit DNS records, you need access to the DNS registry for your domain provider, such as GoDaddy. For example, to add DNS entries for `contoso.com` and `www.contoso.com`, you must be able to configure the DNS settings for the `contoso.com` root domain.
28+
* Make sure you can edit the DNS records for your custom domain. To edit DNS records, you need access to the DNS registry for your domain provider, such as GoDaddy. For example, to add DNS entries for `contoso.com` and `www.contoso.com`, you must be able to configure the DNS settings for the `contoso.com` root domain. Your custom domains must be in a public DNS zone; private DNS zone is only supported on Internal Load Balancer (ILB) App Service Environment (ASE).
2929
* If you don't have a custom domain yet, you can [purchase an App Service domain](manage-custom-dns-buy-domain.md).
3030

3131
## 2. Get a domain verification ID

0 commit comments

Comments
 (0)