You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/tshoot-connect-connectivity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ This article explains how connectivity between Azure AD Connect and Azure AD wor
26
26
Azure AD Connect uses the MSAL library for authentication. The installation wizard and the sync engine proper require machine.config to be properly configured since these two are .NET applications.
27
27
28
28
>[!NOTE]
29
-
>Azure AD Connect v1.6.xx.x uses the ADAL library. The ADAL library is being depricated and support will end in June 2022. Microsot recommendeds that you upgrade to the latest version of [Azure AD Connect v2](whatis-azure-ad-connect-v2.md).
29
+
>Azure AD Connect v1.6.xx.x uses the ADAL library. The ADAL library is being depricated and support will end in June 2022. Microsoft recommends that you upgrade to the latest version of [Azure AD Connect v2](whatis-azure-ad-connect-v2.md).
30
30
31
31
In this article, we show how Fabrikam connects to Azure AD through its proxy. The proxy server is named fabrikamproxy and is using port 8080.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/tutorial-manage-certificates-for-federated-single-sign-on.md
+23-21Lines changed: 23 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,39 +1,39 @@
1
1
---
2
-
title: Manage federation certificates
3
-
description: Learn how to customize the expiration date for your federation certificates, and how to renew certificates that will soon expire.
2
+
title: "Tutorial: Manage federation certificates"
3
+
description: In this tutorial, you'll learn how to customize the expiration date for your federation certificates, and how to renew certificates that will soon expire.
4
4
titleSuffix: Azure AD
5
5
services: active-directory
6
6
author: davidmu1
7
7
manager: CelesteDG
8
8
ms.service: active-directory
9
9
ms.subservice: app-mgmt
10
10
ms.workload: identity
11
-
ms.topic: conceptual
12
-
ms.date: 04/04/2019
11
+
ms.topic: tutorial
12
+
ms.date: 03/31/2022
13
13
ms.author: davidmu
14
-
ms.reviewer: saumadan
14
+
ms.reviewer: jeedes
15
15
ms.collection: M365-identity-device-management
16
+
17
+
#customer intent: As an admin of an application, I want to learn how to manage federated SAML certificates by customizing expiration dates and renewing certificates.
16
18
---
17
19
18
-
# Manage certificates for federated single sign-on
20
+
# Tutorial: Manage certificates for federated single sign-on
19
21
20
22
In this article, we cover common questions and information related to certificates that Azure Active Directory (Azure AD) creates to establish federated single sign-on (SSO) to your software as a service (SaaS) applications. Add applications from the Azure AD app gallery or by using a non-gallery application template. Configure the application by using the federated SSO option.
21
23
22
-
This article is relevant only to apps that are configured to use Azure AD SSO through [Security Assertion Markup Language](https://wikipedia.org/wiki/Security_Assertion_Markup_Language) (SAML) federation.
24
+
This tutorial is relevant only to apps that are configured to use Azure AD SSO through [Security Assertion Markup Language](https://wikipedia.org/wiki/Security_Assertion_Markup_Language) (SAML) federation.
23
25
24
26
## Auto-generated certificate for gallery and non-gallery applications
25
27
26
28
When you add a new application from the gallery and configure a SAML-based sign-on (by selecting **Single sign-on** > **SAML** from the application overview page), Azure AD generates a certificate for the application that is valid for three years. To download the active certificate as a security certificate (**.cer**) file, return to that page (**SAML-based sign-on**) and select a download link in the **SAML Signing Certificate** heading. You can choose between the raw (binary) certificate or the Base64 (base 64-encoded text) certificate. For gallery applications, this section might also show a link to download the certificate as federation metadata XML (an **.xml** file), depending on the requirement of the application.
27
29
28
-

29
-
30
30
You can also download an active or inactive certificate by selecting the **SAML Signing Certificate** heading's **Edit** icon (a pencil), which displays the **SAML Signing Certificate** page. Select the ellipsis (**...**) next to the certificate you want to download, and then choose which certificate format you want. You have the additional option to download the certificate in privacy-enhanced mail (PEM) format. This format is identical to Base64 but with a **.pem** file name extension, which isn't recognized in Windows as a certificate format.
31
31
32
-

## Customize the expiration date for your federation certificate and roll it over to a new certificate
35
35
36
-
By default, Azure configures a certificate to expire after three years when it is created automatically during SAML single sign-on configuration. Because you can't change the date of a certificate after you save it, you have to:
36
+
By default, Azure configures a certificate to expire after three years when it's created automatically during SAML single sign-on configuration. Because you can't change the date of a certificate after you save it, you have to:
37
37
38
38
1. Create a new certificate with the desired date.
39
39
1. Save the new certificate.
@@ -48,16 +48,18 @@ The following two sections help you perform these steps.
48
48
First, create and save new certificate with a different expiration date:
49
49
50
50
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com/). The **Azure Active Directory admin center** page appears.
51
-
1.In the left pane, select **Enterprise applications**. A list of the enterprise applications in your account appears.
52
-
1.Select the affected application. An overview page for the application appears.
53
-
1.In the left pane of the application overview page, select **Single sign-on**.
51
+
1.Select **Enterprise applications**.
52
+
1.From the list of applications, select your desired application.
53
+
1.Under the **Manage** section, select **Single sign-on**.
54
54
1. If the **Select a single sign-on method** page appears, select **SAML**.
55
-
1. In the **Set up Single Sign-On with SAML - Preview** page, find the **SAML Signing Certificate** heading and select the **Edit** icon (a pencil). The **SAML Signing Certificate** page appears, which displays the status (**Active** or **Inactive**), expiration date, and thumbprint (a hash string) of each certificate.
55
+
1. In the **Set up Single Sign-On with SAML** page, find the **SAML Signing Certificate** heading and select the **Edit** icon (a pencil). The **SAML Signing Certificate** page appears, which displays the status (**Active** or **Inactive**), expiration date, and thumbprint (a hash string) of each certificate.
56
56
1. Select **New Certificate**. A new row appears below the certificate list, where the expiration date defaults to exactly three years after the current date. (Your changes haven't been saved yet, so you can still modify the expiration date.)
57
57
1. In the new certificate row, hover over the expiration date column and select the **Select Date** icon (a calendar). A calendar control appears, displaying the days of a month of the new row's current expiration date.
58
58
1. Use the calendar control to set a new date. You can set any date between the current date and three years after the current date.
59
-
1. Select **Save**. The new certificate now appears with a status of **Inactive**, the expiration date that you chose, and a thumbprint. **Note**- When you have an existing certificate that is already expired and you generate a new certificate, the new certificate will be considered for signing tokens, even though you have not activated it yet.
60
-
1. Select the **X** to return to the **Set up Single Sign-On with SAML - Preview** page.
59
+
1. Select **Save**. The new certificate now appears with a status of **Inactive**, the expiration date that you chose, and a thumbprint.
60
+
> [!NOTE]
61
+
> When you have an existing certificate that is already expired and you generate a new certificate, the new certificate will be considered for signing tokens, even though you haven't activated it yet.
62
+
1. Select the **X** to return to the **Set up Single Sign-On with SAML** page.
61
63
62
64
### Upload and activate a certificate
63
65
@@ -73,7 +75,7 @@ Next, download the new certificate in the correct format, upload it to the appli
73
75
1. When you want to roll over to the new certificate, go back to the **SAML Signing Certificate** page, and in the newly saved certificate row, select the ellipsis (**...**) and select **Make certificate active**. The status of the new certificate changes to **Active**, and the previously active certificate changes to a status of **Inactive**.
74
76
1. Continue following the application's SAML sign-on configuration instructions that you displayed earlier, so that you can upload the SAML signing certificate in the correct encoding format.
75
77
76
-
If your application does not have any validation for the certificate's expiration, and the certificate matches in both Azure Active Directory and your application, your app is still accessible despite having an expired certificate. Please ensure your application can validate the certificate's expiration date.
78
+
If your application doesn't have any validation for the certificate's expiration, and the certificate matches in both Azure Active Directory and your application, your app is still accessible despite having an expired certificate. Ensure your application can validate the certificate's expiration date.
77
79
78
80
## Add email notification addresses for certificate expiration
79
81
@@ -85,9 +87,9 @@ Azure AD will send an email notification 60, 30, and 7 days before the SAML cert
85
87
1. For each email address you want to delete, select the **Delete** icon (a garbage can) next to the email address.
86
88
1. Select **Save**.
87
89
88
-
You can add up to 5 email addresses to the Notification list (including the email address of the admin who added the application). If you need more people to be notified, use the distribution list emails.
90
+
You can add up to five email addresses to the Notification list (including the email address of the admin who added the application). If you need more people to be notified, use the distribution list emails.
89
91
90
-
You will receive the notification email from [email protected]. To avoid the email going to your spam location, add this email to your contacts.
92
+
You'll receive the notification email from [email protected]. To avoid the email going to your spam location, add this email to your contacts.
91
93
92
94
## Renew a certificate that will soon expire
93
95
@@ -103,7 +105,7 @@ If a certificate is about to expire, you can renew it using a procedure that res
103
105
1. Before the old certificate expires, follow the instructions in the [Upload and activate a certificate](#upload-and-activate-a-certificate) section earlier. If your application certificate isn't updated after a new certificate is updated in Azure Active Directory, authentication on your app may fail.
104
106
1. Sign in to the application to make sure that the certificate works correctly.
105
107
106
-
If your application does not validate the certificate expiration configured in Azure Active Directory, and the certificate matches in both Azure Active Directory and your application, your app is still accessible despite having an expired certificate. Please ensure your application can validate certificate expiration.
108
+
If your application doesn't validate the certificate expiration configured in Azure Active Directory, and the certificate matches in both Azure Active Directory and your application, your app is still accessible despite having an expired certificate. Ensure your application can validate certificate expiration.
title: Azure Active Directory recommendation - Migrate apps from ADFS to Azure AD in Azure AD | Microsoft Docs
3
+
description: Learn why you should migrate apps from ADFS to Azure AD in Azure AD
4
+
services: active-directory
5
+
documentationcenter: ''
6
+
author: MarkusVi
7
+
manager: karenhoran
8
+
editor: ''
9
+
10
+
ms.assetid: 9b88958d-94a2-4f4b-a18c-616f0617a24e
11
+
ms.service: active-directory
12
+
ms.topic: reference
13
+
ms.tgt_pltfrm: na
14
+
ms.workload: identity
15
+
ms.subservice: report-monitor
16
+
ms.date: 03/31/2022
17
+
ms.author: markvi
18
+
ms.reviewer: hafowler
19
+
20
+
ms.collection: M365-identity-device-management
21
+
---
22
+
23
+
# Azure AD recommendation: Migrate apps from ADFS to Azure AD
24
+
25
+
[Azure AD recommendations](overview-recommendations.md) is a feature that provides you with personalized insights and actionable guidance to align your tenant with recommended best practices.
26
+
27
+
28
+
This article covers the recommendation to migrate apps from ADFS to Azure AD.
29
+
30
+
31
+
## Description
32
+
33
+
As an admin responsible for managing applications, I want my applications to use Azure AD’s security features and maximize their value.
34
+
35
+
36
+
37
+
38
+
## Logic
39
+
40
+
If a tenant has apps on AD FS, and any of these apps are deemed 100% migratable, this recommendation shows up.
41
+
42
+
## Value
43
+
44
+
Using Azure AD gives you granular per-application access controls to secure access to applications. With Azure AD's B2B collaboration, you can increase user productivity. Automated app provisioning automates the user identity lifecycle in cloud SaaS apps such as Dropbox, Salesforce and more.
45
+
46
+
## Action plan
47
+
48
+
1.[Install Azure AD Connect Health](../hybrid/how-to-connect-install-roadmap.md) on your AD FS server. Azure AD Connect Health installation.
49
+
50
+
2.[Review the AD FS application activity report](../manage-apps/migrate-adfs-application-activity.md) to get insights about your AD FS applications.
51
+
52
+
3. Read the solution guide for [migrating applications to Azure AD](../manage-apps/migrate-adfs-apps-to-azure.md).
53
+
54
+
4. Migrate applications to Azure AD. For more information, use [the deployment plan for enabling single sign-on](https://go.microsoft.com/fwlink/?linkid=2110877&clcid=0x409).
55
+
56
+
57
+
58
+
59
+
## Next steps
60
+
61
+
-[What is Azure Active Directory recommendations](overview-recommendations.md)
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/recommendation-turn-off-per-user-mfa.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Azure Active Directory recommendation - Convert from per-user MFA to conditional access MFA in Azure AD | Microsoft Docs
3
-
description: Learn why you should convert from per-user MFA to conditional access MFA in Azure AD
2
+
title: Azure Active Directory recommendation - Turn off per user MFA in Azure AD | Microsoft Docs
3
+
description: Learn why you should turn off per user MFA in Azure AD
4
4
services: active-directory
5
5
documentationcenter: ''
6
6
author: MarkusVi
@@ -13,19 +13,19 @@ ms.topic: reference
13
13
ms.tgt_pltfrm: na
14
14
ms.workload: identity
15
15
ms.subservice: report-monitor
16
-
ms.date: 03/21/2022
16
+
ms.date: 03/31/2022
17
17
ms.author: markvi
18
18
ms.reviewer: hafowler
19
19
20
20
ms.collection: M365-identity-device-management
21
21
---
22
22
23
-
# Azure AD recommendation: Convert from per-user MFA to conditional access MFA
23
+
# Azure AD recommendation: Turn off per user MFA
24
24
25
25
[Azure AD recommendations](overview-recommendations.md) is a feature that provides you with personalized insights and actionable guidance to align your tenant with recommended best practices.
26
26
27
27
28
-
This article covers the recommendation to convert from per-user MFA to conditional access MFA.
28
+
This article covers the recommendation to turn off per user MFA.
Copy file name to clipboardExpand all lines: articles/app-service/app-service-web-tutorial-custom-domain.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ In this tutorial, you learn how to:
25
25
## 1. Prepare your environment
26
26
27
27
*[Create an App Service app](./index.yml), or use an app that you created for another tutorial. The web app's [App Service plan](overview-hosting-plans.md) must be a paid tier and not **Free (F1)**. See [Scale up an app](manage-scale-up.md#scale-up-your-pricing-tier) to update the tier.
28
-
* Make sure you can edit DNS records for your custom domain. To edit DNS records, you need access to the DNS registry for your domain provider, such as GoDaddy. For example, to add DNS entries for `contoso.com` and `www.contoso.com`, you must be able to configure the DNS settings for the `contoso.com` root domain.
28
+
* Make sure you can edit the DNS records for your custom domain. To edit DNS records, you need access to the DNS registry for your domain provider, such as GoDaddy. For example, to add DNS entries for `contoso.com` and `www.contoso.com`, you must be able to configure the DNS settings for the `contoso.com` root domain. Your custom domains must be in a public DNS zone; private DNS zone is only supported on Internal Load Balancer (ILB) App Service Environment (ASE).
29
29
* If you don't have a custom domain yet, you can [purchase an App Service domain](manage-custom-dns-buy-domain.md).
0 commit comments