You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.reviewer: chmutali
15
15
16
16
# How Azure Active Directory provisioning integrates with SAP SuccessFactors
17
17
18
-
[Azure Active Directory user provisioning service](../app-provisioning/user-provisioning.md) integrates with [SAP SuccessFactors Employee Central](https://www.successfactors.com/products-services/core-hr-payroll/employee-central.html) to manage the identity life cycle of users. Azure Active Directory offers three prebuilt integrations:
18
+
[Azure Active Directory user provisioning service](../app-provisioning/user-provisioning.md) integrates with [SAP SuccessFactors Employee Central](https://www.sap.com/products/hcm/employee-central-payroll.html) to manage the identity life cycle of users. Azure Active Directory offers three prebuilt integrations:
19
19
20
20
*[SuccessFactors to on-premises Active Directory user provisioning](../saas-apps/sap-successfactors-inbound-provisioning-tutorial.md)
21
21
*[SuccessFactors to Azure Active Directory user provisioning](../saas-apps/sap-successfactors-inbound-provisioning-cloud-only-tutorial.md)
@@ -414,7 +414,7 @@ If you want to exclude processing of prehires in the Onboarding module, update y
414
414
1. Save the mapping and validate that the scoping filter works using provisioning on demand.
415
415
416
416
### Enabling OData API Audit logs in SuccessFactors
417
-
The Azure AD SuccessFactors connector uses SuccessFactors OData API to retrieve changes and provision users. If you observe issues with the provisioning service and want to confirm what data was retrieved from SuccessFactors, you can enable OData API Audit logs in SuccessFactors. To enable audit logs, follow the steps documented in [SAP support note 2680837](https://userapps.support.sap.com/sap/support/knowledge/en/2680837). Retrieve the request payload sent by Azure AD from the audit logs. To troubleshoot, you can copy this request payload in a tool like [Postman](https://www.postman.com/downloads/), set it up to use the same API user that is used by the connector and see if it returns the desired changes from SuccessFactors.
417
+
The Azure AD SuccessFactors connector uses SuccessFactors OData API to retrieve changes and provision users. If you observe issues with the provisioning service and want to confirm what data was retrieved from SuccessFactors, you can enable OData API Audit logs in SuccessFactors. Retrieve the request payload sent by Azure AD from the audit logs. To troubleshoot, you can copy this request payload in a tool like [Postman](https://www.postman.com/downloads/), set it up to use the same API user that is used by the connector and see if it returns the desired changes from SuccessFactors.
418
418
419
419
## Writeback scenarios
420
420
This section covers different write-back scenarios. It recommends configuration approaches based on how email and phone number is set up in SuccessFactors.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/tutorial-enable-sspr.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,6 +29,10 @@ In this tutorial you learn how to:
29
29
> * Set up authentication methods and registration options
30
30
> * Test the SSPR process as a user
31
31
32
+
> [!IMPORTANT]
33
+
> In March 2023, we announced the deprecation of managing authentication methods in the legacy multifactor authentication (MFA) and self-service password reset (SSPR) policies. Beginning September 30, 2024, authentication methods can't be managed in these legacy MFA and SSPR policies. We recommend customers use the manual migration control to migrate to the Authentication methods policy by the deprecation date.
34
+
35
+
32
36
## Video tutorial
33
37
34
38
You can also follow along in a related video: [How to enable and configure SSPR in Azure AD](https://www.youtube.com/embed/rA8TvhNcCvQ?azure-portal=true).
Token protection (sometimes referred to as token binding in the industry) attempts to reduce attacks using token theft by ensuring a token is usable only from the intended device. When an attacker is able to steal a token, by hijacking or replay, they can impersonate their victim until the token expires or is revoked. Token theft is thought to be a relatively rare event, but the damage from it can be significant.
19
19
20
-
Token protection creates a cryptographically secure tie between the token and the device (client secret) it's issued to. Without the client secret, the bound token is useless. When a user registers a Windows 10 or newer device in Azure AD, their primary identity is [bound to the device](../devices/concept-primary-refresh-token.md#how-is-the-prt-protected). What this means is that a policy can ensure that only bound sign-in session (or refresh) tokens, otherwise known as Primary Refresh Tokens (PRTs) are used by applications when requesting access to a resource.
20
+
Token protection creates a cryptographically secure tie between the token and the device (client secret) it's issued to. Without the client secret, the bound token is useless. When a user registers a Windows 10 or newer device in Azure AD, their primary identity is [bound to the device](../devices/concept-primary-refresh-token.md#how-is-the-prt-protected). What this means: A policy can ensure that only bound sign-in session (or refresh) tokens, otherwise known as Primary Refresh Tokens (PRTs) are used by applications when requesting access to a resource.
21
21
22
22
> [!IMPORTANT]
23
23
> Token protection is currently in public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
@@ -35,28 +35,35 @@ With this preview, we're giving you the ability to create a Conditional Access p
35
35
36
36
## Requirements
37
37
38
-
This preview supports the following configurations:
38
+
This preview supports the following configurations for access to resources with Token Protection conditional access policies applied:
39
39
40
40
* Windows 10 or newer devices that are Azure AD joined, hybrid Azure AD joined, or Azure AD registered.
41
41
* OneDrive sync client version 22.217 or later
42
42
* Teams native client version 1.6.00.1331 or later
43
+
* Power BI desktop version 2.117.841.0 (May 2023) or later
44
+
* Visual Studio 2022 or later when using the 'Windows authentication broker' Sign-in option
43
45
* Office Perpetual clients aren't supported
44
46
45
47
### Known limitations
46
48
47
49
- External users (Azure AD B2B) aren't supported and shouldn't be included in your Conditional Access policy.
48
50
- The following applications don't support signing in using protected token flows and users are blocked when accessing Exchange and SharePoint:
49
-
- Power BI Desktop client
50
51
- PowerShell modules accessing Exchange, SharePoint, or Microsoft Graph scopes that are served by Exchange or SharePoint
51
52
- PowerQuery extension for Excel
52
53
- Extensions to Visual Studio Code which access Exchange or SharePoint
53
-
- Visual Studio
54
-
- The new Teams 2.1 preview client gets blocked after sign out due to a bug. This bug should be fixed in an August release.
54
+
- The new Teams 2.1 preview client gets blocked after sign out due to a bug. This bug should be fixed in a future service update.
55
55
- The following Windows client devices aren't supported:
56
56
- Windows Server
57
57
- Surface Hub
58
58
- Windows-based Microsoft Teams Rooms (MTR) systems
> Token Protection enforcement is part of Microsoft Entra ID Protection and will be part of the P2 license at general availability.
66
+
60
67
## Deployment
61
68
62
69
For users, the deployment of a Conditional Access policy to enforce token protection should be invisible when using compatible client platforms on registered devices and compatible applications.
@@ -135,7 +142,7 @@ You can also use [Log Analytics](../reports-monitoring/tutorial-log-analytics-wi
135
142
Here's a sample Log Analytics query searching the non-interactive sign-in logs for the last seven days, highlighting **Blocked** versus **Allowed** requests by **Application**. These queries are only samples and are subject to change.
136
143
137
144
> [!NOTE]
138
-
> **Sign In logs output:** The value of the string used in "enforcedSessionControls" and "sessionControlsNotSatisfied" changed from "Binding" to "SignInTokenProtection" in late June 2023. Queries on Sign In Log data should be updated to reflect this change.
145
+
> **Sign In logs output:** The value of the string used in "enforcedSessionControls" and "sessionControlsNotSatisfied" changed from "Binding" to "SignInTokenProtection" in late June 2023. Queries on Sign In Log data should be updated to reflect this change. The examples cover both values to include historical data.
| extend Result = case (SessionNotSatisfyResult contains 'SignInTokenProtection', 'Block','Allow')
163
+
| extend Result = case (SessionNotSatisfyResult contains 'SignInTokenProtection' or SessionNotSatisfyResult contains 'SignInTokenProtection', 'Block','Allow')
157
164
| summarize by Id,UserPrincipalName, AppDisplayName, Result
| extend Result = case (SessionNotSatisfyResult contains 'SignInTokenProtection', 'Block','Allow')
192
+
| extend Result = case (SessionNotSatisfyResult contains 'SignInTokenProtection' or SessionNotSatisfyResult contains 'SignInTokenProtection', 'Block','Allow')
186
193
| summarize by Id, UserPrincipalName, AppDisplayName, ResourceDisplayName,Result
Copy file name to clipboardExpand all lines: articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -322,9 +322,9 @@ The AADLoginForWindows extension must be installed successfully for the VM to co
322
322
323
323
| Command to run | Expected output |
324
324
| --- | --- |
325
-
|`curl -H Metadata:true "http://169.254.169.254/metadata/instance?api-version=2017-08-01"`| Correct information about the Azure VM |
326
-
|`curl -H Metadata:true "http://169.254.169.254/metadata/identity/info?api-version=2018-02-01"`| Valid tenant ID associated with the Azure subscription |
327
-
|`curl -H Metadata:true "http://169.254.169.254/metadata/identity/oauth2/token?resource=urn:ms-drs:enterpriseregistration.windows.net&api-version=2018-02-01"`| Valid access token issued by Azure Active Directory for the managed identity that is assigned to this VM |
325
+
|`curl.exe -H Metadata:true "http://169.254.169.254/metadata/instance?api-version=2017-08-01"`| Correct information about the Azure VM |
326
+
|`curl.exe -H Metadata:true "http://169.254.169.254/metadata/identity/info?api-version=2018-02-01"`| Valid tenant ID associated with the Azure subscription |
327
+
|`curl.exe -H Metadata:true "http://169.254.169.254/metadata/identity/oauth2/token?resource=urn:ms-drs:enterpriseregistration.windows.net&api-version=2018-02-01"`| Valid access token issued by Azure Active Directory for the managed identity that is assigned to this VM |
328
328
329
329
> [!NOTE]
330
330
> You can decode the access token by using a tool like [calebb.net](http://calebb.net/). Verify that the `oid` value in the access token matches the managed identity that's assigned to the VM.
0 commit comments