Skip to content

Commit b192c8a

Browse files
committed
Merge branch 'release-ignite-service-bus-scalesets' of https://github.com/MicrosoftDocs/azure-docs-pr into relayhttpqs0926
2 parents 148f442 + 4e55d00 commit b192c8a

File tree

223 files changed

+1195
-502
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

223 files changed

+1195
-502
lines changed

CODEOWNERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ articles/service-health @rboucher
7373
/articles/lighthouse/ @JnHs
7474

7575
# Healthcare APIs
76-
/articles/healthcare-apis/ @ginalee-dotcom
76+
/articles/healthcare-apis/ @ranvijaykumar @mikaelweave
7777

7878
# Configuration
7979
*.json @SyntaxC4 @snoviking

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -528,6 +528,8 @@
528528
displayName: bulk import
529529
- name: Partner integration
530530
items:
531+
- name: Grit IAM B2B2C
532+
href: partner-grit-iam.md
531533
- name: N8identity
532534
href: partner-n8identity.md
533535
- name: Saviynt
1.99 KB
Loading
144 KB
Loading

articles/active-directory-b2c/partner-gallery.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/21/2022
12+
ms.date: 09/14/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -65,6 +65,7 @@ Microsoft partners with the following ISVs for role-based access control.
6565

6666
| ISV partner | Description and integration walkthroughs |
6767
|:-------------------------|:--------------|
68+
| ![Screenshot of a grit IAM logo.](./media/partner-gallery/grit-logo.png) | [Grit IAM B2B2C](./partner-grit-iam.md) provides authentication, authorization, profile and role management, and delegated B2B SaaS application administration. It also enables role-based access control (RBAC) for end-users of Azure AD B2C.|
6869
| ![Screenshot of a n8identity logo](./media/partner-gallery/n8identity-logo.png) | [N8Identity](./partner-n8identity.md) is an Identity-as-a-Service governance platform that provides solution to address customer accounts migration and Customer Service Requests (CSR) administration running on Microsoft Azure. |
6970
| ![Screenshot of a Saviynt logo](./media/partner-gallery/saviynt-logo.png) | [Saviynt](./partner-Saviynt.md) cloud-native platform promotes better security, compliance, and governance through intelligent analytics and cross application integration for streamlining IT modernization. |
7071
| ![Screenshot of a WhoIAM Rampart logo](./media/partner-gallery/whoiam-logo.png) | [WhoIAM Rampart](./partner-whoiam-rampart.md) provides a fully integrated helpdesk and invitation-gated user registration experience. It allows support specialists to efficiently perform tasks like resetting passwords and multi-factor authentication without using Azure. It also enables apps and role-based access control (RBAC) for end-users of Azure AD B2C. |
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
title: Configure the Grit IAM B2B2C solution with Azure Active Directory B2C
3+
titleSuffix: Azure AD B2C
4+
description: Learn how to integrate Azure AD B2C authentication with the Grit IAM B2B2C solution
5+
services: active-directory-b2c
6+
author: gargi-sinha
7+
manager: martinco
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 9/15/2022
12+
ms.author: gasinh
13+
ms.reviewer: kengaderdus
14+
ms.subservice: B2C
15+
---
16+
17+
# Tutorial: Configure the Grit IAM B2B2C solution with Azure Active Directory B2C
18+
19+
In this tutorial, you learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with a [Grit IAM B2B2C](https://www.gritiam.com/b2b2c) solution. You can use the solution to provide secure, reliable, self-serviceable, and user-friendly identity and access management to your customers. Shared profile data such as first name, last name, home address, and email used in web and mobile applications are stored in a centralized manner with consideration to compliance and regulatory needs.
20+
21+
22+
Use Grit's B2BB2C solution for:
23+
24+
- Authentication, authorization, profile and role management, and delegated B2B SaaS application administration.
25+
- Role-based access control for Azure AD B2C applications.
26+
27+
## Prerequisites
28+
29+
To get started, ensure the following prerequisites are met:
30+
31+
- A Grit IAM account. You can go to [Grit IAM B2B2C solution](https://www.gritiam.com/b2b2c) to get a demo.
32+
- An Azure AD subscription. If you don't have one, you can create a [free Azure account](https://azure.microsoft.com/free/).
33+
- An Azure AD B2C tenant linked to the Azure subscription. You can learn more at [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).
34+
- Configure your application in the Azure portal.
35+
36+
## Scenario description
37+
38+
Contoso does business with end customers and large enterprises, like Fabrikam_big1 and Fabrikam_big2. There're small enterprise customers like Fabrikam_small1 and Fabrikam_small2 and direct business is done with end customers like Smith1 and Smith2.
39+
40+
*Contoso* has web and mobile applications and develops new applications. The applications rely on user shared profile data such as, first name, last name, address, and email. They want to centralize the profile data, so applications aren't collecting and storing the data. They want to store the profile information in accordance with certain compliance and regulations.
41+
42+
![Screenshot that shows the architecture diagram of how the components are connected to each other.](./media/partner-grit-iam/grit-b2b2c-architecture.png)
43+
44+
This integration is composed of the following components:
45+
46+
- **Azure AD B2C Identity Experience Framework (IEF)**: An engine that executes user journeys, which can include validating credentials, performing MFA, checking user access. It's aided by the Azure AD database and the API layer, which's configured using XML.
47+
48+
- **Grit API layer**: This layer exposes user profile data and metadata about organizations and applications. The data is stored in Azure AD and Cosmos DB.
49+
50+
- **Grit Onboarding portal**: Used by admins to onboard applications and organizations.
51+
52+
- **Grit Admin portal**: Used by the *Contoso* admin and by admins of *fabrikam_big1*, and *fabirkam_small1*. Delegated admins can manage users and their access. Super admins of the organizations manage all users.
53+
54+
55+
- **Grit Visual IEF editor**: A low code/no code editor that customizes the user journey and is provided by Grit. It produces the XML used by IEF. *Contoso* developers use it to customize user journeys.
56+
57+
58+
- **Applications**: Developed by *Contoso* or third parties. Applications use Open ID or SAML to connect to the customer identity and access management (CIAM) system. The tokens they receive contain user-profile information, but can make API calls, with the token as the auth mechanism, to do user-profile data create, read, update and delete (CRUD) operations.
59+
60+
61+
> [!NOTE]
62+
> Components developed by Grit, except the visual IEF editor, will be deployed in the Contoso Azure environment.
63+
64+
## Configure Grit B2B2C with Azure AD B2C
65+
66+
Use the guidance provided in the following sections to get started with configuration.
67+
68+
### Step 1 - Setup infrastructure
69+
70+
To get started with setup:
71+
72+
- Contact [Grit support](mailto:[email protected]) to obtain access.
73+
- For evaluation, the Grit support team will deploy the infrastructure in the Grit Azure subscription and they'll give you admin rights.
74+
- After you purchase the solution, Grit engineers will install the production version in your Azure subscription.
75+
- The infrastructure integrates with your virtual network (VNet) setup, supports APIM (third-party API management) and the firewall.
76+
- Grit implementation engineers can provide custom recommendations based on your infrastructure.
77+
78+
### Step 2 - Create admins in the Admin Portal
79+
80+
Use the Grit Admin portal to assign administrators access to the portal where they can perform the following tasks -
81+
82+
- Add other admins such as super, organization, application admin in the hierarchy depending on their permission level.
83+
84+
- View/accept/reject all the user's requests for the application registration.
85+
86+
- Search users.
87+
88+
To learn how to assign admin roles, check the [tutorial.](https://app.archbee.com/doc/j1VX2J3B3xJ-zMqnmlDA5/9IW3PgI2yn1cCpPGm1vVN)
89+
90+
### Step 3 - Onboard organizations
91+
92+
Use the Onboarding portal for one or more of your customers and their identity provider (IdP) that supports OpenID Connect (OIDC) and SAML. Onboard customers without an IdP, for local account authentication. For B2C applications, enable social authentications.
93+
94+
In the Grit Onboarding portal, create a super admin for the tenant. The Onboarding portal defines the claims per application and per organization. Thereafter, the portal creates an endpoint URL for the sign-in and sign-up user flow.
95+
96+
To learn how to onboard an organization, check this [tutorial](https://app.archbee.com/doc/G_YZFq_VwvgMlmX-_efmX/8m90WVb2M6Yi0gCe7yor2).
97+
98+
### Step 4 - Integrate applications using OIDC or SAML
99+
100+
After you onboard the customer, the Grit Onboarding portal provides URLs to onboard the applications.
101+
102+
Learn [how your customers can sign up, sign in, and manage their profiles](add-sign-up-and-sign-in-policy.md?pivots=b2c-custom-policy).
103+
104+
## Test the scenarios
105+
106+
Check the authentication [scenarios](#scenario-description) in your applications. Use the Grit Admin portal to change roles and user properties. Provide delegated access to Admin portal by inviting users.
107+
108+
## Next steps
109+
110+
- [Azure AD B2C custom policy overview](custom-policy-overview.md)
111+
112+
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](custom-policy-get-started.md?tabs=applications)
113+
114+
- [SAAS Platform - Organization Application Onboarding Portal](https://app.archbee.com/doc/G_YZFq_VwvgMlmX-_efmX/8m90WVb2M6Yi0gCe7yor2)
115+
116+
- [SAAS Platform - Admin Portal](https://app.archbee.com/doc/j1VX2J3B3xJ-zMqnmlDA5/9IW3PgI2yn1cCpPGm1vVN)

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Block legacy authentication - Azure Active Directory
3-
description: Learn how to improve your security posture by blocking legacy authentication using Azure AD Conditional Access.
3+
description: Block legacy authentication using Azure AD Conditional Access.
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 08/22/2022
9+
ms.date: 09/26/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy authentication doesn't support things like multifactor authentication (MFA). MFA is a common requirement to improve security posture in organizations.
2121

2222
> [!NOTE]
23-
> Effective October 1, 2022, we will begin to permanently disable Basic Authentication for Exchange Online in all Microsoft 365 tenants regardless of usage, except for SMTP Authentication. Read more [here](/exchange/clients-and-mobile-in-exchange-online/deprecation-of-basic-authentication-exchange-online)
23+
> Effective October 1, 2022, we will begin to permanently disable Basic Authentication for Exchange Online in all Microsoft 365 tenants regardless of usage, except for SMTP Authentication. For more information, see the article [Deprecation of Basic authentication in Exchange Online](/exchange/clients-and-mobile-in-exchange-online/deprecation-of-basic-authentication-exchange-online)
2424
2525
Alex Weinert, Director of Identity Security at Microsoft, in his March 12, 2020 blog post [New tools to block legacy authentication in your organization](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/new-tools-to-block-legacy-authentication-in-your-organization/ba-p/1225302#) emphasizes why organizations should block legacy authentication and what other tools Microsoft provides to accomplish this task:
2626

@@ -131,16 +131,12 @@ There are two ways to use Conditional Access policies to block legacy authentica
131131

132132
### Directly blocking legacy authentication
133133

134-
The easiest way to block legacy authentication across your entire organization is by configuring a Conditional Access policy that applies specifically to legacy authentication clients and blocks access. When assigning users and applications to the policy, make sure to exclude users and service accounts that still need to sign in using legacy authentication. When choosing the cloud apps in which to apply this policy, select All cloud apps, targeted apps such as Office 365 (recommended) or at a minimum, Office 365 Exchange Online. Configure the client apps condition by selecting **Exchange ActiveSync clients** and **Other clients**. To block access for these client apps, configure the access controls to Block access.
135-
136-
![Client apps condition configured to block legacy auth](./media/block-legacy-authentication/client-apps-condition-configured-yes.png)
134+
The easiest way to block legacy authentication across your entire organization is by configuring a Conditional Access policy that applies specifically to legacy authentication clients and blocks access. When assigning users and applications to the policy, make sure to exclude users and service accounts that still need to sign in using legacy authentication. When choosing the cloud apps in which to apply this policy, select All cloud apps, targeted apps such as Office 365 (recommended) or at a minimum, Office 365 Exchange Online. Organizations can use the policy available in [Conditional Access templates](concept-conditional-access-policy-common.md) or the common policy [Conditional Access: Block legacy authentication](howto-conditional-access-policy-block-legacy.md) as a reference.
137135

138136
### Indirectly blocking legacy authentication
139137

140138
If your organization isn't ready to block legacy authentication across the entire organization, you should ensure that sign-ins using legacy authentication aren't bypassing policies that require grant controls such as requiring multifactor authentication or compliant/hybrid Azure AD joined devices. During authentication, legacy authentication clients don't support sending MFA, device compliance, or join state information to Azure AD. Therefore, apply policies with grant controls to all client applications so that legacy authentication based sign-ins that can’t satisfy the grant controls are blocked. With the general availability of the client apps condition in August 2020, newly created Conditional Access policies apply to all client apps by default.
141139

142-
![Client apps condition default configuration](./media/block-legacy-authentication/client-apps-condition-configured-no.png)
143-
144140
## What you should know
145141

146142
It can take up to 24 hours for the Conditional Access policy to go into effect.

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 09/06/2022
9+
ms.date: 09/26/2022
1010
ms.author: joflore
1111
author: MicrosoftGuyJFlo
1212
manager: amycolannino
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818

1919
Within a Conditional Access policy, an administrator can use access controls to grant or block access to resources.
2020

21-
:::image type="content" source="media/concept-conditional-access-session/conditional-access-session.png" alt-text="Screenshot of a Conditional Access policy with a grant control that requires multifactor authentication." lightbox="media/concept-conditional-access-session/conditional-access-session.png":::
21+
:::image type="content" source="media/concept-conditional-access-grant/conditional-access-grant.png" alt-text="Screenshot of a Conditional Access policy with a grant control that requires multifactor authentication." lightbox="media/concept-conditional-access-grant/conditional-access-grant.png":::
2222

2323
## Block access
2424

articles/active-directory/roles/groups-concept.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: roles
1010
ms.topic: article
11-
ms.date: 03/01/2022
11+
ms.date: 09/26/2022
1212
ms.author: rolyon
1313
ms.reviewer: vincesm
1414
ms.custom: it-pro
@@ -50,7 +50,7 @@ Role-assignable groups are designed to help prevent potential breaches by having
5050
- Only Global Administrators and Privileged Role Administrators can create a role-assignable group.
5151
- The membership type for role-assignable groups must be Assigned and can't be an Azure AD dynamic group. Automated population of dynamic groups could lead to an unwanted account being added to the group and thus assigned to the role.
5252
- By default, only Global Administrators and Privileged Role Administrators can manage the membership of a role-assignable group, but you can delegate the management of role-assignable groups by adding group owners.
53-
- RoleManagement.ReadWrite.Directory Microsoft Graph permission is required to be able to manage the membership of such groups; Group.ReadWrite.All won't work.
53+
- For Microsoft Graph, the *RoleManagement.ReadWrite.Directory* permission is required to be able to manage the membership of role-assignable groups. The *Group.ReadWrite.All* permission won't work.
5454
- To prevent elevation of privilege, only a Privileged Authentication Administrator or a Global Administrator can change the credentials or reset MFA or modify sensitive attributes for members and owners of a role-assignable group.
5555
- Group nesting is not supported. A group can't be added as a member of a role-assignable group.
5656

0 commit comments

Comments
 (0)