Skip to content

Commit b383921

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into davidbel-aadj-update
2 parents 79909bd + 535fba4 commit b383921

File tree

372 files changed

+4346
-3734
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

372 files changed

+4346
-3734
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -885,6 +885,7 @@
885885
"redirection_files": [
886886
".openpublishing.redirection.json",
887887
".openpublishing.redirection.active-directory.json",
888+
".openpublishing.redirection.azure-blob.json",
888889
".openpublishing.redirection.azure-sql.json",
889890
"articles/data-factory/.openpublishing.redirection.data-factory.json",
890891
".openpublishing.redirection.defender-for-cloud.json",
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/storage/blobs/storage-upload-process-images.md",
5+
"redirect_url": "/azure/storage/blobs/blob-upload-function-trigger",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/storage/blobs/storage-secure-access-application.md",
10+
"redirect_url": "/azure/storage/blobs/blob-upload-function-trigger",
11+
"redirect_document_id": true
12+
},
13+
{
14+
"source_path_from_root": "/articles/storage/blobs/storage-monitor-troubleshoot-storage-application.md",
15+
"redirect_url": "/azure/storage/blobs/blob-upload-function-trigger",
16+
"redirect_document_id": false
17+
}
18+
]
19+
}

articles/active-directory/azuread-dev/active-directory-authentication-libraries.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,9 +49,9 @@ The Azure Active Directory Authentication Library (ADAL) v1.0 enables applicatio
4949

5050
| Platform | Library | Download | Source Code | Sample | Reference
5151
| --- | --- | --- | --- | --- | --- |
52-
| .NET |OWIN for AzureAD|[NuGet](https://www.nuget.org/packages/Microsoft.Owin.Security.ActiveDirectory/) |[GitHub](https://github.com/aspnet/AspNetKatana/tree/dev/src/Microsoft.Owin.Security.ActiveDirectory) |[MVC App](../develop/quickstart-v2-aspnet-webapp.md) | |
53-
| .NET |OWIN for OpenIDConnect |[NuGet](https://www.nuget.org/packages/Microsoft.Owin.Security.OpenIdConnect) |[GitHub](https://github.com/aspnet/AspNetKatana/tree/dev/src/Microsoft.Owin.Security.OpenIdConnect) |[Web App](https://github.com/AzureADSamples/WebApp-OpenIDConnect-DotNet) | |
54-
| .NET |OWIN for WS-Federation |[NuGet](https://www.nuget.org/packages/Microsoft.Owin.Security.WsFederation) |[GitHub](https://github.com/aspnet/AspNetKatana/tree/dev/src/Microsoft.Owin.Security.WsFederation) |[MVC Web App](https://github.com/AzureADSamples/WebApp-WSFederation-DotNet) | |
52+
| .NET |OWIN for AzureAD|[NuGet](https://www.nuget.org/packages/Microsoft.Owin.Security.ActiveDirectory/) |[GitHub](https://github.com/aspnet/AspNetKatana/tree/main/src/Microsoft.Owin.Security.ActiveDirectory) |[MVC App](../develop/quickstart-v2-aspnet-webapp.md) | |
53+
| .NET |OWIN for OpenIDConnect |[NuGet](https://www.nuget.org/packages/Microsoft.Owin.Security.OpenIdConnect) |[GitHub](https://github.com/aspnet/AspNetKatana/tree/main/src/Microsoft.Owin.Security.OpenIdConnect) |[Web App](https://github.com/AzureADSamples/WebApp-OpenIDConnect-DotNet) | |
54+
| .NET |OWIN for WS-Federation |[NuGet](https://www.nuget.org/packages/Microsoft.Owin.Security.WsFederation) |[GitHub](https://github.com/aspnet/AspNetKatana/tree/main/src/Microsoft.Owin.Security.WsFederation) |[MVC Web App](https://github.com/AzureADSamples/WebApp-WSFederation-DotNet) | |
5555
| .NET |Identity Protocol Extensions for .NET 4.5 |[NuGet](https://www.nuget.org/packages/Microsoft.IdentityModel.Protocol.Extensions) |[GitHub](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet) | | |
5656
| .NET |JWT Handler for .NET 4.5 |[NuGet](https://www.nuget.org/packages/System.IdentityModel.Tokens.Jwt) |[GitHub](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet) | | |
5757
| Node.js |Azure AD Passport |[npm](https://www.npmjs.com/package/passport-azure-ad) |[GitHub](https://github.com/AzureAD/passport-azure-ad) | [Web API](../develop/authentication-flows-app-scenarios.md)| |

articles/active-directory/external-identities/external-collaboration-settings-configure.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: how-to
9-
ms.date: 01/31/2022
9+
ms.date: 04/11/2022
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -37,6 +37,8 @@ For B2B collaboration with other Azure AD organizations, you should also review
3737

3838
1. Under **Guest user access**, choose the level of access you want guest users to have:
3939

40+
![Screenshot showing Guest user access settings.](./media/external-collaboration-settings-configure/guest-user-access.png)
41+
4042
- **Guest users have the same access as members (most inclusive)**: This option gives guests the same access to Azure AD resources and directory data as member users.
4143

4244
- **Guest users have limited access to properties and memberships of directory objects**: (Default) This setting blocks guests from certain directory tasks, like enumerating users, groups, or other directory resources. Guests can see membership of all non-hidden groups.
@@ -45,7 +47,7 @@ For B2B collaboration with other Azure AD organizations, you should also review
4547

4648
1. Under **Guest invite settings**, choose the appropriate settings:
4749

48-
![Guest invite settings](./media/external-collaboration-settings-configure/guest-invite-settings.png)
50+
![Screenshot showing Guest invite settings.](./media/external-collaboration-settings-configure/guest-invite-settings.png)
4951

5052
- **Anyone in the organization can invite guest users including guests and non-admins (most inclusive)**: To allow guests in the organization to invite other guests including those who are not members of an organization, select this radio button.
5153
- **Member users and users assigned to specific admin roles can invite guest users including guests with member permissions**: To allow member users and users who have specific administrator roles to invite guests, select this radio button.
@@ -56,11 +58,11 @@ For B2B collaboration with other Azure AD organizations, you should also review
5658
5759
1. Under **Enable guest self-service sign up via user flows**, select **Yes** if you want to be able to create user flows that let users sign up for apps. For more information about this setting, see [Add a self-service sign-up user flow to an app](self-service-sign-up-user-flow.md).
5860

59-
![Self-service sign up via user flows setting](./media/external-collaboration-settings-configure/self-service-sign-up-setting.png)
61+
![Screenshot showing Self-service sign up via user flows setting.](./media/external-collaboration-settings-configure/self-service-sign-up-setting.png)
6062

6163
1. Under **Collaboration restrictions**, you can choose whether to allow or deny invitations to the domains you specify and enter specific domain names in the text boxes. For multiple domains, enter each domain on a new line. For more information, see [Allow or block invitations to B2B users from specific organizations](allow-deny-list.md).
6264

63-
![Collaboration restrictions settings](./media/external-collaboration-settings-configure/collaboration-restrictions.png)
65+
![Screenshot showing Collaboration restrictions settings.](./media/external-collaboration-settings-configure/collaboration-restrictions.png)
6466
## Assign the Guest Inviter role to a user
6567

6668
With the Guest Inviter role, you can give individual users the ability to invite guests without assigning them a global administrator or other admin role. Assign the Guest inviter role to individuals. Then make sure you set **Admins and users in the guest inviter role can invite** to **Yes**.
Loading
Loading

articles/active-directory/hybrid/how-to-connect-install-prerequisites.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ For more information on setting the PowerShell execution policy, see [Set-Execut
5151
### Azure AD Connect server
5252
The Azure AD Connect server contains critical identity data. It's important that administrative access to this server is properly secured. Follow the guidelines in [Securing privileged access](/windows-server/identity/securing-privileged-access/securing-privileged-access).
5353

54-
The Azure AD Connect server must be treated as a Tier 0 component as documented in the [Active Directory administrative tier model](/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material)
54+
The Azure AD Connect server must be treated as a Tier 0 component as documented in the [Active Directory administrative tier model](/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material). We recommend hardening the Azure AD Connect server as a Control Plane asset by following the guidance provided in [Secure Privileged Access]( https://docs.microsoft.com/security/compass/overview)
5555

5656
To read more about securing your Active Directory environment, see [Best practices for securing Active Directory](/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory).
5757

@@ -73,7 +73,7 @@ To read more about securing your Active Directory environment, see [Best practic
7373
### Harden your Azure AD Connect server
7474
We recommend that you harden your Azure AD Connect server to decrease the security attack surface for this critical component of your IT environment. Following these recommendations will help to mitigate some security risks to your organization.
7575

76-
- Treat Azure AD Connect the same as a domain controller and other Tier 0 resources. For more information, see [Active Directory administrative tier model](/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material).
76+
- We recommend hardening the Azure AD Connect server as a Control Plane (formerly Tier 0) asset by following the guidance provided in [Secure Privileged Access]( https://docs.microsoft.com/security/compass/overview) and [Active Directory administrative tier model](/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material).
7777
- Restrict administrative access to the Azure AD Connect server to only domain administrators or other tightly controlled security groups.
7878
- Create a [dedicated account for all personnel with privileged access](/windows-server/identity/securing-privileged-access/securing-privileged-access). Administrators shouldn't be browsing the web, checking their email, and doing day-to-day productivity tasks with highly privileged accounts.
7979
- Follow the guidance provided in [Securing privileged access](/windows-server/identity/securing-privileged-access/securing-privileged-access).

articles/active-directory/saas-apps/github-enterprise-managed-user-provisioning-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.author: thwimmer
2121
This tutorial describes the steps you need to perform in both GitHub Enterprise Managed User and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to GitHub Enterprise Managed User using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
2222

2323
> [!NOTE]
24-
> [GitHub Enterprise Managed Users](https://docs.github.com/enterprise-cloud@latest/admin/authentication/managing-your-enterprise-users-with-your-identity-provider/about-enterprise-managed-users) is a feature of GitHub Enterprise Cloud which is different from GitHub Enterprise's standard SAML SSO and user provisioning implementation. If you haven't specifically requested EMU instance, you have standard GitHub Enterprise Cloud plan. In that case, please refer to [the documentation](./github-provisioning-tutorial.md) to configure user provisioning in your non-EMU organisation. User provisioning is not supported for [GitHub Enteprise Accounts](https://docs.github.com/enterprise-cloud@latest/admin/overview/about-enterprise-accounts)
24+
> [GitHub Enterprise Managed Users](https://docs.github.com/enterprise-cloud@latest/admin/authentication/managing-your-enterprise-users-with-your-identity-provider/about-enterprise-managed-users) is a feature of GitHub Enterprise Cloud which is different from GitHub Enterprise's standard SAML SSO and user provisioning implementation. If you haven't specifically requested an EMU instance, you have a standard GitHub Enterprise Cloud plan. In that case, please refer to [the documentation](./github-provisioning-tutorial.md) to configure user provisioning in your non-EMU organization. User provisioning is not supported for [GitHub Enterprise Accounts](https://docs.github.com/enterprise-cloud@latest/admin/overview/about-enterprise-accounts)
2525
2626
## Capabilities Supported
2727
> [!div class="checklist"]
@@ -172,4 +172,4 @@ Once you've configured provisioning, use the following resources to monitor your
172172

173173
## Next steps
174174

175-
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)
175+
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)

articles/active-directory/saas-apps/ibmid-tutorial.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with IBMid | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with IBMid'
33
description: Learn how to configure single sign-on between Azure Active Directory and IBMid.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/22/2021
12+
ms.date: 04/08/2022
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with IBMid
17+
# Tutorial: Azure AD SSO integration with IBMid
1818

1919
In this tutorial, you'll learn how to integrate IBMid with Azure Active Directory (Azure AD). When you integrate IBMid with Azure AD, you can:
2020

@@ -98,7 +98,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9898
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
9999

100100
In the **Sign-on URL** text box, type the URL:
101-
`https://myibm.ibm.com/`
101+
`https://login.ibm.com`
102102

103103
1. Click **Save**.
104104

@@ -115,7 +115,6 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
115115
| lastName | user.surname |
116116
| emailAddress | user.mail |
117117

118-
119118
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
120119

121120
![The Certificate download link](common/metadataxml.png)
@@ -172,7 +171,6 @@ In this section, you test your Azure AD single sign-on configuration with follow
172171

173172
You can also use Microsoft My Apps to test the application in any mode. When you click the IBMid tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the IBMid for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
174173

175-
176174
## Next steps
177175

178-
Once you configure IBMid you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
176+
Once you configure IBMid you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

articles/active-directory/saas-apps/informatica-platform-tutorial.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 03/23/2022
12+
ms.date: 04/08/2022
1313
ms.author: jeedes
1414

1515
---
@@ -77,17 +77,23 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7777

7878
1. On the **Basic SAML Configuration** section, perform the following steps:
7979

80-
a. In the **Identifier** text box, type the value:
81-
`Informatica`
80+
a. In the **Identifier** text box, type the following value or URL pattern:
81+
82+
| App | URL |
83+
|--------|------|
84+
| For EDC | `Informatica` |
85+
| For Axon | `https://<host name: port number>/saml/metadata`
8286

8387
b. In the **Reply URL** text box, type a URL using the following pattern:
8488
`https://<host name: port number>/administrator/Login.do`
8589

86-
c. In the **Sign-on URL** text box, type a URL using the following pattern:
90+
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
91+
92+
In the **Sign-on URL** text box, type a URL using the following pattern:
8793
`https://<host name: port number>/administrator/saml/login`
8894

8995
> [!NOTE]
90-
> These values are not real. Update these values with the actual Reply URL and Sign-on URL. Contact [Informatica Platform Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
96+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Informatica Platform Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9197

9298
1. Informatica Platform application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
9399

0 commit comments

Comments
 (0)