Skip to content

Commit b56dc09

Browse files
authored
Merge pull request #238044 from MicrosoftDocs/main
5/12 PM Publish
2 parents 8269b4a + 169ce91 commit b56dc09

File tree

134 files changed

+4414
-1013
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

134 files changed

+4414
-1013
lines changed

.openpublishing.redirection.virtual-desktop.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,16 @@
174174
"source_path_from_root": "/articles/virtual-desktop/environment-setup.md",
175175
"redirect_url": "/azure/virtual-desktop/terminology",
176176
"redirect_document_id": false
177+
},
178+
{
179+
"source_path_from_root": "/articles/virtual-desktop/app-attach-image-prep.md",
180+
"redirect_url": "/azure/virtual-desktop/msix-app-attach-create-msix-image",
181+
"redirect_document_id": true
182+
},
183+
{
184+
"source_path_from_root": "/articles/virtual-desktop/app-attach-msixmgr.md",
185+
"redirect_url": "/azure/virtual-desktop/msix-app-attach-create-msix-image",
186+
"redirect_document_id": false
177187
}
178188
]
179189
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Azure AD provisioning to applications via web services connector
3+
description: This document describes how to configure Azure AD to provision users with external systems that offer web services based APIs.
4+
services: active-directory
5+
author: billmath
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.subservice: app-provisioning
9+
ms.topic: how-to
10+
ms.workload: identity
11+
ms.date: 05/11/2023
12+
ms.author: billmath
13+
ms.reviewer: arvinh
14+
---
15+
16+
17+
# Provisioning with the web services connector
18+
The following documentation provides information about the generic web services connector. Microsoft Entra Identity Governance supports provisioning accounts into various applications such as SAP ECC, Oracle eBusiness Suite, and line of business applications that expose REST or SOAP APIs. Customers that have previously deployed MIM to connect to these applications can easily switch to using the lightweight Azure AD provisioning agent, while reusing the same web services connector built for MIM.
19+
20+
## Capabilities supported
21+
22+
> [!div class="checklist"]
23+
> - Create users in your application.
24+
> - Remove users in your application when they don't need access anymore.
25+
> - Keep user attributes synchronized between Azure AD and your application.
26+
> - Discover the schema for your application.
27+
28+
The web services connector implements the following functionalities:
29+
30+
- SOAP Discovery: Allows the administrator to enter the WSDL path exposed by the target web service. Discovery will produce a tree structure of its hosted web services with their inner endpoint(s)/operations along with the operation’s Meta data description. There's no limit to the number of discovery operations that can be done (step by step). The discovered operations are used later to configure the flow of operations that implement the connector’s operations against the data-source (as Import/Export).
31+
32+
- REST Discovery: Allows the administrator to enter Restful service details i.e. Service Endpoint, Resource Path, Method and Parameter details. A user can add an unlimited number of Restful services. The rest services information will be stored in the ```discovery.xml``` file of the ```wsconfig``` project. They'll be used later by the user to configure the Rest Web Service activity in the workflow.
33+
34+
- Connector Space Schema configuration: Allows the administrator to configure the connector space schema. The schema configuration will include a listing of Object Types and attributes for a specific implementation. The administrator can specify the object types that will be supported by the Web Service MA. The administrator may also choose here the attributes that will be part of the Connector space Schema.
35+
36+
- Operation Flow configuration: Workflow designer UI for configuring the implementation of FIM operations (Import/Export) per object type through exposed web service operations functions such as:
37+
38+
- Assignment of parameters from connector space to web service functions.
39+
- Assignment of parameters from web service functions to the connector space.
40+
41+
42+
## Documentation for popular applications
43+
Integrations with popular applications such as SAP ECC and Oracle eBusiness Suite can be found [here](https://www.microsoft.com/download/details.aspx?id=51495). You can also configure a template to connect to your own [rest or SOAP API](/microsoft-identity-manager/reference/microsoft-identity-manager-2016-ma-ws).
44+
45+
46+
For more information, see [the Overview of the generic Web Service connector](/microsoft-identity-manager/reference/microsoft-identity-manager-2016-ma-ws) in the MIM documentation library.
47+
48+
## Next steps
49+
50+
- [App provisioning](user-provisioning.md)
51+
- [ECMA Connector Host generic SQL connector](tutorial-ecma-sql-connector.md)
52+
- [ECMA Connector Host LDAP connector](on-premises-ldap-connector-configure.md)

articles/active-directory/app-provisioning/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ items:
3131
href: on-premises-ldap-connector-configure.md
3232
- name: Provisioning to PowerShell based apps
3333
href: on-premises-powershell-connector.md
34+
- name: Provisioning with the web services connector
35+
href: on-premises-web-services-connector.md
3436
- name: Customize attribute mappings
3537
href: customize-application-attributes.md
3638
- name: Concepts

articles/active-directory/develop/custom-extension-get-started.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -285,10 +285,6 @@ Next, you register the custom extension. You register the custom extension by as
285285
"@odata.type": "#microsoft.graph.azureAdTokenAuthentication",
286286
"resourceId": "{functionApp_IdentifierUri}"
287287
},
288-
"clientConfiguration": {
289-
"timeoutInMilliseconds": 2000,
290-
"maximumRetries": 1
291-
},
292288
"claimsForTokenConfiguration": [
293289
{
294290
"claimIdInApiResponse": "DateOfBirth"

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
title: Create an Azure AD app and service principal in the portal
33
description: Create a new Azure Active Directory app and service principal to manage access to resources with role-based access control in Azure Resource Manager.
44
services: active-directory
5-
author: rwike77
5+
author: cilwerner
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
11-
ms.date: 02/01/2023
11+
ms.date: 05/12/2023
1212
ms.author: cwerner
1313
ms.custom: aaddev, identityplatformtop40, subject-rbac-steps, devx-track-arm-template
1414
---
@@ -81,11 +81,23 @@ When programmatically signing in, pass the tenant ID and the application ID in y
8181

8282
## Set up authentication
8383

84-
There are two types of authentication available for service principals: password-based authentication (application secret) and certificate-based authentication. *We recommend using a certificate*, but you can also create an application secret.
84+
There are two types of authentication available for service principals: password-based authentication (application secret) and certificate-based authentication. *We recommend using a trusted certificate issued by a certificate authority*, but you can also create an application secret or create a self-signed certificate for testing.
8585

86-
### Option 1 (recommended): Create and upload a self-signed certificate
86+
### Option 1 (recommended): Upload a trusted certificate issued by a certificate authority
8787

88-
You can use an existing certificate if you've one. Optionally, you can create a self-signed certificate for *testing purposes only*. To create a self-signed certificate, open Windows PowerShell and run [New-SelfSignedCertificate](/powershell/module/pki/new-selfsignedcertificate) with the following parameters to create the certificate in the user certificate store on your computer:
88+
To upload the certificate file:
89+
90+
1. Search for and select **Azure Active Directory**.
91+
1. From **App registrations** in Azure AD, select your application.
92+
1. Select **Certificates & secrets**.
93+
1. Select **Certificates**, then select **Upload certificate** and then select the certificate file to upload.
94+
1. Select **Add**. Once the certificate is uploaded, the thumbprint, start date, and expiration values are displayed.
95+
96+
After registering the certificate with your application in the application registration portal, enable the [confidential client application](authentication-flows-app-scenarios.md#single-page-public-client-and-confidential-client-applications) code to use the certificate.
97+
98+
### Option 2: Testing only- create and upload a self-signed certificate
99+
100+
Optionally, you can create a self-signed certificate for *testing purposes only*. To create a self-signed certificate, open Windows PowerShell and run [New-SelfSignedCertificate](/powershell/module/pki/new-selfsignedcertificate) with the following parameters to create the certificate in the user certificate store on your computer:
89101

90102
```powershell
91103
$cert=New-SelfSignedCertificate -Subject "CN=DaemonConsoleCert" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature
@@ -106,9 +118,9 @@ To upload the certificate:
106118
1. Select **Certificates**, then select **Upload certificate** and then select the certificate (an existing certificate or the self-signed certificate you exported).
107119
1. Select **Add**.
108120

109-
After registering the certificate with your application in the application registration portal, enable the client application code to use the certificate.
121+
After registering the certificate with your application in the application registration portal, enable the [confidential client application](authentication-flows-app-scenarios.md#single-page-public-client-and-confidential-client-applications) code to use the certificate.
110122

111-
### Option 2: Create a new application secret
123+
### Option 3: Create a new application secret
112124

113125
If you choose not to use a certificate, you can create a new application secret.
114126

articles/active-directory/governance/customize-workflow-email.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ When customizing an email sent via Lifecycle workflows, you can choose to custom
5555

5656
1. Select the **Email Customization** tab.
5757

58-
1. On the email customization screen, enter a custom subject, message body, and the email language translation option that will be used to translate the message body of the email.
58+
1. On the email customization screen, enter a custom subject, message body, and the email language translation option that will be used to translate the message body of the email. The custom subject and message body will not be translated.
5959
:::image type="content" source="media/customize-workflow-email/customize-workflow-email-example.png" alt-text="Screenshot of an example of a customized email from a workflow.":::
6060
1. After making changes, select **save** to capture changes to the customized email.
6161

articles/active-directory/manage-apps/cloudflare-azure-ad-integration.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -152,4 +152,5 @@ See the [team domain](https://developers.cloudflare.com/cloudflare-one/glossary#
152152
## Next steps
153153

154154
- Go to developer.cloudflare.com for [Integrate SSO](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/)
155+
- [Tutorial: Configure Conditional Access policies for Cloudflare Access](cloudflare-conditional-access-policies.md)
155156
- [Tutorial: Configure Cloudflare Web Application Firewall with Azure AD B2C](../../active-directory-b2c/partner-cloudflare.md)
Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,90 @@
1+
---
2+
title: Tutorial to configure Conditional Access policies in Cloudflare Access
3+
description: Configure Conditional Access to enforce application and user policies in Cloudflare Access
4+
services: active-directory
5+
author: gargi-sinha
6+
manager: martinco
7+
ms.service: active-directory
8+
ms.subservice: app-mgmt
9+
ms.topic: how-to
10+
ms.workload: identity
11+
ms.date: 05/11/2023
12+
ms.author: gasinh
13+
ms.collection: M365-identity-device-management
14+
ms.custom: not-enterprise-apps
15+
---
16+
17+
# Tutorial: Configure Conditional Access policies in Cloudflare Access
18+
19+
With Conditional Access, administrators enforce policies on application and user policies in Azure Active Directory (Azure AD). Conditional Access brings together identity-driven signals, to make decisions, and enforce organizational policies. Cloudflare Access creates access to self-hosted, software as a service (SaaS), or nonweb applications.
20+
21+
Learn more: [What is Conditional Access?](../conditional-access/overview.md)
22+
23+
## Prerequisites
24+
25+
* An Azure AD subscription
26+
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
27+
* An Azure AD tenant linked to the Azure AD subscription
28+
* See, [Quickstart: Create a new tenant in Azure AD](../fundamentals/active-directory-access-create-new-tenant.md)
29+
* Global Administrator permissions
30+
* Configured users in the Azure AD subscription
31+
* A Cloudflare account
32+
* Go to dash.cloudflare.com to [Get started with Cloudflare](https://dash.cloudflare.com/sign-up?https%3A%2F%2Fone.dash.cloudflare.com%2F)
33+
34+
## Scenario architecture
35+
36+
* **Azure AD** - Identity Provider (IdP) that verifies user credentials and Conditional Access
37+
* **Application** - You created for IdP integration
38+
* **Cloudflare Access** - Provides access to applications
39+
40+
## Set up an identity provider
41+
42+
Go to developers.cloudflare.com to [set up Azure AD as an IdP](https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/azuread/#set-up-azure-ad-as-an-identity-provider).
43+
44+
> [!NOTE]
45+
> It's recommended you name the IdP integration in relation to the target application. For example, **Azure AD - Customer management portal**.
46+
47+
## Configure Conditional Access
48+
49+
1. Go to the [Azure portal](https://portal.azure.com/).
50+
2. Select **Azure Active Directory**.
51+
3. Under **Manage**, select **App registrations**.
52+
4. Select the application you created.
53+
5. Go to **Branding & properties**.
54+
6. For **Home page URL**, enter the application hostname.
55+
56+
![Screenshot of options and entries for branding and properties.](./media/cloudflare-conditional-access-policies/branding-properties.png)
57+
58+
7. Under **Manage**, select **Enterprise applications**.
59+
8. Select your application.
60+
9. Select **Properties**.
61+
10. For **Visible to users**, select **Yes**. This action enables the app to appear in App Launcher and in [My Apps](https://myapplications.microsoft.com/).
62+
11. Under **Security**, select **Conditional Access**.
63+
12. See, [Building a Conditional Access policy](../conditional-access/concept-conditional-access-policies.md).
64+
13. Create and enable other policies for the application.
65+
66+
## Create a Cloudflare Access application
67+
68+
Enforce Conditional Access policies on a Cloudflare Access application.
69+
70+
1. Go to dash.cloudflare.com to [sign in to Cloudflare](https://dash.cloudflare.com/login).
71+
2. In **Zero Trust**, go to **Access**.
72+
3. Select **Applications**.
73+
4. See, [Add a self-hosted application](https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/self-hosted-apps/).
74+
5. In **Application domain**, enter the protected application target URL.
75+
6. For **Identity providers**, select the IdP integration.
76+
77+
![Screenshot of the IdP integration selection on Identity providers.](./media/cloudflare-conditional-access-policies/identity-providers.png)
78+
79+
7. Create an Access policy. See, [Access policies](https://developers.cloudflare.com/cloudflare-one/policies/access/) and the following example.
80+
81+
![Screenshot of an example policy.](./media/cloudflare-conditional-access-policies/access-policy-example.png)
82+
83+
> [!NOTE]
84+
> Reuse the IdP integration for other applications if they require the same Conditional Access policies. For example, a baseline IdP integration with a Conditional Access policy requiring multifactor authentication and a modern authentication client. If an application requires specific Conditional Access policies, set up a dedicated IdP instance for that application.
85+
86+
## Next steps
87+
88+
* [What is Conditional Access?](../conditional-access/overview.md)
89+
* [Secure Hybrid Access with Azure AD partner integrations](secure-hybrid-access-integrations.md)
90+
* [Tutorial: Configure Cloudflare with Azure AD for secure hybrid access](cloudflare-azure-ad-integration.md)
11.9 KB
Loading
92.6 KB
Loading

0 commit comments

Comments
 (0)