Skip to content

Commit b7fd37f

Browse files
authored
Merge pull request #72364 from MicrosoftDocs/master
4/08 AM Publish
2 parents b9a72ac + 6d3ca9d commit b7fd37f

File tree

74 files changed

+1253
-653
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

74 files changed

+1253
-653
lines changed

articles/active-directory/b2b/one-time-passcode.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 1/25/2019
10+
ms.date: 04/08/2019
1111

1212
ms.author: mimart
1313
author: msmimart
1414
manager: mtillman
1515
ms.reviewer: mal
16-
ms.custom: "it-pro, seo-update-azuread-jan"
16+
ms.custom: "it-pro, seo-update-azuread-jan, seoapril2019"
1717
ms.collection: M365-identity-device-management
1818
---
1919

@@ -24,7 +24,7 @@ ms.collection: M365-identity-device-management
2424
| Email one-time passcode is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).|
2525
| |
2626

27-
The Email one-time passcode feature authenticates B2B guest users when they can't be authenticated through other means like Azure AD, a Microsoft account (MSA), or Google federation. With one-time passcode authentication, there's no need to create a Microsoft account. When the guest user redeems an invitation or accesses a shared resource, they can request a temporary code, which is sent to their email address. Then they enter this code to continue signing in.
27+
This article describes how to enable Email one-time passcode authentication for B2B guest users. The Email one-time passcode feature authenticates B2B guest users when they can't be authenticated through other means like Azure AD, a Microsoft account (MSA), or Google federation. With one-time passcode authentication, there's no need to create a Microsoft account. When the guest user redeems an invitation or accesses a shared resource, they can request a temporary code, which is sent to their email address. Then they enter this code to continue signing in.
2828

2929
This feature is currently available for preview (see [Opting in to the preview](#opting-in-to-the-preview) below). After preview, this feature will be turned on by default for all tenants.
3030

articles/active-directory/b2b/user-properties.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
---
2-
title: Properties of a B2B collaboration user - Azure Active Directory | Microsoft Docs
3-
description: Azure Active Directory B2B collaboration user properties are configurable
2+
title: Properties of a B2B guest user - Azure Active Directory | Microsoft Docs
3+
description: Azure Active Directory B2B guest user properties and states before and after invitation redemption
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 02/12/2019
9+
ms.date: 04/08/2019
1010

1111
ms.author: mimart
1212
author: msmimart
1313
manager: daveba
1414
ms.reviewer: sasubram
15-
ms.custom: "it-pro, seo-update-azuread-jan"
15+
ms.custom: "it-pro, seo-update-azuread-jan, seoapril2019"
1616
ms.collection: M365-identity-device-management
1717
---
1818

1919
# Properties of an Azure Active Directory B2B collaboration user
2020

21-
An Azure Active Directory (Azure AD) business-to-business (B2B) collaboration user is a user with UserType = Guest. This guest user typically is from a partner organization and has limited privileges in the inviting directory, by default.
21+
This article describes the properties and states of the B2B guest user object in Azure Active Directory (Azure AD) before and after invitation redemption. An Azure AD business-to-business (B2B) collaboration user is a user with UserType = Guest. This guest user typically is from a partner organization and has limited privileges in the inviting directory, by default.
2222

2323
Depending on the inviting organization's needs, an Azure AD B2B collaboration user can be in one of the following account states:
2424

articles/active-directory/develop/howto-app-gallery-listing.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,16 +14,18 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: identity
17-
ms.date: 02/15/2019
17+
ms.date: 04/08/2019
1818
ms.author: celested
1919
ms.reviewer: elisol, bryanla
20-
ms.custom: aaddev
20+
ms.custom: "aaddev, seoapril2019"
2121

2222
ms.collection: M365-identity-device-management
2323
---
2424

2525
# How to: List your application in the Azure Active Directory application gallery
2626

27+
This article shows how to list an application in the Azure AD application gallery, implement single sign-on (SSO), and manage the listing.
28+
2729
## What is the Azure AD application gallery?
2830

2931
- Customers find the best possible single sign-on experience.

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,15 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 10/24/2018
15+
ms.date: 04/08/2019
1616
ms.author: celested
1717
ms.reviewer: tomfitz
18-
18+
ms.custom: seoapril2019
1919
ms.collection: M365-identity-device-management
2020
---
2121
# How to: Use the portal to create an Azure AD application and service principal that can access resources
2222

23-
When you have code that needs to access or modify resources, you can create an identity for the app. This identity is known as a service principal. You can then assign the required permissions to the service principal. This article shows you how to use the portal to create the service principal. It focuses on a single-tenant application where the application is intended to run within only one organization. You typically use single-tenant applications for line-of-business applications that run within your organization.
23+
This article shows you how to create a new Azure Active Directory application and service principal that can be used with the role-based access control. When you have code that needs to access or modify resources, you can create an identity for the app. This identity is known as a service principal. You can then assign the required permissions to the service principal. This article shows you how to use the portal to create the service principal. It focuses on a single-tenant application where the application is intended to run within only one organization. You typically use single-tenant applications for line-of-business applications that run within your organization.
2424

2525
> [!IMPORTANT]
2626
> Instead of creating a service principal, consider using managed identities for Azure resources for your application identity. If your code runs on a service that supports managed identities and accesses resources that support Azure Active Directory (Azure AD) authentication, managed identities are a better option for you. To learn more about managed identities for Azure resources, including which services currently support it, see [What is managed identities for Azure resources?](../managed-identities-azure-resources/overview.md).

articles/active-directory/saas-apps/agiloft-tutorial.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -163,13 +163,13 @@ To configure Azure AD single sign-on with Agiloft, perform the following steps:
163163

164164
![Agiloft Configuration](./media/agiloft-tutorial/setup4.png)
165165

166-
a. In **IdP Entity Id / Issuer** textbox, paste the value of **Azure Ad Identifier**, which you have copied from Azure portal.
166+
a. In **IdP Entity Id / Issuer** textbox, paste the value of **Azure Ad Identifier**, which you have copied from Azure portal.
167167

168-
b. In **IdP Login URL** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
168+
b. In **IdP Login URL** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
169169

170-
c. In **IdP Logout URL** textbox, paste the value of **Logout URL**, which you have copied from Azure portal.
170+
c. In **IdP Logout URL** textbox, paste the value of **Logout URL**, which you have copied from Azure portal.
171171

172-
d. Open your **base-64 encoded certificate** in notepad downloaded from Azure portal, copy the content of it into your clipboard, and then paste it to the **IdP Provided X.509 certificate contents** textbox.
172+
d. Open your **base-64 encoded certificate** in notepad downloaded from Azure portal, copy the content of it into your clipboard, and then paste it to the **IdP Provided X.509 certificate contents** textbox.
173173

174174
e. Click **Finish**.
175175

articles/active-directory/saas-apps/appraisd-tutorial.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ To configure Azure AD single sign-on with Appraisd, perform the following steps:
158158

159159
1. In a different web browser window, sign in to Appraisd as a Security Administrator.
160160

161-
2. On the top right of the page, click on **Settings** icon, then navigate to **Configuration**.
161+
2. On the top right of the page, click on **Settings** icon, then navigate to **Configuration**.
162162

163163
![image](./media/appraisd-tutorial/tutorial_appraisd_sett.png)
164164

@@ -170,9 +170,9 @@ To configure Azure AD single sign-on with Appraisd, perform the following steps:
170170

171171
![image](./media/appraisd-tutorial/tutorial_appraisd_saml.png)
172172

173-
a. Copy the **Default Relay State** value and paste it in **Relay State** textbox in **Basic SAML Configuration** on Azure portal.
173+
a. Copy the **Default Relay State** value and paste it in **Relay State** textbox in **Basic SAML Configuration** on Azure portal.
174174

175-
b. Copy the **Service-initiated login URL** value and paste it in **Sign-on URL** textbox in **Basic SAML Configuration** on Azure portal.
175+
b. Copy the **Service-initiated login URL** value and paste it in **Sign-on URL** textbox in **Basic SAML Configuration** on Azure portal.
176176

177177
5. Scroll down the same page under **Identifying users**, perform the following steps:
178178

@@ -182,7 +182,7 @@ To configure Azure AD single sign-on with Appraisd, perform the following steps:
182182

183183
b. In the **Identity Provider Issuer URL** textbox, paste the value of **Azure Ad Identifier**, which you have copied from the Azure portal and click **Save**.
184184

185-
c. In Notepad, open the base-64 encoded certificate that you downloaded from the Azure portal, copy its content, and then paste it into the **X.509 Certificate** box and click **Save**.
185+
c. In Notepad, open the base-64 encoded certificate that you downloaded from the Azure portal, copy its content, and then paste it into the **X.509 Certificate** box and click **Save**.
186186

187187
### Create an Azure AD test user
188188

@@ -243,11 +243,11 @@ To enable Azure AD users sign in to Appraisd, they must be provisioned into Appr
243243

244244
1. Sign in to Appraisd as a Security Administrator.
245245

246-
2. On the top right of the page, click on **Settings** icon, then navigate to **Administration centre**.
246+
2. On the top right of the page, click on **Settings** icon, then navigate to **Administration centre**.
247247

248248
![image](./media/appraisd-tutorial/tutorial_appraisd_admin.png)
249249

250-
3. In the toolbar at the top of the page, click **People**, then navigate to **Add a new user**.
250+
3. In the toolbar at the top of the page, click **People**, then navigate to **Add a new user**.
251251

252252
![image](./media/appraisd-tutorial/tutorial_appraisd_user.png)
253253

articles/active-directory/saas-apps/cisco-spark-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ To configure Azure AD single sign-on with Cisco Webex, perform the following ste
112112
> [!NOTE]
113113
> This Identifier value is not real. Update this value with the actual Identifier. If you have Service Provider Metadata, upload it in the **Basic SAML Configuration** section then the **Identifier (Entity ID)** value gets auto populated automatically.
114114

115-
5. Cisco Webex application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click on **Edit** icon to add the attributes.
115+
5. Cisco Webex application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click on **Edit** icon to add the attributes.
116116

117117
![image](common/edit-attribute.png)
118118

articles/active-directory/saas-apps/hackerone-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,9 @@ To configure Azure AD single sign-on with HackerOne, perform the following steps
143143

144144
a. In the **Email Domain** textbox, type a registered domain.
145145

146-
b. In  **Single Sign On URL** textboxes, paste the value of **Login URL** which you have copied from Azure portal.
146+
b. In **Single Sign On URL** textboxes, paste the value of **Login URL** which you have copied from Azure portal.
147147

148-
c. Open your downloaded **Certificate file** from Azure portal into Notepad, copy the content of it into your clipboard, and then paste it to the **X509 Certificate**  textbox.
148+
c. Open your downloaded **Certificate file** from Azure portal into Notepad, copy the content of it into your clipboard, and then paste it to the **X509 Certificate** textbox.
149149

150150
d. Click **Save**.
151151

articles/active-directory/saas-apps/helpscout-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ To configure Azure AD single sign-on with Help Scout, perform the following step
107107
b. **Reply URL** is the **Post-back URL (Assertion Consumer Service URL)** from Help Scout, starts with `https://`
108108

109109
> [!NOTE]
110-
> The values in these URLs are for demonstration only. You need to update these values from actual Reply URL and Identifier. You get these values from the **Single Sign-On** tab under Authentication section, which is explained later in the tutorial.
110+
> The values in these URLs are for demonstration only. You need to update these values from actual Reply URL and Identifier. You get these values from the **Single Sign-On** tab under Authentication section, which is explained later in the tutorial.
111111

112112
5. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
113113

@@ -153,7 +153,7 @@ To configure Azure AD single sign-on with Help Scout, perform the following step
153153

154154
![Configure Single Sign-On](./media/helpscout-tutorial/settings4.png)
155155

156-
a. In **Single Sign-On URL** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
156+
a. In **Single Sign-On URL** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
157157

158158
b. Click **Upload Certificate** to upload the **Certificate(Base64)** downloaded from Azure portal.
159159

articles/active-directory/saas-apps/mobileiron-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ To configure Azure AD single sign-on with MobileIron, perform the following step
9797

9898
![Edit Basic SAML Configuration](common/edit-urls.png)
9999

100-
4. On the **Basic SAML Configuration** section, perform the following steps if you wish to configure the application in **IDP** initiated mode:
100+
4. On the **Basic SAML Configuration** section, perform the following steps if you wish to configure the application in **IDP** initiated mode:
101101

102102
![MobileIron Domain and URLs single sign-on information](common/idp-intiated.png)
103103

0 commit comments

Comments
 (0)