Skip to content

Commit ba082ee

Browse files
authored
Merge pull request #212682 from MicrosoftDocs/main
9/27 AM Publish
2 parents 8364e69 + 8556e54 commit ba082ee

File tree

152 files changed

+2160
-1314
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

152 files changed

+2160
-1314
lines changed

articles/active-directory/app-proxy/application-proxy-configure-cookie-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Azure Active Directory (Azure AD) has access and session cookies for accessing o
2424
| Cookie setting | Default | Description | Recommendations |
2525
| -------------- | ------- | ----------- | --------------- |
2626
| Use HTTP-Only Cookie | **No** | **Yes** allows Application Proxy to include the HTTPOnly flag in HTTP response headers. This flag provides additional security benefits, for example, it prevents client-side scripting (CSS) from copying or modifying the cookies.<br></br><br></br>Before we supported the HTTP-Only setting, Application Proxy encrypted and transmitted cookies over a secured TLS channel to protect against modification. | Use **Yes** because of the additional security benefits.<br></br><br></br>Use **No** for clients or user agents that do require access to the session cookie. For example, use **No** for an RDP or MTSC client that connects to a Remote Desktop Gateway server through Application Proxy.|
27-
| Use Secure Cookie | **No** | **Yes** allows Application Proxy to include the Secure flag in HTTP response headers. Secure Cookies enhances security by transmitting cookies over a TLS secured channel such as HTTPS. This prevents cookies from being observed by unauthorized parties due to the transmission of the cookie in clear text. | Use **Yes** because of the additional security benefits.|
27+
| Use Secure Cookie | **Yes** | **Yes** allows Application Proxy to include the Secure flag in HTTP response headers. Secure Cookies enhances security by transmitting cookies over a TLS secured channel such as HTTPS. This prevents cookies from being observed by unauthorized parties due to the transmission of the cookie in clear text. | Use **Yes** because of the additional security benefits.|
2828
| Use Persistent Cookie | **No** | **Yes** allows Application Proxy to set its access cookies to not expire when the web browser is closed. The persistence lasts until the access token expires, or until the user manually deletes the persistent cookies. | Use **No** because of the security risk associated with keeping users authenticated.<br></br><br></br>We suggest only using **Yes** for older applications that can't share cookies between processes. It's better to update your application to handle sharing cookies between processes instead of using persistent cookies. For example, you might need persistent cookies to allow a user to open Office documents in explorer view from a SharePoint site. Without persistent cookies, this operation might fail if the access cookies aren't shared between the browser, the explorer process, and the Office process. |
2929

3030
## SameSite Cookies

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,8 +90,8 @@ Before you can block legacy authentication in your directory, you need to first
9090
#### Indicators from Azure AD
9191

9292
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-in logs**.
93-
1. Add the Client App column if it isn't shown by clicking on **Columns** > **Client App**.
94-
1. **Add filters** > **Client App** > select all of the legacy authentication protocols. Select outside the filtering dialog box to apply your selections and close the dialog box.
93+
1. Add the **Client App** column if it isn't shown by clicking on **Columns** > **Client App**.
94+
1. Select **Add filters** > **Client App** > choose all of the legacy authentication protocols and select **Apply**.
9595
1. If you've activated the [new sign-in activity reports preview](../reports-monitoring/concept-all-sign-ins.md), repeat the above steps also on the **User sign-ins (non-interactive)** tab.
9696

9797
Filtering will only show you sign-in attempts that were made by legacy authentication protocols. Clicking on each individual sign-in attempt will show you more details. The **Client App** field under the **Basic Info** tab will indicate which legacy authentication protocol was used.

articles/active-directory/devices/manage-stale-devices.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 06/01/2022
9+
ms.date: 09/27/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -63,6 +63,9 @@ You have two options to retrieve the value of the activity timestamp:
6363

6464
To efficiently clean up stale devices in your environment, you should define a related policy. This policy helps you to ensure that you capture all considerations that are related to stale devices. The following sections provide you with examples for common policy considerations.
6565

66+
> [!CAUTION]
67+
> If your organization uses BitLocker drive encryption, you should ensure that BitLocker recovery keys are either backed up or no longer needed before deleting devices. Failure to do this may cause loss of data.
68+
6669
### Cleanup account
6770

6871
To update a device in Azure AD, you need an account that has one of the following roles assigned:
@@ -83,7 +86,7 @@ It isn't advisable to immediately delete a device that appears to be stale becau
8386

8487
### MDM-controlled devices
8588

86-
If your device is under control of Intune or any other MDM solution, retire the device in the management system before disabling or deleting it. For more information see the article [Remove devices by using wipe, retire, or manually unenrolling the device](/mem/intune/remote-actions/devices-wipe).
89+
If your device is under control of Intune or any other MDM solution, retire the device in the management system before disabling or deleting it. For more information, see the article [Remove devices by using wipe, retire, or manually unenrolling the device](/mem/intune/remote-actions/devices-wipe).
8790

8891
### System-managed devices
8992

articles/active-directory/external-identities/user-properties.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,8 @@ It's possible to convert UserType from Member to Guest and vice-versa by editing
109109

110110
Guest users have [default restricted directory permissions](../fundamentals/users-default-permissions.md). They can manage their own profile, change their own password, and retrieve some information about other users, groups, and apps. However, they can't read all directory information.
111111

112+
B2B guest users are not supported in Microsoft Teams shared channels. For access to shared channels see [B2B direct connect.](b2b-direct-connect-overview.md)
113+
112114
There may be cases where you want to give your guest users higher privileges. You can add a guest user to any role and even remove the default guest user restrictions in the directory to give a user the same privileges as members. It's possible to turn off the default limitations so that a guest user in the company directory has the same permissions as a member user. For more information, check out the [Restrict guest access permissions in Azure Active Directory](../enterprise-users/users-restrict-guest-permissions.md) article.
113115

114116
![Screenshot showing the External users option in the user settings.](media/user-properties/remove-guest-limitations.png)
@@ -125,4 +127,4 @@ If a guest user accepts your invitation and they subsequently change their email
125127

126128
* [What is Azure AD B2B collaboration?](what-is-b2b.md)
127129
* [B2B collaboration user tokens](user-token.md)
128-
* [B2B collaboration user claims mapping](claims-mapping.md)
130+
* [B2B collaboration user claims mapping](claims-mapping.md)

articles/active-directory/fundamentals/automate-provisioning-to-applications-introduction.md

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -19,15 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# Introduction
2121

22-
These articles are for:
23-
24-
* Architects
25-
26-
* Microsoft partners
27-
28-
* IT professionals
29-
30-
The article provides information for decision makers addressing identity [provisioning](https://www.gartner.com/en/information-technology/glossary/user-provisioning) needs in their organizations, or the organizations they're working with. The content focuses on automating user provisioning for access to applications across all systems in your organization.
22+
The article helps architects, Microsoft partners, and IT professionals with information addressing identity [provisioning](https://www.gartner.com/en/information-technology/glossary/user-provisioning) needs in their organizations, or the organizations they're working with. The content focuses on automating user provisioning for access to applications across all systems in your organization.
3123

3224
Employees in an organization rely on many applications to perform their work. These applications often require IT admins or application owners to provision accounts before an employee can start accessing them. Organizations also need to manage the lifecycle of these accounts and keep them up to date with the latest information and remove accounts when users don't require them anymore.
3325

@@ -37,7 +29,7 @@ Thousands of organizations are running Azure AD cloud-hosted services, with its
3729

3830
![Typical deployment of MIM](media/automate-user-provisioning-to-applications-introduction/typical-mim-deployment.png)
3931

40-
Use the following table to find content specific to your scenario. For example, if you want employee and contractor identities management from an HR system to Active Directory (AD) or Azure Active Directory (Azure AD), follow the link to *Connect identities with your system of record*.
32+
Use the following table to find content specific to your scenario. For example, if you want employee and contractor identities management from an HR system to Active Directory Domain Services (AD DS) or Azure Active Directory (Azure AD), follow the link to *Connect identities with your system of record*.
4133

4234
| What | From | To | Read |
4335
| - | - | - | - |
@@ -83,7 +75,7 @@ In this example, the organization has users spread across multiple on-premises H
8375

8476
![Advanced hybrid deployment model](media/automate-user-provisioning-to-applications-introduction/hybrid-advanced.png)
8577

86-
1. MIM imports user information from each HR stem. MIM determines which users are needed for those employees in different directories. MIM provisions those identities in Active Directory.
78+
1. MIM imports user information from each HR stem. MIM determines which users are needed for those employees in different directories. MIM provisions those identities in AD DS.
8779

8880
2. Azure AD Connect Sync then synchronizes those users and groups to Azure AD and provides users access to their resources.
8981

articles/active-directory/fundamentals/automate-provisioning-to-applications-solutions.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222
This article presents solutions that enable you to:
2323

2424
* Connect identities with your system of record
25-
* Synchronize identities between Active Directory (AD) and Azure Active Directory (Azure AD)
25+
* Synchronize identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)
2626
* Automate provisioning of users into non-Microsoft applications
2727

2828
## Connect identities with your system of record
@@ -31,17 +31,17 @@ In most designs, the human resources (HR) system is the source-of-authority for
3131

3232
### Synchronizing identities with cloud HR
3333

34-
The Azure AD provisioning service enables organizations to [bring identities from popular HR systems](../app-provisioning/what-is-hr-driven-provisioning.md) (examples: [Workday](../saas-apps/workday-inbound-tutorial.md) and [SuccessFactors](../saas-apps/sap-successfactors-inbound-provisioning-cloud-only-tutorial.md)), into Azure AD directly, or into Active Directory Domain Services. This provisioning capability enables new hires to access the resources they need from the first day of work.
34+
The Azure AD provisioning service enables organizations to [bring identities from popular HR systems](../app-provisioning/what-is-hr-driven-provisioning.md) (examples: [Workday](../saas-apps/workday-inbound-tutorial.md) and [SuccessFactors](../saas-apps/sap-successfactors-inbound-provisioning-cloud-only-tutorial.md)), into Azure AD directly, or into AD DS. This provisioning capability enables new hires to access the resources they need from the first day of work.
3535

3636
### On-premises HR + joining multiple data sources
3737

3838
To create a full user profile for an employee identity, organizations often merge information from multiple HR systems, databases, and other user data stores. MIM provides a rich set of [connectors](https://learn.microsoft.com/microsoft-identity-manager/supported-management-agents) and integration solutions interoperating with heterogeneous platforms.
3939

40-
MIM offers [rule extension](/previous-versions/windows/desktop/forefront-2010/ms698810(v=vs.100)?redirectedfrom=MSDN) and [workflow capabilities](https://microsoft.github.io/MIMWAL/) features for advanced scenarios requiring data transformation and consolidation from multiple sources. These connectors, rule extensions, and workflow capabilities enable organizations to aggregate user data in the MIM metaverse to form a single identity for each user. The identity can be [provisioned into downstream systems](/microsoft-identity-manager/microsoft-identity-manager-2016-supported-platforms) such as Active Directory Domain Services.
40+
MIM offers [rule extension](/previous-versions/windows/desktop/forefront-2010/ms698810(v=vs.100)?redirectedfrom=MSDN) and [workflow capabilities](https://microsoft.github.io/MIMWAL/) features for advanced scenarios requiring data transformation and consolidation from multiple sources. These connectors, rule extensions, and workflow capabilities enable organizations to aggregate user data in the MIM metaverse to form a single identity for each user. The identity can be [provisioned into downstream systems](/microsoft-identity-manager/microsoft-identity-manager-2016-supported-platforms) such as AD DS.
4141

4242
![Systems of record model](media/automate-user-provisioning-to-applications-solutions/system-of-record.png)
4343

44-
## Synchronize identities between Active Directory and Azure AD
44+
## Synchronize identities between Active Directory Domain Services (AD DS) and Azure AD
4545

4646
As customers move applications to the cloud, and integrate with Azure AD, users often need accounts in Azure AD, and AD to access the applications for their work. Here are five common scenarios in which objects need to be synchronized between AD and Azure AD.
4747

@@ -53,7 +53,7 @@ Use the numbered sections in the next two section to cross reference the followi
5353

5454
1. For users in AD that need access to Office 365 or other applications that are connected to Azure AD, Azure AD Connect cloud sync is the first solution to explore. It provides a lightweight solution to create users in Azure AD, manage password rests, and synchronize groups. Configuration and management are primarily done in the cloud, minimizing your on-premises footprint. It provides high-availability and automatic failover, ensuring password resets and synchronization continue, even if there's an issue with on-premises servers.
5555

56-
1. For complex, large-scale AD to Azure AD sync needs such as synchronizing groups over 50 K and device sync, customers can use Azure AD Connect sync to meet their needs.
56+
1. For complex, large-scale AD to Azure AD sync needs such as synchronizing groups over 50,000 and device sync, customers can use Azure AD Connect sync to meet their needs.
5757

5858
**Synchronize identities from Azure AD into AD**
5959

@@ -67,10 +67,10 @@ As customers transition identity management to the cloud, more users and groups
6767

6868
|No.| What | From | To | Technology |
6969
| - | - | - | - | - |
70-
| 1 |Users, groups| AD| Azure AD| [Azure AD Connect Cloud Sync](https://learn.microsoft.com/azure/active-directory/cloud-sync/what-is-cloud-sync) |
71-
| 2 |Users, groups, devices| AD| Azure AD| [Azure AD Connect Sync](https://learn.microsoft.com/azure/active-directory/hybrid/whatis-azure-ad-connect) |
72-
| 3 |Groups| Azure AD| AD| [Azure AD Connect Sync](../hybrid/how-to-connect-group-writeback-v2.md) |
73-
| 4 |Guest accounts| Azure AD| AD| [MIM](/microsoft-identity-manager/microsoft-identity-manager-2016-graph-b2b-scenario) |
70+
| 1 |Users, groups| AD DS| Azure AD| [Azure AD Connect Cloud Sync](https://learn.microsoft.com/azure/active-directory/cloud-sync/what-is-cloud-sync) |
71+
| 2 |Users, groups, devices| AD DS| Azure AD| [Azure AD Connect Sync](https://learn.microsoft.com/azure/active-directory/hybrid/whatis-azure-ad-connect) |
72+
| 3 |Groups| Azure AD| AD DS| [Azure AD Connect Sync](../hybrid/how-to-connect-group-writeback-v2.md) |
73+
| 4 |Guest accounts| Azure AD| AD DS| [MIM](/microsoft-identity-manager/microsoft-identity-manager-2016-graph-b2b-scenario) |
7474
| 5 |Users, groups| Azure AD| Managed AD| [Azure AD Domain Services](https://azure.microsoft.com/services/active-directory-ds/) |
7575

7676
The table depicts common scenarios and the recommended technology.

articles/active-directory/fundamentals/custom-security-attributes-overview.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,13 @@ Currently, you can add custom security attributes for the following Azure AD obj
5555
- Azure AD enterprise applications (service principals)
5656
- Managed identities for Azure resources
5757

58-
## How do custom security attributes compare with directory schema extensions?
58+
## How do custom security attributes compare with directory extensions?
5959

60-
Here are some ways that custom security attributes compare with [directory schema extensions](../develop/active-directory-schema-extensions.md):
60+
Here are some ways that custom security attributes compare with [directory extensions](../develop/active-directory-schema-extensions.md):
6161

62-
- Directory schema extensions cannot be used for authorization scenarios and attributes because the access control for the extension attributes is tied to the Azure AD object. Custom security attributes can be used for authorization and attributes needing access control because the custom security attributes can be managed and protected through separate permissions.
63-
- Directory schema extensions are tied to an application and share the lifecycle of an application. Custom security attributes are tenant wide and not tied to an application.
64-
- Directory schema extensions support assigning a single value to an attribute. Custom security attributes support assigning multiple values to an attribute.
62+
- Directory extensions cannot be used for authorization scenarios and attributes because the access control for the extension attributes is tied to the Azure AD object. Custom security attributes can be used for authorization and attributes needing access control because the custom security attributes can be managed and protected through separate permissions.
63+
- Directory extensions are tied to an application and share the lifecycle of an application. Custom security attributes are tenant wide and not tied to an application.
64+
- Directory extensions support assigning a single value to an attribute. Custom security attributes support assigning multiple values to an attribute.
6565

6666
## Steps to use custom security attributes
6767

@@ -168,9 +168,11 @@ Azure AD provides built-in roles to work with custom security attributes. The At
168168
> [!IMPORTANT]
169169
> By default, [Global Administrator](../roles/permissions-reference.md#global-administrator) and other administrator roles do not have permissions to read, define, or assign custom security attributes.
170170
171-
## Graph Explorer
171+
## Microsoft Graph APIs
172+
173+
You can manage custom security attributes programmatically using Microsoft Graph APIs. For more information, see [Overview of custom security attributes using the Microsoft Graph API](/graph/api/resources/custom-security-attributes-overview).
172174

173-
If you use the Microsoft Graph API, you can use [Graph Explorer](/graph/graph-explorer/graph-explorer-overview) to more easily try the Microsoft Graph APIs for custom security attributes. For more information, see [Overview of custom security attributes using the Microsoft Graph API](/graph/api/resources/custom-security-attributes-overview).
175+
You can use an API client such as [Graph Explorer](/graph/graph-explorer/graph-explorer-overview) or Postman to more easily try the Microsoft Graph APIs for custom security attributes.
174176

175177
![Screenshot that shows a Microsoft Graph API call for custom security attributes.](./media/custom-security-attributes-overview/graph-explorer-success.png)
176178

Loading

0 commit comments

Comments
 (0)