You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Use HTTP-Only Cookie |**No**|**Yes** allows Application Proxy to include the HTTPOnly flag in HTTP response headers. This flag provides additional security benefits, for example, it prevents client-side scripting (CSS) from copying or modifying the cookies.<br></br><br></br>Before we supported the HTTP-Only setting, Application Proxy encrypted and transmitted cookies over a secured TLS channel to protect against modification. | Use **Yes** because of the additional security benefits.<br></br><br></br>Use **No** for clients or user agents that do require access to the session cookie. For example, use **No** for an RDP or MTSC client that connects to a Remote Desktop Gateway server through Application Proxy.|
27
-
| Use Secure Cookie |**No**|**Yes** allows Application Proxy to include the Secure flag in HTTP response headers. Secure Cookies enhances security by transmitting cookies over a TLS secured channel such as HTTPS. This prevents cookies from being observed by unauthorized parties due to the transmission of the cookie in clear text. | Use **Yes** because of the additional security benefits.|
27
+
| Use Secure Cookie |**Yes**|**Yes** allows Application Proxy to include the Secure flag in HTTP response headers. Secure Cookies enhances security by transmitting cookies over a TLS secured channel such as HTTPS. This prevents cookies from being observed by unauthorized parties due to the transmission of the cookie in clear text. | Use **Yes** because of the additional security benefits.|
28
28
| Use Persistent Cookie |**No**|**Yes** allows Application Proxy to set its access cookies to not expire when the web browser is closed. The persistence lasts until the access token expires, or until the user manually deletes the persistent cookies. | Use **No** because of the security risk associated with keeping users authenticated.<br></br><br></br>We suggest only using **Yes** for older applications that can't share cookies between processes. It's better to update your application to handle sharing cookies between processes instead of using persistent cookies. For example, you might need persistent cookies to allow a user to open Office documents in explorer view from a SharePoint site. Without persistent cookies, this operation might fail if the access cookies aren't shared between the browser, the explorer process, and the Office process. |
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/block-legacy-authentication.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,8 +90,8 @@ Before you can block legacy authentication in your directory, you need to first
90
90
#### Indicators from Azure AD
91
91
92
92
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-in logs**.
93
-
1. Add the Client App column if it isn't shown by clicking on **Columns** > **Client App**.
94
-
1.**Add filters** > **Client App** > select all of the legacy authentication protocols. Select outside the filtering dialog box to apply your selections and close the dialog box.
93
+
1. Add the **Client App** column if it isn't shown by clicking on **Columns** > **Client App**.
94
+
1.Select **Add filters** > **Client App** > choose all of the legacy authentication protocolsand select **Apply**.
95
95
1. If you've activated the [new sign-in activity reports preview](../reports-monitoring/concept-all-sign-ins.md), repeat the above steps also on the **User sign-ins (non-interactive)** tab.
96
96
97
97
Filtering will only show you sign-in attempts that were made by legacy authentication protocols. Clicking on each individual sign-in attempt will show you more details. The **Client App** field under the **Basic Info** tab will indicate which legacy authentication protocol was used.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/manage-stale-devices.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: devices
8
8
ms.topic: how-to
9
-
ms.date: 06/01/2022
9
+
ms.date: 09/27/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -63,6 +63,9 @@ You have two options to retrieve the value of the activity timestamp:
63
63
64
64
To efficiently clean up stale devices in your environment, you should define a related policy. This policy helps you to ensure that you capture all considerations that are related to stale devices. The following sections provide you with examples for common policy considerations.
65
65
66
+
> [!CAUTION]
67
+
> If your organization uses BitLocker drive encryption, you should ensure that BitLocker recovery keys are either backed up or no longer needed before deleting devices. Failure to do this may cause loss of data.
68
+
66
69
### Cleanup account
67
70
68
71
To update a device in Azure AD, you need an account that has one of the following roles assigned:
@@ -83,7 +86,7 @@ It isn't advisable to immediately delete a device that appears to be stale becau
83
86
84
87
### MDM-controlled devices
85
88
86
-
If your device is under control of Intune or any other MDM solution, retire the device in the management system before disabling or deleting it. For more information see the article [Remove devices by using wipe, retire, or manually unenrolling the device](/mem/intune/remote-actions/devices-wipe).
89
+
If your device is under control of Intune or any other MDM solution, retire the device in the management system before disabling or deleting it. For more information, see the article [Remove devices by using wipe, retire, or manually unenrolling the device](/mem/intune/remote-actions/devices-wipe).
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/user-properties.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,6 +109,8 @@ It's possible to convert UserType from Member to Guest and vice-versa by editing
109
109
110
110
Guest users have [default restricted directory permissions](../fundamentals/users-default-permissions.md). They can manage their own profile, change their own password, and retrieve some information about other users, groups, and apps. However, they can't read all directory information.
111
111
112
+
B2B guest users are not supported in Microsoft Teams shared channels. For access to shared channels see [B2B direct connect.](b2b-direct-connect-overview.md)
113
+
112
114
There may be cases where you want to give your guest users higher privileges. You can add a guest user to any role and even remove the default guest user restrictions in the directory to give a user the same privileges as members. It's possible to turn off the default limitations so that a guest user in the company directory has the same permissions as a member user. For more information, check out the [Restrict guest access permissions in Azure Active Directory](../enterprise-users/users-restrict-guest-permissions.md) article.
113
115
114
116

@@ -125,4 +127,4 @@ If a guest user accepts your invitation and they subsequently change their email
125
127
126
128
*[What is Azure AD B2B collaboration?](what-is-b2b.md)
127
129
*[B2B collaboration user tokens](user-token.md)
128
-
*[B2B collaboration user claims mapping](claims-mapping.md)
130
+
*[B2B collaboration user claims mapping](claims-mapping.md)
The article provides information for decision makers addressing identity [provisioning](https://www.gartner.com/en/information-technology/glossary/user-provisioning) needs in their organizations, or the organizations they're working with. The content focuses on automating user provisioning for access to applications across all systems in your organization.
22
+
The article helps architects, Microsoft partners, and IT professionals with information addressing identity [provisioning](https://www.gartner.com/en/information-technology/glossary/user-provisioning) needs in their organizations, or the organizations they're working with. The content focuses on automating user provisioning for access to applications across all systems in your organization.
31
23
32
24
Employees in an organization rely on many applications to perform their work. These applications often require IT admins or application owners to provision accounts before an employee can start accessing them. Organizations also need to manage the lifecycle of these accounts and keep them up to date with the latest information and remove accounts when users don't require them anymore.
33
25
@@ -37,7 +29,7 @@ Thousands of organizations are running Azure AD cloud-hosted services, with its
37
29
38
30

39
31
40
-
Use the following table to find content specific to your scenario. For example, if you want employee and contractor identities management from an HR system to Active Directory (AD) or Azure Active Directory (Azure AD), follow the link to *Connect identities with your system of record*.
32
+
Use the following table to find content specific to your scenario. For example, if you want employee and contractor identities management from an HR system to Active Directory Domain Services (AD DS) or Azure Active Directory (Azure AD), follow the link to *Connect identities with your system of record*.
41
33
42
34
| What | From | To | Read |
43
35
| - | - | - | - |
@@ -83,7 +75,7 @@ In this example, the organization has users spread across multiple on-premises H
1. MIM imports user information from each HR stem. MIM determines which users are needed for those employees in different directories. MIM provisions those identities in Active Directory.
78
+
1. MIM imports user information from each HR stem. MIM determines which users are needed for those employees in different directories. MIM provisions those identities in AD DS.
87
79
88
80
2. Azure AD Connect Sync then synchronizes those users and groups to Azure AD and provides users access to their resources.
This article presents solutions that enable you to:
23
23
24
24
* Connect identities with your system of record
25
-
* Synchronize identities between Active Directory (AD) and Azure Active Directory (Azure AD)
25
+
* Synchronize identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)
26
26
* Automate provisioning of users into non-Microsoft applications
27
27
28
28
## Connect identities with your system of record
@@ -31,17 +31,17 @@ In most designs, the human resources (HR) system is the source-of-authority for
31
31
32
32
### Synchronizing identities with cloud HR
33
33
34
-
The Azure AD provisioning service enables organizations to [bring identities from popular HR systems](../app-provisioning/what-is-hr-driven-provisioning.md) (examples: [Workday](../saas-apps/workday-inbound-tutorial.md) and [SuccessFactors](../saas-apps/sap-successfactors-inbound-provisioning-cloud-only-tutorial.md)), into Azure AD directly, or into Active Directory Domain Services. This provisioning capability enables new hires to access the resources they need from the first day of work.
34
+
The Azure AD provisioning service enables organizations to [bring identities from popular HR systems](../app-provisioning/what-is-hr-driven-provisioning.md) (examples: [Workday](../saas-apps/workday-inbound-tutorial.md) and [SuccessFactors](../saas-apps/sap-successfactors-inbound-provisioning-cloud-only-tutorial.md)), into Azure AD directly, or into AD DS. This provisioning capability enables new hires to access the resources they need from the first day of work.
35
35
36
36
### On-premises HR + joining multiple data sources
37
37
38
38
To create a full user profile for an employee identity, organizations often merge information from multiple HR systems, databases, and other user data stores. MIM provides a rich set of [connectors](https://learn.microsoft.com/microsoft-identity-manager/supported-management-agents) and integration solutions interoperating with heterogeneous platforms.
39
39
40
-
MIM offers [rule extension](/previous-versions/windows/desktop/forefront-2010/ms698810(v=vs.100)?redirectedfrom=MSDN) and [workflow capabilities](https://microsoft.github.io/MIMWAL/) features for advanced scenarios requiring data transformation and consolidation from multiple sources. These connectors, rule extensions, and workflow capabilities enable organizations to aggregate user data in the MIM metaverse to form a single identity for each user. The identity can be [provisioned into downstream systems](/microsoft-identity-manager/microsoft-identity-manager-2016-supported-platforms) such as Active Directory Domain Services.
40
+
MIM offers [rule extension](/previous-versions/windows/desktop/forefront-2010/ms698810(v=vs.100)?redirectedfrom=MSDN) and [workflow capabilities](https://microsoft.github.io/MIMWAL/) features for advanced scenarios requiring data transformation and consolidation from multiple sources. These connectors, rule extensions, and workflow capabilities enable organizations to aggregate user data in the MIM metaverse to form a single identity for each user. The identity can be [provisioned into downstream systems](/microsoft-identity-manager/microsoft-identity-manager-2016-supported-platforms) such as AD DS.
41
41
42
42

43
43
44
-
## Synchronize identities between Active Directory and Azure AD
44
+
## Synchronize identities between Active Directory Domain Services (AD DS) and Azure AD
45
45
46
46
As customers move applications to the cloud, and integrate with Azure AD, users often need accounts in Azure AD, and AD to access the applications for their work. Here are five common scenarios in which objects need to be synchronized between AD and Azure AD.
47
47
@@ -53,7 +53,7 @@ Use the numbered sections in the next two section to cross reference the followi
53
53
54
54
1. For users in AD that need access to Office 365 or other applications that are connected to Azure AD, Azure AD Connect cloud sync is the first solution to explore. It provides a lightweight solution to create users in Azure AD, manage password rests, and synchronize groups. Configuration and management are primarily done in the cloud, minimizing your on-premises footprint. It provides high-availability and automatic failover, ensuring password resets and synchronization continue, even if there's an issue with on-premises servers.
55
55
56
-
1. For complex, large-scale AD to Azure AD sync needs such as synchronizing groups over 50 K and device sync, customers can use Azure AD Connect sync to meet their needs.
56
+
1. For complex, large-scale AD to Azure AD sync needs such as synchronizing groups over 50,000 and device sync, customers can use Azure AD Connect sync to meet their needs.
57
57
58
58
**Synchronize identities from Azure AD into AD**
59
59
@@ -67,10 +67,10 @@ As customers transition identity management to the cloud, more users and groups
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/custom-security-attributes-overview.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,13 +55,13 @@ Currently, you can add custom security attributes for the following Azure AD obj
55
55
- Azure AD enterprise applications (service principals)
56
56
- Managed identities for Azure resources
57
57
58
-
## How do custom security attributes compare with directory schema extensions?
58
+
## How do custom security attributes compare with directory extensions?
59
59
60
-
Here are some ways that custom security attributes compare with [directory schema extensions](../develop/active-directory-schema-extensions.md):
60
+
Here are some ways that custom security attributes compare with [directory extensions](../develop/active-directory-schema-extensions.md):
61
61
62
-
- Directory schema extensions cannot be used for authorization scenarios and attributes because the access control for the extension attributes is tied to the Azure AD object. Custom security attributes can be used for authorization and attributes needing access control because the custom security attributes can be managed and protected through separate permissions.
63
-
- Directory schema extensions are tied to an application and share the lifecycle of an application. Custom security attributes are tenant wide and not tied to an application.
64
-
- Directory schema extensions support assigning a single value to an attribute. Custom security attributes support assigning multiple values to an attribute.
62
+
- Directory extensions cannot be used for authorization scenarios and attributes because the access control for the extension attributes is tied to the Azure AD object. Custom security attributes can be used for authorization and attributes needing access control because the custom security attributes can be managed and protected through separate permissions.
63
+
- Directory extensions are tied to an application and share the lifecycle of an application. Custom security attributes are tenant wide and not tied to an application.
64
+
- Directory extensions support assigning a single value to an attribute. Custom security attributes support assigning multiple values to an attribute.
65
65
66
66
## Steps to use custom security attributes
67
67
@@ -168,9 +168,11 @@ Azure AD provides built-in roles to work with custom security attributes. The At
168
168
> [!IMPORTANT]
169
169
> By default, [Global Administrator](../roles/permissions-reference.md#global-administrator) and other administrator roles do not have permissions to read, define, or assign custom security attributes.
170
170
171
-
## Graph Explorer
171
+
## Microsoft Graph APIs
172
+
173
+
You can manage custom security attributes programmatically using Microsoft Graph APIs. For more information, see [Overview of custom security attributes using the Microsoft Graph API](/graph/api/resources/custom-security-attributes-overview).
172
174
173
-
If you use the Microsoft Graph API, you can use[Graph Explorer](/graph/graph-explorer/graph-explorer-overview) to more easily try the Microsoft Graph APIs for custom security attributes. For more information, see [Overview of custom security attributes using the Microsoft Graph API](/graph/api/resources/custom-security-attributes-overview).
175
+
You can use an API client such as[Graph Explorer](/graph/graph-explorer/graph-explorer-overview)or Postman to more easily try the Microsoft Graph APIs for custom security attributes.
174
176
175
177

0 commit comments