Skip to content

Commit ba517b3

Browse files
authored
Merge pull request #177624 from MicrosoftDocs/master
10/26 AM Publish
2 parents f9e0f6d + dff7fe8 commit ba517b3

File tree

98 files changed

+1602
-599
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

98 files changed

+1602
-599
lines changed

articles/active-directory-b2c/saml-service-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -313,10 +313,10 @@ For SAML apps, you need to configure several properties in the application regis
313313

314314
When your SAML application makes a request to Azure AD B2C, the SAML AuthN request includes an `Issuer` attribute. The value of this attribute is typically the same as the application's metadata `entityID` value. Azure AD B2C uses this value to look up the application registration in the directory and read the configuration. For this lookup to succeed, `identifierUri` in the application registration must be populated with a value that matches the `Issuer` attribute.
315315

316-
In the registration manifest, find the `identifierURIs` parameter and add the appropriate value. This value will be the same value that's configured in the SAML AuthN requests for `EntityId` at the application, and the `entityID` value in the application's metadata. You will also need to find the `accessTokenAcceptedVersion` paramater and set the value to `2`.
316+
In the registration manifest, find the `identifierURIs` parameter and add the appropriate value. This value will be the same value that's configured in the SAML AuthN requests for `EntityId` at the application, and the `entityID` value in the application's metadata. You will also need to find the `accessTokenAcceptedVersion` parameter and set the value to `2`.
317317

318318
> [!IMPORTANT]
319-
> If you do not update the `accessTokenAcceptedVersion` to `2` you will recive an error message requiring a verfied domain.
319+
> If you do not update the `accessTokenAcceptedVersion` to `2` you will recieve an error message requiring a verified domain.
320320
321321
The following example shows the `entityID` value in the SAML metadata:
322322

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 06/25/2021
1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: karenhoran
14-
ms.reviewer: calebb
14+
ms.reviewer: calebb, sandeo
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -59,12 +59,26 @@ A device can be marked as compliant by Intune (for any device OS) or by third-pa
5959

6060
Devices must be registered in Azure AD before they can be marked as compliant. More information about device registration can be found in the article, [What is a device identity](../devices/overview.md).
6161

62+
**Remarks**
63+
64+
- The **Require device to be marked as compliant** requirement:
65+
- Only supports Windows Windows current (Windows 10+), iOS, Android and macOS devices registered with Azure AD and enrolled with Intune.
66+
- For devices enrolled with third-party MDM systems, see [Support third-party device compliance partners in Intune](/mem/intune/protect/device-compliance-partners).
67+
- Conditional Access cannot consider Microsoft Edge in InPrivate mode as a compliant device.
68+
69+
6270
### Require hybrid Azure AD joined device
6371

6472
Organizations can choose to use the device identity as part of their Conditional Access policy. Organizations can require that devices are hybrid Azure AD joined using this checkbox. For more information about device identities, see the article [What is a device identity?](../devices/overview.md).
6573

6674
When using the [device-code OAuth flow](../develop/v2-oauth2-device-code.md), the require managed device grant control or a device state condition are not supported. This is because the device performing authentication cannot provide its device state to the device providing a code and the device state in the token is locked to the device performing authentication. Use the require multi-factor authentication grant control instead.
6775

76+
**Remarks**
77+
78+
- The **Require hybrid Azure AD joined device** requirement:
79+
- Only supports domain joined Windows down-level (pre Windows 10) and Windows current (Windows 10+) devices.
80+
- Conditional Access cannot consider Microsoft Edge in InPrivate mode as a hybrid Azure AD joined device.
81+
6882
### Require approved client app
6983

7084
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile-device management (MDM) solution.

articles/active-directory/develop/howto-restrict-your-app-to-a-set-of-users.md

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -9,21 +9,23 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/24/2018
12+
ms.date: 10/18/2021
1313
ms.author: kkrishna
1414
ms.reviewer: jmprieur
1515
ms.custom: aaddev
1616
#Customer intent: As a tenant administrator, I want to restrict an application that I have registered in Azuren-e AD to a select set of users available in my Azure AD tenant
1717
---
18+
1819
# Restrict your Azure AD app to a set of users in an Azure AD tenant
1920

2021
Applications registered in an Azure Active Directory (Azure AD) tenant are, by default, available to all users of the tenant who authenticate successfully.
2122

22-
Similarly, in case of a [multi-tenant](howto-convert-app-to-be-multi-tenant.md) app, all users in the Azure AD tenant where this app is provisioned will be able to access this application once they successfully authenticate in their respective tenant.
23+
Similarly, in a [multi-tenant](howto-convert-app-to-be-multi-tenant.md) application, all users in the Azure AD tenant where the application is provisioned can access the application once they successfully authenticate in their respective tenant.
2324

24-
Tenant administrators and developers often have requirements where an app must be restricted to a certain set of users. Developers can accomplish the same by using popular authorization patterns like Azure role-based access control (Azure RBAC), but this approach requires a significant amount of work on part of the developer.
25+
Tenant administrators and developers often have requirements where an application must be restricted to a certain set of users. There are two ways to restrict an application to a certain set of users or security groups:
2526

26-
Tenant administrators and developers can restrict an app to a specific set of users or security groups in the tenant by using this built-in feature of Azure AD as well.
27+
- Developers can use popular authorization patterns like [Azure role-based access control (Azure RBAC)](howto-implement-rbac-for-apps.md).
28+
- Tenant administrators and developers can use built-in feature of Azure AD.
2729

2830
## Supported app configurations
2931

@@ -33,43 +35,39 @@ The option to restrict an app to a specific set of users or security groups in a
3335
- Application proxy applications that use Azure AD pre-authentication.
3436
- Applications built directly on the Azure AD application platform that use OAuth 2.0/OpenID Connect authentication after a user or admin has consented to that application.
3537

36-
> [!NOTE]
37-
> This feature is available for web app/web API and enterprise applications only. Apps that are registered as [native](./quickstart-register-app.md) cannot be restricted to a set of users or security groups in the tenant.
38-
3938
## Update the app to require user assignment
4039

41-
To update an application to require user assignment, you must be owner of the application under Enterprise apps, or be assigned one of **Global administrator**, **Application administrator** or **Cloud application administrator** directory roles.
40+
To update an application to require user assignment, you must be owner of the application under Enterprise apps, or be assigned one of **Global administrator**, **Application administrator**, or **Cloud application administrator** directory roles.
4241

4342
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
44-
1. If you have access to multiple tenants, use the **Directory + subscription** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant in which you want to register an application.
43+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch the tenant in which you want to register an application.
4544
1. Search for and select **Azure Active Directory**.
4645
1. Under **Manage**, select **Enterprise Applications** > **All applications**.
4746
1. Select the application you want to configure to require assignment. Use the filters at the top of the window to search for a specific application.
4847
1. On the application's **Overview** page, under **Manage**, select **Properties**.
4948
1. Locate the setting **User assignment required?** and set it to **Yes**. When this option is set to **Yes**, users and services attempting to access the application or services must first be assigned for this application, or they won't be able to sign-in or obtain an access token.
5049
1. Select **Save**.
5150

52-
> [!NOTE]
53-
> When an application requires assignment, user consent for that application is not allowed. This is true even if users consent for that app would have otherwise been allowed. Be sure to [grant tenant-wide admin consent](../manage-apps/grant-admin-consent.md) to apps that require assignment.
51+
When an application requires assignment, user consent for that application isn't allowed. This is true even if users consent for that app would have otherwise been allowed. Be sure to [grant tenant-wide admin consent](../manage-apps/grant-admin-consent.md) to apps that require assignment.
5452

5553
## Assign the app to users and groups
5654

5755
Once you've configured your app to enable user assignment, you can go ahead and assign the app to users and groups.
5856

5957
1. Under **Manage**, select the **Users and groups** > **Add user/group** .
60-
1. Select the **Users** selector.
58+
1. Select the **Users** selector.
6159

62-
A list of users and security groups will be shown along with a textbox to search and locate a certain user or group. This screen allows you to select multiple users and groups in one go.
60+
A list of users and security groups will be shown along with a textbox to search and locate a certain user or group. This screen allows you to select multiple users and groups in one go.
6361

64-
1. Once you are done selecting the users and groups, select **Select**.
65-
1. (Optional) If you have defined app roles in your application, you can use the **Select role** option to assign the app role to the selected users and groups.
66-
1. Select **Assign** to complete the assignments of the app to the users and groups.
62+
1. Once you're done selecting the users and groups, select **Select**.
63+
1. (Optional) If you have defined app roles in your application, you can use the **Select role** option to assign the app role to the selected users and groups.
64+
1. Select **Assign** to complete the assignments of the app to the users and groups.
6765
1. Confirm that the users and groups you added are showing up in the updated **Users and groups** list.
6866

6967
## More information
7068

69+
For more information about roles and security groups, see:
70+
7171
- [How to: Add app roles in your application](./howto-add-app-roles-in-azure-ad-apps.md)
72-
- [Add authorization using app roles & roles claims to an ASP.NET Core web app](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/5-WebApp-AuthZ/5-1-Roles)
7372
- [Using Security Groups and Application Roles in your apps (Video)](https://www.youtube.com/watch?v=LRoc-na27l0)
74-
- [Azure Active Directory, now with Group Claims and Application Roles](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-Active-Directory-now-with-Group-Claims-and-Application/ba-p/243862)
7573
- [Azure Active Directory app manifest](./reference-app-manifest.md)

0 commit comments

Comments
 (0)