Skip to content

Commit bbb7511

Browse files
authored
Merge pull request #253181 from MicrosoftDocs/main
9/28/2023 AM Publish
2 parents fe83f8f + a6b55d2 commit bbb7511

File tree

56 files changed

+531
-222
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

56 files changed

+531
-222
lines changed

.openpublishing.redirection.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24543,22 +24543,22 @@
2454324543
},
2454424544
{
2454524545
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-01-register-app.md",
24546-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-register-app.md",
24546+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-register-app",
2454724547
"redirect_document_id": false
2454824548
},
2454924549
{
2455024550
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-02-prepare-spa.md",
24551-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-prepare-spa.md",
24551+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-prepare-spa",
2455224552
"redirect_document_id": false
2455324553
},
2455424554
{
2455524555
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-03-sign-in-users.md",
24556-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-sign-in-users.md",
24556+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-sign-in-users",
2455724557
"redirect_document_id": false
2455824558
},
2455924559
{
2456024560
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-04-call-api.md",
24561-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-call-api.md",
24561+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-call-api",
2456224562
"redirect_document_id": false
2456324563
}
2456424564
]

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.reviewer: chmutali
2424
This article explains how the integration works and how you can customize the provisioning behavior for different HR scenarios.
2525

2626
## Establishing connectivity
27-
Microsoft Entra provisioning service uses basic authentication to connect to Employee Central OData API endpoints. When setting up the SuccessFactors provisioning app, use the *Tenant URL* parameter in the *Admin Credentials* section to configure the [API data center URL](https://apps.support.sap.com/sap/support/knowledge/en/2215682).
27+
Microsoft Entra provisioning service uses basic authentication to connect to Employee Central OData API endpoints. When setting up the SuccessFactors provisioning app, use the *Tenant URL* parameter in the *Admin Credentials* section to configure the [API data center URL](https://help.sap.com/docs/SAP_SUCCESSFACTORS_PLATFORM/d599f15995d348a1b45ba5603e2aba9b/af2b8d5437494b12be88fe374eba75b6.html).
2828

2929
To further secure the connectivity between Microsoft Entra provisioning service and SuccessFactors, add the Microsoft Entra IP ranges in the SuccessFactors IP allowlist:
3030

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: ignite-2022
99
ms.topic: conceptual
10-
ms.date: 09/27/2023
10+
ms.date: 09/28/2023
1111

1212
ms.author: justinha
1313
author: mjsantani
@@ -134,7 +134,7 @@ Here are a few sample JSONs you can use to get started!
134134

135135
- Include all users
136136

137-
If you want to include ALL users in your tenant, [download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/All%20Users%20Enabled.json) and paste it in Graph Explorer and run `PATCH` on the endpoint.
137+
If you want to include ALL users in your tenant, update the following JSON example with the relevant GUIDs of your users and groups. Then paste it in Graph Explorer and run `PATCH` on the endpoint.
138138

139139
```json
140140
{
@@ -158,7 +158,7 @@ Here are a few sample JSONs you can use to get started!
158158

159159
- Include specific users or groups of users
160160

161-
If you want to include certain users or groups in your tenant, [download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/Multiple%20Includes.json) and update it with the relevant GUIDs of your users and groups. Then paste the JSON in Graph Explorer and run `PATCH` on the endpoint.
161+
If you want to include certain users or groups in your tenant, update the following JSON example with the relevant GUIDs of your users and groups. Then paste the JSON in Graph Explorer and run `PATCH` on the endpoint.
162162

163163
```json
164164
{
@@ -182,11 +182,12 @@ Here are a few sample JSONs you can use to get started!
182182
]
183183
}
184184
}
185+
}
185186
```
186187

187-
- Include and exclude specific users/groups of users
188+
- Include and exclude specific users or groups
188189

189-
If you want to include AND exclude certain users/groups of users in your tenant, [download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/Multiple%20Includes%20and%20Excludes.json) and paste it in Graph Explorer and run `PATCH` on the endpoint. Enter the correct GUIDs for your users and groups.
190+
If you want to include AND exclude certain users or groups in your tenant, update the following JSON example with the relevant GUIDs of your users and groups. Then paste it in Graph Explorer and run `PATCH` on the endpoint.
190191

191192
```json
192193
{
@@ -286,13 +287,13 @@ No. The snooze duration for the prompt is a tenant-wide setting and applies to a
286287

287288
The feature aims to empower admins to get users set up with MFA using the Authenticator app and not passwordless phone sign-in.
288289

289-
**Will a user who has a 3rd party authenticator app setup see the nudge?**
290+
**Will a user who signs in with a 3rd party authenticator app see the nudge?**
290291

291-
If this user doesnt have the Authenticator app set up for push notifications and is enabled for it by policy, yes, the user will see the nudge.
292+
Yes. If a user is enabled for the registration campaign and doesn't have Microsoft Authenticator set up for push notifications, the user is nudged to set up Authenticator.
292293

293-
**Will a user who has the Authenticator app setup only for TOTP codes see the nudge?** 
294+
**Will a user who has Authenticator set up only for TOTP codes see the nudge?**
294295

295-
Yes. If the Authenticator app is not set up for push notifications and the user is enabled for it by policy, yes, the user will see the nudge.
296+
Yes. If a user is enabled for the registration campaign and Authenticator app isn't set up for push notifications, the user is nudged to set up push notification with Authenticator.
296297

297298
**If a user just went through MFA registration, are they nudged in the same sign-in session?**
298299

@@ -316,9 +317,9 @@ Yes. If they have been scoped for the nudge using the policy.
316317

317318
**What if the user closes the browser?**
318319

319-
It's the same as snoozing. If setup is required for a user after they snoozed three times, the user will get prompted the next time they sign in.
320+
It's the same as snoozing. If setup is required for a user after they snoozed three times, the user is prompted the next time they sign in.
320321

321-
**Why dont some users see a nudge when there is a Conditional Access policy for "Register security information"?**
322+
**Why don't some users see a nudge when there is a Conditional Access policy for "Register security information"?**
322323

323324
A nudge won't appear if a user is in scope for a Conditional Access policy that blocks access to the **Register security information** page.
324325

articles/active-directory/external-identities/customers/how-to-customize-branding-customers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The following image displays the neutral default branding of the customer tenant
5757

5858
Before you customize any settings, the neutral default branding will appear in your sign-in and sign-up pages. You can customize this default experience with a custom background image or color, favicon, layout, header, and footer. You can also upload a [custom CSS](/azure/active-directory/fundamentals/reference-company-branding-css-template).
5959

60-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
60+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
6161
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the customer tenant you created earlier.
6262
1. Browse to **Company Branding** > **Default sign-in** > **Edit**.
6363

@@ -174,7 +174,7 @@ Your customer tenant name replaces the Microsoft banner logo in the neutral defa
174174

175175
:::image type="content" source="media/how-to-customize-branding-customers/tenant-name.png" alt-text="Screenshot of the tenant name." lightbox="media/how-to-customize-branding-customers/tenant-name.png":::
176176

177-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/).
177+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/) as at least a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
178178
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the customer tenant you created earlier.
179179
1. In the search bar, type and select **Properties**.
180180
1. Edit the **Name** field.
@@ -187,7 +187,7 @@ Your customer tenant name replaces the Microsoft banner logo in the neutral defa
187187

188188
When no longer needed, you can remove the sign-in customization from your customer tenant via the Azure portal.
189189

190-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
190+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
191191
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the customer tenant you created earlier.
192192
1. Browse to **Company branding** > **Default sign-in experience** > **Edit**.
193193
1. Remove the elements you no longer need.

articles/active-directory/external-identities/customers/how-to-customize-languages-customers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ You can create a personalized sign-in experience for users who sign in using a s
2727

2828
## Add browser language under Company branding
2929

30-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
30+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
3131
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the customer tenant you created earlier.
3232
1. Browse to **Company branding** > **Browser language customizations** > **Add browser language**.
3333

@@ -86,7 +86,7 @@ The following languages are supported in the customer tenant:
8686

8787
Language customization in the customer tenant allows your user flow to accommodate different languages to suit your customer's needs. You can use languages to modify the strings displayed to your customers as part of the attribute collection process during sign-up.
8888

89-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
89+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
9090
2. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the customer tenant you created earlier.
9191
3. Browse to **Identity** > **External Identities** > **User flows**.
9292
5. Select the user flow that you want to enable for translations.

articles/active-directory/external-identities/customers/how-to-register-ciam-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ External ID for customers supports authentication for Single-page apps (SPAs).
4040

4141
The following steps show you how to register your SPA in the Microsoft Entra admin center:
4242

43-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
43+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/azure/active-directory/roles/permissions-reference#application-developer).
4444

4545
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to your customer tenant.
4646

@@ -82,7 +82,7 @@ External ID for customers supports authentication for web apps.
8282

8383
The following steps show you how to register your web app in the Microsoft Entra admin center:
8484

85-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
85+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/azure/active-directory/roles/permissions-reference#application-developer).
8686

8787
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to your customer tenant.
8888

@@ -137,7 +137,7 @@ If your web app needs to call an API, you must grant your web app API permission
137137

138138
The following steps show you how to register your app in the Microsoft Entra admin center:
139139

140-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
140+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/azure/active-directory/roles/permissions-reference#application-developer).
141141

142142
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to your customer tenant.
143143

articles/active-directory/external-identities/customers/includes/configure-user-flow/create-sign-in-sign-out-user-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: kengaderdus
88
---
99
Follow these steps to create a user flow a customer can use to sign in or sign up for an application.
1010

11-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
11+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [External ID User Flow Administrator](/azure/active-directory/roles/permissions-reference#external-id-user-flow-administrator).
1212
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="../../media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to your customer tenant.
1313
1. Browse to **Identity** > **External Identities** > **User flows**.
1414
1. Select **+ New user flow**.

articles/active-directory/external-identities/customers/includes/register-app/add-client-app-certificate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: kengaderdus
99

1010
To use your client app certificate, you need to associate the app you registered in the Microsoft Entra admin center with the certificate:
1111

12-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
12+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator).
1313

1414
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="../../media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to your customer tenant.
1515

articles/active-directory/external-identities/customers/includes/register-app/register-api-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 03/30/2023
77
ms.author: kengaderdus
88
---
99

10-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
10+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/azure/active-directory/roles/permissions-reference#application-developer).
1111

1212
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="../../media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to your customer tenant.
1313

articles/active-directory/external-identities/customers/includes/register-app/register-client-app-common.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ To enable your application to sign in users with Microsoft Entra, Microsoft Entr
1212

1313
The following steps show you how to register your app in the Microsoft Entra admin center:
1414

15-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
15+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](/azure/active-directory/roles/permissions-reference#application-developer).
1616
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="../../media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to your customer tenant.
1717
1. Browse to **Identity** >**Applications** > **App registrations**.
1818
1. Select **+ New registration**.

0 commit comments

Comments
 (0)