You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -29,6 +29,9 @@ Watch this video to learn about Azure AD B2C user migration using Microsoft Grap
29
29
To use MS Graph API, and interact with resources in your Azure AD B2C tenant, you need an application registration that grants the permissions to do so. Follow the steps in the [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-get-started.md) article to create an application registration that your management application can use.
30
30
31
31
## User management
32
+
> [!NOTE]
33
+
> Azure AD B2C currently does not support advanced query capabilities on directory objects. This means that there is no support for `$count`, `$search` query parameters and Not (`not`), Not equals (`ne`), and Ends with (`endsWith`) operators in `$filter` query parameter. For more information, see [query parameters in Microsoft Graph](/graph/query-parameters) and [advanced query capabilities in Microsoft Graph](/graph/aad-advanced-queries).
34
+
32
35
33
36
-[List users](/graph/api/user-list)
34
37
-[Create a consumer user](/graph/api/user-post-users)
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-condition-filters-for-devices.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,7 +118,7 @@ The following device attributes can be used with the filter for devices conditio
118
118
| mdmAppId | Equals, NotEquals, In, NotIn | A valid MDM application ID | (device.mdmAppId -in [“0000000a-0000-0000-c000-000000000000”]|
119
119
| model | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | Any string | (device.model -notContains “Surface”) |
120
120
| operatingSystem | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system (like Windows, iOS, or Android) | (device.operatingSystem -eq “Windows”) |
121
-
| operatingSystemVersion | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system version (like 6.1 for Windows 7, 6.2 for Windows 8, or 10.0 for Windows 10) | (device.operatingSystemVersion -in [“10.0.18363”, “10.0.19041”, “10.0.19042”]) |
121
+
| operatingSystemVersion | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system version (like 6.1 for Windows 7, 6.2 for Windows 8, or 10.0 for Windows 10 and Windows 11) | (device.operatingSystemVersion -in [“10.0.18363”, “10.0.19041”, “10.0.19042”, “10.0.22000”]) |
122
122
| physicalIds | Contains, NotContains | As an example all Windows Autopilot devices store ZTDId (a unique value assigned to all imported Windows Autopilot devices) in device physicalIds property. | (device.devicePhysicalIDs -contains "[ZTDId]:value") |
123
123
| profileType | Equals, NotEquals | A valid profile type set for a device. Supported values are: RegisteredDevice (default), SecureVM (used for Windows VMs in Azure enabled with Azure AD sign in.), Printer (used for printers), Shared (used for shared devices), IoT (used for IoT devices) | (device.profileType -notIn [“Printer”, “Shared”, “IoT”]|
124
124
| systemLabels | Contains, NotContains | List of labels applied to the device by the system. Some of the supported values are: AzureResource (used for Windows VMs in Azure enabled with Azure AD sign in), M365Managed (used for devices managed using Microsoft Managed Desktop), MultiUser (used for shared devices) | (device.systemLabels -contains "M365Managed") |
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-net-initializing-client-applications.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -97,7 +97,7 @@ The modifiers you can set on a public client or confidential client application
97
97
98
98
|Modifier | Description|
99
99
|--------- | --------- |
100
-
|`.WithAuthority()` 7 overrides| Sets the application default authority to an Azure AD authority, with the possibility of choosing the Azure Cloud, the audience, the tenant (tenant ID or domain name), or providing directly the authority URI.|
100
+
|[`.WithAuthority()`](/dotnet/api/microsoft.identity.client.abstractapplicationbuilder-1.withauthority)| Sets the application default authority to an Azure AD authority, with the possibility of choosing the Azure Cloud, the audience, the tenant (tenant ID or domain name), or providing directly the authority URI.|
101
101
|`.WithAdfsAuthority(string)`| Sets the application default authority to be an ADFS authority.|
102
102
|`.WithB2CAuthority(string)`| Sets the application default authority to be an Azure AD B2C authority.|
103
103
|`.WithClientId(string)`| Overrides the client ID.|
You will also need to synchronize your sensitivity labels to Azure AD. For instructions, see [How to enable sensitivity labels for containers and synchronize labels](/microsoft-365/compliance/sensitivity-labels-teams-groups-sites#how-to-enable-sensitivity-labels-for-containers-and-synchronize-labels).
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md
+20-23Lines changed: 20 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Azure Active Directory integration with F5 BIG-IP for forms based authentication Single Sign-on
2
+
title: F5 BIG-IP APM and Azure AD SSO to forms based authentication applications
3
3
description: Learn how to integrate F5's BIG-IP Access Policy Manager (APM) and Azure Active Directory for secure hybrid access to forms-based applications.
4
4
author: gargi-sinha
5
5
ms.service: active-directory
@@ -35,9 +35,13 @@ Instead, a BIG-IP Virtual Edition (VE) deployed between the internet and the int
35
35
36
36
Having a BIG-IP in front of the application enables us to overlay the service with Azure AD pre-authentication and forms-based SSO, significantly improving the overall security posture of the application, allowing the business to continue operating at pace, without interruption.
37
37
38
+
User credentials cached by the BIG-IP APM are then available for SSO against other forms based-authentication applications.
39
+
40
+
## Scenario Architecture
41
+
38
42
The secure hybrid access solution for this scenario is made up of the following:
39
43
40
-
**Application**: Backend service to be protected by Azure AD and BIG-IP secure hybrid access. This particular application validates user credentials against an open source, but this could be any directory including Active Directory, LDS, etc.
44
+
**Application**: Backend service to be protected by Azure AD and BIG-IP secure hybrid access. This particular application validates user credentials against Active Directory (AD), but this could be any directory including LDS (AD Lightweight Directory Services), open source, etc.
41
45
42
46
**Azure AD**: The SAML Identity Provider (IdP), responsible for
43
47
verification of user credentials, Conditional Access (CA), and SSO to the BIG-IP APM.
@@ -51,13 +55,13 @@ performing forms-based SSO to the backend application.
51
55
| Steps | Description|
52
56
|:-------|:----------|
53
57
| 1. | User connects to application's SAML SP endpoint (BIG-IP APM).|
54
-
|2. | APM access policy redirects user to SAML IdP (Azure AD) for pre-authentication.|
55
-
| 3. |SAML IdP authenticates user and applies any enforced CA policies.|
56
-
| 4. |Azure AD redirects user back to SAML SP with issued token and claims. |
57
-
| 5. |APM prompts for application password and stores in cache. |
58
-
| 6. |BIG-IP request to application receives login form.|
59
-
| 7. | APM scripting responds filling in username and password before submitting form.|
60
-
| 8. | Application payload is served by webserver and sent to the client. Optionally, APM detects successful logon by examining response headers, looking for cookie or redirect URI.|
58
+
|2. | APM access policy redirects user to SAML IdP (Azure AD) for pre-authentication.|
59
+
| 3. |Azure AD authenticates user and applies any enforced Conditional Access policies.|
60
+
| 4. |User is redirected back to SAML SP with issued token and claims. |
61
+
| 5. |BIG-IP prompts user for application password and stores in cache. |
62
+
| 6. | BIG-IP sends request to application and receives a login form.|
63
+
| 7. | APM scripting auto responds filling in username and password before submitting form.|
64
+
| 8. | Application payload is served by webserver and sent to the client. Optionally, APM detects successful logon by examining response headers, looking for cookie or redirect URI.|
61
65
62
66
## Prerequisites
63
67
@@ -91,11 +95,8 @@ Prior BIG-IP experience is not necessary, but you'll need:
91
95
92
96
## Deployment modes
93
97
94
-
Several methods exist for configuring a BIG-IP for this scenario,
95
-
including several wizard-based options or an advanced configuration.
96
-
97
-
This tutorial covers the advanced approach, which provides a more
98
-
flexible approach at implementing secure hybrid access by manually creating all BIG-IP configuration objects. You would also use this approach for scenarios not covered by the Guided Configuration.
98
+
Several methods exist for configuring a BIG-IP for this scenario. This tutorial covers the advanced approach, which provides a more
99
+
flexible approach at implementing secure hybrid access by manually creating all BIG-IP configuration objects. You would use this approach for scenarios not covered by the template based Guided Configuration.
99
100
100
101
>[!NOTE]
101
102
>All example strings or values referenced throughout this article should be replaced with those for your actual environment.
@@ -365,11 +366,11 @@ A virtual server is a BIG-IP data plane object represented by a virtual IP addre
365
366
366
367
## Session management
367
368
368
-
A BIG-IPs session management setting are used to define the conditions under which user sessions are terminated or allowed to continue, limits for users and IP addresses, and error pages. You can create your own policy by heading to **Access Policy** > **Access Profiles** and selecting your application from the list.
369
+
A BIG-IPs session management settings are used to define the conditions under which user sessions are terminated or allowed to continue, limits for users and IP addresses, and error pages. You can create your own policy by heading to **Access Policy** > **Access Profiles** and selecting your application from the list.
369
370
370
-
With regard to SLO functionality, having defined a Single Log-out URI in Azure AD will ensure an IdP initiated sign-out from the MyApps portal also terminates the session between the client and the BIG-IP APM.
371
+
With regard to SLO functionality, having defined a Single Log-Out URI in Azure AD will ensure an IdP initiated sign-out from the MyApps portal also terminates the session between the client and the BIG-IP APM.
371
372
372
-
Having imported the application's federation metadata.xml then provides the APM with the Azure AD SAML log-out endpoint for SP initiated sign-outs. But for this to be truly effective, the APM needs to know exactly when a user signs-out.
373
+
Having imported the application's federation metadata.xml then provides the APM with the Azure AD SAML SLO endpoint for SP initiated sign-outs. But for this to be truly effective, the APM needs to know exactly when a user signs-out.
373
374
374
375
Consider a scenario where a BIG-IP web portal isn't used, the user has no way of instructing the APM to sign out. Even if the user signs-out of the application itself, the BIG-IP is technically oblivious to this, so the application session could easily be reinstated through SSO. For this reason SP initiated sign-out needs careful consideration to ensure sessions are securely terminated when no longer required.
375
376
@@ -388,16 +389,12 @@ For increased security, organizations using this pattern could also consider blo
388
389
389
390
## Next steps
390
391
391
-
From a browser, connect to the application's external URL or select the application's icon in the MyApps portal. After authenticating to Azure AD, you'll be redirected to the BIG-IP virtual server for the application and prompted for a password.
392
-
393
-
>[!Note]
394
-
>The APM pre-fills the username with the UPN from Azure AD.
392
+
From a browser, connect to the application's external URL or select the application's icon in the MyApps portal. After authenticating to Azure AD, you’ll be redirected to the BIG-IP endpoint for the application and prompted for a password. Note how the APM pre-fills the username with the UPN from Azure AD. The username pre-populated by the APM is read only to ensure session consistency between Azure AD and backend application. This field could be hidden from view with additional configuration, if necessary.
Copy file name to clipboardExpand all lines: articles/azure-sql/azure-sql-iaas-vs-paas-what-is-overview.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,9 +29,6 @@ Learn how each product fits into Microsoft's Azure SQL data platform to match th
29
29
If you're new to Azure SQL, check out the *What is Azure SQL* video from our in-depth [Azure SQL video series](https://channel9.msdn.com/Series/Azure-SQL-for-Beginners?WT.mc_id=azuresql4beg_azuresql-ch9-niner):
> How can we make Azure SQL better? [Take the survey](https://microsoft.qualtrics.com/jfe/form/SV_ePOznHhP4gDKfGu?channel=456).
34
-
35
32
## Overview
36
33
37
34
In today's data-driven world, driving digital transformation increasingly depends on our ability to manage massive amounts of data and harness its potential. But today's data estates are increasingly complex, with data hosted on-premises, in the cloud, or at the edge of the network. Developers who are building intelligent and immersive applications can find themselves constrained by limitations that can ultimately impact their experience. Limitations arising from incompatible platforms, inadequate data security, insufficient resources and price-performance barriers create complexity that can inhibit app modernization and development.
Copy file name to clipboardExpand all lines: articles/cognitive-services/Speech-Service/speech-container-faq.yml
+1-3Lines changed: 1 addition & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -129,9 +129,7 @@ sections:
129
129
130
130
If you're training with the latest custom model, we currently don't support that. If you train with an older version, it should be possible to use. We are still working on supporting the latest versions.
131
131
132
-
Essentially, the custom containers do not support Halide or ONNX-based acoustic models (which is the default in the custom training portal). This is due to custom models not being encrypted and we don't want to expose ONNX models, however; language models are fine. The customer will need to explicitly select an older non-ONNX model for custom training. Accuracy will not be affected. The model size may be larger (by 100 MB).
133
-
134
-
> Support model > 20190220 (v4.5 Unified)
132
+
Essentially, the custom containers do not support Halide or ONNX-based acoustic models (which is the default in the custom training portal). This is due to custom models not being encrypted and we don't want to expose ONNX models, however; language models are fine. The model size may be larger (by 100 MB).
Copy file name to clipboardExpand all lines: articles/cognitive-services/Translator/reference/v3-0-reference.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,8 +115,6 @@ When you use a multi-service secret key, you must include two authentication hea
115
115
116
116
Region is required for the multi-service Text API subscription. The region you select is the only region that you can use for text translation when using the multi-service subscription key, and must be the same region you selected when you signed up for your multi-service subscription through the Azure portal.
117
117
118
-
Available regions are `australiaeast`, `brazilsouth`, `canadacentral`, `centralindia`, `centralus`, `centraluseuap`, `eastasia`, `eastus`, `eastus2`, `francecentral`, `japaneast`, `japanwest`, `koreacentral`, `northcentralus`, `northeurope`, `southcentralus`, `southeastasia`, `uksouth`, `westcentralus`, `westeurope`, `westus`, `westus2`, and `southafricanorth`.
119
-
120
118
If you pass the secret key in the query string with the parameter `Subscription-Key`, then you must specify the region with query parameter `Subscription-Region`.
0 commit comments