Skip to content

Commit bc4b9bb

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into anf-preferred-ldap-2022.11
2 parents f99fbb1 + 1c72f1a commit bc4b9bb

File tree

413 files changed

+2144
-1786
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

413 files changed

+2144
-1786
lines changed

articles/active-directory-b2c/integrate-with-app-code-samples.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Azure Active Directory B2C integrate with app samples
33
description: Code samples for integrating Azure AD B2C to mobile, desktop, web, and single-page applications.
44
services: active-directory-b2c
5-
author: kengaderdus
5+
author: garrodonnell
66
manager: CelesteDG
77

8-
ms.author: kengaderdus
9-
ms.date: 06/21/2022
8+
ms.author: godonnell
9+
ms.date: 02/21/2023
1010
ms.custom: mvc
1111
ms.topic: sample
1212
ms.service: active-directory
@@ -17,17 +17,6 @@ ms.subservice: B2C
1717

1818
The following tables provide links to samples for applications including iOS, Android, .NET, and Node.js.
1919

20-
## Mobile and desktop apps
21-
22-
| Sample | Description |
23-
|--------| ----------- |
24-
| [ios-swift-native-msal](https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal) | An iOS sample in Swift that authenticates Azure AD B2C users and calls an API using OAuth 2.0 |
25-
| [android-native-msal](https://github.com/Azure-Samples/ms-identity-android-java#b2cmodefragment-class) | A simple Android app showcasing how to use MSAL to authenticate users via Azure Active Directory B2C, and access a Web API with the resulting tokens. |
26-
| [ios-native-appauth](https://github.com/Azure-Samples/active-directory-b2c-ios-native-appauth) | A sample that shows how you can use a third-party library to build an iOS application in Objective-C that authenticates Microsoft identity users to our Azure AD B2C identity service. |
27-
| [android-native-appauth](https://github.com/Azure-Samples/active-directory-b2c-android-native-appauth) | A sample that shows how you can use a third-party library to build an Android application that authenticates Microsoft identity users to our B2C identity service and calls a web API using OAuth 2.0 access tokens. |
28-
| [dotnet-desktop](https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop) | A sample that shows how a Windows Desktop .NET (WPF) application can sign in a user using Azure AD B2C, get an access token using MSAL.NET and call an API. |
29-
| [xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native) | A simple Xamarin Forms app showcasing how to use MSAL to authenticate users via Azure Active Directory B2C, and access a Web API with the resulting tokens. |
30-
3120
## Web apps and APIs
3221

3322
| Sample | Description |
@@ -48,6 +37,17 @@ The following tables provide links to samples for applications including iOS, An
4837
| [ms-identity-b2c-javascript-spa](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa) | A VanillaJS single page application (SPA) calling a web API. Authentication is done with Azure AD B2C by using MSAL.js. This sample uses the authorization code flow with PKCE. |
4938
| [javascript-nodejs-management](https://github.com/Azure-Samples/ms-identity-b2c-javascript-nodejs-management/tree/main/Chapter1) | A VanillaJS single page application (SPA) calling Microsoft Graph to manage users in a B2C directory. Authentication is done with Azure AD B2C by using MSAL.js. This sample uses the authorization code flow with PKCE.|
5039

40+
## Mobile and desktop apps
41+
42+
| Sample | Description |
43+
|--------| ----------- |
44+
| [ios-swift-native-msal](https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal) | An iOS sample in Swift that authenticates Azure AD B2C users and calls an API using OAuth 2.0 |
45+
| [android-native-msal](https://github.com/Azure-Samples/ms-identity-android-java#b2cmodefragment-class) | A simple Android app showcasing how to use MSAL to authenticate users via Azure Active Directory B2C, and access a Web API with the resulting tokens. |
46+
| [ios-native-appauth](https://github.com/Azure-Samples/active-directory-b2c-ios-native-appauth) | A sample that shows how you can use a third-party library to build an iOS application in Objective-C that authenticates Microsoft identity users to our Azure AD B2C identity service. |
47+
| [android-native-appauth](https://github.com/Azure-Samples/active-directory-b2c-android-native-appauth) | A sample that shows how you can use a third-party library to build an Android application that authenticates Microsoft identity users to our B2C identity service and calls a web API using OAuth 2.0 access tokens. |
48+
| [dotnet-desktop](https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop) | A sample that shows how a Windows Desktop .NET (WPF) application can sign in a user using Azure AD B2C, get an access token using MSAL.NET and call an API. |
49+
| [xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native) | A simple Xamarin Forms app showcasing how to use MSAL to authenticate users via Azure Active Directory B2C, and access a Web API with the resulting tokens. |
50+
5151
## Console/Daemon apps
5252

5353
| Sample | Description |

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 01/29/2023
4+
ms.date: 02/21/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/user-provisioning.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.topic: overview
99
ms.workload: identity
10-
ms.date: 02/17/2023
10+
ms.date: 02/21/2023
1111
ms.author: kenwith
1212
ms.reviewer: arvinh
1313
---
@@ -52,15 +52,15 @@ The provisioning mode supported by an application is also visible on the **Provi
5252

5353
## Benefits of automatic provisioning
5454

55-
The number of applications used in modern organizations continues to grow. IT admins must manage access management at scale. Admins use standards such as SAML or OIDC for single sign-on (SSO), but access also requires users to be provisioned into the app. To many admins, provisioning means manually creating every user account or uploading CSV files each week. These processes are time-consuming, expensive, and error prone. Solutions such as SAML just-in-time (JIT) have been adopted to automate provisioning. Enterprises also need a solution to deprovision users when they leave the organization or no longer require access to certain apps based on role change.
55+
The number of applications used in modern organizations continues to grow. You, as an IT admin, must manage access management at scale. You use standards such as SAML or OIDC for single sign-on (SSO), but access also requires you provision users into an app. You might think provisioning means manually creating every user account or uploading CSV files each week. These processes are time-consuming, expensive, and error prone. To streamline the process, use SAML just-in-time (JIT) to automate provisioning. Use the same process to deprovision users when they leave the organization or no longer require access to certain apps based on role change.
5656

5757
Some common motivations for using automatic provisioning include:
5858

5959
- Maximizing the efficiency and accuracy of provisioning processes.
6060
- Saving on costs associated with hosting and maintaining custom-developed provisioning solutions and scripts.
6161
- Securing your organization by instantly removing users' identities from key SaaS apps when they leave the organization.
6262
- Easily importing a large number of users into a particular SaaS application or system.
63-
- Having a single set of policies to determine who is provisioned and who can sign in to an app.
63+
- A single set of policies to determine provisioned users that can sign in to an app.
6464

6565
Azure AD user provisioning can help address these challenges. To learn more about how customers have been using Azure AD user provisioning, read the [ASOS case study](https://aka.ms/asoscasestudy). The following video provides an overview of user provisioning in Azure AD.
6666

@@ -74,7 +74,7 @@ Azure AD features pre-integrated support for many popular SaaS apps and human re
7474

7575
![Image that shows logos for DropBox, Salesforce, and others.](./media/user-provisioning/gallery-app-logos.png)
7676

77-
If you want to request a new application for provisioning, you can [request that your application be integrated with our app gallery](../manage-apps/v2-howto-app-gallery-listing.md). For a user provisioning request, we require the application to have a SCIM-compliant endpoint. Request that the application vendor follows the SCIM standard so we can onboard the app to our platform quickly.
77+
To request a new application for provisioning, see [Submit a request to publish your application in Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md). For a user provisioning request, we require the application to have a SCIM-compliant endpoint. Request that the application vendor follows the SCIM standard so we can onboard the app to our platform quickly.
7878

7979
* **Applications that support SCIM 2.0**: For information on how to generically connect applications that implement SCIM 2.0-based user management APIs, see [Build a SCIM endpoint and configure user provisioning](use-scim-to-provision-users-and-groups.md).
8080

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -74,30 +74,24 @@ Now we'll walk through each step:
7474

7575
## Certificate-based authentication is MFA capable
7676

77-
Azure AD CBA is an MFA (Multi factor authentication) capable method, that is Azure AD CBA can be either Single (SF) or Multi-factor (MF) depending on the tenant configuration. Enabling CBA for a user indicates the user is potentially capable of MFA. This means a user may need additional configuration to proof up to register other authentication methods when the user is in scope for CBA.
77+
Azure AD CBA is an MFA (Multi factor authentication) capable method, that is Azure AD CBA can be either Single (SF) or Multi-factor (MF) depending on the tenant configuration. Enabling CBA for a user indicates the user is potentially capable of MFA. This means a user may need additional configuration to get MFA and proof up to register other authentication methods when the user is in scope for CBA.
7878

79-
This can happen when:
80-
81-
If CBA enabled user only has a Single Factor (SF) certificate
82-
To unblock user:
83-
1. Use Password + SF certificate.
79+
If CBA enabled user only has a Single Factor (SF) certificate and need MFA
80+
1. Use Password + SF certificate.
8481
1. Issue Temporary Access Pass (TAP)
8582
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
8683

87-
If CBA enabled user but has not yet been issued a certificate
88-
To unblock user:
84+
If CBA enabled user has not yet been issued a certificate and need MFA
8985
1. Issue Temporary Access Pass (TAP)
9086
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
9187

92-
If CBA enabled user cannot use MF cert (such as on mobile device without smart card support)
93-
To unblock user:
88+
If CBA enabled user cannot use MF cert (such as on mobile device without smart card support) and need MFA
9489
1. Issue Temporary Access Pass (TAP)
9590
1. User Register another MFA method (when user can use MF cert)
9691
1. Use Password + MF cert (when user can use MF cert)
9792
1. Admin adds Phone Number to user account and allows Voice/SMS method for user
9893

9994

100-
10195
## MFA with Single-factor certificate-based authentication
10296

10397
Azure AD CBA can be used as a second factor to meet MFA requirements with single-factor certificates. The supported combintaions are

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,8 @@
6161
href: application-model.md
6262
- name: Workload identities
6363
href: workload-identities-overview.md
64+
- name: Workload identities FAQs
65+
href: workload-identities-faqs.md
6466
- name: Applications and service principals
6567
href: app-objects-and-service-principals.md
6668
- name: How and why apps are added to Azure AD

articles/active-directory/develop/quickstart-v2-nodejs-console.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.custom: mode-api
2323
>
2424
> We apologize for the inconvenience and appreciate your patience while we work to get this resolved.
2525
26-
> [!div renderon="portal" class="sxs-lookup"]
26+
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
2727
> In this quickstart, you download and run a code sample that demonstrates how a Node.js console application can get an access token using the app's identity to call the Microsoft Graph API and display a [list of users](/graph/api/user-list) in the directory. The code sample demonstrates how an unattended job or Windows service can run with an application identity, instead of a user's identity.
2828
>
2929
> This quickstart uses the [Microsoft Authentication Library for Node.js (MSAL Node)](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node) with the [client credentials grant](v2-oauth2-client-creds-grant-flow.md).
Lines changed: 132 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,132 @@
1+
---
2+
title: Workload identities license plans faq
3+
description: Learn about workload identities license plans, features and capabilities.
4+
author: gargi-sinha
5+
manager: martinco
6+
ms.service: active-directory
7+
ms.subservice: develop
8+
ms.workload: identity
9+
ms.topic: conceptual
10+
ms.date: 2/21/2023
11+
ms.author: gasinh
12+
ms.reviewer:
13+
ms.custom: aaddev
14+
#Customer intent: I want to know about workload identities licensing plans
15+
---
16+
17+
# Frequently asked questions about workload identities license plans
18+
19+
[Workload identities](workload-identities-overview.md) is now available in two editions: **Free** and **Workload Identities Premium**. The free edition of workload identities is included with a subscription of a commercial online service such as [Azure](https://azure.microsoft.com/) and [Power Platform](https://powerplatform.microsoft.com/). The Workload
20+
Identities Premium offering is available through a Microsoft representative, the [Open Volume License
21+
Program](https://www.microsoft.com/licensing/how-to-buy/how-to-buy), and the [Cloud Solution Providers program](/azure/lighthouse/concepts/cloud-solution-provider). Azure and Microsoft 365 subscribers can also purchase Workload
22+
Identities Premium online.
23+
24+
For more information, see [what are workload identities?](workload-identities-overview.md)
25+
26+
>[!NOTE]
27+
>Workload Identities Premium is a standalone product and isn't included in other premium product plans. All subscribers require a license to use Workload Identities Premium features.
28+
29+
Learn more about [workload identities
30+
pricing](https://www.microsoft.com/security/business/identity-access/microsoft-entra-workload-identities#office-StandaloneSKU-k3hubfz).
31+
32+
## What features are included in Workload Identities Premium plan and which features are free?
33+
34+
|Capabilities | Description | Free | Premium |
35+
|:--------|:----------|:------------|:-----------|
36+
| **Authentication and authorization**| | | |
37+
| Create, read, update, delete workload identities | Create and update identities for securing service to service access | Yes | Yes |
38+
| Authenticate workload identities and tokens to access resources | Use Azure Active Directory (Azure AD) to protect resource access | Yes| Yes |
39+
| Workload identities sign-in activity and audit trail | Monitor and track workload identity behavior | Yes | Yes |
40+
| **Managed identities**| Use Azure AD identities in Azure without handling credentials | Yes| Yes |
41+
| Workload identity federation | Use workloads tested by external Identity Providers (IdPs) to access Azure AD protected resources | Yes | Yes |
42+
| **Conditional Access (CA)** | | |
43+
| CA policies for workload identities |Define the condition in which a workload can access a resource, such as an IP range | | Yes |
44+
|**Lifecycle Management**| | | |
45+
|Access reviews for service provider-assigned privileged roles | Closely monitor workload identities with impactful permissions | | Yes |
46+
|**Identity Protection** | | |
47+
|Identity Protection for workload identities | Detect and remediate compromised workload identities | | Yes |
48+
49+
## What is the cost of Workload Identities Premium plan?
50+
51+
Check the pricing for the [Microsoft Entra Workload Identities
52+
Premium](https://www.microsoft.com/security/business/identity-access/microsoft-entra-workload-identities#office-StandaloneSKU-k3hubfz)
53+
plan.
54+
55+
## How do I purchase a Workload Identities Premium plan?
56+
57+
You need an Azure or Microsoft 365 subscription. You can use a
58+
current subscription or set up a new one. Then, sign into the [Microsoft
59+
Entra admin
60+
center](https://entra.microsoft.com/)
61+
with your credentials to buy Workload Identities licenses.
62+
63+
## Through what channels can I purchase Workload Identities Premium plan?
64+
65+
You can purchase the plan through Enterprise Agreement (EA)/Enterprise Subscription (EAS), Cloud Solution Providers (CSPs), or Web Direct.
66+
67+
## Where can I find more feature details to determine if I need a license(s)?
68+
69+
Entra workload identities has three premium features that require a license.
70+
71+
- [Conditional Access](../conditional-access/workload-identity.md):
72+
Supports location or risk-based policies for workload identities.
73+
74+
- [Identity Protection](../identity-protection/concept-workload-identity-risk.md):
75+
Provides reports of compromised credentials, anomalous sign-ins, and
76+
suspicious changes to accounts.
77+
78+
- [Access Reviews](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/introducing-azure-ad-access-reviews-for-service-principals/ba-p/1942488):
79+
Enables delegation of reviews to the right people, focused on the most
80+
important privileged roles.
81+
82+
## What do the numbers in each category on the [Workload identities - Microsoft Entra admin center](https://entra.microsoft.com/#view/Microsoft_Azure_ManagedServiceIdentity/WorkloadIdentitiesBlade) mean?
83+
84+
Category definitions:
85+
86+
- **Enterprise apps/Service Principals**: This category includes multi-tenant apps, gallery apps, non-gallery apps and service principals.
87+
88+
- **Microsoft apps**: Apps such as Outlook and Microsoft Teams.
89+
90+
- [**Managed Identities**](https://entra.microsoft.com/#home): An identity for
91+
applications for connecting resources that support Azure AD authentication.
92+
93+
## How many licenses do I need to purchase? Do I need to license all workload identities including Microsoft and Managed Service Identities?
94+
95+
All workload identities - service principles, apps and managed identities, configured in your directory for a Microsoft Entra
96+
Workload Identities Premium feature require a license. Select and prioritize the identities based on the available licenses. Remove
97+
the workload identities from the directory that are no longer required.
98+
99+
The following identity functionalities are currently available to view
100+
in a directory:
101+
102+
- Identity Protection: All single-tenant and multi-tenant service
103+
principals excluding managed identities and Microsoft apps.
104+
105+
- Conditional Access: Single-tenant service principals (excluding
106+
managed identities) capable of acting as a subject/client, having a
107+
defined credential.
108+
109+
- Access reviews: All single-tenant and multi-tenant service
110+
principals assigned to privileged roles.
111+
112+
>[!NOTE]
113+
>Functionality is subject to change, and feature coverage is
114+
intended to expand.
115+
116+
## Do these licenses require individual workload identities assignment?
117+
118+
No, license assignment isn't required. One license in the tenant unlocks features for workload identities.
119+
120+
## Can I get a free trial of Workload Identities Premium?
121+
122+
Yes. you can get a [90-day free trial](https://entra.microsoft.com/#view/Microsoft_Azure_ManagedServiceIdentity/WorkloadIdentitiesBlade).
123+
In the Modern channel, a 30-day only trial is available. Free trial is
124+
unavailable in Government clouds.
125+
126+
## Is the Workload Identities Premium edition available on Government clouds?
127+
128+
Yes, it's available.
129+
130+
## Is it possible to have a mix of Azure AD Premium P1, Azure AD Premium P2 and Workload Identities Premium licenses in one tenant?
131+
132+
Yes, customers can have a mixture of license plans in one tenant.

articles/active-directory/develop/workload-identities-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,4 +52,5 @@ Here are some ways you can use workload identities:
5252

5353
## Next steps
5454

55-
Learn how to [secure access of workload identities](../conditional-access/workload-identity.md) with adaptive policies.
55+
- Learn how to [secure access of workload identities](../conditional-access/workload-identity.md) with adaptive policies.
56+
- Get answers to [frequently asked questions about workload identities](workload-identities-faqs.md).

0 commit comments

Comments
 (0)