Skip to content

Commit bddc3cd

Browse files
committed
Merge branch 'main' into release-qumolo
2 parents 663379b + 6d519fb commit bddc3cd

File tree

187 files changed

+2079
-1364
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

187 files changed

+2079
-1364
lines changed

articles/active-directory-b2c/partner-akamai-secure-hybrid-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -385,8 +385,8 @@ Once the Application is deployed in a private environment and a connector is cap
385385

386386
| Header Name | Attribute |
387387
|--------------|-----------|
388-
| ps-sso-first | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
389-
| ps-sso-last | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname |
388+
| ps-sso-first | `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name` |
389+
| ps-sso-last | `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname` |
390390
| ps-sso-EmailAddress | emailaddress |
391391
| ps-sso-uid | objectId |
392392

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom: has-adal-ref
1919

2020
# Certificate user IDs
2121

22-
Azure AD has a multivalued attribute named **certificateUserIds** on the user object that can be used in Username bindings. The attribute allows up to four values, and each value can be of 120-character length. It can store any value, and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
22+
Users in Azure AD can have a multivalued attribute named **certificateUserIds**. The attribute allows up to four values, and each value can be of 120-character length. It can store any value, and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
2323

2424
## Supported patterns for certificate user IDs
2525

articles/active-directory/develop/active-directory-jwt-claims-customization.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Customize app JSON Web Token (JWT) claims
2+
title: Customize app JSON Web Token (JWT) claims (Preview)
33
description: Learn how to customize the claims issued by Microsoft identity platform in the JSON web token (JWT) token for enterprise applications.
44
services: active-directory
55
author: davidmu1
@@ -13,11 +13,11 @@ ms.author: davidmu
1313
ms.custom: aaddev
1414
---
1515

16-
# Customize claims issued in the JSON web token (JWT) for enterprise applications
16+
# Customize claims issued in the JSON web token (JWT) for enterprise applications (Preview)
1717

1818
The Microsoft identity platform supports single sign-on (SSO) with most enterprise applications, including both applications pre-integrated in the Azure AD app gallery and custom applications. When a user authenticates to an application through the Microsoft identity platform using the OIDC protocol, the Microsoft identity platform sends a token to the application. And then, the application validates and uses the token to log the user in instead of prompting for a username and password.
1919

20-
These JSON Web tokens (JWT) used by OIDC & OAuth applications contain pieces of information about the user known as *claims*. A *claim* is information that an identity provider states about a user inside the token they issue for that user.
20+
These JSON Web tokens (JWT) used by OIDC & OAuth applications (preview) contain pieces of information about the user known as *claims*. A *claim* is information that an identity provider states about a user inside the token they issue for that user.
2121

2222
In an [OIDC response](v2-protocols-oidc.md), *claims* data is typically contained in the ID Token issued by the identity provider in the form of a JWT.
2323

articles/active-directory/external-identities/user-properties.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Microsoft account | This user is homed in a Microsoft account and authenticates
8383
{host’s domain} | This user authenticates by using an Azure AD account that belongs to this organization.
8484
google.com | This user has a Gmail account and has signed up by using self-service to the other organization.
8585
facebook.com | This user has a Facebook account and has signed up by using self-service to the other organization.
86-
mail | This user has an email address that doesn't match with verified Azure AD or SAML/WS-Fed domains, and isn't a Gmail address or a Microsoft account.
86+
mail | This user has signed up by using Azure AD Email one-time passcode (OTP).
8787
phone | This user has an email address that doesn't match a verified Azure AD domain or a SAML/WS-Fed domain, and isn't a Gmail address or Microsoft account.
8888
{issuer URI} | This user is homed in an external organization that doesn't use Azure Active Directory as their identity provider, but instead uses a SAML/WS-Fed-based identity provider. The issuer URI is shown when the Identities field is clicked.
8989

articles/active-directory/fundamentals/azure-active-directory-b2c-deployment-plans.md

Lines changed: 156 additions & 192 deletions
Large diffs are not rendered by default.

articles/active-directory/hybrid/migrate-from-federation-to-cloud-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,15 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: hybrid
88
ms.topic: conceptual
9-
ms.date: 08/26/2022
9+
ms.date: 01/06/2023
1010

1111
ms.author: jricketts
1212
author: janicericketts
1313
manager: martinco
1414

1515
ms.collection: M365-identity-device-management
1616
---
17-
# Migrate from federation to cloud authentication
17+
# Migrate from federation to cloud authentication
1818

1919
In this article, you learn how to deploy cloud user authentication with either Azure Active Directory [Password hash synchronization (PHS)](whatis-phs.md) or [Pass-through authentication (PTA)](how-to-connect-pta.md). While we present the use case for moving from [Active Directory Federation Services (AD FS)](whatis-fed.md) to cloud authentication methods, the guidance substantially applies to other on premises systems as well.
2020

@@ -76,7 +76,7 @@ Although this deployment changes no other relying parties in your AD FS farm, yo
7676
7777
## Plan the project
7878
79-
When technology projects fail, it's typically because of mismatched expectations on impact, outcomes, and responsibilities. To avoid these pitfalls, [ensure that you're engaging the right stakeholders](../fundamentals/active-directory-deployment-plans.md#include-the-right-stakeholders) and that stakeholder roles in the project are well understood.
79+
When technology projects fail, it's typically because of mismatched expectations on impact, outcomes, and responsibilities. To avoid these pitfalls, [ensure that you're engaging the right stakeholders](../fundamentals/active-directory-deployment-plans.md) and that stakeholder roles in the project are well understood.
8080
8181
### Plan communications
8282

articles/active-directory/manage-apps/protect-against-consent-phishing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Administrators should be in control of application use by providing the right in
6464
- Investigate and hunt for consent phishing attacks by following the guidance on [advanced hunting with Microsoft 365 Defender](/microsoft-365/security/defender/advanced-hunting-overview).
6565
- Allow access to trusted applications and protect against those applications that aren't:
6666
- Use applications that have been publisher verified. [Publisher verification](../develop/publisher-verification-overview.md) helps administrators and users understand the authenticity of application developers through a Microsoft supported vetting process.
67-
- [Configure user consent settings](./configure-user-consent.md?tabs=azure-portal) to allow users to only consent to specific trusted applications, such as applications developed by the organization or from verified publishers.
67+
- [Configure user consent settings](./configure-user-consent.md?tabs=azure-portal) to allow users to only consent to specific trusted applications, such as applications developed by the organization or from verified publishers and only for low risk permissions you select.
6868
- Create proactive [application governance](/microsoft-365/compliance/app-governance-manage-app-governance) policies to monitor third-party application behavior on the Microsoft 365 platform to address common suspicious application behaviors.
6969

7070
## Next steps

articles/active-directory/saas-apps/atlassian-cloud-tutorial.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with Atlassian Cloud'
2+
title: 'Tutorial: Azure Active Directory SSO integration with Atlassian Cloud'
33
description: Learn how to configure single sign-on between Azure Active Directory and Atlassian Cloud.
44
services: active-directory
55
author: jeevansd
@@ -9,10 +9,10 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 01/06/2023
1313
ms.author: jeedes
1414
---
15-
# Tutorial: Integrate Atlassian Cloud with Azure Active Directory
15+
# Tutorial: Azure Active Directory SSO integration with Atlassian Cloud
1616

1717
In this tutorial, you'll learn how to integrate Atlassian Cloud with Azure Active Directory (Azure AD). When you integrate Atlassian Cloud with Azure AD, you can:
1818

@@ -49,8 +49,6 @@ To configure the integration of Atlassian Cloud into Azure AD, you need to add A
4949
1. In the **Add from the gallery** section, type **Atlassian Cloud** in the search box.
5050
1. Select **Atlassian Cloud** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5151

52-
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
53-
5452
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. You can learn more about O365 wizards [here](/microsoft-365/admin/misc/azure-ad-setup-guides?view=o365-worldwide&preserve-view=true).
5553

5654
## Configure and test Azure AD SSO
@@ -228,15 +226,15 @@ In this section, you test your Azure AD single sign-on configuration with follow
228226

229227
#### SP initiated:
230228

231-
* Click on **Test this application** in Azure portal. This will redirect to Atlassian Cloud Sign on URL where you can initiate the login flow.
229+
* Click on **Test this application** in Azure portal. This will redirect to Atlassian Cloud Sign-on URL where you can initiate the login flow.
232230

233231
* Go to Atlassian Cloud Sign-on URL directly and initiate the login flow from there.
234232

235233
#### IDP initiated:
236234

237235
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Atlassian Cloud for which you set up the SSO.
238236

239-
You can also use Microsoft My Apps to test the application in any mode. When you click the Atlassian Cloud tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Atlassian Cloud for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
237+
You can also use Microsoft My Apps to test the application in any mode. When you click the Atlassian Cloud tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Atlassian Cloud for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
240238

241239
## Next steps
242240

articles/active-directory/saas-apps/canvas-lms-tutorial.md

Lines changed: 17 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 01/06/2023
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure AD SSO integration with Canvas
@@ -80,17 +80,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8080
> [!NOTE]
8181
> These values are not real. Update these values with the actual Identifier and Sign on URL. Contact [Canvas Client support team](https://community.canvaslms.com/community/help) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8282
83-
5. In the **SAML Signing Certificate** section, click **Edit** button to open **SAML Signing Certificate** dialog.
83+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
8484

85-
![Edit SAML Signing Certificate](common/edit-certificate.png)
86-
87-
6. In the **SAML Signing Certificate** section, copy the **THUMBPRINT** and save it on your computer.
88-
89-
![Copy Thumbprint value](common/copy-thumbprint.png)
90-
91-
7. On the **Set up Canvas** section, copy the appropriate URL(s) as per your requirement.
92-
93-
![Copy configuration URLs](common/copy-configuration-urls.png)
85+
![The Certificate download link](common/copy-metadataurl.png)
9486

9587
### Create an Azure AD test user
9688

@@ -120,33 +112,18 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
120112

121113
1. In a different web browser window, log in to your Canvas company site as an administrator.
122114

123-
2. Go to **Courses \> Managed Accounts \> Microsoft**.
124-
125-
![Canvas](./media/canvas-lms-tutorial/course.png "Canvas")
126-
127-
3. In the navigation pane on the left, select **Authentication**, and then click **Add New SAML Config**.
128-
129-
![Authentication](./media/canvas-lms-tutorial/tools.png "Authentication")
130-
131-
4. On the Current Integration page, perform the following steps:
132-
133-
![Current Integration](./media/canvas-lms-tutorial/save.png "Current Integration")
115+
2. Go to **Admin > Microsoft OneNote > Authentication**.
116+
3. Choose an authentication service as **SAML**.
134117

135-
a. In **IdP Entity ID** textbox, paste the value of **Azure Ad Identifier** which you have copied from Azure portal.
118+
![Canvas](./media/canvas-lms-tutorial/admin.png "Canvas")
136119

137-
b. In **Log On URL** textbox, paste the value of **Login URL** which you have copied from Azure portal .
120+
4. On the **Current Provider** page, perform the following steps:
138121

139-
c. In **Log Out URL** textbox, paste the value of **Logout URL** which you have copied from Azure portal.
122+
![Current Integration](./media/canvas-lms-tutorial/current-provider.png "Current Integration")
140123

141-
d. In **Change Password Link** textbox, paste the value of **Change Password URL** which you have copied from Azure portal.
124+
a. In **IdP Metadata URI** textbox, paste the value of **App Federation Metadata URL** value, which you have copied from Azure portal.
142125

143-
e. In **Certificate Fingerprint** textbox, paste the **Thumbprint** value of certificate which you have copied from Azure portal.
144-
145-
f. From the **Login Attribute** list, select **NameID**.
146-
147-
g. From the **Identifier Format** list, select **emailAddress**.
148-
149-
h. Click **Save Authentication Settings**.
126+
b. Click **Save**.
150127

151128
### Create Canvas test user
152129

@@ -156,31 +133,19 @@ To enable Azure AD users to log in to Canvas, they must be provisioned into Canv
156133

157134
1. Log in to your **Canvas** tenant.
158135

159-
2. Go to **Courses \> Managed Accounts \> Microsoft**.
160-
161-
![Canvas](./media/canvas-lms-tutorial/course.png "Canvas")
162-
163-
3. Click **Users**.
136+
2. Go to **Admin > Microsoft OneNote > People**.
164137

165-
![Screenshot shows Canvas menu with Users selected.](./media/canvas-lms-tutorial/user.png "Users")
138+
3. Click **+People**.
166139

167-
4. Click **Add New User**.
140+
4. On the Add a New User dialog page, perform the following steps:
168141

169-
![Screenshot shows the Add a new User button.](./media/canvas-lms-tutorial/add-user.png "Users")
170-
171-
5. On the Add a New User dialog page, perform the following steps:
172-
173-
![Add User](./media/canvas-lms-tutorial/name.png "Add User")
142+
![Add User](./media/canvas-lms-tutorial/new-user.png "Add User")
174143

175144
a. In the **Full Name** textbox, enter the name of user like **BrittaSimon**.
176145

177146
b. In the **Email** textbox, enter the email of user like **brittasimon\@contoso.com**.
178147

179-
c. In the **Login** textbox, enter the user’s Azure AD email address like **brittasimon\@contoso.com**.
180-
181-
d. Select **Email the user about this account creation**.
182-
183-
e. Click **Add User**.
148+
c. Click **Add User**.
184149

185150
> [!NOTE]
186151
> You can use any other Canvas user account creation tools or APIs provided by Canvas to provision Azure AD user accounts.
@@ -189,9 +154,9 @@ To enable Azure AD users to log in to Canvas, they must be provisioned into Canv
189154

190155
In this section, you test your Azure AD single sign-on configuration with following options.
191156

192-
* Click on **Test this application** in Azure portal. This will redirect to Canvas Sign-on URL where you can initiate the login flow.
157+
* Click on **Test this application** in Azure portal. This will redirect to Canvas Sign on URL where you can initiate the login flow.
193158

194-
* Go to Canvas Sign-on URL directly and initiate the login flow from there.
159+
* Go to Canvas Sign on URL directly and initiate the login flow from there.
195160

196161
* You can use Microsoft My Apps. When you click the Canvas tile in the My Apps, you should be automatically signed in to the Canvas for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
197162

0 commit comments

Comments
 (0)