Skip to content

Commit c06aae0

Browse files
authored
Merge pull request #241188 from MicrosoftDocs/main
Publish to live, Monday 4 AM PST, 6/12
2 parents fb4dd4d + 4041aee commit c06aae0

File tree

54 files changed

+705
-179
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

54 files changed

+705
-179
lines changed

articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-configure-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -278,4 +278,4 @@ The application uses *authPopup.js* to handle the authentication flow when the u
278278
## Next steps
279279

280280
> [!div class="nextstepaction"]
281-
> [Sign in and sign out of the Vanilla JS SPA](./how-to-single-page-app-vanillajs-sign-in-sign-out.md)
281+
> [Sign in and sign out of the vanilla JS SPA](./how-to-single-page-app-vanillajs-sign-in-sign-out.md)

articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-prepare-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.date: 06/09/2023
1414
#Customer intent: As a developer, I want to learn how to configure a vanilla JavaScript single-page app (SPA) to sign in and sign out users with my Azure Active Directory (AD) for customers tenant.
1515
---
1616

17-
# Tutorial: Prepare your customer tenant to authenticate a Vanilla JavaScript single-page app (SPA)
17+
# Tutorial: Prepare your customer tenant to authenticate a vanilla JavaScript single-page app (SPA)
1818

1919
This tutorial series demonstrates how to build a vanilla JavaScript single-page application (SPA) and prepare it for authentication using the Microsoft Entra admin center. You'll use the [Microsoft Authentication Library for JavaScript](/javascript/api/overview/msal-overview) library to authenticate your app with your Azure Active Directory (Azure AD) for customers tenant. Finally, you'll run the application and test the sign-in and sign-out experiences.
2020

articles/active-directory/external-identities/customers/how-to-use-app-roles-customers.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: ciam
1010
ms.topic: how-to
11-
ms.date: 06/10/2023
11+
ms.date: 06/13/2023
1212
ms.author: mimart
1313
ms.custom: it-pro
1414
---
@@ -48,6 +48,8 @@ Though you can use app roles or groups for authorization, key differences betwee
4848

4949
[!INCLUDE [ciam-assign-user-and-groups-to-roles](./includes/access-control/assign-users-groups-roles.md)]
5050

51+
To test your application, sign out and sign in again with the user you assigned the roles. Inspect the security token to make sure that it contains the user's role.
52+
5153
## Add group claims to security tokens
5254

5355
[!INCLUDE [ciam-add-group-claim-to-token](./includes/access-control/add-group-claim-in-token.md)]
@@ -56,6 +58,8 @@ Though you can use app roles or groups for authorization, key differences betwee
5658

5759
[!INCLUDE [ciam-add-member-to-group](./includes/access-control/add-member-to-group.md)]
5860

61+
To test your application, sign out, and then sign in again with the user you added to the security group. Inspect the security token to make sure that it contains the user's group membership.
62+
5963
## Groups and application roles support
6064

6165
A customer tenant follows the Azure AD user and group management model and application assignment. Many of the core Azure AD features are being phased into customer tenants.
@@ -80,4 +84,4 @@ The following table shows which features are currently available.
8084
| Change security group members using the Microsoft Entra admin center | Yes |
8185
| Change security group members using the Microsoft Graph API | Yes |
8286
| Scale up to 50,000 users and 50,000 groups | Not currently available |
83-
| Add 50,000 users to at least two groups | Not currently available |
87+
| Add 50,000 users to at least two groups | Not currently available |

articles/active-directory/external-identities/customers/includes/access-control/add-member-to-group.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,5 +15,5 @@ Now that you've added app groups claim in your application, add users to the sec
1515
1. Select **Members**.
1616
1. Select **+ Add members**.
1717
1. Scroll through the list or enter a name in the search box. You can choose multiple names. When you're ready, choose **Select**.
18-
2. The **Group Overview** page updates to show the number of members who are now added to the group.
19-
3. To test your application, sign out, and then sign in again with the user you added to the security group.
18+
1. The **Group Overview** page updates to show the number of members who are now added to the group.
19+

articles/active-directory/external-identities/customers/includes/access-control/assign-users-groups-roles.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ author: kengaderdus
33
ms.service: active-directory
44
ms.subservice: ciam
55
ms.topic: include
6-
ms.date: 06/10/2023
6+
ms.date: 06/13/2023
77
ms.author: kengaderdus
88
---
99
Once you've added app roles in your application, administrator can assign users and groups to the roles. Assignment of users and groups to roles can be done through the admin center, or programmatically using [Microsoft Graph](/graph/api/user-post-approleassignments). When the users assigned to the various app roles sign in to the application, their tokens have their assigned roles in the `roles` claim.
@@ -19,8 +19,7 @@ To assign users and groups to application roles by using the Azure portal:
1919
1. Select **Add user** to open the **Add Assignment** pane.
2020
1. In the **Add Assignment** pane, select **Users and groups**. A list of users and security groups appears. You can select multiple users and groups in the list.
2121
1. Once you've selected users and groups, choose **Select**.
22-
2. In the **Add assignment** pane, choose **Select a role**. All the roles you defined for the application appear.
23-
3. Select a role, and then choose **Select**.
24-
4. Select **Assign** to finish the assignment of users and groups to the app.
25-
5. Confirm that the users and groups you added appear in the **Users and groups** list.
26-
6. To test your application, sign out and sign in again with the user you assigned the roles.
22+
1. In the **Add assignment** pane, choose **Select a role**. All the roles you defined for the application appear.
23+
1. Select a role, and then choose **Select**.
24+
1. Select **Assign** to finish the assignment of users and groups to the app.
25+
1. Confirm that the users and groups you added appear in the **Users and groups** list.

articles/active-directory/external-identities/customers/includes/register-app/add-platform-redirect-url-node.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ author: kengaderdus
33
ms.service: active-directory
44
ms.subservice: ciam
55
ms.topic: include
6-
ms.date: 03/30/2023
6+
ms.date: 06/13/2023
77
ms.author: kengaderdus
88
---
99
To specify your app type to your app registration, follow these steps:
@@ -12,5 +12,5 @@ To specify your app type to your app registration, follow these steps:
1212
1. On the **Platform configurations** page, select **Add a platform**, and then select **Web** option.
1313
1. For the **Redirect URIs** enter `http://localhost:3000/auth/redirect`
1414
1. Select **Configure** to save your changes.
15-
1. Back on the **Platform configurations** page, in the new **Single-page application** that has appeared, select **Add URI**, then enter `http://localhost:3000/`
15+
1. On the **Platform configurations** page, under **Web**, select **Add URI**, then enter `http://localhost:3000/`
1616
1. Select **Save** to save your changes, and ensure that both URIs are listed.

articles/active-directory/external-identities/customers/includes/register-app/add-platform-redirect-url-vanilla-js.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ author: kengaderdus
33
ms.service: active-directory
44
ms.subservice: ciam
55
ms.topic: include
6-
ms.date: 03/30/2023
6+
ms.date: 06/12/2023
77
ms.author: kengaderdus
88
---
99
To specify your app type to your app registration, follow these steps:
1010

1111
1. Under **Manage**, select **Authentication**.
12-
1. On the **Platform configurations** page, select **Add a platform**, and then select **Web** option.
12+
1. On the **Platform configurations** page, select **Add a platform**, and then select **SPA** option.
1313
1. For the **Redirect URIs** enter `http://localhost:3000/auth/redirect`
1414
1. Select **Configure** to save your changes.
1515
1. Back on the **Platform configurations** page, in the new **Single-page application** that has appeared, select **Add URI**, then enter `http://localhost:3000/`

articles/active-directory/saas-apps/markit-procurement-service-provisioning-tutorial.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
4040
1. Determine what data to [map between Azure AD and Markit Procurement Service](../app-provisioning/customize-application-attributes.md).
4141

4242
## Step 2. Configure Markit Procurement Service to support provisioning with Azure AD
43-
Contact Markit Procurement Service support to configure Markit Procurement Service to support provisioning with Azure AD.
43+
You can begin the process of connecting your Markit environment to Azure AD provisioning by reaching out to the [Markit support team](mailto:[email protected]) or directly with your Markit account manager. You're provided a document that contains your **Tenant URL**, along with a **Secret Token**. Markit account managers can assist you with setting up this integration and are available to answer any questions about its configuration or use.
4444

4545
## Step 3. Add Markit Procurement Service from the Azure AD application gallery
4646

@@ -57,7 +57,7 @@ The Azure AD provisioning service allows you to scope who will be provisioned ba
5757

5858
## Step 5. Configure automatic user provisioning to Markit Procurement Service
5959

60-
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users in TestApp based on user assignments in Azure AD.
60+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users in Markit Procurement Service based on user assignments in Azure AD.
6161

6262
### To configure automatic user provisioning for Markit Procurement Service in Azure AD:
6363

@@ -89,6 +89,10 @@ This section guides you through the steps to configure the Azure AD provisioning
8989

9090
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Markit Procurement Service**.
9191

92+
1. Uncheck **Create** checkbox. Markit recommends unchecking the create option. By unchecking create options, users are created on demand during first time user login.
93+
94+
![Screenshot of Uncheck create option.](media/markit-procurement-service-provisioning-tutorial/create-uncheck.png)
95+
9296
1. Review the user attributes that are synchronized from Azure AD to Markit Procurement Service in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Markit Procurement Service for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you need to ensure that the Markit Procurement Service API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
9397

9498
|Attribute|Type|Supported for filtering|Required by Markit Procurement Service|
2.09 KB
Loading
3.4 KB
Loading

0 commit comments

Comments
 (0)