Skip to content

Commit c0f1ca8

Browse files
authored
Merge pull request #177368 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents c0a8564 + 4cc4482 commit c0f1ca8

File tree

169 files changed

+2565
-1619
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

169 files changed

+2565
-1619
lines changed

articles/active-directory-b2c/id-token-hint.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -249,24 +249,25 @@ For both symmetric and asymmetric approaches, the `id_token_hint` technical prof
249249
<OrchestrationStep Order="1" Type="GetClaims" CpimIssuerTechnicalProfileReferenceId="IdTokenHint_ExtractClaims" />
250250
```
251251
1. In your relying party policy, repeat the same input claims you configured in the IdTokenHint_ExtractClaims technical profile. For example:
252+
252253
```xml
253-
<RelyingParty>
254-
<DefaultUserJourney ReferenceId="SignUp" />
255-
<TechnicalProfile Id="PolicyProfile">
256-
<DisplayName>PolicyProfile</DisplayName>
257-
<Protocol Name="OpenIdConnect" />
258-
<InputClaims>
259-
<InputClaim ClaimTypeReferenceId="email" PartnerClaimType="userId" />
254+
<RelyingParty>
255+
<DefaultUserJourney ReferenceId="SignUp" />
256+
<TechnicalProfile Id="PolicyProfile">
257+
<DisplayName>PolicyProfile</DisplayName>
258+
<Protocol Name="OpenIdConnect" />
259+
<InputClaims>
260+
<InputClaim ClaimTypeReferenceId="email" PartnerClaimType="userId" />
260261
</InputClaims>
261-
<OutputClaims>
262-
<OutputClaim ClaimTypeReferenceId="displayName" />
263-
<OutputClaim ClaimTypeReferenceId="givenName" />
264-
<OutputClaim ClaimTypeReferenceId="surname" />
265-
<OutputClaim ClaimTypeReferenceId="email" />
266-
<OutputClaim ClaimTypeReferenceId="objectId" PartnerClaimType="sub"/>
267-
<OutputClaim ClaimTypeReferenceId="identityProvider" />
268-
</OutputClaims>
269-
<SubjectNamingInfo ClaimType="sub" />
262+
<OutputClaims>
263+
<OutputClaim ClaimTypeReferenceId="displayName" />
264+
<OutputClaim ClaimTypeReferenceId="givenName" />
265+
<OutputClaim ClaimTypeReferenceId="surname" />
266+
<OutputClaim ClaimTypeReferenceId="email" />
267+
<OutputClaim ClaimTypeReferenceId="objectId" PartnerClaimType="sub"/>
268+
<OutputClaim ClaimTypeReferenceId="identityProvider" />
269+
</OutputClaims>
270+
<SubjectNamingInfo ClaimType="sub" />
270271
</TechnicalProfile>
271272
</RelyingParty>
272273
```

articles/active-directory-b2c/partner-twilio.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -61,22 +61,24 @@ The following components make up the Twilio solution:
6161
1. Open the B2C-WebAPI-DotNet solution and replace the following values with your own tenant-specific values in the web.config:
6262

6363
```xml
64-
<add key="ida:Tenant" value="yourtenant.onmicrosoft.com" />
65-
<add key="ida:TenantId" value="d6f33888-0000-4c1f-9b50-1590f171fc70" />
66-
<add key="ida:ClientId" value="6bd98cc8-0000-446a-a05e-b5716ef2651b" />
67-
<add key="ida:ClientSecret" value="secret" />
68-
<add key="ida:AadInstance" value="https://yourtenant.b2clogin.com/tfp/{0}/{1}" />
69-
<add key="ida:RedirectUri" value="https://your hosted psd2 demo app url/" />
70-
```
64+
<add key="ida:Tenant" value="yourtenant.onmicrosoft.com" />
65+
<add key="ida:TenantId" value="d6f33888-0000-4c1f-9b50-1590f171fc70" />
66+
<add key="ida:ClientId" value="6bd98cc8-0000-446a-a05e-b5716ef2651b" />
67+
<add key="ida:ClientSecret" value="secret" />
68+
<add key="ida:AadInstance" value="https://yourtenant.b2clogin.com/tfp/{0}/{1}" />
69+
<add key="ida:RedirectUri" value="https://your hosted psd2 demo app url/" />
70+
```
7171

7272
1. The [web app](https://github.com/azure-ad-b2c/partner-integrations/tree/master/samples/Twilio-VerifyAPI/source-code/PSD2%20Demo%20App) also hosts the ID token hint generator and metadata endpoint.
73+
7374
- Create your signing certificate as described in this [sample description](https://github.com/azure-ad-b2c/samples/tree/master/policies/invite#creating-a-signing-certificate).
75+
7476
- Update the following lines based on your certificate in the web.config:
7577

76-
```xml
77-
<add key="ida:SigningCertThumbprint" value="4F39D6014818082CBB763E5BA5F230E545212E89" />
78-
<add key="ida:SigningCertAlgorithm" value="RS256" />
79-
```
78+
```xml
79+
<add key="ida:SigningCertThumbprint" value="4F39D6014818082CBB763E5BA5F230E545212E89" />
80+
<add key="ida:SigningCertAlgorithm" value="RS256" />
81+
```
8082

8183
1. Upload the demo application to your hosting provider of choice. Guidance for Azure App Service is provided in [this sample description](https://github.com/azure-ad-b2c/samples/tree/master/policies/invite#hosting-the-application-in-azure-app-service), including instructions for uploading your certificate.
8284

articles/active-directory-domain-services/manage-group-policy.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,15 @@ In a hybrid environment, group policies configured in an on-premises AD DS envir
2121

2222
This article shows you how to install the Group Policy Management tools, then edit the built-in GPOs and create custom GPOs.
2323

24+
If you are interested in server management strategy, including machines in Azure and
25+
[hybrid connected](../azure-arc/servers/overview.md),
26+
consider reading how to
27+
[convert Group Policy content](../governance/policy/how-to/guest-configuration-create-group-policy.md)
28+
to the
29+
[guest configuration](../governance/policy/concepts/guest-configuration.md)
30+
feature of
31+
[Azure Policy](../governance/policy/overview.md).
32+
2433
## Before you begin
2534

2635
To complete this article, you need the following resources and privileges:

articles/active-directory/app-provisioning/application-provisioning-config-problem-no-users-provisioned.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,7 @@ After automatic provisioning has been configured for an application (including v
2222
- Which users and groups have been **assigned** to the application. Note that provisioning nested groups are not supported. For more information on assignment, see [Assign a user or group to an enterprise app in Azure Active Directory](../manage-apps/assign-user-or-group-access-portal.md).
2323
- Whether or not **attribute mappings** are enabled, and configured to sync valid attributes from Azure AD to the app. For more information on attribute mappings, see [Customizing User Provisioning Attribute Mappings for SaaS Applications in Azure Active Directory](customize-application-attributes.md).
2424
- Whether or not there is a **scoping filter** present that is filtering users based on specific attribute values. For more information on scoping filters, see [Attribute-based application provisioning with scoping filters](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
25-
26-
25+
2726
If you observe that users are not being provisioned, consult the [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) in Azure AD. Search for log entries for a specific user.
2827

2928
You can access the provisioning logs in the Azure portal by selecting **Azure Active Directory** &gt; **Enterprise Apps** &gt; **Provisioning logs (preview)** in the **Activity** section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).

articles/active-directory/app-provisioning/application-provisioning-config-problem-scim-compatibility.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -50,14 +50,14 @@ Use the following URL to update PATCH behavior and ensure SCIM compliance. The f
5050
- Requests to add a single-value string attribute
5151
- Requests to replace multiple attributes
5252
- Requests to remove a group member
53-
53+
5454
This behavior is currently only available when using the flag, but will become the default behavior over the next few months. Note this feature flag currently does not work with on-demand provisioning.
5555
* **URL (SCIM Compliant):** aadOptscim062020
5656
* **SCIM RFC references:**
5757
* https://tools.ietf.org/html/rfc7644#section-3.5.2
5858

5959
Below are sample requests to help outline what the sync engine currently sends versus the requests that are sent once the feature flag is enabled.
60-
60+
6161
**Requests made to disable users:**
6262

6363
**Without feature flag**
@@ -232,41 +232,41 @@ Below are sample requests to help outline what the sync engine currently sends v
232232

233233

234234
* **Downgrade URL:** Once the new SCIM compliant behavior becomes the default on the non-gallery application, you can use the following URL to roll back to the old, non SCIM compliant behavior: AzureAdScimPatch2017
235-
235+
236236

237237

238238
## Upgrading from the older customappsso job to the SCIM job
239239
Following the steps below will delete your existing customappsso job and create a new scim job.
240-
240+
241241
1. Sign into the Azure portal at https://portal.azure.com.
242242
2. In the **Azure Active Directory > Enterprise Applications** section of the Azure portal, locate and select your existing SCIM application.
243243
3. In the **Properties** section of your existing SCIM app, copy the **Object ID**.
244244
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer
245245
and sign in as the administrator for the Azure AD tenant where your app is added.
246246
5. In the Graph Explorer, run the command below to locate the ID of your provisioning job. Replace "[object-id]" with the service principal ID (object ID) copied from the third step.
247-
247+
248248
`GET https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs`
249249

250250
![Get Jobs](media/application-provisioning-config-problem-scim-compatibility/get-jobs.PNG "Get Jobs")
251251

252252

253253
6. In the results, copy the full "ID" string that begins with either "customappsso" or "scim".
254254
7. Run the command below to retrieve the attribute-mapping configuration, so you can make a backup. Use the same [object-id] as before, and replace [job-id] with the provisioning job ID copied from the last step.
255-
255+
256256
`GET https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/[job-id]/schema`
257-
257+
258258
![Get Schema](media/application-provisioning-config-problem-scim-compatibility/get-schema.PNG "Get Schema")
259259

260260
8. Copy the JSON output from the last step, and save it to a text file. The JSON contains any custom attribute-mappings that you added to your old app, and should be approximately a few thousand lines of JSON.
261261
9. Run the command below to delete the provisioning job:
262-
262+
263263
`DELETE https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/[job-id]`
264264

265265
10. Run the command below to create a new provisioning job that has the latest service fixes.
266266

267267
`POST https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs`
268268
`{ "templateId": "scim" }`
269-
269+
270270
11. In the results of the last step, copy the full "ID" string that begins with "scim". Optionally, reapply your old attribute-mappings by running the command below, replacing [new-job-id] with the new job ID you copied, and entering the JSON output from step #7 as the request body.
271271

272272
`POST https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/[new-job-id]/schema`
@@ -288,7 +288,7 @@ Following the steps below will delete your existing customappsso job and create
288288

289289
`POST https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs`
290290
`{ templateId: "customappsso" }`
291-
291+
292292
6. Return to the first web browser window, and select the **Provisioning** tab for your application.
293293
7. Complete the user provisioning configuration as you normally would.
294294

articles/active-directory/app-provisioning/application-provisioning-configuration-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Content-type: application/json
7777
],
7878
"publisher": "Amazon",
7979
"description": "Federate to a single AWS account and use SAML claims to authorize access to AWS IAM roles. If you have many AWS accounts, consider using the AWS Single Sign-On gallery application instead."
80-
80+
8181
}
8282
```
8383

@@ -242,7 +242,7 @@ Configuring provisioning requires establishing a trust between Azure AD and the
242242
#### Request
243243
```msgraph-interactive
244244
PUT https://graph.microsoft.com/beta/servicePrincipals/{id}/synchronization/secrets
245-
245+
246246
{
247247
"value": [
248248
{

articles/active-directory/app-provisioning/application-provisioning-log-analytics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Once you've configured Azure monitoring, you can enable logs for application pro
2929

3030
> [!NOTE]
3131
> If you have just recently provisioned a workspace, it can take some time before you can send logs to it. If you receive an error that the subscription is not registered to use *microsoft.insights* then check back after a few minutes.
32-
32+
3333
## Understanding the data
3434
The underlying data stream that Provisioning sends log viewers is almost identical. Azure Monitor logs gets nearly the same stream as the Azure portal UI and Azure API. There are only a few **differences** in the log fields as outlined in the following table. To learn more about these fields, see [List provisioningObjectSummary](/graph/api/provisioningobjectsummary-list?preserve-view=true&tabs=http&view=graph-rest-beta).
3535

@@ -116,4 +116,4 @@ We're taking an open source and community-based approach to application provisio
116116
- [Get started with queries in Azure Monitor logs](../../azure-monitor/logs/get-started-queries.md)
117117
- [Create and manage alert groups in the Azure portal](../../azure-monitor/alerts/action-groups.md)
118118
- [Install and use the log analytics views for Azure Active Directory](../reports-monitoring/howto-install-use-log-analytics-views.md)
119-
- [Provisioning logs API](/graph/api/resources/provisioningobjectsummary?preserve-view=true&view=graph-rest-beta)
119+
- [Provisioning logs API](/graph/api/resources/provisioningobjectsummary?preserve-view=true&view=graph-rest-beta)

articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ While in quarantine:
2525
## How do I know if my application is in quarantine?
2626

2727
There are three ways to check whether an application is in quarantine:
28-
28+
2929
- In the Azure portal, navigate to **Azure Active Directory** > **Enterprise applications** > &lt;*application name*&gt; > **Provisioning** and review the progress bar for a quarantine message.
3030

3131
![Provisioning status bar showing quarantine status](./media/application-provisioning-quarantine-status/progress-bar-quarantined.png)
@@ -83,7 +83,7 @@ After you've resolved the issue, restart the provisioning job. Certain changes t
8383
- Use the Azure portal to restart the provisioning job. On the application's **Provisioning** page, select **Restart provisioning**. This action fully restarts the provisioning service, which can take some time. A full initial cycle will run again, which clears escrows, removes the app from quarantine, and clears any watermarks. The service will then evaluate all the users in the source system again and determine if they are in scope for provisioning. This can be useful when your application is currently in quarantine, as this article discusses, or you need to make a change to your attribute mappings. Note that the initial cycle takes longer to complete than the typical incremental cycle due to the number of objects that need to be evaluated. You can learn more about the performance of initial and incremental cycles [here](application-provisioning-when-will-provisioning-finish-specific-user.md).
8484

8585
- Use Microsoft Graph to [restart the provisioning job](/graph/api/synchronization-synchronizationjob-restart?tabs=http&view=graph-rest-beta&preserve-view=true). You'll have full control over what you restart. You can choose to clear escrows (to restart the escrow counter that accrues toward quarantine status), clear quarantine (to remove the application from quarantine), or clear watermarks. Use the following request:
86-
86+
8787
```microsoft-graph
8888
POST /servicePrincipals/{id}/synchronization/jobs/{jobId}/restart
8989
```

articles/active-directory/authentication/how-to-nudge-authenticator-app.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ The following table lists **authenticationMethodsRegistrationCampaign** properti
9191

9292
| Name | Possible values | Description |
9393
|------|-----------------|-------------|
94-
| state | "enabled"<br>"disabled"<br>"default" | Allows you to enable or disable the feature.<br>Default value is used when the configuration hasn't been explicitly set and will use Azure AD default value for this setting. Currently maps to disabled.<br>Change states to either enabled or disabled as needed. |
94+
| state | "enabled"<br>"disabled"<br>"default" | Allows you to enable or disable the feature.<br>Default value is used when the configuration hasn't been explicitly set and will use Azure AD default value for this setting. Currently maps to disabled.<br>Change states to either enabled or disabled as needed. |
9595
| snoozeDurationInDays | Range: 0 – 14 | Defines after how many days the user will see the nudge again.<br>If the value is 0, the user is nudged during every MFA attempt.<br>Default: 1 day |
9696
| includeTargets | N/A | Allows you to include different users and groups that you want the feature to target. |
9797
| excludeTargets | N/A | Allows you to exclude different users and groups that you want omitted from the feature. If a user is in a group that is excluded and a group that is included, the user will be excluded from the feature.|
@@ -155,7 +155,7 @@ Here are a few sample JSONs you can use to get started!
155155
"targetType": "group",
156156
"targetedAuthenticationMethod": "microsoftAuthenticator"
157157
},
158-
{
158+
{
159159
"id": "*********PLEASE ENTER GUID***********",
160160
"targetType": "user",
161161
"targetedAuthenticationMethod": "microsoftAuthenticator"
@@ -180,7 +180,7 @@ Here are a few sample JSONs you can use to get started!
180180
"id": "*********PLEASE ENTER GUID***********",
181181
"targetType": "group"
182182
},
183-
{
183+
{
184184
"id": "*********PLEASE ENTER GUID***********",
185185
"targetType": "user"
186186
}
@@ -191,7 +191,7 @@ Here are a few sample JSONs you can use to get started!
191191
"targetType": "group",
192192
"targetedAuthenticationMethod": "microsoftAuthenticator"
193193
},
194-
{
194+
{
195195
"id": "*********PLEASE ENTER GUID***********",
196196
"targetType": "user",
197197
"targetedAuthenticationMethod": "microsoftAuthenticator"

articles/active-directory/cloud-sync/how-to-prerequisites.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,8 @@ For steps on how to upgrade an existing agent to use a gMSA account see [Group M
5252

5353
#### Create gMSA account with PowerShell
5454
You can use the following PowerShell script to create a custom gMSA account. Then you can use the [cloud sync gMSA cmdlets](how-to-gmsa-cmdlets.md) to apply more granular permissions.
55-
```powershell
55+
56+
```powershell
5657
# Filename: 1_SetupgMSA.ps1
5758
# Description: Creates and installs a custom gMSA account for use with Azure AD Connect cloud sync.
5859
#
@@ -84,7 +85,8 @@ New-ADServiceAccount -Name $Name `
8485
8586
# Install the new service account on Azure AD Cloud Sync server
8687
Install-ADServiceAccount -Identity $Name
87-
```
88+
```
89+
8890
For additional information on the cmdlets above, see [Getting Started with Group Managed Service Accounts](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj128431(v=ws.11)?redirectedfrom=MSDN).
8991

9092
### In the Azure Active Directory admin center

0 commit comments

Comments
 (0)