You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/authentication-scenarios.md
+17Lines changed: 17 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,6 +74,23 @@ Tokens are only valid for a limited amount of time. Usually the STS provides a p
74
74
75
75
Access tokens are passed to a Web API as the bearer token in the `Authorization` header. An app can provide a refresh token to the STS, and if the user access to the app wasn't revoked, it will get back a new access token and a new refresh token. This is how the scenario of someone leaving the enterprise is handled. When the STS receives the refresh token, it won't issue another valid access token if the user is no longer authorized.
76
76
77
+
### How each flow emits tokens and codes
78
+
79
+
Depending on how your client is built, it can use one (or several) of the authentication flows supported by Azure AD. These flows can produce a variety of tokens (id_tokens, refresh tokens, access tokens) as well as authorization codes, and require different tokens to make them work. This chart provides an overview:
|[Client credentials](v2-oauth2-client-creds-grant-flow.md)||| x (app-only)|||
89
+
90
+
Tokens issued via the implicit mode have a length limitation due to being passed back to the browser via the URL (where `response_mode` is `query` or `fragment`). Some browsers have a limit on the size of the URL that can be put in the browser bar and fail when it is too long. Thus, these tokens do not have `groups` or `wids` claims.
91
+
92
+
Now that you have an overview of the basics, read on to understand the identity app model and API, learn how provisioning works in Azure AD, and get links to detailed information about common scenarios Azure AD supports.
93
+
77
94
## Application model
78
95
79
96
Applications can sign in users themselves or delegate sign-in to an identity provider. See [Authentication flows and app scenarios](authentication-flows-app-scenarios.md) to learn about sign-in scenarios supported by Azure AD.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/hybrid-azuread-join-plan.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,7 +100,9 @@ If your Windows 10 domain joined devices are [Azure AD registered](overview.md#g
100
100
### Additional considerations
101
101
- If your environment uses virtual desktop infrastructure (VDI), see [Device identity and desktop virtualization](/azure/active-directory/devices/howto-device-identity-virtual-desktop-infrastructure).
102
102
103
-
- Hybrid Azure AD join is supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Hybrid Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support. Starting from Windows 10 1903 release, TPMs 1.2 are not used for hybrid Azure AD join and devices with those TPMs will be considered as if they don't have a TPM.
103
+
- Hybrid Azure AD join is supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Hybrid Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support.
104
+
105
+
- Starting from Windows 10 1903 release, TPMs 1.2 are not used with hybrid Azure AD join and devices with those TPMs will be considered as if they don't have a TPM.
104
106
105
107
## Review controlled validation of hybrid Azure AD join
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/license-users-groups.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -132,6 +132,9 @@ You can remove a license from a user's Azure AD user page, from the group overvi
132
132
1. Select **Remove license**.
133
133
134
134

135
+
136
+
> [!NOTE]
137
+
> When an on-premises user account synced to Azure AD falls out of scope for the sync or when the sync is removed, the user is soft-deleted in Azure AD. When this occurs, licenses assigned to the user directly or via group-based licensing will be marked as **suspended** rather than **deleted**.
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-organization.md
+42-40Lines changed: 42 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,28 +18,28 @@ ms.reviewer: mwahl
18
18
ms.collection: M365-identity-device-management
19
19
20
20
21
-
#Customer intent: As a administrator, I want to allow users in certain partner organizations to request access packages so that our organization can collaborate on projects.
21
+
#Customer intent: As an administrator, I want to allow users in certain partner organizations to request access packages so that our organizations can collaborate on projects.
22
22
23
23
---
24
24
25
25
# Add a connected organization in Azure AD entitlement management
26
26
27
-
Azure AD entitlement management enables you to collaborate with people outside your organization. If you frequently collaborate with users in an external Azure AD directory or domain, you can add them as a connected organization. This article describes how to add a connected organization so that you can allow users outside your organization to request resources in your directory.
27
+
With Azure Active Directory (Azure AD) entitlement management, you can collaborate with people outside your organization. If you frequently collaborate with users in an external Azure AD directory or domain, you can add them as a connected organization. This article describes how to add a connected organization so that you can allow users outside your organization to request resources in your directory.
28
28
29
29
## What is a connected organization?
30
30
31
31
A connected organization is an external Azure AD directory or domain that you have a relationship with.
32
32
33
33
For example, suppose you work at Woodgrove Bank and you want to collaborate with two external organizations. These two organizations have different configurations:
34
34
35
-
- Graphic Design Institute uses Azure AD and their users have a user principal name that ends with `graphicdesigninstitute.com`
36
-
- Contoso does not yet use Azure AD. Contoso users have a user principal name that ends with `contoso.com`.
35
+
- Graphic Design Institute uses Azure AD, and their users have a user principal name that ends with *graphicdesigninstitute.com*.
36
+
- Contoso does not yet use Azure AD. Contoso users have a user principal name that ends with *contoso.com*.
37
37
38
-
In this case, you can configure two connected organizations. You would create one connected organization for Graphic Design Institute and one for Contoso. If you then add those two connected organizations to a policy, users from each organization with a user principal name matching the policy can request access packages. Users with a user principal name that has a domain of graphicdesigninstitute.com would match the Graphic Design Instituteconnected organization and be allowed to submit requests, while users with a user principal name that has a domain of contoso.com would match the Contosoconnected organization and would also be allowed to request packages. Furthermore, because Graphic Design Institute uses Azure AD, any users with a principal name matching a [verified domain](../fundamentals/add-custom-domain.md#verify-your-custom-domain-name) added to their tenant, such as graphicdesigninstitute.example will also be able to request access packages using the same policy.
38
+
In this case, you can configure two connected organizations. You create one connected organization for Graphic Design Institute and one for Contoso. If you then add the two connected organizations to a policy, users from each organization with a user principal name that matches the policy can request access packages. Users with a user principal name that has a domain of *graphicdesigninstitute.com* would match the Graphic Design Institute-connected organization and be allowed to submit requests. Users with a user principal name that has a domain of *contoso.com* would match the Contoso-connected organization and would also be allowed to request packages. And, because Graphic Design Institute uses Azure AD, any users with a principal name that matches a [verified domain](../fundamentals/add-custom-domain.md#verify-your-custom-domain-name)that's added to their tenant, such as *graphicdesigninstitute.example*, would also be able to request access packages by using the same policy.
How users from the Azure AD directory or domain will authenticate depends on the authentication type. The authentication types for connected organizations are the following:
42
+
How users from the Azure AD directory or domain authenticate depends on the authentication type. The authentication types for connected organizations are:
43
43
44
44
- Azure AD
45
45
-[Direct federation](../b2b/direct-federation.md)
@@ -51,85 +51,87 @@ For a demonstration of how to add a connected organization, watch the following
51
51
52
52
## Add a connected organization
53
53
54
-
Follow these steps to add an external Azure AD directory or domain as a connected organization.
54
+
To add an external Azure AD directory or domain as a connected organization, follow the instructions in this section.
55
55
56
-
**Prerequisite role:**Global administrator, User administrator, or Guest inviter
56
+
**Prerequisite role**: *Global administrator*, *User administrator*, or *Guest inviter*
57
57
58
-
1. In the Azure portal, click**Azure Active Directory** and then click**Identity Governance**.
58
+
1. In the Azure portal, select**Azure Active Directory**, and then select**Identity Governance**.
59
59
60
-
1. In the left menu, click**Connected organizations** and then click**Add connected organization**.
60
+
1. In the left pane, select**Connected organizations**, and then select**Add connected organization**.
1. Select **Add** to add the Azure AD directory or domain. Currently, you can add only one Azure AD directory or domain per connected organization.
77
79
78
80
> [!NOTE]
79
-
> All users from the Azure AD directory or domain will be able to request this access package. This includes users in Azure AD from all subdomains associated with the directory, unless those domains are blocked by the Azure B2B allow or deny list. For more information, see [Allow or block invitations to B2B users from specific organizations](../b2b/allow-deny-list.md).
81
+
> All users from the Azure AD directory or domain will be able to request this access package. This includes users in Azure AD from all subdomains associated with the directory, unless those domains are blocked by the Azure AD business to business (B2B) allow or deny list. For more information, see [Allow or block invitations to B2B users from specific organizations](../b2b/allow-deny-list.md).
80
82
81
-
1.Once you have added the Azure AD directory or domain, click**Select**.
83
+
1.After you've added the Azure AD directory or domain, select**Select**.
1.On the **Sponsors** tab, add optional sponsors for this connected organization.
89
+
1.Select the **Sponsors** tab, and then add optional sponsors for this connected organization.
88
90
89
91
Sponsors are internal or external users already in your directory that are the point of contact for the relationship with this connected organization. Internal sponsors are member users in your directory. External sponsors are guest users from the connected organization that were previously invited and are already in your directory. Sponsors can be utilized as approvers when users in this connected organization request access to this access package. For information about how to invite a guest user to your directory, see [Add Azure Active Directory B2B collaboration users in the Azure portal](../b2b/add-users-administrator.md).
90
92
91
-
When you click**Add/Remove**, a pane appears to select the internal or external sponsors. The pane displays an unfiltered list of users and groups in your directory.
93
+
When you select**Add/Remove**, a pane opens in which you can choose internal or external sponsors. The pane displays an unfiltered list of users and groups in your directory.
If the connected organization changes to a different domain, if you have a new name for that organization, or you wish to change the sponsors, you can update the connected organization.
103
+
If the connected organization changes to a different domain, the organization's name changes, or you want to change the sponsors, you can update the connected organization by following the instructions in this section.
102
104
103
-
**Prerequisite role:**Global administrator, User administrator, or Guest inviter
105
+
**Prerequisite role**: *Global administrator*, *User administrator*, or *Guest inviter*
104
106
105
-
1. In the Azure portal, click**Azure Active Directory** and then click**Identity Governance**.
107
+
1. In the Azure portal, select**Azure Active Directory**, and then select**Identity Governance**.
106
108
107
-
1. In the left menu, click**Connected organizations** and then click to open the connected organization.
109
+
1. In the left pane, select**Connected organizations**, and then select the connected organization to open it.
108
110
109
-
1.On the Overview page, click**Edit** to change the organization name or description.
111
+
1.In the connected organization's overview pane, select**Edit** to change the organization name or description.
110
112
111
-
1.On the Directory + domain page, click**Update directory + domain** to change to a different directory or domain.
113
+
1.In the **Directory + domain** pane, select**Update directory + domain** to change to a different directory or domain.
112
114
113
-
1.On the Sponsors page, click**Add internal sponsors** or **Add external sponsors** to add a user as a sponsor. To remove a sponsor, click on the sponsor and on the menu on the right, click**Delete**.
115
+
1.In the **Sponsors** pane, select**Add internal sponsors** or **Add external sponsors** to add a user as a sponsor. To remove a sponsor, select the sponsor and, in the right pane, select**Delete**.
114
116
115
117
116
118
## Delete a connected organization
117
119
118
120
If you no longer have a relationship with an external Azure AD directory or domain, you can delete the connected organization.
119
121
120
-
**Prerequisite role:**Global administrator, User administrator, or Guest inviter
122
+
**Prerequisite role**: *Global administrator*, *User administrator*, or *Guest inviter*
121
123
122
-
1. In the Azure portal, click**Azure Active Directory** and then click**Identity Governance**.
124
+
1. In the Azure portal, select**Azure Active Directory**, and then select**Identity Governance**.
123
125
124
-
1. In the left menu, click**Connected organizations** and then click to open the connected organization.
126
+
1. In the left pane, select**Connected organizations**, and then select the connected organization to open it.
125
127
126
-
1.On the Overview page, click**Delete** to delete the connected organization.
128
+
1.In the connected organization's overview pane, select**Delete** to delete it.
127
129
128
-
Currently, you can only delete a connected organization if there are no connected users.
130
+
Currently, you can delete a connected organization only if there are no connected users.
0 commit comments