Skip to content

Commit c38a20a

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into WI-143029-release-ga-malware-scan
2 parents a5a6a57 + 0ba1540 commit c38a20a

26 files changed

+200
-93
lines changed

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ ms.collection: M365-identity-device-management
1919
Azure AD organizations can use External Identities cross-tenant access settings to manage how they collaborate with other Azure AD organizations and other Microsoft Azure clouds through B2B collaboration and [B2B direct connect](cross-tenant-access-settings-b2b-direct-connect.md). [Cross-tenant access settings](cross-tenant-access-settings-b2b-collaboration.md) give you granular control over how external Azure AD organizations collaborate with you (inbound access) and how your users collaborate with external Azure AD organizations (outbound access). These settings also let you trust multi-factor authentication (MFA) and device claims ([compliant claims and hybrid Azure AD joined claims](../conditional-access/howto-conditional-access-policy-compliant-device.md)) from other Azure AD organizations.
2020

2121
This article describes cross-tenant access settings, which are used to manage B2B collaboration and B2B direct connect with external Azure AD organizations, including across Microsoft clouds. More settings are available for B2B collaboration with non-Azure AD identities (for example, social identities or non-IT managed external accounts). These [external collaboration settings](external-collaboration-settings-configure.md) include options for restricting guest user access, specifying who can invite guests, and allowing or blocking domains.
22+
23+
> [!IMPORTANT]
24+
> Microsoft is beginning to move customers using cross-tenant access settings to a new storage model on August 30, 2023. You may notice an entry in your audit logs informing you that your cross-tenant access settings were updated as our automated task migrates your settings. For a brief window while the migration processes, you will be unable to make changes to your settings. If you are unable to make a change, you should wait a few moments and try the change again. Once the migration completes, [you will no longer be capped with 25kb of storage space](/azure/active-directory/external-identities/faq#how-many-organizations-can-i-add-in-cross-tenant-access-settings-) and there will be no more limits on the number of partners you can add.
2225
2326
## Manage external access with inbound and outbound settings
2427

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,9 @@ ms.collection: M365-identity-device-management
1818

1919
Use External Identities cross-tenant access settings to manage how you collaborate with other Azure AD organizations through B2B collaboration. These settings determine both the level of *inbound* access users in external Azure AD organizations have to your resources, and the level of *outbound* access your users have to external organizations. They also let you trust multi-factor authentication (MFA) and device claims ([compliant claims and hybrid Azure AD joined claims](../conditional-access/howto-conditional-access-policy-compliant-device.md)) from other Azure AD organizations. For details and planning considerations, see [Cross-tenant access in Azure AD External Identities](cross-tenant-access-overview.md).
2020

21+
> [!IMPORTANT]
22+
> Microsoft is beginning to move customers using cross-tenant access settings to a new storage model on August 30, 2023. You may notice an entry in your audit logs informing you that your cross-tenant access settings were updated as our automated task migrates your settings. For a brief window while the migration processes, you will be unable to make changes to your settings. If you are unable to make a change, you should wait a few moments and try the change again. Once the migration completes, [you will no longer be capped with 25kb of storage space](/azure/active-directory/external-identities/faq#how-many-organizations-can-i-add-in-cross-tenant-access-settings-) and there will be no more limits on the number of partners you can add.
23+
2124
## Before you begin
2225

2326
> [!CAUTION]

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-direct-connect.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ Use cross-tenant access settings to manage how you collaborate with other Azure
2727

2828
Learn more about using cross-tenant access settings to [manage B2B direct connect](b2b-direct-connect-overview.md#managing-cross-tenant-access-for-b2b-direct-connect).
2929

30+
> [!IMPORTANT]
31+
> Microsoft is beginning to move customers using cross-tenant access settings to a new storage model on August 30, 2023. You may notice an entry in your audit logs informing you that your cross-tenant access settings were updated as our automated task migrates your settings. For a brief window while the migration processes, you will be unable to make changes to your settings. If you are unable to make a change, you should wait a few moments and try the change again. Once the migration completes, [you will no longer be capped with 25kb of storage space](/azure/active-directory/external-identities/faq#how-many-organizations-can-i-add-in-cross-tenant-access-settings-) and there will be no more limits on the number of partners you can add.
32+
3033
## Before you begin
3134

3235
- Review the [Important considerations](cross-tenant-access-overview.md#important-considerations) section in the [cross-tenant access overview](cross-tenant-access-overview.md) before configuring your cross-tenant access settings.

articles/active-directory/manage-apps/add-application-portal-setup-sso.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,9 @@ To configure SSO, you need:
3838

3939
To enable SSO for an application:
4040

41-
1. Sign in to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
42-
1. Browse to **Azure Active Directory** > **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to use. For example, **Azure AD SAML Toolkit 1**.
41+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
42+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
43+
1. Enter the name of the existing application in the search box, and then select the application from the search results. For example, **Azure AD SAML Toolkit 1**.
4344
1. In the **Manage** section of the left menu, select **Single sign-on** to open the **Single sign-on** pane for editing.
4445
1. Select **SAML** to open the SSO configuration page. After the application is configured, users can sign in to it by using their credentials from the Azure AD tenant.
4546
1. The process of configuring an application to use Azure AD for SAML-based SSO varies depending on the application. For any of the enterprise applications in the gallery, use the **configuration guide** link to find information about the steps needed to configure the application. The steps for the **Azure AD SAML Toolkit 1** are listed in this article.
@@ -54,7 +55,7 @@ You add sign-in and reply URL values, and you download a certificate to begin th
5455

5556
To configure SSO in Azure AD:
5657

57-
1. In the Azure portal, select **Edit** in the **Basic SAML Configuration** section on the **Set up single sign-on** pane.
58+
1. In the Entra admin center, select **Edit** in the **Basic SAML Configuration** section on the **Set up single sign-on** pane.
5859
1. For **Reply URL (Assertion Consumer Service URL)**, enter `https://samltoolkit.azurewebsites.net/SAML/Consume`.
5960
1. For **Sign on URL**, enter `https://samltoolkit.azurewebsites.net/`.
6061
1. Select **Save**.
@@ -94,7 +95,7 @@ Use the values that you recorded for **SP Initiated Login URL** and **Assertion
9495

9596
To update the single sign-on values:
9697

97-
1. In the Azure portal, select **Edit** in the **Basic SAML Configuration** section on the **Set up single sign-on** pane.
98+
1. In the Entra admin center, select **Edit** in the **Basic SAML Configuration** section on the **Set up single sign-on** pane.
9899
1. For **Reply URL (Assertion Consumer Service URL)**, enter the **Assertion Consumer Service (ACS) URL** value that you previously recorded.
99100
1. For **Sign on URL**, enter the **SP Initiated Login URL** value that you previously recorded.
100101
1. Select **Save**.

articles/active-directory/manage-apps/configure-admin-consent-workflow.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37,11 +37,9 @@ To configure the admin consent workflow, you need:
3737

3838
To enable the admin consent workflow and choose reviewers:
3939

40-
1. Sign in to the [Azure portal](https://portal.azure.com) with one of the roles listed in the prerequisites.
41-
1. Search for and select **Azure Active Directory**.
42-
1. Select **Enterprise applications**.
43-
1. Under **Security**, select **Consent and permissions**.
44-
1. Under **Manage**, select **Admin consent settings**. Under **Admin consent requests**, select **Yes** for **Users can request admin consent to apps they are unable to consent to** .
40+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
41+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Consent and permissions** > **Admin consent settings**.
42+
1. Under **Admin consent requests**, select **Yes** for **Users can request admin consent to apps they are unable to consent to** .
4543

4644
![Screenshot of configure admin consent workflow settings.](./media/configure-admin-consent-workflow/enable-admin-consent-workflow.png)
4745

articles/active-directory/manage-apps/configure-user-consent.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,9 +41,9 @@ To configure user consent, you need:
4141

4242
To configure user consent settings through the Azure portal:
4343

44-
1. Sign in to the [Azure portal](https://portal.azure.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
44+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
4545

46-
1. Select **Azure Active Directory** > **Enterprise applications** > **Consent and permissions** > **User consent settings**.
46+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Consent and permissions** > **User consent settings**.
4747

4848
1. Under **User consent for applications**, select which consent setting you want to configure for all users.
4949

@@ -66,6 +66,7 @@ Connect-MgGraph -Scopes "Policy.ReadWrite.Authorization"
6666
```
6767

6868
### Disable user consent
69+
6970
To disable user consent, ensure that the consent policies (`PermissionGrantPoliciesAssigned`) include other current `ManagePermissionGrantsForOwnedResource.*` policies if any while updating the collection. This way, you can maintain your current configuration for user consent settings and other resource consent settings.
7071

7172
```powershell
@@ -80,6 +81,7 @@ Update-MgPolicyAuthorizationPolicy -AuthorizationPolicyId authorizationPolicy -B
8081
```
8182

8283
### Allow user consent subject to an app consent policy
84+
8385
To allow user consent, choose which app consent policy should govern users' authorization to grant consent to apps. Please ensure that the consent policies (`PermissionGrantPoliciesAssigned`) include other current `ManagePermissionGrantsForOwnedResource.*` policies if any while updating the collection. This way, you can maintain your current configuration for user consent settings and other resource consent settings.
8486

8587
```powershell

articles/active-directory/manage-apps/grant-admin-consent.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -49,9 +49,10 @@ You can grant tenant-wide admin consent through the **Enterprise applications**
4949

5050
To grant tenant-wide admin consent to an app listed in **Enterprise applications**:
5151

52-
1. Sign in to the [Azure portal](https://portal.azure.com) with one of the roles listed in the prerequisites section.
53-
1. Select **Azure Active Directory**, and then select **Enterprise applications**.
54-
1. Select the application to which you want to grant tenant-wide admin consent, and then select **Permissions**.
52+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
53+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
54+
1. Enter the name of the existing application in the search box, and then select the application from the search results.
55+
1. Select **Permissions** under **Security**.
5556
:::image type="content" source="media/grant-tenant-wide-admin-consent/grant-tenant-wide-admin-consent.png" alt-text="Screenshot shows how to grant tenant-wide admin consent.":::
5657
1. Carefully review the permissions that the application requires. If you agree with the permissions the application requires, select **Grant admin consent**.
5758

@@ -61,10 +62,9 @@ For applications your organization has developed, or which are registered direct
6162

6263
To grant tenant-wide admin consent from **App registrations**:
6364

64-
1. Sign in to the [Azure portal](https://portal.azure.com) with one of the roles listed in the prerequisites section.
65-
1. Select **Azure Active Directory**, and then select **App registrations**.
66-
1. Select the application to which you want to grant tenant-wide admin consent.
67-
1. Select **API permissions**.
65+
1. On the Entra admin center, browse to **Identity** > **Applications** > **App registrations** > **All applications**.
66+
1. Enter the name of the existing application in the search box, and then select the application from the search results.
67+
1. Select **API permissions** under **Manage**.
6868
1. Carefully review the permissions that the application requires. If you agree, select **Grant admin consent**.
6969

7070
## Construct the URL for granting tenant-wide admin consent

articles/api-management/validate-azure-ad-token-policy.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -66,10 +66,6 @@ The `validate-azure-ad-token` policy enforces the existence and validity of a JS
6666
| failed-validation-error-message | Error message to return in the HTTP response body if the JWT doesn't pass validation. This message must have any special characters properly escaped. Policy expressions are allowed. | No | Default error message depends on validation issue, for example "JWT not present." |
6767
| output-token-variable-name | String. Name of context variable that will receive token value as an object of type [`Jwt`](api-management-policy-expressions.md) upon successful token validation. Policy expressions aren't allowed. | No | N/A |
6868

69-
70-
71-
72-
7369
## Elements
7470

7571
| Element | Description | Required |
@@ -96,6 +92,7 @@ The `validate-azure-ad-token` policy enforces the existence and validity of a JS
9692
### Usage notes
9793

9894
* You can use access restriction policies in different scopes for different purposes. For example, you can secure the whole API with Azure AD authentication by applying the `validate-azure-ad-token` policy on the API level, or you can apply it on the API operation level and use `claims` for more granular control.
95+
* When using a custom header (`header-name`), the header value cannot be prefixed with `Bearer ` and should be removed.
9996

10097
## Examples
10198

articles/api-management/validate-jwt-policy.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -121,6 +121,7 @@ The `validate-jwt` policy enforces existence and validity of a supported JSON we
121121
* The policy supports tokens encrypted with symmetric keys using the following encryption algorithms: A128CBC-HS256, A192CBC-HS384, A256CBC-HS512.
122122
* To configure the policy with one or more OpenID configuration endpoints for use with a self-hosted gateway, the OpenID configuration endpoints URLs must also be reachable by the cloud gateway.
123123
* You can use access restriction policies in different scopes for different purposes. For example, you can secure the whole API with Azure AD authentication by applying the `validate-jwt` policy on the API level, or you can apply it on the API operation level and use `claims` for more granular control.
124+
* When using a custom header (`header-name`), the header value cannot be prefixed with `Bearer ` and should be removed.
124125

125126

126127
## Examples

articles/defender-for-cloud/apply-security-baseline.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,12 @@ ms.date: 06/27/2023
1010

1111
# Review hardening recommendations
1212

13+
> [!NOTE]
14+
> As the Log Analytics agent (also known as MMA) is set to retire in [August 2024](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/), all Defender for Servers features that currently depend on it, including those described on this page, will be available through either [Microsoft Defender for Endpoint integration](integration-defender-for-endpoint.md) or [agentless scanning](concept-agentless-data-collection.md), before the retirement date. For more information about the roadmap for each of the features that are currently rely on Log Analytics Agent, see [this announcement](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation).
15+
1316
To reduce a machine's attack surface and avoid known risks, it's important to configure the operating system (OS) as securely as possible.
1417

15-
The Microsoft cloud security benchmark has guidance for OS hardening which has led to security baseline documents for [Windows](../governance/policy/samples/guest-configuration-baseline-windows.md) and [Linux](../governance/policy/samples/guest-configuration-baseline-linux.md).
18+
The Microsoft cloud security benchmark has guidance for OS hardening, which has led to security baseline documents for [Windows](../governance/policy/samples/guest-configuration-baseline-windows.md) and [Linux](../governance/policy/samples/guest-configuration-baseline-linux.md).
1619

1720
Use the security recommendations described in this article to assess the machines in your environment and:
1821

0 commit comments

Comments
 (0)