Skip to content

Commit c38a603

Browse files
author
David Curwin
committed
edits before publishing
2 parents 0fd4a5a + fe3255b commit c38a603

File tree

167 files changed

+4548
-3935
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

167 files changed

+4548
-3935
lines changed

articles/active-directory/app-provisioning/application-provisioning-configuration-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Content-type: application/json
6060
{
6161
"value": [
6262
{
63-
"id": "8b1025e4-1dd2-430b-a150-2ef79cd700f5",
63+
"id": "8b1025e4-1dd2-430b-a150-2ef79cd700f5",
6464
"displayName": "AWS Single-Account Access",
6565
"homePageUrl": "http://aws.amazon.com/",
6666
"supportedSingleSignOnModes": [

articles/active-directory/app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Summary of factors that influence the time it takes to complete an **initial cyc
8585

8686
- Whether users in scope for provisioning are matched to existing users in the target application, or need to be created for the first time. Sync jobs for which all users are created for the first time take about *twice as long* as sync jobs for which all users are matched to existing users.
8787

88-
- Number of errors in the [provisioning logs](check-status-user-account-provisioning.md). Performance is slower if there are many errors and the provisioning service has gone into a quarantine state.
88+
- Number of errors in the [provisioning logs](check-status-user-account-provisioning.md). Performance is slower if there are many errors and the provisioning service has gone into a quarantine state.
8989

9090
- Request rate limits and throttling implemented by the target system. Some target systems implement request rate limits and throttling, which can impact performance during large sync operations. Under these conditions, an app that receives too many requests too fast might slow its response rate or close the connection. To improve performance, the connector needs to adjust by not sending the app requests faster than the app can process them. Provisioning connectors built by Microsoft make this adjustment.
9191

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -110,13 +110,13 @@ In this example, the users and or groups are created in a cloud HR application l
110110

111111
![Picture 2](./media/plan-auto-user-provisioning/workdayprovisioning.png)
112112

113-
1. **HR team** performs the transactions in the cloud HR app tenant.
114-
2. **Azure AD provisioning service** runs the scheduled cycles from the cloud HR app tenant and identifies changes that need to be processed for sync with AD.
115-
3. **Azure AD provisioning service** invokes the Azure AD Connect provisioning agent with a request payload containing AD account create/update/enable/disable operations.
116-
4. **Azure AD Connect provisioning agent** uses a service account to manage AD account data.
117-
5. **Azure AD Connect** runs delta sync to pull updates in AD.
118-
6. **AD** updates are synced with Azure AD.
119-
7. **Azure AD provisioning service** writebacks email attribute and username from Azure AD to the cloud HR app tenant.
113+
1. **HR team** performs the transactions in the cloud HR app tenant.
114+
2. **Azure AD provisioning service** runs the scheduled cycles from the cloud HR app tenant and identifies changes that need to be processed for sync with AD.
115+
3. **Azure AD provisioning service** invokes the Azure AD Connect provisioning agent with a request payload containing AD account create/update/enable/disable operations.
116+
4. **Azure AD Connect provisioning agent** uses a service account to manage AD account data.
117+
5. **Azure AD Connect** runs delta sync to pull updates in AD.
118+
6. **AD** updates are synced with Azure AD.
119+
7. **Azure AD provisioning service** writebacks email attribute and username from Azure AD to the cloud HR app tenant.
120120

121121
## Plan the deployment project
122122

articles/active-directory/app-provisioning/user-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: arvinh
1515
# What is app provisioning in Azure Active Directory?
1616

1717
In Azure Active Directory (Azure AD), the term *app provisioning* refers to automatically creating user identities and roles for applications.
18-
18+
1919
![Diagram that shows provisioning scenarios.](../governance/media/what-is-provisioning/provisioning.png)
2020

2121
Azure AD application provisioning refers to automatically creating user identities and roles in the applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Common scenarios include provisioning an Azure AD user into SaaS applications like [Dropbox](../../active-directory/saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../../active-directory/saas-apps/servicenow-provisioning-tutorial.md), and many more.

articles/active-directory/app-proxy/application-proxy-azure-front-door.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -36,14 +36,14 @@ This article guides you through the steps to securely expose a web application o
3636
### Application Proxy Configuration
3737

3838
Follow these steps to configure Application Proxy for Front Door:
39-
1. Install connector for the location that your app instances will be in (For example US West). For the connector group assign the connector to the right region (For example North America).
40-
2. Set up your app instance with Application Proxy as follows:
39+
1. Install connector for the location that your app instances will be in (For example US West). For the connector group assign the connector to the right region (For example North America).
40+
2. Set up your app instance with Application Proxy as follows:
4141
- Set the Internal URL to the address users access the app from the internal network, for example contoso.org
4242
- Set the External URL to the domain address you want the users to access the app from. For this you must configure a custom domain for our application here, for example, contoso.org. Reference: [Custom domains in Azure Active Directory Application Proxy][appproxy-custom-domain]
4343
- Assign the application to the appropriate connector group (For example: North America)
4444
- Note down the URL generated by Application Proxy to access the application. For example, contoso.msappproxy.net
4545
- For the application configure a CNAME Entry in your DNS provider which points the external URL to the Front Door’s endpoint, for example ‘contoso.org’ to contoso.msappproxy.net
46-
3. In the Front Door service, utilize the URL generated for the app by Application Proxy as a backend for the backend pool. For example, contoso.msappproxy.net
46+
3. In the Front Door service, utilize the URL generated for the app by Application Proxy as a backend for the backend pool. For example, contoso.msappproxy.net
4747

4848
#### Sample Application Proxy Configuration
4949
The following table shows a sample Application Proxy configuration. The sample scenario uses the sample application domain www.contoso.org as the External URL.
@@ -67,15 +67,15 @@ The configuration steps that follow refer to the following definitions:
6767
- Origin host header: This represented the host header value being sent to the backend for each request. For example, contoso.org. For more information refer here: [Origins and origin groups – Azure Front Door][front-door-origin]
6868

6969
Follow these steps to configure the Front Door Service (Standard):
70-
1. Create a Front Door (Standard) with the configuration below:
70+
1. Create a Front Door (Standard) with the configuration below:
7171
- Add an Endpoint name for generating the Front Door’s default domain i.e. azurefd.net. For example, contoso-nam that generated the Endpoint hostname contoso-nam.azurefd.net
7272
- Add an Origin Type for the type of backend resource. For example Custom here for the Application Proxy resource
7373
- Add an Origin host name to represent the backend host name. For example, contoso.msappproxy.net
7474
- Optional: Enable Caching for the routing rule for Front Door to cache your static content.
75-
2. Verify if the deployment is complete and the Front Door Service is ready
76-
3. To give your Front Door service a user-friendly domain host name URL, create a CNAME record with your DNS provider for your Application Proxy External URL that points to Front Door’s domain host name (generated by the Front Door service). For example, contoso.org points to contoso.azurefd.net Reference: [How to add a custom domain - Azure Front Door][front-door-custom-domain]
77-
4. As per the reference, on the Front Door Service Dashboard navigate to Front Door Manager and add a Domain with the Custom Hostname. For example, contoso.org
78-
5. Navigate to the Origin groups in the Front Door Service Dashboard, select the origin name and validate the Origin host header matches the domain of the backend. For example here the Origin host header should be: contoso.org
75+
2. Verify if the deployment is complete and the Front Door Service is ready
76+
3. To give your Front Door service a user-friendly domain host name URL, create a CNAME record with your DNS provider for your Application Proxy External URL that points to Front Door’s domain host name (generated by the Front Door service). For example, contoso.org points to contoso.azurefd.net Reference: [How to add a custom domain - Azure Front Door][front-door-custom-domain]
77+
4. As per the reference, on the Front Door Service Dashboard navigate to Front Door Manager and add a Domain with the Custom Hostname. For example, contoso.org
78+
5. Navigate to the Origin groups in the Front Door Service Dashboard, select the origin name and validate the Origin host header matches the domain of the backend. For example here the Origin host header should be: contoso.org
7979

8080
| | Configuration | Additional Information |
8181
|---- | ----------------------- | ---------------------- |

articles/active-directory/app-proxy/application-proxy-configure-complex-application.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ ms.reviewer: dhruvinshah
1616
# Understanding Azure Active Directory Application Proxy Complex application scenario (Preview)
1717

1818
When applications are made up of multiple individual web application using different domain suffixes or different ports or paths in the URL, the individual web application instances must be published in separate Azure AD Application Proxy apps and the following problems might arise:
19-
1. Pre-authentication- The client must separately acquire an access token or cookie for each Azure AD Application Proxy app. This might lead to additional redirects to login.microsoftonline.com and CORS issues.
20-
2. CORS issues- Cross-origin resource sharing calls (OPTIONS request) might be triggered to validate if the caller web app is allowed to access the URL of the targeted web app. These will be blocked by the Azure AD Application Proxy Cloud service, since these requests cannot contain authentication information.
21-
3. Poor app management- Multiple enterprise apps are created to enable access to a private app adding friction to the app management experience.
19+
1. Pre-authentication- The client must separately acquire an access token or cookie for each Azure AD Application Proxy app. This might lead to additional redirects to login.microsoftonline.com and CORS issues.
20+
2. CORS issues- Cross-origin resource sharing calls (OPTIONS request) might be triggered to validate if the caller web app is allowed to access the URL of the targeted web app. These will be blocked by the Azure AD Application Proxy Cloud service, since these requests cannot contain authentication information.
21+
3. Poor app management- Multiple enterprise apps are created to enable access to a private app adding friction to the app management experience.
2222

2323
The following figure shows an example for complex application domain structure.
2424

articles/active-directory/app-proxy/application-proxy-configure-connectors-with-proxy-servers.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -146,10 +146,10 @@ To enable this, please follow the next steps:
146146
`UseDefaultProxyForBackendRequests = 1` to the Connector configuration registry key located in "HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft AAD App Proxy Connector".
147147

148148
### Step 2: Configure the proxy server manually using netsh command
149-
1. Enable the group policy Make proxy settings per-machine. This is found in: Computer Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer. This needs to be set rather than having this policy set to per-user.
150-
2. Run `gpupdate /force` on the server or reboot the server to ensure it uses the updated group policy settings.
151-
3. Launch an elevated command prompt with admin rights and enter `control inetcpl.cpl`.
152-
4. Configure the required proxy settings.
149+
1. Enable the group policy Make proxy settings per-machine. This is found in: Computer Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer. This needs to be set rather than having this policy set to per-user.
150+
2. Run `gpupdate /force` on the server or reboot the server to ensure it uses the updated group policy settings.
151+
3. Launch an elevated command prompt with admin rights and enter `control inetcpl.cpl`.
152+
4. Configure the required proxy settings.
153153

154154
These settings make the connector use the same forward proxy for the communication to Azure and to the backend application. If the connector to Azure communication requires no forward proxy or a different forward proxy, you can set this up with modifying the file ApplicationProxyConnectorService.exe.config as described in the sections Bypass outbound proxies or Use the outbound proxy server.
155155

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ To enable the certificate-based authentication in the Azure portal, complete the
145145
1. Sign in to the [Azure portal](https://portal.azure.com) as an Authentication Policy Administrator.
146146
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
147147
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
148-
1. Under **Enable and Target**, click **Enable**.
148+
1. Under **Enable and Target**, click **Enable**.
149149
1. Click **All users**, or click **Add groups** to select specific groups.
150150

151151
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/enable.png" alt-text="Screenshot of how to enable CBA.":::
@@ -248,7 +248,7 @@ As a first configuration test, you should try to sign in to the [MyApps portal](
248248

249249
1. Select **Sign in with a certificate**.
250250

251-
1. Pick the correct user certificate in the client certificate picker UI and click **OK**.
251+
1. Pick the correct user certificate in the client certificate picker UI and click **OK**.
252252

253253
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/picker.png" alt-text="Screenshot of the certificate picker UI.":::
254254

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -421,7 +421,7 @@ If the upgrade had issues, follow these steps to roll back:
421421
>[!NOTE]
422422
>Any changes since the backup was made will be lost, but should be minimal if backup was made right before upgrade and upgrade was unsuccessful.
423423
424-
1. Run the installer for your previous version (for example, 8.0.x.x).
424+
1. Run the installer for your previous version (for example, 8.0.x.x).
425425
1. Configure Azure AD to accept MFA requests to your on-premises federation server. Use Graph PowerShell to set [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-1.0#federatedidpmfabehavior-values&preserve-view=true) to `enforceMfaByFederatedIdp`, as shown in the following example.
426426

427427
**Request**

articles/active-directory/conditional-access/concept-continuous-access-evaluation-workload.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,9 @@ When a client’s access to a resource is blocked due to CAE being triggered, th
5151

5252
The following steps detail how an admin can verify sign in activity in the sign-in logs:
5353

54-
1. Sign into the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.
55-
1. Browse to **Azure Active Directory** > **Sign-in logs** > **Service Principal Sign-ins**. You can use filters to ease the debugging process.
56-
1. Select an entry to see activity details. The **Continuous access evaluation** field indicates whether a CAE token was issued in a particular sign-in attempt.
54+
1. Sign into the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.
55+
1. Browse to **Azure Active Directory** > **Sign-in logs** > **Service Principal Sign-ins**. You can use filters to ease the debugging process.
56+
1. Select an entry to see activity details. The **Continuous access evaluation** field indicates whether a CAE token was issued in a particular sign-in attempt.
5757

5858
## Next steps
5959

0 commit comments

Comments
 (0)