Skip to content

Commit c6eb7bf

Browse files
authored
Merge pull request #206535 from MicrosoftDocs/main
8/01 AM Publish
2 parents 1190c4f + c27ab77 commit c6eb7bf

File tree

201 files changed

+2035
-407
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

201 files changed

+2035
-407
lines changed

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 19 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 05/23/2022
4+
ms.date: 08/01/2022
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,23 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## July 2022
19+
20+
### New articles
21+
22+
- [Configure authentication in a sample React single-page application by using Azure Active Directory B2C](configure-authentication-sample-react-spa-app.md)
23+
- [Configure authentication options in a React application by using Azure Active Directory B2C](enable-authentication-react-spa-app-options.md)
24+
- [Enable authentication in your own React Application by using Azure Active Directory B2C](enable-authentication-react-spa-app.md)
25+
26+
### Updated articles
27+
28+
- [Enable custom domains for Azure Active Directory B2C](custom-domain.md)
29+
- [Set up sign-up and sign-in with a Twitter account using Azure Active Directory B2C](identity-provider-twitter.md)
30+
- [Page layout versions](page-layout.md)
31+
- [Monitor Azure AD B2C with Azure Monitor](azure-monitor.md)
32+
- [Enable JavaScript and page layout versions in Azure Active Directory B2C](javascript-and-page-layout.md)
33+
- [Localization string IDs](localization-string-ids.md)
34+
1835
## June 2022
1936

2037
### New articles
@@ -137,28 +154,4 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
137154
- [Billing model for Azure Active Directory B2C](billing.md)
138155
- [Configure SAML identity provider options with Azure Active Directory B2C](identity-provider-generic-saml-options.md)
139156
- [About claim resolvers in Azure Active Directory B2C custom policies](claim-resolver-overview.md)
140-
- [Add AD FS as a SAML identity provider using custom policies in Azure Active Directory B2C](identity-provider-adfs-saml.md)
141-
142-
## December 2021
143-
144-
### New articles
145-
146-
- [TOTP display control](display-control-time-based-one-time-password.md)
147-
- [Set up sign-up and sign-in with a SwissID account using Azure Active Directory B2C](identity-provider-swissid.md)
148-
- [Set up sign-up and sign-in with a PingOne account using Azure Active Directory B2C](identity-provider-ping-one.md)
149-
- [Tutorial: Configure Haventec with Azure Active Directory B2C for single step, multifactor passwordless authentication](partner-haventec.md)
150-
- [Tutorial: Acquire an access token for calling a web API in Azure AD B2C](tutorial-acquire-access-token.md)
151-
- [Tutorial: Sign in and sign out users with Azure AD B2C in a Node.js web app](tutorial-authenticate-nodejs-web-app-msal.md)
152-
- [Tutorial: Call a web API protected with Azure AD B2C](tutorial-call-api-with-access-token.md)
153-
154-
### Updated articles
155-
156-
- [About claim resolvers in Azure Active Directory B2C custom policies](claim-resolver-overview.md)
157-
- [Azure Active Directory B2C service limits and restrictions](service-limits.md)
158-
- [Add Conditional Access to user flows in Azure Active Directory B2C](conditional-access-user-flow.md)
159-
- [Display controls](display-controls.md)
160-
- ['Azure AD B2C: Frequently asked questions (FAQ)'](faq.yml)
161-
- [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-operations.md)
162-
- [Define an Azure AD MFA technical profile in an Azure AD B2C custom policy](multi-factor-auth-technical-profile.md)
163-
- [Enable multifactor authentication in Azure Active Directory B2C](multi-factor-authentication.md)
164-
- [String claims transformations](string-transformations.md)
157+
- [Add AD FS as a SAML identity provider using custom policies in Azure Active Directory B2C](identity-provider-adfs-saml.md)

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/16/2021
9+
ms.date: 08/01/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -26,7 +26,7 @@ The Azure AD multifactor authentication service has datacenters in the United St
2626

2727
* Multifactor authentication phone calls originate from datacenters in the customer's region and are routed by global providers. Phone calls using custom greetings always originate from data centers in the United States.
2828
* General purpose user authentication requests from other regions are currently processed based on the user's location.
29-
* Push notifications that use the Microsoft Authenticator app are currently processed in regional datacenters based on the user's location. Vendor-specific device services, such as Apple Push Notification Service, might be outside the user's location.
29+
* Push notifications that use the Microsoft Authenticator app are currently processed in regional datacenters based on the user's location. Vendor-specific device services, such as Apple Push Notification Service or Google Firebase Cloud Messaging, might be outside the user's location.
3030

3131
## Personal data stored by Azure AD multifactor authentication
3232

articles/active-directory/conditional-access/TOC.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,12 +39,14 @@
3939
href: service-dependencies.md
4040
- name: Location conditions
4141
href: location-condition.md
42-
- name: Continuous access evaluation
43-
href: concept-continuous-access-evaluation.md
4442
- name: Workload identities
4543
href: workload-identity.md
46-
- name: CAE for workload identities
47-
href: concept-continuous-access-evaluation-workload.md
44+
- name: Continuous access evaluation
45+
items:
46+
- name: CAE for users
47+
href: concept-continuous-access-evaluation.md
48+
- name: CAE for workload identities
49+
href: concept-continuous-access-evaluation-workload.md
4850
- name: Filter for devices
4951
href: concept-condition-filters-for-devices.md
5052
- name: What if tool

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -361,7 +361,7 @@ You might get the following error message when you initiate a remote desktop con
361361

362362
![Screenshot of the message that says your account is configured to prevent you from using this device.](./media/howto-vm-sign-in-azure-ad-windows/rbac-role-not-assigned.png)
363363

364-
Verify that you've [configured Azure RBAC policies](../../virtual-machines/linux/login-using-aad.md) for the VM that grant the user the Virtual Machine Administrator Login or Virtual Machine User Login role.
364+
Verify that you've [configured Azure RBAC policies](#configure-role-assignments-for-the-vm) for the VM that grant the user the Virtual Machine Administrator Login or Virtual Machine User Login role.
365365

366366
> [!NOTE]
367367
> If you're having problems with Azure role assignments, see [Troubleshoot Azure RBAC](../../role-based-access-control/troubleshooting.md#limits).

articles/active-directory/governance/entitlement-management-access-package-resources.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,15 +42,19 @@ If you need to add resources to an access package, you should check whether the
4242

4343
![List of resources in a catalog](./media/entitlement-management-access-package-resources/catalog-resources.png)
4444

45-
1. If the resources aren't already in the catalog, and you're an administrator or a catalog owner, you can [add resources to a catalog](entitlement-management-catalog-create.md#add-resources-to-a-catalog).
45+
1. If the resources aren't already in the catalog, and you're an administrator or a catalog owner, you can [add resources to a catalog](entitlement-management-catalog-create.md#add-resources-to-a-catalog). The types of resources you can add are groups, applications, and SharePoint Online sites. For example:
46+
47+
* Groups can be cloud-created Microsoft 365 Groups or cloud-created Azure AD security groups. Groups that originate in an on-premises Active Directory can't be assigned as resources because their owner or member attributes can't be changed in Azure AD. To give users access to an application that uses AD security group memberships, create a new group in Azure AD, configure [group writeback to AD](../hybrid/how-to-connect-group-writeback-v2.md), and [enable that group to be written to AD](../enterprise-users/groups-write-back-portal.md). Groups that originate in Exchange Online as Distribution groups can't be modified in Azure AD either.
48+
* Applications can be Azure AD enterprise applications, which include both software as a service (SaaS) applications and your own applications integrated with Azure AD. If your application has not yet been integrated with Azure AD, see [govern access for applications in your environment](identity-governance-applications-prepare.md) and [integrate an application with Azure AD](identity-governance-applications-integrate.md).
49+
* Sites can be SharePoint Online sites or SharePoint Online site collections.
4650

4751
1. If you are an access package manager and you need to add resources to the catalog, you can ask the catalog owner to add them.
4852

4953
## Add resource roles
5054

5155
A resource role is a collection of permissions associated with a resource. Resources can be made available for users to request if you add resource roles from each of the catalog's resources to your access package. You can add resource roles that are provided by groups, teams, applications, and SharePoint sites. When a user receives an assignment to an access package, they'll be added to all the resource roles in the access package.
5256

53-
If you don't want users to receive all of the roles, then you'll need to create multiple access packages in the catalog, with separate access packages for each of the resource roles. You can also mark the access packages as [incompatible](entitlement-management-access-package-incompatible.md) with each other so users can't request access to access packages that would give them excessive access.
57+
If you want some users to receive different roles than others, then you'll need to create multiple access packages in the catalog, with separate access packages for each of the resource roles. You can also mark the access packages as [incompatible](entitlement-management-access-package-incompatible.md) with each other so users can't request access to access packages that would give them excessive access.
5458

5559
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
5660

articles/active-directory/governance/entitlement-management-catalog-create.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -75,10 +75,19 @@ $catalog = New-MgEntitlementManagementAccessPackageCatalog -DisplayName "Marketi
7575

7676
## Add resources to a catalog
7777

78-
To include resources in an access package, the resources must exist in a catalog. The types of resources you can add are groups, applications, and SharePoint Online sites. For example:
78+
To include resources in an access package, the resources must exist in a catalog. The types of resources you can add are groups, applications, and SharePoint Online sites.
7979

80-
* Groups can be cloud-created Microsoft 365 Groups or cloud-created Azure AD security groups. Groups that originate in an on-premises Active Directory can't be assigned as resources because their owner or member attributes can't be changed in Azure AD. Groups that originate in Exchange Online as Distribution groups can't be modified in Azure AD either.
81-
* Applications can be Azure AD enterprise applications, which include both software as a service (SaaS) applications and your own applications integrated with Azure AD. For more information on how to select appropriate resources for applications with multiple roles, see [Add resource roles](entitlement-management-access-package-resources.md#add-resource-roles).
80+
* Groups can be cloud-created Microsoft 365 Groups or cloud-created Azure AD security groups.
81+
82+
* Groups that originate in an on-premises Active Directory can't be assigned as resources because their owner or member attributes can't be changed in Azure AD. To give a user access to an application that uses AD security group memberships, create a new security group in Azure AD, configure [group writeback to AD](../hybrid/how-to-connect-group-writeback-v2.md), and [enable that group to be written to AD](../enterprise-users/groups-write-back-portal.md), so that the cloud-created group can be used by an AD-based application.
83+
84+
* Groups that originate in Exchange Online as Distribution groups can't be modified in Azure AD either, so cannot be added to catalogs.
85+
86+
* Applications can be Azure AD enterprise applications, which include both software as a service (SaaS) applications and your own applications integrated with Azure AD.
87+
88+
* If your application has not yet been integrated with Azure AD, see [govern access for applications in your environment](identity-governance-applications-prepare.md) and [integrate an application with Azure AD](identity-governance-applications-integrate.md).
89+
90+
* For more information on how to select appropriate resources for applications with multiple roles, see [Add resource roles](entitlement-management-access-package-resources.md#add-resource-roles).
8291
* Sites can be SharePoint Online sites or SharePoint Online site collections.
8392
> [!NOTE]
8493
> Search SharePoint Site by site name or an exact URL as the search box is case sensitive.

articles/active-directory/manage-apps/configure-authentication-for-federated-users-portal.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"AccelerateToFe
9494

9595
```json
9696
"HomeRealmDiscoveryPolicy": {
97-
"AccelerateToFederatedDomain": true
97+
"AccelerateToFederatedDomain": true
9898
}
9999
```
100100
::: zone-end
@@ -112,8 +112,10 @@ New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"AccelerateToFe
112112

113113
```json
114114
"HomeRealmDiscoveryPolicy": {
115-
"AccelerateToFederatedDomain": true
116-
"PreferredDomain": ["federated.example.edu"]
115+
"AccelerateToFederatedDomain": true,
116+
"PreferredDomain": [
117+
"federated.example.edu"
118+
]
117119
}
118120
```
119121
::: zone-end
@@ -126,7 +128,7 @@ The following policy enables username/password authentication for federated user
126128
```json
127129

128130
"EnableDirectAuthPolicy": {
129-
"AllowCloudPasswordValidation": true
131+
"AllowCloudPasswordValidation": true
130132
}
131133

132134
```
@@ -222,9 +224,9 @@ Set the HRD policy using Microsoft Graph. See [homeRealmDiscoveryPolicy](/graph/
222224
223225
From the Microsoft Graph explorer window:
224226
225-
1. Grant the Policy.ReadWrite.ApplicationConfiguration permission under the **Modify permissions** tab.
227+
1. Grant consent to the *Policy.ReadWrite.ApplicationConfiguration* permission.
226228
1. Use the URL https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies
227-
1. POST the new policy to this URL, or PATCH to /policies/homerealmdiscoveryPolicies/{policyID} if overwriting an existing one.
229+
1. POST the new policy to this URL, or PATCH to https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies/{policyID} if overwriting an existing one.
228230
1. POST or PATCH contents:
229231
230232
```json
@@ -242,15 +244,15 @@ From the Microsoft Graph explorer window:
242244
1. To see your new policy and get its ObjectID, run the following query:
243245
244246
```http
245-
GET policies/homeRealmDiscoveryPolicies
247+
GET https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies
246248
```
247249
1. To delete the HRD policy you created, run the query:
248250
249251
```http
250-
DELETE /policies/homeRealmDiscoveryPolicies/{policy objectID}
252+
DELETE https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies/{policy objectID}
251253
```
252254
::: zone-end
253255
254256
## Next steps
255257
256-
[Prevent sign-in auto-acceleration](prevent-domain-hints-with-home-realm-discovery.md).
258+
[Prevent sign-in auto-acceleration](prevent-domain-hints-with-home-realm-discovery.md).

articles/active-directory/managed-identities-azure-resources/managed-identities-faq.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang:
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm:
1414
ms.workload: identity
15-
ms.date: 02/23/2022
15+
ms.date: 07/27/2022
1616
ms.author: barclayn
1717
---
1818

@@ -111,9 +111,9 @@ Managed identities use certificate-based authentication. Each managed identity
111111

112112
In short, yes you can use user assigned managed identities in more than one Azure region. The longer answer is that while user assigned managed identities are created as regional resources the associated [service principal](../develop/app-objects-and-service-principals.md#service-principal-object) (SP) created in Azure AD is available globally. The service principal can be used from any Azure region and its availability is dependent on the availability of Azure AD. For example, if you created a user assigned managed identity in the South-Central region and that region becomes unavailable this issue only impacts [control plane](../../azure-resource-manager/management/control-plane-and-data-plane.md) activities on the managed identity itself. The activities performed by any resources already configured to use the managed identities wouldn't be impacted.
113113

114-
### Does managed identities for Azure resources work with Azure Cloud Services?
114+
### Does managed identities for Azure resources work with Azure Cloud Services (Classic)?
115115

116-
No, there are no plans to support managed identities for Azure resources in Azure Cloud Services.
116+
Managed identities for Azure resources don’t have support for [Azure Cloud Services (classic)](../../cloud-services/cloud-services-choose-me.md) at this time. “
117117

118118

119119
### What is the security boundary of managed identities for Azure resources?

0 commit comments

Comments
 (0)