Skip to content

Commit cfe5f9a

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 38bb106 + 28c5fdc commit cfe5f9a

File tree

836 files changed

+6315
-4718
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

836 files changed

+6315
-4718
lines changed

.openpublishing.redirection.json

Lines changed: 490 additions & 14 deletions
Large diffs are not rendered by default.
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
{
2+
"$schema": "https://whatsnewapi.azurewebsites.net/schema",
3+
"docSetProductName": "Azure Active Directory application management",
4+
"rootDirectory": "articles/active-directory/manage-apps/",
5+
"docLinkSettings": {
6+
"linkFormat": "relative",
7+
"relativeLinkPrefix": "/azure/active-directory/manage-apps"
8+
},
9+
"inclusionCriteria": {
10+
"excludePullRequestTitles": true,
11+
"minAdditionsToFile" : 10,
12+
"maxFilesChanged": 50,
13+
"labels": [
14+
"label:active-directory/svc",
15+
"label:app-mgmt/subsvc"
16+
]
17+
},
18+
"areas": [
19+
{
20+
"name": ".",
21+
"heading": "Azure Active Directory application management"
22+
}
23+
]
24+
}
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
{
2+
"$schema": "https://whatsnewapi.azurewebsites.net/schema",
3+
"docSetProductName": "Azure Active Directory application provisioning",
4+
"rootDirectory": "articles/active-directory/app-provisioning/",
5+
"docLinkSettings": {
6+
"linkFormat": "relative",
7+
"relativeLinkPrefix": "/azure/active-directory/app-provisioning"
8+
},
9+
"inclusionCriteria": {
10+
"excludePullRequestTitles": true,
11+
"minAdditionsToFile" : 10,
12+
"maxFilesChanged": 50,
13+
"labels": [
14+
"label:active-directory/svc",
15+
"label:app-provisioning/subsvc"
16+
]
17+
},
18+
"areas": [
19+
{
20+
"name": ".",
21+
"heading": "Azure Active Directory application provisioning"
22+
}
23+
]
24+
}

articles/active-directory-b2c/configure-tokens-custom-policy.md

Lines changed: 40 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 05/07/2020
12+
ms.date: 10/21/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -87,6 +87,45 @@ The following values are set in the previous example:
8787
> [!NOTE]
8888
> Single-page applications using the authorization code flow with PKCE always have a refresh token lifetime of 24 hours. [Learn more about the security implications of refresh tokens in the browser](../active-directory/develop/reference-third-party-cookies-spas.md#security-implications-of-refresh-tokens-in-the-browser).
8989

90+
## Provide optional claims to your app
91+
92+
The [Relying party policy technical profile](relyingparty.md#technicalprofile) output claims are values that are returned to an application. Adding output claims will issue the claims into the token after a successful user journey, and will be sent to the application. Modify the technical profile element within the relying party section to add the desired claims as an output claim.
93+
94+
1. Open your custom policy file. For example, SignUpOrSignin.xml.
95+
1. Find the OutputClaims element. Add the OutputClaim you want to be included in the token.
96+
1. Set the output claim attributes.
97+
98+
The following example adds the `accountBalance` claim. The accountBalance claim is sent to the application as a balance.
99+
100+
```xml
101+
<RelyingParty>
102+
<DefaultUserJourney ReferenceId="SignUpOrSignIn" />
103+
<TechnicalProfile Id="PolicyProfile">
104+
<DisplayName>PolicyProfile</DisplayName>
105+
<Protocol Name="OpenIdConnect" />
106+
<OutputClaims>
107+
<OutputClaim ClaimTypeReferenceId="displayName" />
108+
<OutputClaim ClaimTypeReferenceId="givenName" />
109+
<OutputClaim ClaimTypeReferenceId="surname" />
110+
<OutputClaim ClaimTypeReferenceId="email" />
111+
<OutputClaim ClaimTypeReferenceId="objectId" PartnerClaimType="sub"/>
112+
<OutputClaim ClaimTypeReferenceId="identityProvider" />
113+
<OutputClaim ClaimTypeReferenceId="tenantId" AlwaysUseDefaultValue="true" DefaultValue="{Policy:TenantObjectId}" />
114+
<!--Add the optional claims here-->
115+
<OutputClaim ClaimTypeReferenceId="accountBalance" DefaultValue="" PartnerClaimType="balance" />
116+
</OutputClaims>
117+
<SubjectNamingInfo ClaimType="sub" />
118+
</TechnicalProfile>
119+
</RelyingParty>
120+
```
121+
122+
The OutputClaim element contains the following attributes:
123+
124+
- **ClaimTypeReferenceId** - The identifier of a claim type already defined in the [ClaimsSchema](claimsschema.md) section in the policy file or parent policy file.
125+
- **PartnerClaimType** - Allows you to change the name of the claim in the token.
126+
- **DefaultValue** - A default value. You can also set the default value to a [claim resolver](claim-resolver-overview.md), such as tenant ID.
127+
- **AlwaysUseDefaultValue** - Force the use of the default value.
128+
90129
## Next steps
91130

92131
- Learn more about [Azure AD B2C session](session-overview.md).

articles/active-directory-b2c/configure-tokens.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 05/07/2020
11+
ms.date: 10/15/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -51,6 +51,17 @@ You can configure the token lifetime on any user flow.
5151

5252
5. Click **Save**.
5353

54+
## Provide optional claims to your app
55+
56+
The application claims are values that are returned to the application. Update your user flow to contain the desired claims.
57+
58+
1. Select **User flows (policies)**.
59+
1. Open the user flow that you previously created.
60+
1. Select **Application claims**.
61+
1. Choose the claims and attributes that you want send back to your application.
62+
1. Click **Save**.
63+
64+
5465
## Next steps
5566

5667
Learn more about how to [request access tokens](access-tokens.md).

articles/active-directory-b2c/deploy-custom-policies-devops.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ There are three primary steps required for enabling Azure Pipelines to manage cu
2929
3030
## Prerequisites
3131

32-
* [Azure AD B2C tenant](tutorial-create-tenant.md), and credentials for a user in the directory with the [B2C IEF Policy Administrator](../active-directory/users-groups-roles/directory-assign-admin-roles.md#b2c-ief-policy-administrator) role
32+
* [Azure AD B2C tenant](tutorial-create-tenant.md), and credentials for a user in the directory with the [B2C IEF Policy Administrator](../active-directory/roles/permissions-reference.md#b2c-ief-policy-administrator) role
3333
* [Custom policies](custom-policy-get-started.md) uploaded to your tenant
3434
* [Management app](microsoft-graph-get-started.md) registered in your tenant with the Microsoft Graph API permission *Policy.ReadWrite.TrustFramework*
3535
* [Azure Pipeline](https://azure.microsoft.com/services/devops/pipelines/), and access to an [Azure DevOps Services project][devops-create-project]

articles/active-directory-b2c/manage-custom-policies-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,15 +25,15 @@ Azure PowerShell provides several cmdlets for command line- and script-based cus
2525

2626
## Prerequisites
2727

28-
* [Azure AD B2C tenant](tutorial-create-tenant.md), and credentials for a user in the directory with the [B2C IEF Policy Administrator](../active-directory/users-groups-roles/directory-assign-admin-roles.md#b2c-ief-policy-administrator) role
28+
* [Azure AD B2C tenant](tutorial-create-tenant.md), and credentials for a user in the directory with the [B2C IEF Policy Administrator](../active-directory/roles/permissions-reference.md#b2c-ief-policy-administrator) role
2929
* [Custom policies](custom-policy-get-started.md) uploaded to your tenant
3030
* [Azure AD PowerShell for Graph **preview module**](https://docs.microsoft.com/powershell/azure/active-directory/install-adv2?view=azureadps-2.0)
3131

3232
## Connect PowerShell session to B2C tenant
3333

3434
To work with custom policies in your Azure AD B2C tenant, you first need to connect your PowerShell session to the tenant by using the [Connect-AzureAD][Connect-AzureAD] command.
3535

36-
Execute the following command, substituting `{b2c-tenant-name}` with the name of your Azure AD B2C tenant. Sign in with an account that's assigned the [B2C IEF Policy Administrator](../active-directory/users-groups-roles/directory-assign-admin-roles.md#b2c-ief-policy-administrator) role in the directory.
36+
Execute the following command, substituting `{b2c-tenant-name}` with the name of your Azure AD B2C tenant. Sign in with an account that's assigned the [B2C IEF Policy Administrator](../active-directory/roles/permissions-reference.md#b2c-ief-policy-administrator) role in the directory.
3737

3838
```PowerShell
3939
Connect-AzureAD -Tenant "{b2c-tenant-name}.onmicrosoft.com"

articles/active-directory-b2c/technical-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -211,7 +211,7 @@ You can assign roles to control who can perform certain administrative actions i
211211
* Create and manage trust framework policies in the Identity Experience Framework (custom policies)
212212
* Manage secrets for federation and encryption in the Identity Experience Framework (custom policies)
213213

214-
For more information about Azure AD roles, including Azure AD B2C administration role support, see [Administrator role permissions in Azure Active Directory](../active-directory/users-groups-roles/directory-assign-admin-roles.md).
214+
For more information about Azure AD roles, including Azure AD B2C administration role support, see [Administrator role permissions in Azure Active Directory](../active-directory/roles/permissions-reference.md).
215215

216216
### Multi-factor authentication (MFA)
217217

articles/active-directory-b2c/user-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ When you add a new work account, you need to consider the following configuratio
3939

4040
- **User** - Users can access assigned resources but cannot manage most tenant resources.
4141
- **Global administrator** - Global administrators have full control over all tenant resources.
42-
- **Limited administrator** - Select the administrative role or roles for the user. For more information about the roles that can be selected, see [Assigning administrator roles in Azure Active Directory](../active-directory/users-groups-roles/directory-assign-admin-roles.md).
42+
- **Limited administrator** - Select the administrative role or roles for the user. For more information about the roles that can be selected, see [Assigning administrator roles in Azure Active Directory](../active-directory/roles/permissions-reference.md).
4343

4444
### Create a work account
4545

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,15 +60,15 @@ For outbound provisioning from Azure AD to a SaaS application, relying on [user
6060

6161
* **Groups.** With an Azure AD Premium license plan, you can use groups to assign access to a SaaS application. Then, when the provisioning scope is set to **Sync only assigned users and groups**, the Azure AD provisioning service will provision or de-provision users based on whether they're members of a group that's assigned to the application. The group object itself isn't provisioned unless the application supports group objects. Ensure that groups assigned to your application have the property "SecurityEnabled" set to "True".
6262

63-
* **Dynamic groups.** The Azure AD user provisioning service can read and provision users in [dynamic groups](../users-groups-roles/groups-create-rule.md). Keep these caveats and recommendations in mind:
63+
* **Dynamic groups.** The Azure AD user provisioning service can read and provision users in [dynamic groups](../enterprise-users/groups-create-rule.md). Keep these caveats and recommendations in mind:
6464

6565
* Dynamic groups can impact the performance of end-to-end provisioning from Azure AD to SaaS applications.
6666

67-
* How fast a user in a dynamic group is provisioned or de-provisioned in a SaaS application depends on how fast the dynamic group can evaluate membership changes. For information about how to check the processing status of a dynamic group, see [Check processing status for a membership rule](../users-groups-roles/groups-create-rule.md).
67+
* How fast a user in a dynamic group is provisioned or de-provisioned in a SaaS application depends on how fast the dynamic group can evaluate membership changes. For information about how to check the processing status of a dynamic group, see [Check processing status for a membership rule](../enterprise-users/groups-create-rule.md).
6868

6969
* When a user loses membership in the dynamic group, it's considered a de-provisioning event. Consider this scenario when creating rules for dynamic groups.
7070

71-
* **Nested groups.** The Azure AD user provisioning service can't read or provision users in nested groups. The service can only read and provision users that are immediate members of an explicitly assigned group. This limitation of "group-based assignments to applications" also affects single sign-on (see [Using a group to manage access to SaaS applications](../users-groups-roles/groups-saasapps.md)). Instead, directly assign or otherwise [scope in](define-conditional-rules-for-provisioning-user-accounts.md) the groups that contain the users who need to be provisioned.
71+
* **Nested groups.** The Azure AD user provisioning service can't read or provision users in nested groups. The service can only read and provision users that are immediate members of an explicitly assigned group. This limitation of "group-based assignments to applications" also affects single sign-on (see [Using a group to manage access to SaaS applications](../enterprise-users/groups-saasapps.md)). Instead, directly assign or otherwise [scope in](define-conditional-rules-for-provisioning-user-accounts.md) the groups that contain the users who need to be provisioned.
7272

7373
### Attribute-based scoping
7474

0 commit comments

Comments
 (0)