Skip to content

Commit d22d41f

Browse files
authored
Merge pull request #250234 from MicrosoftDocs/main
9/4/2023 AM Publish
2 parents ab62c62 + 80eb015 commit d22d41f

File tree

38 files changed

+144
-96
lines changed

38 files changed

+144
-96
lines changed

articles/active-directory/develop/includes/web-app-client-credentials.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,4 +72,8 @@ Instead of a client secret, you can provide a client certificate. The following
7272
}
7373
```
7474

75-
*Microsoft.Identity.Web* provides several ways to describe certificates, both by configuration or by code. For details, see [Microsoft.Identity.Web - Using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Using-certificates) on GitHub.
75+
> [!WARNING]
76+
>
77+
> If you forget to change the `Scopes` to an array, when you try to use the `IDownstreamApi` the scopes will appear null, and `IDownstreamApi` will attempt an anonymous (unauthenticated) call to the downstream API, which will result in a `401/unauthenticated`.
78+
79+
*Microsoft.Identity.Web* provides several ways to describe certificates, both by configuration or by code. For details, see [Microsoft.Identity.Web - Using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Using-certificates) on GitHub.

articles/active-directory/develop/saml-claims-customization.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,10 +210,14 @@ When the following conditions occur after **Add** or **Run test** is selected, a
210210

211211
## Add the UPN claim to SAML tokens
212212

213-
The `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` claim is part of the [SAML restricted claim set](reference-claims-mapping-policy-type.md), so you can't add it in the **Attributes & Claims** section. As a workaround, you can add it as an [optional claim](./optional-claims.md) through **App registrations** in the Azure portal.
213+
The `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` claim is part of the [SAML restricted claim set](reference-claims-mapping-policy-type.md#saml-restricted-claim-set). If you have custom signing key configured, you can add it in the **Attributes & Claims** section.
214214

215+
In case there is no custom signing key configured, please refer to [SAML Restricted claim set](reference-claims-mapping-policy-type.md#saml-restricted-claim-set). You can add it as an [optional claim](./optional-claims.md) through **App registrations** in the Azure portal.
216+
215217
Open the application in **App registrations**, select **Token configuration**, and then select **Add optional claim**. Select the **SAML** token type, choose **upn** from the list, and then click **Add** to add the claim to the token.
216218

219+
Customization done in the **Attributes & Claims** section can overwrite the optional claims in the **App Registration**.
220+
217221
## Emit claims based on conditions
218222

219223
You can specify the source of a claim based on user type and the group to which the user belongs.
-11.9 KB
Loading

articles/active-directory/manage-apps/add-application-portal-setup-oidc-sso.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,18 +26,18 @@ It is recommended that you use a non-production environment to test the steps in
2626

2727
To configure OIDC-based SSO, you need:
2828

29-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30-
- One of the following roles: Global Administrator, or owner of the service principal.
29+
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3131

3232
## Add the application
3333

3434
When you add an enterprise application that uses the OIDC standard for SSO, you select a setup button. When you select the button, you complete the sign-up process for the application.
3535

3636
To configure OIDC-based SSO for an application:
3737

38-
1. Sign in to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
39-
1. Browse to **Azure Active Directory** > **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant.
40-
1. In the **Enterprise applications** pane, select **New application**.
38+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
39+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
40+
1. In the **All applications** pane, select **New application**.
4141
1. The **Browse Azure AD Gallery** pane opens and displays tiles for cloud platforms, on-premises applications, and featured applications. Applications listed in the **Featured applications** section have icons indicating whether they support federated SSO and provisioning. Search for and select the application. In this example, **SmartSheet** is being used.
4242
1. Select **Sign-up**. Sign in with the user account credentials from Azure Active Directory. If you already have a subscription to the application, then user details and tenant information is validated. If the application is not able to verify the user, then it redirects you to sign up for the application service.
4343

articles/active-directory/manage-apps/certificate-signing-options.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -41,15 +41,22 @@ Azure AD supports two signing algorithms, or secure hash algorithms (SHAs), to s
4141

4242
* **SHA-1**. This algorithm is older, and it's treated as less secure than SHA-256. If an application supports only this signing algorithm, you can select this option in the **Signing Algorithm** drop-down list. Azure AD then signs the SAML response with the SHA-1 algorithm.
4343

44+
## Prerequisites
45+
46+
To change an application's SAML certificate signing options and the certificate signing algorithm, you need:
47+
48+
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
49+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
50+
4451
[!INCLUDE [portal updates](../includes/portal-update.md)]
4552

4653
## Change certificate signing options and signing algorithm
4754

48-
To change an application's SAML certificate signing options and the certificate signing algorithm, select the application in question:
55+
To change an application's SAML certificate signing options and the certificate signing algorithm:
4956

50-
1. In the [Azure portal](https://portal.azure.com), sign in to your account.
51-
1. Browse to **Azure Active Directory** > **Enterprise applications**. A list of the enterprise applications in your account appears.
52-
1. Select an application. An overview page for the application appears. In this example, the Salesforce application is used.
57+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
58+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
59+
1. Enter the name of the existing application in the search box, and then select the application from the search results. In this example, you use the Salesforce application.
5360

5461
![Example: Application overview page](./media/certificate-signing-options/application-overview-page.png)
5562

@@ -69,5 +76,5 @@ Next, change the certificate signing options in the SAML token for that applicat
6976

7077
## Next steps
7178

72-
* [Configure single sign-on to applications that are not in the Azure Active Directory App Gallery](../develop/single-sign-on-saml-protocol.md)
73-
* [Troubleshoot SAML-based single sign-on](./debug-saml-sso-issues.md)
79+
- [Configure single sign-on to applications that are not in the Azure Active Directory App Gallery](../develop/single-sign-on-saml-protocol.md)
80+
- [Troubleshoot SAML-based single sign-on](./debug-saml-sso-issues.md)

articles/active-directory/manage-apps/debug-saml-sso-issues.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ To download and install the My Apps Secure Sign-in Extension, use one of the fol
3232

3333
To test SAML-based single sign-on between Azure AD and a target application:
3434

35-
1. Sign in to the [Azure portal](https://portal.azure.com) as a global administrator or other administrator that is authorized to manage applications.
36-
1. In the left navigation pane, select **Azure Active Directory**, and then select **Enterprise applications**.
35+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
36+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
3737
1. From the list of enterprise applications, select the application for which you want to test single sign-on, and then from the options on the left, select **Single sign-on**.
3838
1. To open the SAML-based single sign-on testing experience, go to **Test single sign-on** (step 5). If the **Test** button is greyed out, you need to fill out and save the required attributes first in the **Basic SAML Configuration** section.
3939
1. In the **Test single sign-on** page, use your corporate credentials to sign in to the target application. You can sign in as the current user or as a different user. If you sign in as a different user, a prompt asks you to authenticate.

articles/active-directory/manage-apps/disable-user-sign-in-portal.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -26,18 +26,17 @@ In this article, you learn how to prevent users from signing in to an applicatio
2626

2727
To disable user sign-in, you need:
2828

29-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30-
- One of the following roles: An administrator, or owner of the service principal.
29+
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3131

3232
## Disable user sign-in
3333

3434
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3535

3636
:::zone pivot="portal"
3737

38-
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator for your directory.
39-
1. Search for and select **Azure Active Directory**.
40-
1. Select **Enterprise applications**.
38+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
39+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
4140
1. Search for the application you want to disable a user from signing in, and select the application.
4241
1. Select **Properties**.
4342
1. Select **No** for **Enabled for users to sign-in?**.
@@ -49,11 +48,11 @@ To disable user sign-in, you need:
4948

5049
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
5150

52-
Ensure you've installed the AzureAD module (use the command `Install-Module -Name AzureAD`). In case you're prompted to install a NuGet module or the new Azure AD V2 PowerShell module, type Y and press ENTER.
51+
Ensure you've installed the AzureAD module (use the command `Install-Module -Name AzureAD`). In case you're prompted to install a NuGet module or the new Azure AD V2 PowerShell module, type Y and press ENTER. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
5352

5453
```PowerShell
5554
# Connect to Azure AD PowerShell
56-
Connect-AzureAD -Scopes "Application.ReadWrite.All"
55+
Connect-AzureAD -Scopes
5756
5857
# The AppId of the app to be disabled
5958
$appId = "{AppId}"
@@ -74,7 +73,7 @@ if ($servicePrincipal) {
7473

7574
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
7675

77-
Ensure you've installed the Microsoft Graph module (use the command `Install-Module Microsoft.Graph`).
76+
Ensure you've installed the Microsoft Graph module (use the command `Install-Module Microsoft.Graph`). You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
7877

7978
```powershell
8079
# Connect to Microsoft Graph PowerShell
@@ -98,7 +97,7 @@ else { $servicePrincipal = New-MgServicePrincipal -AppId $appId –AccountEnabl
9897

9998
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
10099

101-
To disable sign-in to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
100+
To disable sign-in to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
102101

103102
You need to consent to the `Application.ReadWrite.All` permission.
104103

articles/active-directory/manage-apps/manage-application-permissions.md

Lines changed: 11 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/28/2023
11+
ms.date: 09/04/2023
1212
ms.author: jawoods
1313
ms.reviewer: phsignor
1414
zone_pivot_groups: enterprise-apps-all
@@ -41,34 +41,25 @@ Please see [Restore permissions granted to applications](restore-permissions.md)
4141

4242
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4343

44-
You can access the Azure portal to view the permissions granted to an app. You can revoke permissions granted by admins for your entire organization, and you can get contextual PowerShell scripts to perform other actions.
44+
You can access the Microsoft Entra admin center to view the permissions granted to an app. You can revoke permissions granted by admins for your entire organization, and you can get contextual PowerShell scripts to perform other actions.
4545

46-
To revoke an application's permissions that have been granted for the entire organization:
46+
To review an application's permissions that have been granted for the entire organization or to a specific user or group:
4747

48-
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the roles listed in the prerequisites section.
49-
1. Select **Azure Active Directory**, and then select **Enterprise applications**.
48+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
49+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
5050
1. Select the application that you want to restrict access to.
5151
1. Select **Permissions**.
52-
1. The permissions listed in the **Admin consent** tab apply to your entire organization. Choose the permission you would like to remove, select the **...** control for that permission, and then choose **Revoke permission**.
53-
54-
To review an application's permissions:
55-
56-
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the roles listed in the prerequisites section.
57-
1. Select **Azure Active Directory**, and then select **Enterprise applications**.
58-
1. Select the application that you want to restrict access to.
59-
1. Select **Permissions**. In the command bar, select **Review permissions**.
60-
![Screenshot of the review permissions window.](./media/manage-application-permissions/review-permissions.png)
61-
1. Give a reason for why you want to review permissions for the application by selecting any of the options listed after the question, **Why do you want to review permissions for this application?**
62-
63-
Each option generates PowerShell scripts that enable you to control user access to the application and to review permissions granted to the application. For information about how to control user access to an application, see [How to remove a user's access to an application](methods-for-removing-user-access.md)
52+
1. To view permissions that apply to your entire organization, select the **Admin consent** tab. To view permissions granted to a specific user or group, select the **User consent** tab.
53+
1. To view the details of a given permission, select the permission from the list. The **Permission Details** pane opens.
54+
1. To revoke a given permission, choose the permission you would like to revoke, select the **...** control for that permission, and then choose **Revoke permission**.
6455

6556
:::zone-end
6657

6758
:::zone pivot="aad-powershell"
6859

6960
## Review and revoke permissions
7061

71-
Use the following Azure AD PowerShell script to revoke all permissions granted to an application.
62+
Use the following Azure AD PowerShell script to revoke all permissions granted to an application. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
7263

7364
```powershell
7465
Connect-AzureAD
@@ -117,7 +108,7 @@ $assignments | ForEach-Object {
117108

118109
## Review and revoke permissions
119110

120-
Use the following Microsoft Graph PowerShell script to revoke all permissions granted to an application.
111+
Use the following Microsoft Graph PowerShell script to revoke all permissions granted to an application. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
121112

122113
```powershell
123114
Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "DelegatedPermissionGrant.ReadWrite.All", "AppRoleAssignment.ReadWrite.All"
@@ -171,7 +162,7 @@ $spApplicationPermissions = Get-MgServicePrincipalAppRoleAssignedTo -ServicePrin
171162

172163
## Review and revoke permissions
173164

174-
To review permissions, Sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
165+
To review permissions, Sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
175166

176167
You need to consent to the following permissions:
177168

articles/active-directory/manage-apps/review-admin-consent-requests.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,17 +25,16 @@ In this article, you learn how to review and take action on admin consent reques
2525
To review and take action on admin consent requests, you need:
2626

2727
- An Azure account. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
28-
- A designated reviewer with the appropriate role to [review admin consent requests](grant-admin-consent.md#prerequisites).
28+
- A Global Administrator or a designated reviewer with the appropriate role to [review admin consent requests](grant-admin-consent.md#prerequisites).
2929

3030
## Review and take action on admin consent requests
3131

3232
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3333

3434
To review the admin consent requests and take action:
3535

36-
1. Sign in to the [Azure portal](https://portal.azure.com) as one of the registered reviewers of the admin consent workflow.
37-
1. Search for and select **Azure Active Directory**.
38-
1. From the navigation menu, select **Enterprise applications**.
36+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator) who is a designated reviewer.
37+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
3938
1. Under **Activity**, select **Admin consent requests**.
4039
1. Select **My Pending** tab to view and act on the pending requests.
4140
1. Select the application that is being requested from the list.

0 commit comments

Comments
 (0)