You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Customer intent: As an identity administrator, I want to understand how to use OATH tokens in Azure AD to improve and secure user sign-in events.
18
18
---
19
+
19
20
# Authentication methods in Azure Active Directory - OATH tokens
20
21
21
22
OATH TOTP (Time-based One Time Password) is an open standard that specifies how one-time password (OTP) codes are generated. OATH TOTP can be implemented using either software or hardware to generate the codes. Azure AD doesn't support OATH HOTP, a different code generation standard.
@@ -48,7 +49,7 @@ Once tokens are acquired they must be uploaded in a comma-separated values (CSV)
> Make sure you include the header row in your CSV file.
@@ -61,9 +62,11 @@ Once any errors have been addressed, the administrator then can activate each ke
61
62
62
63
Users may have a combination of up to five OATH hardware tokens or authenticator applications, such as the Microsoft Authenticator app, configured for use at any time. Hardware OATH tokens cannot be assigned to guest users in the resource tenant.
63
64
64
-
.[!IMPORTANT]
65
-
>Make sure to only assign each token to a single user.
66
-
>In the future, support for the assignment of a single token to multiple users will stop to prevent a security risk.
65
+
> [!IMPORTANT]
66
+
> Make sure to only assign each token to a single user.
67
+
> In the future, support for the assignment of a single token to multiple users will stop to prevent a security risk.
68
+
69
+
67
70
68
71
69
72
## Determine OATH token registration type in mysecurityinfo
Learn more about configuring authentication methods using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
81
85
Learn about [FIDO2 security key providers](concept-authentication-passwordless.md#fido2-security-key-providers) that are compatible with passwordless authentication.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/ui-autopilot.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,13 +8,13 @@ ms.service: active-directory
8
8
ms.subservice: ciem
9
9
ms.workload: identity
10
10
ms.topic: overview
11
-
ms.date: 02/23/2022
11
+
ms.date: 02/16/2023
12
12
ms.author: jfields
13
13
---
14
14
15
15
# View rules in the Autopilot dashboard
16
16
17
-
The **Autopilot** dashboard in Permissions Management provides a table of information about **Autopilot rules** for administrators.
17
+
The **Autopilot** dashboard in Permissions Management provides a table of information about Autopilot rules for administrators. Creating Autopilot rules allows you to automate right-sizing policies so you can automatically remove unused roles and permissions assigned to identities in your authorization system.
18
18
19
19
20
20
> [!NOTE]
@@ -30,13 +30,13 @@ The **Autopilot** dashboard in Permissions Management provides a table of inform
30
30
The following information displays in the **Autopilot Rules** table:
31
31
32
32
-**Rule Name**: The name of the rule.
33
-
-**State**: The status of the rule: idle (not being use) or active (being used).
34
-
-**Rule Type**: The type of rule being applied.
33
+
-**State**: The status of the rule: idle (not in use) or active (in use).
34
+
-**Rule Type**: The type of rule that's applied.
35
35
-**Mode**: The status of the mode: on-demand or not.
36
36
-**Last Generated**: The date and time the rule was last generated.
37
37
-**Created By**: The email address of the user who created the rule.
38
38
-**Last Modified**: The date and time the rule was last modified.
39
-
-**Subscription**: Provides an **On** or **Off** subscription that allows you to receive email notifications when recommendations have been generated, applied, or unapplied.
39
+
-**Subscription**: Provides an **On** or **Off** subscription that allows you to receive email notifications when recommendations are generated, applied, or unapplied.
40
40
41
41
## View other available options for rules
42
42
@@ -48,7 +48,7 @@ The **Autopilot** dashboard in Permissions Management provides a table of inform
48
48
-**Delete Rule**: Select to delete the rule. Only the user who created the selected rule can delete the rule.
49
49
-**Generate Recommendations**: Creates recommendations for each user and the authorization system. Only the user who created the selected rule can create recommendations.
50
50
-**View Recommendations**: Displays the recommendations for each user and authorization system.
51
-
-**Notification Settings**: Displays the users subscribed to this rule. Only the user who created the selected rule can add other users to be notified.
51
+
-**Notification Settings**: Displays the users subscribed to this rule. Only the user who created the selected rule can add other users to receive notifications.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/workload-identity-federation.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 10/31/2022
12
+
ms.date: 02/16/2023
13
13
ms.author: ryanwi
14
-
ms.reviewer: shkhalid, udayh, vakarand
14
+
ms.reviewer: shkhalid, udayh
15
15
ms.custom: aaddev
16
16
#Customer intent: As a developer, I want to learn about workload identity federation so that I can securely access Azure AD protected resources from external apps and services without needing to manage secrets.
17
17
---
@@ -23,6 +23,9 @@ You can use workload identity federation in scenarios such as GitHub Actions, wo
23
23
24
24
## Why use workload identity federation?
25
25
26
+
Watch this video to learn why you would use workload identity federation.
Typically, a software workload (such as an application, service, script, or container-based application) needs an identity in order to authenticate and access resources or communicate with other services. When these workloads run on Azure, you can use [managed identities](../managed-identities-azure-resources/overview.md) and the Azure platform manages the credentials for you. For a software workload running outside of Azure, you need to use application credentials (a secret or certificate) to access Azure AD protected resources (such as Azure, Microsoft Graph, Microsoft 365, or third-party resources). These credentials pose a security risk and have to be stored securely and rotated regularly. You also run the risk of service downtime if the credentials expire.
27
30
28
31
You use workload identity federation to configure an Azure AD app registration or [user-assigned managed identity](../managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md) to trust tokens from an external identity provider (IdP), such as GitHub. Once that trust relationship is created, your software workload can exchange trusted tokens from the external IdP for access tokens from Microsoft identity platform. Your software workload then uses that access token to access the Azure AD protected resources to which the workload has been granted access. This eliminates the maintenance burden of manually managing credentials and eliminates the risk of leaking secrets or having certificates expire.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/anaplan-tutorial.md
+57-55Lines changed: 57 additions & 55 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 11/21/2022
12
+
ms.date: 02/16/2023
13
13
ms.author: jeedes
14
14
---
15
15
# Tutorial: Azure AD SSO integration with Anaplan
@@ -65,28 +65,70 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
65
65
66
66
1. In the Azure portal, on the **Anaplan** application integration page, find the **Manage** section and select **single sign-on**.
67
67
1. On the **Select a single sign-on method** page, select **SAML**.
68
+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click the copy icon to copy the **App Federation Metadata URL** and save this to use in the Anaplan SSO configuration.
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Anaplan Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
115
+
### Complete the Anaplan SSO Configuration
116
+
117
+
1. Perform the following steps in the **Advanced** tab:
118
+
119
+

120
+
121
+
a. Select **Name ID Format** as Email Address from the dropdown and keep the remaining values as default.
82
122
83
-
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
> Workspace connections are unique. If you have another connection already configured with a workspace, you cannot associate that workspace with a new connection.
131
+
To access the original connection and update it, remove the workspace from the connection and then reassociate it with the new connection.
90
132
91
133
### Create an Azure AD test user
92
134
@@ -112,49 +154,9 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
112
154
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
113
155
1. In the **Add Assignment** dialog, click the **Assign** button.
114
156
115
-
## Configure Anaplan SSO
116
-
117
-
1. Login to Anaplan website as an administrator.
118
-
119
-
1. In Administration page, navigate to **Security > Single Sign-On**.
120
-
121
-
1. Click **New**.
122
-
123
-
1. Perform the following steps in the **Metadata** tab:
124
-
125
-

126
-
127
-
a. Enter a **Connection Name**, should match the name of your connection in the identity provider interface.
128
-
129
-
b. Select **Load from XML file** and enter the URL of the metadata XML file with your configuration information in the **Metadata URL** textbox.
130
-
131
-
C. Enabled the **Signed** toggle.
132
-
133
-
d. Click **Save** to create the connection.
134
-
135
-
1. When you upload a **metadata XML** file in the **Metadata** tab, the values in **Config** tab pre-populate with the information from that upload. You can skip this tab in your connection setup and click **Save**.
136
-
137
-

138
-
139
-
1. Perform the following steps in the **Advanced** tab:
140
-
141
-

142
-
143
-
a. Select **Name ID Format** as Email Address from the dropdown and keep the remaining values as default.
144
-
145
-
b. Click **Save**.
146
-
147
-
1. In the **Workspaces** tab, specify the workspaces that will use the identity provider from the dropdown and Click **Save**.
148
-
149
-

150
-
151
-
> [!NOTE]
152
-
> Workspace connections are unique. If you have another connection already configured with a workspace, you cannot associate that workspace with a new connection.
153
-
To access the original connection and update it, remove the workspace from the connection and then reassociate it with the new connection.
154
-
155
157
### Create Anaplan test user
156
158
157
-
In this section, you create a user called Britta Simon in Anaplan. Work with[Anaplan support team](mailto:[email protected]) to add the users in the Anaplan platform. Users must be created and activated before you use single sign-on.
159
+
In this section, you create a user called Britta Simon in Anaplan. Work with[Anaplan support team](mailto:[email protected]) to add the users in the Anaplan platform. Users must be created and activated before you use single sign-on.
158
160
159
161
## Test SSO
160
162
@@ -168,4 +170,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
168
170
169
171
## Next steps
170
172
171
-
Once you configure Anaplan you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
173
+
Once you configure Anaplan you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Beeline Client support team](https://www.beeline.com/contact-support/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
0 commit comments