Skip to content

Commit d5752d4

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/azure-docs-pr into acl-misc
2 parents 9df01cf + 490f201 commit d5752d4

File tree

162 files changed

+2795
-1523
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

162 files changed

+2795
-1523
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,11 @@
5555
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
5656
"redirect_document_id": false
5757
},
58+
{
59+
"source_path_from_root": "/articles/active-directory/saas-apps/trello-tutorial.md",
60+
"redirect_url": "/azure/active-directory/saas-apps/atlassian-cloud-tutorial",
61+
"redirect_document_id": false
62+
},
5863
{
5964
"source_path_from_root": "/articles/active-directory/saas-apps/iauditor-tutorial.md",
6065
"redirect_url": "/azure/active-directory/saas-apps/safety-culture-tutorial",

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ ms.collection: M365-identity-device-management
1616

1717
# Customer intent: As an identity administrator, I want to understand how to use OATH tokens in Azure AD to improve and secure user sign-in events.
1818
---
19+
1920
# Authentication methods in Azure Active Directory - OATH tokens
2021

2122
OATH TOTP (Time-based One Time Password) is an open standard that specifies how one-time password (OTP) codes are generated. OATH TOTP can be implemented using either software or hardware to generate the codes. Azure AD doesn't support OATH HOTP, a different code generation standard.
@@ -48,7 +49,7 @@ Once tokens are acquired they must be uploaded in a comma-separated values (CSV)
4849
```csv
4950
upn,serial number,secret key,time interval,manufacturer,model
5051
[email protected],1234567,2234567abcdef2234567abcdef,60,Contoso,HardwareKey
51-
```
52+
```
5253

5354
> [!NOTE]
5455
> Make sure you include the header row in your CSV file.
@@ -61,9 +62,11 @@ Once any errors have been addressed, the administrator then can activate each ke
6162

6263
Users may have a combination of up to five OATH hardware tokens or authenticator applications, such as the Microsoft Authenticator app, configured for use at any time. Hardware OATH tokens cannot be assigned to guest users in the resource tenant.
6364

64-
.[!IMPORTANT]
65-
>Make sure to only assign each token to a single user.
66-
>In the future, support for the assignment of a single token to multiple users will stop to prevent a security risk.
65+
> [!IMPORTANT]
66+
> Make sure to only assign each token to a single user.
67+
> In the future, support for the assignment of a single token to multiple users will stop to prevent a security risk.
68+
69+
6770

6871

6972
## Determine OATH token registration type in mysecurityinfo
@@ -75,7 +78,9 @@ OATH software token | <img width="63" alt="Software OATH token" src="media/con
7578
OATH hardware token | <img width="63" alt="Hardware OATH token" src="media/concept-authentication-methods/hardware-oath-token-icon.png">
7679

7780

81+
7882
## Next steps
7983

8084
Learn more about configuring authentication methods using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
8185
Learn about [FIDO2 security key providers](concept-authentication-passwordless.md#fido2-security-key-providers) that are compatible with passwordless authentication.
86+

articles/active-directory/cloud-infrastructure-entitlement-management/ui-autopilot.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,13 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: overview
11-
ms.date: 02/23/2022
11+
ms.date: 02/16/2023
1212
ms.author: jfields
1313
---
1414

1515
# View rules in the Autopilot dashboard
1616

17-
The **Autopilot** dashboard in Permissions Management provides a table of information about **Autopilot rules** for administrators.
17+
The **Autopilot** dashboard in Permissions Management provides a table of information about Autopilot rules for administrators. Creating Autopilot rules allows you to automate right-sizing policies so you can automatically remove unused roles and permissions assigned to identities in your authorization system.
1818

1919

2020
> [!NOTE]
@@ -30,13 +30,13 @@ The **Autopilot** dashboard in Permissions Management provides a table of inform
3030
The following information displays in the **Autopilot Rules** table:
3131

3232
- **Rule Name**: The name of the rule.
33-
- **State**: The status of the rule: idle (not being use) or active (being used).
34-
- **Rule Type**: The type of rule being applied.
33+
- **State**: The status of the rule: idle (not in use) or active (in use).
34+
- **Rule Type**: The type of rule that's applied.
3535
- **Mode**: The status of the mode: on-demand or not.
3636
- **Last Generated**: The date and time the rule was last generated.
3737
- **Created By**: The email address of the user who created the rule.
3838
- **Last Modified**: The date and time the rule was last modified.
39-
- **Subscription**: Provides an **On** or **Off** subscription that allows you to receive email notifications when recommendations have been generated, applied, or unapplied.
39+
- **Subscription**: Provides an **On** or **Off** subscription that allows you to receive email notifications when recommendations are generated, applied, or unapplied.
4040

4141
## View other available options for rules
4242

@@ -48,7 +48,7 @@ The **Autopilot** dashboard in Permissions Management provides a table of inform
4848
- **Delete Rule**: Select to delete the rule. Only the user who created the selected rule can delete the rule.
4949
- **Generate Recommendations**: Creates recommendations for each user and the authorization system. Only the user who created the selected rule can create recommendations.
5050
- **View Recommendations**: Displays the recommendations for each user and authorization system.
51-
- **Notification Settings**: Displays the users subscribed to this rule. Only the user who created the selected rule can add other users to be notified.
51+
- **Notification Settings**: Displays the users subscribed to this rule. Only the user who created the selected rule can add other users to receive notifications.
5252

5353
You can also select:
5454

articles/active-directory/develop/workload-identity-federation.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 10/31/2022
12+
ms.date: 02/16/2023
1313
ms.author: ryanwi
14-
ms.reviewer: shkhalid, udayh, vakarand
14+
ms.reviewer: shkhalid, udayh
1515
ms.custom: aaddev
1616
#Customer intent: As a developer, I want to learn about workload identity federation so that I can securely access Azure AD protected resources from external apps and services without needing to manage secrets.
1717
---
@@ -23,6 +23,9 @@ You can use workload identity federation in scenarios such as GitHub Actions, wo
2323

2424
## Why use workload identity federation?
2525

26+
Watch this video to learn why you would use workload identity federation.
27+
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWXamJ]
28+
2629
Typically, a software workload (such as an application, service, script, or container-based application) needs an identity in order to authenticate and access resources or communicate with other services. When these workloads run on Azure, you can use [managed identities](../managed-identities-azure-resources/overview.md) and the Azure platform manages the credentials for you. For a software workload running outside of Azure, you need to use application credentials (a secret or certificate) to access Azure AD protected resources (such as Azure, Microsoft Graph, Microsoft 365, or third-party resources). These credentials pose a security risk and have to be stored securely and rotated regularly. You also run the risk of service downtime if the credentials expire.
2730

2831
You use workload identity federation to configure an Azure AD app registration or [user-assigned managed identity](../managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md) to trust tokens from an external identity provider (IdP), such as GitHub. Once that trust relationship is created, your software workload can exchange trusted tokens from the external IdP for access tokens from Microsoft identity platform. Your software workload then uses that access token to access the Azure AD protected resources to which the workload has been granted access. This eliminates the maintenance burden of manually managing credentials and eliminates the risk of leaking secrets or having certificates expire.

articles/active-directory/saas-apps/anaplan-tutorial.md

Lines changed: 57 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 02/16/2023
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure AD SSO integration with Anaplan
@@ -65,28 +65,70 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
6565

6666
1. In the Azure portal, on the **Anaplan** application integration page, find the **Manage** section and select **single sign-on**.
6767
1. On the **Select a single sign-on method** page, select **SAML**.
68+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click the copy icon to copy the **App Federation Metadata URL** and save this to use in the Anaplan SSO configuration.
69+
70+
![The Certificate download link.](common/copy-metadataurl.png)
71+
72+
## Configure Anaplan SSO
73+
74+
1. Log in to Anaplan website as an administrator.
75+
76+
1. In the Administration page, navigate to **Security > Single Sign-On**.
77+
78+
1. Click **New**.
79+
80+
1. Perform the following steps in the **Metadata** tab:
81+
82+
![Screenshot for the security page.](./media/anaplan-tutorial/security.png)
83+
84+
a. Enter a **Connection Name**, should match the name of your connection in the identity provider interface.
85+
86+
b. Select **Load from XML file** and paste the App Federation Metadata URL you copied from Azure portal into the **Metadata URL** textbox.
87+
88+
c. Click **Save** to create the connection.
89+
90+
d. Enable the connection by setting the **Enabled** toggle.
91+
92+
1. From the **Config** tab, copy the following values to save them back to the Azure portal:
93+
94+
a. **Service Provider URL**.
95+
b. **Assertion Consumer Service URL**.
96+
c. **Entity ID**.
97+
98+
### Complete the Azure AD SSO Configuration
99+
68100
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
69101

70-
![Edit Basic SAML Configuration](common/edit-urls.png)
102+
![Edit Basic SAML Configuration.](common/edit-urls.png)
71103

72-
4. On the **Basic SAML Configuration** section, perform the following steps:
104+
1. On the **Basic SAML Configuration** section, perform the following steps:
73105

74-
a. In the **Sign on URL** text box, type a URL using the following pattern:
75-
`https://sdp.anaplan.com/frontdoor/saml/<tenant name>`
106+
a. In the **Identifier (Entity ID)** text box, paste the Entity ID that you copied from above, in the format:
107+
`https://sdp.anaplan.com/<optional extension>`
76108

77-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
78-
`https://<subdomain>.anaplan.com`
109+
b. In the **Sign on URL** text box, paste the Service Provider URL that you copied from above, in the format:
110+
`https://us1a.app.anaplan.com/samlsp/<connection name>`
111+
112+
c. In the **Reply URL (Assertion Consumer Service URL)** text box, paste the Assertion Consumer Service URL that you copied from above, in the format:
113+
`https://us1a.app.anaplan.com/samlsp/login/callback?connection=<connection name>`
79114

80-
> [!NOTE]
81-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Anaplan Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
115+
### Complete the Anaplan SSO Configuration
116+
117+
1. Perform the following steps in the **Advanced** tab:
118+
119+
![Screenshot for the Advanced page.](./media/anaplan-tutorial/advanced.png)
120+
121+
a. Select **Name ID Format** as Email Address from the dropdown and keep the remaining values as default.
82122

83-
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
123+
b. Click **Save**.
84124

85-
![The Certificate download link](common/metadataxml.png)
125+
1. In the **Workspaces** tab, specify the workspaces that will use the identity provider from the dropdown and Click **Save**.
86126

87-
6. On the **Set up Anaplan** section, copy the appropriate URL(s) as per your requirement.
127+
![Screenshot for the Workspaces page.](./media/anaplan-tutorial/workspaces.png)
88128

89-
![Copy configuration URLs](common/copy-configuration-urls.png)
129+
> [!NOTE]
130+
> Workspace connections are unique. If you have another connection already configured with a workspace, you cannot associate that workspace with a new connection.
131+
To access the original connection and update it, remove the workspace from the connection and then reassociate it with the new connection.
90132

91133
### Create an Azure AD test user
92134

@@ -112,49 +154,9 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
112154
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
113155
1. In the **Add Assignment** dialog, click the **Assign** button.
114156

115-
## Configure Anaplan SSO
116-
117-
1. Login to Anaplan website as an administrator.
118-
119-
1. In Administration page, navigate to **Security > Single Sign-On**.
120-
121-
1. Click **New**.
122-
123-
1. Perform the following steps in the **Metadata** tab:
124-
125-
![Screenshot for the security page](./media/anaplan-tutorial/security.png)
126-
127-
a. Enter a **Connection Name**, should match the name of your connection in the identity provider interface.
128-
129-
b. Select **Load from XML file** and enter the URL of the metadata XML file with your configuration information in the **Metadata URL** textbox.
130-
131-
C. Enabled the **Signed** toggle.
132-
133-
d. Click **Save** to create the connection.
134-
135-
1. When you upload a **metadata XML** file in the **Metadata** tab, the values in **Config** tab pre-populate with the information from that upload. You can skip this tab in your connection setup and click **Save**.
136-
137-
![Screenshot for the configuration page](./media/anaplan-tutorial/configuration.png)
138-
139-
1. Perform the following steps in the **Advanced** tab:
140-
141-
![Screenshot for the Advanced page](./media/anaplan-tutorial/advanced.png)
142-
143-
a. Select **Name ID Format** as Email Address from the dropdown and keep the remaining values as default.
144-
145-
b. Click **Save**.
146-
147-
1. In the **Workspaces** tab, specify the workspaces that will use the identity provider from the dropdown and Click **Save**.
148-
149-
![Screenshot for the Workspaces page](./media/anaplan-tutorial/Workspaces.png)
150-
151-
> [!NOTE]
152-
> Workspace connections are unique. If you have another connection already configured with a workspace, you cannot associate that workspace with a new connection.
153-
To access the original connection and update it, remove the workspace from the connection and then reassociate it with the new connection.
154-
155157
### Create Anaplan test user
156158

157-
In this section, you create a user called Britta Simon in Anaplan. Work with [Anaplan support team](mailto:[email protected]) to add the users in the Anaplan platform. Users must be created and activated before you use single sign-on.
159+
In this section, you create a user called Britta Simon in Anaplan. Work with [Anaplan support team](mailto:[email protected]) to add the users in the Anaplan platform. Users must be created and activated before you use single sign-on.
158160

159161
## Test SSO
160162

@@ -168,4 +170,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
168170

169171
## Next steps
170172

171-
Once you configure Anaplan you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
173+
Once you configure Anaplan you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

articles/active-directory/saas-apps/beeline-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 02/15/2023
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure Active Directory integration with Beeline
@@ -75,7 +75,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7575
`https://projects.beeline.com/<ProjInstance_Name>`
7676

7777
b. In the **Reply URL** text box, type a URL using the following pattern:
78-
`https://projects.beeline.com/<ProjInstance_Name>/SSO_External.ashx`
78+
`https://azure-prj.auth.beeline.com/login/callback?connection=<ProjInstance_Namee>-SSO`
7979

8080
> [!NOTE]
8181
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Beeline Client support team](https://www.beeline.com/contact-support/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.

0 commit comments

Comments
 (0)