Skip to content

Commit db65e57

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into 1614957-Part3
2 parents 1ce3f71 + 0496ff3 commit db65e57

File tree

3,674 files changed

+18438
-17140
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,674 files changed

+18438
-17140
lines changed

.openpublishing.redirection.json

Lines changed: 452 additions & 653 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -206,6 +206,9 @@ function Set-MfaState {
206206
Get-MsolUser -All | Set-MfaState -State Disabled
207207
```
208208

209+
> [!NOTE]
210+
> We recently changed the behavior and PowerShell script above accordingly. Previously, the script saved off the MFA methods, disabled MFA, and restored the methods. This is no longer necessary now that the default behavior for disable doesn't clear the methods.
211+
209212
## Plan Conditional Access policies
210213

211214
To plan your Conditional Access policy strategy, which will determine when MFA and other controls are required, refer to [What is Conditional Access in Azure Active Directory?](../conditional-access/overview.md).

articles/active-directory/b2b/faq.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: reference
9-
ms.date: 04/10/2019
9+
ms.date: 11/07/2019
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -54,15 +54,21 @@ Absolutely. For more information, see [Adding guest users to a role](add-guest-t
5454
Unless a user is assigned the role of limited administrator, B2B collaboration users won't require access to the Azure portal. However, B2B collaboration users who are assigned the role of limited administrator can access the portal. Also, if a guest user who isn't assigned one of these admin roles accesses the portal, the user might be able to access certain parts of the experience. The guest user role has some permissions in the directory.
5555

5656
### Can I block access to the Azure portal for guest users?
57-
Yes! When you configure this policy, be careful to avoid accidentally blocking access to members and admins.
58-
To block a guest user's access to the [Azure portal](https://portal.azure.com), use a Conditional Access policy in the Windows Azure classic deployment model API:
59-
1. Modify the **All Users** group so that it contains only members.
60-
![Screenshot showing All Users group where UserType is not equal Guest](media/faq/modify-all-users-group.png)
61-
2. Create a dynamic group that contains guest users.
62-
![Screenshot showing a new All Guest Users group](media/faq/group-with-guest-users.png)
63-
3. Set up a Conditional Access policy to block guest users from accessing the portal, as shown in the following video:
64-
65-
> [!VIDEO https://channel9.msdn.com/Blogs/Azure/b2b-block-guest-user/Player]
57+
58+
Yes! You can create a Conditional Access policy that blocks all guest and external users from accessing the Azure portal. When you configure this policy, be careful to avoid accidentally blocking access to members and admins.
59+
60+
1. Sign in to your [Azure portal](https://portal.azure.com/) as a security administrator or a Conditional Access administrator.
61+
2. In the Azure portal, select **Azure Active Directory**.
62+
3. Under **Manage**, select **Security**.
63+
4. Under **Protect**, select **Conditional Access**. Select **New policy**.
64+
5. On the **New** page, in the **Name** textbox, enter a name for the policy (for example "Block guests from accessing the portal").
65+
6. Under **Assignments**, select **Users and groups**.
66+
7. On the **Include** tab, choose **Select users and groups**, and then select **All guest and external users (Preview)**.
67+
9. Select **Done**.
68+
10. On the **New** page, in the **Assignments** section, select **Cloud apps or actions**.
69+
11. On the **Cloud apps or actions** page, choose **Select apps**, and then choose **Select**.
70+
12. On the **Select** page, choose **Microsoft Azure Management**, and then choose **Select**.
71+
13. On the **Cloud apps or actions** page, select **Done**.
6672

6773
### Does Azure AD B2B collaboration support multi-factor authentication and consumer email accounts?
6874
Yes. Multi-factor authentication and consumer email accounts are both supported for Azure AD B2B collaboration.

articles/active-directory/b2b/troubleshoot.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,19 @@
11
---
22
title: Troubleshooting B2B collaboration - Azure Active Directory | Microsoft Docs
33
description: Remedies for common problems with Azure Active Directory B2B collaboration
4-
54
services: active-directory
65
ms.service: active-directory
76
ms.subservice: B2B
8-
ms.topic: conceptual
7+
ms.topic: troubleshooting
98
ms.date: 05/25/2017
10-
9+
tags: active-directory
1110
ms.author: mimart
1211
author: v-miegge
13-
manager: celestedg
12+
manager: dcscontentpm
1413
ms.reviewer: mal
15-
ms.custom: "it-pro, seo-update-azuread-jan"
14+
ms.custom:
15+
- it-pro
16+
- seo-update-azuread-jan"
1617
ms.collection: M365-identity-device-management
1718
---
1819

articles/active-directory/conditional-access/faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Policies are enforced for business-to-business (B2B) collaboration users. Howeve
2929

3030
Yes. A SharePoint Online policy also applies to OneDrive for Business.
3131

32-
## Why can’t I set a policy on client apps, like Word or Outlook?
32+
## Why can’t I set a policy directly on client apps, like Word or Outlook?
3333

3434
A Conditional Access policy sets requirements for accessing a service. It's enforced when authentication to that service occurs. The policy is not set directly on a client application. Instead, it is applied when a client calls a service. For example, a policy set on SharePoint applies to clients calling SharePoint. A policy set on Exchange applies to Outlook.
3535

articles/active-directory/develop/TOC.yml

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -241,6 +241,8 @@
241241
href: migrate-android-adal-msal.md
242242
- name: Migrate to MSAL.iOS and MacOS
243243
href: migrate-objc-adal-msal.md
244+
- name: Migrate to MSAL Java
245+
href: migrate-adal-msal-java.md
244246
- name: Migrate Xamarin apps using brokers from ADAL.NET to MSAL.NET
245247
href: msal-net-migration-ios-broker.md
246248
- name: Supported authentication flows
@@ -390,6 +392,10 @@
390392
href: active-directory-configurable-token-lifetimes.md
391393
- name: Application configuration
392394
items:
395+
- name: Azure portal app registrations training guide (legacy)
396+
href: app-registrations-training-guide-for-app-registrations-legacy-users.md
397+
- name: Application Registration Portal app registration guide
398+
href: app-registration-portal-training-guide.md
393399
- name: Convert a single-tenant app to a multi-tenant app
394400
href: howto-convert-app-to-be-multi-tenant.md
395401
- name: Create service principal
@@ -446,6 +452,12 @@
446452
href: request-custom-claims.md
447453
- name: Redirect URI configuration
448454
href: redirect-uris-ios.md
455+
- name: MSAL Java
456+
items:
457+
- name: Token cache serialization
458+
href: msal-java-token-cache-serialization.md
459+
- name: Add and remove accounts from the token cache
460+
href: msal-java-get-remove-accounts-token-cache.md
449461
- name: Work with Visual Studio
450462
items:
451463
- name: Use the Active Directory connected service
@@ -594,8 +606,6 @@
594606
href: reference-saml-tokens.md
595607
- name: Application configuration
596608
items:
597-
- name: App registrations training guide
598-
href: app-registrations-training-guide.md
599609
- name: Applications and service principals
600610
href: app-objects-and-service-principals.md
601611
- name: How and why apps are added to Azure AD
Lines changed: 205 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,205 @@
1+
---
2+
title: Application Registration Portal app registrations training guide - Microsoft identity platform | Azure
3+
description: App registrations in the Azure portal for users familiar with Application registration portal
4+
services: active-directory
5+
documentationcenter: ''
6+
author: archieag
7+
manager: CelesteDG
8+
editor: ''
9+
10+
ms.service: active-directory
11+
ms.subservice: develop
12+
ms.workload: identity
13+
ms.tgt_pltfrm: na
14+
ms.devlang: na
15+
ms.topic: conceptual
16+
ms.date: 11/8/2019
17+
ms.author: aragra
18+
ms.reviewer: lenalepa, alamaral
19+
ms.custom: aaddev
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Training guide: Using App registrations in the Azure portal instead of Application Registration Portal
24+
25+
There are many improvements in the new [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience in the Azure portal. If you're more familiar with the Application registration portal (apps.dev.microsoft.com) experience for registering or managing converged applications, referred to as the old experience, this training guide will get you started using the new experience.
26+
27+
## What's not changing?
28+
29+
- Your applications and related configurations can be found as-is in the new experience. You do not need to register the applications again and users of your applications will not need to sign-in again.
30+
31+
> [!NOTE]
32+
> You must sign-in with the account you used to register applications to find them in the Azure portal. We recommend you
33+
check the signed in user in the Azure portal matches the user that
34+
was signed into the Application registration portal by comparing the
35+
email address from your profile.
36+
>
37+
> In some cases, especially when you sign in using personal Microsoft
38+
accounts(e.g. Outlook, Live, Xbox, etc.) with an Azure AD email address, we found out that when you
39+
go to the Azure portal from the old experience, it signs you into a
40+
different account with the same email in your Azure AD tenant. If
41+
you still believe your applications are missing, sign out and sign
42+
in with the right account.
43+
44+
- Live SDK apps created using personal Microsoft accounts are not yet supported in the Azure portal and will continue to remain in the old experience in near future.
45+
46+
## Key changes
47+
48+
- In the old experience, apps were by default registered as converged
49+
apps supporting all organizational accounts (multitenant) as well as
50+
personal Microsoft accounts. This could not be modified through the
51+
old experience, making it difficult to create apps that supported
52+
only organizational accounts (either multitenant or single tenant).
53+
The new experience allows you to register apps supporting all those
54+
options. [Learn more about app
55+
types](active-directory-v2-registration-portal.md).
56+
57+
- In the new experience, if your personal Microsoft account is also in
58+
an Azure AD tenant, you will see three tabs--all applications in
59+
the tenant, owned applications in the tenant as well as applications
60+
from your personal account. So, if you believe that apps registered
61+
with your personal Microsoft account are missing, check the
62+
**Applications from your personal account** tab.
63+
64+
- In the new experience, you can easily switch between tenants by
65+
navigating to your profile and choosing switch directory.
66+
67+
## List of applications
68+
69+
- The new app list shows applications that were registered through the
70+
legacy app registrations experience in the Azure portal (apps that
71+
sign in Azure AD accounts only) as well as apps registered though the
72+
[Application registration portal](https://apps.dev.microsoft.com/)
73+
(apps that sign in both Azure AD and personal Microsoft accounts).
74+
75+
- The new app list has two additional columns: **Created on** column and
76+
**Certificates & secrets** column that shows the status (current,
77+
expiring soon, or expired) of credentials that have been registered
78+
on the app.
79+
80+
## New app registration
81+
82+
In the old experience, to register a converged app you were only
83+
required to provide a Name. The apps that were created were registered
84+
as converged apps supporting all organizational directory (multitenant)
85+
as well as personal Microsoft accounts. This could not be modified through the old experience, making it difficult to create apps that supported only organizational accounts (either multitenant or single tenant). [Learn more about supported account types](v2-supported-account-types.md)
86+
87+
In the new experience, you must provide a Name for the app and choose
88+
the Supported account types. You can optionally provide a redirect URI.
89+
If you provide a redirect URI, you'll need to specify if it's
90+
web/public (native/mobile and desktop). For more info on how to register
91+
an app using the new app registrations experience, see [this
92+
quickstart](quickstart-register-app.md).
93+
94+
## App management page
95+
96+
The old experience had a single app management page for converged apps
97+
with the following sections: Properties, Application secrets, Platforms,
98+
Owners, Microsoft Graph Permissions, Profile, and Advanced Options.
99+
100+
The new experience in the Azure portal represents these features into
101+
separate pages. Here's where you can find the equivalent functionality:
102+
103+
- Properties - Name and Application ID is on the Overview page.
104+
105+
- Application Secrets is on the Certificates & secrets page
106+
107+
- Platforms configuration is on the Authentication page
108+
109+
- Microsoft Graph permissions is on the API permissions page along
110+
with other permissions
111+
112+
- Profile is on Branding page
113+
114+
- Advanced option - Live SDK support is on the Authentication page.
115+
116+
## Application Secrets/Certificates & secrets
117+
118+
In the new experience, **Application secrets** have been renamed to
119+
**Certificates & secrets**. In addition, **Public keys** are referred to as
120+
**Certificates** and **Passwords** are referred to as **Client secrets**. We
121+
chose to not bring this functionality along in the new experience for
122+
security reasons, hence, you can no longer generate a new key pair.
123+
124+
## Platforms/Authentication - Reply URLs/Redirect URIs
125+
In the old experience, an app had Platforms section for Web, native, and
126+
Web API to configure Redirect URLs, Logout URL and Implicit flow.
127+
128+
In the new experience, Reply URLs can be found on an app\'s
129+
Authentication section. In addition, they are referred to as redirect
130+
URIs and the format for redirect URIs has changed. They are required to
131+
be associated with an app type (web or public client - mobile and
132+
desktop). [Learn more](quickstart-configure-app-access-web-apis.md#add-redirect-uris-to-your-application)
133+
134+
Web APIs are configured in Expose an API page.
135+
136+
> [!NOTE]
137+
> Try out the new Authentication settings experience where you can
138+
configure settings for your application based on the platform or device
139+
that you want to target. [Learn more](quickstart-configure-app-access-web-apis.md#configure-platform-settings-for-your-application)
140+
141+
## Microsoft Graph Permissions/API permissions
142+
143+
- When selecting an API in the old experience, you could choose from
144+
Microsoft Graph APIs only. In the new experience, you can choose
145+
from many Microsoft APIs including Microsoft Graph, APIs from your
146+
organization and your APIs, this is presented in three tabs:
147+
Microsoft APIs, APIs my organization uses, or My APIs. The search
148+
bar on APIs my organization uses tab searches through service
149+
principals in the tenant.
150+
151+
> [!NOTE]
152+
> You won't see this tab if your application isn't
153+
associated with a tenant. For more info on how to request
154+
permissions using the new experience, see [this
155+
quickstart](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/active-directory/develop/quickstart-configure-app-access-web-apis.md).
156+
157+
- The old experience did not have a **Grant permissions** button. In the
158+
new experience, there's a Grant consent section with a **Grant admin consent** button on an app's API permissions section. Only an admin can grant consent and this button is enabled for admins only. When an admin selects the **Grant admin consent** button, admin consent is granted to all the requested permissions.
159+
160+
## Profile
161+
In the old experience, Profile had Logo, Home page URL, Terms of Service
162+
URL and Privacy Statement URL configuration. In the new experience,
163+
these can be found in Branding page.
164+
165+
## Application manifest
166+
In the new experience, Manifest page allows you to edit and update app's
167+
attributes. For more info, see [Application manifest](reference-app-manifest.md).
168+
169+
## New UI
170+
There's new UI for properties that could previously only be set using
171+
the manifest editor or the API, or didn't exist.
172+
173+
- Implicit grant flow (oauth2AllowImplicitFlow) can be found on the
174+
Authentication page. Unlike the old experience, you can enable
175+
access tokens or id tokens, or both.
176+
177+
- Scopes defined by this API (oauth2Permissions) and Authorized client
178+
applications (preAuthorizedApplications) can be configured through
179+
the Expose an API page. For more info on how to configure an app to
180+
be a web API and expose permissions/scopes, see [this
181+
quickstart](quickstart-configure-app-expose-web-apis.md).
182+
183+
- Publisher domain (which is displayed to users on the [application\'s
184+
consent
185+
prompt](application-consent-experience.md))
186+
can be found on the Branding blade page. For more info on how to
187+
configure a publisher domain, see [this
188+
how-to](howto-configure-publisher-domain.md).
189+
190+
## Limitations
191+
192+
The new experience has the following limitations:
193+
194+
- The new experience does not yet support App registrations for Azure AD
195+
B2C tenants.
196+
197+
- The new experience does not yet support Live SDK apps created with
198+
personal Microsoft accounts.
199+
200+
- Changing the value for supported accounts is not supported in the
201+
UI. You need to use the app manifest unless you\'re switching
202+
between Azure AD single-tenant and multi-tenant.
203+
204+
> [!NOTE]
205+
> If you're a personal Microsoft account user in Azure AD tenant, and the tenant admin has restricted access to Azure portal, you may get an access denied. However, if you come through the shortcut by typing App registrations in the search bar or pinning it, you'll be able to access the new experience.

0 commit comments

Comments
 (0)