Skip to content

Commit db76315

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-refresh
2 parents d05c23f + cc96fec commit db76315

File tree

35 files changed

+732
-628
lines changed

35 files changed

+732
-628
lines changed
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
title: "Quickstart: Add sign in to a React SPA"
3+
description: Learn how to run a sample React SPA to sign in users
4+
services: active-directory
5+
author: kengaderdus
6+
manager: mwongerapk
7+
ms.author: kengaderdus
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ROBOTS: NOINDEX
11+
ms.subservice: ciam
12+
ms.topic: portal
13+
ms.date: 04/12/2023
14+
---
15+
16+
# Portal quickstart for React SPA
17+
18+
> [!div renderon="portal" class="sxs-lookup"]
19+
> In this quickstart, you download and run a code sample that demonstrates how a React single-page application (SPA) can sign in users with Azure AD CIAM.
20+
>
21+
> ## Prerequisites
22+
>
23+
> * Azure subscription - [Create an Azure subscription for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
24+
> * [Node.js](https://nodejs.org/en/download/)
25+
> * [Visual Studio Code](https://code.visualstudio.com/download) or another code editor
26+
>
27+
> ## Download the code
28+
>
29+
> > [!div class="nextstepaction"]
30+
> > [Download the code sample](https://github.com/Azure-Samples/ms-identity-ciam-javascript-tutorial/archive/react-quickstart.zip)
31+
>
32+
> ## Run the sample
33+
>
34+
> 1. Unzip the downloaded file.
35+
>
36+
> 1. Locate the folder that contains the `package.json` file in your terminal, then run the following command:
37+
>
38+
> ```console
39+
> npm install && npm start
40+
> ```
41+
>
42+
> 1. Open your browser and visit `http://locahost:3000`.
43+
>
44+
> 1. Select the **Sign-in** link on the navigation bar.
45+
>

articles/active-directory/reports-monitoring/howto-manage-inactive-user-accounts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,6 @@ The following details relate to the `lastSignInDateTime` property.
5757

5858
- To read the property, you need to grant the app the following Microsoft Graph permissions:
5959
- AuditLog.Read.All
60-
- Directory.Read.All
6160
- User.Read.All
6261

6362
- Each interactive sign-in that was successful results in an update of the underlying data store. Typically, successful sign-ins show up in the related sign-in report within 10 minutes.

articles/active-directory/roles/delegate-by-task.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -387,7 +387,7 @@ You can further restrict permissions by assigning roles at smaller scopes or by
387387
> | Create user | [User Administrator](permissions-reference.md#user-administrator) | |
388388
> | Delete users | [User Administrator](permissions-reference.md#user-administrator) | |
389389
> | Invalidate refresh tokens of limited admins | [User Administrator](permissions-reference.md#user-administrator) | |
390-
> | Invalidate refresh tokens of non-admins | [Password Administrator](permissions-reference.md#password-administrator) | [User Administrator](permissions-reference.md#user-administrator) |
390+
> | Invalidate refresh tokens of non-admins | [Helpdesk Administrator](permissions-reference.md#helpdesk-administrator) | [User Administrator](permissions-reference.md#user-administrator) |
391391
> | Invalidate refresh tokens of privileged admins | [Privileged Authentication Administrator](permissions-reference.md#privileged-authentication-administrator) | |
392392
> | Read basic configuration | [Default user role](../fundamentals/users-default-permissions.md) | |
393393
> | Reset password for limited admins | [User Administrator](permissions-reference.md#user-administrator) | |

articles/active-directory/saas-apps/cisco-anyconnect.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/12/2023
1313
ms.author: jeedes
1414
---
1515

@@ -72,14 +72,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7272

7373
![Edit Basic SAML Configuration](common/edit-urls.png)
7474

75-
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields (note that the values are case-sensitive):
75+
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields:
7676

7777
1. In the **Identifier** text box, type a URL using the following pattern:
7878
`https://<SUBDOMAIN>.YourCiscoServer.com/saml/sp/metadata/<Tunnel_Group_Name>`
7979

8080
1. In the **Reply URL** text box, type a URL using the following pattern:
8181
`https://<YOUR_CISCO_ANYCONNECT_FQDN>/+CSCOE+/saml/sp/acs?tgname=<Tunnel_Group_Name>`
8282

83+
> [!NOTE]
84+
> `<Tunnel_Group_Name>` is a case-sensitive and the value must not contain dots "." and slashes "/".
85+
8386
> [!NOTE]
8487
> For clarification about these values, contact Cisco TAC support. Update these values with the actual Identifier and Reply URL provided by Cisco TAC. Contact the [Cisco AnyConnect Client support team](https://www.cisco.com/c/en/us/support/index.html) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8588

articles/active-directory/saas-apps/citi-program-tutorial.md

Lines changed: 23 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/26/2023
12+
ms.date: 04/12/2023
1313
ms.author: jeedes
1414

1515
---
@@ -46,7 +46,7 @@ Add CITI Program from the Azure AD application gallery to configure single sign-
4646

4747
### Create and assign Azure AD test user
4848

49-
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
49+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal.
5050

5151
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
5252

@@ -76,17 +76,24 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
7676

7777
1. CITI Program application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
7878

79-
![Screenshot shows the image of attributes configuration.](common/default-attributes.png "Image")
79+
![Screenshot shows the image of attributes configuration.](common/default-attributes.png "Default Attributes")
8080

81-
1. In addition to above, CITI Program application expects few more attributes to be passed back in SAML response, which are shown below. These attributes are also pre populated but you can review them as per your requirements.
81+
1. CITI Program application expects urn:oid named attributes to be passed back in the SAML response, which are shown below. These attributes are also pre-populated but you can review them as per your requirements. These are all required.
8282

8383
| Name | Source Attribute|
8484
| ---------------| --------- |
8585
| urn:oid:1.3.6.1.4.1.5923.1.1.1.6 | user.userprincipalname |
86-
| urn:oid:0.9.2342.19200300.100.1.3 | user.userprincipalname |
86+
| urn:oid:0.9.2342.19200300.100.1.3 | user.mail |
8787
| urn:oid:2.5.4.42 | user.givenname |
8888
| urn:oid:2.5.4.4 | user.surname |
8989

90+
1. If you wish to pass additional information in the SAML response, CITI Program can also accept the following optional attributes.
91+
92+
| Name | Source Attribute|
93+
| ---------------| --------- |
94+
| urn:oid:2.16.840.1.113730.3.1.241 | user.displayname |
95+
| urn:oid:2.16.840.1.113730.3.1.3 | user.employeeid |
96+
9097
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
9198

9299
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
@@ -97,11 +104,7 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
97104

98105
## Configure CITI Program SSO
99106

100-
To configure single sign-on on **CITI Program** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [CITI Program support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
101-
102-
### Create CITI Program test user
103-
104-
In this section, a user called B.Simon is created in CITI Program. CITI Program supports just-in-time user provisioning, which is enabled by default. There's no action item for you in this section. If a user doesn't already exist in CITI Program, a new one is commonly created after authentication.
107+
To configure single sign-on on **CITI Program** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [CITI Program support team](mailto:[email protected]). This is required to have the SAML SSO connection set properly on both sides.
105108

106109
## Test SSO
107110

@@ -113,10 +116,19 @@ In this section, you test your Azure AD single sign-on configuration with follow
113116

114117
* You can use Microsoft My Apps. When you click the CITI Program tile in the My Apps, this will redirect to CITI Program Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
115118

119+
CITI Program supports just-in-time user provisioning. First time SSO users will be prompted to either:
120+
121+
* Link their existing CITI Program account, in the case that they already have one
122+
![SSOHaveAccount](https://user-images.githubusercontent.com/46728557/228357500-a74489c7-8c5f-4cbe-ad47-9757d3d9fbe6.PNG "Link existing CITI Program account")
123+
124+
* Or Create a new CITI Program account, which is automatically provisioned
125+
![SSONotHaveAccount](https://user-images.githubusercontent.com/46728557/228357503-f4eba4bb-f3fa-43e9-a98a-f0da87074eeb.PNG "Provision new CITI Program account")
126+
116127
## Additional resources
117128

129+
* [CITI Program SSO Technical Information](https://support.citiprogram.org/s/article/single-sign-on-sso-and-shibboleth-technical-specs#EntityInformation)
118130
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
119-
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
131+
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md)
120132

121133
## Next steps
122134

articles/active-directory/saas-apps/cobalt-tutorial.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/12/2023
1313
ms.author: jeedes
1414
---
1515

@@ -79,7 +79,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7979
`https://brightside-prod-<INSTANCENAME>.cobaltdl.com`
8080

8181
> [!NOTE]
82-
> The value is not real. Update the value with the actual Sign-On URL. Contact [Cobalt Client support team](https://www.cobalt.net/support/) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
82+
> The value is not real. Update the value with the actual Sign-On URL. Contact [Cobalt Client support team](https://cobaltio.zendesk.com/hc/requests/new) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8383

8484
5. Cobalt application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
8585

@@ -149,7 +149,13 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
149149
150150
### Create Cobalt test user
151151

152-
In this section, you create a user called B.Simon in Cobalt. Work with [Cobalt support team](https://www.cobalt.net/support/) to add the users in the Cobalt platform. Users must be created and activated before you use single sign-on.
152+
1. Login to the Cobalt website as an administrator.
153+
1. Navigate to the **People -> Organization** and select Invite Users.
154+
1. In the overlay that appears, specify the email addresses of users that you want to invite. Enter the email, and then select **Add** or press **Enter**.
155+
1. Use commas to separate multiple email addresses.
156+
1. For each user, select a role: **Member** or **Owner**.
157+
1. Both members and owners have access to all assets and pentests of an organization.
158+
1. Select **Invite** to confirm.
153159

154160
## Test SSO
155161

articles/aks/workload-identity-deploy-cluster.md

Lines changed: 32 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Deploy and configure an Azure Kubernetes Service (AKS) cluster with workl
33
description: In this Azure Kubernetes Service (AKS) article, you deploy an Azure Kubernetes Service cluster and configure it with an Azure AD workload identity (preview).
44
ms.topic: article
55
ms.custom: devx-track-azurecli
6-
ms.date: 03/14/2023
6+
ms.date: 04/12/2023
77
---
88

99
# Deploy and configure workload identity (preview) on an Azure Kubernetes Service (AKS) cluster
@@ -19,7 +19,7 @@ This article assumes you have a basic understanding of Kubernetes concepts. For
1919

2020
- This article requires version 2.40.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.
2121

22-
- The identity you're using to create your cluster has the appropriate minimum permissions. For more details on access and identity for AKS, see [Access and identity options for Azure Kubernetes Service (AKS)][aks-identity-concepts].
22+
- The identity you're using to create your cluster has the appropriate minimum permissions. For more information about access and identity for AKS, see [Access and identity options for Azure Kubernetes Service (AKS)][aks-identity-concepts].
2323

2424
- If you have multiple Azure subscriptions, select the appropriate subscription ID in which the resources should be billed using the [az account][az-account] command.
2525

@@ -106,15 +106,14 @@ Copy and paste the following multi-line input in the Azure CLI, and update the v
106106
```bash
107107
export SERVICE_ACCOUNT_NAME="workload-identity-sa"
108108
export SERVICE_ACCOUNT_NAMESPACE="my-namespace"
109+
export USER_ASSIGNED_CLIENT_ID="$(az identity show --resource-group "${RESOURCE_GROUP}" --name "${UAID}" --query 'clientId' -otsv)"
109110

110111
cat <<EOF | kubectl apply -f -
111112
apiVersion: v1
112113
kind: ServiceAccount
113114
metadata:
114115
annotations:
115116
azure.workload.identity/client-id: "${USER_ASSIGNED_CLIENT_ID}"
116-
labels:
117-
azure.workload.identity/use: "true"
118117
name: "${SERVICE_ACCOUNT_NAME}"
119118
namespace: "${SERVICE_ACCOUNT_NAMESPACE}"
120119
EOF
@@ -139,13 +138,41 @@ az identity federated-credential create --name myfederatedIdentity --identity-na
139138
140139
## Deploy your application
141140

141+
When you deploy your application pods, the manifest should reference the service account created in the **Create Kubernetes service account** step. The following manifest shows how to reference the account, specifically *metadata\namespace* and *spec\serviceAccountName* properties:
142+
143+
```yml
144+
cat <<EOF | kubectl apply -f -
145+
apiVersion: v1
146+
kind: Pod
147+
metadata:
148+
name: quick-start
149+
namespace: SERVICE_ACCOUNT_NAMESPACE
150+
labels:
151+
azure.workload.identity/use: "true"
152+
spec:
153+
serviceAccountName: workload-identity-sa
154+
EOF
155+
```
156+
142157
> [!IMPORTANT]
143158
> Ensure your application pods using workload identity have added the following label [azure.workload.identity/use: "true"] to your running pods/deployments, otherwise the pods will fail once restarted.
144159
145160
```azurecli-interactive
146161
kubectl apply -f <your application>
147162
```
148163

164+
To check whether all properties are injected properly by the webhook, use the [kubectl describe][kubectl-describe] command:
165+
166+
```bash
167+
kubectl describe pod containerName
168+
```
169+
170+
To verify that pod is able to get a token and access the resource, use the kubectl logs command:
171+
172+
```bash
173+
kubectl logs containerName
174+
```
175+
149176
## Optional - Grant permissions to access Azure Key Vault
150177

151178
This step is necessary if you need to access secrets, keys, and certificates that are mounted in Azure Key Vault from a pod. Perform the following steps to configure access with a managed identity. These steps assume you have an Azure Key Vault already created and configured in your subscription. If you don't have one, see [Create an Azure Key Vault using the Azure CLI][create-key-vault-azure-cli].
@@ -181,6 +208,7 @@ az aks update --resource-group myResourceGroup --name myAKSCluster --enable-work
181208
In this article, you deployed a Kubernetes cluster and configured it to use a workload identity in preparation for application workloads to authenticate with that credential. Now you're ready to deploy your application and configure it to use the workload identity with the latest version of the [Azure Identity][azure-identity-libraries] client library. If you can't rewrite your application to use the latest client library version, you can [set up your application pod][workload-identity-migration] to authenticate using managed identity with workload identity as a short-term migration solution.
182209

183210
<!-- EXTERNAL LINKS -->
211+
[kubectl-describe]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#describe
184212

185213
<!-- INTERNAL LINKS -->
186214
[kubernetes-concepts]: concepts-clusters-workloads.md

articles/azure-arc/data/release-notes.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,15 @@ New for this release:
2929

3030
- Azure Arc-enabled SQL Managed Instance
3131
- Direct mode for failover groups is generally available az CLI
32+
- Schedule the HA orchestrator replicas on different nodes when available
3233

3334
- Arc PostgreSQL
3435
- Ensure postgres extensions work per database/role
3536
- Arc PostgreSQL | Upload metrics/logs to Azure Monitor
3637

38+
- Bug fixes and optimizations in the following areas:
39+
- Deploying Arc data controller using the individual create experience has been removed as it sets the auto upgrade parameter incorrectly. Use the all-in-one create experience. This experience creates the extension, custom location, and data controller. It also sets all the parameters correctly. For specific information, see [Create Azure Arc data controller in direct connectivity mode using CLI](create-data-controller-direct-cli.md).
40+
3741
## March 14, 2023
3842

3943
### Image tag

articles/azure-arc/servers/ssh-arc-overview.md

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: (Preview) SSH access to Azure Arc-enabled servers
33
description: Leverage SSH remoting to access and manage Azure Arc-enabled servers.
4-
ms.date: 03/25/2022
4+
ms.date: 04/12/2023
55
ms.topic: conceptual
66
ms.custom: references_regions
77
---
@@ -41,16 +41,8 @@ Authenticating with Azure AD credentials has additional requirements:
4141
> The Virtual Machine Administrator Login and Virtual Machine User Login roles use `dataActions` and can be assigned at the management group, subscription, resource group, or resource scope. We recommend that you assign the roles at the management group, subscription, or resource level and not at the individual VM level. This practice avoids the risk of reaching the [Azure role assignments limit](../../role-based-access-control/troubleshooting.md#limits) per subscription.
4242
4343
### Availability
44-
SSH access to Arc-enabled servers is currently supported in the following regions:
45-
- eastus2euap, eastus, eastus2, westus2, southeastasia, westeurope, northeurope, westcentralus, southcentralus, uksouth, australiaeast, francecentral, japaneast, eastasia, koreacentral, westus3, westus, centralus, northcentralus.
46-
47-
### Supported operating systems
48-
- Windows: Windows 7+ and Windows Server 2012+
49-
- Linux:
50-
- CentOS: CentOS 7, CentOS 8
51-
- RedHat Enterprise Linux (RHEL): RHEL 7.4 to RHEL 7.10, RHEL 8.3+
52-
- SUSE Linux Enterprise Server (SLES): SLES 12, SLES 15.1+
53-
- Ubuntu Server: Ubuntu Server 16.04 to Ubuntu Server 20.04
44+
SSH access to Arc-enabled servers is currently supported in all regions supported by Arc-Enabled Servers with the following exceptions:
45+
- Germany West Central
5446

5547
## Getting started
5648

0 commit comments

Comments
 (0)