Skip to content

Commit dbbc412

Browse files
authored
Merge pull request #226698 from MicrosoftDocs/main
2/08 AM Publish
2 parents 0b47bd5 + 2a2bdd4 commit dbbc412

File tree

1,006 files changed

+8550
-8141
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,006 files changed

+8550
-8141
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,7 @@
994994
"articles/object-anchors/.openpublishing.redirection.object-anchors.json",
995995
"articles/postgresql/.openpublishing.redirection.postgresql.json",
996996
"articles/purview/.openpublishing.redirection.purview.json",
997+
"articles/sap/.openpublishing.redirection.sap.json",
997998
"articles/service-bus-messaging/.openpublishing.redirection.service-bus-messaging.json",
998999
"articles/spatial-anchors/.openpublishing.redirection.spatial-anchors.json",
9991000
"articles/spring-apps/.openpublishing.redirection.spring-apps.json",

articles/active-directory-b2c/add-identity-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77

88
ms.author: godonnell
9-
ms.date: 01/19/2022
9+
ms.date: 02/08/2023
1010
ms.custom: mvc
1111
ms.topic: how-to
1212
ms.service: active-directory
@@ -19,7 +19,7 @@ You can configure Azure AD B2C to allow users to sign in to your application wit
1919

2020
With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.
2121

22-
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once they select one of the external identity providers, they're taken (redirected) to the selected provider's website to complete the sign-in process. After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.
22+
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once a user selects an external identity provider, they're redirected to the selected provider's website to complete their sign-in. After they successfully sign in, they're returned to Azure AD B2C for authentication with your application.
2323

2424
![Diagram showing mobile sign-in example with a social account (Facebook).](media/add-identity-provider/external-idp.png)
2525

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/11/2022
12+
ms.date: 02/07/2023
1313
ms.author: godonnell
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit, project-no-code
@@ -67,26 +67,6 @@ To enable sign-in for users with an Azure AD account from a specific Azure AD or
6767
1. Select **Certificates & secrets**, and then select **New client secret**.
6868
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
6969
70-
### Configuring optional claims
71-
72-
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
73-
74-
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
75-
1. Select the **Directories + subscriptions** icon in the portal toolbar.
76-
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
77-
1. In the Azure portal, search for and select **Azure Active Directory**.
78-
1. In the left menu, under **Manage**, select **App registrations**.
79-
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
80-
1. From the **Manage** section, select **Token configuration**.
81-
1. Select **Add optional claim**.
82-
1. For the **Token type**, select **ID**.
83-
1. Select the optional claims to add, `family_name` and `given_name`.
84-
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
85-
86-
## [Optional] Verify your app authenticity
87-
88-
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
89-
9070
::: zone pivot="b2c-user-flow"
9171
9272
## Configure Azure AD as an identity provider
@@ -254,6 +234,26 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
254234

255235
::: zone-end
256236

237+
### [Optional] Configuring optional claims
238+
239+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
240+
241+
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
242+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
243+
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
244+
1. In the Azure portal, search for and select **Azure Active Directory**.
245+
1. In the left menu, under **Manage**, select **App registrations**.
246+
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
247+
1. From the **Manage** section, select **Token configuration**.
248+
1. Select **Add optional claim**.
249+
1. For the **Token type**, select **ID**.
250+
1. Select the optional claims to add, `family_name` and `given_name`.
251+
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
252+
253+
## [Optional] Verify your app authenticity
254+
255+
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
256+
257257
## Next steps
258258

259259
Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).

articles/active-directory-b2c/identity-provider-generic-saml.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -139,10 +139,10 @@ The **OutputClaims** element contains a list of claims returned by the SAML iden
139139

140140
In the example above, *Contoso-SAML2* includes the claims returned by a SAML identity provider:
141141

142-
* The **issuerUserId** claim is mapped to the **assertionSubjectName** claim.
142+
* The **assertionSubjectName** claim is mapped to the **issuerUserId** claim.
143143
* The **first_name** claim is mapped to the **givenName** claim.
144144
* The **last_name** claim is mapped to the **surname** claim.
145-
* The **displayName** claim is mapped to the `http://schemas.microsoft.com/identity/claims/displayname` claim.
145+
* The `http://schemas.microsoft.com/identity/claims/displayname` claim is mapped to the **displayName** claim.
146146
* The **email** claim without name mapping.
147147

148148
The technical profile also returns claims that aren't returned by the identity provider:
@@ -237,4 +237,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
237237

238238
- [Configure SAML identity provider options with Azure Active Directory B2C](identity-provider-generic-saml-options.md)
239239

240-
::: zone-end
240+
::: zone-end

articles/active-directory-b2c/sign-in-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 01/18/2022
12+
ms.date: 02/08/2023
1313
ms.author: godonnell
1414
ms.subservice: B2C
1515

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ When Conditional Access policy or group membership changes need to be applied to
179179
Modern networks often optimize connectivity and network paths for applications differently. This optimization frequently causes variations of the routing and source IP addresses of connections, as seen by your identity provider and resource providers. You may observe this split path or IP address variation in multiple network topologies, including, but not limited to:
180180

181181
- On-premises and cloud-based proxies.
182-
- Virtual private network (VPN) implementations, like split tunneling.
182+
- Virtual private network (VPN) implementations, like [split tunneling](/microsoft-365/enterprise/microsoft-365-vpn-implement-split-tunnel).
183183
- Software defined wide area network (SD-WAN) deployments.
184184
- Load balanced or redundant network egress network topologies, like those using [SNAT](https://wikipedia.org/wiki/Network_address_translation#SNAT).
185185
- Branch office deployments that allow direct internet connectivity for specific applications.
@@ -189,9 +189,10 @@ Modern networks often optimize connectivity and network paths for applications d
189189
In addition to IP variations, customers also may employ network solutions and services that:
190190

191191
- Use IP addresses that may be shared with other customers. For example, cloud-based proxy services where egress IP addresses are shared between customers.
192-
- Use easily varied or undefinable IP addresses. For example, topologies where there are large, dynamic sets of egress IP addresses used, like large enterprise scenarios or split VPN and local egress network traffic.
192+
- Use easily varied or undefinable IP addresses. For example, topologies where there are large, dynamic sets of egress IP addresses used, like large enterprise scenarios or [split VPN](/microsoft-365/enterprise/microsoft-365-vpn-implement-split-tunnel) and local egress network traffic.
193+
194+
Networks where egress IP addresses may change frequently or are shared may affect Azure AD Conditional Access and Continues Access Evaluation (CAE). This variability can affect how these features work and their recommended configurations. Split Tunneling may also cause unexpected blocks when an environment is configured using [Split Tunneling VPN Best Practices](/microsoft-365/enterprise/microsoft-365-vpn-implement-split-tunnel). Routing [Optimized IPs](/microsoft-365/enterprise/microsoft-365-vpn-implement-split-tunnel#optimize-ip-address-ranges) through a Trusted IP/VPN may be required to prevent blocks related to "insufficient_claims" or "Instant IP Enforcement check failed".
193195

194-
Networks where egress IP addresses may change frequently or are shared may affect Azure AD Conditional Access and Continues Access Evaluation (CAE). This variability can affect how these features work, and their recommended configurations.
195196

196197
The following table summarizes Conditional Access and CAE feature behaviors and recommendations for different types of network deployments:
197198

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ Within the SAML tokens, these claims will be emitted with the following URI form
234234

235235
## Configuring groups optional claims
236236

237-
This section covers the configuration options under optional claims for changing the group attributes used in group claims from the default group objectID to attributes synced from on-premises Windows Active Directory. You can configure groups optional claims for your application through the UI or application manifest.
237+
This section covers the configuration options under optional claims for changing the group attributes used in group claims from the default group objectID to attributes synced from on-premises Windows Active Directory. You can configure groups optional claims for your application through the UI or application manifest. Group optional claims are only emitted in the JWT for **user principals**. **Service principals** _will not_ have group optional claims emitted in the JWT.
238238

239239
> [!IMPORTANT]
240240
> Azure AD limits the number of groups emitted in a token to 150 for SAML assertions and 200 for JWT, including nested groups. For more information on group limits and important caveats for group claims from on-premises attributes, see [Configure group claims for applications with Azure AD](../hybrid/how-to-connect-fed-group-claims.md).

articles/active-directory/develop/msal-shared-devices.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,15 +9,15 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 02/06/2023
12+
ms.date: 02/08/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: brandwe
1515
ms.custom: aaddev
1616
---
1717

1818
# Overview of shared device mode
1919

20-
Shared device mode is a feature of Azure Active Directory(Azure AD) that allows you to build and deploy applications that support frontline workers and educational scenarios that require shared Android and iOS devices.
20+
Shared device mode is a feature of Azure Active Directory (Azure AD) that allows you to build and deploy applications that support frontline workers and educational scenarios that require shared Android and iOS devices.
2121

2222
> [!IMPORTANT]
2323
> Shared device mode for iOS [!INCLUDE [PREVIEW BOILERPLATE](../../../includes/active-directory-develop-preview.md)]
@@ -36,7 +36,7 @@ Azure AD enables these scenarios with a feature called **shared device mode**.
3636

3737
As mentioned, shared device mode is a feature of Azure AD that enables you to:
3838

39-
- Build applications that support frontline workers
39+
- Build applications that support frontline workers.
4040
- Deploy devices to frontline workers with apps that support shared device mode.
4141

4242
### Build applications that support frontline workers

0 commit comments

Comments
 (0)