Skip to content

Commit dc64392

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vnet-old-review-1
2 parents bff9ffd + 332b45d commit dc64392

30 files changed

+758
-236
lines changed

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0]
2525
- A computer with at least 3 GB of RAM, to host a provisioning agent. The computer should have Windows Server 2016 or a later version of Windows Server, with connectivity to the target application, and with outbound connectivity to login.microsoftonline.com, other Microsoft Online Services and Azure domains. An example is a Windows Server 2016 virtual machine hosted in Azure IaaS or behind a proxy.
2626

2727
## Deploying Azure AD provisioning agent
28-
The Azure AD Provisioning agent can be deployed on the same server hosting a SCIM enabled application, or a seperate server, providing it has line of sight to the application's SCIM endpoint. A single agent also supports provision to multiple applications hosted locally on the same server or seperate hosts, again as long as each SCIM endpoint is reachable by the agent.
28+
The Azure AD Provisioning agent can be deployed on the same server hosting a SCIM enabled application, or a separate server, providing it has line of sight to the application's SCIM endpoint. A single agent also supports provision to multiple applications hosted locally on the same server or separate hosts, again as long as each SCIM endpoint is reachable by the agent.
2929

3030
1. [Download](https://aka.ms/OnPremProvisioningAgent) the provisioning agent and copy it onto the virtual machine or server that your SCIM application endpoint is hosted on.
3131
2. Run the provisioning agent installer, agree to the terms of service, and select **Install**.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 03/23/2023
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: jsimmons
14+
ms.reviewer: mimanans
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -95,6 +95,7 @@ The following core requirements apply:
9595

9696
> [!NOTE]
9797
> Some endpoints, such as the CRL endpoint, are not addressed in this article. For a list of all supported endpoints, see [Microsoft 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online).
98+
>In addition, other endpoints are required for Azure portal authentication. For more information, see [Azure portal URLs for proxy bypass](/azure/azure-portal/azure-portal-safelist-urls?tabs=public-cloud#azure-portal-urls-for-proxy-bypass).
9899
99100
### Azure AD Password Protection DC agent
100101

@@ -248,6 +249,8 @@ To install the Azure AD Password Protection proxy service, complete the followin
248249

249250
Registration of the Azure AD Password Protection proxy service is necessary only once in the lifetime of the service. After that, the Azure AD Password Protection proxy service will automatically perform any other necessary maintenance.
250251

252+
1. To make sure that the changes have taken effect, run `Test-AzureADPasswordProtectionDCAgentHealth -TestAll`. For help resolving errors, see [Troubleshoot: On-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-troubleshoot.md).
253+
251254
1. Now register the on-premises Active Directory forest with the necessary credentials to communicate with Azure by using the `Register-AzureADPasswordProtectionForest` PowerShell cmdlet.
252255

253256
> [!NOTE]
@@ -301,6 +304,8 @@ To install the Azure AD Password Protection proxy service, complete the followin
301304
302305
For `Register-AzureADPasswordProtectionForest` to succeed, at least one DC running Windows Server 2012 or later must be available in the Azure AD Password Protection proxy server's domain. The Azure AD Password Protection DC agent software doesn't have to be installed on any domain controllers prior to this step.
303306

307+
1. To make sure that the changes have taken effect, run `Test-AzureADPasswordProtectionDCAgentHealth -TestAll`. For help resolving errors, see [Troubleshoot: On-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-troubleshoot.md).
308+
304309
### Configure the proxy service to communicate through an HTTP proxy
305310

306311
If your environment requires the use of a specific HTTP proxy to communicate with Azure, use the following steps to configure the Azure AD Password Protection service.

articles/active-directory/manage-apps/add-application-portal-assign-users.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,50 +8,51 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: quickstart
1010
ms.workload: identity
11-
ms.date: 03/24/2022
11+
ms.date: 03/23/2023
1212
ms.author: jomondi
1313
ms.reviewer: alamaral
14-
ms.custom: mode-other
14+
ms.custom: mode-other, enterprise-apps
1515
#Customer intent: As an administrator of an Azure AD tenant, I want to assign a user to an enterprise application.
1616
---
1717

1818
# Quickstart: Create and assign a user account
1919

2020
In this quickstart, you use the Azure portal to create a user account in your Azure Active Directory (Azure AD) tenant. After you create the account, you can assign it to the enterprise application that you added to your tenant.
2121

22-
It is recommended that you use a non-production environment to test the steps in this quickstart.
22+
It's recommended that you use a nonproduction environment to test the steps in this quickstart.
2323

2424
## Prerequisites
2525

2626
To create a user account and assign it to an enterprise application, you need:
2727

2828
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29-
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
29+
- One of the following roles: Global Administrator, or owner of the service principal.
3030
- Completion of the steps in [Quickstart: Add an enterprise application](add-application-portal.md).
3131

3232
## Create a user account
3333

3434
To create a user account in your Azure AD tenant:
3535

3636
1. Go to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
37-
1. Browse to **Azure Active Directory** > **Users**.
37+
1. Browse to **Azure Active Directory** and select **Users**.
3838
1. Select **New user** at the top of the pane.
3939

4040
:::image type="content" source="media/add-application-portal-assign-users/new-user.png" alt-text="Add a new user account to your Azure AD tenant.":::
4141

4242
1. In the **User name** field, enter the username of the user account. For example, `[email protected]`. Be sure to change `contoso.com` to the name of your tenant domain.
4343
1. In the **Name** field, enter the name of the user of the account. For example, `contosouser1`.
44-
1. Leave **Auto-generate password** selected, and then select **Show password**. Write down the value that's displayed in the Password box.
44+
1. Enter the details required for the user under the **Groups and roles**, **Settings**, and **Job info** sections.
4545
1. Select **Create**.
4646

4747
## Assign a user account to an enterprise application
4848

4949
To assign a user account to an enterprise application:
5050

51-
1. In the [Azure portal](https://portal.azure.com), browse to **Azure Active Directory** > **Enterprise applications**, and then search for and select the application to which you want to assign the user account. For example, the application that you created in the previous quickstart named **Azure AD SAML Toolkit 1**.
51+
1. In the [Azure portal](https://portal.azure.com), browse to **Azure Active Directory** and select **Enterprise applications**.
52+
1. Search for and select the application to which you want to assign the user account. For example, the application that you created in the previous quickstart named **Azure AD SAML Toolkit 1**.
5253
1. In the left pane, select **Users and groups**, and then select **Add user/group**.
5354

54-
:::image type="content" source="media/add-application-portal-assign-users/assign-user.png" alt-text="Assign user account to zn application in your Azure AD tenant.":::
55+
:::image type="content" source="media/add-application-portal-assign-users/assign-user.png" alt-text="Assign user account to an application in your Azure AD tenant.":::
5556

5657
1. On the **Add Assignment** pane, select **None Selected** under **Users and groups**.
5758
1. Search for and select the user that you want to assign to the application. For example, `[email protected]`.
@@ -60,7 +61,7 @@ To assign a user account to an enterprise application:
6061

6162
## Clean up resources
6263

63-
If you are planning to complete the next quickstart, keep the application that you created. Otherwise, you can consider deleting it to clean up your tenant.
64+
If you're planning to complete the next quickstart, keep the application that you created. Otherwise, you can consider deleting it to clean up your tenant.
6465

6566
## Next steps
6667

articles/active-directory/manage-apps/add-application-portal.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,32 +8,32 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: quickstart
1010
ms.workload: identity
11-
ms.date: 03/24/2022
11+
ms.date: 03/22/2023
1212
ms.author: jomondi
1313
ms.reviewer: ergreenl
14-
ms.custom: mode-other
14+
ms.custom: mode-other, enterprise-apps
1515
#Customer intent: As an administrator of an Azure AD tenant, I want to add an enterprise application.
1616
---
1717

1818
# Quickstart: Add an enterprise application
1919

20-
In this quickstart, you use the Azure portal to add an enterprise application to your Azure Active Directory (Azure AD) tenant. Azure AD has a gallery that contains thousands of enterprise applications that have been pre-integrated. Many of the applications your organization uses are probably already in the gallery. This quickstart uses the application named **Azure AD SAML Toolkit** as an example, but the concepts apply for most [enterprise applications in the gallery](../saas-apps/tutorial-list.md).
20+
In this quickstart, you use the Azure portal to add an enterprise application to your Azure Active Directory (Azure AD) tenant. Azure AD has a gallery that contains thousands of enterprise applications that have been preintegrated. Many of the applications your organization uses are probably already in the gallery. This quickstart uses the application named **Azure AD SAML Toolkit** as an example, but the concepts apply for most [enterprise applications in the gallery](../saas-apps/tutorial-list.md).
2121

22-
It is recommended that you use a non-production environment to test the steps in this quickstart.
22+
It's recommended that you use a nonproduction environment to test the steps in this quickstart.
2323

2424
## Prerequisites
2525

2626
To add an enterprise application to your Azure AD tenant, you need:
2727

2828
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29-
- One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
29+
- One of the following roles: Global Administrator, or Application Administrator.
3030

3131
## Add an enterprise application
3232

3333
To add an enterprise application to your tenant:
3434

3535
1. Go to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
36-
1. Browse to **Azure Active Directory** > **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant.
36+
1. Browse to **Azure Active Directory** and select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant.
3737
1. In the **Enterprise applications** pane, select **New application**.
3838
1. The **Browse Azure AD Gallery** pane opens and displays tiles for cloud platforms, on-premises applications, and featured applications. Applications listed in the **Featured applications** section have icons indicating whether they support federated single sign-on (SSO) and provisioning. Search for and select the application. In this quickstart, **Azure AD SAML Toolkit** is being used.
3939

@@ -46,7 +46,7 @@ If you choose to install an application that uses OpenID Connect based SSO, inst
4646

4747
## Clean up resources
4848

49-
If you are planning to complete the next quickstart, keep the enterprise application that you created. Otherwise, you can consider deleting it to clean up your tenant. For more information, see [Delete an application](delete-application-portal.md).
49+
If you're planning to complete the next quickstart, keep the enterprise application that you created. Otherwise, you can consider deleting it to clean up your tenant. For more information, see [Delete an application](delete-application-portal.md).
5050

5151
## Next steps
5252

-14.2 KB
Loading
75.9 KB
Loading
27.5 KB
Loading
0 Bytes
Loading

articles/active-directory/manage-apps/view-applications-portal.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,33 +8,33 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: quickstart
11-
ms.date: 03/24/2022
11+
ms.date: 03/23/2023
1212
ms.author: jomondi
1313
ms.reviewer: alamaral
14-
ms.custom: mode-other
14+
ms.custom: mode-other, enterprise-apps
1515
#Customer intent: As an administrator of an Azure AD tenant, I want to search for and view the enterprise applications in the tenant.
1616
---
1717

1818
# Quickstart: View enterprise applications
1919

2020
In this quickstart, you learn how to use the Azure portal to search for and view the enterprise applications that are already configured in your Azure Active Directory (Azure AD) tenant.
2121

22-
It is recommended that you use a non-production environment to test the steps in this quickstart.
22+
It's recommended that you use a nonproduction environment to test the steps in this quickstart.
2323

2424
## Prerequisites
2525

2626
To view applications that have been registered in your Azure AD tenant, you need:
2727

2828
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29-
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
29+
- One of the following roles: Global Administrator, or owner of the service principal.
3030
- Completion of the steps in [Quickstart: Add an enterprise application](add-application-portal.md).
3131

3232
## View a list of applications
3333

3434
To view the enterprise applications registered in your tenant:
3535

3636
1. Go to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
37-
1. Browse to **Azure Active Directory** > **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant.
37+
1. Browse to **Azure Active Directory** and select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant.
3838

3939
:::image type="content" source="media/view-applications-portal/view-enterprise-applications.png" alt-text="View the registered applications in your Azure AD tenant.":::
4040

@@ -52,17 +52,17 @@ To search for a particular application:
5252

5353
Select options according to what you're looking for:
5454

55-
1. You can view the applications by **Application Type**, **Application Status**, and **Application visibility**. These three options are the default filters.
55+
1. The default filters are **Application Type** and **Application ID starts with**, and **Application visibility**.
5656
1. Under **Application Type**, choose one of these options:
5757
- **Enterprise Applications** shows non-Microsoft applications.
5858
- **Microsoft Applications** shows Microsoft applications.
5959
- **Managed Identities** shows applications that are used to authenticate to services that support Azure AD authentication.
6060
- **All Applications** shows both non-Microsoft and Microsoft applications.
61-
1. Under **Application Status**, choose **Any**, **Disabled**, or **Enabled**. The **Any** option includes both disabled and enabled applications.
61+
1. Under **Application ID starts with**, enter the first few digits of the application ID if you know the application ID.
6262
1. Under **Application Visibility**, choose **Any**, or **Hidden**. The **Hidden** option shows applications that are in the tenant, but aren't visible to users.
6363
1. After choosing the options you want, select **Apply**.
64-
1. Select **Add filters** to add more options for filtering the search results. The other options are:
65-
- **Application ID**
64+
1. Select **Add filters** to add more options for filtering the search results. The other options include:
65+
- **Application Visibility**
6666
- **Created on**
6767
- **Assignment required**
6868
- **Is App Proxy**

articles/active-directory/workload-identities/TOC.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,12 @@
4747
href: ../reports-monitoring/recommendation-remove-unused-credential-from-apps.md?toc=/azure/active-directory/workload-identities/toc.json&bc=/azure/active-directory/workload-identities/breadcrumb/toc.json
4848
- name: Renew expiring application credentials
4949
href: ../reports-monitoring/recommendation-renew-expiring-application-credential.md?toc=/azure/active-directory/workload-identities/toc.json&bc=/azure/active-directory/workload-identities/breadcrumb/toc.json
50+
- name: Enforce app management restrictions
51+
items:
52+
- name: All apps and service principals in a tenant
53+
href: /graph/api/resources/tenantappmanagementpolicy?toc=/azure/active-directory/workload-identities/toc.json&bc=/azure/active-directory/workload-identities/breadcrumb/toc.json
54+
- name: Specific apps and service principals
55+
href: /graph/api/resources/appmanagementpolicy?toc=/azure/active-directory/workload-identities/toc.json&bc=/azure/active-directory/workload-identities/breadcrumb/toc.json
5056
- name: Reference
5157
items:
5258
- name: Federated identity credentials considerations and limitations

0 commit comments

Comments
 (0)