Skip to content

Commit e217791

Browse files
authored
Merge pull request #196583 from MicrosoftDocs/main
Merge Main to Live, 4 AM
2 parents 0c3fe85 + 419c7a9 commit e217791

File tree

112 files changed

+1043
-708
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

112 files changed

+1043
-708
lines changed

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Use filter for devices in Conditional Access to enhance security po
44
ms.service: active-directory
55
ms.subservice: conditional-access
66
ms.topic: conceptual
7-
ms.date: 04/05/2022
7+
ms.date: 04/28/2022
88
ms.author: joflore
99
author: MicrosoftGuyJFlo
1010
manager: karenhoran
@@ -21,16 +21,18 @@ When creating Conditional Access policies, administrators have asked for the abi
2121

2222
There are multiple scenarios that organizations can now enable using filter for devices condition. Below are some core scenarios with examples of how to use this new condition.
2323

24-
- Restrict access to privileged resources like Microsoft Azure Management, to privileged users, accessing from [privileged or secure admin workstations](/security/compass/privileged-access-devices). For this scenario, organizations would create two Conditional Access policies:
24+
- **Restrict access to privileged resources**. For this example, lets say you want to allow access to Microsoft Azure Management from a user who is assigned a privilged role Global Admin, has satisfied multifactor authentication and accessing from a device that is [privileged or secure admin workstations](/security/compass/privileged-access-devices) and attested as compliant. For this scenario, organizations would create two Conditional Access policies:
2525
- Policy 1: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.
26-
- Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
27-
- Block access to organization resources from devices running an unsupported Operating System version like Windows 7. For this scenario, organizations would create the following two Conditional Access policies:
28-
- Policy 1: All users, accessing all cloud apps and for Access controls, Grant access, but require device to be marked as compliant or require device to be hybrid Azure AD joined.
29-
- Policy 2: All users, accessing all cloud apps, including a filter for devices using rule expression device.operatingSystem equals Windows and device.operatingSystemVersion startsWith "6.1" and for Access controls, Block.
30-
- Do not require multifactor authentication for specific accounts like service accounts when used on specific devices like Teams phones or Surface Hub devices. For this scenario, organizations would create the following two Conditional Access policies:
26+
- Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block. Learn how to [update extensionAttributes on an Azure AD device object](https://docs.microsoft.com/graph/api/device-update?view=graph-rest-1.0&tabs=http).
27+
- **Block access to organization resources from devices running an unsupported Operating System**. For this example, lets say you want to block access to resources from Windows OS version older than Windows 10. For this scenario, organizations would create the following Conditional Access policy:
28+
- All users, accessing all cloud apps, excluding a filter for devices using rule expression device.operatingSystem equals Windows and device.operatingSystemVersion startsWith "10.0" and for Access controls, Block.
29+
- **Do not require multifactor authentication for specific accounts on specific devices**. For this example, lets say you want to not require multifactor authentication when using service accounts on specific devices like Teams phones or Surface Hub devices. For this scenario, organizations would create the following two Conditional Access policies:
3130
- Policy 1: All users excluding service accounts, accessing all cloud apps, and for Access controls, Grant access, but require multifactor authentication.
3231
- Policy 2: Select users and groups and include group that contains service accounts only, accessing all cloud apps, excluding a filter for devices using rule expression device.extensionAttribute2 not equals TeamsPhoneDevice and for Access controls, Block.
3332

33+
> [!NOTE]
34+
> Azure AD uses device authentication to evaluate device filter rules. For devices that are unregistered with Azure AD, all device properties are considered as null values.
35+
3436
## Create a Conditional Access policy
3537

3638
Filter for devices is an option when creating a Conditional Access policy in the Azure portal or using the Microsoft Graph API.

articles/active-directory/develop/v2-protocols-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -284,7 +284,7 @@ Review the [UserInfo documentation](userinfo.md#calling-the-api) to look over ho
284284

285285
When you want to sign out the user from your app, it isn't sufficient to clear your app's cookies or otherwise end the user's session. You must also redirect the user to the Microsoft identity platform to sign out. If you don't do this, the user reauthenticates to your app without entering their credentials again, because they will have a valid single sign-in session with the Microsoft identity platform.
286286

287-
You can redirect the user to the `end_session_endpoint` listed in the OpenID Connect metadata document:
287+
You can redirect the user to the `end_session_endpoint` (which supports both HTTP GET and POST requests) listed in the OpenID Connect metadata document:
288288

289289
```HTTP
290290
GET https://login.microsoftonline.com/common/oauth2/v2.0/logout?

articles/active-directory/fundamentals/recoverability-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ There are several Azure Monitor workbooks that can help you to monitor configura
203203
- Directory role and group membership updates for service principals
204204
- Modified federation settings
205205

206-
The [Cross-tenant access activity workbook ](../reports-monitoring/workbook-cross-tenant-access-activity.md)can help you monitor which applications in external tenants your users are accessing, and which applications I your tenant external users are accessing. Use this workbook to look for anomalous changes in either inbound or outbound application access across tenants.
206+
The [Cross-tenant access activity workbook ](../reports-monitoring/workbook-cross-tenant-access-activity.md)can help you monitor which applications in external tenants your users are accessing, and which applications in your tenant external users are accessing. Use this workbook to look for anomalous changes in either inbound or outbound application access across tenants.
207207

208208
## Operational security
209209

articles/active-directory/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ metadata:
1212
ms.collection: M365-identity-device-management
1313
author: rolyon
1414
ms.author: rolyon
15-
manager: karenhoran
15+
manager: CelesteDG
1616
ms.date: 01/25/2022
1717

1818
highlightedContent:
@@ -322,4 +322,4 @@ additionalContent:
322322
url: /powershell/module/azuread/
323323
- title: Azure CLI commands for Azure AD
324324
summary: Find the Azure AD commands in the CLI reference.
325-
url: /cli/azure/ad
325+
url: /cli/azure/ad
Lines changed: 144 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,144 @@
1+
---
2+
title: 'Tutorial: Azure AD SSO integration with Datto File Protection Single Sign On'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Datto File Protection Single Sign On.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: tutorial
12+
ms.date: 04/13/2022
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Tutorial: Azure AD SSO integration with Datto File Protection Single Sign On
18+
19+
In this tutorial, you'll learn how to integrate Datto File Protection Single Sign On with Azure Active Directory (Azure AD). When you integrate Datto File Protection Single Sign On with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to Datto File Protection Single Sign On.
22+
* Enable your users to be automatically signed-in to Datto File Protection Single Sign On with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
## Prerequisites
26+
27+
To get started, you need the following items:
28+
29+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
* Datto File Protection Single Sign On enabled subscription.
31+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
32+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
33+
34+
## Scenario description
35+
36+
In this tutorial, you configure and test Azure AD SSO in a test environment.
37+
38+
* Datto File Protection Single Sign On supports **SP** and **IDP** initiated SSO.
39+
40+
## Add Datto File Protection Single Sign On from the gallery
41+
42+
To configure the integration of Datto File Protection Single Sign On into Azure AD, you need to add Datto File Protection Single Sign On from the gallery to your list of managed SaaS apps.
43+
44+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
45+
1. On the left navigation pane, select the **Azure Active Directory** service.
46+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
47+
1. To add new application, select **New application**.
48+
1. In the **Add from the gallery** section, type **Datto File Protection Single Sign On** in the search box.
49+
1. Select **Datto File Protection Single Sign On** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
50+
51+
## Configure and test Azure AD SSO for Datto File Protection Single Sign On
52+
53+
Configure and test Azure AD SSO with Datto File Protection Single Sign On using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Datto File Protection Single Sign On.
54+
55+
To configure and test Azure AD SSO with Datto File Protection Single Sign On, perform the following steps:
56+
57+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
58+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
59+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
60+
1. **[Configure Datto File Protection Single Sign On SSO](#configure-datto-file-protection-single-sign-on-sso)** - to configure the single sign-on settings on application side.
61+
1. **[Create Datto File Protection Single Sign On test user](#create-datto-file-protection-single-sign-on-test-user)** - to have a counterpart of B.Simon in Datto File Protection Single Sign On that is linked to the Azure AD representation of user.
62+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
63+
64+
## Configure Azure AD SSO
65+
66+
Follow these steps to enable Azure AD SSO in the Azure portal.
67+
68+
1. In the Azure portal, on the **Datto File Protection Single Sign On** application integration page, find the **Manage** section and select **single sign-on**.
69+
1. On the **Select a single sign-on method** page, select **SAML**.
70+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
71+
72+
![Screenshot shows to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
73+
74+
1. On the **Basic SAML Configuration** section, the user does not have to perform any step as the app is already pre-integrated with Azure.
75+
76+
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **SP** initiated mode then perform the following steps:
77+
78+
a. In the **Identifier** textbox, type the URL:
79+
`https://saml.fileprotection.datto.com/singlesignon/saml/metadata`
80+
81+
b. In the **Reply URL** textbox, type the URL:
82+
`https://saml.fileprotection.datto.com/singlesignon/saml/SSO`
83+
84+
c. In the **Sign on URL** textbox, type a URL using the following pattern:
85+
`https://<SUBDOMAIN>.fileprotection.datto.com`
86+
87+
> [!NOTE]
88+
> This value is not real. Update this value with the actual Sign on URL. Contact [Datto File Protection Single Sign On Client support team](mailto:[email protected]) to get this value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
89+
90+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
91+
92+
![Screenshot shows the Certificate download link.](common/copy-metadataurl.png "Certificate")
93+
94+
### Create an Azure AD test user
95+
96+
In this section, you'll create a test user in the Azure portal called B.Simon.
97+
98+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
99+
1. Select **New user** at the top of the screen.
100+
1. In the **User** properties, follow these steps:
101+
1. In the **Name** field, enter `B.Simon`.
102+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
103+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
104+
1. Click **Create**.
105+
106+
### Assign the Azure AD test user
107+
108+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Datto File Protection Single Sign On.
109+
110+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
111+
1. In the applications list, select **Datto File Protection Single Sign On**.
112+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
113+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
114+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
115+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
116+
1. In the **Add Assignment** dialog, click the **Assign** button.
117+
118+
## Configure Datto File Protection Single Sign On SSO
119+
120+
To configure single sign-on on **Datto File Protection Single Sign On** side, you need to send the **App Federation Metadata Url** to [Datto File Protection Single Sign On support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
121+
122+
### Create Datto File Protection Single Sign On test user
123+
124+
In this section, you create a user called Britta Simon in Datto File Protection Single Sign On. Work with [Datto File Protection Single Sign On support team](mailto:[email protected]) to add the users in the Datto File Protection Single Sign On platform. Users must be created and activated before you use single sign-on.
125+
126+
## Test SSO
127+
128+
In this section, you test your Azure AD single sign-on configuration with following options.
129+
130+
#### SP initiated:
131+
132+
* Click on **Test this application** in Azure portal. This will redirect to Datto File Protection Single Sign On Sign on URL where you can initiate the login flow.
133+
134+
* Go to Datto File Protection Single Sign On Sign-on URL directly and initiate the login flow from there.
135+
136+
#### IDP initiated:
137+
138+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Datto File Protection Single Sign On for which you set up the SSO.
139+
140+
You can also use Microsoft My Apps to test the application in any mode. When you click the Datto File Protection Single Sign On tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Datto File Protection Single Sign On for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
141+
142+
## Next steps
143+
144+
Once you configure Datto File Protection Single Sign On you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -601,6 +601,8 @@
601601
href: datasite-tutorial.md
602602
- name: Datava Enterprise Service Platform
603603
href: datava-enterprise-service-platform-tutorial.md
604+
- name: Datto File Protection Single Sign On
605+
href: datto-file-protection-tutorial.md
604606
- name: Datto Workplace Single Sign On
605607
href: datto-workplace-tutorial.md
606608
- name: Dealpath

articles/api-management/api-management-advanced-policies.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -536,6 +536,29 @@ In the following example, request forwarding is retried up to ten times using an
536536

537537
```
538538

539+
### Example
540+
541+
In the following example, sending a request to a URL other than the defined backend is retried up to three times if the connection is dropped/timed out, or the request results in a server-side error. Since `first-fast-retry` is set to true, the first retry is executed immediately upon the initial request failure. Note that `send-request` must set `ignore-error` to true in order for `response-variable-name` to be null in the event of an error.
542+
543+
```xml
544+
545+
<retry
546+
condition="@(context.Variables["response"] == null || ((IResponse)context.Variables["response"]).StatusCode >= 500)"
547+
count="3"
548+
interval="1"
549+
first-fast-retry="true">
550+
<send-request
551+
mode="new"
552+
response-variable-name="response"
553+
timeout="3"
554+
ignore-error="true">
555+
<set-url>https://api.contoso.com/products/5</set-url>
556+
<set-method>GET</set-method>
557+
</send-request>
558+
</retry>
559+
560+
```
561+
539562
### Elements
540563

541564
| Element | Description | Required |

articles/attestation/claim-sets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ Azure Attestation includes the below claims in the attestation token for all att
135135
- **x-ms-policy-hash**: Hash of Azure Attestation evaluation policy computed as BASE64URL(SHA256(UTF8(BASE64URL(UTF8(policy text)))))
136136
- **x-ms-policy-signer**: JSON object with a "jwk” member representing the key a customer used to sign their policy. This is applicable when customer uploads a signed policy
137137
- **x-ms-runtime**: JSON object containing "claims" that are defined and generated within the attested environment. This is a specialization of the “enclave held data” concept, where the “enclave held data” is specifically formatted as a UTF-8 encoding of well formed JSON
138-
- **x-ms-inittime**: JSON object containing “claims” that are defined and enforced at secure environment initialization time
138+
- **x-ms-inittime**: JSON object containing “claims” that are defined and verified at initialization time of the attested environment
139139
140140
Below claim names are used from [IETF JWT specification](https://tools.ietf.org/html/rfc7519)
141141

articles/azure-government/documentation-government-developer-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Navigate through the following links to get started using Azure Government:
5858
- [Connect with CLI](./documentation-government-get-started-connect-with-cli.md)
5959
- [Connect with Visual Studio](./documentation-government-connect-vs.md)
6060
- [Connect to Azure Storage](./documentation-government-get-started-connect-to-storage.md)
61-
- [Connect with Azure SDK for Python](/azure/developer/python/azure-sdk-sovereign-domain)
61+
- [Connect with Azure SDK for Python](/azure/developer/python/sdk/azure-sdk-sovereign-domain)
6262

6363
### Azure Government Video Library
6464

articles/azure-maps/zoom-levels-and-tile-grid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The following table provides the full list of values for zoom levels where the t
5252
| 16 | 2.3887 | 611.496 |
5353
| 17 | 1.1943 | 305.748 |
5454
| 18 | 0.5972 | 152.874 |
55-
| 19 | 0.14929 | 76.437 |
55+
| 19 | 0.2986 | 76.437 |
5656
| 20 | 0.14929 | 38.2185 |
5757
| 21 | 0.074646 | 19.10926 |
5858
| 22 | 0.037323 | 9.55463 |

0 commit comments

Comments
 (0)