Skip to content

Commit e39ad7e

Browse files
authored
Merge pull request #161929 from MicrosoftDocs/master
6/10 PM Publish
2 parents c072eef + bc57475 commit e39ad7e

File tree

185 files changed

+3119
-1667
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

185 files changed

+3119
-1667
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -231,6 +231,12 @@
231231
"branch": "main",
232232
"branch_mapping": {}
233233
},
234+
{
235+
"path_to_root": "azure-functions-python-worker-extension",
236+
"url": "https://github.com/Azure-Samples/python-worker-extension-timer",
237+
"branch": "master",
238+
"branch_mapping": {}
239+
},
234240
{
235241
"path_to_root": "functions-openapi-turbine-repair",
236242
"url": "https://github.com/Azure-Samples/functions-openapi-turbine-repair",

.openpublishing.redirection.json

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -67089,16 +67089,6 @@
6708967089
"source_path_from_root": "/articles/iot-develop/quickstart-device-development.md",
6709067090
"redirect_url": "/azure/iot-develop/",
6709167091
"redirect_document_id": false
67092-
},
67093-
{
67094-
"source_path_from_root": "/articles/machine-learning/team-data-science-process/move-data-to-azure-blob-using-azure-storage-explorer.md",
67095-
"redirect_url": "/azure/vs-azure-tools-storage-manage-with-storage-explorer",
67096-
"redirect_document_id": false
67097-
},
67098-
{
67099-
"source_path_from_root": "/articles/machine-learning/team-data-science-process/move-data-to-azure-blob-using-ssis.md",
67100-
"redirect_url": "/sql/integration-services/azure-feature-pack-for-integration-services-ssis",
67101-
"redirect_document_id": false
6710267092
}
6710367093
]
6710467094
}

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
145145
```
146146
147147
1. Under the **ClaimsProvider** element, update the value for **Domain** to a unique value that can be used to distinguish it from other identity providers.
148-
1. Under the **TechnicalProfile** element, update the value for **DisplayName**, for example, `Contoso Employee`. This value is displayed on the sign-in button on your sign-in page.
148+
1. Under the **TechnicalProfile** element, update the value for **DisplayName**, for example, `Multi-Tenant AAD`. This value is displayed on the sign-in button on your sign-in page.
149149
1. Set **client_id** to the application ID of the Azure AD multi-tenant application that you registered earlier.
150150
1. Under **CryptographicKeys**, update the value of **StorageReferenceId** to the name of the policy key that created earlier. For example, `B2C_1A_AADAppSecret`.
151151

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 05/07/2021
9+
ms.date: 06/10/2021
1010

1111
ms.author: justinha
1212
author: justinha
@@ -107,14 +107,21 @@ The following process is used when a user signs in with a FIDO2 security key:
107107

108108
While there are many keys that are FIDO2 certified by the FIDO Alliance, Microsoft requires some optional extensions of the FIDO2 Client-to-Authenticator Protocol (CTAP) specification to be implemented by the vendor to ensure maximum security and the best experience.
109109

110-
A security key **MUST** implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft-compatible:
110+
A security key **must** implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft-compatible. For more information, see the [Client to Authenticator Protocol](https://fidoalliance.org/specs/fido-v2.1-rd-20210309/fido-client-to-authenticator-protocol-v2.1-rd-20210309.html).
111111

112112
| # | Feature / Extension trust | Why is this feature or extension required? |
113113
| --- | --- | --- |
114-
| 1 | Resident key | This feature enables the security key to be portable, where your credential is stored on the security key. |
115-
| 2 | Client pin | This feature enables you to protect your credentials with a second factor and applies to security keys that do not have a user interface. |
114+
| 1 | Resident/Discoverable key | This feature enables the security key to be portable, where your credential is stored on the security key and is discoverable which makes usernameless flows possible. |
115+
| 2 | Client pin | This feature enables you to protect your credentials with a second factor and applies to security keys that do not have a user interface.<br>Both [PIN protocol 1](https://fidoalliance.org/specs/fido-v2.1-rd-20210309/fido-client-to-authenticator-protocol-v2.1-rd-20210309.html#pinProto1) and [PIN protocol 2](https://fidoalliance.org/specs/fido-v2.1-rd-20210309/fido-client-to-authenticator-protocol-v2.1-rd-20210309.html#pinProto2) **must** be implemented. |
116116
| 3 | hmac-secret | This extension ensures you can sign in to your device when it's off-line or in airplane mode. |
117117
| 4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like Microsoft Account and Azure Active Directory. |
118+
| 5 | Credential Management | This feature allows users to manage their credentials on security keys on platforms and applies to security keys that do not have this capability built-in. |
119+
| 6 | Bio Enrollment | This feature allows users to enroll their biometrics on their authenticators and applies to security keys that do not have this capability built in.<br> Authenticator **must** implement [authenicatorBioEnrollment](https://fidoalliance.org/specs/fido-v2.1-rd-20210309/fido-client-to-authenticator-protocol-v2.1-rd-20210309.html#authenticatorBioEnrollment) command for this feature. Authenticator vendors are highly encouraged to implement [userVerificationMgmtPreview](https://fidoalliance.org/specs/fido-v2.1-rd-20210309/fido-client-to-authenticator-protocol-v2.1-rd-20210309.html#prototypeAuthenticatorBioEnrollment) command also so that users can enroll bio templates it on all previous OS versions. |
120+
| 7 | pinUvAuthToken | This feature allows platform to have auth tokens using PIN or BIO match which helps in better user experience when multiple credentials are present on the authenticator. |
121+
| 8 | forcePinChange | This feature allows enterprises to ask users to change their PIN in remote deployments. |
122+
| 9 | setMinPINLength | This feature allows enterprises to have custom minimum PIN length for their users. Authenticator MUST implement minPinLength extension also. |
123+
| 10 | alwaysUV | This feature allows enterprises or users to always require user verification to use this security key. Authenticator MUST implement toggleAlwaysUv subcommand. |
124+
| 11 | credBlob | This extension allows websites to store small information along with the security key. |
118125

119126
### FIDO2 security key providers
120127

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,14 +35,15 @@ To complete this article, you need the following resources and privileges:
3535
* [Enterprise Mobility + Security (EMS) E3 or E5][ems-licensing] or [Microsoft 365 (M365) E3 or E5][m365-licensing]
3636
* [Office 365 F3][o365-f3]
3737

38-
## Limitations
38+
## Known issues
3939

40-
The following limitations apply to SMS-based authentication:
40+
Here are some known issues:
4141

4242
* SMS-based authentication isn't currently compatible with Azure AD Multi-Factor Authentication.
4343
* Except for Teams, SMS-based authentication isn't compatible with native Office applications.
4444
* SMS-based authentication isn't recommended for B2B accounts.
4545
* Federated users won't authenticate in the home tenant. They only authenticate in the cloud.
46+
* If a user's default sign-in method is a text or call to your phone number, then the SMS code or voice call is sent automatically during multifactor authentication. As of June 2021, some apps will ask users to choose **Text** or **Call** first. This option prevents sending too many security codes for different apps. If the default sign-in method is the Microsoft Authenticator app ([which we highly recommend](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752)), then the app notification is sent automatically.
4647

4748
## Enable the SMS-based authentication method
4849

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,7 @@ This setting applies to the following iOS and Android apps:
8383
- Microsoft Invoicing
8484
- Microsoft Kaizala
8585
- Microsoft Launcher
86+
- Microsoft Lists
8687
- Microsoft Office
8788
- Microsoft OneDrive
8889
- Microsoft OneNote

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 21 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Customize Azure AD tenant app claims (PowerShell)
33
titleSuffix: Microsoft identity platform
4-
description: This page describes Azure Active Directory claims mapping.
4+
description: Learn how to customize claims emitted in tokens for an application in a specific Azure Active Directory tenant.
55
services: active-directory
66
author: rwike77
77
manager: CelesteDG
@@ -10,32 +10,34 @@ ms.subservice: develop
1010
ms.custom: aaddev
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 08/25/2020
13+
ms.date: 06/10/2021
1414
ms.author: ryanwi
1515
ms.reviewer: paulgarn, hirsin, jeedes, luleon
1616
---
1717

18-
# How to: Customize claims emitted in tokens for a specific app in a tenant (Preview)
18+
# Customize claims emitted in tokens for a specific app in a tenant
1919

20-
> [!NOTE]
21-
> This feature replaces and supersedes the [claims customization](active-directory-saml-claims-customization.md) offered through the portal today. On the same application, if you customize claims using the portal in addition to the Graph/PowerShell method detailed in this document, tokens issued for that application will ignore the configuration in the portal. Configurations made through the methods detailed in this document will not be reflected in the portal.
20+
Claims customization is used by tenant admins to customize the claims emitted in tokens for a specific application in their tenant. You can use claims-mapping policies to:
2221

23-
> [!NOTE]
24-
> This capability currently is in public preview. Be prepared to revert or remove any changes. The feature is available in any Azure Active Directory (Azure AD) subscription during public preview. However, when the feature becomes generally available, some aspects of the feature might require an Azure AD premium subscription. This feature supports configuring claim mapping policies for WS-Fed, SAML, OAuth, and OpenID Connect protocols.
22+
- select which claims are included in tokens.
23+
- create claim types that do not already exist.
24+
- choose or change the source of data emitted in specific claims.
2525

26-
This feature is used by tenant admins to customize the claims emitted in tokens for a specific application in their tenant. You can use claims-mapping policies to:
26+
Claims customization supports configuring claim-mapping policies for the WS-Fed, SAML, OAuth, and OpenID Connect protocols.
2727

28-
- Select which claims are included in tokens.
29-
- Create claim types that do not already exist.
30-
- Choose or change the source of data emitted in specific claims.
28+
> [!NOTE]
29+
> This feature replaces and supersedes the [claims customization](active-directory-saml-claims-customization.md) offered through the Azure portal. On the same application, if you customize claims using the portal in addition to the Microsoft Graph/PowerShell method detailed in this document, tokens issued for that application will ignore the configuration in the portal. Configurations made through the methods detailed in this document will not be reflected in the portal.
3130
32-
In this article, we walk through a few common scenarios that can help you grasp how to use the [claims mapping policy type](reference-claims-mapping-policy-type.md).
31+
In this article, we walk through a few common scenarios that can help you grasp how to use the [claims-mapping policy type](reference-claims-mapping-policy-type.md).
3332

34-
When creating a claims mapping policy, you can also emit a claim from a directory schema extension attribute in tokens. Use *ExtensionID* for the extension attribute instead of *ID* in the `ClaimsSchema` element. For more info on extension attributes, see [Using directory schema extension attributes](active-directory-schema-extensions.md).
33+
When creating a claims-mapping policy, you can also emit a claim from a directory schema extension attribute in tokens. Use *ExtensionID* for the extension attribute instead of *ID* in the `ClaimsSchema` element. For more info on extension attributes, see [Using directory schema extension attributes](active-directory-schema-extensions.md).
3534

3635
## Prerequisites
3736

38-
In the following examples, you create, update, link, and delete policies for service principals. Claims mapping policies can only be assigned to service principal objects. If you are new to Azure AD, we recommend that you [learn about how to get an Azure AD tenant](quickstart-create-new-tenant.md) before you proceed with these examples.
37+
In the following examples, you create, update, link, and delete policies for service principals. claims-mapping policies can only be assigned to service principal objects. If you are new to Azure AD, we recommend that you [learn about how to get an Azure AD tenant](quickstart-create-new-tenant.md) before you proceed with these examples.
38+
39+
> [!NOTE]
40+
> The [Azure AD PowerShell Module public preview release](https://www.powershellgallery.com/packages/AzureADPreview) is required to configure claims-mapping policies. The PowerShell module is in preview, be prepared to revert or remove any changes.
3941
4042
To get started, do the following steps:
4143

@@ -55,7 +57,7 @@ To get started, do the following steps:
5557

5658
In this example, you create a policy that removes the [basic claim set](reference-claims-mapping-policy-type.md#claim-sets) from tokens issued to linked service principals.
5759

58-
1. Create a claims mapping policy. This policy, linked to specific service principals, removes the basic claim set from tokens.
60+
1. Create a claims-mapping policy. This policy, linked to specific service principals, removes the basic claim set from tokens.
5961
1. To create the policy, run this command:
6062

6163
``` powershell
@@ -78,7 +80,7 @@ In this example, you create a policy that removes the [basic claim set](referenc
7880
7981
In this example, you create a policy that adds the EmployeeID and TenantCountry to tokens issued to linked service principals. The EmployeeID is emitted as the name claim type in both SAML tokens and JWTs. The TenantCountry is emitted as the country/region claim type in both SAML tokens and JWTs. In this example, we continue to include the basic claims set in the tokens.
8082
81-
1. Create a claims mapping policy. This policy, linked to specific service principals, adds the EmployeeID and TenantCountry claims to tokens.
83+
1. Create a claims-mapping policy. This policy, linked to specific service principals, adds the EmployeeID and TenantCountry claims to tokens.
8284
1. To create the policy, run the following command:
8385
8486
``` powershell
@@ -102,7 +104,7 @@ In this example, you create a policy that adds the EmployeeID and TenantCountry
102104
103105
In this example, you create a policy that emits a custom claim "JoinedData" to JWTs issued to linked service principals. This claim contains a value created by joining the data stored in the extensionattribute1 attribute on the user object with ".sandbox". In this example, we exclude the basic claims set in the tokens.
104106
105-
1. Create a claims mapping policy. This policy, linked to specific service principals, adds the EmployeeID and TenantCountry claims to tokens.
107+
1. Create a claims-mapping policy. This policy, linked to specific service principals, adds the EmployeeID and TenantCountry claims to tokens.
106108
1. To create the policy, run the following command:
107109
108110
``` powershell
@@ -124,7 +126,7 @@ In this example, you create a policy that emits a custom claim "JoinedData" to J
124126
125127
## Security considerations
126128
127-
Applications that receive tokens rely on the fact that the claim values are authoritatively issued by Azure AD and cannot be tampered with. However, when you modify the token contents via claims mapping policies, these assumptions may no longer be correct. Applications must explicitly acknowledge that tokens have been modified by the creator of the claims mapping policy to protect themselves from claims mapping policies created by malicious actors. This can be done in the following ways:
129+
Applications that receive tokens rely on the fact that the claim values are authoritatively issued by Azure AD and cannot be tampered with. However, when you modify the token contents through claims-mapping policies, these assumptions may no longer be correct. Applications must explicitly acknowledge that tokens have been modified by the creator of the claims-mapping policy to protect themselves from claims-mapping policies created by malicious actors. This can be done in the following ways:
128130
129131
- Configure a custom signing key
130132
- Update the application manifest to accept mapped claims.
@@ -151,6 +153,6 @@ If you're not using a verified domain, Azure AD will return an `AADSTS501461` er
151153
152154
## Next steps
153155
154-
- Read the [claims mapping policy type](reference-claims-mapping-policy-type.md) reference article to learn more.
156+
- Read the [claims-mapping policy type](reference-claims-mapping-policy-type.md) reference article to learn more.
155157
- To learn how to customize claims issued in the SAML token through the Azure portal, see [How to: Customize claims issued in the SAML token for enterprise applications](active-directory-saml-claims-customization.md)
156158
- To learn more about extension attributes, see [Using directory schema extension attributes in claims](active-directory-schema-extensions.md).

articles/active-directory/enterprise-users/groups-dynamic-membership.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -361,7 +361,9 @@ An example of a rule that uses a custom extension property is:
361361
user.extension_c272a57b722d4eb29bfe327874ae79cb_OfficeNumber -eq "123"
362362
```
363363

364-
The custom property name can be found in the directory by querying a user's property using Graph Explorer and searching for the property name. Also, you can now select **Get custom extension properties** link in the dynamic user group rule builder to enter a unique app ID and receive the full list of custom extension properties to use when creating a dynamic membership rule. This list can also be refreshed to get any new custom extension properties for that app.
364+
The custom property name can be found in the directory by querying a user's property using Graph Explorer and searching for the property name. Also, you can now select **Get custom extension properties** link in the dynamic user group rule builder to enter a unique app ID and receive the full list of custom extension properties to use when creating a dynamic membership rule. This list can also be refreshed to get any new custom extension properties for that app.
365+
366+
For more information, see [Use the attributes in dynamic groups](../hybrid/how-to-connect-sync-feature-directory-extensions.md#use-the-attributes-in-dynamic-groups) in the article [Azure AD Connect sync: Directory extensions](../hybrid/how-to-connect-sync-feature-directory-extensions.md).
365367

366368
## Rules for devices
367369

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,12 +87,13 @@ Please follow this link to read more about [auto upgrade](how-to-connect-install
8787
- Added member attribute to the 'Out to AD - Group SOAInAAD - Exchange' rule to limit members in written back groups to 50k
8888
- Updated Sync Rules to support Group Writeback v2
8989
-If the “In from AAD - Group SOAInAAD” rule is cloned and AADConnect is upgraded.
90-
-The updated rule will be disabled by default and so the targetWritebackType will be null.
90+
- The updated rule will be disabled by default and so the targetWritebackType will be null.
9191
- AADConnect will writeback all Cloud Groups (including Azure Active Directory Security Groups enabled for writeback) as Distribution Groups.
9292
-If the “Out to AD - Group SOAInAAD” rule is cloned and AADConnect is upgraded.
9393
- The updated rule will be disabled by default. However, a new sync rule “Out to AD - Group SOAInAAD - Exchange” which is added will be enabled.
9494
- Depending on the Cloned Custom Sync Rule's precedence, AADConnect will flow the Mail and Exchange attributes.
9595
- If the Cloned Custom Sync Rule does not flow some Mail and Exchange attributes, then new Exchange Sync Rule will add those attributes.
96+
- Note that Group Writeback V2 is in private preview at this moment and not publicly available.
9697
- Added support for [Selective Password hash Synchronization](./how-to-connect-selective-password-hash-synchronization.md)
9798
- Added the new [Single Object Sync cmdlet](./how-to-connect-single-object-sync.md). Use this cmdlet to troubleshoot your Azure AD Connect sync configuration.
9899
- Azure AD Connect now supports the Hybrid Identity Administrator role for configuring the service.

0 commit comments

Comments
 (0)