You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/how-applications-are-added.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ There are two representations of applications in Azure Active Directory (Azure A
25
25
26
26
## What are application objects and where do they come from?
27
27
28
-
You can manage [application objects](app-objects-and-service-principals.md#application-object) in the Azure portal through the [App registrations](https://aka.ms/appregistrations) experience. Application objects describe the application to Azure AD and can be considered the definition of the application, allowing the service to know how to issue tokens to the application based on its settings. The application object will only exist in its home directory, even if it's a multi-tenant application supporting service principals in other directories. The application object may include (but not limited to) any of the following:
28
+
You can manage [application objects](app-objects-and-service-principals.md#application-object) in the Microsoft Entra admin center through the [App registrations](https://entra.microsoft.com/#view/Microsoft_AAD_RegisteredApps/ApplicationsListBlade) experience. Application objects describe the application to Azure AD and can be considered the definition of the application, allowing the service to know how to issue tokens to the application based on its settings. The application object will only exist in its home directory, even if it's a multi-tenant application supporting service principals in other directories. The application object may include (but not limited to) any of the following:
29
29
30
30
- Name, logo, and publisher
31
31
- Redirect URIs
@@ -39,15 +39,15 @@ You can manage [application objects](app-objects-and-service-principals.md#appli
39
39
40
40
Application objects can be created through multiple pathways, including:
41
41
42
-
- Application registrations in the Azure portal
42
+
- Application registrations in the Microsoft Entra admin center
43
43
- Creating a new application using Visual Studio and configuring it to use Azure AD authentication
44
44
- When an admin adds an application from the app gallery (which will also create a service principal)
45
45
- Using the Microsoft Graph API or PowerShell to create a new application
46
46
- Many others including various developer experiences in Azure and in API explorer experiences across developer centers
47
47
48
48
## What are service principals and where do they come from?
49
49
50
-
You can manage [service principals](app-objects-and-service-principals.md#service-principal-object) in the Azure portal through the [Enterprise Applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/AllApps/menuId/) experience. Service principals are what govern an application connecting to Azure AD and can be considered the instance of the application in your directory. For any given application, it can have at most one application object (which is registered in a "home" directory), and one or more service principal objects representing instances of the application in every directory in which it acts.
50
+
You can manage [service principals](app-objects-and-service-principals.md#service-principal-object) in the Microsoft Entra admin center through the [Enterprise Applications](https://entra.microsoft.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/AllApps/menuId/) experience. Service principals are what govern an application connecting to Azure AD and can be considered the instance of the application in your directory. For any given application, it can have at most one application object (which is registered in a "home" directory), and one or more service principal objects representing instances of the application in every directory in which it acts.
51
51
52
52
The service principal can include:
53
53
@@ -127,14 +127,14 @@ Allowing users to register and consent to applications might initially sound con
127
127
- Users signing in to applications using their organization accounts for business purposes is a good thing. If they subsequently leave the organization they'll automatically lose access to their account in the application they were using.
128
128
- Having a record of what data was shared with which application is a good thing. Data is more transportable than ever and it's useful to have a clear record of who shared what data with which applications.
129
129
- API owners who use Azure AD for OAuth decide exactly what permissions users are able to grant to applications and which permissions require an admin to agree to. Only admins can consent to larger scopes and more significant permissions, while user consent is scoped to the users' own data and capabilities.
130
-
- When a user adds or allows an application to access their data, the event can be audited so you can view the Audit Reports within the Azure portal to determine how an application was added to the directory.
130
+
- When a user adds or allows an application to access their data, the event can be audited so you can view the Audit Reports within the Microsoft Entra admin center to determine how an application was added to the directory.
131
131
132
132
If you still want to prevent users in your directory from registering applications and from signing in to applications without administrator approval, there are two settings that you can change to turn off those capabilities:
133
133
134
134
- To change the user consent settings in your organization, see [Configure how users consent to applications](../manage-apps/configure-user-consent.md).
135
135
136
136
- To prevent users from registering their own applications:
137
-
1. In the Azure portal, go to the [User settings](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/UserSettings) section under **App registrations**
137
+
1. In the Microsoft Entra admin center, browse to **Identity** > **Users** > **User settings**.
138
138
2. Change **Users can register applications** to **No**.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/howto-add-app-roles-in-apps.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,25 +25,24 @@ Another approach is to use Azure Active Directory (Azure AD) groups and group cl
25
25
26
26
## Declare roles for an application
27
27
28
-
You define app roles by using the [Azure portal](https://portal.azure.com) during the [app registration process](quickstart-register-app.md). App roles are defined on an application registration representing a service, app or API. When a user signs in to the application, Azure AD emits a `roles` claim for each role that the user or service principal has been granted. This can be used to implement [claim-based authorization](./claims-validation.md). App roles can be assigned [to a user or a group of users](../manage-apps/add-application-portal-assign-users.md). App roles can also be assigned to the service principal for another application, or [to the service principal for a managed identity](../managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell.md).
28
+
You define app roles by using the [Microsoft Entra admin center](https://entra.microsoft.com) during the [app registration process](quickstart-register-app.md). App roles are defined on an application registration representing a service, app or API. When a user signs in to the application, Azure AD emits a `roles` claim for each role that the user or service principal has been granted. This can be used to implement [claim-based authorization](./claims-validation.md). App roles can be assigned [to a user or a group of users](../manage-apps/add-application-portal-assign-users.md). App roles can also be assigned to the service principal for another application, or [to the service principal for a managed identity](../managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell.md).
29
29
30
30
Currently, if you add a service principal to a group, and then assign an app role to that group, Azure AD doesn't add the `roles` claim to tokens it issues.
31
31
32
-
App roles are declared using App roles UI in the Azure portal:
32
+
App roles are declared using App roles UI in the Microsoft Entra admin center:
33
33
34
34
The number of roles you add counts toward application manifest limits enforced by Azure AD. For information about these limits, see the [Manifest limits](./reference-app-manifest.md#manifest-limits) section of [Azure Active Directory app manifest reference](reference-app-manifest.md).
To create an app role by using the Azure portal's user interface:
40
+
To create an app role by using the Microsoft Entra admin center's user interface:
41
41
42
-
1. Sign in to the <ahref="https://portal.azure.com/"target="_blank">Azure portal</a>.
42
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
43
43
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant that contains the app registration to which you want to add an app role.
44
-
1. Search for and select **Azure Active Directory**.
45
-
1. Under **Manage**, select **App registrations**, and then select the application you want to define app roles in.
46
-
1. Select **App roles**, and then select **Create app role**.
44
+
1. Browse to **Identity** > **Applications** > **App registrations** and then select the application you want to define app roles in.
45
+
1. Under manage select **App roles**, and then select **Create app role**.
47
46
48
47
:::image type="content" source="media/howto-add-app-roles-in-apps/app-roles-overview-pane.png" alt-text="An app registration's app roles pane in the Azure portal":::
49
48
@@ -78,10 +77,11 @@ If you have not already done so, you'll need to assign yourself as the applicati
78
77
79
78
Once you've added app roles in your application, you can assign users and groups to the roles. Assignment of users and groups to roles can be done through the portal's UI, or programmatically using [Microsoft Graph](/graph/api/user-post-approleassignments). When the users assigned to the various app roles sign in to the application, their tokens will have their assigned roles in the `roles` claim.
80
79
81
-
To assign users and groups to roles by using the Azure portal:
80
+
To assign users and groups to roles by using the Microsoft Entra admin center:
82
81
83
-
1. Sign in to the <ahref="https://portal.azure.com/"target="_blank">Azure portal</a>.
84
-
1. In **Azure Active Directory**, select **Enterprise applications** in the left-hand navigation menu.
82
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
83
+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant that contains the app registration to which you want to add an app role.
84
+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
85
85
1. Select **All applications** to view a list of all your applications. If your application doesn't appear in the list, use the filters at the top of the **All applications** list to restrict the list, or scroll down the list to locate your application.
86
86
1. Select the application in which you want to assign users or security group to roles.
87
87
1. Under **Manage**, select **Users and groups**.
@@ -96,14 +96,14 @@ Confirm that the users and groups you added appear in the **Users and groups** l
96
96
97
97
## Assign app roles to applications
98
98
99
-
Once you've added app roles in your application, you can assign an app role to a client app by using the Azure portal or programmatically by using [Microsoft Graph](/graph/api/user-post-approleassignments).
99
+
Once you've added app roles in your application, you can assign an app role to a client app by using the Microsoft Entra admin center or programmatically by using [Microsoft Graph](/graph/api/user-post-approleassignments).
100
100
101
101
When you assign app roles to an application, you create _application permissions_. Application permissions are typically used by daemon apps or back-end services that need to authenticate and make authorized API call as themselves, without the interaction of a user.
102
102
103
-
To assign app roles to an application by using the Azure portal:
103
+
To assign app roles to an application by using the Microsoft Entra admin center:
104
104
105
-
1. Sign in to the <ahref="https://portal.azure.com/"target="_blank">Azure portal</a>.
106
-
1.In **Azure Active Directory**, select**App registrations**in the left-hand navigation menu.
105
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
106
+
1.Browse to **Identity** > **Applications** >**App registrations**and then select **All applications**.
107
107
1. Select **All applications** to view a list of all your applications. If your application doesn't appear in the list, use the filters at the top of the **All applications** list to restrict the list, or scroll down the list to locate your application.
108
108
1. Select the application to which you want to assign an app role.
109
109
1. Select **API permissions** > **Add a permission**.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/howto-remove-app.md
+3-7Lines changed: 3 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,6 @@ In the following sections, you learn how to:
28
28
29
29
## Prerequisites
30
30
31
-
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
32
31
- An [application registered in your Azure AD tenant](quickstart-register-app.md)
33
32
34
33
## Remove an application authored by you or your organization
@@ -40,12 +39,9 @@ Applications that you or your organization have registered are represented by bo
40
39
> [!NOTE]
41
40
> Deleting an application will also delete its service principal object in the application's home directory. For multi-tenant applications, service principal objects in other directories will not be deleted.
42
41
43
-
To delete an application, be listed as an owner of the application or have admin privileges.
44
-
45
-
1. Sign in to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
46
-
1. If you have access to multiple tenants, use the **Directory + subscription** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant in which the app is registered.
47
-
1. Search and select the **Azure Active Directory**.
48
-
1. Under **Manage**, select **App registrations** and select the application that you want to configure. Once you've selected the app, you see the application's **Overview** page.
42
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
43
+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant that contains the app registration to which you want to add an app role.
44
+
1. Browse to **Identity** > **Applications** > **App registrations** and then select the application that you want to configure. Once you've selected the app, you see the application's **Overview** page.
49
45
1. From the **Overview** page, select **Delete**.
50
46
1. Read the deletion consequences. Check the box if one appears at the bottom of the pane.
51
47
1. Select **Delete** to confirm that you want to delete the app.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/howto-restore-app.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ ms.custom: aaddev
20
20
21
21
After you delete an app registration, the app remains in a suspended state for 30 days. During that 30-day window, the app registration can be restored, along with all its properties. After that 30-day window passes, app registrations can't be restored, and the permanent deletion process may be automatically started. This functionality only applies to applications associated to a directory. It isn't available for applications from a personal Microsoft account, which can't be restored.
22
22
23
-
You can view your deleted applications, restore a deleted application, or permanently delete an application using the **App registrations** experience under Azure Active Directory (Azure AD) in the Azure portal.
23
+
You can view your deleted applications, restore a deleted application, or permanently delete an application using the **App registrations** experience under Azure Active Directory (Azure AD) in the Microsoft Entra admin center.
24
24
25
25
Neither you nor Microsoft customer support can restore a permanently deleted application or an application deleted more than 30 days ago.
26
26
@@ -47,8 +47,8 @@ You can see all the applications in a soft deleted state. Only applications del
47
47
48
48
To view your restorable applications:
49
49
50
-
1. Sign in to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
51
-
1.Search and select **Azure Active Directory**, select**App registrations**, and then select the **Deleted applications** tab.
50
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) using one of the roles listed in the prerequisites.
51
+
1.Browse to **Identity** > **Applications** >**App registrations**, and then select the **Deleted applications** tab.
52
52
53
53
Review the list of applications. Only applications that have been deleted in the past 30 days are available to restore. If using the App registrations search preview, you can filter by the 'Deleted date' column to see only these applications.
To update an application to require user assignment, you must be owner of the application under Enterprise apps, or be assigned one of **Global administrator**, **Application administrator**, or **Cloud applicationadministrator** directory roles.
42
+
To update an application to require user assignment, you must be owner of the application under Enterprise apps, or be at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
43
43
44
-
1. Sign in to the [Azure portal](https://portal.azure.com)
45
-
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch the tenant in which you want to register an application.
46
-
1. Search for and select **Azure Active Directory**.
47
-
1. Under **Manage**, select **Enterprise Applications** then select **All applications**.
44
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
45
+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant that contains the app registration to which you want to add an app role.
46
+
1. Browse to **Identity** > **Applications** > **Enterprise applications**, then select **All applications**.
48
47
1. Select the application you want to configure to require assignment. Use the filters at the top of the window to search for a specific application.
49
48
1. On the application's **Overview** page, under **Manage**, select **Properties**.
50
49
1. Locate the setting **Assignment required?** and set it to **Yes**. When this option is set to **Yes**, users and services attempting to access the application or services must first be assigned for this application, or they won't be able to sign-in or obtain an access token.
0 commit comments