Skip to content

Commit e81d3e4

Browse files
authored
Merge branch 'MicrosoftDocs:master' into master
2 parents e34e7df + bd8e956 commit e81d3e4

File tree

72 files changed

+1508
-862
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

72 files changed

+1508
-862
lines changed

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,14 @@ manager: karenh444
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 05/28/2021
10+
ms.date: 11/18/2021
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

1616
# Azure AD on-premises application provisioning architecture
1717

18-
>[!IMPORTANT]
19-
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability (GA).
20-
2118
## Overview
2219

2320
The following diagram shows an overview of how on-premises application provisioning works.
@@ -91,8 +88,8 @@ You can define one or more matching attribute(s) and prioritize them based on th
9188

9289

9390
## Agent best practices
94-
- Ensure the auto Azure AD Connect Provisioning Agent Auto Update service is running. It's enabled by default when you install the agent. Auto-update is required for Microsoft to support your deployment.
95-
- Avoid all forms of inline inspection on outbound TLS communications between agents and Azure. This type of inline inspection causes degradation to the communication flow.
91+
- Using the same agent for the on-prem provisioning feature along with Workday / SuccessFactors / Azure AD Connect Cloud Sync is currently unsupported. We are actively working to support on-prem provisioning on the same agent as the other provisioning scenarios.
92+
- - Avoid all forms of inline inspection on outbound TLS communications between agents and Azure. This type of inline inspection causes degradation to the communication flow.
9693
- The agent must communicate with both Azure and your application, so the placement of the agent affects the latency of those two connections. You can minimize the latency of the end-to-end traffic by optimizing each network connection. Each connection can be optimized by:
9794
- Reducing the distance between the two ends of the hop.
9895
- Choosing the right network to traverse. For example, traversing a private network rather than the public internet might be faster because of dedicated links.
@@ -112,10 +109,6 @@ For the latest GA version of the provisioning agent, see [Azure AD connect provi
112109
2. Go to **Control Panel** > **Uninstall or Change a Program**.
113110
3. Look for the version that corresponds to the entry for **Microsoft Azure AD Connect Provisioning Agent**.
114111

115-
### Does Microsoft automatically push provisioning agent updates?
116-
117-
Yes. Microsoft automatically updates the provisioning agent if the Windows service Microsoft Azure AD Connect Agent Updater is up and running. Ensuring that your agent is up to date is required for support to troubleshoot issues.
118-
119112
### Can I install the provisioning agent on the same server running Azure AD Connect or Microsoft Identity Manager?
120113

121114
Yes. You can install the provisioning agent on the same server that runs Azure AD Connect or Microsoft Identity Manager, but they aren't required.

articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,14 @@ manager: karenh444
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 10/21/2021
10+
ms.date: 11/19/2021
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

1616
# Troubleshoot on-premises application provisioning
1717

18-
>[!IMPORTANT]
19-
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability.
20-
2118
## Troubleshoot test connection issues
2219
After you configure the provisioning agent and ECMA host, it's time to test connectivity from the Azure Active Directory (Azure AD) provisioning service to the provisioning agent, the ECMA host, and the application. To perform this end-to-end test, select **Test connection** in the application in the Azure portal. When the test connection fails, try the following troubleshooting steps:
2320

articles/active-directory/app-provisioning/on-premises-migrate-microsoft-identity-manager.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenh444
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 11/11/2021
10+
ms.date: 11/17/2021
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -16,9 +16,6 @@ ms.collection: M365-identity-device-management
1616

1717
# Export a Microsoft Identity Manager connector for use with the Azure AD ECMA Connector Host
1818

19-
>[!IMPORTANT]
20-
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability.
21-
2219
You can import into the Azure Active Directory (Azure AD) ECMA Connector Host a configuration for a specific connector from a Forefront Identity Manager Synchronization Service or Microsoft Identity Manager Synchronization Service (MIM Sync) installation. The MIM Sync installation is only used for configuration, not for the ongoing synchronization from Azure AD.
2320

2421
>[!IMPORTANT]

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,13 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 10/16/2021
11+
ms.date: 11/17/2021
1212
ms.author: billmath
1313
ms.reviewer: arvinh
1414
---
1515

1616
# Azure AD on-premises application provisioning to SCIM-enabled apps
1717

18-
>[!IMPORTANT]
19-
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability.
20-
2118
The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010) client that can be used to automatically provision users into cloud or on-premises applications. This article outlines how you can use the Azure AD provisioning service to provision users into an on-premises application that's SCIM enabled. If you want to provision users into non-SCIM on-premises applications that use SQL as a data store, see the [Azure AD ECMA Connector Host Generic SQL Connector tutorial](tutorial-ecma-sql-connector.md). If you want to provision users into cloud apps such as DropBox and Atlassian, review the app-specific [tutorials](../../active-directory/saas-apps/tutorial-list.md).
2219

2320
![Diagram that shows SCIM architecture.](./media/on-premises-scim-provisioning/scim-4.png)
@@ -30,21 +27,19 @@ The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0]
3027
## On-premises app provisioning to SCIM-enabled apps
3128
To provision users to SCIM-enabled apps:
3229

33-
1. Add the **On-premises SCIM app** from the [gallery](../../active-directory/manage-apps/add-application-portal.md).
34-
1. Go to your app and select **Provisioning** > **Download the provisioning agent**.
35-
1. Select **On-Premises Connectivity**, and download the provisioning agent.
30+
1. [Download](https://aka.ms/OnPremProvisioningAgent) the provisioning agent and copy it onto the virtual machine or server that your SCIM endpoint is hosted on.
3631
1. Copy the agent onto the virtual machine or server that your SCIM endpoint is hosted on.
3732
1. Open the provisioning agent installer, agree to the terms of service, and select **Install**.
3833
1. Open the provisioning agent wizard, and select **On-premises provisioning** when prompted for the extension you want to enable.
3934
1. Provide credentials for an Azure AD administrator when you're prompted to authorize. Hybrid administrator or global administrator is required.
4035
1. Select **Confirm** to confirm the installation was successful.
41-
1. Go back to your application, and select **On-Premises Connectivity**.
36+
1. Navigate to the Azure Portal and add the **On-premises SCIM app** from the [gallery](../../active-directory/manage-apps/add-application-portal.md).
37+
1. Select **On-Premises Connectivity**, and download the provisioning agent. 1. Go back to your application, and select **On-Premises Connectivity**.
4238
1. Select the agent that you installed from the dropdown list, and select **Assign Agent(s)**.
43-
1. Wait 10 minutes or restart the Azure AD Connect Provisioning agent service on your server or VM.
44-
1. Provide the URL for your SCIM endpoint in the **Tenant URL** box. An example is https://localhost:8585/scim.
45-
39+
1. Wait 20 minutes prior to completing the next step, to provide time for the agent assignment to complete.
40+
1. Provide the URL for your SCIM endpoint in the **Tenant URL** box. An example is https://localhost:8585/scim.
4641
![Screenshot that shows assigning an agent.](./media/on-premises-scim-provisioning/scim-2.png)
47-
1. Select **Test Connection**, and save the credentials.
42+
1. Select **Test Connection**, and save the credentials. Use the steps [here](https://docs.microsoft.com/azure/active-directory/app-provisioning/on-premises-ecma-troubleshoot#troubleshoot-test-connection-issues) if you run into connectivity issues.
4843
1. Configure any [attribute mappings](customize-application-attributes.md) or [scoping](define-conditional-rules-for-provisioning-user-accounts.md) rules required for your application.
4944
1. Add users to scope by [assigning users and groups](../../active-directory/manage-apps/add-application-portal-assign-users.md) to the application.
5045
1. Test provisioning a few users [on demand](provision-on-demand.md).

articles/active-directory/develop/microsoft-identity-web.md

Lines changed: 27 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
1212
ms.workload: identity
13-
ms.date: 10/09/2020
13+
ms.date: 11/19/2021
1414
ms.author: jmprieur
1515
ms.reviewer: marsma
1616
ms.custom: "devx-track-csharp, aaddev"
@@ -21,6 +21,8 @@ ms.custom: "devx-track-csharp, aaddev"
2121

2222
Microsoft Identity Web is a set of ASP.NET Core libraries that simplifies adding authentication and authorization support to web apps and web APIs integrating with the Microsoft identity platform. It provides a single-surface API convenience layer that ties together ASP.NET Core, its authentication middleware, and the [Microsoft Authentication Library (MSAL) for .NET](https://github.com/azuread/microsoft-authentication-library-for-dotnet).
2323

24+
You can get Microsoft.Identity.Web from NuGet or by using a Visual Studio project template to create a new app project.
25+
2426
## Supported application scenarios
2527

2628
If you're building ASP.NET Core web apps or web APIs and want to use Azure Active Directory (Azure AD) or Azure AD B2C for identity and access management (IAM), we recommend using Microsoft Identity Web for all of these scenarios:
@@ -30,11 +32,7 @@ If you're building ASP.NET Core web apps or web APIs and want to use Azure Activ
3032
- [Protected web API that only authenticated users can access](scenario-protected-web-api-overview.md)
3133
- [Protected web API that calls another (downstream) web API on behalf of the signed-in user](scenario-web-api-call-api-overview.md)
3234

33-
## Get the library
34-
35-
You can get Microsoft Identity Web from [NuGet](#nuget), [.NET Core project templates](#project-templates), and [GitHub](#github).
36-
37-
#### NuGet
35+
## Install from NuGet
3836

3937
Microsoft Identity Web is available on NuGet as a set of packages that provide modular functionality based on your app's needs. Use the .NET CLI's `dotnet add` command or Visual Studio's **NuGet Package Manager** to install the packages appropriate for your project:
4038

@@ -43,37 +41,45 @@ Microsoft Identity Web is available on NuGet as a set of packages that provide m
4341
- [Microsoft.Identity.Web.MicrosoftGraph](https://www.nuget.org/packages/Microsoft.Identity.Web.MicrosoftGraph) - Optional. Provides simplified interaction with the Microsoft Graph API.
4442
- [Microsoft.Identity.Web.MicrosoftGraphBeta](https://www.nuget.org/packages/Microsoft.Identity.Web.MicrosoftGraphBeta) - Optional. Provides simplified interaction with the Microsoft Graph API [beta endpoint](/graph/api/overview?view=graph-rest-beta&preserve-view=true).
4543

46-
#### Project templates
44+
## Install by using a Visual Studio project template
45+
46+
Several project templates that use Microsoft Identity Web are included in .NET SDK versions 5.0 and above. The project templates aren't included in the ASP.NET Core 3.1 SDK, but you can install them separately.
4747

48-
Microsoft Identity Web project templates are included in .NET 5.0 and are available for download for ASP.NET Core 3.1 projects.
48+
### .NET 5.0+ - Project templates included
4949

50-
If you're using ASP.NET Core 3.1, install the templates with the .NET CLI:
50+
The Microsoft Identity Web project templates are included in .NET SDK versions 5.0 and above.
51+
52+
This example .NET CLI command creates a Blazor Server project that includes Microsoft Identity Web.
5153

5254
```dotnetcli
53-
dotnet new --install Microsoft.Identity.Web.ProjectTemplates::1.0.0
55+
dotnet new blazorserver --auth SingleOrg --calls-graph --client-id "00000000-0000-0000-0000-000000000000" --tenant-id "11111111-1111-1111-1111-111111111111" --output my-blazor-app
5456
```
5557

56-
The following diagram shows a high-level view of the supported app types and their relevant arguments:
58+
Don't append a `2` to the application type argument (`blazorserver` in the example) if you're using the templates included in .NET SDK 5.0+. Include the `2` suffix *only* if you're on ASP.NET Core 3.1 and you installed the templates separately as described in the next section.
5759

58-
:::image type="content" source="media/microsoft-identity-web-overview/diagram-microsoft-identity-web-templates.png" lightbox="media/microsoft-identity-web-overview/diagram-microsoft-identity-web-templates.png" alt-text="Diagram of the available dot net CLI project templates for Microsoft Identity Web":::
59-
<br /><sup><b>*</b></sup> `MultiOrg` is not supported with `webapi2`, but can be enabled in *appsettings.json* by setting tenant to `common` or `organizations`
60-
<br /><sup><b>**</b></sup> `--calls-graph` is not supported for Azure AD B2C
60+
### ASP.NET Core 3.1 - Install the project templates
6161

62-
This example .NET CLI command, taken from our [Blazor Server tutorial](tutorial-blazor-server.md), generates a new Blazor Server project that includes the right packages and starter code (placeholder values shown):
62+
If you're using ASP.NET Core 3.1, install the project templates from NuGet.
6363

6464
```dotnetcli
65-
dotnet new blazorserver2 --auth SingleOrg --calls-graph --client-id "00000000-0000-0000-0000-000000000000" --tenant-id "11111111-1111-1111-1111-111111111111" --output my-blazor-app
65+
dotnet new --install Microsoft.Identity.Web.ProjectTemplates
6666
```
6767

68-
#### GitHub
68+
For ASP.NET Core 3.1 *only*, append a `2` to the application type argument when you create a new project:
69+
70+
```dotnetcli
71+
dotnet new blazorserver2 --auth SingleOrg --calls-graph --client-id "00000000-0000-0000-0000-000000000000" --tenant-id "11111111-1111-1111-1111-111111111111" --output my-blazor-app
72+
```
6973

70-
Microsoft Identity Web is an open-source project hosted on GitHub: <a href="https://github.com/AzureAD/microsoft-identity-web" target="_blank">AzureAD/microsoft-identity-web</a>
74+
The following diagram shows several of the available app type templates and their arguments. Append a `2` to the app type argument (`blazorserver2` in the example) only if you're using the ASP.NET Core 3.1 SDK and you installed the templates by using `dotnet new --install`.
7175

72-
The [repository wiki](https://github.com/AzureAD/microsoft-identity-web/wiki) contains additional documentation, and if you need help or discover a bug, you can [file an issue](https://github.com/AzureAD/microsoft-identity-web/issues).
76+
:::image type="content" source="media/microsoft-identity-web-overview/diagram-microsoft-identity-web-templates.png" lightbox="media/microsoft-identity-web-overview/diagram-microsoft-identity-web-templates.png" alt-text="Diagram of the available dot net CLI project templates for Microsoft Identity Web":::
77+
<br /><sup><b>*</b></sup> `MultiOrg` is not supported with `webapi2`, but can be enabled in *appsettings.json* by setting tenant to `common` or `organizations`
78+
<br /><sup><b>**</b></sup> `--calls-graph` is not supported for Azure AD B2C
7379

74-
## Features
80+
## Features of the project templates
7581

76-
Microsoft Identity Web includes several features not provided if you use the default ASP.NET 3.1 project templates.
82+
Microsoft Identity Web includes several features not available in the default ASP.NET Core 3.1 project templates.
7783

7884
| Feature | ASP.NET Core 3.1 | Microsoft Identity Web |
7985
|------------------------------------------------------------------------------------------|----------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------|

articles/active-directory/enterprise-users/groups-assign-sensitivity-labels.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: enterprise-users
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/28/2021
12+
ms.date: 11/19/2021
1313
ms.author: curtand
1414
ms.reviewer: krbain
1515
ms.custom: it-pro
@@ -72,6 +72,14 @@ To apply published labels to groups, you must first enable the feature. These st
7272
Set-AzureADDirectorySetting -Id $grpUnifiedSetting.Id -DirectorySetting $setting
7373
```
7474
75+
If you’re receiving a Request_BadRequest error, it's because the settings already exist in the tenant, so when you try to create a new property:value pair, the result is an error. In this case, take the following steps:
76+
77+
1. Repeat steps 1-4 from [Enable sensitivity label support in PowerShell](#enable-sensitivity-label-support-in-powershell).
78+
1. Issue a `Get-AzureADDirectorySetting | FL` cmdlet and check the ID. If several ID values are present, use the one where you see the EnableMIPLabels property on the Values settings. You will need the ID in step 4.
79+
1. Set the EnableMIPLabels property variable: `$Setting["EnableMIPLabels"] = "True"`
80+
1. Issue the `Set-AzureADDirectorySetting -DirectorySetting $Setting -ID` cmdlet, using the ID that you retrieved in step 2.
81+
1. Ensure that the value is now correctly updated by issuing `$Setting.Values` again.
82+
7583
You will also need to synchronize your sensitivity labels to Azure AD. For instructions, see [How to enable sensitivity labels for containers and synchronize labels](/microsoft-365/compliance/sensitivity-labels-teams-groups-sites#how-to-enable-sensitivity-labels-for-containers-and-synchronize-labels).
7684
7785
## Assign a label to a new group in Azure portal

0 commit comments

Comments
 (0)