Skip to content

Commit e8c3b16

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into dev-box-pools
2 parents c08199a + baf6b13 commit e8c3b16

File tree

93 files changed

+1078
-592
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

93 files changed

+1078
-592
lines changed

.openpublishing.publish.config.json

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -986,7 +986,6 @@
986986
".openpublishing.redirection.azure-percept.json",
987987
".openpublishing.redirection.azure-productivity.json",
988988
".openpublishing.redirection.azure-australia.json",
989-
".openpublishing.redirection.aks.json",
990989
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
991990
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
992991
"articles/azure-relay/.openpublishing.redirection.relay.json",

.openpublishing.redirection.aks.json

Lines changed: 0 additions & 9 deletions
This file was deleted.

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 08/05/2022
9+
ms.date: 09/06/2022
1010
ms.author: joflore
1111
author: MicrosoftGuyJFlo
1212
manager: amycolannino
@@ -132,9 +132,9 @@ In your Conditional Access policy, you can require that an [Intune app protectio
132132

133133
To apply this grant control, Conditional Access requires that the device is registered in Azure AD, which requires using a broker app. The broker app can be either Microsoft Authenticator for iOS or Microsoft Company Portal for Android devices. If a broker app isn't installed on the device when the user attempts to authenticate, the user is redirected to the app store to install the broker app.
134134

135-
Applications must have the Intune SDK with policy assurance implemented and must meet certain other requirements to support this setting. Developers who are implementing applications with the Intune SDK can find more information on these requirements in the SDK documentation.
135+
Applications must have the Intune SDK with policy assurance implemented and must meet certain other requirements to support this setting. Developers who are implementing applications with the Intune SDK can find more information on these requirements in the [SDK documentation](/mem/intune/developer/app-sdk-get-started).
136136

137-
The following client apps support this setting:
137+
The following client apps are confirmed to support this setting:
138138

139139
- Microsoft Cortana
140140
- Microsoft Edge
@@ -153,6 +153,9 @@ The following client apps support this setting:
153153
- Microsoft Word
154154
- MultiLine for Intune
155155
- Nine Mail - Email and Calendar
156+
- Notate for Intune
157+
158+
This list is not all encompassing, if your app is not in this list please check with the application vendor to confirm support.
156159

157160
> [!NOTE]
158161
> Kaizala, Skype for Business, and Visio don't support the **Require app protection policy** grant. If you require these apps to work, use the **Require approved apps** grant exclusively. Using the "or" clause between the two grants will not work for these three applications.

articles/active-directory/manage-apps/assign-user-or-group-access-portal.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 10/23/2021
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.custom: contperf-fy22q2, contperf-fy22q3
1414

@@ -17,7 +17,7 @@ ms.custom: contperf-fy22q2, contperf-fy22q3
1717

1818
# Assign users and groups to an application
1919

20-
This article shows you how to assign users and groups to an enterprise application in Azure Active Directory (Azure AD) using PowerShell. When you assign a user to an application, the application appears in the user's [My Apps](https://myapps.microsoft.com/) portal for easy access. If the application exposes roles, you can also assign a specific role to the user.
20+
This article shows you how to assign users and groups to an enterprise application in Azure Active Directory (Azure AD) using PowerShell. When you assign a user to an application, the application appears in the user's [My Apps](https://myapps.microsoft.com/) portal for easy access. If the application exposes app roles, you can also assign a specific app role to the user.
2121

2222
When you assign a group to an application, only users in the group will have access. The assignment does not cascade to nested groups.
2323

@@ -33,7 +33,6 @@ To assign users to an app using PowerShell, you need:
3333
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3434
- If you have not yet installed the AzureAD module (use the command `Install-Module -Name AzureAD`). If you're prompted to install a NuGet module or the new Azure Active Directory V2 PowerShell module, type Y and press ENTER.
3535
- Azure Active Directory Premium P1 or P2 for group-based assignment. For more licensing requirements for the features discussed in this article, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory).
36-
- Optional: Completion of [Configure an app](add-application-portal-configure.md).
3736

3837
## Assign users, and groups, to an app using PowerShell
3938

articles/active-directory/manage-apps/configure-admin-consent-workflow.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/10/2022
11+
ms.date: 09/02/2022
1212
ms.author: ergreenl
1313
ms.collection: M365-identity-device-management
1414
ms.custom: contperf-fy22q2
@@ -34,7 +34,7 @@ To configure the admin consent workflow, you need:
3434

3535
To enable the admin consent workflow and choose reviewers:
3636

37-
1. Sign in to the [Azure portal](https://portal.azure.com) with one of the roles listed in the prerequisites.
37+
1. Sign-in to the [Azure portal](https://portal.azure.com) with one of the roles listed in the prerequisites.
3838
1. Search for and select **Azure Active Directory**.
3939
1. Select **Enterprise applications**.
4040
1. Under **Manage**, select **User settings**.
@@ -58,3 +58,5 @@ To configure the admin consent workflow programmatically, use the [Update adminC
5858
## Next steps
5959

6060
[Grant tenant-wide admin consent to an application](grant-admin-consent.md)
61+
62+
[Reivew admin consent requests](review-admin-consent-requests.md)

articles/active-directory/manage-apps/disable-user-sign-in-portal.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,19 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 09/23/2021
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.custom: it-pro
1414
ms.collection: M365-identity-device-management
1515
#customer intent: As an admin, I want to disable the way a user signs in for an application so that no user can sign in to it in Azure Active Directory.
1616
---
17-
# Disable how a user signs in for an application
17+
# Disable user sign-in for an application
18+
19+
There may be situations while configuring or managing an application where you don't want tokens to be issued for an application. Or, you may want to preemptively block an application that you do not want your employees to try to access. To accomplish this, you can disable user sign-in for the application, which will prevent all tokens from being issued for that application.
20+
21+
In this article, you will learn how to disable how a user signs in to an application in Azure Active Directory through both the Azure portal and PowerShell. If you are looking for how to block specific users from accessing an application, use [user or group assignment](./assign-user-or-group-access-portal.md).
22+
1823

19-
In this article, you disable how a user signs in to an application in Azure Active Directory.
2024

2125
## Prerequisites
2226

@@ -39,7 +43,7 @@ To disable how a user signs in, you need:
3943

4044
Ensure you have installed the AzureAD module (use the command Install-Module -Name AzureAD). In case you are prompted to install a NuGet module or the new Azure Active Directory V2 PowerShell module, type Y and press ENTER.
4145

42-
If you know the AppId of an app that doesn't appear on the Enterprise apps list (for example, because you deleted the app or the service principal hasn't yet been created due to the app being pre-authorized by Microsoft), you can manually create the service principal for the app and then disable it by using [AzureAD PowerShell cmdlet](/powershell/module/azuread/New-AzureADServicePrincipal).
46+
If you know the AppId of an app that doesn't appear on the Enterprise apps list (for example, because you deleted the app or the service principal hasn't yet been created due to the app being pre-authorized by Microsoft), you can manually create the service principal for the app and then disable it by using the cmdlet below.
4347

4448
```PowerShell
4549
# The AppId of the app to be disabled

articles/active-directory/manage-apps/grant-admin-consent.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 10/23/2021
11+
ms.date: 09/02/2022
1212
ms.author: ergreenl
1313
ms.collection: M365-identity-device-management
1414
ms.custom: contperf-fy22q2
@@ -18,13 +18,15 @@ ms.custom: contperf-fy22q2
1818

1919
# Grant tenant-wide admin consent to an application
2020

21-
In this article, you'll learn how to grant tenant-wide admin consent to an application in Azure Active Directory (Azure AD).
21+
In this article, you'll learn how to grant tenant-wide admin consent to an application in Azure Active Directory (Azure AD). To understand how individual users consent, see [Configure how end-users consent to applications](configure-user-consent.md).
2222

23-
When you grant tenant-wide admin consent to an application, all users can sign in to the app. To restrict which users can sign in to an application, configure the app to require user assignment and then assign users or groups to the application.
23+
When you grant tenant-wide admin consent to an application, you give the application access on behalf of the whole organization to the permissions requested. Granting admin consent on behalf of an organization is a sensitive operation, potentially allowing the application's publisher access to significant portions of your organization's data, or the permission to do highly privileged operations. Examples of such operations might be role management, full access to all mailboxes or all sites, and full user impersonation.
24+
25+
By default, granting tenant-wide admin consent to an application will allow all users to access the application unless otherwise restricted. To restrict which users can sign-in to an application, configure the app to [require user assignment](application-properties.md#assignment-required) and then [assign users or groups to the application](assign-user-or-group-access-portal.md).
2426

2527
Tenant-wide admin consent to an app grants the app and the app's publisher access to your organization's data. Carefully review the permissions that the application is requesting before you grant consent. For more information on consenting to applications, see [Azure Active Directory consent framework](../develop/consent-framework.md).
2628

27-
Granting tenant-wide admin consent may revoke any permissions which had previously been granted tenant-wide. Permissions which have previously been granted by users on their own behalf will not be affected.
29+
Granting tenant-wide admin consent may revoke any permissions which had previously been granted tenant-wide for that application. Permissions which have previously been granted by users on their own behalf will not be affected.
2830

2931
## Prerequisites
3032

articles/active-directory/verifiable-credentials/TOC.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,11 +38,13 @@
3838
items:
3939
- name: Directory based - Employee
4040
href: how-to-use-quickstart-verifiedemployee.md
41-
- name: ID Token Hint credentials
41+
- name: Id token hint attestation
4242
href: how-to-use-quickstart.md
43-
- name: ID Token credentials
43+
- name: Id token attestation
4444
href: how-to-use-quickstart-idtoken.md
45-
- name: Self Issued credentials
45+
- name: Presentation attestation
46+
href: how-to-use-quickstart-presentation.md
47+
- name: Self issued attestation
4648
href: how-to-use-quickstart-selfissued.md
4749
- name: Use the Verified ID Network
4850
href: how-use-vcnetwork.md

articles/active-directory/verifiable-credentials/credential-design.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ The following four attestation types are currently available to be configured in
101101

102102
* **ID token hint**: The sample App and Tutorial use the ID token Hint. When this option is configured, the relying party app will need to provide claims that should be included in the verifiable credential in the Request Service API issuance request. Where the relying party app gets the claims from is up to the app, but it can come from the current sign-in session, from backend CRM systems or even from self asserted user input. To configure this option, please see this [how to guide](how-to-use-quickstart.md)
103103

104-
* **Verifiable credentials**: The end result of an issuance flow is to produce a verifiable credential but you may also ask the user to Present a verifiable credential in order to issue one. The rules definition is able to take specific claims from the presented verifiable credential and include those claims in the newly issued verifiable credential from your organization.
104+
* **Verifiable credentials**: The end result of an issuance flow is to produce a verifiable credential but you may also ask the user to Present a verifiable credential in order to issue one. The rules definition is able to take specific claims from the presented verifiable credential and include those claims in the newly issued verifiable credential from your organization. To configure this option, please see this [how to guide](how-to-use-quickstart-presentation.md)
105105

106106
* **Self-attested claims**: When this option is selected, the user can type information directly into Authenticator. At this time, strings are the only supported input for self attested claims. To configure this option, please see this [how to guide](how-to-use-quickstart-selfissued.md)
107107

0 commit comments

Comments
 (0)