Skip to content

Commit e9f6bda

Browse files
committed
2 parents 58855ae + caaf0d5 commit e9f6bda

File tree

206 files changed

+3042
-1394
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

206 files changed

+3042
-1394
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5963,11 +5963,6 @@
59635963
"redirect_url": "/azure/reliability/cross-region-replication-azure",
59645964
"redirect_document_id": true
59655965
},
5966-
{
5967-
"source_path_from_root": "/articles/partner-solutions/index.md",
5968-
"redirect_url": "/azure/partner-solutions/overview",
5969-
"redirect_document_id": false
5970-
},
59715966
{
59725967
"source_path_from_root": "/articles/fxt-edge-filer/fxt-add-nodes.md",
59735968
"redirect_url": "/azure/fxt-edge-filer/add-nodes",

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ To use MS Graph API, and interact with resources in your Azure AD B2C tenant, yo
3939
- [Update a user](/graph/api/user-update)
4040
- [Delete a user](/graph/api/user-delete)
4141

42-
## User phone number management (beta)
42+
## User phone number management
4343

4444
A phone number that can be used by a user to sign-in using [SMS or voice calls](sign-in-options.md#phone-sign-in), or [multifactor authentication](multi-factor-authentication.md). For more information, see [Azure AD authentication methods API](/graph/api/resources/phoneauthenticationmethod).
4545

@@ -54,9 +54,9 @@ Note, the [list](/graph/api/authentication-list-phonemethods) operation returns
5454
![Enable phone sign-in](./media/microsoft-graph-operations/enable-phone-sign-in.png)
5555

5656
> [!NOTE]
57-
> In the current beta version, this API works only if the phone number is stored with a space between the country code and the phone number. The Azure AD B2C service doesn't currently add this space by default.
57+
> A correctly represented phone number is stored with a space between the country code and the phone number. The Azure AD B2C service doesn't currently add this space by default.
5858
59-
## Self-service password reset email address (beta)
59+
## Self-service password reset email address
6060

6161
An email address that can be used by a [username sign-in account](sign-in-options.md#username-sign-in) to reset the password. For more information, see [Azure AD authentication methods API](/graph/api/resources/emailauthenticationmethod).
6262

@@ -66,7 +66,7 @@ An email address that can be used by a [username sign-in account](sign-in-option
6666
- [Update](/graph/api/emailauthenticationmethod-update)
6767
- [Delete](/graph/api/emailauthenticationmethod-delete)
6868

69-
## Software OATH token authentication method (beta)
69+
## Software OATH token authentication method
7070

7171
A software OATH token is a software-based number generator that uses the OATH time-based one-time password (TOTP) standard for multifactor authentication via an authenticator app. Use the Microsoft Graph API to manage a software OATH token registered to a user:
7272

@@ -78,13 +78,14 @@ An email address that can be used by a [username sign-in account](sign-in-option
7878

7979
Manage the [identity providers](add-identity-provider.md) available to your user flows in your Azure AD B2C tenant.
8080

81-
- [List identity providers registered in the Azure AD B2C tenant](/graph/api/identityprovider-list)
82-
- [Create an identity provider](/graph/api/identityprovider-post-identityproviders)
83-
- [Get an identity provider](/graph/api/identityprovider-get)
84-
- [Update identity provider](/graph/api/identityprovider-update)
85-
- [Delete an identity provider](/graph/api/identityprovider-delete)
81+
- [List identity providers available in the Azure AD B2C tenant](/graph/api/identityproviderbase-availableprovidertypes)
82+
- [List identity providers configured in the Azure AD B2C tenant](/graph/api/iidentitycontainer-list-identityproviders)
83+
- [Create an identity provider](/graph/api/identitycontainer-post-identityproviders)
84+
- [Get an identity provider](/graph/api/identityproviderbase-get)
85+
- [Update identity provider](/graph/api/identityproviderbase-update)
86+
- [Delete an identity provider](/graph/api/identityproviderbase-delete)
8687

87-
## User flow
88+
## User flow (beta)
8889

8990
Configure pre-built policies for sign-up, sign-in, combined sign-up and sign-in, password reset, and profile update.
9091

@@ -100,7 +101,7 @@ Choose a mechanism for letting users register via local accounts. Local accounts
100101
- [Get](/graph/api/b2cauthenticationmethodspolicy-get)
101102
- [Update](/graph/api/b2cauthenticationmethodspolicy-update)
102103

103-
## Custom policies
104+
## Custom policies (beta)
104105

105106
The following operations allow you to manage your Azure AD B2C Trust Framework policies, known as [custom policies](custom-policy-overview.md).
106107

@@ -110,7 +111,7 @@ The following operations allow you to manage your Azure AD B2C Trust Framework p
110111
- [Update or create trust framework policy.](/graph/api/trustframework-put-trustframeworkpolicy)
111112
- [Delete an existing trust framework policy](/graph/api/trustframeworkpolicy-delete)
112113

113-
## Policy keys
114+
## Policy keys (beta)
114115

115116
The Identity Experience Framework stores the secrets referenced in a custom policy to establish trust between components. These secrets can be symmetric or asymmetric keys/values. In the Azure portal, these entities are shown as **Policy keys**.
116117

@@ -169,15 +170,16 @@ For more information about accessing Azure AD B2C audit logs, see [Accessing Azu
169170

170171
## Conditional Access
171172

172-
- [List all of the Conditional Access policies](/graph/api/conditionalaccessroot-list-policies?tabs=http)
173+
- [List the built-in templates for Conditional Access policy scenarios](/graph/api/conditionalaccessroot-list-templates)
174+
- [List all of the Conditional Access policies](/graph/api/conditionalaccessroot-list-policies)
173175
- [Read properties and relationships of a Conditional Access policy](/graph/api/conditionalaccesspolicy-get)
174176
- [Create a new Conditional Access policy](/graph/api/resources/application)
175177
- [Update a Conditional Access policy](/graph/api/conditionalaccesspolicy-update)
176178
- [Delete a Conditional Access policy](/graph/api/conditionalaccesspolicy-delete)
177179

178180
## Retrieve or restore deleted users and applications
179181

180-
Deleted items can only be restored if they were deleted within the last 30 days.
182+
Deleted users and apps can only be restored if they were deleted within the last 30 days.
181183

182184
- [List deleted items](/graph/api/directory-deleteditems-list)
183185
- [Get a deleted item](/graph/api/directory-deleteditems-get)

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,9 @@ Applications and systems that support customization of the attribute list includ
120120
> [!NOTE]
121121
> Editing the list of supported attributes is only recommended for administrators who have customized the schema of their applications and systems, and have first-hand knowledge of how their custom attributes have been defined or if a source attribute is not automatically displayed in the Azure Portal UI. This sometimes requires familiarity with the APIs and developer tools provided by an application or system. The ability to edit the list of supported attributes is locked down by default, but customers can enable the capability by navigating to the following URL: https://portal.azure.com/?Microsoft_AAD_Connect_Provisioning_forceSchemaEditorEnabled=true . You can then navigate to your application to view the attribute list as described [above](#editing-the-list-of-supported-attributes).
122122
123+
> [!NOTE]
124+
> When a directory extension attribute in Azure AD does not show up automatically in your attribute mapping drop-down, you can manually add it to the "Azure AD attribute list". When manually adding Azure AD directory extension attributes to your provisioning app, note that directory extension attribute names are case-sensitive. For example: If you have a directory extension attribute named `extension_53c9e2c0exxxxxxxxxxxxxxxx _acneCostCenter`, make sure you enter it in the same format as defined in the directory.
125+
123126
When editing the list of supported attributes, the following properties are provided:
124127

125128
- **Name** - The system name of the attribute, as defined in the target object's schema.

articles/active-directory/app-provisioning/on-premises-migrate-microsoft-identity-manager.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,13 +43,13 @@ At this point, the MIM Sync server is no longer needed.
4343

4444
## Import a connector configuration
4545

46-
1. Install the ECMA Connector host and provisioning agent on a Windows Server, using the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#download-install-and-configure-the-azure-ad-connect-provisioning-agent-package) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#download-install-and-configure-the-azure-ad-connect-provisioning-agent-package) articles.
46+
1. Install the ECMA Connector host and provisioning agent on a Windows Server, using the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#3-install-and-configure-the-azure-ad-connect-provisioning-agent) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#download-install-and-configure-the-azure-ad-connect-provisioning-agent-package) articles.
4747
1. Sign in to the Windows server as the account that the Azure AD ECMA Connector Host runs as.
4848
1. Change to the directory C:\Program Files\Microsoft ECMA2host\Service\ECMA. Ensure there are one or more DLLs already present in that directory. Those DLLs correspond to Microsoft-delivered connectors.
4949
1. Copy the MA DLL for your connector, and any of its prerequisite DLLs, to that same ECMA subdirectory of the Service directory.
5050
1. Change to the directory C:\Program Files\Microsoft ECMA2Host\Wizard. Run the program Microsoft.ECMA2Host.ConfigWizard.exe to set up the ECMA Connector Host configuration.
5151
1. A new window appears with a list of connectors. By default, no connectors will be present. Select **New connector**.
52-
1. Specify the management agent XML file that was exported from MIM Sync earlier. Continue with the configuration and schema-mapping instructions from the section "Create a connector" in either the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#create-a-generic-sql-connector) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#configure-a-generic-ldap-connector) articles.
52+
1. Specify the management agent XML file that was exported from MIM Sync earlier. Continue with the configuration and schema-mapping instructions from the section "Create a connector" in either the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#6-create-a-generic-sql-connector) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#configure-a-generic-ldap-connector) articles.
5353

5454
## Next steps
5555

articles/active-directory/authentication/concept-certificate-based-authentication-smartcard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/05/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: justinha
1212
author: vimrang
@@ -77,7 +77,7 @@ The Windows smart card sign-in works with the latest preview build of Windows 11
7777
7878
## Restrictions and caveats
7979

80-
- Azure AD CBA is supported on Windows Hybrid or Azure AD Joined.
80+
- Azure AD CBA is supported on Windows devices that are hybrid or Azure AD joined.
8181
- Users must be in a managed domain or using Staged Rollout and can't use a federated authentication model.
8282

8383
## Next steps

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/23/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -93,7 +93,7 @@ For both modes, users who have previously registered a method that can be used f
9393

9494
### Interrupt mode
9595

96-
Combined registration adheres to both multifactor authentication and SSPR policies, if both are enabled for your tenant. These policies control whether a user is interrupted for registration during sign-in and which methods are available for registration. If only an SSPR policy is enabled, then users will be able to skip the registration interruption and complete it at a later time.
96+
Combined registration adheres to both multifactor authentication and SSPR policies, if both are enabled for your tenant. These policies control whether a user is interrupted for registration during sign-in and which methods are available for registration. If only an SSPR policy is enabled, then users will be able to skip (indefinitely) the registration interruption and complete it at a later time.
9797

9898
The following are sample scenarios where users might be prompted to register or refresh their security info:
9999

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 05/04/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -51,7 +51,7 @@ The following Azure AD password policy options are defined. Unless noted, you ca
5151
| Characters allowed |<ul><li>A – Z</li><li>a - z</li><li>0 – 9</li> <li>@ # $ % ^ & * - _ ! + = [ ] { } &#124; \ : ' , . ? / \` ~ " ( ) ; < ></li> <li>blank space</li></ul> |
5252
| Characters not allowed | Unicode characters. |
5353
| Password restrictions |<ul><li>A minimum of 8 characters and a maximum of 256 characters.</li><li>Requires three out of four of the following:<ul><li>Lowercase characters.</li><li>Uppercase characters.</li><li>Numbers (0-9).</li><li>Symbols (see the previous password restrictions).</li></ul></li></ul> |
54-
| Password expiry duration (Maximum password age) |<ul><li>Default value: **90** days.</li><li>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet from the Azure Active Directory Module for Windows PowerShell.</li></ul> |
54+
| Password expiry duration (Maximum password age) |<ul><li>Default value: **90** days. If the tenant was created after 2021, it has no default expiration value. You can check current policy with [Get-MsolPasswordPolicy](/powershell/module/msonline/get-msolpasswordpolicy).</li><li>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet from the Azure Active Directory Module for Windows PowerShell.</li></ul> |
5555
| Password expiry notification (When users are notified of password expiration) |<ul><li>Default value: **14** days (before password expires).</li><li>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet.</li></ul> |
5656
| Password expiry (Let passwords never expire) |<ul><li>Default value: **false** (indicates that password's have an expiration date).</li><li>The value can be configured for individual user accounts by using the `Set-MsolUser` cmdlet.</li></ul> |
5757
| Password change history | The last password *can't* be used again when the user changes a password. |

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ In this example, you create a policy that emits a custom claim "JoinedData" to J
123123
1. To create the policy, run the following command:
124124
125125
```powershell
126-
New-AzureADPolicy -Definition @('{"ClaimsMappingPolicy":{"Version":1,"IncludeBasicClaimSet":"true", "ClaimsSchema":[{"Source":"user","ID":"extensionattribute1"},{"Source":"transformation","ID":"DataJoin","TransformationId":"JoinTheData","JwtClaimType":"JoinedData"}],"ClaimsTransformations":[{"ID":"JoinTheData","TransformationMethod":"Join","InputClaims":[{"ClaimTypeReferenceId":"extensionattribute1","TransformationClaimType":"string1"}], "InputParameters": [{"ID":"string2","Value":"sandbox"},{"ID":"separator","Value":"."}],"OutputClaims":[{"ClaimTypeReferenceId":"DataJoin","TransformationClaimType":"outputClaim"}]}]}}') -DisplayName "TransformClaimsExample" -Type "ClaimsMappingPolicy"
126+
New-AzureADPolicy -Definition @('{"ClaimsMappingPolicy":{"Version":1,"IncludeBasicClaimSet":"true", "ClaimsSchema":[{"Source":"user","ID":"extensionattribute1"},{"Source":"transformation","ID":"DataJoin","TransformationId":"JoinTheData","JwtClaimType":"JoinedData"}],"ClaimsTransformation":[{"ID":"JoinTheData","TransformationMethod":"Join","InputClaims":[{"ClaimTypeReferenceId":"extensionattribute1","TransformationClaimType":"string1"}], "InputParameters": [{"ID":"string2","Value":"sandbox"},{"ID":"separator","Value":"."}],"OutputClaims":[{"ClaimTypeReferenceId":"DataJoin","TransformationClaimType":"outputClaim"}]}]}}') -DisplayName "TransformClaimsExample" -Type "ClaimsMappingPolicy"
127127
```
128128
129129
2. To see your new policy, and to get the policy ObjectId, run the following command:

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 29 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -305,9 +305,9 @@ This section covers the configuration options under optional claims for changing
305305
| **name:** | Must be "groups" |
306306
| **source:** | Not used. Omit or specify null |
307307
| **essential:** | Not used. Omit or specify false |
308-
| **additionalProperties:** | List of additional properties. Valid options are "sam_account_name", "dns_domain_and_sam_account_name", "netbios_domain_and_sam_account_name", "emit_as_roles" |
308+
| **additionalProperties:** | List of additional properties. Valid options are "sam_account_name", "dns_domain_and_sam_account_name", "netbios_domain_and_sam_account_name", "emit_as_roles" and “cloud_displayname” |
309309

310-
In additionalProperties only one of "sam_account_name", "dns_domain_and_sam_account_name", "netbios_domain_and_sam_account_name" are required. If more than one is present, the first is used and any others ignored.
310+
In additionalProperties only one of "sam_account_name", "dns_domain_and_sam_account_name", "netbios_domain_and_sam_account_name" are required. If more than one is present, the first is used and any others ignored. Additionally you can add “cloud_displayname” to emit display name of the cloud group. Note, that this option works only when `“groupMembershipClaims”` is set to `“ApplicationGroup”`.
311311

312312
Some applications require group information about the user in the role claim. To change the claim type from a group claim to a role claim, add "emit_as_roles" to additional properties. The group values will be emitted in the role claim.
313313

@@ -366,6 +366,33 @@ This section covers the configuration options under optional claims for changing
366366
]
367367
}
368368
```
369+
3) Emit group names in the format of samAccountName for on-prem synced groups and display name for cloud groups in SAML and OIDC ID Tokens for the groups assigned to the application:
370+
371+
**Application manifest entry:**
372+
373+
```json
374+
"groupMembershipClaims": "ApplicationGroup",
375+
"optionalClaims": {
376+
"saml2Token": [
377+
{
378+
"name": "groups",
379+
"additionalProperties": [
380+
"sam_account_name",
381+
"cloud_displayname"
382+
]
383+
}
384+
],
385+
"idToken": [
386+
{
387+
"name": "groups",
388+
"additionalProperties": [
389+
"sam_account_name",
390+
"cloud_displayname"
391+
]
392+
}
393+
]
394+
}
395+
```
369396

370397
## Optional claims example
371398

articles/active-directory/develop/delegated-and-app-perms.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: develop
1010
ms.custom: aaddev
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 09/27/2021
13+
ms.date: 11/10/2022
1414
ms.author: ryanwi
1515
ROBOTS: NOINDEX
1616
---
@@ -20,6 +20,7 @@ ROBOTS: NOINDEX
2020
## Recommended documents
2121

2222
- Learn more about how client applications use [delegated and application permission requests](developer-glossary.md#permissions) to access resources.
23+
- Learn about [delegated and application permissions](permissions-consent-overview.md).
2324
- See step-by-step instructions on how to [configure a client application's permission requests](quickstart-configure-app-access-web-apis.md)
2425
- For more depth, learn how resource applications expose [scopes](developer-glossary.md#scopes) and [application roles](developer-glossary.md#roles) to client applications, which manifest as delegated and application permissions respectively in the Azure portal.
2526

0 commit comments

Comments
 (0)