Skip to content

Commit ea26c55

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into endpoint
2 parents 58e553e + 46883b3 commit ea26c55

File tree

122 files changed

+1258
-892
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

122 files changed

+1258
-892
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40291,6 +40291,16 @@
4029140291
"redirect_url": "/azure/governance/policy/samples/index",
4029240292
"redirect_document_id": false
4029340293
},
40294+
{
40295+
"source_path": "articles/governance/policy/concepts/rego-for-aks.md",
40296+
"redirect_url": "/azure/governance/policy/concepts/policy-for-kubernetes",
40297+
"redirect_document_id": false
40298+
},
40299+
{
40300+
"source_path": "articles/governance/policy/concepts/aks-engine.md",
40301+
"redirect_url": "/azure/governance/policy/concepts/policy-for-kubernetes",
40302+
"redirect_document_id": false
40303+
},
4029440304
{
4029540305
"source_path": "articles/azure-stack/azure-stack-tools-paas-services.md",
4029640306
"redirect_url": "/azure/azure-stack/azure-stack-offer-services-overview",

articles/active-directory/authentication/howto-mfaserver-deploy-userportal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Installing the user portal on a server other than the Azure Multi-Factor Authent
102102
* Find the key **"USE_WEB_SERVICE_SDK"** and change **value="false"** to **value="true"**
103103
* Find the key **"WEB_SERVICE_SDK_AUTHENTICATION_USERNAME"** and change **value=""** to **value="DOMAIN\User"** where DOMAIN\User is a Service Account that is a part of "PhoneFactor Admins" Group.
104104
* Find the key **"WEB_SERVICE_SDK_AUTHENTICATION_PASSWORD"** and change **value=""** to **value="Password"** where Password is the password for the Service Account entered in the previous line.
105-
* Find the value **https://www.contoso.com/MultiFactorAuthWebServiceSdk/PfWsSdk.asmx** and change this placeholder URL to the Web Service SDK URL we installed in step 2.
105+
* Find the value `https://www.contoso.com/MultiFactorAuthWebServiceSdk/PfWsSdk.asmx` and change this placeholder URL to the Web Service SDK URL we installed in step 2.
106106
* Save the Web.Config file and close Notepad.
107107

108108
6. Open a web browser from any computer and navigate to the URL where the user portal was installed (Example: `https://mfa.contoso.com/MultiFactorAuth`). Ensure that no certificate warnings or errors are displayed.

articles/active-directory/b2b/facebook-federation.md

Lines changed: 36 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ ms.collection: M365-identity-device-management
2020
# Add Facebook as an identity provider for External Identities
2121

2222
You can add Facebook to your self-service sign-up user flows (Preview) so that users can sign in to your applications using their own Facebook accounts. To allow users to sign in using Facebook, you'll first need to [enable self-service sign-up](self-service-sign-up-user-flow.md) for your tenant. After you add Facebook as an identity provider, set up a user flow for the application and select Facebook as one of the sign-in options.
23+
> [!NOTE]
24+
> Users can only use their Facebook accounts to sign up through apps using self-service sign-up and user flows. Users cannot be invited and redeem their invitation using a Facebook account.
2325
2426
## Create an app in the Facebook developers console
2527

@@ -51,7 +53,9 @@ To use a Facebook account as an [identity provider](identity-providers.md), you
5153
18. To make your Facebook application available to Azure AD, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point the Status should change from **Development** to **Live**.
5254

5355
## Configure a Facebook account as an identity provider
56+
Now you'll set the Facebook client ID and client secret, either by entering it in the Azure AD portal or by using PowerShell. You can test your Facebook configuration by signing up via a user flow on an app enabled for self-service sign-up.
5457

58+
### To configure Facebook federation in the Azure AD portal
5559
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of your Azure AD tenant.
5660
2. Under **Azure services**, select **Azure Active Directory**.
5761
3. In the left menu, select **External Identities**.
@@ -62,8 +66,39 @@ To use a Facebook account as an [identity provider](identity-providers.md), you
6266
![Screenshot showing the Add social identity provider page](media/facebook-federation/add-social-identity-provider-page.png)
6367

6468
7. Select **Save**.
69+
### To configure Facebook federation by using PowerShell
70+
1. Install the latest version of the Azure AD PowerShell for Graph module ([AzureADPreview](https://www.powershellgallery.com/packages/AzureADPreview)).
71+
2. Run the following command:
72+
`Connect-AzureAD`.
73+
3. At the sign-in prompt, sign in with the managed Global Administrator account.
74+
4. Run the following command:
75+
76+
`New-AzureADMSIdentityProvider -Type Facebook -Name Facebook -ClientId [Client ID] -ClientSecret [Client secret]`
77+
78+
> [!NOTE]
79+
> Use the client ID and client secret from the app you created above in the Facebook developer console. For more information, see the [New-AzureADMSIdentityProvider](https://docs.microsoft.com/powershell/module/azuread/new-azureadmsidentityprovider?view=azureadps-2.0-preview) article.
80+
81+
## How do I remove Facebook federation?
82+
You can delete your Facebook federation setup. If you do so, any users who have signed up through user flows with their Facebook accounts will no longer be able to log in.
83+
84+
### To delete Facebook federation in the Azure AD portal:
85+
1. Go to the [Azure portal](https://portal.azure.com). In the left pane, select **Azure Active Directory**.
86+
2. Select **External Identities**.
87+
3. Select **All identity providers**.
88+
4. On the **Facebook** line, select the context menu (**...**) and then select **Delete**.
89+
5. Select **Yes** to confirm deletion.
90+
91+
### To delete Facebook federation by using PowerShell:
92+
1. Install the latest version of the Azure AD PowerShell for Graph module ([AzureADPreview](https://www.powershellgallery.com/packages/AzureADPreview)).
93+
2. Run `Connect-AzureAD`.
94+
4. In the sign-in prompt, sign in with the managed Global Administrator account.
95+
5. Enter the following command:
96+
97+
`Remove-AzureADMSIdentityProvider -Id Facebook-OAUTH`
98+
99+
> [!NOTE]
100+
> For more information, see [Remove-AzureADMSIdentityProvider](https://docs.microsoft.com/powershell/module/azuread/Remove-AzureADMSIdentityProvider?view=azureadps-2.0-preview).
65101
66102
## Next steps
67103

68-
- [Invite external users for collaboration](add-users-administrator.md)
69104
- [Add self-service sign-up to an app](self-service-sign-up-user-flow.md)

articles/active-directory/conditional-access/app-protection-based-conditional-access.md

Lines changed: 38 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 04/02/2020
9+
ms.date: 05/08/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -19,10 +19,11 @@ ms.collection: M365-identity-device-management
1919

2020
People regularly use their mobile devices for both personal and work tasks. While making sure staff can be productive, organizations also want to prevent data loss from potentially unsecure applications. With Conditional Access, organizations can restrict access to approved (modern authentication capable) client apps with Intune app protection policies applied to them.
2121

22-
This article presents two scenarios to configure Conditional Access policies for resources like Office 365, Exchange Online, and SharePoint Online.
22+
This article presents three scenarios to configure Conditional Access policies for resources like Office 365, Exchange Online, and SharePoint Online.
2323

2424
- [Scenario 1: Office 365 apps require approved apps with app protection policies](#scenario-1-office-365-apps-require-approved-apps-with-app-protection-policies)
25-
- [Scenario 2: Exchange Online and SharePoint Online require an approved client app and app protection policy](#scenario-2-exchange-online-and-sharepoint-online-require-an-approved-client-app-and-app-protection-policy)
25+
- [Scenario 2: Browser apps require approved apps with app protection policies](#scenario-2-browser-apps-require-approved-apps-with-app-protection-policies)
26+
- [Scenario 3: Exchange Online and SharePoint Online require an approved client app and app protection policy](#scenario-3-exchange-online-and-sharepoint-online-require-an-approved-client-app-and-app-protection-policy)
2627

2728
In the Conditional Access, these client apps are known to be protected with an app protection policy. More information about app protection policies can be found in the article, [App protection policies overview](/intune/apps/app-protection-policy)
2829

@@ -83,7 +84,40 @@ For the Conditional Access policy in this step, configure the following componen
8384

8485
Review the article [How to create and assign app protection policies](/intune/apps/app-protection-policies), for steps to create app protection policies for Android and iOS.
8586

86-
## Scenario 2: Exchange Online and SharePoint Online require an approved client app and app protection policy
87+
## Scenario 2: Browser apps require approved apps with app protection policies
88+
89+
In this scenario, Contoso has decided that all mobile web browsing access to Office 365 resources must use an approved client app, like Edge for iOS and Android, protected by an app protection policy prior to receiving access. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
90+
91+
Organizations must complete the following steps in order to require the use of an approved client app on mobile devices.
92+
93+
**Step 1: Configure an Azure AD Conditional Access policy for Office 365**
94+
95+
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
96+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
97+
1. Select **New policy**.
98+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
99+
1. Under **Assignments**, select **Users and groups**
100+
1. Under **Include**, select **All users** or the specific **Users and groups** you wish to apply this policy to.
101+
1. Select **Done**.
102+
1. Under **Cloud apps or actions** > **Include**, select **Office 365 (preview)**.
103+
1. Under **Conditions**, select **Device platforms**.
104+
1. Set **Configure** to **Yes**.
105+
1. Include **Android** and **iOS**.
106+
1. Under **Conditions**, select **Client apps (preview)**.
107+
1. Set **Configure** to **Yes**.
108+
1. Select **Browser**.
109+
1. Under **Access controls** > **Grant**, select the following options:
110+
- **Require approved client app**
111+
- **Require app protection policy (preview)**
112+
- **Require all the selected controls**
113+
1. Confirm your settings and set **Enable policy** to **On**.
114+
1. Select **Create** to create and enable your policy.
115+
116+
**Step 2: Configure Intune app protection policy for iOS and Android client applications**
117+
118+
Review the article [How to create and assign app protection policies](/intune/apps/app-protection-policies), for steps to create app protection policies for Android and iOS.
119+
120+
## Scenario 3: Exchange Online and SharePoint Online require an approved client app and app protection policy
87121

88122
In this scenario, Contoso has decided that users may only access email and SharePoint data on mobile devices as long as they use an approved client app like Outlook mobile protected by an app protection policy prior to receiving access. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
89123

articles/active-directory/develop/quickstart-v2-python-webapp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ When you've completed the guide, your application will accept sign-ins of person
2525
To run this sample, you will need:
2626

2727
- [Python 2.7+](https://www.python.org/downloads/release/python-2713) or [Python 3+](https://www.python.org/downloads/release/python-364/)
28-
- [Flask](http://flask.pocoo.org/), [Flask-Session](https://pythonhosted.org/Flask-Session/), [requests](https://requests.kennethreitz.org/en/master/)
28+
- [Flask](http://flask.pocoo.org/), [Flask-Session](https://pypi.org/project/Flask-Session/), [requests](https://requests.kennethreitz.org/en/master/)
2929
- [MSAL Python](https://github.com/AzureAD/microsoft-authentication-library-for-python)
3030

3131
> [!div renderon="docs"]

articles/active-directory/develop/registration-config-multi-tenant-application-add-to-gallery-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.reviewer: jeedes
2121

2222
## What is the Azure AD application gallery?
2323

24-
Azure Active Directory (Azure AD) is a cloud-based identity service. The [Azure AD application gallery](https://azure.microsoft.com/marketplace/active-directory/all/) is in the Azure Marketplace app store, where all application connectors are published for single sign-on and user provisioning. Customers who use Azure AD as an identity provider find the different SaaS application connectors published here. IT administrators add connectors from the app gallery, and then configure and use the connectors for single sign-on and provisioning. Azure AD supports all major federation protocols, including SAML 2.0, OpenID Connect, OAuth, and WS-Fed for single sign-on.
24+
Azure Active Directory (Azure AD) is a cloud-based identity service. The [Azure AD application gallery](https://azuremarketplace.microsoft.com/marketplace/apps/Microsoft.AzureActiveDirectory) is in the Azure Marketplace app store, where all application connectors are published for single sign-on and user provisioning. Customers who use Azure AD as an identity provider find the different SaaS application connectors published here. IT administrators add connectors from the app gallery, and then configure and use the connectors for single sign-on and provisioning. Azure AD supports all major federation protocols, including SAML 2.0, OpenID Connect, OAuth, and WS-Fed for single sign-on.
2525

2626
## If your application supports SAML or OpenIDConnect
2727
If you have a multitenant application that you want listed in the Azure AD application gallery, you must first make sure that your application supports one of the following single sign-on technologies:

articles/active-directory/fundamentals/active-directory-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ We do have a gateway that filters requests and provides some protection from bot
149149

150150
**A:** Azure AD has more than 2,600 pre-integrated applications from Microsoft, application service providers, and partners. All pre-integrated applications support single sign-on (SSO). SSO lets you use your organizational credentials to access your apps. Some of the applications also support automated provisioning and de-provisioning.
151151

152-
For a complete list of the pre-integrated applications, see the [Active Directory Marketplace](https://azure.microsoft.com/marketplace/active-directory/).
152+
For a complete list of the pre-integrated applications, see the [Active Directory Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps/Microsoft.AzureActiveDirectory).
153153

154154
---
155155
**Q: What if the application I need is not in the Azure AD marketplace?**

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1841,7 +1841,7 @@ For more information about group-based licensing, see [What is group-based licen
18411841

18421842
In November 2018, we've added these 26 new apps with Federation support to the app gallery:
18431843

1844-
[CoreStack](https://cloud.corestack.io/site/login), [HubSpot](https://docs.microsoft.com/azure/active-directory/saas-apps/HubSpot-tutorial), [GetThere](https://docs.microsoft.com/azure/active-directory/saas-apps/getthere-tutorial), [Gra-Pe](https://docs.microsoft.com/azure/active-directory/saas-apps/grape-tutorial), [eHour](https://getehour.com/try-now), [Consent2Go](https://docs.microsoft.com/azure/active-directory/saas-apps/Consent2Go-tutorial), [Appinux](https://docs.microsoft.com/azure/active-directory/saas-apps/appinux-tutorial), [DriveDollar](https://azuremarketplace.microsoft.com/marketplace/apps/savitas.drivedollar-azuread?tab=Overview), [Useall](https://docs.microsoft.com/azure/active-directory/saas-apps/useall-tutorial), [Infinite Campus](https://docs.microsoft.com/azure/active-directory/saas-apps/infinitecampus-tutorial), [Alaya](https://alayagood.com/en/demo/), [HeyBuddy](https://docs.microsoft.com/azure/active-directory/saas-apps/heybuddy-tutorial), [Wrike SAML](https://docs.microsoft.com/azure/active-directory/saas-apps/wrike-tutorial), [Drift](https://docs.microsoft.com/azure/active-directory/saas-apps/drift-tutorial), [Zenegy for Business Central 365](https://accounting.zenegy.com/), [Everbridge Member Portal](https://docs.microsoft.com/azure/active-directory/saas-apps/everbridge-tutorial), [IDEO](https://profile.ideo.com/users/sign_up), [Ivanti Service Manager (ISM)](https://docs.microsoft.com/azure/active-directory/saas-apps/ivanti-service-manager-tutorial), [Peakon](https://docs.microsoft.com/azure/active-directory/saas-apps/peakon-tutorial), [Allbound SSO](https://docs.microsoft.com/azure/active-directory/saas-apps/allbound-sso-tutorial), [Plex Apps - Classic Test](https://test.plexonline.com/signon), [Plex Apps – Classic](https://www.plexonline.com/signon), [Plex Apps - UX Test](https://test.cloud.plex.com/sso), [Plex Apps – UX](https://cloud.plex.com/sso), [Plex Apps – IAM](https://accounts.plex.com/), [CRAFTS - Childcare Records, Attendance, & Financial Tracking System](https://getcrafts.ca/craftsregistration)
1844+
[CoreStack](https://cloud.corestack.io/site/login), [HubSpot](https://docs.microsoft.com/azure/active-directory/saas-apps/HubSpot-tutorial), [GetThere](https://docs.microsoft.com/azure/active-directory/saas-apps/getthere-tutorial), [Gra-Pe](https://docs.microsoft.com/azure/active-directory/saas-apps/grape-tutorial), [eHour](https://getehour.com/try-now), [Consent2Go](https://docs.microsoft.com/azure/active-directory/saas-apps/Consent2Go-tutorial), [Appinux](https://docs.microsoft.com/azure/active-directory/saas-apps/appinux-tutorial), [DriveDollar](https://azuremarketplace.microsoft.com/marketplace/apps/savitas.drivedollar-azuread?tab=Overview), [Useall](https://docs.microsoft.com/azure/active-directory/saas-apps/useall-tutorial), [Infinite Campus](https://docs.microsoft.com/azure/active-directory/saas-apps/infinitecampus-tutorial), [Alaya](https://alayagood.com), [HeyBuddy](https://docs.microsoft.com/azure/active-directory/saas-apps/heybuddy-tutorial), [Wrike SAML](https://docs.microsoft.com/azure/active-directory/saas-apps/wrike-tutorial), [Drift](https://docs.microsoft.com/azure/active-directory/saas-apps/drift-tutorial), [Zenegy for Business Central 365](https://accounting.zenegy.com/), [Everbridge Member Portal](https://docs.microsoft.com/azure/active-directory/saas-apps/everbridge-tutorial), [IDEO](https://profile.ideo.com/users/sign_up), [Ivanti Service Manager (ISM)](https://docs.microsoft.com/azure/active-directory/saas-apps/ivanti-service-manager-tutorial), [Peakon](https://docs.microsoft.com/azure/active-directory/saas-apps/peakon-tutorial), [Allbound SSO](https://docs.microsoft.com/azure/active-directory/saas-apps/allbound-sso-tutorial), [Plex Apps - Classic Test](https://test.plexonline.com/signon), [Plex Apps – Classic](https://www.plexonline.com/signon), [Plex Apps - UX Test](https://test.cloud.plex.com/sso), [Plex Apps – UX](https://cloud.plex.com/sso), [Plex Apps – IAM](https://accounts.plex.com/), [CRAFTS - Childcare Records, Attendance, & Financial Tracking System](https://getcrafts.ca/craftsregistration)
18451845

18461846
For more information about the apps, see [SaaS application integration with Azure Active Directory](https://aka.ms/appstutorial). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](https://aka.ms/azureadapprequest).
18471847

0 commit comments

Comments
 (0)