Skip to content

Commit f36e38c

Browse files
authored
Merge pull request #227737 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST 02/17
2 parents 99b7dfa + 9727ba2 commit f36e38c

File tree

172 files changed

+3658
-2257
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

172 files changed

+3658
-2257
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,11 @@
5555
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
5656
"redirect_document_id": false
5757
},
58+
{
59+
"source_path_from_root": "/articles/active-directory/saas-apps/trello-tutorial.md",
60+
"redirect_url": "/azure/active-directory/saas-apps/atlassian-cloud-tutorial",
61+
"redirect_document_id": false
62+
},
5863
{
5964
"source_path_from_root": "/articles/active-directory/saas-apps/iauditor-tutorial.md",
6065
"redirect_url": "/azure/active-directory/saas-apps/safety-culture-tutorial",

.openpublishing.redirection.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13241,7 +13241,7 @@
1324113241
},
1324213242
{
1324313243
"source_path_from_root": "/articles/logic-apps/logic-apps-monitor-your-logic-apps-oms.md",
13244-
"redirect_url": "/azure/logic-apps/monitor-logic-apps-log-analytics",
13244+
"redirect_url": "/azure/logic-apps/monitor-workflows-collect-diagnostic-data",
1324513245
"redirect_document_id": false
1324613246
},
1324713247
{
@@ -13339,6 +13339,12 @@
1333913339
"redirect_url": "/connectors/custom-connectors/submit-certification",
1334013340
"redirect_document_id": false
1334113341
},
13342+
{
13343+
"source_path_from_root": "/articles/logic-apps/monitor-logic-apps-log-analytics.md",
13344+
"redirect_url": "/azure/logic-apps/monitor-workflows-collect-diagnostic-data",
13345+
"redirect_document_id": true
13346+
},
13347+
1334213348
{
1334313349
"source_path_from_root": "/articles/connectors/connectors-create-api-sharepointonline.md",
1334413350
"redirect_url": "/azure/connectors/connectors-create-api-sharepoint",

articles/active-directory/authentication/concept-certificate-based-authentication-smartcard.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,9 @@ Some customers may maintain different and sometimes may have non-routable UPN va
5454
>[!NOTE]
5555
>In all cases, a user supplied username login hint (X509UserNameHint) will be sent if provided. For more information, see [User Name Hint](/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings#allow-user-name-hint)
5656
57+
>[!IMPORTANT]
58+
> If a user supplies a username login hint (X509UserNameHint), the value provided **MUST** be in UPN Format.
59+
5760
For more information about the Windows flow, see [Certificate Requirements and Enumeration (Windows)](/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration).
5861

5962
## Supported Windows platforms

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,8 +78,8 @@ Deploying the configuration change to enable SSPR from the login screen using Mi
7878

7979
1. Sign in to the [Azure portal](https://portal.azure.com) and select **Endpoint Manager**.
8080
1. Create a new device configuration profile by going to **Device configuration** > **Profiles**, then select **+ Create Profile**
81-
- For **Platform** choose *Windows 11 and later*
82-
- For **Profile type**, choose *Custom*
81+
- For **Platform** choose *Windows 10 and later*
82+
- For **Profile type**, choose Templates then select the Custom template below
8383
1. Select **Create**, then provide a meaningful name for the profile, such as *Windows 11 sign-in screen SSPR*
8484

8585
Optionally, provide a meaningful description of the profile, then select **Next**.

articles/active-directory/cloud-infrastructure-entitlement-management/ui-autopilot.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,13 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: overview
11-
ms.date: 02/23/2022
11+
ms.date: 02/16/2023
1212
ms.author: jfields
1313
---
1414

1515
# View rules in the Autopilot dashboard
1616

17-
The **Autopilot** dashboard in Permissions Management provides a table of information about **Autopilot rules** for administrators.
17+
The **Autopilot** dashboard in Permissions Management provides a table of information about Autopilot rules for administrators. Creating Autopilot rules allows you to automate right-sizing policies so you can automatically remove unused roles and permissions assigned to identities in your authorization system.
1818

1919

2020
> [!NOTE]
@@ -30,13 +30,13 @@ The **Autopilot** dashboard in Permissions Management provides a table of inform
3030
The following information displays in the **Autopilot Rules** table:
3131

3232
- **Rule Name**: The name of the rule.
33-
- **State**: The status of the rule: idle (not being use) or active (being used).
34-
- **Rule Type**: The type of rule being applied.
33+
- **State**: The status of the rule: idle (not in use) or active (in use).
34+
- **Rule Type**: The type of rule that's applied.
3535
- **Mode**: The status of the mode: on-demand or not.
3636
- **Last Generated**: The date and time the rule was last generated.
3737
- **Created By**: The email address of the user who created the rule.
3838
- **Last Modified**: The date and time the rule was last modified.
39-
- **Subscription**: Provides an **On** or **Off** subscription that allows you to receive email notifications when recommendations have been generated, applied, or unapplied.
39+
- **Subscription**: Provides an **On** or **Off** subscription that allows you to receive email notifications when recommendations are generated, applied, or unapplied.
4040

4141
## View other available options for rules
4242

@@ -48,7 +48,7 @@ The **Autopilot** dashboard in Permissions Management provides a table of inform
4848
- **Delete Rule**: Select to delete the rule. Only the user who created the selected rule can delete the rule.
4949
- **Generate Recommendations**: Creates recommendations for each user and the authorization system. Only the user who created the selected rule can create recommendations.
5050
- **View Recommendations**: Displays the recommendations for each user and authorization system.
51-
- **Notification Settings**: Displays the users subscribed to this rule. Only the user who created the selected rule can add other users to be notified.
51+
- **Notification Settings**: Displays the users subscribed to this rule. Only the user who created the selected rule can add other users to receive notifications.
5252

5353
You can also select:
5454

articles/active-directory/cloud-sync/what-is-cloud-sync.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The following table provides a comparison between Azure AD Connect and Azure AD
5151
| Allow basic customization for attribute flows |||
5252
| Synchronize Exchange online attributes |||
5353
| Synchronize extension attributes 1-15 |||
54-
| Synchronize customer defined AD attributes (directory extensions) || |
54+
| Synchronize customer defined AD attributes (directory extensions) |||
5555
| Support for Password Hash Sync |||
5656
| Support for Pass-Through Authentication |||
5757
| Support for federation |||

articles/active-directory/external-identities/authentication-conditional-access.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,25 @@ When configuring a Conditional Access policy, you have granular control over the
8888

8989
Learn more about [Conditional Access user assignments](../conditional-access/concept-conditional-access-users-groups.md).
9090

91+
### Comparing External Identities Conditional Access policies
92+
93+
The following table gives a detailed comparison of the security policy and compliance options in Azure AD External Identities. Security policy and compliance are managed by the host/inviting organization under Conditional Access policies.
94+
95+
|**Policy** |**B2B collaboration users** |**B2B direct connect users**|
96+
| :------------ | :-------------- | :----- |
97+
|**Grant controls—Block access** | Supported | Supported |
98+
|**Grant controls — Require multifactor authentication** | Supported | Supported, requires configuring your [inbound trust settings](cross-tenant-access-settings-b2b-direct-connect.md#to-change-inbound-trust-settings-for-mfa-and-device-state) to accept MFA claims from the external organization |
99+
|**Grant controls — Require compliant device** | Supported, requires configuring your [inbound trust settings](cross-tenant-access-settings-b2b-collaboration.md#to-change-inbound-trust-settings-for-mfa-and-device-claims) to accept compliant device claims from the external organization. | Supported, requires configuring your [inbound trust settings](cross-tenant-access-settings-b2b-direct-connect.md#to-change-inbound-trust-settings-for-mfa-and-device-state) to accept compliant device claims from the external organization. |
100+
|**Grant controls — Require Hybrid Azure AD joined device** | Supported, requires configuring your [inbound trust settings](cross-tenant-access-settings-b2b-collaboration.md#to-change-inbound-trust-settings-for-mfa-and-device-claims) to accept hybrid Azure AD joined device claims from the external organization | Supported, requires configuring your [inbound trust settings](cross-tenant-access-settings-b2b-direct-connect.md#to-change-inbound-trust-settings-for-mfa-and-device-state) to accept hybrid Azure AD joined device claims from the external organization |
101+
|**Grant controls — Require approved client app** | Not supported | Not supported |
102+
|**Grant controls — Require app protection policy** | Not supported | Not supported |
103+
|**Grant controls — Require password change** | Not supported | Not supported |
104+
|**Grant controls — Terms of Use** | Supported | Not supported |
105+
|**Session controls — Use app enforced restrictions** | Supported | Not supported |
106+
|**Session controls — Use Conditional Access App control** | Supported | Not supported |
107+
|**Session controls — Sign-in frequency** | Supported | Not supported |
108+
|**Session controls — Persistent browser session** | Supported | Not supported |
109+
91110
### MFA for Azure AD external users
92111

93112
In an Azure AD cross-tenant scenario, the resource organization can create Conditional Access policies that require MFA or device compliance for all guest and external users. Generally, a B2B collaboration user accessing a resource is then required to set up their Azure AD MFA with the resource tenant. However, Azure AD now offers the ability to trust MFA claims from other Azure AD tenants. Enabling MFA trust with another tenant streamlines the sign-in process for B2B collaboration users and enables access for B2B direct connect users.

articles/active-directory/external-identities/external-identities-overview.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,12 @@ The following table gives a detailed comparison of the scenarios you can enable
8585
| **Identity providers supported** | External users can collaborate using work accounts, school accounts, any email address, SAML and WS-Fed based identity providers, and social identity providers like Gmail and Facebook. | External users collaborate using Azure AD work accounts or school accounts. | Consumer users with local application accounts (any email address, user name, or phone number), Azure AD, various supported social identities, and users with corporate and government-issued identities via SAML/WS-Fed-based identity provider federation. |
8686
| **Single sign-on (SSO)** | SSO to all Azure AD-connected apps is supported. For example, you can provide access to Microsoft 365 or on-premises apps, and to other SaaS apps such as Salesforce or Workday. | SSO to a Teams shared channel. | SSO to customer owned apps within the Azure AD B2C tenants is supported. SSO to Microsoft 365 or to other Microsoft SaaS apps isn't supported. |
8787
| **Licensing and billing** | Based on monthly active users (MAU), including B2B collaboration and Azure AD B2C users. Learn more about [External Identities pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/) and [billing setup for B2B](external-identities-pricing.md). | Based on monthly active users (MAU), including B2B collaboration, B2B direct connect, and Azure AD B2C users. Learn more about [External Identities pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/) and [billing setup for B2B](external-identities-pricing.md). | Based on monthly active users (MAU), including B2B collaboration and Azure AD B2C users. Learn more about [External Identities pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/) and [billing setup for Azure AD B2C](../../active-directory-b2c/billing.md). |
88-
| **Security policy and compliance** | Managed by the host/inviting organization (for example, with [Conditional Access policies](authentication-conditional-access.md) and cross-tenant access settings). | Managed by the host/inviting organization (for example, with [Conditional Access policies](authentication-conditional-access.md) and cross-tenant access settings). See also the [Teams documentation](/microsoftteams/security-compliance-overview). | Managed by the organization via Conditional Access and Identity Protection. |
88+
| **Security policy and compliance** | Managed by the host/inviting organization (for example, with [Conditional Access policies](authentication-conditional-access.md) and cross-tenant access settings). | Managed by the host/inviting organization (for example, with [Conditional Access policies](authentication-conditional-access.md) and cross-tenant access settings). See also the [Teams documentation](/microsoftteams/security-compliance-overview). | Managed by the organization via [Conditional Access and Identity Protection](../../active-directory-b2c/conditional-access-identity-protection-overview.md). |
89+
| **Multi-factor Authentication (MFA)** | If inbound trust settings to accept MFA claims from the user's home tenant are configured, and MFA policies have already been met in the user's home tenant, the external user can sign in. If MFA trust isn't enabled, the user is presented with an MFA challenge from the resource organization. [Learn more](authentication-conditional-access.md#mfa-for-azure-ad-external-users) about MFA for Azure AD external users. | If inbound trust settings to accept MFA claims from the user's home tenant are configured, and MFA policies have already been met in the user's home tenant, the external user can sign in. If MFA trust isn't enabled, and Conditional Access policies require MFA, the user is blocked from accessing resources. You *must* configure your inbound trust settings to accept MFA claims from the organization. [Learn more](authentication-conditional-access.md#mfa-for-azure-ad-external-users) about MFA for Azure AD external users. | [Integrates directly](../../active-directory-b2c/multi-factor-authentication.md) with Azure AD Multi-Factor Authentication. |
90+
| **Microsoft cloud settings** | [Supported.](cross-cloud-settings.md) | [Not supported.](cross-cloud-settings.md) | Not applicable. |
91+
| **Entitlement management** | [Supported.](../governance/entitlement-management-overview.md) | Not supported. | Not applicable. |
92+
| **Line-of-business (LOB) apps** | Supported. | Not supported. Only B2B direct connect-enabled apps can be shared (currently, Teams Connect shared channels). | Works with [RESTful API](../../active-directory-b2c/technical-overview.md#add-your-own-business-logic-and-call-restful-apis). |
93+
| **Conditional Access** | Managed by the host/inviting organization. [Learn more](authentication-conditional-access.md) about Conditional Access policies. | Managed by the host/inviting organization. [Learn more](authentication-conditional-access.md) about Conditional Access policies. | Managed by the organization via [Conditional Access and Identity Protection](../../active-directory-b2c/conditional-access-identity-protection-overview.md). |
8994
| **Branding** | Host/inviting organization's brand is used. | For sign-in screens, the user’s home organization brand is used. In the shared channel, the resource organization's brand is used. | Fully customizable branding per application or organization. |
9095
| **More information** | [Blog post](https://blogs.technet.microsoft.com/enterprisemobility/2017/02/01/azure-ad-b2b-new-updates-make-cross-business-collab-easy/), [Documentation](what-is-b2b.md) | [Documentation](b2b-direct-connect-overview.md) | [Product page](https://azure.microsoft.com/services/active-directory-b2c/), [Documentation](../../active-directory-b2c/index.yml) |
9196

0 commit comments

Comments
 (0)