Skip to content

Commit f928ab4

Browse files
authored
Merge pull request #250127 from MicrosoftDocs/main
9/1/2023 AM Publish
2 parents 67c5529 + 0cbf053 commit f928ab4

File tree

107 files changed

+1142
-806
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

107 files changed

+1142
-806
lines changed

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -199,6 +199,11 @@
199199
"source_path_from_root": "/articles/virtual-desktop/windows-10-multisession-faq.yml",
200200
"redirect_url": "/azure/virtual-desktop/windows-multisession-faq",
201201
"redirect_document_id": true
202+
},
203+
{
204+
"source_path_from_root": "/articles/virtual-desktop/install-client-per-user.md",
205+
"redirect_url": "/azure/virtual-desktop/install-windows-client-per-user",
206+
"redirect_document_id": true
202207
}
203208
]
204209
}

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 08/01/2023
4+
ms.date: 09/01/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,13 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## August 2023
19+
20+
### Updated articles
21+
22+
- [Page layout versions](page-layout.md) - Editorial updates
23+
- [Secure your API used an API connector in Azure AD B2C](secure-rest-api.md) - Oauth Bearer Authentication updated to GA
24+
1825
## June 2023
1926

2027
### New articles
@@ -52,10 +59,3 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
5259
- [Build a global identity solution with funnel-based approach](azure-ad-b2c-global-identity-funnel-based-design.md)
5360
- [Use the Azure portal to create and delete consumer users in Azure AD B2C](manage-users-portal.md)
5461

55-
## April 2023
56-
57-
### Updated articles
58-
59-
- [Configure Transmit Security with Azure Active Directory B2C for passwordless authentication](partner-bindid.md) - Update partner-bindid.md
60-
- [Tutorial: Enable secure hybrid access for applications with Azure Active Directory B2C and F5 BIG-IP](partner-f5.md) - Update partner-f5.md
61-

articles/active-directory/external-identities/customers/whats-new-docs.md

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory for customers"
33
description: "New and updated documentation for the Azure Active Directory for customers documentation."
4-
ms.date: 08/17/2023
4+
ms.date: 09/01/2023
55
ms.service: active-directory
66
ms.subservice: ciam
77
ms.topic: reference
@@ -15,6 +15,29 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory for customers documentation. This article lists new docs that have been added and those that have had significant updates in the last three months.
1717

18+
## August 2023
19+
20+
### New articles
21+
22+
- [Quickstart: Get started with guide walkthrough](quickstart-get-started-guide.md)
23+
- [Tutorial: Add sign-in and sign-out to a Vanilla JavaScript single-page app for a customer tenant](tutorial-single-page-app-vanillajs-sign-in-sign-out.md)
24+
- [Sign in users in a sample Node.js CLI application.](sample-cli-app-node-sign-in-users.md)
25+
- [Tutorial: Prepare a Node.js CLI application for authentication](tutorial-cli-app-node-sign-in-prepare-app.md)
26+
- [Prepare your customer tenant to sign in users in a Node.js CLI application](tutorial-cli-app-node-sign-in-prepare-tenant.md)
27+
- [Authenticate users in a Node.js CLI application - Build app](tutorial-cli-app-node-sign-in-sign-out.md)
28+
- [Tutorial: Use role-based access control in your .NET MAUI](tutorial-desktop-maui-role-based-access-control.md)
29+
- [Tutorial: Use role-based access control in your .NET MAUI app](tutorial-mobile-maui-role-based-access-control.md)
30+
31+
### Updated articles
32+
33+
- [Collect user attributes during sign-up](how-to-define-custom-attributes.md) - Custom attribute update
34+
- [Quickstart: Create a tenant (preview)](quickstart-tenant-setup.md) - Get started guide update
35+
- [Add and manage admin accounts](how-to-manage-admin-accounts.md) - Editorial review
36+
- [Tutorial: Prepare a Vanilla JavaScript single-page app for authentication in a customer tenant](tutorial-single-page-app-vanillajs-prepare-app.md) - Editorial review
37+
- [Azure AD for customers documentation](index.yml) - Editorial review
38+
- [Tutorial: Sign in users in .NET MAUI app](tutorial-desktop-app-maui-sign-in-sign-out.md) - Add app roles to .NET MAUI app and receive them in the ID token
39+
- [Tutorial: Sign in users in .NET MAUI shell app](tutorial-mobile-app-maui-sign-in-sign-out.md) - Add app roles to .NET MAUI app and receive them in the ID token
40+
1841
## July 2023
1942

2043
### New articles

articles/active-directory/external-identities/whats-new-docs.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory External Identities"
33
description: "New and updated documentation for the Azure Active Directory External Identities."
4-
ms.date: 08/01/2023
4+
ms.date: 09/01/2023
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: reference
@@ -15,6 +15,16 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory External Identities documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the External Identities service, see [What's new in Azure Active Directory](../fundamentals/whats-new.md).
1717

18+
## August 2023
19+
20+
### Updated articles
21+
22+
- [B2B collaboration user claims mapping in Azure Active Directory](claims-mapping.md) - UPN claims behavior update
23+
- [Self-service sign-up](self-service-sign-up-overview.md) - Customer content reference update
24+
- [Cross-tenant access overview](cross-tenant-access-overview.md) - New storage model update
25+
- [Cross-tenant access settings](cross-tenant-access-settings-b2b-collaboration.md) - New storage model update
26+
- [Configure B2B direct connect](cross-tenant-access-settings-b2b-direct-connect.md) - New storage model update
27+
-
1828
## July 2023
1929

2030
### New article
@@ -38,15 +48,4 @@ Welcome to what's new in Azure Active Directory External Identities documentatio
3848
- [Set up tenant restrictions V2 (Preview)](tenant-restrictions-v2.md) - Microsoft Teams updates
3949
- [Invite guest users to an app](add-users-information-worker.md) - Link and structure updates
4050

41-
## May 2023
42-
43-
### New article
44-
45-
- [Set up tenant restrictions V2 (Preview)](tenant-restrictions-v2.md)
46-
47-
### Updated articles
48-
49-
- [Overview: Cross-tenant access with Azure AD External Identities](cross-tenant-access-overview.md) - Graph API links updates
50-
- [Reset redemption status for a guest user](reset-redemption-status.md) - Screenshot updates
51-
5251

articles/active-directory/hybrid/install.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ Cloud sync uses the Azure AD Connect provisioning agent. Use the steps below to
3131
>When installing for the US Government Cloud use:
3232
>*AADConnectProvisioningAgentSetup.exe ENVIRONMENTNAME=AzureUSGovernment*
3333
>See "[Install an agent in the US government cloud](cloud-sync/how-to-install.md#install-an-agent-in-the-us-government-cloud)" for more information.
34+
3435
7. On the splash screen, select **I agree to the license and conditions**, and then select **Install**.
3536
8. Once the installation operation completes, the configuration wizard will launch. Select **Next** to start the configuration.
3637
9. On the **Select Extension** screen, select **HR-driven provisioning (Workday and SuccessFactors) / Azure AD Connect Cloud Sync** and click **Next**.

articles/active-directory/manage-apps/add-application-portal-assign-users.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom: mode-other, enterprise-apps
1717

1818
# Quickstart: Create and assign a user account
1919

20-
In this quickstart, you use the Azure portal to create a user account in your Azure Active Directory (Azure AD) tenant. After you create the account, you can assign it to the enterprise application that you added to your tenant.
20+
In this quickstart, you use the Microsoft Entra admin center to create a user account in your Azure Active Directory (Azure AD) tenant. After you create the account, you can assign it to the enterprise application that you added to your tenant.
2121

2222
It's recommended that you use a nonproduction environment to test the steps in this quickstart.
2323

@@ -26,7 +26,7 @@ It's recommended that you use a nonproduction environment to test the steps in t
2626
To create a user account and assign it to an enterprise application, you need:
2727

2828
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29-
- One of the following roles: Global Administrator, or owner of the service principal.
29+
- One of the following roles: Global Administrator, Cloud Application Administrator, or owner of the service principal. You'll need the User Administrator role to manage users.
3030
- Completion of the steps in [Quickstart: Add an enterprise application](add-application-portal.md).
3131

3232
## Create a user account
@@ -35,23 +35,23 @@ To create a user account and assign it to an enterprise application, you need:
3535

3636
To create a user account in your Azure AD tenant:
3737

38-
1. Sign in to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
39-
1. Browse to **Azure Active Directory** and select **Users**.
40-
1. Select **New user** at the top of the pane.
38+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
39+
1. Browse to **Identity** > **Users** > **All users**
40+
1. Select **New user** at the top of the pane and then, select **Create new user**.
4141

4242
:::image type="content" source="media/add-application-portal-assign-users/new-user.png" alt-text="Add a new user account to your Azure AD tenant.":::
4343

44-
1. In the **User name** field, enter the username of the user account. For example, `[email protected]`. Be sure to change `contoso.com` to the name of your tenant domain.
45-
1. In the **Name** field, enter the name of the user of the account. For example, `contosouser1`.
44+
1. In the **User principal name** field, enter the username of the user account. For example, `[email protected]`. Be sure to change `contoso.com` to the name of your tenant domain.
45+
1. In the **Display name** field, enter the name of the user of the account. For example, `contosouser1`.
4646
1. Enter the details required for the user under the **Groups and roles**, **Settings**, and **Job info** sections.
4747
1. Select **Create**.
4848

4949
## Assign a user account to an enterprise application
5050

5151
To assign a user account to an enterprise application:
5252

53-
1. Sign in to the [Azure portal](https://portal.azure.com), then browse to **Azure Active Directory** and select **Enterprise applications**.
54-
1. Search for and select the application to which you want to assign the user account. For example, the application that you created in the previous quickstart named **Azure AD SAML Toolkit 1**.
53+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
54+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**. For example, the application that you created in the previous quickstart named **Azure AD SAML Toolkit 1**.
5555
1. In the left pane, select **Users and groups**, and then select **Add user/group**.
5656

5757
:::image type="content" source="media/add-application-portal-assign-users/assign-user.png" alt-text="Assign user account to an application in your Azure AD tenant.":::

articles/active-directory/manage-apps/configure-password-single-sign-on-non-gallery-applications.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,14 +33,14 @@ The configuration page for password-based SSO is simple. It includes only the UR
3333

3434
To configure password-based SSO in your Azure AD tenant, you need:
3535
- An Azure account with an active subscription. If you don't already have one, you can [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
36-
- Global Administrator, or owner of the service principal.
36+
- Global Administrator, Cloud Application Administrator, or owner of the service principal.
3737
- An application that supports password-based SSO.
3838

3939
## Configure password-based single sign-on
4040

41-
1. Sign in to the [Azure portal](https://portal.azure.com) with the appropriate role.
42-
1. Select **Azure Active Directory** in Azure Services, and then select **Enterprise applications**.
43-
1. Search for and select the application that you want to add password-based SSO.
41+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
42+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
43+
1. Enter the name of the existing application in the search box, and then select the application from the search results.
4444
1. Select **Single sign-on** and then select **Password-based**.
4545
1. Enter the URL for the sign-in page of the application.
4646
1. Select **Save**.

articles/active-directory/manage-apps/delete-application-portal.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,9 @@ To delete an enterprise application, you need:
3737

3838
:::zone pivot="portal"
3939

40-
1. Sign in to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
41-
1. In the left menu, select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to delete. In this article, we use the **Azure AD SAML Toolkit 1** as an example.
40+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
41+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
42+
1. Enter the name of the existing application in the search box, and then select the application from the search results. In this article, we use the **Azure AD SAML Toolkit 1** as an example.
4243
1. In the **Manage** section of the left menu, select **Properties**.
4344
1. At the top of the **Properties** pane, select **Delete**, and then select **Yes** to confirm you want to delete the application from your Azure AD tenant.
4445

@@ -57,7 +58,7 @@ To delete an enterprise application, you need:
5758
Import-Module AzureAD
5859
```
5960
60-
1. Connect to Azure AD PowerShell:
61+
1. Connect to Azure AD PowerShell and sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator):
6162
6263
```powershell
6364
Connect-AzureAD
@@ -77,7 +78,7 @@ To delete an enterprise application, you need:
7778

7879
:::zone pivot="ms-powershell"
7980

80-
1. Connect to Microsoft Graph PowerShell:
81+
1. Connect to Microsoft Graph PowerShell and sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator):
8182

8283
```powershell
8384
Connect-MgGraph -Scopes 'Application.Read.All'
@@ -101,7 +102,8 @@ To delete an enterprise application, you need:
101102

102103
:::zone pivot="ms-graph"
103104

104-
Delete an enterprise application using [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
105+
To delete an enterprise application using [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), you need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
106+
105107
1. To get the list of service principals in your tenant, run the following query.
106108

107109
# [HTTP](#tab/http)

0 commit comments

Comments
 (0)