Skip to content

Commit fce5281

Browse files
authored
Merge pull request #210449 from MicrosoftDocs/main
9/07 PM Publish
2 parents bb03936 + d754a22 commit fce5281

File tree

175 files changed

+8714
-678
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

175 files changed

+8714
-678
lines changed

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/17/2022
9+
ms.date: 09/17/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -66,7 +66,7 @@ The following table outlines when an authentication method can be used during a
6666
| Windows Hello for Business | Yes | MFA\* |
6767
| Microsoft Authenticator app | Yes | MFA and SSPR |
6868
| FIDO2 security key | Yes | MFA |
69-
| Certificate-based authentication (preview) | Yes | MFA and SSPR |
69+
| Certificate-based authentication (preview) | Yes | No |
7070
| OATH hardware tokens (preview) | No | MFA and SSPR |
7171
| OATH software tokens | No | MFA and SSPR |
7272
| SMS | Yes | MFA and SSPR |

articles/active-directory/develop/active-directory-configurable-token-lifetimes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,10 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 11/22/2021
12+
ms.date: 09/07/2022
1313
ms.author: ryanwi
1414
ms.custom: aaddev, identityplatformtop40, contperf-fy21q1
15-
ms.reviewer: ludwignick, marsma
15+
ms.reviewer: ludwignick, sreyanthmora, marsma
1616
---
1717
# Configurable token lifetimes in the Microsoft identity platform (preview)
1818

articles/active-directory/manage-apps/application-properties.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 09/22/2021
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
#Customer intent: As an administrator of an Azure AD tenant, I want to learn more about the properties of an enterprise application that I can configure.
1414
---

articles/active-directory/manage-apps/application-sign-in-problem-application-error.md

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 07/11/2017
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.collection: M365-identity-device-management
1414
---
@@ -17,7 +17,14 @@ ms.collection: M365-identity-device-management
1717

1818
In this scenario, Azure Active Directory (Azure AD) signs the user in. But the application displays an error message and doesn't let the user finish the sign-in flow. The problem is that the app didn't accept the response that Azure AD issued.
1919

20-
There are several possible reasons why the app didn't accept the response from Azure AD. If the error message doesn't clearly identify what's missing from the response, try the following:
20+
There are several possible reasons why the app didn't accept the response from Azure AD. If there is an error message or code displayed, use the following resources to diagnose the error:
21+
22+
* [Azure AD Authentication and authorization error codes](../develop/reference-aadsts-error-codes.md)
23+
24+
* [Troubleshooting consent prompt errors](application-sign-in-unexpected-user-consent-error.md)
25+
26+
27+
If the error message doesn't clearly identify what's missing from the response, try the following:
2128

2229
- If the app is the Azure AD gallery, verify that you followed the steps in [How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
2330

@@ -58,13 +65,13 @@ To add an attribute in the Azure AD configuration that will be sent in the Azure
5865

5966
The next time that the user signs in to the app, Azure AD will send the new attribute in the SAML response.
6067

61-
## The app doesn't identify the user
68+
## The app cannot identify the user
6269

6370
Signing in to the app fails because the SAML response is missing an attribute such as a role. Or it fails because the app expects a different format or value for the **NameID** (User Identifier) attribute.
6471

6572
If you're using [Azure AD automated user provisioning](../app-provisioning/user-provisioning.md) to create, maintain, and remove users in the app, verify that the user has been provisioned to the SaaS app. For more information, see [No users are being provisioned to an Azure AD Gallery application](../app-provisioning/application-provisioning-config-problem-no-users-provisioned.md).
6673

67-
## Add an attribute to the Azure AD app configuration
74+
### Add an attribute to the Azure AD app configuration
6875

6976
To change the User Identifier value, follow these steps:
7077

@@ -87,7 +94,7 @@ To change the User Identifier value, follow these steps:
8794

8895
8. Under **User attributes**, select the unique identifier for the user from the **User Identifier** drop-down list.
8996

90-
## Change the NameID format
97+
### Change the NameID format
9198

9299
If the application expects another format for the **NameID** (User Identifier) attribute, see [Editing nameID](../develop/active-directory-saml-claims-customization.md#editing-nameid) to change the NameID format.
93100

@@ -155,4 +162,8 @@ To change the signing algorithm, follow these steps:
155162

156163
## Next steps
157164

158-
[How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
165+
* [How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
166+
167+
* [Azure AD Authentication and authorization error codes](../develop/reference-aadsts-error-codes.md)
168+
169+
* [Troubleshooting consent prompt errors](application-sign-in-unexpected-user-consent-error.md)

articles/active-directory/manage-apps/application-sign-in-unexpected-user-consent-error.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 07/11/2017
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.reviewer: phsignor, yuhko
1414
ms.collection: M365-identity-device-management
@@ -31,31 +31,27 @@ This error occurs when a user who is not a Global Administrator attempts to use
3131

3232
This error can also occur when a user is prevented from consenting to an application due to Microsoft detecting that the permissions request is risky. In this case, an audit event will also be logged with a Category of "ApplicationManagement", Activity Type of "Consent to application" and Status Reason of "Risky application detected".
3333

34-
Another scenario in which this error might occur is when the user assignment is required for the application, but no administrator consent was provided. In this case, the administrator must first provide administrator consent.
34+
Another scenario in which this error might occur is when the user assignment is required for the application, but no administrator consent was provided. In this case, the administrator must first provide tenant-wide admin consent for the application.
3535

3636
## Policy prevents granting permissions error
3737

3838
* **AADSTS90093:** An administrator of <tenantDisplayName> has set a policy that prevents you from granting <name of app> the permissions it is requesting. Contact an administrator of <tenantDisplayName>, who can grant permissions to this app on your behalf.
3939

40-
This error occurs when a Global Administrator turns off the ability for users to consent to applications, then a non-administrator user attempts to use an application that requires consent. This error can be resolved by an administrator granting access to the application on behalf of their organization.
40+
This error can occur when a Global Administrator turns off the ability for users to consent to applications, then a non-administrator user attempts to use an application that requires consent. This error can be resolved by an administrator granting access to the application on behalf of their organization.
4141

4242
## Intermittent problem error
4343

4444
* **AADSTS90090:** It looks like the sign-in process encountered an intermittent problem recording the permissions you attempted to grant to <clientAppDisplayName>. try again later.
4545

4646
This error indicates that an intermittent service side issue has occurred. It can be resolved by attempting to consent to the application again.
4747

48-
## Resource not available error
4948

50-
* **AADSTS65005:** The app <clientAppDisplayName> requested permissions to access a resource <resourceAppDisplayName> that is not available.
51-
52-
Contact the application developer.
5349

5450
## Resource not available in tenant error
5551

5652
* **AADSTS65005:** <clientAppDisplayName> is requesting access to a resource <resourceAppDisplayName> that is not available in your organization <tenantDisplayName>.
5753

58-
Ensure that this resource is available or contact an administrator of <tenantDisplayName>.
54+
Ensure that these resources that provide the permissions requested are available in your tenant or contact an administrator of <tenantDisplayName>. Otherwise, there is a misconfiguration in how the application requests resources, and you should contact the application developer.
5955

6056
## Permissions mismatch error
6157

@@ -91,3 +87,5 @@ End-users will not be able to grant consent to apps that have been detected as r
9187
[Apps, permissions, and consent in Azure Active Directory (v1 endpoint)](../develop/quickstart-register-app.md)<br>
9288

9389
[Scopes, permissions, and consent in the Azure Active Directory (v2.0 endpoint)](../develop/v2-permissions-and-consent.md)
90+
91+
[Unexpected consent prompt when signing in to an application](application-sign-in-unexpected-user-consent-prompt.md)

articles/active-directory/manage-apps/application-sign-in-unexpected-user-consent-prompt.md

Lines changed: 45 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,43 +8,79 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 07/11/2017
11+
ms.date: 09/07/2022
1212
ms.author: ergreenl
1313
ms.reviewer: phsignor, yuhko
1414
ms.collection: M365-identity-device-management
1515
---
1616

1717
# Unexpected consent prompt when signing in to an application
1818

19-
Many applications that integrate with Azure Active Directory require permissions to various resources in order to run. When these resources are also integrated with Azure Active Directory, permissions to access them is requested using the Azure AD consent framework.
19+
Many applications that integrate with Azure Active Directory require permissions to various resources in order to run. When these resources are also integrated with Azure Active Directory, permissions to access them is requested using the Azure AD consent framework. These requests result in a consent prompt being shown the first time an application is used, which is often a one-time operation.
2020

21-
This results in a consent prompt being shown the first time an application is used, which is often a one-time operation.
21+
In certain scenarios, additional consent prompts can appear when a user attempts to sign-in. In this article, we will diagnose the reason for the unexpected consent prompts showing, and how to troubleshoot.
2222

2323
> [!VIDEO https://www.youtube.com/embed/a1AjdvNDda4]
2424
2525
## Scenarios in which users see consent prompts
2626

27-
Additional prompts can be expected in various scenarios:
27+
Further prompts can be expected in various scenarios:
2828

29-
* The application has been configured to require assignment. User consent is not currently supported for apps which require assignment. If you configure an application to require assignment, be sure to also grant tenant-wide admin consent so that assigned user can sign in.
29+
* The application has been configured to require assignment. Individual user consent is not currently supported for apps which require assignment; thus the permissions must be granted by an admin for the whole directory. If you configure an application to require assignment, be sure to also grant tenant-wide admin consent so that assigned user can sign-in.
3030

31-
* The set of permissions required by the application has changed.
31+
* The set of permissions required by the application has changed by the developer and needs to be granted again.
3232

3333
* The user who originally consented to the application was not an administrator, and now a different (non-admin) user is using the application for the first time.
3434

35-
* The user who originally consented to the application was an administrator, but they did not consent on-behalf of the entire organization.
35+
* The user who originally consented to the application was an administrator, but they didn't consent on-behalf of the entire organization.
3636

37-
* The application is using [incremental and dynamic consent](../azuread-dev/azure-ad-endpoint-comparison.md#incremental-and-dynamic-consent) to request additional permissions after consent was initially granted. This is often used when optional features of an application additional require permissions beyond those required for baseline functionality.
37+
* The application is using [incremental and dynamic consent](../azuread-dev/azure-ad-endpoint-comparison.md#incremental-and-dynamic-consent) to request further permissions after consent was initially granted. Incremental and dynamic consent is often used when optional features of an application require permissions beyond those required for baseline functionality.
3838

3939
* Consent was revoked after being granted initially.
4040

41-
* The developer has configured the application to require a consent prompt every time it is used (note: this is not best practice).
41+
* The developer has configured the application to require a consent prompt every time it is used (note: this behavior isn't best practice).
4242

4343
> [!NOTE]
4444
> Following Microsoft's recommendations and best practices, many organizations have disabled or limited users' permission to grant consent to apps. If an application forces users to grant consent every time they sign in, most users will be blocked from using these applications even if an administrator grants tenant-wide admin consent. If you encounter an application which is requiring user consent even after admin consent has been granted, check with the app publisher to see if they have a setting or option to stop forcing user consent on every sign in.
4545
46+
## Troubleshooting steps
47+
48+
### Compare permissions requested and granted for the applications
49+
50+
To ensure the permissions granted for the application are up-to-date, you can compare the permissions that are being requested by the application with the permissions already granted in the tenant.
51+
52+
1. Sign-in to the Azure portal with an administrator account.
53+
2. Navigate to **Enterprise applications**.
54+
3. Select the application in question from the list.
55+
4. Under Security in the left-hand navigation, choose **Permissions**
56+
5. View the list of already granted permissions from the table on the Permissions page
57+
6. To view the requested permissions, click on the **Grant admin consent** button. (NOTE: This will open a consent prompt listing all of the requested permissions. Don't click accept on the consent prompt unless you are sure you want to grant tenant-wide admin consent.)
58+
7. Within the consent prompt, expand the listed permissions and compare with the table on the permissions page. If any are present in the consent prompt but not the permissions page, that permission has yet to be consented to. Unconsented permissions may be the cause for unexpected consent prompts showing for the application.
59+
60+
### View user assignment settings
61+
62+
If the application requires assignment, individual users can't consent for themselves. To check if assignment is required for the application, do the following:
63+
64+
1. Sign-in to the Azure portal with an administrator account.
65+
2. Navigate to **Enterprise applications**.
66+
3. Select the application in question from the list.
67+
4. Under Manage in the left-hand navigation, choose **Properties**.
68+
5. Check to see if **Assignment required?** is set to **Yes**.
69+
6. If set to yes, then an admin must consent to the permissions on behalf of the entire organization.
70+
71+
### Review tenant-wide user consent settings
72+
73+
Determining whether an individual user can consent to an application can be configured by every organization, and may differ from directory to directory. Even if every permission doesn't require admin consent by default, your organization may have disabled user consent entirely, preventing an individual user to consent for themselves for an application. To view your organization's user consent settings, do the following:
74+
75+
1. Sign-in to the Azure portal with an administrator account.
76+
2. Navigate to **Enterprise applications**.
77+
3. Under Security in the left-hand navigation, choose **Consent and permissions**.
78+
4. View the user consent settings. If set to *Do not allow user consent*, users will never be able to consent on behalf of themselves for an application.
79+
4680
## Next steps
4781

4882
* [Apps, permissions, and consent in Azure Active Directory (v1.0 endpoint)](../develop/quickstart-register-app.md)
4983

5084
* [Scopes, permissions, and consent in the Azure Active Directory (v2.0 endpoint)](../develop/v2-permissions-and-consent.md)
85+
86+
* [Unexpected error when performing consent to an application](application-sign-in-unexpected-user-consent-error.md)

articles/active-directory/manage-apps/configure-user-consent-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 08/31/2021
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.reviewer: phsignor, yuhko
1414
ms.custom: contperf-fy21q2

articles/api-management/authorizations-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,8 +48,8 @@ For public preview the following limitations exist:
4848

4949
- Authorizations feature is not supported in the following regions: swedencentral, australiacentral, australiacentral2, jioindiacentral.
5050
- Supported identity providers can be found in [this](https://github.com/Azure/APIManagement-Authorizations/blob/main/docs/identityproviders.md) GitHub repository.
51-
- Maximum configured number of authorization providers per API Management instance: 50
52-
- Maximum configured number of authorizations per authorization provider: 500
51+
- Maximum configured number of authorization providers per API Management instance: 1,000
52+
- Maximum configured number of authorizations per authorization provider: 10,000
5353
- Maximum configured number of access policies per authorization: 100
5454
- Maximum requests per minute per authorization: 100
5555
- Authorization code PKCE flow with code challenge isn't supported.

articles/applied-ai-services/form-recognizer/quickstarts/includes/v3-csharp-sdk.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -136,9 +136,7 @@ DocumentAnalysisClient client = new DocumentAnalysisClient(new Uri(endpoint), cr
136136
//sample form document
137137
Uri fileUri = new Uri("https://raw.githubusercontent.com/Azure-Samples/cognitive-services-REST-api-samples/master/curl/form-recognizer/sample-layout.pdf");
138138

139-
AnalyzeDocumentOperation operation = await client.StartAnalyzeDocumentFromUriAsync("prebuilt-document", fileUri);
140-
141-
await operation.WaitForCompletionAsync();
139+
AnalyzeDocumentOperation operation = await client.AnalyzeDocumentFromUriAsync(WaitUntil.Completed,"prebuilt-document", fileUri);
142140

143141
AnalyzeResult result = operation.Value;
144142

@@ -268,9 +266,7 @@ DocumentAnalysisClient client = new DocumentAnalysisClient(new Uri(endpoint), cr
268266
// sample form document
269267
Uri fileUri = new Uri ("https://raw.githubusercontent.com/Azure-Samples/cognitive-services-REST-api-samples/master/curl/form-recognizer/sample-layout.pdf");
270268

271-
AnalyzeDocumentOperation operation = await client.StartAnalyzeDocumentFromUriAsync("prebuilt-layout", fileUri);
272-
273-
await operation.WaitForCompletionAsync();
269+
AnalyzeDocumentOperation operation = await client.AnalyzeDocumentFromUriAsync(WaitUntil.Completed, "prebuilt-layout", fileUri);
274270

275271
AnalyzeResult result = operation.Value;
276272

@@ -397,9 +393,7 @@ DocumentAnalysisClient client = new DocumentAnalysisClient(new Uri(endpoint), cr
397393
398394
Uri invoiceUri = new Uri ("https://raw.githubusercontent.com/Azure-Samples/cognitive-services-REST-api-samples/master/curl/form-recognizer/sample-invoice.pdf");
399395

400-
AnalyzeDocumentOperation operation = await client.StartAnalyzeDocumentFromUriAsync("prebuilt-invoice", invoiceUri);
401-
402-
await operation.WaitForCompletionAsync();
396+
AnalyzeDocumentOperation operation = await client.AnalyzeDocumentFromUriAsync(WaitUntil.Completed, "prebuilt-invoice", invoiceUri);
403397

404398
AnalyzeResult result = operation.Value;
405399

0 commit comments

Comments
 (0)