Skip to content

Commit ff72254

Browse files
authored
Merge pull request #190685 from MicrosoftDocs/main
3/04 PM Publish
2 parents 41d7c08 + 7a5fd60 commit ff72254

File tree

379 files changed

+1240
-726
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

379 files changed

+1240
-726
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
],
3535
"branches_to_filter": [],
3636
"git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/azure-docs",
37-
"git_repository_branch_open_to_public_contributors": "master",
37+
"git_repository_branch_open_to_public_contributors": "main",
3838
"skip_source_output_uploading": false,
3939
"need_preview_pull_request": true,
4040
"contribution_branch_mappings": {},
@@ -901,4 +901,4 @@
901901
"articles/container-apps/.openpublishing.redirection.container-apps.json",
902902
"articles/spring-cloud/.openpublishing.redirection.spring-cloud.json"
903903
]
904-
}
904+
}

.vscode/settings.json

Lines changed: 0 additions & 8 deletions
This file was deleted.

articles/active-directory-b2c/identity-provider-twitter.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ zone_pivot_groups: b2c-policy-type
3131

3232
## Create an application
3333

34-
To enable sign-in for users with a Twitter account in Azure AD B2C, you need to create a Twitter application. If you don't already have a Twitter account, you can sign up at [`https://twitter.com/signup`](https://twitter.com/signup). You also need to [Apply for a developer account](https://developer.twitter.com/en/apply/user.html). For more information, see [Apply for access](https://developer.twitter.com/en/apply-for-access).
34+
To enable sign-in for users with a Twitter account in Azure AD B2C, you need to create a Twitter application. If you don't already have a Twitter account, you can sign up at [`https://twitter.com/signup`](https://twitter.com/signup). You also need to [Apply for a developer account](https://developer.twitter.com/). For more information, see [Apply for access](https://developer.twitter.com/en/apply-for-access).
3535

3636
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
3737
1. Under **Standalone Apps**, select **+Create App**.

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,10 +143,22 @@ The top-level resource for policy keys in the Microsoft Graph API is the [Truste
143143

144144
## Application extension properties
145145

146+
- [Create extension properties](/graph/api/application-post-extensionproperty)
146147
- [List extension properties](/graph/api/application-list-extensionproperty)
147-
- [Delete extension property](/graph/api/application-delete-extensionproperty)
148+
- [Get an extension property](/graph/api/extensionproperty-get)
149+
- [Delete extension property](/graph/api/extensionproperty-delete)
150+
- [Get available extension properties](/graph/api/directoryobject-getavailableextensionproperties)
151+
152+
<!--
153+
#Hiding this note because user flows and extension attributes are different things in Microsoft Graph.
148154
149155
Azure AD B2C provides a directory that can hold 100 custom attributes per user. For user flows, these extension properties are [managed by using the Azure portal](user-flow-custom-attributes.md). For custom policies, Azure AD B2C creates the property for you, the first time the policy writes a value to the extension property.
156+
-->
157+
158+
Azure AD B2C provides a directory that can hold 100 extension values per user. To manage the extension values for a user, use the following [User APIs](/graph/api/resources/user) in Microsoft Graph.
159+
160+
- [Update user](/graph/api/user-update): To write or remove the extension property value from the user.
161+
- [Get a user](/graph/api/user-get): To retrieve the extension property value for the user. The extension property will be returned by default through the `beta` endpoint, but only on `$select` through the `v1.0` endpoint.
150162

151163
## Audit logs
152164

articles/active-directory-b2c/partner-bindid.md

Lines changed: 343 additions & 343 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/user-flow-custom-attributes.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -177,19 +177,20 @@ The following example demonstrates the use of a custom attribute in Azure AD B2C
177177

178178
::: zone-end
179179

180-
## Using custom attribute with MS Graph API
180+
## Manage extension attributes through Microsoft Graph
181181

182-
[Microsoft Graph API][ms-graph-api] supports creating and updating a user with extension attributes. Extension attributes in the Microsoft Graph API are named by using the convention `extension_ApplicationClientID_attributename`, where the `ApplicationClientID` is the **Application (client) ID** of the `b2c-extensions-app` [application](#azure-ad-b2c-extensions-app). Note that the **Application (client) ID** as it's represented in the extension attribute name includes no hyphens. For example, the Microsoft Graph API identifies an extension attribute `loyaltyId` in Azure AD B2C as `extension_831374b3bd5041bfaa54263ec9e050fc_loyaltyId`.
182+
You can use the Microsoft Graph API to create and manage extension attributes then set the values for a user.
183183

184-
Learn how to [interact with resources in your Azure AD B2C tenant](microsoft-graph-operations.md#user-management) using Microsoft Graph API.
185-
184+
Extension attributes in the Microsoft Graph API are named by using the convention `extension_ApplicationClientID_attributename`, where the `ApplicationClientID` is equivalent to the **appId** but without the hyphens. For example, if the **appId** of the `b2c-extensions-app` application is `25883231-668a-43a7-80b2-5685c3f874bc` and the **attributename** is `loyaltyId`, then the extension attribute will be named `extension_25883231668a43a780b25685c3f874bc_loyaltyId`.
185+
186+
Learn how to [manage extension attributes in your Azure AD B2C tenant](microsoft-graph-operations.md#application-extension-properties) using the Microsoft Graph API.
186187

187188
## Remove extension attribute
188189

189190
Unlike built-in attributes, extension/custom attributes can be removed. The extension attributes' values can also be removed.
190191

191192
> [!Important]
192-
> Before you remove the extension/custom attribute, for each account in the directory, set the extension attribute value to null. In this way you explicitly remove the extension attributes’s values. Then continue to remove the extension attribute itself. Extension/custom attribute is queryable using MS Graph API.
193+
> Before you remove the extension/custom attribute, for each account in the directory, set the extension attribute value to `null`. In this way you explicitly remove the extension attributes’s values. Then continue to remove the extension attribute itself. Extension/custom attribute is queryable using MS Graph API.
193194
194195
::: zone pivot="b2c-user-flow"
195196

@@ -207,7 +208,7 @@ Use the following steps to remove extension/custom attribute from a user flow in
207208

208209
::: zone pivot="b2c-custom-policy"
209210

210-
To remove a custom attribute, use [MS Graph API](microsoft-graph-operations.md), and use the [Delete](/graph/api/application-delete-extensionproperty) command.
211+
Use the [Microsoft Graph API](microsoft-graph-operations.md#application-extension-properties) to delete the extension attribute from the application or to delete the extension attribute from the user.
211212

212213
::: zone-end
213214

Loading

articles/active-directory/conditional-access/troubleshoot-conditional-access-what-if.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: troubleshooting
9-
ms.date: 08/07/2020
9+
ms.date: 03/04/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
The [What If tool](what-if-tool.md) in Conditional Access is powerful when trying to understand why a policy was or wasn't applied to a user in a specific circumstance or if a policy would apply in a known state.
2121

22-
The What If tool is located in the **Azure portal** > **Azure Active Directory** > **Conditional Access** > **What If**.
22+
The What If tool is located in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **What If**.
2323

2424
![Conditional Access What If tool at default state](./media/troubleshoot-conditional-access-what-if/conditional-access-what-if-tool.png)
2525

@@ -75,4 +75,4 @@ This test could be expanded to incorporate other data points to narrow the scope
7575
* [What is Conditional Access?](overview.md)
7676
* [What is Azure Active Directory Identity Protection?](../identity-protection/overview-identity-protection.md)
7777
* [What is a device identity?](../devices/overview.md)
78-
* [How it works: Azure AD Multi-Factor Authentication](../authentication/concept-mfa-howitworks.md)
78+
* [How it works: Azure AD Multi-Factor Authentication](../authentication/concept-mfa-howitworks.md)

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 18 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 02/23/2022
9+
ms.date: 03/04/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -56,49 +56,25 @@ Create a location based Conditional Access policy that applies to service princi
5656

5757
### Create a risk-based Conditional Access policy
5858

59-
Use this sample JSON for a risk-based policy using the [Microsoft Graph beta endpoint](/graph/api/resources/conditionalaccesspolicy?view=graph-rest-1.0&preserve-view=true).
59+
Create a location based Conditional Access policy that applies to service principals.
6060

61-
> [!NOTE]
62-
> Report-only mode doesn't report account risk on a risky workload identity.
61+
:::image type="content" source="media/workload-identity/conditional-access-workload-identity-risk-policy.png" alt-text="Creating a Conditional Access policy with a workload identity and risk as a condition." lightbox="media/workload-identity/conditional-access-workload-identity-risk-policy.png":::
6362

64-
```json
65-
{
66-
"displayName": "Name",
67-
"state": "enabled OR disabled",
68-
"conditions": {
69-
"applications": {
70-
"includeApplications": [
71-
"All"
72-
],
73-
"excludeApplications": [],
74-
"includeUserActions": [],
75-
"includeAuthenticationContextClassReferences": [],
76-
"applicationFilter": null
77-
},
78-
"userRiskLevels": [],
79-
"signInRiskLevels": [],
80-
"clientApplications": {
81-
"includeServicePrincipals": [
82-
"ServicePrincipalsInMyTenant"
83-
],
84-
"excludeServicePrincipals": []
85-
},
86-
"servicePrincipalRiskLevels": [
87-
"low",
88-
"medium",
89-
"high"
90-
]
91-
},
92-
"grantControls": {
93-
"operator": "and",
94-
"builtInControls": [
95-
"block"
96-
],
97-
"customAuthenticationFactors": [],
98-
"termsOfUse": []
99-
}
100-
}
101-
```
63+
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
64+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
65+
1. Select **New policy**.
66+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
67+
1. Under **Assignments**, select **Users or workload identities**.
68+
1. Under **What does this policy apply to?**, select **Workload identities (Preview)**.
69+
1. Under **Include**, choose **Select service principals**, and select the appropriate service principals from the list.
70+
1. Under **Cloud apps or actions**, select **All cloud apps**. The policy will apply only when a service principal requests a token.
71+
1. Under **Conditions** > **Service principal risk (Preview)**
72+
1. Set the **Configure** toggle to **Yes**.
73+
1. Select the levels of risk where you want this policy to trigger.
74+
1. Select **Done**.
75+
1. Under **Grant**, **Block access** is the only available option. Access is blocked when a token request is made from outside the allowed range.
76+
1. Your policy can be saved in **Report-only** mode, allowing administrators to estimate the effects, or policy is enforced by turning policy **On**.
77+
1. Select **Create** to complete your policy.
10278

10379
## Roll back
10480

articles/active-directory/develop/reference-claims-mapping-policy-type.md

Lines changed: 41 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: develop
1010
ms.custom: aaddev
1111
ms.workload: identity
1212
ms.topic: reference
13-
ms.date: 01/04/2022
13+
ms.date: 03/04/2022
1414
ms.author: ryanwi
1515
ms.reviewer: paulgarn, ludwignick, jeedes, luleon
1616
---
@@ -31,6 +31,10 @@ There are certain sets of claims that define how and when they're used in tokens
3131
| Basic claim set | Includes the claims that are emitted by default for tokens (in addition to the core claim set). You can [omit or modify basic claims](active-directory-claims-mapping.md#omit-the-basic-claims-from-tokens) by using the claims mapping policies. |
3232
| Restricted claim set | Can't be modified using policy. The data source cannot be changed, and no transformation is applied when generating these claims. |
3333

34+
This section lists:
35+
- [Table 1: JSON Web Token (JWT) restricted claim set](#table-1-json-web-token-jwt-restricted-claim-set)
36+
- [Table 2: SAML restricted claim set](#table-2-saml-restricted-claim-set)
37+
3438
### Table 1: JSON Web Token (JWT) restricted claim set
3539

3640
> [!NOTE]
@@ -175,6 +179,8 @@ There are certain sets of claims that define how and when they're used in tokens
175179

176180
### Table 2: SAML restricted claim set
177181

182+
The following table lists the SAML claims that are by default in the restricted claim set.
183+
178184
| Claim type (URI) |
179185
| ----- |
180186
|`http://schemas.microsoft.com/2012/01/devicecontext/claims/ismanaged`|
@@ -200,8 +206,27 @@ There are certain sets of claims that define how and when they're used in tokens
200206
|`http://schemas.microsoft.com/ws/2008/06/identity/claims/role`|
201207
|`http://schemas.microsoft.com/ws/2008/06/identity/claims/wids`|
202208
|`http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier`|
203-
204-
209+
| `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname` |
210+
| `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid` |
211+
| `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarygroupsid` |
212+
| `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/sid` |
213+
| `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishedname` |
214+
| `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` |
215+
| `http://schemas.microsoft.com/ws/2008/06/identity/claims/role` |
216+
217+
These claims are restricted by default, but are not restricted if you [set the AcceptMappedClaims property](active-directory-claims-mapping.md#update-the-application-manifest) to `true` in your app manifest *or* have a [custom signing key](active-directory-claims-mapping.md#configure-a-custom-signing-key):
218+
219+
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname`
220+
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid`
221+
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarygroupsid`
222+
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/sid`
223+
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishedname`
224+
225+
These claims are restricted by default, but are not restricted if you have a [custom signing key](active-directory-claims-mapping.md#configure-a-custom-signing-key):
226+
227+
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn`
228+
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/role`
229+
205230
## Claims mapping policy properties
206231

207232
To control what claims are emitted and where the data comes from, use the properties of a claims mapping policy. If a policy is not set, the system issues tokens that include the core claim set, the basic claim set, and any [optional claims](active-directory-optional-claims.md) that the application has chosen to receive.
@@ -299,6 +324,19 @@ The ID element identifies which property on the source provides the value for th
299324
| User | employeeid | Employee ID |
300325
| User | facsimiletelephonenumber | Facsimile Telephone Number |
301326
| User | assignedroles | list of App roles assigned to user|
327+
| User | accountEnabled | Account Enabled |
328+
| User | consentprovidedforminor | Consent Provided For Minor |
329+
| User | createddatetime | Created Date/Time|
330+
| User | creationtype | Creation Type |
331+
| User | lastpasswordchangedatetime | Last Password Change Date/Time |
332+
| User | mobilephone | Mobile Phone |
333+
| User | officelocation | Office Location |
334+
| User | onpremisesdomainname | On-Premises Domain Name |
335+
| User | onpremisesimmutableid | On-Premises Imutable ID |
336+
| User | onpremisessyncenabled | On-Premises Sync Enabled |
337+
| User | preferreddatalocation | Preffered Data Location |
338+
| User | proxyaddresses | Proxy Addresses |
339+
| User | usertype | User Type |
302340
| application, resource, audience | displayname | Display Name |
303341
| application, resource, audience | objectid | ObjectID |
304342
| application, resource, audience | tags | Service Principal Tag |

0 commit comments

Comments
 (0)