Skip to content

Commit

Permalink
Merge pull request #49 from MicrosoftDocs/master
Browse files Browse the repository at this point in the history
new
  • Loading branch information
WilliamAntonRohm authored Nov 28, 2017
2 parents bec8a0c + 3f9e322 commit 6512895
Show file tree
Hide file tree
Showing 449 changed files with 6,697 additions and 3,224 deletions.
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -13,4 +13,5 @@ AzureMigration.ps1
articles/directories.txt

.vscode/*
.vs/*
.settings.json
23 changes: 22 additions & 1 deletion .openpublishing.redirection.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,11 @@
{
"redirections": [
{
{
"source_path": "articles/iot-edge/how-to-create-gateway-device.md",
"redirect_url": "/azure/iot-edge/how-to-create-transparent-gateway",
"redirect_document_id": false
},
{
"source_path": "articles/cognitive-services/Video/Home.md",
"redirect_url": "/azure/cognitive-services/video-indexer/video-indexer-overview",
"redirect_document_id": false
Expand Down Expand Up @@ -2995,6 +3000,11 @@
"redirect_url": "https://marketplace.visualstudio.com/items?itemName=VSIDEDevOpsMSFT.ContinuousDeliveryToolsforVisualStudio",
"redirect_document_id": false
},
{
"source_path": "articles/container-service/dcos-swarm/container-service-deployment.md",
"redirect_url": "/azure/container-service/dcos-swarm",
"redirect_document_id": false
},
{
"source_path": "articles/data-lake-store/data-lake-store-get-started-cli.md",
"redirect_url": "/azure/data-lake-store/data-lake-store-get-started-cli-2.0",
Expand Down Expand Up @@ -6470,6 +6480,11 @@
"redirect_url": "/azure/vpn-gateway/vpn-gateway-howto-point-to-site-classic-azure-portal",
"redirect_document_id": false
},
{
"source_path": "articles/load-balancer/load-balancer-get-started-internet-classic-portal.md",
"redirect_url": "/azure/load-balancer/load-balancer-get-started-internet-portal",
"redirect_document_id": false
},
{
"source_path": "articles/virtual-network/virtual-network-accelerated-networking-portal.md",
"redirect_url": "/azure/virtual-network/virtual-network-create-vm-accelerated-networking",
Expand Down Expand Up @@ -15373,7 +15388,13 @@
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-get-started-tutorial.md",
"redirect_url": "/azure/sql-data-warehouse/load-data-from-azure-blob-storage-using-polybase",
"redirect_document_id": false
},
{
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-get-started-provision.md",
"redirect_url": "/azure/sql-data-warehouse/create-data-warehouse-portal",
"redirect_document_id": false
}


]
}
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ ms.author: parakhj
# Azure AD B2C: Use the Azure AD Graph API

>[!NOTE]
>Currently, you must use the [Azure AD Graph API](https://msdn.microsoft.com/Library/Azure/Ad/Graph/howto/azure-ad-graph-api-operations-overview?f=255&MSPPError=-2147217396) to manage users in an Azure AD B2C directory.
> You must use the [Azure AD Graph API](https://msdn.microsoft.com/Library/Azure/Ad/Graph/howto/azure-ad-graph-api-operations-overview?f=255&MSPPError=-2147217396) to manage users in an Azure AD B2C directory. This is different from the Microsoft Graph API. Learn more [here](https://blogs.msdn.microsoft.com/aadgraphteam/2016/07/08/microsoft-graph-or-azure-ad-graph/).
Azure Active Directory (Azure AD) B2C tenants tend to be very large. This means that many common tenant management tasks need to be performed programmatically. A primary example is user management. You might need to migrate an existing user store to a B2C tenant. You may want to host user registration on your own page and create user accounts in your Azure AD B2C directory behind the scenes. These types of tasks require the ability to create, read, update, and delete user accounts. You can do these tasks by using the Azure AD Graph API.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ ms.devlang: na
ms.topic: article
ms.tgt_pltfrm: na
ms.workload: identity
ms.date: 11/19/2017
ms.date: 11/28/2017
ms.author: markvi
ms.reviewer: spunukol

Expand Down Expand Up @@ -144,25 +144,24 @@ Control app and client access by using the **Mobile apps and desktop clients** o
The following mobile apps and desktop clients support conditional access for Office 365 and other Azure AD-connected service applications:


| Client apps| Target Service| Platform |
| --- | --- | --- |
| Azure Remote app| Azure Remote App service| Windows 10, Windows 8.1, Windows 7, iOS, Android, and Mac OS X|
| Dynamics CRM app| Dynamics CRM| Windows 10, Windows 8.1, Windows 7, iOS, and Android|
| Mail/Calendar/People app, Outlook 2016, Outlook 2013 (with modern authentication)| Office 365 Exchange Online| Windows 10|
| MFA and location policy for apps. Device based policies are not supported.| Any My Apps app service| Android and iOS|
| Microsoft Teams Services - this controls all services that support Microsoft Teams and all its Client Apps - Windows Desktop, iOS, Android, WP, and web client| Microsoft Teams| Windows 10, Windows 8.1, Windows 7, iOS, Android and macOS|
| Office 2016 apps, Office 2013 (with modern authentication), OneDrive sync client (see [notes](https://support.office.com/en-US/article/Azure-Active-Directory-conditional-access-with-the-OneDrive-sync-client-on-Windows-028d73d7-4b86-4ee0-8fb7-9a209434b04e))| Office 365 SharePoint Online| Windows 8.1, Windows 7|
| Office 2016 apps, Universal Office apps, Office 2013 (with modern authentication), OneDrive sync client (see [notes](https://support.office.com/en-US/article/Azure-Active-Directory-conditional-access-with-the-OneDrive-sync-client-on-Windows-028d73d7-4b86-4ee0-8fb7-9a209434b04e)), Office Groups support is planned for the future, SharePoint app support is planned for the future| Office 365 SharePoint Online| Windows 10|
| Office 2016 for macOS (Word, Excel, PowerPoint, OneNote only). OneDrive for Business support planned for the future| Office 365 SharePoint Online| Mac OS X|
| Office mobile apps| Office 365 SharePoint Online| iOS, Android|
| Office Yammer app| Office 365 Yammer| Windows 10, iOS, Android|
| Outlook 2016 (Office for macOS)| Office 365 Exchange Online| Mac OS X|
| Outlook 2016, Outlook 2013 (with modern authentication), Skype for Business (with modern authentication)| Office 365 Exchange Online| Windows 8.1, Windows 7|
| Outlook mobile app| Office 365 Exchange Online| iOS|
| PowerBI app. The Power BI app for Android does not currently support device-based conditional access.| PowerBI service| Windows 10, Windows 8.1, Windows 7, and iOS|
| Skype for Business| Office 365 Exchange Online| Android, IOS|
| Visual Studio Team Services app| Visual Studio Team Services| Windows 10, Windows 8.1, Windows 7, iOS, and Android|

|Client apps|Target Service|Platform|
|---|---|---|
|Azure Remote app|Azure Remote App service|Windows 10, Windows 8.1, Windows 7, iOS, Android, and Mac OS X|
|Dynamics CRM app|Dynamics CRM|Windows 10, Windows 8.1, Windows 7, iOS, and Android|
|Mail/Calendar/People app, Outlook 2016, Outlook 2013 (with modern authentication)|Office 365 Exchange Online|Windows 10|
|MFA and location policy for apps. Device based policies are not supported. |Any My Apps app service|Android and iOS|
|Microsoft Teams Services - this controls all services that support Microsoft Teams and all its Client Apps - Windows Desktop, iOS, Android, WP, and web client|Microsoft Teams|Windows 10, Windows 8.1, Windows 7, iOS, Android and macOS |
|Office 2016 apps, Office 2013 (with modern authentication), OneDrive sync client (see [notes](https://support.office.com/en-US/article/Azure-Active-Directory-conditional-access-with-the-OneDrive-sync-client-on-Windows-028d73d7-4b86-4ee0-8fb7-9a209434b04e))|Office 365 SharePoint Online|Windows 8.1, Windows 7|
|Office 2016 apps, Universal Office apps, Office 2013 (with modern authentication), OneDrive sync client (see [notes](https://support.office.com/en-US/article/Azure-Active-Directory-conditional-access-with-the-OneDrive-sync-client-on-Windows-028d73d7-4b86-4ee0-8fb7-9a209434b04e)), Office Groups support is planned for the future, SharePoint app support is planned for the future|Office 365 SharePoint Online|Windows 10|
|Office 2016 for macOS (Word, Excel, PowerPoint, OneNote only). OneDrive for Business support planned for the future|Office 365 SharePoint Online|Mac OS X|
|Office mobile apps|Office 365 SharePoint Online|Android, iOS|
|Office Yammer app|Office 365 Yammer|Windows 10, iOS, Android|
|Outlook 2016 (Office for macOS)|Office 365 Exchange Online|Mac OS X|
|Outlook 2016, Outlook 2013 (with modern authentication), Skype for Business (with modern authentication)|Office 365 Exchange Online|Windows 8.1, Windows 7|
|Outlook mobile app|Office 365 Exchange Online|Android, iOS|
|PowerBI app. The Power BI app for Android does not currently support device-based conditional access.|PowerBI service|Windows 10, Windows 8.1, Windows 7, and iOS|
|Skype for Business|Office 365 Exchange Online|Android, IOS |
|Visual Studio Team Services app|Visual Studio Team Services|Windows 10, Windows 8.1, Windows 7, iOS, and Android|



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -162,6 +162,7 @@ Allowed operators
| companyName | Any string value or *null* | (user.companyName -eq "value") |
| department |Any string value or *null* |(user.department -eq "value") |
| displayName |Any string value |(user.displayName -eq "value") |
| employeeId |Any string value |(user.employeeId -eq "value")<br>(user.employeeId -ne *null*) |
| facsimileTelephoneNumber |Any string value or *null* |(user.facsimileTelephoneNumber -eq "value") |
| givenName |Any string value or *null* |(user.givenName -eq "value") |
| jobTitle |Any string value or *null* |(user.jobTitle -eq "value") |
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ keywords:
documentationcenter: ''
author: barlanmsft
manager: femila
ms.reviewer: gahug
ms.reviewer: sahenry

ms.assetid: 7ba69b18-317a-4a62-afa3-924c4ea8fb49
ms.service: active-directory
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,15 +6,15 @@ keywords: Active directory password management, password management, Azure AD se
documentationcenter: ''
author: MicrosoftGuyJFlo
manager: femila
ms.reviewer: gahug
ms.reviewer: sahenry

ms.assetid:
ms.service: active-directory
ms.workload: identity
ms.tgt_pltfrm: na
ms.devlang: na
ms.topic: article
ms.date: 08/28/2017
ms.date: 11/28/2017
ms.author: joflore
ms.custom: it-pro

Expand Down Expand Up @@ -105,8 +105,8 @@ If you're not sure what account the described account refers to, open the Azure

If you set these permissions, the MA service account for each forest can manage passwords on behalf of the user accounts within that forest.

>[!IMPORTANT]
>If you neglect to assign these permissions, then, even though writeback appears to be configured correctly, users will encounter errors when they attempt to manage their on-premises passwords from the cloud.
> [!IMPORTANT]
> If you neglect to assign these permissions, then, even though writeback appears to be configured correctly, users will encounter errors when they attempt to manage their on-premises passwords from the cloud.
>
> [!NOTE]
Expand All @@ -122,7 +122,6 @@ To set up the appropriate permissions for password writeback to occur, complete
5. Pick the account that permissions are being applied to (from the Azure AD Connect setup).
6. In the **Applies to** drop-down list, select **Descendent user** objects.
7. Under **Permissions**, select the boxes for the following:
* **Unexpire-password**
* **Reset password**
* **Change password**
* **Write lockoutTime**
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ ms.workload: identity
ms.tgt_pltfrm: na
ms.devlang: na
ms.topic: article
ms.date: 11/22/2017
ms.date: 11/28/2017
ms.author: jeedes

---
Expand Down Expand Up @@ -106,11 +106,14 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf

![Cezanne HR Software Domain and URLs single sign-on information](./media/active-directory-saas-cezannehrsoftware-tutorial/tutorial_cezannehrsoftware_url.png)

a. In the **Sign-on URL** textbox, type the URL: `https://w3.cezanneondemand.com/CezanneOnDemand/-/optyma`
a. In the **Sign-on URL** textbox, type the URL: `https://w3.cezanneondemand.com/CezanneOnDemand/-/<tenantidentifier>`

b. In the **Identifier** textbox, type the URL: `https://w3.cezanneondemand.com/CezanneOnDemand/`

c. In the **Reply URL** textbox, type the URL: `https://w3.cezanneondemand.com:443/cezanneondemand/-/optyma/Saml/samlp`
c. In the **Reply URL** textbox, type the URL: `https://w3.cezanneondemand.com:443/cezanneondemand/-/<tenantidentifier>/Saml/samlp`

> [!NOTE]
> These values are not real. Update these values with the actual Sign-On URL and Reply URL. Contact [Cezanne HR Software Client support team](https://cezannehr.com/services/support/) to get these values.

4. On the **SAML Signing Certificate** section, click **Certificate(Base64)** and then save the certificate file on your computer.

Expand Down Expand Up @@ -144,7 +147,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf

a. Enter the name of your Identity Provider as the **Display Name**.

b. In the **Entity Identifier** textbox, paste the value of **SAML Entity ID** which you have copied from the Azure portal .
b. In the **Entity Identifier** textbox, paste the value of **SAML Entity ID** which you have copied from the Azure portal.

c. Change the **SAML Binding** to 'POST'.

Expand Down
50 changes: 27 additions & 23 deletions articles/active-directory/active-directory-saas-druva-tutorial.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ ms.workload: identity
ms.tgt_pltfrm: na
ms.devlang: na
ms.topic: article
ms.date: 07/20/2017
ms.date: 11/23/2017
ms.author: jeedes

---
Expand Down Expand Up @@ -102,21 +102,27 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf

![Single sign-on dialog box](./media/active-directory-saas-druva-tutorial/tutorial_druva_samlbase.png)

3. On the **Druva Domain and URLs** section, perform the following steps:
3. On the **Druva Domain and URLs** section, If you wish to configure the application in **IDP** initiated mode:

![Configure Single Sign-On](./media/active-directory-saas-druva-tutorial/tutorial_druva_url.png)

In the **Sign-on URL** textbox, type the URL: `https://cloud.druva.com/home`
In the **Identifier** textbox, type the string value: `druva-cloud`

4. Check **Show advanced URL settings**. If you wish to configure the application in **SP** initiated mode:

![Configure Single Sign-On](./media/active-directory-saas-druva-tutorial/tutorial_druva_url1.png)

In the **Sign-on URL** textbox, type the URL: `https://cloud.druva.com/home`

4. On the **SAML Signing Certificate** section, click **Certificate(Base64)** and then save the certificate file on your computer.
5. On the **SAML Signing Certificate** section, click **Certificate(Base64)** and then save the certificate file on your computer.

![The Certificate download link](./media/active-directory-saas-druva-tutorial/tutorial_druva_certificate.png)

5. Your Druva application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your **SAML Token Attributes** configuration.
6. Your Druva application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your **SAML Token Attributes** configuration.

![Configure Single Sign-On](./media/active-directory-saas-druva-tutorial/tutorial_druva_attribute.png)

6. In the **User Attributes** section on the **Single sign-on** dialog, configure SAML token attribute as shown in the preceding image and perform the following steps:
7. In the **User Attributes** section on the **Single sign-on** dialog, configure SAML token attribute as shown in the preceding image and perform the following steps:

| Attribute Name | Attribute Value |
| ------------------- | -------------------- |
Expand All @@ -134,47 +140,47 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf

d. Click **Ok**.

7. Click **Save** button.
8. Click **Save** button.

![Configure Single Sign-On](./media/active-directory-saas-druva-tutorial/tutorial_general_400.png)

8. On the **Druva Configuration** section, click **Configure Druva** to open **Configure sign-on** window. Copy the **Sign-Out URL and SAML Single Sign-On Service URL** from the **Quick Reference section.**
9. On the **Druva Configuration** section, click **Configure Druva** to open **Configure sign-on** window. Copy the **Sign-Out URL and SAML Single Sign-On Service URL** from the **Quick Reference section.**

![Configure Single Sign-On](./media/active-directory-saas-druva-tutorial/tutorial_druva_configure.png)

9. In a different web browser window, log in to your Druva company site as an administrator.
10. In a different web browser window, log in to your Druva company site as an administrator.

10. Go to **Manage \> Settings**.
11. Go to **Manage \> Settings**.

![Settings](./media/active-directory-saas-druva-tutorial/ic795091.png "Settings")

11. On the Single Sign-On Settings dialog, perform the following steps:
12. On the Single Sign-On Settings dialog, perform the following steps:

![Single Sign-On Settings](./media/active-directory-saas-druva-tutorial/ic795092.png "Single Sign-On Settings")

a. Paste **SAML Single Sign-On Service URL** value, which you have copied from the Azure portal into the **ID Provider Login URL** textbox.

b. Paste **Sign-Out URL** value, which you have copied from the Azure portal into the **ID Provider Logout URL** textbox.

c. Open your base-64 encoded certificate in notepad, copy the content of it into your clipboard, and then paste it to the **ID Provider Certificate** textbox
a. In **ID Provider Login URL** textbox, paste the value of **Single Sign-On Service URL**, which you have copied from Azure portal.
b. In **ID Provider Logout URL** textbox, paste the value of **Sign-Out URL**, which you have copied from Azure portal
c. Open your base-64 encoded certificate in notepad, copy the content of it into your clipboard, and then paste it to the **ID Provider Certificate** textbox

d. To open the **Settings** page, click **Save**.
d. To open the **Settings** page, click **Save**.

12. On the **Settings** page, click **Generate SSO Token**.
13. On the **Settings** page, click **Generate SSO Token**.

![Settings](./media/active-directory-saas-druva-tutorial/ic795093.png "Settings")

13. On the **Single Sign-on Authentication Token** dialog, perform the following steps:
14. On the **Single Sign-on Authentication Token** dialog, perform the following steps:

![SSO Token](./media/active-directory-saas-druva-tutorial/ic795094.png "SSO Token")

a. Click **Copy**, Paste copied value in the **Value** textbox in the **Add Attribute** section.
a. Click **Copy**, Paste copied value in the **Value** textbox in the **Add Attribute** section in the Azure portal.

b. Click **Close**.

> [!TIP]
> You can now read a concise version of these instructions inside the [Azure portal](https://portal.azure.com), while you are setting up the app! After adding this app from the **Active Directory > Enterprise Applications** section, simply click the **Single Sign-On** tab and access the embedded documentation through the **Configuration** section at the bottom. You can read more about the embedded documentation feature here: [Azure AD embedded documentation]( https://go.microsoft.com/fwlink/?linkid=845985)
>

### Create an Azure AD test user

Expand Down Expand Up @@ -279,8 +285,6 @@ For more information about the Access Panel, see [Introduction to the Access
* [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](active-directory-saas-tutorial-list.md)
* [What is application access and single sign-on with Azure Active Directory?](active-directory-appssoaccess-whatis.md)



<!--Image references-->

[1]: ./media/active-directory-saas-druva-tutorial/tutorial_general_01.png
Expand Down
Loading

0 comments on commit 6512895

Please sign in to comment.