You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|Authorization|Bearer {token}. Required. Learn more about [authentication and authorization](/graph/auth/auth-concepts).|
43
43
|Content-Type|application/json. Required.|
44
+
|If-Match| Last known `@odata-etag` value for the **plannerTaskConfiguration** to be updated. Required. Learn more about [etags](https://learn.microsoft.com/en-us/graph/api/resources/planner-overview?view=graph-rest-1.0#planner-resource-versioning).|
44
45
45
46
## Request body
46
47
@@ -70,89 +71,49 @@ The following example shows a request.
Copy file name to clipboardExpand all lines: api-reference/beta/resources/tiindicator.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Currently, **targetProduct** supports the following products:
40
40
41
41
There's a limit of 15,000 indicators per tenant for Microsoft Defender for Endpoint.
42
42
43
-
-**Microsoft Sentinel** – Only existing customers can use the **tiIndicator** API to send threat intelligence indicators to Microsoft Sentinel. For the most up-to-date, detailed instructions on how to send threat intelligent indicators to Microsoft Sentinel, see [Connect your threat intelligence platform to Microsoft Sentinel](/azure/sentinel/connect-threat-intelligence-tip).
43
+
-**Microsoft Sentinel** – Only existing customers can use the **tiIndicator** API to send threat intelligence indicators to Microsoft Sentinel. For the most up-to-date, detailed instructions on how to send threat intelligent indicators to Microsoft Sentinel, see [Connect your threat intelligence platform to Microsoft Sentinel with the upload API](/azure/sentinel/connect-threat-intelligence-upload-api).
44
44
45
45
For details about the types of indicators supported and limits on indicator counts per tenant, see [Manage indicators](/windows/security/threat-protection/microsoft-defender-atp/manage-indicators).
Copy file name to clipboardExpand all lines: concepts/application-saml-sso-configure-api.md
+16-14Lines changed: 16 additions & 14 deletions
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.localizationpriority: high
8
8
ms.topic: tutorial
9
9
ms.custom: scenarios:getting-started
10
10
ms.subservice: entra-applications
11
-
ms.date: 02/23/2024
11
+
ms.date: 02/27/2025
12
12
#customer intent: As a developer, I want to configure SAML-based single sign-on for my application using Microsoft Graph, so that I can improve usability of apps by enabling secure authentication and authorization for users.
13
13
---
14
14
@@ -27,13 +27,15 @@ In this tutorial, you learn how to:
27
27
28
28
## Prerequisites
29
29
30
-
- Sign in to an API client such as [Graph Explorer](https://aka.ms/ge) as a user with Cloud Application Administrator role in your Microsoft Entra tenant.
30
+
This tutorial configures SSO for the AWS IAM Identity Center. However, most of the steps on Microsoft Graph apply to any other app that you want to configure SSO.
31
+
32
+
- Sign in to an API client such as [Graph Explorer](https://aka.ms/ge) with the privileges to instantiate apps from the Microsoft Entra application gallery, configure app roles, and policies on apps. *Cloud Application Administrator* in the least privileged Microsoft Entra built-in role with these permissions.
31
33
- Grant yourself the following delegated permissions: `Application.ReadWrite.All`, `AppRoleAssignment.ReadWrite.All`, `Policy.Read.All`, `Policy.ReadWrite.ApplicationConfiguration`, and `User.ReadWrite.All`.
32
-
- Have a test user to assign to the application.
34
+
- Have a test user to assign to the application. You'll create a matching user in the AWS IAM Identity Center later in this tutorial.
33
35
34
36
## Step 1: Identify the application to configure
35
37
36
-
Microsoft Entra ID has a gallery that contains thousands of preintegrated applications that you can use as a template for your application. In Microsoft Graph, this list is available through the **applicationTemplate** entity.
38
+
To create an app that supports SSO, you register it through the Microsoft Entra App Gallery. The Microsoft Entra App Gallery is a catalog of thousands of preintegrated apps that simplify deploying and configuring SSO and automated user provisioning. In Microsoft Graph, this list is available through the **applicationTemplate** entity.
37
39
38
40
In this step, you identify the application template for the `AWS IAM Identity Center (successor to AWS Single Sign-On)` application that you want to configure. Record its **id**.
Using the **id** value for the application template, create an instance of the application in your tenant. Here, you name the application **AWS Contoso**. The response includes an application and service principal object for **AWS Contoso**, which is an instance of the **AWS IAM Identity Center (successor to AWS Single Sign-On)** app. Record the IDs of the two objects for use later in this tutorial.
128
+
Using the **id** value for the application template, create an instance of the application in your tenant. Here, you name the application **AWS Contoso**. The response includes an application and service principal object for **AWS Contoso**, which is an instance of the **AWS IAM Identity Center (successor to AWS Single Sign-On)** app. Record the IDs of the created application and service principal objects for use later in this tutorial.
In this step, you configure SSO for both the AWS Contoso application and the service principal. For the application, you configure the SAML URLs while for the service principal, you set the SSO mode to `saml`.
366
+
In this step, you configure SSO for both the AWS Contoso. For the application, you configure the SAML URLs while for the service principal, you set the SSO mode to `saml`.
365
367
366
368
### Step 3.1: Set single sign-on mode for the service principal
367
369
368
-
Set `saml` as the SSO mode for the service principal you created in Step 2. The request returns a `204 No Content` response code.
370
+
Set `saml` as the SSO mode for the AWS Contoso service principal. The request returns a `204 No Content` response code.
### Step 3.2: Set basic SAML URLs for the application
419
421
420
-
In this step, set the **web**/**redirectUris** and **web**/**redirectUris** for the application you created in Step 2. The request returns a `204 No Content` response code.
422
+
Set the **web**/**redirectUris** and **web**/**redirectUris** for the AWS Contoso application. The request returns a `204 No Content` response code.
If the application requires the role information in the token, add the definition of the roles in the application object. By default, the **appRoles**object in the application and service principal in Step 2 included the default `User` and `msiam_access` roles. Don't modify or remove them. To add more roles, you must include both the existing roles and the new roles in the **appRoles** object in the request, otherwise, the existing roles are replaced.
481
+
If the application requires the role information in the token, add the definition of the roles in the **appRoles**property. AWS Contoso was instantiated with the default `User` and `msiam_access` roles - don't modify or remove them. To add more roles, you include both the existing roles and the new roles in the **appRoles** object in the request, otherwise, the existing roles are replaced.
480
482
481
483
In this step, add the `Finance,WAAD` and `Admin,WAAD` roles to the AWS Contoso service principal. The request returns a `204 No Content` response code.
Assign the user that you created to the service principal and grant them the `Admin,WAAD` app role. In the request body, provide the following values:
1133
+
Assign the test user that you created to the service principal and grant them the `Admin,WAAD` app role. In the request body, provide the following values:
1132
1134
1133
1135
-**principalId** - The ID of the user account that you created.
1134
1136
-**appRoleId** - The ID of the `Admin,WAAD` app role that you added.
@@ -1236,12 +1238,12 @@ The following shows an example of what you might see for your application. Save
1236
1238
1237
1239
## Step 9: Complete and test the integration
1238
1240
1239
-
Now that you've completed the configuration steps for the application in Microsoft Entra ID and have the SAML metadata, sign in to your AWS IAM Identity Center company site as an administrator and:
1240
-
1.Complete the steps to [Configure AWS IAM Identity Center SSO](/entra/identity/saas-apps/aws-single-sign-on-tutorial#configure-aws-iam-identity-center-sso).
1241
-
1. Create a test user whose user name and email address match the user account that you created in Microsoft Entra ID.
1241
+
Now that you've configured the Microsoft Entra application and have the SAML metadata, sign in to your AWS IAM Identity Center company site as an administrator and:
1242
+
1.[Configure AWS IAM Identity Center SSO](/entra/identity/saas-apps/aws-single-sign-on-tutorial#configure-aws-iam-identity-center-sso).
1243
+
1.[Create an AWS IAM Identity Center test user whose user name and email address match the user account that you created in Microsoft Entra ID](/entra/identity/saas-apps/aws-single-sign-on-tutorial#create-aws-iam-identity-center-test-user).
1242
1244
1.[Test the SSO integration](/entra/identity/saas-apps/aws-single-sign-on-tutorial#test-sso).
1243
1245
1244
-
## Step 10: Clean up resources
1246
+
## [Optional]Step 10: Clean up resources
1245
1247
1246
1248
In this step, remove the resources that you created and no longer need.
Copy file name to clipboardExpand all lines: concepts/best-practices-concept.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -159,5 +159,5 @@ To ensure reliability and facilitate support for your application:
159
159
- Open connections to all advertised DNS answers.
160
160
- Generate a unique GUID and send it on each Microsoft Graph REST request. This helps Microsoft investigate any errors more easily if you need to report an issue with Microsoft Graph.
161
161
- On every request to Microsoft Graph, generate a unique GUID, send it in the `client-request-id` HTTP request header, and also log it in your application's logs.
162
-
- Always log the `request-id` and `Date` from the HTTP response headers. These, together with the `client-request-id`, are required when reporting issues in [Microsoft Q&A](/answers/products/m365#microsoft-graph) or to Microsoft Support.
162
+
- Always log the full HTTP Graph API call including the full URL, all the headers and JSON body for both the response and the request. These are required when reporting issues in [Microsoft Q&A](/answers/products/m365#microsoft-graph) or to Microsoft Support.
163
163
- If you're using a third-party application, the app vendor needs to engage with our support team to investigate the issue.
Copy file name to clipboardExpand all lines: concepts/cli/installation.md
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -21,10 +21,10 @@ The Microsoft Graph command-line interface (CLI) is published on [GitHub](https:
21
21
22
22
### Windows environment setup (Optional)
23
23
24
-
1. Open **Settings**.
25
-
1. Select **About**, then**Advanced system settings**.
24
+
1. Open **Settings** > **System**.
25
+
1. Select **About** >**Advanced system settings**.
26
26
1. Select **Environment Variables...**.
27
-
1. Locate and select **Path**, then select **Edit**.
27
+
1. Locate and select **Path** > select **Edit**.
28
28
29
29
> [!NOTE]
30
30
> The **Path** variable is present in **User variables** as well as **System variables**. Updating the variable in **User variables** will only update the current user's path. Updating the variable in **System variables** will update the path for all users on the computer.
0 commit comments