Skip to content

Commit 01b0e54

Browse files
committed
fix
2 parents d57d827 + 1813fbb commit 01b0e54

File tree

250 files changed

+2549
-1059
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

250 files changed

+2549
-1059
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -698,6 +698,16 @@
698698
"redirect_url": "/azure/frontdoor/front-door-rules-engine",
699699
"redirect_document_id": false
700700
},
701+
{
702+
"source_path_from_root": "/articles/frontdoor/concept-caching.md",
703+
"redirect_url": "/azure/frontdoor/front-door-caching",
704+
"redirect_document_id": false
705+
},
706+
{
707+
"source_path_from_root": "/articles/frontdoor/concept-route.md",
708+
"redirect_url": "/azure/frontdoor/front-door-route-matching",
709+
"redirect_document_id": false
710+
},
701711
{
702712
"source_path_from_root": "/articles/app-service-web/web-sites-dotnet-deploy-aspnet-mvc-app-membership-oauth-sql-database.md",
703713
"redirect_url": "/aspnet/core/security/authorization/secure-data",

articles/active-directory-b2c/configure-authentication-sample-web-app.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -44,14 +44,14 @@ A computer that's running either of the following:
4444

4545
# [Visual Studio](#tab/visual-studio)
4646

47-
* [Visual Studio 2019 16.8 or later](https://visualstudio.microsoft.com/downloads/?utm_medium=microsoft&utm_source=docs.microsoft.com&utm_campaign=inline+link&utm_content=download+vs2019), with the ASP.NET and web development workload
48-
* [.NET 5.0 SDK](https://dotnet.microsoft.com/download/dotnet)
47+
* [Visual Studio 2022 17.0 or later](https://visualstudio.microsoft.com/downloads/?utm_medium=microsoft&utm_source=docs.microsoft.com&utm_campaign=inline+link&utm_content=download+vs2019), with the ASP.NET and web development workload
48+
* [.NET 6.0 SDK](https://dotnet.microsoft.com/download/dotnet)
4949

5050
# [Visual Studio Code](#tab/visual-studio-code)
5151

5252
* [Visual Studio Code](https://code.visualstudio.com/download)
5353
* [C# for Visual Studio Code (latest version)](https://marketplace.visualstudio.com/items?itemName=ms-dotnettools.csharp)
54-
* [.NET 5.0 SDK](https://dotnet.microsoft.com/download/dotnet)
54+
* [.NET 6.0 SDK](https://dotnet.microsoft.com/download/dotnet)
5555

5656
---
5757

@@ -76,7 +76,7 @@ To create the web app registration, do the following:
7676
1. Select **App registrations**, and then select **New registration**.
7777
1. Under **Name**, enter a name for the application (for example, *webapp1*).
7878
1. Under **Supported account types**, select **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**.
79-
1. Under **Redirect URI**, select **Web** and then, in the URL box, enter `https://localhost:5001/signin-oidc`.
79+
1. Under **Redirect URI**, select **Web** and then, in the URL box, enter `https://localhost:44316/signin-oidc`.
8080
1. Under **Permissions**, select the **Grant admin consent to openid and offline access permissions** checkbox.
8181
1. Select **Register**.
8282
1. Select **Overview**.
@@ -131,7 +131,7 @@ Your final configuration file should look like the following JSON:
131131
## Step 5: Run the sample web app
132132

133133
1. Build and run the project.
134-
1. Go to `https://localhost:5001`.
134+
1. Go to `https://localhost:44316`.
135135
1. Select **Sign Up/In**.
136136

137137
![Screenshot of the "Sign Up/In" button on the project Welcome page.](./media/configure-authentication-sample-web-app/web-app-sign-in.png)

articles/active-directory/authentication/tutorial-enable-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Password policies in the on-premises AD DS environment may prevent password rese
9191
If you update the group policy, wait for the updated policy to replicate, or use the `gpupdate /force` command.
9292

9393
> [!Note]
94-
> For passwords to be changed immediately, *Minimum password age* must be set to 0. However, if users adhere to the on-premises policies, and the *Minimum password age* is set to a value greater than zero, password writeback still works after the on-premises policies are evaluated.
94+
> If you need to allow users to change or reset passwords more than one time per day, *Minimum password age* must be set to 0. Password writeback will work after on-premises password policies are successfully evaluated.
9595
9696
## Enable password writeback in Azure AD Connect
9797

articles/active-directory/cloud-sync/how-to-prerequisites.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenhoran
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 10/19/2021
10+
ms.date: 03/04/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -115,6 +115,12 @@ Run the [IdFix tool](/office365/enterprise/prepare-directory-attributes-for-sync
115115

116116
- If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
117117
- If your firewall or proxy allows you to specify safe suffixes, add connections to \*.msappproxy.net and \*.servicebus.windows.net. If not, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
118+
- If you are installing against the **US government** cloud, and your firewall or proxy allows you to specify safe suffixes, add connections to:
119+
- *.microsoftonline.us
120+
- *.microsoft.us
121+
- *.msappproxy.us
122+
- *.windowsazure.us
123+
118124
- Your agents need access to login.windows.net and login.microsoftonline.com for initial registration. Open your firewall for those URLs as well.
119125
- For certificate validation, unblock the following URLs: mscrl.microsoft.com:80, crl.microsoft.com:80, ocsp.msocsp.com:80, and www\.microsoft.com:80. These URLs are used for certificate validation with other Microsoft products, so you might already have these URLs unblocked.
120126

0 commit comments

Comments
 (0)