Skip to content

Commit 0614c1a

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents fe61caf + e6d5364 commit 0614c1a

File tree

193 files changed

+1072
-600
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

193 files changed

+1072
-600
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15125,6 +15125,11 @@
1512515125
"redirect_url": "/azure/aks/networking-overview",
1512615126
"redirect_document_id": false
1512715127
},
15128+
{
15129+
"source_path": "articles/stream-analytics/custom-deserializer.md",
15130+
"redirect_url": "https://aka.ms/asapreview1",
15131+
"redirect_document_id": false
15132+
},
1512815133
{
1512915134
"source_path": "articles/stream-analytics/stream-analytics-tools-for-visual-studio.md",
1513015135
"redirect_url": "/azure/stream-analytics/stream-analytics-quick-create-vs",

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -342,6 +342,8 @@
342342
items:
343343
- name: Acquire a token from the cache
344344
href: msal-net-acquire-token-silently.md
345+
- name: Clear the token cache
346+
href: msal-net-clear-token-cache.md
345347
- name: Instantiate a public client with options
346348
href: msal-net-instantiate-public-client-config-options.md
347349
- name: Instantiate a confidential client with options
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
title: Clear the token cache by using Microsoft Authentication Library for .NET - Azure
3+
description: Learn how to clear the token cache using the Microsoft Authentication Library for .NET (MSAL.NET).
4+
services: active-directory
5+
documentationcenter: dev-center-name
6+
author: rwike77
7+
manager: celested
8+
editor: ''
9+
10+
ms.service: active-directory
11+
ms.subservice: develop
12+
ms.devlang: na
13+
ms.topic: conceptual
14+
ms.tgt_pltfrm: na
15+
ms.workload: identity
16+
ms.date: 05/07/2019
17+
ms.author: ryanwi
18+
ms.reviewer: saeeda
19+
ms.custom: aaddev
20+
#Customer intent: As an application developer, I want to learn how how to clear the token cache so I can .
21+
ms.collection: M365-identity-device-management
22+
---
23+
24+
# Clear the token cache using MSAL.NET
25+
26+
When you [acquire an access token](msal-acquire-cache-tokens.md) using Microsoft Authentication Library for .NET (MSAL.NET), the token is cached. When the application needs a token, it should first call the `AcquireTokenSilent` method to verify if an acceptable token is in the cache.
27+
28+
Clearing the cache is achieved by removing the accounts from the cache. This does not remove the session cookie which is in the browser, though. The following example instantiates a public client application, gets the accounts for the application, and removes the accounts.
29+
30+
```csharp
31+
private readonly IPublicClientApplication _app;
32+
private static readonly string ClientId = ConfigurationManager.AppSettings["ida:ClientId"];
33+
private static readonly string Authority = string.Format(CultureInfo.InvariantCulture, AadInstance, Tenant);
34+
35+
_app = PublicClientApplicationBuilder.Create(ClientId)
36+
.WithAuthority(Authority)
37+
.Build();
38+
39+
var accounts = (await _app.GetAccountsAsync()).ToList();
40+
41+
// clear the cache
42+
while (accounts.Any())
43+
{
44+
await _app.RemoveAsync(accounts.First());
45+
accounts = (await _app.GetAccountsAsync()).ToList();
46+
}
47+
48+
```
49+
50+
To learn more about acquiring and caching tokens, read [acquire an access token](msal-acquire-cache-tokens.md).

articles/active-directory/fundamentals/active-directory-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,4 +206,4 @@ For more information, see [Automate user provisioning and deprovisioning to SaaS
206206
- - -
207207
**Q: Can I set up a secure LDAP connection with Azure AD?**
208208

209-
**A:** No. Azure AD does not support the LDAP protocol. However, you can configure secure LDAP with Azure AD Domain Services.
209+
**A:** No. Azure AD does not support the Lightweight Directory Access Protocol (LDAP) protocol. However, it's possible to use Azure AD Domain Services (Azure AD DS) with properly configured network security groups through Azure Networking to achieve LDAP connectivity. For more information, see https://docs.microsoft.com/azure/active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap.

articles/active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ Before you can associate or add your subscription, you must perform the followin
6060

6161
The directory is changed for the subscription and you get a success message.
6262

63-
![Success message about directory change](media/active-directory-how-subscriptions-associated-directory/edit-directory-success.png)
64-
4. Use the **Directory switcher** to go to your new directory. It might take up to 10 minutes for everything to show up properly.
63+
![Success message about directory change](media/active-directory-how-subscriptions-associated-directory/edit-directory-success.png)
64+
4. Use the **Directory switcher** to go to your new directory. It can take several hours for everything to show up properly. If it seems to be taking too long, make sure you check the **Global subscription filter** for the moved subscription, to make sure it's not simply hidden.
6565

6666
![Directory switcher page, with sample information](media/active-directory-how-subscriptions-associated-directory/directory-switcher.png)
6767

articles/active-directory/reports-monitoring/reference-sign-ins-error-codes.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
17-
ms.date: 04/25/2019
17+
ms.date: 05/08/2019
1818
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

@@ -174,6 +174,7 @@ You can also programmatically access the sign-in data using the [reporting API](
174174
|90051| Invalid Delegation Token. Invalid national Cloud ID ({cloudId}) is specified.|
175175
|90072| The account needs to be added as an external user in the tenant first. Sign-out and sign-in again with a different Azure AD account.|
176176
|90094| The grant requires administrator permissions. Ask your tenant administrator to provide consent for this application.|
177+
|500021|Tenant is restricted by company proxy. Denying the resource access.|
177178
|500121| Authentication failed during strong authentication request.|
178179
|500133| The assertion is not within its valid time range. Ensure that the access token is not expired before using it for user assertion, or request a new token.|
179180
|530021|Application does not meet the conditional access approved app requirements.|

articles/active-directory/saas-apps/bluejeans-tutorial.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 12/31/2018
17+
ms.date: 04/16/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -98,19 +98,19 @@ To configure Azure AD single sign-on with BlueJeans, perform the following steps
9898

9999
3. On the **Set up Single Sign-On with SAML** page, click **Edit** icon to open **Basic SAML Configuration** dialog.
100100

101-
![Edit Basic SAML Configuration](common/edit-urls.png)
101+
![Edit Basic SAML Configuration](media/bluejeans-tutorial/edit-urls-bluejeans.png)
102102

103-
4. On the **Basic SAML Configuration** section, perform the following steps:
103+
4. In the **Basic SAML Configuration** dialog, enter the following values:
104104

105-
![BlueJeans Domain and URLs single sign-on information](common/sp-identifier.png)
105+
![BlueJeans Domain and URLs single sign-on information](media/bluejeans-tutorial/tutorial_bluejeans-basic-configuration.png)
106106

107-
a. In the **Sign-on URL** text box, type a URL using the following pattern:
108-
`https://<companyname>.BlueJeans.com`
109-
110-
b. In the **Identifier** text box, type a URL: `https://samlsp.bluejeans.com`
111-
112-
> [!NOTE]
113-
> The Sign-on URL value is not real. Update the value with the actual Sign-On URL. Contact [BlueJeans Client support team](https://support.bluejeans.com/contact) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
107+
- In the **Identifier** text box, type the following:
108+
`https://samlsp.bluejeans.com`
109+
110+
- In the **Sign-on URL** text box, type the landing page URL provided to you by BlueJeans (to get this value, you can contact the [BlueJeans Client support team](https://support.bluejeans.com/contact)):
111+
`https://<companyname>.bluejeans.com`
112+
113+
- Click **Save**.
114114

115115
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
116116

24.7 KB
Loading
27.5 KB
Loading

articles/active-directory/users-groups-roles/licensing-groups-resolve-problems.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,10 +106,16 @@ If you use Exchange Online, some users in your tenant might be incorrectly confi
106106
> Run Get-Recipient | where {$_.EmailAddresses -match "[email protected]"} | fL Name, RecipientType,emailaddresses
107107
> ```
108108
> For more information about this problem, see ["Proxy address
109-
> is already being used" error message in Exchange Online](https://support.microsoft.com/help/3042584/-proxy-address-address-is-already-being-used-error-message-in-exchange-online). The article also includes information on [how to connect to Exchange Online by using remote PowerShell](https://technet.microsoft.com/library/jj984289.aspx). See this article for more information [on how the proxyAddresses attribute is populated in Azure AD](https://support.microsoft.com/help/3190357/how-the-proxyaddresses-attribute-is-populated-in-azure-ad).
109+
> is already being used" error message in Exchange Online](https://support.microsoft.com/help/3042584/-proxy-address-address-is-already-being-used-error-message-in-exchange-online). The article also includes information on [how to connect to Exchange Online by using remote PowerShell](https://technet.microsoft.com/library/jj984289.aspx).
110110
111111
After you resolve any proxy address problems for the affected users, make sure to force license processing on the group to make sure that the licenses can now be applied.
112112
113+
## Azure AD Mail and ProxyAddresses attribute change
114+
115+
**Problem:** While updating license assignment on a user or a group, you might see that the Azure AD Mail and ProxyAddresses attribute of some users are changed.
116+
117+
Updating license assignment on a user causes the proxy address calculation to be triggered, which can change user attributes. To understand the exact reason of the change and solve the problem, see this article on [how the proxyAddresses attribute is populated in Azure AD](https://support.microsoft.com/help/3190357/how-the-proxyaddresses-attribute-is-populated-in-azure-ad).
118+
113119
## What happens when there's more than one product license on a group?
114120
115121
You can assign more than one product license to a group. For example, you can assign Office 365 Enterprise E3 and Enterprise Mobility + Security to a group to easily enable all included services for users.

0 commit comments

Comments
 (0)