Skip to content

Commit 07ddab0

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 63919d1 + bf19b36 commit 07ddab0

File tree

272 files changed

+2606
-1130
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

272 files changed

+2606
-1130
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -878,6 +878,12 @@
878878
"branch": "docs-snippets",
879879
"branch_mapping": {}
880880
},
881+
{
882+
"path_to_root": "ms-identity-python-webapp",
883+
"url": "https://github.com/Azure-Samples/ms-identity-python-webapp",
884+
"branch": "main",
885+
"branch_mapping": {}
886+
},
881887
{
882888
"path_to_root": "ms-identity-node",
883889
"url": "https://github.com/Azure-Samples/ms-identity-node",

articles/active-directory-domain-services/concepts-custom-attributes.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,13 @@ Azure AD supports adding custom data to resources using [extensions](/graph/exte
2323
- [onPremisesExtensionAttributes](/graph/extensibility-overview?tabs=http#extension-attributes) are a set of 15 attributes that can store extended user string attributes.
2424
- [Directory extensions](/graph/extensibility-overview?tabs=http#directory-azure-ad-extensions) allow the schema extension of specific directory objects, such as users and groups, with strongly typed attributes through registration with an application in the tenant.
2525

26-
Both types of extensions can be configured By using Azure AD Connect for users who are managed on-premises, or MSGraph APIs for cloud-only users.
26+
Both types of extensions can be configured by using Azure AD Connect for users who are managed on-premises, or Microsoft Graph APIs for cloud-only users.
2727

2828
>[!Note]
2929
>The following types of extensions aren't supported for synchronization:
30-
>- Custom Security Attributes in Azure AD (Preview)
31-
>- MSGraph Schema Extensions
32-
>- MSGraph Open Extensions
30+
>- Custom security attributes in Azure AD (Preview)
31+
>- Microsoft Graph schema extensions
32+
>- Microsoft Graph open extensions
3333
3434

3535
## Requirements
@@ -72,4 +72,4 @@ To check the backfilling status, click **Azure AD DS Health** and verify the **S
7272

7373
To configure onPremisesExtensionAttributes or directory extensions for cloud-only users in Azure AD, see [Custom data options in Microsoft Graph](/graph/extensibility-overview?tabs=http#custom-data-options-in-microsoft-graph).
7474

75-
To sync onPremisesExtensionAttributes or directory extensions from on-premises to Azure AD, [configure Azure AD Connect](../active-directory/hybrid/how-to-connect-sync-feature-directory-extensions.md).
75+
To sync onPremisesExtensionAttributes or directory extensions from on-premises to Azure AD, [configure Azure AD Connect](../active-directory/hybrid/how-to-connect-sync-feature-directory-extensions.md).

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,10 @@ To enable the certificate-based authentication and configure user bindings in th
7272
1. To delete a CA certificate, select the certificate and click **Delete**.
7373
1. Click **Columns** to add or delete columns.
7474

75-
### Configure certification authorities using PowerShell
75+
>[!NOTE]
76+
>Upload of new CAs will fail when any of the existing CAs are expired. Tenant Admin should delete the expired CAs and then upload the new CA.
77+
78+
### Configure certification authorities(CA) using PowerShell
7679

7780
Only one CRL Distribution Point (CDP) for a trusted CA is supported. The CDP can only be HTTP URLs. Online Certificate Status Protocol (OCSP) or Lightweight Directory Access Protocol (LDAP) URLs aren't supported.
7881

@@ -87,6 +90,9 @@ Only one CRL Distribution Point (CDP) for a trusted CA is supported. The CDP can
8790
[!INCLUDE [Get-AzureAD](../../../includes/active-directory-authentication-get-trusted-azuread.md)]
8891
### Add
8992

93+
>[!NOTE]
94+
>Upload of new CAs will fail when any of the existing CAs are expired. Tenant Admin should delete the expired CAs and then upload the new CA.
95+
9096
[!INCLUDE [New-AzureAD](../../../includes/active-directory-authentication-new-trusted-azuread.md)]
9197

9298
**AuthorityType**

articles/active-directory/develop/access-tokens.md

Lines changed: 79 additions & 81 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/custom-claims-provider-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 03/13/2023
13+
ms.date: 03/31/2023
1414
ms.author: davidmu
1515
ms.reviewer: JasSuri
1616
ms.custom: aaddev
@@ -42,3 +42,4 @@ For an example using a custom claims provider with the **token issuance start**
4242

4343
- Learn how to [create and register a custom claims provider](custom-extension-get-started.md) with a sample Open ID Connect application.
4444
- If you already have a custom claims provider registered, you can configure a [SAML application](custom-extension-configure-saml-app.md) to receive tokens with claims sourced from an external store.
45+
- Learn more about custom claims providers with the [custom claims provider reference](custom-claims-provider-reference.md) article.

articles/active-directory/develop/custom-extension-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: how-to
1212
ms.workload: identity
13-
ms.date: 03/13/2023
13+
ms.date: 03/31/2023
1414
ms.author: davidmu
1515
ms.custom: aaddev
1616
ms.reviewer: JasSuri
@@ -147,7 +147,7 @@ The following screenshot demonstrates how to configure the Azure HTTP trigger fu
147147
}
148148
```
149149

150-
The code starts with reading the incoming JSON object. Azure AD sends the JSON object to your API. In this example, it reads the correlation ID value. Then, the code returns a collection of claims, including the original correlation ID, the version of your Azure Function, date of birth and custom role that is returned to Azure AD.
150+
The code starts with reading the incoming JSON object. Azure AD sends the [JSON object](./custom-claims-provider-reference.md) to your API. In this example, it reads the correlation ID value. Then, the code returns a collection of claims, including the original correlation ID, the version of your Azure Function, date of birth and custom role that is returned to Azure AD.
151151

152152
1. From the top menu, select **Get Function Url**, and copy the URL. In the next step, the function URL will be used and referred to as `{Function_Url}`.
153153

articles/active-directory/develop/includes/web-app/quickstart-python.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -74,15 +74,11 @@ You can also use an integrated development environment to open the folder.
7474

7575
1. Create a *.env* file in the root folder of the project using *.env.sample* as a guide.
7676

77-
```python
78-
TENANT_ID=<tenant id>
79-
CLIENT_ID=<client id>
80-
CLIENT_SECRET=<client secret>
81-
```
77+
:::code language="python" source="~/ms-identity-python-webapp/.env.sample":::
8278

83-
* Set the value of `TENANT_ID` to the **Directory (tenant) ID** of the registered application, also available on the overview page.
8479
* Set the value of `CLIENT_ID` to the **Application (client) ID** for the registered application, available on the overview page.
8580
* Set the value of `CLIENT_SECRET` to the client secret you created in **Certificates & Secrets** for the registered application.
81+
* Set the value of `TENANT_ID` to the **Directory (tenant) ID** of the registered application, also available on the overview page.
8682

8783
The environment variables are referenced in *app_config.py*, and are kept in a separate *.env* file to keep them out of source control. The provided *.gitignore* file prevents the *.env* file from being checked in.
8884

@@ -101,7 +97,7 @@ You can also use an integrated development environment to open the folder.
10197
2. Run the app from the command line, specifying the host and port to match the redirect URI:
10298

10399
```shell
104-
python3 -m flask run --host=localhost --port=5000
100+
python3 -m flask run --debug --host=localhost --port=5000
105101
```
106102

107103
> [!IMPORTANT]

0 commit comments

Comments
 (0)