You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article covers many of the authentication concepts you'll need to understand to create protected web apps, web APIs, or apps calling protected Web APIs. If you see a term you aren't familiar with, try our (glossary)[developer-glossary.md].
24
+
This article covers many of the authentication concepts you'll need to understand to create protected web apps, web APIs, or apps calling protected Web APIs. If you see a term you aren't familiar with, try our [glossary](developer-glossary.md).
25
25
26
26
**Authentication** is the process of proving you are who you say you are. Authentication is sometimes shortened to AuthN.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v2-java-webapp.md
+26-13Lines changed: 26 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ To run this sample you will need:
57
57
> - Leave **Redirect URI** blank for now, and select **Register**.
58
58
> 1. On the **Overview** page, find the **Application (client) ID** and the **Directory (tenant) ID** values of the application. Copy these values for later.
59
59
> 1. Select the **Authentication** from the menu, and then add the following information:
60
-
> - In **Redirect URIs**, add `http://localhost:8080/msal4jsample/secure/aad` and `http://localhost:8080/msal4jsample/graph/me`.
60
+
> - In **Redirect URIs**, add `https://localhost:8080/msal4jsample/secure/aad` and `https://localhost:8080/msal4jsample/graph/me`.
61
61
> - Select **Save**.
62
62
> 1. Select the **Certificates & secrets** from the menu and in the **Client secrets** section, click on **New client secret**:
63
63
>
@@ -71,7 +71,7 @@ To run this sample you will need:
71
71
>
72
72
> For the code sample for this quickstart to work, you need to:
73
73
>
74
-
> 1. Add reply URLs as `http://localhost:8080/msal4jsamples/secure/aad` and `http://localhost:8080/msal4jsamples/graph/me`.
74
+
> 1. Add reply URLs as `https://localhost:8080/msal4jsamples/secure/aad` and `https://localhost:8080/msal4jsamples/graph/me`.
@@ -87,23 +87,36 @@ To run this sample you will need:
87
87
88
88
1. Extract the zip file to a local folder.
89
89
1. If you use an integrated development environment, open the sample in your favorite IDE (optional).
90
-
91
90
1. Open the application.properties file, which can be found in src/main/resources/ folder and replace the value of the fields *aad.clientId*, *aad.authority* and *aad.secretKey* with the respective values of **Application Id**, **Tenant Id** and **Client Secret** as the following:
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
105
-
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
106
-
> - `Enter_the_Tenant_Info_Here` - is the **Directory (tenant) ID** value of the application you registered.
100
+
> [!div renderon="docs"]
101
+
> Where:
102
+
>
103
+
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
104
+
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
105
+
> - `Enter_the_Tenant_Info_Here` - is the **Directory (tenant) ID** value of the application you registered.
106
+
107
+
1. To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
Put the generated keystore file in the "resources" folder.
107
120
108
121
#### Step 4: Run the code sample
109
122
@@ -113,11 +126,11 @@ Run it directly from your IDE by using the embedded spring boot server or packag
113
126
114
127
##### Running from IDE
115
128
116
-
If you are running the web application from an IDE, click on run, then navigate to the home page of the project. For this sample, the standard home page URL is http://localhost:8080
129
+
If you are running the web application from an IDE, click on run, then navigate to the home page of the project. For this sample, the standard home page URL is https://localhost:8080.
117
130
118
131
1. On the front page, select the **Login** button to redirect to Azure Active Directory and prompt the user for their credentials.
119
132
120
-
1. After the user is authenticated, they are redirected to *http://localhost:8080/msal4jsample/secure/aad*. They are now signed in, and the page will show information about the signed-in account. The sample UI has the following buttons:
133
+
1. After the user is authenticated, they are redirected to *https://localhost:8080/msal4jsample/secure/aad*. They are now signed in, and the page will show information about the signed-in account. The sample UI has the following buttons:
121
134
- *Sign Out*: Signs the current user out of the application and redirects them to the home page.
122
135
- *Show User Info*: Acquires a token for Microsoft Graph and calls Microsoft Graph with a request containing the token, which returns basic information about the signed-in user.
Copy file name to clipboardExpand all lines: articles/azure-databricks/quickstart-create-databricks-workspace-vnet-injection.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.date: 12/04/2019
14
14
15
15
The default deployment of Azure Databricks creates a new virtual network that is managed by Databricks. This quickstart shows how to create an Azure Databricks workspace in your own virtual network instead. You also create an Apache Spark cluster within that workspace.
16
16
17
-
For more information about why you might choose to create an Azure Databricks workspace in your own virtual network, see [Deploy Azure Databricks in your Azure Virtual Network (VNet Injection)] (/databricks/administration-guide/cloud-configurations/azure/vnet-inject).
17
+
For more information about why you might choose to create an Azure Databricks workspace in your own virtual network, see [Deploy Azure Databricks in your Azure Virtual Network (VNet Injection)](https://docs.microsoft.com/azure/databricks/administration-guide/cloud-configurations/azure/vnet-inject).
18
18
19
19
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/databricks/).
Copy file name to clipboardExpand all lines: articles/cosmos-db/high-availability.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,7 +101,7 @@ The following table summarizes the high availability capability of various accou
101
101
|Zone failures – availability | Availability loss | No availability loss | No availability loss |
102
102
|Read latency | Cross region | Cross region | Low |
103
103
|Write latency | Cross region | Cross region | Low |
104
-
|Regional outage – data loss | Data loss | Data loss | Data loss <br/><br/> When using bounded staleness consistency with multi master and more than one region, data loss is limited to the bounded staleness configured on your account. <br/><br/> Data loss during regional outage can be avoided by configuring strong consistency with multiple regions. This option comes with tradeoffs that impact availability and performance. |
104
+
|Regional outage – data loss | Data loss | Data loss | Data loss <br/><br/> When using bounded staleness consistency with multi master and more than one region, data loss is limited to the bounded staleness configured on your account <br/><br />You can avoid data loss during a regional outage by configuring strong consistency with multiple regions. This option comes with trade-offs that affect availability and performance. It can be configured only on accounts that are configured for single-region writes.|
105
105
|Regional outage – availability | Availability loss | Availability loss | No availability loss |
106
106
|Throughput | X RU/s provisioned throughput | X RU/s provisioned throughput | 2X RU/s provisioned throughput <br/><br/> This configuration mode requires twice the amount of throughput when compared to a single region with Availability Zones because there are two regions. |
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/service-bus-amqp-protocol-guide.md
+9Lines changed: 9 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,6 +78,15 @@ Azure Service Bus currently uses exactly one session for each connection. The Se
78
78
79
79
Connections, channels, and sessions are ephemeral. If the underlying connection collapses, connections, TLS tunnel, SASL authorization context, and sessions must be reestablished.
80
80
81
+
### AMQP outbound port requirements
82
+
83
+
Clients that use AMQP connections over TCP require ports 5671 and 5672 to be opened in the local firewall. Along with these ports, it might be necessary to open additional ports if the [EnableLinkRedirect](https://docs.microsoft.com/dotnet/api/microsoft.servicebus.messaging.amqp.amqptransportsettings.enablelinkredirect?view=azure-dotnet) feature is enabled. `EnableLinkRedirect` is a new messaging feature that helps skip one-hop while receiving messages, thus helping to boost throughput. The client would start communicating directly with the back-end service over port range 104XX as shown in the following image.
84
+
85
+
![List of destination ports][4]
86
+
87
+
A .NET client would fail with a SocketException ("An attempt was made to access a socket in a way forbidden by its access permissions") if these ports are blocked by the firewall. The feature can be disabled by setting `EnableAmqpLinkRedirect=false` in the connectiong string, which forces the clients to communicate with the remote service over port 5671.
88
+
89
+
81
90
### Links
82
91
83
92
AMQP transfers messages over links. A link is a communication path created over a session that enables transferring messages in one direction; the transfer status negotiation is over the link and bi-directional between the connected parties.
Copy file name to clipboardExpand all lines: articles/vmware-cloudsimple/disaster-recovery-site-recovery-manager.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,7 @@ You can add an external identity provider as described in [Use Azure AD as an id
96
96
97
97
To provide IP address lookup, IP address management, and name resolution services for your workloads in the AVS Private Cloud, set up a DHCP and DNS server as described in [Set up DNS and DHCP applications and workloads in your AVS Private Cloud](dns-dhcp-setup.md).
98
98
99
-
The *.avs.io domain is used by management VMs and hosts in your AVS Private Cloud. To resolve requests to this domain, configure DNS forwarding on the DNS server as described in [Create a Conditional Forwarder](on-premises-dns-setup.md#create-a-conditional-forwarder).
99
+
The *.cloudsimple.io domain is used by management VMs and hosts in your AVS Private Cloud. To resolve requests to this domain, configure DNS forwarding on the DNS server as described in [Create a Conditional Forwarder](on-premises-dns-setup.md#create-a-conditional-forwarder).
100
100
101
101
### Install vSphere Replication Appliance in your on-premises environment
Copy file name to clipboardExpand all lines: articles/vmware-cloudsimple/disaster-recovery-zerto.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ The following sections describe how to deploy a DR solution using Zerto Virtual
46
46
To enable Zerto Virtual Replication from your on-premises environment to your AVS Private Cloud, complete the following prerequisites.
47
47
48
48
1.[Set up a Site-to-Site VPN connection between your on-premises network and your AVS Private Cloud](set-up-vpn.md).
49
-
2.[Set up DNS lookup so that your AVS Private Cloud management components are forwarded to AVS Private Cloud DNS servers](on-premises-dns-setup.md). To enable forwarding of DNS lookup, create a forwarding zone entry in your on-premises DNS server for `*.AVS.io` to AVS DNS servers.
49
+
2.[Set up DNS lookup so that your AVS Private Cloud management components are forwarded to AVS Private Cloud DNS servers](on-premises-dns-setup.md). To enable forwarding of DNS lookup, create a forwarding zone entry in your on-premises DNS server for `*.cloudsimple.io` to AVS DNS servers.
50
50
3. Set up DNS lookup so that on-premises vCenter components are forwarded to on-premises DNS servers. The DNS servers must be reachable from your AVS Private Cloud over Site-to-Site VPN. For assistance, submit a [support request](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest), providing the following information.
0 commit comments