Skip to content

Commit 0be0afd

Browse files
Tyler WhitneyTyler Whitney
authored andcommitted
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into twhitney-titles2
2 parents 5e856bb + 90af1a8 commit 0be0afd

File tree

399 files changed

+1751
-1224
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

399 files changed

+1751
-1224
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1942,11 +1942,6 @@
19421942
"redirect_url": "/azure/cosmos-db/sql-api-get-started",
19431943
"redirect_document_id": false
19441944
},
1945-
{
1946-
"source_path": "articles/search/search-traffic-analytics.md",
1947-
"redirect_url": "/azure/search/search-monitor-usage",
1948-
"redirect_document_id": false
1949-
},
19501945
{
19511946
"source_path": "articles/search/knowledge-store-howto.md",
19521947
"redirect_url": "/azure/search/knowledge-store-create-rest",

articles/active-directory/develop/howto-app-gallery-listing.md

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
1212
ms.workload: identity
13-
ms.date: 09/16/2019
13+
ms.date: 12/06/2019
1414
ms.author: ryanwi
1515
ms.reviewer: jeedes
1616
ms.custom: aaddev, seoapril2019
@@ -39,6 +39,10 @@ This article shows how to list an application in the Azure Active Directory (Azu
3939
- For password SSO, make sure that your application supports form authentication so that password vaulting can be done to get single sign-on to work as expected.
4040
- You need a permanent account for testing with at least two users registered.
4141

42+
**How to get Azure AD for developers?**
43+
44+
You can get a free test account with all the premium Azure AD features - 90 days free and can get extended as long as you do dev work with it: https://docs.microsoft.com/office/developer-program/office-365-developer-program
45+
4246
## Submit the request in the portal
4347

4448
After you've tested that your application integration works with Azure AD, submit your request for access in the [Application Network portal](https://microsoft.sharepoint.com/teams/apponboarding/Apps). If you have an Office 365 account, use that to sign in to this portal. If not, use your Microsoft account, such as Outlook or Hotmail, to sign in.
@@ -57,6 +61,26 @@ Our team reviews the details and gives you access accordingly. After your reques
5761

5862
![Submit Request (ISV) tile on home page](./media/howto-app-gallery-listing/homepage.png)
5963

64+
## Issues on logging into portal
65+
66+
If you are seeing this error while logging in then here are the detail on the issue and this is how you can fix it.
67+
68+
* If your sign-in was blocked as shown below:
69+
70+
![issues resolving application in the gallery](./media/howto-app-gallery-listing/blocked.png)
71+
72+
**What’s happening:**
73+
74+
The guest user is federated to a home tenant which is also an Azure AD. The guest user is at High risk. Microsoft doesn’t allow High risk users to access its resources. All High risk users (employees or guests / vendors) must remediate / close their risk to access Microsoft resources. For guest users, this user risk comes from the home tenant and the policy comes from the resource tenant (Microsoft in this case).
75+
76+
**Secure solutions:**
77+
78+
* MFA registered guest users remediate their own user risk. This can be done by the guest user performing a secured password change or reset (https://aka.ms/sspr) at their home tenant (this needs MFA and SSPR at the home tenant). The secured password change or reset must be initiated on Azure AD and not on-prem.
79+
80+
* Guest users have their admins remediate their risk. In this case, the admin will perform a password reset (temporary password generation). This does not need Identity Protection. The guest user’s admin can go to https://aka.ms/RiskyUsers and click on ‘Reset password’.
81+
82+
* Guest users have their admins close / dismiss their risk. Again, this does not need Identity Protection. The admin can go to https://aka.ms/RiskyUsers and click on ‘Dismiss user risk’. However, the admin must do the due diligence to ensure this was a false positive risk assessment before closing the user risk. Otherwise, they are putting their and Microsoft’s resources at risk by suppressing a risk assessment without investigation.
83+
6084
> [!NOTE]
6185
> If you have any issues with access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
6286
@@ -76,6 +100,7 @@ To list an application in the Azure AD app gallery, you first need to implement
76100
![Listing a SAML 2.0 or WS-Fed application in the gallery](./media/howto-app-gallery-listing/saml.png)
77101

78102
* If you want to add your application to list in the gallery by using **SAML 2.0** or **WS-Fed**, select **SAML 2.0/WS-Fed** as shown.
103+
79104
* If you have any issues with access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
80105

81106
## Implement SSO by using the password SSO
34.5 KB
Loading

articles/active-directory/fundamentals/active-directory-ops-guide-auth.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -287,28 +287,36 @@ If legacy authentication is widely used in your environment, you should plan to
287287

288288
### Consent grants
289289

290-
In an illicit consent grant attack, the attacker creates an Azure AD-registered application that requests access to data such as contact information, email, or documents. Users might be granting consent to malicious applications via phishing attacks, or indirectly by not being careful when landing on malicious websites.
290+
In an illicit consent grant attack, the attacker creates an Azure AD-registered application that requests access to data such as contact information, email, or documents. Users might be granting consent to malicious applications via phishing attacks when landing on malicious websites.
291291

292-
Below are the permissions you might want to scrutinize for Microsoft cloud services:
292+
Below are a list of apps with permissions you might want to scrutinize for Microsoft cloud services:
293293

294-
- Applications with app or delegated \*.ReadWrite Permissions
295-
- Applications with delegated permissions can read, send, or manage email on behalf of the user
296-
- Applications that are granted the using the following permissions:
294+
- Apps with app or delegated \*.ReadWrite Permissions
295+
- Apps with delegated permissions can read, send, or manage email on behalf of the user
296+
- Apps that are granted the using the following permissions:
297297

298298
| Resource | Permission |
299-
| -------------------------- | -------------------- |
299+
| :- | :- |
300300
| Office 365 Exchange Online | EAS.AccessAsUser.All |
301301
| | EWS.AccessAsUser.All |
302302
| | Mail.Read |
303303
| Microsoft Graph | Mail.Read |
304304
| | Mail.Read.Shared |
305305
| | Mail.ReadWrite |
306306

307-
To avoid this scenario, you should refer to [Detect and Remediate Illicit Consent Grants in Office 365](https://docs.microsoft.com/office365/securitycompliance/detect-and-remediate-illicit-consent-grants) to identify and fix any applications with illicit grants or applications that have more grants than are necessary. Schedule regular reviews of app permissions and remove them when not needed; or remove self-service altogether and establish governance procedures.
307+
- Apps granted full user impersonation of the signed-in user. For example:
308+
309+
|Resource | Permission |
310+
| :- | :- |
311+
| Azure AD Graph | Directory.AccessAsUser.All |
312+
| Microsoft Graph | Directory.AccessAsUser.All |
313+
| Azure REST API | user_impersonation |
314+
315+
To avoid this scenario, you should refer to [detect and remediate illicit consent grants in Office 365](https://docs.microsoft.com/office365/securitycompliance/detect-and-remediate-illicit-consent-grants) to identify and fix any applications with illicit grants or applications that have more grants than are necessary. Next, [remove self-service altogether](https://docs.microsoft.com/azure/active-directory/manage-apps/configure-user-consent) and [establish governance procedures](https://docs.microsoft.com/azure/active-directory/manage-apps/configure-admin-consent-workflow). Finally, schedule regular reviews of app permissions and remove them when they are not needed.
308316

309317
#### Consent grants recommended reading
310318

311-
- [Azure Active Directory (AD) Graph API Permission Scopes](https://msdn.microsoft.com/library/azure/ad/graph/howto/azure-ad-graph-api-permission-scopes)
319+
- [Microsoft Graph permissions](https://docs.microsoft.com/graph/permissions-reference)
312320

313321
### User and group settings
314322

articles/active-directory/manage-apps/customize-application-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ The SCIM RFC defines a core user and group schema, while also allowing for exten
135135
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com), select **Enterprise Applications**, select your application, and then select **Provisioning**.
136136
2. Under **Mappings**, select the object (user or group) for which you'd like to add a custom attribute.
137137
3. At the bottom of the page, select **Show advanced options**.
138-
4. Select **Edit attribute list for *application*.
138+
4. Select **Edit attribute list for AppName*.
139139
5. At the bottom of the attribute list, enter information about the custom attribute in the fields provided. Then select **Add Attribute**.
140140

141141
For SCIM applications, the attribute name must follow the pattern shown in the example below. The "CustomExtensionName" and "CustomAttribute" can be customized per your application's requirements, for example: urn:ietf:params:scim:schemas:extension:2.0:CustomExtensionName:CustomAttribute

articles/azure-cache-for-redis/cache-web-app-howto.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ The ASP.NET runtime merges the contents of the external file with the markup in
141141

142142
// Connection refers to a property that returns a ConnectionMultiplexer
143143
// as shown in the previous example.
144-
IDatabase cache = lazyConnection.Value.GetDatabase();
144+
IDatabase cache = lazyConnection.GetDatabase();
145145

146146
// Perform cache operations using the cache object...
147147

@@ -164,7 +164,7 @@ The ASP.NET runtime merges the contents of the external file with the markup in
164164
ViewBag.command5 = "CLIENT LIST";
165165
ViewBag.command5Result = cache.Execute("CLIENT", "LIST").ToString().Replace(" id=", "\rid=");
166166

167-
lazyConnection.Value.Dispose();
167+
lazyConnection.Dispose();
168168

169169
return View();
170170
}

articles/azure-functions/functions-add-output-binding-storage-queue-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ mvn azure-functions:run
113113
```
114114

115115
> [!NOTE]
116-
> Because you enabled extension bundles in the host.json, the [Storage binding extension](functions-bindings-storage-blob.md#packages---functions-2x) was downloaded and installed for you during startup, along with the other Microsoft binding extensions.
116+
> Because you enabled extension bundles in the host.json, the [Storage binding extension](functions-bindings-storage-blob.md#packages---functions-2x-and-higher) was downloaded and installed for you during startup, along with the other Microsoft binding extensions.
117117
118118
As before, trigger the function from the command line using cURL in a new terminal window:
119119

articles/azure-functions/functions-add-output-binding-storage-queue-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ func host start
5050
```
5151

5252
> [!NOTE]
53-
> Because you enabled extension bundles in the host.json, the [Storage binding extension](functions-bindings-storage-blob.md#packages---functions-2x) was downloaded and installed for you during startup, along with the other Microsoft binding extensions.
53+
> Because you enabled extension bundles in the host.json, the [Storage binding extension](functions-bindings-storage-blob.md#packages---functions-2x-and-higher) was downloaded and installed for you during startup, along with the other Microsoft binding extensions.
5454
5555
Copy the URL of your `HttpTrigger` function from the runtime output and paste it into your browser's address bar. Append the query string `?name=<yourname>` to this URL and run the request. You should see the same response in the browser as you did in the previous article.
5656

articles/azure-functions/functions-bindings-cosmosdb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom: seodec18
1717
This article explains how to work with [Azure Cosmos DB](../cosmos-db/serverless-computing-database.md) bindings in Azure Functions. Azure Functions supports trigger, input, and output bindings for Azure Cosmos DB.
1818

1919
> [!NOTE]
20-
> This article is for Azure Functions 1.x. For information about how to use these bindings in Functions 2.x, see [Azure Cosmos DB bindings for Azure Functions 2.x](functions-bindings-cosmosdb-v2.md).
20+
> This article is for Azure Functions 1.x. For information about how to use these bindings in Functions 2.x and higher, see [Azure Cosmos DB bindings for Azure Functions 2.x](functions-bindings-cosmosdb-v2.md).
2121
>
2222
>This binding was originally named DocumentDB. In Functions version 1.x, only the trigger was renamed Cosmos DB; the input binding, output binding, and NuGet package retain the DocumentDB name.
2323

articles/azure-functions/functions-bindings-event-grid.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ If you prefer, you can use an HTTP trigger to handle Event Grid Events; see [Use
2020

2121
[!INCLUDE [intro](../../includes/functions-bindings-intro.md)]
2222

23-
## Packages - Functions 2.x
23+
## Packages - Functions 2.x and higher
2424

2525
The Event Grid trigger is provided in the [Microsoft.Azure.WebJobs.Extensions.EventGrid](https://www.nuget.org/packages/Microsoft.Azure.WebJobs.Extensions.EventGrid) NuGet package, version 2.x. Source code for the package is in the [azure-functions-eventgrid-extension](https://github.com/Azure/azure-functions-eventgrid-extension/tree/v2.x) GitHub repository.
2626

@@ -44,9 +44,9 @@ See the language-specific example for an Event Grid trigger:
4444

4545
For an HTTP trigger example, see [How to use HTTP trigger](#use-an-http-trigger-as-an-event-grid-trigger) later in this article.
4646

47-
### C# (2.x)
47+
### C# (2.x and higher)
4848

49-
The following example shows a Functions 2.x [C# function](functions-dotnet-class-library.md) that binds to `EventGridEvent`:
49+
The following example shows a [C# function](functions-dotnet-class-library.md) that binds to `EventGridEvent`:
5050

5151
```cs
5252
using Microsoft.Azure.EventGrid.Models;
@@ -114,9 +114,9 @@ Here's the binding data in the *function.json* file:
114114
}
115115
```
116116

117-
#### C# script (Version 2.x)
117+
#### C# script (Version 2.x and higher)
118118

119-
Here's Functions 2.x C# script code that binds to `EventGridEvent`:
119+
Here's an example that binds to `EventGridEvent`:
120120

121121
```csharp
122122
#r "Microsoft.Azure.EventGrid"
@@ -322,7 +322,7 @@ For C# and F# functions in Azure Functions 1.x, you can use the following parame
322322
* `JObject`
323323
* `string`
324324

325-
For C# and F# functions in Azure Functions 2.x, you also have the option to use the following parameter type for the Event Grid trigger:
325+
For C# and F# functions in Azure Functions 2.x and higher, you also have the option to use the following parameter type for the Event Grid trigger:
326326

327327
* `Microsoft.Azure.EventGrid.Models.EventGridEvent`- Defines properties for the fields common to all event types.
328328

@@ -391,7 +391,7 @@ To create a subscription by using [the Azure CLI](https://docs.microsoft.com/cli
391391

392392
The command requires the endpoint URL that invokes the function. The following example shows the version-specific URL pattern:
393393

394-
#### Version 2.x runtime
394+
#### Version 2.x (and higher) runtime
395395

396396
https://{functionappname}.azurewebsites.net/runtime/webhooks/eventgrid?functionName={functionname}&code={systemkey}
397397

@@ -403,7 +403,7 @@ The system key is an authorization key that has to be included in the endpoint U
403403

404404
Here's an example that subscribes to a blob storage account (with a placeholder for the system key):
405405

406-
#### Version 2.x runtime
406+
#### Version 2.x (and higher) runtime
407407

408408
```azurecli
409409
az eventgrid resource event-subscription create -g myResourceGroup \
@@ -431,7 +431,7 @@ For more information about how to create a subscription, see [the blob storage q
431431

432432
You can get the system key by using the following API (HTTP GET):
433433

434-
#### Version 2.x runtime
434+
#### Version 2.x (and higher) runtime
435435

436436
```
437437
http://{functionappname}.azurewebsites.net/admin/host/systemkeys/eventgrid_extension?code={masterkey}
@@ -519,7 +519,7 @@ Use a tool such as [Postman](https://www.getpostman.com/) or [curl](https://curl
519519
* Set an `aeg-event-type: Notification` header.
520520
* Paste the RequestBin data into the request body.
521521
* Post to the URL of your Event Grid trigger function.
522-
* For 2.x use the following pattern:
522+
* For 2.x and higher use the following pattern:
523523

524524
```
525525
http://localhost:7071/runtime/webhooks/eventgrid?functionName={FUNCTION_NAME}
@@ -588,7 +588,7 @@ The ngrok URL doesn't get special handling by Event Grid, so your function must
588588
589589
Create an Event Grid subscription of the type you want to test, and give it your ngrok endpoint.
590590
591-
Use this endpoint pattern for Functions 2.x:
591+
Use this endpoint pattern for Functions 2.x and higher:
592592
593593
```
594594
https://{SUBDOMAIN}.ngrok.io/runtime/webhooks/eventgrid?functionName={FUNCTION_NAME}

0 commit comments

Comments
 (0)