Skip to content

Commit 10a1caa

Browse files
committed
2 parents 49432d3 + 6c98dd1 commit 10a1caa

File tree

471 files changed

+3722
-3495
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

471 files changed

+3722
-3495
lines changed

.openpublishing.redirection.json

Lines changed: 61 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20700,9 +20700,59 @@
2070020700
"redirect_url": "https://go.microsoft.com/fwlink/?linkid=847458",
2070120701
"redirect_document_id": false
2070220702
},
20703+
{
20704+
"source_path": "articles/marketplace/cloud-partner-portal/iot-edge-module/cpp-offer-process-parts.md",
20705+
"redirect_url": "/azure/marketplace/partner-center-portal/azure-iot-edge-module-creation",
20706+
"redirect_document_id": false
20707+
},
20708+
{
20709+
"source_path": "articles/marketplace/cloud-partner-portal/iot-edge-module/cpp-prerequisites.md",
20710+
"redirect_url": "/azure/marketplace/partner-center-portal/azure-iot-edge-module-creation",
20711+
"redirect_document_id": false
20712+
},
20713+
{
20714+
"source_path": "articles/marketplace/cloud-partner-portal/iot-edge-module/cpp-create-offer.md",
20715+
"redirect_url": "/azure/marketplace/partner-center-portal/azure-iot-edge-module-creation",
20716+
"redirect_document_id": false
20717+
},
20718+
{
20719+
"source_path": "articles/marketplace/cloud-partner-portal/iot-edge-module/cpp-offer-settings-tab.md",
20720+
"redirect_url": "/azure/marketplace/partner-center-portal/azure-iot-edge-module-creation",
20721+
"redirect_document_id": false
20722+
},
20723+
{
20724+
"source_path": "articles/marketplace/cloud-partner-portal/iot-edge-module/cpp-skus-tab.md",
20725+
"redirect_url": "/azure/marketplace/partner-center-portal/azure-iot-edge-module-creation",
20726+
"redirect_document_id": false
20727+
},
20728+
{
20729+
"source_path": "articles/marketplace/cloud-partner-portal/iot-edge-module/cpp-marketplace-tab.md",
20730+
"redirect_url": "/azure/marketplace/partner-center-portal/azure-iot-edge-module-creation",
20731+
"redirect_document_id": false
20732+
},
20733+
{
20734+
"source_path": "articles/marketplace/cloud-partner-portal/iot-edge-module/cpp-support-tab.md",
20735+
"redirect_url": "/azure/marketplace/partner-center-portal/azure-iot-edge-module-creation",
20736+
"redirect_document_id": false
20737+
},
20738+
{
20739+
"source_path": "articles/marketplace/cloud-partner-portal/iot-edge-module/cpp-publish-offer.md",
20740+
"redirect_url": "/azure/marketplace/partner-center-portal/azure-iot-edge-module-creation",
20741+
"redirect_document_id": false
20742+
},
20743+
{
20744+
"source_path": "articles/marketplace/cloud-partner-portal/iot-edge-module/cpp-update-existing-offer.md",
20745+
"redirect_url": "/azure/marketplace/partner-center-portal/azure-iot-edge-module-creation",
20746+
"redirect_document_id": false
20747+
},
20748+
{
20749+
"source_path": "articles/marketplace/cloud-partner-portal/iot-edge-module/cpp-create-technical-assets.md",
20750+
"redirect_url": "/azure/marketplace/partner-center-portal/create-iot-edge-module-asset",
20751+
"redirect_document_id": false
20752+
},
2070320753
{
2070420754
"source_path": "articles/marketplace/partner-center-portal/billing-details.md",
20705-
"redirect_url": "https://docs.microsoft.com/azure/marketplace/marketplace-commercial-transaction-capabilities-and-considerations",
20755+
"redirect_url": "/azure/marketplace/marketplace-commercial-transaction-capabilities-and-considerations",
2070620756
"redirect_document_id": false
2070720757
},
2070820758
{
@@ -28220,6 +28270,16 @@
2822028270
"redirect_url": "/azure/storage/common/storage-designing-ha-apps-with-ragrs",
2822128271
"redirect_document_id": true
2822228272
},
28273+
{
28274+
"source_path": "articles/storage/common/storage-designing-ha-apps-with-ragrs.md",
28275+
"redirect_url": "/azure/storage/common/geo-redundant-design",
28276+
"redirect_document_id": true
28277+
},
28278+
{
28279+
"source_path": "articles/storage/blobs/storage-simulate-failure-ragrs-account-app.md",
28280+
"redirect_url": "/azure/storage/common/simulate-primary-region-failure",
28281+
"redirect_document_id": false
28282+
},
2822328283
{
2822428284
"source_path": "articles/storage/common/storage-redundancy-lrs.md",
2822528285
"redirect_url": "/azure/storage/common/storage-redundancy",

articles/active-directory/cloud-provisioning/how-to-prerequisites.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@ Run the [IdFix tool](https://docs.microsoft.com/office365/enterprise/prepare-dir
4343

4444
1. Identify a domain-joined host server running Windows Server 2012 R2 or greater with a minimum of 4-GB RAM and .NET 4.7.1+ runtime.
4545

46+
1. The PowerShell execution policy on the local server must be set to Undefined or RemoteSigned.
47+
4648
1. If there's a firewall between your servers and Azure AD, configure the following items:
4749
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
4850

-1.79 KB
Loading

articles/active-directory/develop/active-directory-configurable-token-lifetimes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.reviewer: hirsin, jlu, annaba
2020
You can specify the lifetime of a token issued by Azure Active Directory (Azure AD). You can set token lifetimes for all apps in your organization, for a multi-tenant (multi-organization) application, or for a specific service principal in your organization.
2121

2222
> [!IMPORTANT]
23-
> After hearing from customers during the preview, we've implemented [authentication session management capabilities](https://go.microsoft.com/fwlink/?linkid=2083106) in Azure AD Conditional Access. You can use this new feature to configure refresh token lifetimes by setting sign in frequency. After May 1, 2020 you will not be able to use Configurable Token Lifetime policy to configure session and refresh tokens. You can still configure access token lifetimes after the deprecation.
23+
> After hearing from customers during the preview, we've implemented [authentication session management capabilities](https://go.microsoft.com/fwlink/?linkid=2083106) in Azure AD Conditional Access. You can use this new feature to configure refresh token lifetimes by setting sign in frequency. After May 30, 2020 no new tenant will be able to use Configurable Token Lifetime policy to configure session and refresh tokens. The deprecation will happen within several months after that, which means that we will stop honoring existing session and refresh tokens polices. You can still configure access token lifetimes after the deprecation.
2424
2525
In Azure AD, a policy object represents a set of rules that are enforced on individual applications or on all applications in an organization. Each policy type has a unique structure, with a set of properties that are applied to objects to which they are assigned.
2626

articles/active-directory/develop/quickstart-v2-aspnet-webapp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ In this quickstart, you use a code sample to learn how an ASP.NET web app to sig
4040
> 1. Select **New registration**.
4141
> 1. When the **Register an application** page appears, enter your application's registration information:
4242
> - In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `ASPNET-Quickstart`.
43-
> - Add `http://localhost:44368/` in **Redirect URI**, and click **Register**.
43+
> - Add `https://localhost:44368/` in **Redirect URI**, and click **Register**.
4444
> - From the left navigation pane under the Manage section, select **Authentication**
4545
> - Under the **Implicit Grant** sub-section, select **ID tokens**.
4646
> - And then select **Save**.

articles/active-directory/develop/sample-v2-code.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,11 @@ These samples show how to write a single-page application secured with Microsoft
3838
| Platform | Description | Link |
3939
| -------- | --------------------- | -------- |
4040
| ![This image shows the JavaScript logo](media/sample-v2-code/logo_js.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core) | Calls Microsoft Graph |[javascript-graphapi-v2](https://github.com/Azure-Samples/active-directory-javascript-graphapi-v2) |
41+
| ![This image shows the JavaScript logo](media/sample-v2-code/logo_js.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core) | Calls Microsoft Graph using Auth Code Flow w/ PKCE |[javascript-v2](https://github.com/Azure-Samples/ms-identity-javascript-v2) |
4142
| ![This image shows the JavaScript logo](media/sample-v2-code/logo_js.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core) | Calls B2C |[b2c-javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp) |
42-
| ![This image shows the JavaScript logo](media/sample-v2-code/logo_js.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core) | Calls own web API |[javascript-singlepageapp-dotnet-webapi-v2](https://github.com/Azure-Samples/active-directory-javascript-singlepageapp-dotnet-webapi-v2) |
43+
| ![This image shows the Angular logo](media/sample-v2-code/logo_angular.png) [JavaScript (MSAL Angular)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-angular)| Calls own Web API | [ms-identity-javascript-angular-spa-aspnetcore-webapi](https://github.com/Azure-Samples/ms-identity-javascript-angular-spa-aspnetcore-webapi) |
4344
| ![This image shows the Angular logo](media/sample-v2-code/logo_angular.png) [JavaScript (MSAL Angular)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-angular)| Calls Microsoft Graph | [active-directory-javascript-singlepageapp-angular](https://github.com/Azure-Samples/active-directory-javascript-singlepageapp-angular) |
45+
| ![This image shows the React logo](media/sample-v2-code/logo_react.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core)| Calls own Web API which in turn calls Microsoft Graph | [ms-identity-javascript-react-spa-dotnetcore-webapi-obo](https://github.com/Azure-Samples/ms-identity-javascript-react-spa-dotnetcore-webapi-obo) |
4446
| ![This image shows the Angular logo](media/sample-v2-code/logo_angular.png) [JavaScript (MSAL Angular)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-angular) | Calls B2C |[active-directory-b2c-javascript-angular-spa](https://github.com/Azure-Samples/active-directory-b2c-javascript-angular-spa) |
4547

4648
## Web applications

articles/active-directory/develop/single-sign-on-saml-protocol.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -149,12 +149,12 @@ The `Response` element includes the result of the authorization request. Azure A
149149

150150
### Issuer
151151

152-
Azure AD sets the `Issuer` element to `https://login.microsoftonline.com/<TenantIDGUID>/` where \<TenantIDGUID> is the tenant ID of the Azure AD tenant.
152+
Azure AD sets the `Issuer` element to `https://sts.windows.net/<TenantIDGUID>/` where \<TenantIDGUID> is the tenant ID of the Azure AD tenant.
153153

154154
For example, a response with Issuer element could look like the following sample:
155155

156156
```
157-
<Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> https://login.microsoftonline.com/82869000-6ad1-48f0-8171-272ed18796e9/</Issuer>
157+
<Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> https://sts.windows.net/82869000-6ad1-48f0-8171-272ed18796e9/</Issuer>
158158
```
159159

160160
### Status
@@ -187,7 +187,7 @@ In addition to the `ID`, `IssueInstant` and `Version`, Azure AD sets the followi
187187
This is set to `https://sts.windows.net/<TenantIDGUID>/`where \<TenantIDGUID> is the Tenant ID of the Azure AD tenant.
188188

189189
```
190-
<Issuer>https://login.microsoftonline.com/82869000-6ad1-48f0-8171-272ed18796e9/</Issuer>
190+
<Issuer>https://sts.windows.net/82869000-6ad1-48f0-8171-272ed18796e9/</Issuer>
191191
```
192192

193193
#### Signature

articles/active-directory/devices/manage-stale-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ To learn more about the different types, see the [device management overview](ov
175175

176176
Any authentication where a device is being used to authenticate to Azure AD are denied. Common examples are:
177177

178-
- **Hybrid Azure AD joined device** - Users might be to use the device to sign-in to their on-premises domain. However, they can't access Azure AD resources such as Office 365.
178+
- **Hybrid Azure AD joined device** - Users might be able to use the device to sign-in to their on-premises domain. However, they can't access Azure AD resources such as Office 365.
179179
- **Azure AD joined device** - Users can't use the device to sign in.
180180
- **Mobile devices** - User can't access Azure AD resources such as Office 365.
181181

articles/active-directory/hybrid/how-to-connect-fed-group-claims.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ author: billmath
1818

1919
Azure Active Directory can provide a users group membership information in tokens for use within applications. Two main patterns are supported:
2020

21-
- Groups identified by their Azure Active Directory object identifier (OID) attribute
22-
- Groups identified by sAMAccountName or GroupSID attributes for Active Directory (AD) synchronized groups and users
21+
- Groups identified by their Azure Active Directory object identifier (OID) attribute
22+
- Groups identified by sAMAccountName or GroupSID attributes for Active Directory (AD) synchronized groups and users
2323

2424
> [!IMPORTANT]
2525
> There are a number of caveats to note for this functionality:
-184 Bytes
Loading

0 commit comments

Comments
 (0)