Skip to content

Commit 144b8cb

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents ccda8f4 + 7ff2dc8 commit 144b8cb

File tree

207 files changed

+2180
-1464
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

207 files changed

+2180
-1464
lines changed

.openpublishing.redirection.json

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23733,6 +23733,16 @@
2373323733
"redirect_url": "/azure/azure-functions/functions-how-to-custom-container",
2373423734
"redirect_document_id": false
2373523735
},
23736+
{
23737+
"source_path_from_root": "/articles/azure-functions/create-function-app-linux-app-service-plan.md",
23738+
"redirect_url": "/azure/azure-functions/functions-create-function-app-portal",
23739+
"redirect_document_id": false
23740+
},
23741+
{
23742+
"source_path_from_root": "/articles/azure-functions/create-premium-plan-function-app-portal.md",
23743+
"redirect_url": "/azure/azure-functions/functions-create-function-app-portal",
23744+
"redirect_document_id": false
23745+
},
2373623746
{
2373723747
"source_path_from_root": "/articles/sentinel/data-connectors/windows-firewall-events-via-ama.md",
2373823748
"redirect_url": "/azure/sentinel/data-connectors-reference",
@@ -23858,6 +23868,51 @@
2385823868
"redirect_url": "/azure/active-directory/authentication/how-to-migrate-mfa-server-to-mfa-with-federation",
2385923869
"redirect_document_id": true
2386023870
},
23871+
{
23872+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-sample-sign-in.md",
23873+
"redirect_url": "/azure/active-directory/external-identities/customers/sample-single-page-app-vanillajs-sign-in",
23874+
"redirect_document_id": true
23875+
},
23876+
{
23877+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-application-angular-sample.md",
23878+
"redirect_url": "/azure/active-directory/external-identities/customers/sample-single-page-application-angular",
23879+
"redirect_document_id": true
23880+
},
23881+
{
23882+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-application-react-sample.md",
23883+
"redirect_url": "/azure/active-directory/external-identities/customers/sample-single-page-application-react",
23884+
"redirect_document_id": true
23885+
},
23886+
{
23887+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-node-sample-sign-in.md",
23888+
"redirect_url": "/azure/active-directory/external-identities/customers/sample-web-app-node-sign-in",
23889+
"redirect_document_id": true
23890+
},
23891+
{
23892+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-node-sample-sign-in-call-api.md",
23893+
"redirect_url": "/azure/active-directory/external-identities/customers/sample-web-app-node-sign-in-call-api",
23894+
"redirect_document_id": true
23895+
},
23896+
{
23897+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sample-sign-in.md",
23898+
"redirect_url": "/azure/active-directory/external-identities/customers/sample-web-app-dotnet-sign-in",
23899+
"redirect_document_id": true
23900+
},
23901+
{
23902+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-browserless-app-node-sample-sign-in.md",
23903+
"redirect_url": "/azure/active-directory/external-identities/customers/sample-browserless-app-node-sign-in",
23904+
"redirect_document_id": true
23905+
},
23906+
{
23907+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-browserless-app-dotnet-sample-sign-in.md",
23908+
"redirect_url": "/azure/active-directory/external-identities/customers/sample-browserless-app-dotnet-sign-in",
23909+
"redirect_document_id": true
23910+
},
23911+
{
23912+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-daemon-node-sample-call-api.md",
23913+
"redirect_url": "/azure/active-directory/external-identities/customers/sample-daemon-node-call-api",
23914+
"redirect_document_id": true
23915+
},
2386123916
{
2386223917
"source_path_from_root": "/articles/active-directory/manage-apps/migrate-okta-sync-provisioning-to-azure-active-directory.md",
2386323918
"redirect_url": "/azure/active-directory/manage-apps/migrate-okta-sync-provisioning",

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 04/17/2023
9+
ms.date: 06/23/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -35,17 +35,20 @@ To work properly, phone numbers must be in the format *+CountryCode PhoneNumber*
3535
3636
## Mobile phone verification
3737

38-
For Azure AD Multi-Factor Authentication or SSPR, users can choose to receive a text message with a verification code to enter in the sign-in interface, or receive a phone call.
38+
For Azure AD Multi-Factor Authentication or SSPR, users can choose to receive an SMS message with a verification code to enter in the sign-in interface, or receive a phone call.
3939

4040
If users don't want their mobile phone number to be visible in the directory but want to use it for password reset, administrators shouldn't populate the phone number in the directory. Instead, users should populate their **Authentication Phone** attribute via the combined security info registration at [https://aka.ms/setupsecurityinfo](https://aka.ms/setupsecurityinfo). Administrators can see this information in the user's profile, but it's not published elsewhere.
4141

4242
:::image type="content" source="media/concept-authentication-methods/user-authentication-methods.png" alt-text="Screenshot of the Azure portal that shows authentication methods with a phone number populated":::
4343

4444
Microsoft doesn't guarantee consistent SMS or voice-based Azure AD Multi-Factor Authentication prompt delivery by the same number. In the interest of our users, we may add or remove short codes at any time as we make route adjustments to improve SMS deliverability. Microsoft doesn't support short codes for countries/regions besides the United States and Canada.
4545

46-
### Text message verification
46+
> [!NOTE]
47+
> Starting July 2023, we apply delivery method optimization such that tenants with a free or trial subscription may receive an SMS message or voice call.
48+
49+
### SMS message verification
4750

48-
With text message verification during SSPR or Azure AD Multi-Factor Authentication, a Short Message Service (SMS) text is sent to the mobile phone number containing a verification code. To complete the sign-in process, the verification code provided is entered into the sign-in interface.
51+
With SMS message verification during SSPR or Azure AD Multi-Factor Authentication, a Short Message Service (SMS) text is sent to the mobile phone number containing a verification code. To complete the sign-in process, the verification code provided is entered into the sign-in interface.
4952

5053
Android users can enable Rich Communication Services (RCS) on their devices. RCS offers encryption and other improvements over SMS. For Android, MFA text messages may be sent over RCS rather than SMS. The MFA text message is similar to SMS, but RCS messages have more Microsoft branding and a verified checkmark so users know they can trust the message.
5154

articles/active-directory/develop/sample-v2-code.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -85,11 +85,11 @@ The following samples show public client desktop applications that access the Mi
8585
> | .NET | [Invoke protected API with integrated Windows authentication](https://github.com/azure-samples/active-directory-dotnet-iwa-v2) | [MSAL.NET](/entra/msal/dotnet) | Integrated Windows authentication |
8686
> | Java | [Call Microsoft Graph](https://github.com/Azure-Samples/ms-identity-msal-java-samples/tree/main/2.%20Client-Side%20Scenarios/Integrated-Windows-Auth-Flow) | [MSAL Java](/java/api/com.microsoft.aad.msal4j) | Integrated Windows authentication |
8787
> | Node.js | [Sign in users](https://github.com/Azure-Samples/ms-identity-javascript-nodejs-desktop) | [MSAL Node](/javascript/api/@azure/msal-node) | Authorization code with PKCE |
88-
> | PowerShell | [Call Microsoft Graph by signing in users using username/password](https://github.com/azure-samples/active-directory-dotnetcore-console-up-v2) | [MSAL.NET](/entra/msal/dotnet) | Resource owner password credentials |
88+
> | .NET Core | [Call Microsoft Graph by signing in users using username/password](https://github.com/azure-samples/active-directory-dotnetcore-console-up-v2) | [MSAL.NET](/entra/msal/dotnet) | Resource owner password credentials |
8989
> | Python | [Sign in users](https://github.com/Azure-Samples/ms-identity-python-desktop) | [MSAL Python](/python/api/msal/overview-msal) | Resource owner password credentials |
9090
> | Universal Window Platform (UWP) | [Call Microsoft Graph](https://github.com/Azure-Samples/active-directory-xamarin-native-v2/tree/main/2-With-broker) | [MSAL.NET](/entra/msal/dotnet) | Web account manager |
9191
> | Windows Presentation Foundation (WPF) | [Sign in users and call Microsoft Graph](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2/tree/master/2.%20Web%20API%20now%20calls%20Microsoft%20Graph) | [MSAL.NET](/entra/msal/dotnet) | Authorization code with PKCE |
92-
> | XAML | &#8226; [Sign in users and call ASP.NET Core web API](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2/tree/master/1.%20Desktop%20app%20calls%20Web%20API) <br/> &#8226; [Sign in users and call Microsoft Graph](https://github.com/azure-samples/active-directory-dotnet-desktop-msgraph-v2) | [MSAL.NET](/entra/msal/dotnet) | Authorization code with PKCE |
92+
> | Windows Presentation Foundation (WPF) | &#8226; [Sign in users and call ASP.NET Core web API](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2/tree/master/1.%20Desktop%20app%20calls%20Web%20API) <br/> &#8226; [Sign in users and call Microsoft Graph](https://github.com/azure-samples/active-directory-dotnet-desktop-msgraph-v2) | [MSAL.NET](/entra/msal/dotnet) | Authorization code with PKCE |
9393
9494
### Mobile
9595

@@ -129,7 +129,7 @@ The following samples show how to protect an Azure Function using HttpTrigger an
129129
> | Node.js | [Call Microsoft Graph API on behalf of a user](https://github.com/Azure-Samples/ms-identity-nodejs-webapi-onbehalfof-azurefunctions) | [MSAL Node](/javascript/api/@azure/msal-node) | On-Behalf-Of (OBO)|
130130
> | Python | [Python Azure function web API secured by Azure AD](https://github.com/Azure-Samples/ms-identity-python-webapi-azurefunctions) | [MSAL Python](/python/api/msal/overview-msal) | Authorization code |
131131
132-
### Headless
132+
### Browserless (Headless)
133133

134134
The following sample shows a public client application running on a device without a web browser. The app can be a command-line tool, an app running on Linux or Mac, or an IoT application. The sample features an app accessing the Microsoft Graph API, in the name of a user who signs-in interactively on another device (such as a mobile phone). This client application uses the Microsoft Authentication Library (MSAL).
135135

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ ms.author: shermanouko
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.subservice: ciam
12-
ms.topic: how-to
13-
ms.date: 05/10/2023
12+
ms.topic: sample
13+
ms.date: 06/23/2023
1414
ms.custom: developer
1515

1616
#Customer intent: As a dev, devops, I want to learn about how to configure a sample ASP.NET browserless app to sign in users with my Azure Active Directory (Azure AD) for customers tenant
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ ms.author: dmwendia
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.subservice: ciam
12-
ms.topic: how-to
13-
ms.date: 05/09/2023
12+
ms.topic: sample
13+
ms.date: 06/23/2023
1414
ms.custom: developer
1515

1616
#Customer intent: As a dev, devops, I want to learn about how to configure a sample Node.js browserless application to authenticate users with my Azure Active Directory (Azure AD) for customers tenant
@@ -118,4 +118,4 @@ You can now test the sample Node.js browserless app.
118118
119119
Learn how to:
120120
121-
- [Sign in users in your own Node.js browserless application by using Microsoft Entra](how-to-browserless-app-node-sign-in-overview.md)
121+
- [Sign in users in your own Node.js browserless application by using Microsoft Entra](how-to-browserless-app-node-sign-in-overview.md)
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ ms.author: kengaderdus
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.subservice: ciam
12-
ms.topic: how-to
13-
ms.date: 05/22/2023
12+
ms.topic: sample
13+
ms.date: 06/23/2023
1414
ms.custom: developer
1515

1616
#Customer intent: As a dev, devops, I want to configure a sample Node.js daemon application that calls an API protected by Azure Active Directory (Azure AD) for customers tenant
@@ -166,4 +166,4 @@ A Web API endpoint should be prepared to accept calls from both users and applic
166166

167167
- Learn how to [Use client certificate instead of a secret for authentication in your Node.js confidential app](how-to-web-app-node-use-certificate.md).
168168

169-
- Learn about [permissions and consent](../../develop/permissions-consent-overview.md).
169+
- Learn about [permissions and consent](../../develop/permissions-consent-overview.md).
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,16 @@ manager: CelesteDG
77
ms.author: owenrichards
88
ms.service: active-directory
99
ms.subservice: ciam
10-
ms.topic: how-to
11-
ms.date: 05/25/2023
10+
ms.topic: sample
11+
ms.date: 06/23/2023
1212

1313

1414
#Customer intent: As a dev, devops, I want to learn about how to configure a sample vanilla JS SPA to sign in and sign out users with my Azure Active Directory (Azure AD) for customers tenant
1515
---
1616

1717
# Sign in users in a sample vanilla JavaScript single-page application
1818

19-
This how-to guide uses a sample vanilla JavaScript single-page Application (SPA) to demonstrate how to add authentication to a SPA. The SPA enables users to sign in and sign out by using their own Azure Azure Active Directory (AD) for customers tenant. The sample uses the [Microsoft Authentication Library for JavaScript (MSAL.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js) to handle authentication.
19+
This how-to guide uses a sample vanilla JavaScript single-page Application (SPA) to demonstrate how to add authentication to a SPA. The SPA enables users to sign in and sign out by using their own Azure Active Directory (AD) for customers tenant. The sample uses the [Microsoft Authentication Library for JavaScript (MSAL.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js) to handle authentication.
2020

2121
## Prerequisites
2222

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@ ms.author: godonnell
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: ciam
11-
ms.topic: how-to
12-
ms.date: 05/23/2023
11+
ms.topic: sample
12+
ms.date: 06/23/2023
1313
ms.custom: developer
1414

1515
#Customer intent: As a dev, devops, I want to learn about how to configure a sample Angular Single Page Application to sign in and sign out users with my Azure Active Directory (Azure AD) for customers tenant
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ manager: celestedg
77
ms.author: godonnell
88
ms.service: active-directory
99
ms.subservice: ciam
10-
ms.topic: how-to
11-
ms.date: 05/23/2023
10+
ms.topic: sample
11+
ms.date: 06/23/2023
1212

1313
#Customer intent: As a dev, devops, I want to learn about how to configure a sample React single-page app to sign in and sign out users with my Azure Active Directory (Azure AD) for customers tenant
1414
---
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ ms.author: cwerner
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.subservice: ciam
12-
ms.topic: how-to
13-
ms.date: 05/22/2023
12+
ms.topic: sample
13+
ms.date: 06/23/2023
1414
ms.custom: developer
1515

1616
#Customer intent: As a dev, devops, I want to learn about how to configure a sample ASP.NET web app to sign in and sign out users with my Azure Active Directory (Azure AD) for customers tenant

0 commit comments

Comments
 (0)