Skip to content

Commit 1829214

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rai082022
2 parents b052092 + 13b6952 commit 1829214

File tree

934 files changed

+5019
-2739
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

934 files changed

+5019
-2739
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,11 @@
3030
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path_from_root": "/articles/active-directory/saas-apps/netmotion-mobility-tutorial.md",
35+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
36+
"redirect_document_id": false
37+
},
3338
{
3439
"source_path_from_root": "/articles/active-directory/fundamentals/whats-new-microsoft-365-government.md",
3540
"redirect_url": "/azure/active-directory/fundamentals/whats-new",
@@ -57,7 +62,7 @@
5762
},
5863
{
5964
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-create-trust-github.md",
60-
"redirect_url":"/azure/active-directory/develop/workload-identity-federation-create-trust",
65+
"redirect_url": "/azure/active-directory/develop/workload-identity-federation-create-trust",
6166
"redirect_document_id": false
6267
},
6368
{
@@ -2800,7 +2805,7 @@
28002805
"redirect_url": "/azure/active-directory/develop/howto-authenticate-service-principal-powershell",
28012806
"redirect_document_id": false
28022807
},
2803-
2808+
28042809
{
28052810
"source_path_from_root": "/articles/active-directory/develop/active-directory-devhowto-multi-tenant-overview.md",
28062811
"redirect_url": "/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12848,6 +12848,16 @@
1284812848
"redirect_url": "/azure/cloudfoundry/cloudfoundry-deploy-your-first-app",
1284912849
"redirect_document_id": true
1285012850
},
12851+
{
12852+
"source_path_from_root": "/articles/virtual-machines/linux/overview.md",
12853+
"redirect_url": "/azure/virtual-machines/overview",
12854+
"redirect_document_id": true
12855+
},
12856+
{
12857+
"source_path_from_root": "/articles/virtual-machines/windows/overview.md",
12858+
"redirect_url": "/azure/virtual-machines/overview",
12859+
"redirect_document_id": false
12860+
},
1285112861
{
1285212862
"source_path_from_root": "/articles/virtual-machines/linux/cloudfoundry-get-started.md",
1285312863
"redirect_url": "/azure/cloudfoundry/cloudfoundry-get-started",

articles/active-directory/app-proxy/application-proxy-application-gateway-waf.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ To ensure the connector VMs send requests to the Application Gateway, an [Azure
7171

7272
### Test the application.
7373

74-
After [adding a user for testing](/azure/active-directory/app-proxy/application-proxy-add-on-premises-application#add-a-user-for-testing), you can test the application by accessing https://www.fabrikam.one. The user will be prompted to authenticate in Azure AD, and upon successful authentication, will access the application.
74+
After [adding a user for testing](./application-proxy-add-on-premises-application.md#add-a-user-for-testing), you can test the application by accessing https://www.fabrikam.one. The user will be prompted to authenticate in Azure AD, and upon successful authentication, will access the application.
7575

7676
![Screenshot of authentication step.](./media/application-proxy-waf/sign-in-2.png)
7777
![Screenshot of server response.](./media/application-proxy-waf/application-gateway-response.png)
@@ -90,13 +90,12 @@ The Application Gateway [Firewall logs][waf-logs] provide more details about the
9090

9191
## Next steps
9292

93-
To prevent false positives, learn how to [Customize Web Application Firewall rules](/azure/web-application-firewall/ag/application-gateway-customize-waf-rules-portal), configure [Web Application Firewall exclusion lists](/azure/web-application-firewall/ag/application-gateway-waf-configuration?tabs=portal), or [Web Application Firewall custom rules](/azure/web-application-firewall/ag/create-custom-waf-rules).
94-
95-
[waf-overview]: /azure/web-application-firewall/ag/ag-overview
96-
[appgw_quick]: /azure/application-gateway/quick-create-portal
97-
[appproxy-add-app]: /azure/active-directory/app-proxy/application-proxy-add-on-premises-application
98-
[appproxy-optimize]: /azure/active-directory/app-proxy/application-proxy-network-topology
99-
[appproxy-custom-domain]: /azure/active-directory/app-proxy/application-proxy-configure-custom-domain
100-
[private-dns]: /azure/dns/private-dns-getstarted-portal
101-
[waf-logs]: /azure/application-gateway/application-gateway-diagnostics#firewall-log
93+
To prevent false positives, learn how to [Customize Web Application Firewall rules](../../web-application-firewall/ag/application-gateway-customize-waf-rules-portal.md), configure [Web Application Firewall exclusion lists](../../web-application-firewall/ag/application-gateway-waf-configuration.md?tabs=portal), or [Web Application Firewall custom rules](../../web-application-firewall/ag/create-custom-waf-rules.md).
10294

95+
[waf-overview]: ../../web-application-firewall/ag/ag-overview.md
96+
[appgw_quick]: ../../application-gateway/quick-create-portal.md
97+
[appproxy-add-app]: ./application-proxy-add-on-premises-application.md
98+
[appproxy-optimize]: ./application-proxy-network-topology.md
99+
[appproxy-custom-domain]: ./application-proxy-configure-custom-domain.md
100+
[private-dns]: ../../dns/private-dns-getstarted-portal.md
101+
[waf-logs]: ../../application-gateway/application-gateway-diagnostics.md#firewall-log

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/23/2022
9+
ms.date: 08/17/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -129,7 +129,7 @@ The following providers offer FIDO2 security keys of different form factors that
129129
| Octatco | ![y] | ![y]| ![n]| ![n]| ![n] | https://octatco.com/ |
130130
| OneSpan Inc. | ![n] | ![y]| ![n]| ![y]| ![n] | https://www.onespan.com/products/fido |
131131
| Swissbit | ![n] | ![y]| ![y]| ![n]| ![n] | https://www.swissbit.com/en/products/ishield-fido2/ |
132-
| Thales Group | ![n] | ![y]| ![y]| ![n]| ![n] | https://cpl.thalesgroup.com/access-management/authenticators/fido-devices |
132+
| Thales Group | ![n] | ![y]| ![y]| ![n]| ![y] | https://cpl.thalesgroup.com/access-management/authenticators/fido-devices |
133133
| Thetis | ![y] | ![y]| ![y]| ![y]| ![n] | https://thetis.io/collections/fido2 |
134134
| Token2 Switzerland | ![y] | ![y]| ![y]| ![n]| ![n] | https://www.token2.swiss/shop/product/token2-t2f2-alu-fido2-u2f-and-totp-security-key |
135135
| TrustKey Solutions | ![y] | ![y]| ![n]| ![n]| ![n] | https://www.trustkeysolutions.com/security-keys/ |

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -329,6 +329,8 @@
329329
href: tutorial-blazor-server.md
330330
- name: Node.js
331331
href: tutorial-v2-nodejs-webapp-msal.md
332+
- name: Spring
333+
href: /azure/developer/java/spring-framework/configure-spring-boot-starter-java-app-with-azure-active-directory?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json
332334
- name: Secure web app accesses storage and Microsoft Graph
333335
items:
334336
- name: Overview

articles/active-directory/develop/breadcrumb/toc.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,3 +9,6 @@
99
- name: Develop
1010
tocHref: /azure/active-directory/app-provisioning/
1111
topicHref: /azure/active-directory/develop/index
12+
- name: Develop
13+
tocHref: /azure/developer/java/spring-framework/
14+
topicHref: /azure/active-directory/develop/index

articles/active-directory/develop/index-web-app.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ landingContent:
4343
- text: Node.js with Express
4444
url: tutorial-v2-nodejs-webapp-msal.md
4545
- text: Spring
46-
url: /azure/developer/java/spring-framework/configure-spring-boot-starter-java-app-with-azure-active-directory
46+
url: /azure/developer/java/spring-framework/configure-spring-boot-starter-java-app-with-azure-active-directory?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json
4747
- title: "Web apps in depth"
4848
linkLists:
4949
- linkListType: how-to-guide
Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
---
2+
title: "Quickstart: Sign in users in JavaScript Angular single-page apps (SPA) with auth code and call Microsoft Graph"
3+
description: In this quickstart, learn how a JavaScript Angular single-page application (SPA) can sign in users of personal accounts, work accounts, and school accounts by using the authorization code flow and call Microsoft Graph.
4+
services: active-directory
5+
author: Dickson-Mwendia
6+
manager: CelesteDG
7+
ms.service: active-directory
8+
ms.subservice: develop
9+
ms.topic: portal
10+
ms.workload: identity
11+
ms.date: 08/16/2022
12+
ROBOTS: NOINDEX
13+
ms.author: dmwendia
14+
ms.custom: aaddev, "scenarios:getting-started", "languages:JavaScript", devx-track-js, mode-other
15+
#Customer intent: As an app developer, I want to learn how to get access tokens and refresh tokens by using the Microsoft identity platform so that my JavaScript Angular app can sign in users of personal accounts, work accounts, and school accounts.
16+
---
17+
18+
# Quickstart: Sign in and get an access token in an Angular SPA using the auth code flow
19+
20+
21+
> [!div renderon="docs"]
22+
> Welcome! This probably isn't the page you were expecting. While we work on a fix, this link should take you to the right article:
23+
>
24+
> > [Quickstart: Angular single-page app with user sign-in](single-page-app-quickstart.md?pivots=devlang-angular)
25+
>
26+
> We apologize for the inconvenience and appreciate your patience while we work to get this resolved.
27+
28+
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
29+
> # Quickstart: Sign in and get an access token in an Angular SPA using the auth code flow
30+
>
31+
> In this quickstart, you download and run a code sample that demonstrates how a JavaScript Angular single-page application (SPA) can sign in users and call Microsoft Graph using the authorization code flow. The code sample demonstrates how to get an access token to call the Microsoft Graph API or any web API.
32+
>
33+
> See [How the sample works](#how-the-sample-works) for an illustration.
34+
>
35+
> This quickstart uses MSAL Angular v2 with the authorization code flow.
36+
>
37+
> ## Prerequisites
38+
>
39+
> * Azure subscription - [Create an Azure subscription for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
40+
> * [Node.js](https://nodejs.org/en/download/)
41+
> * [Visual Studio Code](https://code.visualstudio.com/download) or another code editor
42+
>
43+
> #### Step 1: Configure your application in the Azure portal
44+
> For the code sample in this quickstart to work, add a **Redirect URI** of `http://localhost:4200/`.
45+
>
46+
> <button id="makechanges" class="nextstepaction configure-app-button"> Make these changes for me </button>
47+
>
48+
> > [!div id="appconfigured" class="alert alert-info"]
49+
> > ![Already configured](media/quickstart-v2-javascript/green-check.png) Your application is configured with these attributes.
50+
>
51+
> #### Step 2: Download the project
52+
>
53+
> Run the project with a web server by using Node.js
54+
>
55+
> > [!div class="nextstepaction"]
56+
> > <button id="downloadsample" class="download-sample-button">Download the code sample</button>
57+
>
58+
> > [!div class="sxs-lookup"]
59+
> > > [!NOTE]
60+
> > > `Enter_the_Supported_Account_Info_Here`
61+
>
62+
>
63+
> #### Step 3: Your app is configured and ready to run
64+
>
65+
> We have configured your project with values of your app's properties.
66+
>
67+
> #### Step 4: Run the project
68+
>
69+
> Run the project with a web server by using Node.js:
70+
>
71+
> 1. To start the server, run the following commands from within the project directory:
72+
> ```console
73+
> npm install
74+
> npm start
75+
> ```
76+
> 1. Browse to `http://localhost:4200/`.
77+
>
78+
> 1. Select **Login** to start the sign-in process and then call the Microsoft Graph API.
79+
>
80+
> The first time you sign in, you're prompted to provide your consent to allow the application to access your profile and sign you in. After you're signed in successfully, click the **Profile** button to display your user information on the page.
81+
>
82+
> ## More information
83+
>
84+
> ### How the sample works
85+
>
86+
> ![Diagram showing the authorization code flow for a single-page application.](media/quickstart-v2-javascript-auth-code/diagram-01-auth-code-flow.png)
87+
>
88+
> ### msal.js
89+
>
90+
> The MSAL.js library signs in users and requests the tokens that are used to access an API that's protected by the Microsoft identity platform.
91+
>
92+
> If you have Node.js installed, you can download the latest version by using the Node.js Package Manager (npm):
93+
>
94+
> ```console
95+
> npm install @azure/msal-browser @azure/msal-angular@2
96+
> ```
97+
>
98+
> ## Next steps
99+
>
100+
> For a detailed step-by-step guide on building the auth code flow application using vanilla JavaScript, see the following tutorial:
101+
>
102+
> > [!div class="nextstepaction"]
103+
> > [Tutorial: Sign in users and call Microsoft Graph](./tutorial-v2-javascript-auth-code.md)
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
---
2+
title: "Quickstart: Sign in users in JavaScript React single-page apps (SPA) with auth code and call Microsoft Graph"
3+
description: In this quickstart, learn how a JavaScript React single-page application (SPA) can sign in users of personal accounts, work accounts, and school accounts by using the authorization code flow and call Microsoft Graph.
4+
services: active-directory
5+
author: Dickson-Mwendia
6+
manager: CelesteDG
7+
ms.service: active-directory
8+
ms.subservice: develop
9+
ms.topic: portal
10+
ms.workload: identity
11+
ms.date: 08/16/2022
12+
ROBOTS: NOINDEX
13+
ms.author: dmwendia
14+
ms.custom: aaddev, "scenarios:getting-started", "languages:JavaScript", devx-track-js, mode-other
15+
#Customer intent: As an app developer, I want to learn how to login, logout, conditionally render components to authenticated users, and acquire an access token for a protected resource such as Microsoft Graph by using the Microsoft identity platform so that my JavaScript React app can sign in users of personal accounts, work accounts, and school accounts.
16+
---
17+
> # Quickstart: Sign in and get an access token in a React SPA using the auth code flow
18+
19+
20+
> [!div renderon="docs"]
21+
> Welcome! This probably isn't the page you were expecting. While we work on a fix, this link should take you to the right article:
22+
>
23+
> > [Quickstart: React single-page app with user sign-in](single-page-app-quickstart.md?pivots=devlang-react)
24+
>
25+
> We apologize for the inconvenience and appreciate your patience while we work to get this resolved.
26+
27+
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
28+
> # Quickstart: Sign in and get an access token in a React SPA using the auth code flow
29+
> In this quickstart, you download and run a code sample that demonstrates how a JavaScript React single-page application (SPA) can sign in users and call Microsoft Graph using the authorization code flow. The code sample demonstrates how to get an access token to call the Microsoft Graph API or any web API.
30+
>
31+
> See [How the sample works](#how-the-sample-works) for an illustration.
32+
>
33+
> ## Prerequisites
34+
>
35+
> * Azure subscription - [Create an Azure subscription for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
36+
> * [Node.js](https://nodejs.org/en/download/)
37+
> * [Visual Studio Code](https://code.visualstudio.com/download) or another code editor
38+
>
39+
> #### Step 1: Configure your application in the Azure portal
40+
>
41+
> This code samples requires a **Redirect URI** of `http://localhost:3000/`.
42+
>
43+
> <button id="makechanges" class="nextstepaction configure-app-button"> Make these changes for me </button>
44+
>
45+
> > [!div id="appconfigured" class="alert alert-info"]
46+
> > ![Already configured](media/quickstart-v2-javascript/green-check.png) Your application is configured with these attributes.
47+
>
48+
> #### Step 2: Download the project
49+
>
50+
> Run the project with a web server by using Node.js
51+
>
52+
> > [!div class="nextstepaction"]
53+
> > <button id="downloadsample" class="download-sample-button">Download the code sample</button>
54+
>
55+
> > [!div class="sxs-lookup"]
56+
> > > [!NOTE]
57+
> > > `Enter_the_Supported_Account_Info_Here`
58+
>
59+
>
60+
> #### Step 3: Your app is configured and ready to run
61+
> We have configured your project with values of your app's properties.
62+
>
63+
> #### Step 4: Run the project
64+
>
65+
> Run the project with a web server by using Node.js:
66+
>
67+
> 1. To start the server, run the following commands from within the project directory:
68+
> ```console
69+
> npm install
70+
> npm start
71+
> ```
72+
> 1. Browse to `http://localhost:3000/`.
73+
>
74+
> 1. Select **Sign In** to start the sign-in process and then call the Microsoft Graph API.
75+
>
76+
> The first time you sign in, you're prompted to provide your consent to allow the application to access your profile and sign you in. After you're signed in successfully, click on the **Request Profile Information** to display your profile information on the page.
77+
>
78+
> ## More information
79+
>
80+
> ### How the sample works
81+
>
82+
> ![Diagram showing the authorization code flow for a single-page application.](media/quickstart-v2-javascript-auth-code/diagram-01-auth-code-flow.png)
83+
>
84+
> ### msal.js
85+
>
86+
> The MSAL.js library signs in users and requests the tokens that are used to access an API that's protected by the Microsoft identity platform.
87+
>
88+
> If you have Node.js installed, you can download the latest version by using the Node.js Package Manager (npm):
89+
>
90+
> ```console
91+
> npm install @azure/msal-browser @azure/msal-react
92+
> ```
93+
>
94+
> ## Next steps
95+
>
96+
> Next, try a step-by-step tutorial to learn how to build a React SPA from scratch that signs in users and calls the > Microsoft Graph API to get user profile data:
97+
>
98+
> > [!div class="nextstepaction"]
99+
> > [Tutorial: Sign in users and call Microsoft Graph from a React single-page app](tutorial-v2-react.md)

0 commit comments

Comments
 (0)