You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,6 +42,7 @@ This document focuses on enabling FIDO2 security key based passwordless authenti
42
42
- “Run as“ is **not supported** using security key.
43
43
- Log in to a server using security key is **not supported**.
44
44
- If you have not used your security key to sign in to your device while online, you will not be able to use it to sign in or unlock offline.
45
+
- Signing in or unlocking a Windows 10 device with a security key containing multiple Azure AD accounts. This scenario will utilize the last account added to the security key. WebAuthN will allow users to choose the account they wish to use.
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/require-managed-devices.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: article
9
-
ms.date: 11/21/2019
9
+
ms.date: 11/22/2019
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -77,7 +77,7 @@ The option to *require a device to be marked as compliant* is the strongest form
77
77
78
78
This option requires a device to be registered with Azure AD, and also to be marked as compliant by:
79
79
80
-
- Intune.
80
+
- Intune
81
81
- A third-party mobile device management (MDM) system that manages Windows 10 devices via Azure AD integration. Third-party MDM systems for device OS types other than Windows 10 are not supported.
@@ -89,6 +89,9 @@ For a device that is marked as compliant, you can assume that:
89
89
- Your company information is protected by helping to control the way your workforce accesses and shares it
90
90
- The device and its apps are compliant with company security requirements
91
91
92
+
> [!NOTE]
93
+
> If you configure a policy to require compliant devices users may be prompted on Mac, iOS, and Android to select a device certificate during policy evaluation. This is a known behavior.
94
+
92
95
## Next steps
93
96
94
97
Before configuring a device-based Conditional Access policy in your environment, you should take a look at the [best practices for Conditional Access in Azure Active Directory](best-practices.md).
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-aad-b2c.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,6 +89,9 @@ In the developer portal, sign-in with AAD B2C is possible with the **OAuth butto
89
89
90
90
Although a new account will be automatically created whenever a new user signs in with AAD B2C, you may consider adding the same widget to the sign-up page.
91
91
92
+
> [!IMPORTANT]
93
+
> You need to [republish the portal](api-management-howto-developer-portal-customize.md#publish) for the AAD changes to take effect.
94
+
92
95
## Legacy developer portal - how to sign up with Azure AD B2C
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-aad.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,6 +107,9 @@ In the developer portal, sign-in with AAD is possible with the **OAuth buttons**
107
107
108
108
Although a new account will be automatically created whenever a new user signs in with AAD, you may consider adding the same widget to the sign-up page.
109
109
110
+
> [!IMPORTANT]
111
+
> You need to [republish the portal](api-management-howto-developer-portal-customize.md#publish) for the AAD changes to take effect.
112
+
110
113
## Legacy developer portal - how to sign in with Azure AD
> The portal needs to be republished after API Management service configuration changes, such as assigning a custom domain, updating the identity providers, setting delegation, specifying sign-in and product terms, and more.
120
+
118
121
## Visit the published portal
119
122
120
123
After you publish the portal, you can access it at the same URL as the administrative panel, for example `https://contoso-api.developer.azure-api.net`. View it in a separate browser session (incognito / private browsing mode) as an external visitor.
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-developer-portal.md
+66-6Lines changed: 66 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.service: api-management
11
11
ms.workload: mobile
12
12
ms.tgt_pltfrm: na
13
13
ms.topic: article
14
-
ms.date: 11/04/2019
14
+
ms.date: 11/22/2019
15
15
ms.author: apimpm
16
16
---
17
17
@@ -61,7 +61,7 @@ The portal components can be logically divided into two categories: *code* and *
61
61
62
62
*API Management content* includes entities such as APIs, Operations, Products, Subscriptions.
63
63
64
-
The portal is based on an adapted fork of the [Paperbits framework](https://paperbits.io/). The original Paperbits functionality has been extended to provide API Management-specific widgets (e.g., a list of APIs, a list of Products) and a connector to API Management service for saving and retrieving content.
64
+
The portal is based on an adapted fork of the [Paperbits framework](https://paperbits.io/). The original Paperbits functionality has been extended to provide API Management-specific widgets (for example, a list of APIs, a list of Products) and a connector to API Management service for saving and retrieving content.
65
65
66
66
## <aname="faq"></a> Frequently asked questions
67
67
@@ -89,6 +89,8 @@ Portals are incompatible and you need to migrate the content manually.
89
89
90
90
The new developer portal doesn't support *Applications* and *Issues*. If you have used *Issues* in the old portal and need them in the new one, post a comment in [a dedicated GitHub issue](https://github.com/Azure/api-management-developer-portal/issues/122).
91
91
92
+
Authentication with OAuth in the interactive developer console is not yet supported. You can track the progress through [the GitHub issue](https://github.com/Azure/api-management-developer-portal/issues/208).
93
+
92
94
### Has the old portal been deprecated?
93
95
94
96
The old developer and publisher portals are now *legacy* features - they will be receiving security updates only. New features will be implemented in the new developer portal only.
@@ -105,13 +107,31 @@ The API is documented in [the GitHub repository's wiki section][2]. It can also
105
107
106
108
No.
107
109
108
-
### Do I need to enable additional VNET connectivity for the managed portal dependencies?
110
+
### Do I need to enable additional VNet connectivity for the new managed portal dependencies?
109
111
110
-
No.
112
+
In most cases - no.
113
+
114
+
If your API Management service is in an internal VNet, your developer portal is only accessible from within the network. The management endpoint's host name must resolve to the internal VIP of the service from the machine you use to access the portal's administrative interface. Make sure the management endpoint is registered in the DNS. In case of misconfiguration, you will see an error: `Unable to start the portal. See if settings are specified correctly in the configuration (...)`.
115
+
116
+
### I have assigned a custom API Management domain and the published portal doesn't work
117
+
118
+
After you update the domain, you need to [republish the portal](api-management-howto-developer-portal-customize.md#publish) for the changes to take effect.
119
+
120
+
### I have added an identity provider and I can't see it in the portal
111
121
112
-
### I'm getting a CORS error when using the interactive console. What should I do?
122
+
After you configure an identity provider (for example, AAD, AAD B2C), you need to [republish the portal](api-management-howto-developer-portal-customize.md#publish) for the changes to take effect.
113
123
114
-
The interactive console makes a client-side API request from the browser. You can resolve the CORS problem by adding [a CORS policy](https://docs.microsoft.com/azure/api-management/api-management-cross-domain-policies#CORS) on your API(s). You can specify all the parameters manually or use wildcard `*` values. For example:
124
+
### I have set up delegation and the portal doesn't use it
125
+
126
+
After you set up delegation, you need to [republish the portal](api-management-howto-developer-portal-customize.md#publish) for the changes to take effect.
127
+
128
+
### My other API Management configuration changes haven't been propagated in the developer portal
129
+
130
+
Most configuration changes (for example, VNet, sign-in and product terms) require [republishing the portal](api-management-howto-developer-portal-customize.md#publish).
131
+
132
+
### I'm getting a CORS error when using the interactive console
133
+
134
+
The interactive console makes a client-side API request from the browser. You can resolve the CORS problem by adding [a CORS policy](api-management-cross-domain-policies.md#CORS) on your API(s). You can specify all the parameters manually or use wildcard `*` values. For example:
115
135
116
136
```XML
117
137
<cors>
@@ -145,6 +165,46 @@ The interactive console makes a client-side API request from the browser. You ca
145
165
>
146
166
> As a workaround you can pass the subscription key in a query parameter.
147
167
168
+
### What permissions do I need to edit the developer portal?
169
+
170
+
If you're seeing the `Oops. Something went wrong. Please try again later.` error when you open the portal in the administrative mode, you may be lacking the required permissions (RBAC).
171
+
172
+
The legacy portals required the permission `Microsoft.ApiManagement/service/getssotoken/action` at the service scope (`/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<apim-service-name>`) to allow the user administrator access to the portals. The new portal requires the permission `Microsoft.ApiManagement/service/users/token/action` at the scope `/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<apim-service-name>/users/1`.
173
+
174
+
You can use the following PowerShell script to create a role with the required permission. Remember to change the `<subscription-id>` parameter.
175
+
176
+
```PowerShell
177
+
#New Portals Admin Role
178
+
Import-Module Az
179
+
Connect-AzAccount
180
+
$contributorRole = Get-AzRoleDefinition "API Management Service Contributor"
181
+
$customRole = $contributorRole
182
+
$customRole.Id = $null
183
+
$customRole.Name = "APIM New Portal Admin"
184
+
$customRole.Description = "This role gives the user ability to log in to the new Developer portal as administrator"
Once the role is created, it can be granted to any user from the **Access Control (IAM)** section in the Azure portal. Assigning this role to a user will assign the permission at the service scope. The user will be able to generate SAS tokens on behalf of *any* user in the service. At the minimum, this role needs to be assigned to the administrator of the service. The following PowerShell command demonstrates how to assign the role to a user `user1` at the lowest scope to avoid granting unnecessary permissions to the user:
After the permissions have been granted to a user, the user must sign out and sign in again to the Azure portal for the new permissions to take effect.
199
+
200
+
### I'm seeing the `Unable to start the portal. See if settings are specified correctly (...)` error
201
+
202
+
This error is shown when a `GET` call to `https://<management-endpoint-hostname>/subscriptions/xxx/resourceGroups/xxx/providers/Microsoft.ApiManagement/service/xxx/contentTypes/document/contentItems/configuration?api-version=2018-06-01-preview` fails. The call is issued from the browser by the administrative interface of the portal.
203
+
204
+
If your API Management service is in a VNet - refer to the VNet connectivity question above.
205
+
206
+
The call failure may also be caused by an SSL certificate, which is assigned to a custom domain and is not trusted by the browser. As a mitigation, you can remove the management endpoint custom domain - API Management will fall back to the default endpoint with a trusted certificate.
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-setup-delegation.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,13 +18,13 @@ ms.author: apimpm
18
18
---
19
19
# How to delegate user registration and product subscription
20
20
21
-
Delegation allows you to use your existing website for handling developer sign in/sign up and subscription to products, as opposed to using the built-in functionality in the developer portal. This enables your website to own the user data and perform the validation of these steps in a custom way.
21
+
Delegation allows you to use your existing website for handling developer sign in/sign up and subscription to products, as opposed to using the built-in functionality in the developer portal. It enables your website to own the user data and perform the validation of these steps in a custom way.
## <aname="delegate-signin-up"> </a>Delegating developer signin and signup
25
+
## <aname="delegate-signin-up"> </a>Delegating developer sign-in and sign-up
26
26
27
-
To delegate developer sign in and sign up to your existing website, you'll need to create a special delegation endpoint on your site. It needs to act as the entry-point for any such request initiated from the API Management developer portal.
27
+
To delegate developer, sign in and sign up to your existing website, you'll need to create a special delegation endpoint on your site. It needs to act as the entry-point for any such request initiated from the API Management developer portal.
Copy file name to clipboardExpand all lines: articles/blockchain/service/configure-aad.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
2
title: Configure Azure Active Directory access - Azure Blockchain Service
3
3
description: How to configure Azure Blockchain Service with Azure Active Directory access
4
-
ms.date: 05/02/2019
4
+
ms.date: 11/22/2019
5
5
ms.topic: article
6
6
ms.reviewer: janders
7
7
#Customer intent: As a node operator, I want to configure Azure Blockchain Service with Azure Active Directory access.
8
8
---
9
9
10
-
# How to configure Azure Active Directory access
10
+
# How to configure Azure Active Directory access for Azure Blockchain Service
11
11
12
12
In this article, you learn how to grant access and connect to Azure Blockchain Service nodes using Azure Active Directory (Azure AD) user, group, or application IDs.
13
13
@@ -31,7 +31,7 @@ To grant access permission at the member level.
| Application ID |`13925ab1-4161-4534-8d18-812f5ca1ab1e`|
37
37
@@ -41,8 +41,11 @@ To grant access permission at the member level.
41
41
42
42
### Grant node level access
43
43
44
-
1. You can grant access at the node level by navigating to node security and click on the node name that you wish to grant access.
45
-
1. Select the Blockchain Member Node Access (Preview) role and add the Azure AD ID object you wish to grant access to.
44
+
You can grant access at the node level by navigating to node security and click on the node name that you wish to grant access.
45
+
46
+
Select the Blockchain Member Node Access (Preview) role and add the Azure AD ID object you wish to grant access to.
47
+
48
+
For more information, see [Configure Azure Blockchain Service transaction nodes](configure-transaction-nodes.md#azure-active-directory-access-control).
Copy file name to clipboardExpand all lines: articles/blockchain/service/connect-geth.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,4 +60,4 @@ You can get the Geth connection string for an Azure Blockchain Service transacti
60
60
In this quickstart, you used the Geth client to attach to a Geth instance on an Azure Blockchain Service transaction node. Try the next tutorial to use Azure Blockchain Development Kit for Ethereum to create, build, deploy, and execute a smart contract function via a transaction.
61
61
62
62
> [!div class="nextstepaction"]
63
-
> [Use Visual Studio Code to create, build, and deploy smart contracts](send-transaction.md)
63
+
> [Create, build, and deploy smart contracts on Azure Blockchain Service](send-transaction.md)
0 commit comments