Skip to content

Commit 1df7bbe

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-desktop-mar23
2 parents 13a9dea + 0ba1852 commit 1df7bbe

File tree

345 files changed

+7042
-3192
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

345 files changed

+7042
-3192
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -809,6 +809,11 @@
809809
"source_path_from_root": "/articles/defender-for-cloud/faq-azure-monitor-logs.yml",
810810
"redirect_url": "/azure/defender-for-cloud/faq-data-collection-agents",
811811
"redirect_document_id": true
812+
},
813+
{
814+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-storage-exclude.md",
815+
"redirect_url": "/azure/defender-for-cloud/defender-for-storage-classic-enable#exclude-a-storage-account-from-a-protected-subscription-in-the-per-transaction-plan",
816+
"redirect_document_id": true
812817
}
813818
]
814819
}

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/storage/queues/storage-ruby-how-to-use-queue-storage.md",
5+
"redirect_url": "/previous-versions/azure/storage/queues/storage-ruby-how-to-use-queue-storage",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/storage/queues/storage-php-how-to-use-queues.md",
10+
"redirect_url": "/previous-versions/azure/storage/queues/storage-php-how-to-use-queues",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "articles/storage/tables/table-storage-design-encrypt-data.md",
515
"redirect_url": "/previous-versions/azure/storage/tables/table-storage-design-encrypt-data",
@@ -22031,6 +22041,16 @@
2203122041
"redirect_url": "/azure/active-directory/develop/zero-trust-for-developers",
2203222042
"redirect_document_id": false
2203322043
},
22044+
{
22045+
"source_path_from_root": "/articles/active-directory/develop/web-app-quickstart-portal-node-js-passport.md",
22046+
"redirect_url": "/azure/active-directory/develop/web-app-quickstart?pivots=devlang-nodejs-msal",
22047+
"redirect_document_id": false
22048+
},
22049+
{
22050+
"source_path_from_root": "/articles/active-directory/develop/quickstart-v2-nodejs-webapp.md",
22051+
"redirect_url": "/azure/active-directory/develop/web-app-quickstart?pivots=devlang-nodejs-msal",
22052+
"redirect_document_id": false
22053+
},
2203422054
{
2203522055
"source_path_from_root": "/articles/networking/azure-orbital-overview.md",
2203622056
"redirect_url": "/azure/orbital/overview",

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -74,8 +74,12 @@ You can use scoping filters to define attribute-based rules that determine which
7474

7575
### B2B (guest) users
7676

77-
It's possible to use the Azure AD user provisioning service to provision B2B (guest) users in Azure AD to SaaS applications.
78-
However, for B2B users to sign in to the SaaS application using Azure AD, the SaaS application must have its SAML-based single sign-on capability configured in a specific way. For more information on how to configure SaaS applications to support sign-ins from B2B users, see [Configure SaaS apps for B2B collaboration](../external-identities/configure-saas-apps.md).
77+
It's possible to use the Azure AD user provisioning service to provision B2B (guest) users in Azure AD to SaaS applications. However, for B2B users to sign in to the SaaS application using Azure AD, you must manually configure the SaaS application to use Azure AD as a Security Assertion Markup Language (SAML) identity provider.
78+
79+
Follow these general guidelines when configuring SaaS apps for B2B (guest) users:
80+
- For most of the apps, user setup needs to happen manually. Users must be created manually in the app as well.
81+
- For apps that support automatic setup, such as Dropbox, separate invitations are created from the apps. Users must be sure to accept each invitation.
82+
- In the user attributes, to mitigate any issues with mangled user profile disk (UPD) in guest users, always set the user identifier to **user.mail**.
7983

8084
> [!NOTE]
8185
> The userPrincipalName for a B2B user represents the external user's email address alias@theirdomain as "alias_theirdomain#EXT#@yourdomain". When the userPrincipalName attribute is included in your attribute mappings as a source attribute, and a B2B user is being provisioned, the #EXT# and your domain is stripped from the userPrincipalName, so only their original alias@theirdomain is used for matching or provisioning. If you require the full user principal name including #EXT# and your domain to be present, replace userPrincipalName with originalUserPrincipalName as the source attribute. <br />

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 16 additions & 16 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/includes/console-app/quickstart-python.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: include
1010
ms.workload: identity
11-
ms.date: 01/10/2022
11+
ms.date: 03/28/2023
1212
ms.author: owenrichards
1313
ms.reviewer: jmprieur
1414
ms.custom: aaddev, identityplatformtop40, devx-track-python, "scenarios:getting-started", "languages:Python", mode-other
@@ -74,7 +74,7 @@ If you try to run the application at this point, you'll receive *HTTP 403 - Forb
7474

7575
##### Global tenant administrator
7676

77-
If you are a global tenant administrator, go to **API Permissions** page in **App registrations** in the Azure portal and select **Grant admin consent for {Tenant Name}** (Where {Tenant Name} is the name of your directory).
77+
If you're a global tenant administrator, go to **API Permissions** page in **App registrations** in the Azure portal and select **Grant admin consent for {Tenant Name}** (Where {Tenant Name} is the name of your directory).
7878

7979

8080
##### Standard user
@@ -87,8 +87,7 @@ https://login.microsoftonline.com/Enter_the_Tenant_Id_Here/adminconsent?client_i
8787

8888
Where:
8989
* `Enter_the_Tenant_Id_Here` - replace this value with the **Tenant Id** or **Tenant name** (for example, contoso.microsoft.com)
90-
* `Enter_the_Application_Id_Here` - is the **Application (client) ID** for the application you registered.
91-
90+
* `Enter_the_Application_Id_Here` - is the **Application (client) ID** for the application you registered previously.
9291

9392

9493
#### Step 5: Run the application

articles/active-directory/develop/index-web-app.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,6 @@ landingContent:
2828
url: web-app-quickstart.md?pivots=devlang-java
2929
- text: Node.js with MSAL
3030
url: web-app-quickstart.md?pivots=devlang-nodejs-msal
31-
- text: Node.js with Passport
32-
url: web-app-quickstart.md?pivots=devlang-nodejs-passport
3331
- text: Python
3432
url: web-app-quickstart.md?pivots=devlang-python
3533
- title: "Learn by building"

articles/active-directory/develop/quickstart-v2-nodejs-webapp.md

Lines changed: 0 additions & 124 deletions
This file was deleted.

articles/active-directory/develop/scenario-protected-web-api-app-registration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,9 @@ If you're following along with the web API scenario described in this set of art
8484
- **User consent description**: _Accesses the TodoListService web API as a user_
8585
- **State**: _Enabled_
8686

87+
> [!TIP]
88+
> For the **Application ID URI**, you have the option to set it to the physical authority of the API, for example `https://graph.microsoft.com`. This can be useful if the URL of the API that needs to be called is known.
89+
8790
### If your web API is called by a service or daemon app
8891

8992
Expose _application permissions_ instead of delegated permissions if your API should be accessed by daemons, services, or other non-interactive (by a human) applications. Because daemon- and service-type applications run unattended and authenticate with their own identity, there is no user to "delegate" their permission.

articles/active-directory/develop/web-app-quickstart-portal-node-js-passport.md

Lines changed: 0 additions & 125 deletions
This file was deleted.

0 commit comments

Comments
 (0)