Skip to content

Commit 1faa751

Browse files
authored
Merge branch 'MicrosoftDocs:main' into patch-2
2 parents 2820fe3 + 6f43c07 commit 1faa751

File tree

228 files changed

+2923
-954
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

228 files changed

+2923
-954
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -984,8 +984,6 @@
984984
".openpublishing.redirection.baremetal-infrastructure.json",
985985
".openpublishing.redirection.defender-for-cloud.json",
986986
".openpublishing.redirection.defender-for-iot.json",
987-
".openpublishing.redirection.deployment-environments.json",
988-
".openpublishing.redirection.dev-box.json",
989987
".openpublishing.redirection.healthcare-apis.json",
990988
".openpublishing.redirection.iot-hub-device-update.json",
991989
".openpublishing.redirection.json",
@@ -1042,6 +1040,8 @@
10421040
"articles/stream-analytics/.openpublishing.redirection.stream-analytics.json",
10431041
"articles/synapse-analytics/.openpublishing.redirection.synapse-analytics.json",
10441042
"articles/virtual-machine-scale-sets/.openpublishing.redirection.virtual-machine-scale-sets.json",
1045-
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json"
1043+
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
1044+
"articles/dev-box/.openpublishing.redirection.dev-box.json",
1045+
"articles/deployment-environments/.openpublishing.redirection.deployment-environments.json"
10461046
]
10471047
}

.openpublishing.redirection.dev-box.json

Lines changed: 0 additions & 19 deletions
This file was deleted.

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Before you create your Azure AD B2C tenant, you need to take the following consi
4242

4343
## Create an Azure AD B2C tenant
4444
>[!NOTE]
45-
>If you're unable to create Azure AD B2C tenant, [review your user settings page](tenant-management-check-tenant-creation-permission.md) to ensure that tenant creation isn't switched off. If tenant creation is switched off, ask your _Global Administrator_ to assign you a _Tenant Creator_ role.
45+
>If you're unable to create Azure AD B2C tenant, [review your user settings page](tenant-management-check-tenant-creation-permission.md) to ensure that tenant creation isn't switched off. If tenant creation is switched on, ask your _Global Administrator_ to assign you a _Tenant Creator_ role.
4646
4747
1. Sign in to the [Azure portal](https://portal.azure.com/).
4848

articles/active-directory/develop/supported-accounts-validation.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ After the application has been registered, you can check or change the account t
2323
| Accounts in this organizational directory only (Single tenant) | `AzureADMyOrg` |
2424
| Accounts in any organizational directory (Any Azure AD directory - Multitenant) | `AzureADMultipleOrgs` |
2525
| Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox) | `AzureADandPersonalMicrosoftAccount` |
26+
| Personal Microsoft accounts only | `PersonalMicrosoftAccount` |
2627

2728
If you change this property you may need to change other properties first.
2829

articles/active-directory/develop/whats-new-docs.md

Lines changed: 25 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
author: henrymbuguakiarie
66
manager: CelesteDG
77

8-
ms.date: 03/01/2023
8+
ms.date: 04/03/2023
99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: reference
@@ -18,6 +18,30 @@ ms.custom: has-adal-ref
1818

1919
Welcome to what's new in the Microsoft identity platform documentation. This article lists new docs that have been added and those that have had significant updates in the last three months.
2020

21+
## March 2023
22+
23+
### New articles
24+
25+
- [Configure a SAML app to receive tokens with claims from an external store (preview)](custom-extension-configure-saml-app.md)
26+
- [Configure a custom claim provider token issuance event (preview)](custom-extension-get-started.md)
27+
- [Custom claims provider (preview)](custom-claims-provider-overview.md)
28+
- [Custom claims providers](custom-claims-provider-reference.md)
29+
- [Custom authentication extensions (preview)](custom-extension-overview.md)
30+
- [Troubleshoot your custom claims provider API (preview)](custom-extension-troubleshoot.md)
31+
- [Understanding application-only access](app-only-access-primer.md)
32+
33+
### Updated articles
34+
35+
- [ADAL to MSAL migration guide for Python](migrate-python-adal-msal.md)
36+
- [Handle errors and exceptions in MSAL for Python](msal-error-handling-python.md)
37+
- [How to migrate a JavaScript app from ADAL.js to MSAL.js](msal-compare-msal-js-and-adal-js.md)
38+
- [Microsoft identity platform access tokens](access-tokens.md)
39+
- [Microsoft Enterprise SSO plug-in for Apple devices (preview)](apple-sso-plugin.md)
40+
- [Restrict your Azure AD app to a set of users in an Azure AD tenant](howto-restrict-your-app-to-a-set-of-users.md)
41+
- [Token cache serialization in MSAL.NET](msal-net-token-cache-serialization.md)
42+
- [Troubleshoot publisher verification](troubleshoot-publisher-verification.md)
43+
- [Tutorial: Call the Microsoft Graph API from a Universal Windows Platform (UWP) application](tutorial-v2-windows-uwp.md)
44+
2145
## February 2023
2246

2347
### New articles
@@ -46,20 +70,3 @@ Welcome to what's new in the Microsoft identity platform documentation. This art
4670
- [Customize claims issued in the SAML token for enterprise applications](active-directory-saml-claims-customization.md)
4771
- [Enable cross-app SSO on Android using MSAL](msal-android-single-sign-on.md)
4872
- [Using redirect URIs with the Microsoft Authentication Library (MSAL) for iOS and macOS](redirect-uris-ios.md)
49-
50-
## December 2022
51-
52-
### New articles
53-
54-
- [Block workload identity federation on managed identities using a policy](workload-identity-federation-block-using-azure-policy.md)
55-
- [Troubleshooting the configured permissions limits](troubleshoot-required-resource-access-limits.md)
56-
57-
### Updated articles
58-
59-
- [A web API that calls web APIs: Code configuration](scenario-web-api-call-api-app-configuration.md)
60-
- [Quickstart: Get a token and call the Microsoft Graph API by using a console app's identity](quickstart-v2-netcore-daemon.md)
61-
- [Quickstart: Protect an ASP.NET Core web API with the Microsoft identity platform](quickstart-v2-aspnet-core-web-api.md)
62-
- [Tutorial: Create a Blazor Server app that uses the Microsoft identity platform for authentication](tutorial-blazor-server.md)
63-
- [Tutorial: Sign in users and call a protected API from a Blazor WebAssembly app](tutorial-blazor-webassembly.md)
64-
- [Web app that signs in users: App registration](scenario-web-app-sign-user-app-registration.md)
65-
- [Web app that signs in users: Code configuration](scenario-web-app-sign-user-app-configuration.md)

articles/active-directory/enterprise-users/domains-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: enterprise-users
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 11/11/2022
13+
ms.date: 03/31/2023
1414
ms.author: barclayn
1515
ms.reviewer: sumitp
1616

@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020
---
2121
# Managing custom domain names in your Azure Active Directory
2222

23-
A domain name is an important part of the identifier for resources in many Azure Active Directory (Azure AD) deployments. It is part of a user name or email address for a user, part of the address for a group, and is sometimes part of the app ID URI for an application. A resource in Azure AD can include a domain name that's owned by the Azure AD organization (sometimes called a tenant) that contains the resource. Only a Global Administrator can manage domains in Azure AD.
23+
A domain name is an important part of the identifier for resources in many Azure Active Directory (Azure AD) deployments. It's part of a user name or email address for a user, part of the address for a group, and is sometimes part of the app ID URI for an application. A resource in Azure AD can include a domain name that's owned by the Azure AD organization (sometimes called a tenant) that contains the resource. [Global Administrators](../roles/permissions-reference.md#global-administrator) and [Domain name administrators](../roles/permissions-reference.md#domain-name-administrator) can manage domains in Azure AD.
2424

2525
## Set the primary domain name for your Azure AD organization
2626

articles/active-directory/governance/customize-workflow-email.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Emails tasks allow for the customization of the following aspects:
2525
- Email language
2626

2727
> [!NOTE]
28-
> To avoid additional security disclaimers, you should opt in to using customized domain and organizational branding.
28+
> When customizing the subject or message body, we recommend that you also enable the custom sender domain and organizational branding, otherwise an additional security disclaimer will be added to your email.
2929
3030
For more information on these customizable parameters, see: [Common email task parameters](lifecycle-workflow-tasks.md#common-email-task-parameters).
3131

articles/active-directory/manage-apps/whats-new-docs.md

Lines changed: 18 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory application management"
33
description: "New and updated documentation for the Azure Active Directory application management."
4-
ms.date: 03/02/2023
4+
ms.date: 04/03/2023
55
ms.service: active-directory
66
ms.subservice: app-mgmt
77
ms.topic: reference
@@ -15,6 +15,23 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory (Azure AD) application management documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the application management service, see [What's new in Azure AD](../fundamentals/whats-new.md).
1717

18+
## March 2023
19+
20+
### Updated articles
21+
22+
- [Move application authentication to Azure Active Directory](migrate-adfs-apps-to-azure.md)
23+
- [Quickstart: Create and assign a user account](add-application-portal-assign-users.md)
24+
- [Configure sign-in behavior using Home Realm Discovery](configure-authentication-for-federated-users-portal.md)
25+
- [Disable auto-acceleration sign-in](prevent-domain-hints-with-home-realm-discovery.md)
26+
- [Review permissions granted to enterprise applications](manage-application-permissions.md)
27+
- [Migrate application authentication to Azure Active Directory](migrate-application-authentication-to-azure-active-directory.md)
28+
- [Azure Active Directory application management: What's new](whats-new-docs.md)
29+
- [Configure permission classifications](configure-permission-classifications.md)
30+
- [Restrict access to a tenant](tenant-restrictions.md)
31+
- [Tutorial: Migrate Okta sign-on policies to Azure Active Directory Conditional Access](migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access.md)
32+
- [Delete an enterprise application](delete-application-portal.md)
33+
- [Restore an enterprise application in Azure AD](restore-application.md)
34+
1835
## February 2023
1936

2037
### Updated articles
@@ -43,17 +60,3 @@ Welcome to what's new in Azure Active Directory (Azure AD) application managemen
4360
- [Create an enterprise application from a multi-tenant application in Azure Active Directory](create-service-principal-cross-tenant.md)
4461
- [Configure sign-in behavior using Home Realm Discovery](configure-authentication-for-federated-users-portal.md)
4562
- [Secure hybrid access with Azure Active Directory partner integrations](secure-hybrid-access-integrations.md)
46-
47-
## December 2022
48-
49-
### Updated articles
50-
51-
- [Grant consent on behalf of a single user by using PowerShell](grant-consent-single-user.md)
52-
- [Tutorial: Configure F5 BIG-IP SSL-VPN for Azure AD SSO](f5-aad-password-less-vpn.md)
53-
- [Integrate F5 BIG-IP with Azure Active Directory](f5-aad-integration.md)
54-
- [Deploy F5 BIG-IP Virtual Edition VM in Azure](f5-bigip-deployment-guide.md)
55-
- [End-user experiences for applications](end-user-experiences.md)
56-
- [Tutorial: Migrate your applications from Okta to Azure Active Directory](migrate-applications-from-okta-to-azure-active-directory.md)
57-
- [Tutorial: Configure F5 BIG-IP Access Policy Manager for Kerberos authentication](f5-big-ip-kerberos-advanced.md)
58-
- [Tutorial: Configure F5 BIG-IP Easy Button for Kerberos single sign-on](f5-big-ip-kerberos-easy-button.md)
59-
- [Tutorial: Configure F5 BIG-IP Easy Button for header-based and LDAP single sign-on](f5-big-ip-ldap-header-easybutton.md)

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-storage.md

Lines changed: 22 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: tutorial
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 01/11/2022
15+
ms.date: 03/30/2023
1616
ms.author: barclayn
1717

1818
ms.collection: M365-identity-device-management
@@ -42,12 +42,12 @@ To run the CLI script examples in this tutorial, you have two options:
4242

4343
In this section, you create a storage account.
4444

45-
1. Click the **+ Create a resource** button found on the upper left-hand corner of the Azure portal.
46-
2. Click **Storage**, then **Storage account - blob, file, table, queue**.
45+
1. Select the **+ Create a resource** button found on the upper left-hand corner of the Azure portal.
46+
2. Select **Storage**, then **Storage account - blob, file, table, queue**.
4747
3. Under **Name**, enter a name for the storage account.
4848
4. **Deployment model** and **Account kind** should be set to **Resource manager** and **Storage (general purpose v1)**.
4949
5. Ensure the **Subscription** and **Resource Group** match the ones you specified when you created your VM in the previous step.
50-
6. Click **Create**.
50+
6. Select **Create**.
5151

5252
![Create new storage account](./media/msi-tutorial-linux-vm-access-storage/msi-storage-create.png)
5353

@@ -56,16 +56,16 @@ In this section, you create a storage account.
5656
Files require blob storage so you need to create a blob container in which to store the file. You then upload a file to the blob container in the new storage account.
5757

5858
1. Navigate back to your newly created storage account.
59-
2. Under **Blob Service**, click **Containers**.
60-
3. Click **+ Container** on the top of the page.
59+
2. Under **Blob Service**, select **Containers**.
60+
3. Select **+ Container** on the top of the page.
6161
4. Under **New container**, enter a name for the container and under **Public access level** keep the default value.
6262

6363
![Create storage container](./media/msi-tutorial-linux-vm-access-storage/create-blob-container.png)
6464

6565
5. Using an editor of your choice, create a file titled *hello world.txt* on your local machine. Open the file and add the text (without the quotes) "Hello world! :)" and then save it.
6666

6767
6. Upload the file to the newly created container by clicking on the container name, then **Upload**
68-
7. In the **Upload blob** pane, under **Files**, click the folder icon and browse to the file **hello_world.txt** on your local machine, select the file, then click **Upload**.
68+
7. In the **Upload blob** pane, under **Files**, select the folder icon and browse to the file **hello_world.txt** on your local machine, select the file, then select **Upload**.
6969

7070
![Upload text file](./media/msi-tutorial-linux-vm-access-storage/upload-text-file.png)
7171

@@ -83,7 +83,7 @@ Azure Storage natively supports Azure AD authentication, so it can directly acce
8383

8484
To complete the following steps, you need to work from the VM created earlier and you need an SSH client to connect to it. If you are using Windows, you can use the SSH client in the [Windows Subsystem for Linux](/windows/wsl/about). If you need assistance configuring your SSH client's keys, see [How to Use SSH keys with Windows on Azure](~/articles/virtual-machines/linux/ssh-from-windows.md), or [How to create and use an SSH public and private key pair for Linux VMs in Azure](~/articles/virtual-machines/linux/mac-create-ssh-keys.md).
8585

86-
1. In the Azure portal, navigate to **Virtual Machines**, go to your Linux virtual machine, then from the **Overview** page click **Connect**. Copy the string to connect to your VM.
86+
1. In the Azure portal, navigate to **Virtual Machines**, go to your Linux virtual machine, then from the **Overview** page select **Connect**. Copy the string to connect to your VM.
8787
2. **Connect** to the VM with the SSH client of your choice.
8888
3. In the terminal window, use CURL to make a request to the local Managed Identity endpoint to get an access token for Azure Storage.
8989

@@ -102,6 +102,20 @@ To complete the following steps, you need to work from the VM created earlier an
102102
Hello world! :)
103103
```
104104

105+
Alternatively, you could also store the token in a variable and pass it to the second command as shown:
106+
107+
```bash
108+
# Run the first curl command and capture its output in a variable
109+
access_token=$(curl 'http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https%3A%2F%2Fstorage.azure.com%2F' -H Metadata:true | jq -r '.access_token')
110+
111+
# Run the second curl command with the access token
112+
curl "https://<STORAGE ACCOUNT>.blob.core.windows.net/<CONTAINER NAME>/<FILE NAME>" \
113+
-H "x-ms-version: 2017-11-09" \
114+
-H "Authorization: Bearer $access_token"
115+
116+
```
117+
118+
105119
## Next steps
106120

107121
In this tutorial, you learned how enable a Linux VM system-assigned managed identity to access Azure Storage. To learn more about Azure Storage see:

0 commit comments

Comments
 (0)