Skip to content

Commit 20e77d5

Browse files
committed
Bringing even with master.
2 parents 0b7be58 + 64fcb1b commit 20e77d5

File tree

129 files changed

+710
-458
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

129 files changed

+710
-458
lines changed

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 10/05/2018
16+
ms.date: 11/08/2018
1717
ms.author: celested
1818
ms.reviewer: paulgarn, hirsin
1919
ms.custom: aaddev
@@ -38,7 +38,7 @@ One of the goals of the [v2.0 Azure AD endpoint](active-directory-appmodel-v2-ov
3838
| Account Type | V1.0 Endpoint | V2.0 Endpoint |
3939
|--------------|---------------|----------------|
4040
| Personal Microsoft account | N/A - RPS Tickets are used instead | Support coming |
41-
| Azure AD account | Supported | Supported with caveats |
41+
| Azure AD account | Supported | Supported with caveats |
4242

4343
> [!IMPORTANT]
4444
> Apps that support both personal accounts and Azure AD (registered through the [app registration portal](https://apps.dev.microsoft.com)) cannot use optional claims. However, apps registered for just Azure AD using the v2.0 endpoint can get the optional claims they requested in the manifest. In the Azure portal, you can use the application manifest editor in the existing **App registrations** experience to edit your optional claims. However, this functionality is not yet available using the application manifest editor in the new **App registrations (Preview)** experience.
@@ -56,8 +56,6 @@ The set of optional claims available by default for applications to use are list
5656
|-----------------------------|----------------|------------|-----------|--------|
5757
| `auth_time` | Time when the user last authenticated. See OpenID Connect spec.| JWT | | |
5858
| `tenant_region_scope` | Region of the resource tenant | JWT | | |
59-
| `signin_state` | Sign in state claim | JWT | | 6 return values, as flags:<br> "dvc_mngd": Device is managed<br> "dvc_cmp": Device is compliant<br> "dvc_dmjd": Device is domain joined<br> "dvc_mngd_app": Device is managed via MDM<br> "inknownntwk": Device is inside a known network.<br> "kmsi": Keep Me Signed In was used. <br> |
60-
| `controls` | Multivalue claim containing the session controls enforced by Conditional Access policies. | JWT | | 3 values:<br> "app_res": The app needs to enforce more granular restrictions. <br> "ca_enf": Conditional Access enforcement was deferred and is still required. <br> "no_cookie": This token is insufficient to exchange for a cookie in the browser. <br> |
6159
| `home_oid` | For guest users, the object ID of the user in the user’s home tenant.| JWT | | |
6260
| `sid` | Session ID, used for per-session user signout. | JWT | | |
6361
| `platf` | Device platform | JWT | | Restricted to managed devices that can verify device type.|
@@ -72,6 +70,7 @@ The set of optional claims available by default for applications to use are list
7270
| `xms_pl` | User preferred language | JWT ||The user’s preferred language, if set. Sourced from their home tenant, in guest access scenarios. Formatted LL-CC (“en-us”). |
7371
| `xms_tpl` | Tenant preferred language| JWT | | The resource tenant’s preferred language, if set. Formatted LL (“en”). |
7472
| `ztdid` | Zero-touch Deployment ID | JWT | | The device identity used for [Windows AutoPilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot) |
73+
|`email` | The addressable email for this user, if the user has one. | JWT, SAML | | This value is included by default if the user is a guest in the tenant. For managed users (those inside the tenant), it must be requested through this optional claim or, on v2.0 only, with the OpenID scope. For managed users, the email address must be set in the [Office admin portal](https://portal.office.com/adminportal/home#/users).|
7574
| `acct` | Users account status in tenant. | JWT, SAML | | If the user is a member of the tenant, the value is `0`. If they are a guest, the value is `1`. |
7675
| `upn` | UserPrincipalName claim. | JWT, SAML | | Although this claim is automatically included, you can specify it as an optional claim to attach additional properties to modify its behavior in the guest user case. <br> Additional properties: <br> `include_externally_authenticated_upn` <br> `include_externally_authenticated_upn_without_hash` |
7776

articles/active-directory/develop/howto-convert-app-to-be-multi-tenant.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Some permissions can be consented to by a regular user, while others require a t
114114

115115
App-only permissions always require a tenant administrator’s consent. If your application requests an app-only permission and a user tries to sign in to the application, an error message is displayed saying the user isn’t able to consent.
116116

117-
Certain delegated permissions also require a tenant administrator’s consent. For example, the ability to write back to Azure AD as the signed in user requires a tenant administrator’s consent. Like app-only permissions, if an ordinary user tries to sign in to an application that requests a delegated permission that requires administrator consent, your application receives an error. Whether a permission requires admin consent is determined by the developer that published the resource, and can be found in the documentation for the resource. The permissions documentation for the [Azure AD Graph API][AAD-Graph-Perm-Scopes] and [Microsoft Graph API][MSFT-Graph-permision-scopes] indicate which permissions require admin consent.
117+
Certain delegated permissions also require a tenant administrator’s consent. For example, the ability to write back to Azure AD as the signed in user requires a tenant administrator’s consent. Like app-only permissions, if an ordinary user tries to sign in to an application that requests a delegated permission that requires administrator consent, your application receives an error. Whether a permission requires admin consent is determined by the developer that published the resource, and can be found in the documentation for the resource. The permissions documentation for the [Azure AD Graph API][AAD-Graph-Perm-Scopes] and [Microsoft Graph API][MSFT-Graph-permission-scopes] indicate which permissions require admin consent.
118118

119119
If your application uses permissions that require admin consent, you need to have a gesture such as a button or link where the admin can initiate the action. The request your application sends for this action is the usual OAuth2/OpenID Connect authorization request that also includes the `prompt=admin_consent` query string parameter. Once the admin has consented and the service principal is created in the customer’s tenant, subsequent sign-in requests do not need the `prompt=admin_consent` parameter. Since the administrator has decided the requested permissions are acceptable, no other users in the tenant are prompted for consent from that point forward.
120120

@@ -180,7 +180,7 @@ In this article, you learned how to build an application that can sign in a user
180180
* [Application objects and service principal objects][AAD-App-SP-Objects]
181181
* [Integrating applications with Azure Active Directory][AAD-Integrating-Apps]
182182
* [Overview of the Consent Framework][AAD-Consent-Overview]
183-
* [Microsoft Graph API permission scopes][MSFT-Graph-permision-scopes]
183+
* [Microsoft Graph API permission scopes][MSFT-Graph-permission-scopes]
184184
* [Azure AD Graph API permission scopes][AAD-Graph-Perm-Scopes]
185185

186186
<!--Reference style links IN USE -->
@@ -198,7 +198,7 @@ In this article, you learned how to build an application that can sign in a user
198198
[AAD-Why-To-Integrate]: ./active-directory-how-to-integrate.md
199199
[AZURE-portal]: https://portal.azure.com
200200
[MSFT-Graph-overview]: https://developer.microsoft.com/graph/docs/overview/overview
201-
[MSFT-Graph-permision-scopes]: https://developer.microsoft.com/graph/docs/concepts/permissions_reference
201+
[MSFT-Graph-permission-scopes]: https://developer.microsoft.com/graph/docs/concepts/permissions_reference
202202

203203
<!--Image references-->
204204
[AAD-Sign-In]: ./media/active-directory-devhowto-multi-tenant-overview/sign-in-with-microsoft-light.png

articles/active-directory/develop/quickstart-register-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.reviewer: lenalepa, sureshja
2424

2525
Enterprise developers and software-as-a-service (SaaS) providers can develop commercial cloud services or line-of-business applications that can be integrated with Microsoft identity platform to provide secure sign-in and authorization for their services.
2626

27-
This quickstart shows you how to add and register an application using the **App registrations (Preview)** experience in the Azure portal so that your app can be integrated with the Microsoft identity platform.
27+
This quickstart shows you how to add and register an application using the **App registrations (Preview)** experience in the Azure portal so that your app can be integrated with the Microsoft identity platform. To learn more about the new features and improvements in the new app registrations experience, see [this blog post](https://developer.microsoft.com/graph/blogs/new-app-registration/).
2828

2929
## Prerequisite
3030

articles/active-directory/fundamentals/whats-new.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -211,12 +211,9 @@ For more information, see [How to enable password reset from Windows 7, 8, and 8
211211
**Service category:** Authentications (Logins)
212212
**Product capability:** User Authentication
213213

214-
Starting on October 10, 2018, Azure AD will stop accepting previously used authentication codes for apps. This security change helps to bring Azure AD in line with the OAuth specification and will be enforced on both the v1 and v2 endpoints.
214+
Starting on November 15, 2018, Azure AD will stop accepting previously used authentication codes for apps. This security change helps to bring Azure AD in line with the OAuth specification and will be enforced on both the v1 and v2 endpoints.
215215

216-
If your app reuses authorization codes to get tokens for multiple resources, we recommend that you use the code to get a refresh token, and then use that refresh token to acquire additional tokens for other resources. Authorization codes can only be used once, but refresh tokens can be used multiple times across multiple resources. Any app that attempts to reuse an authentication code during the OAuth code flow will get an invalid_grant error.
217-
218-
>[!Note]
219-
>In an effort to help minimize broken apps, apps that rely on this pattern and have more than 10 sign-ins a day, have been give an exception.
216+
If your app reuses authorization codes to get tokens for multiple resources, we recommend that you use the code to get a refresh token, and then use that refresh token to acquire additional tokens for other resources. Authorization codes can only be used once, but refresh tokens can be used multiple times across multiple resources. An app that attempts to reuse an authentication code during the OAuth code flow will get an invalid_grant error.
220217

221218
For this and other protocols-related changes, see [the full list of what's new for authentication](https://docs.microsoft.com/azure/active-directory/develop/reference-breaking-changes).
222219

@@ -298,12 +295,9 @@ We strongly recommend not removing the old IP Address ranges until all of your n
298295
**Service category:** Authentications (Logins)
299296
**Product capability:** User Authentication
300297

301-
Starting on October 10, 2018, Azure AD will stop accepting previously used authentication codes for apps. This security change helps to bring Azure AD in line with the OAuth specification and will be enforced on both the v1 and v2 endpoints.
302-
303-
If your app reuses authorization codes to get tokens for multiple resources, we recommend that you use the code to get a refresh token, and then use that refresh token to acquire additional tokens for other resources. Authorization codes can only be used once, but refresh tokens can be used multiple times across multiple resources. Any app that attempts to reuse an authentication code during the OAuth code flow will get an invalid_grant error.
298+
Starting on November 15, 2018, Azure AD will stop accepting previously used authentication codes for apps. This security change helps to bring Azure AD in line with the OAuth specification and will be enforced on both the v1 and v2 endpoints.
304299

305-
>[!Note]
306-
>In an effort to help minimize broken apps, apps that rely on this pattern and have more than 10 sign-ins a day, have been give an exception.
300+
If your app reuses authorization codes to get tokens for multiple resources, we recommend that you use the code to get a refresh token, and then use that refresh token to acquire additional tokens for other resources. Authorization codes can only be used once, but refresh tokens can be used multiple times across multiple resources. An app that attempts to reuse an authentication code during the OAuth code flow will get an invalid_grant error.
307301

308302
For this and other protocols-related changes, see [the full list of what's new for authentication](https://docs.microsoft.com/azure/active-directory/develop/reference-breaking-changes).
309303

articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-arm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,6 @@ It is not possible to list and delete a user-assigned managed identity using an
3333

3434
- If you're unfamiliar with managed identities for Azure resources, check out the [overview section](overview.md). **Be sure to review the [difference between a system-assigned and user-assigned managed identity](overview.md#how-does-it-work)**.
3535
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before continuing.
36-
- To perform the operations in this article, your account needs the following role assignment:
37-
- [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role to create, read (list), update, and delete a user-assigned managed identity.
3836

3937
## Template creation and editing
4038

@@ -47,6 +45,8 @@ As with the Azure portal and scripting, Azure Resource Manager templates provide
4745

4846
## Create a user-assigned managed identity
4947

48+
To create a user-assigned managed identity, your account needs the [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role assignment.
49+
5050
To create a user-assigned managed identity, use the following template. Replace the `<USER ASSIGNED IDENTITY NAME>` value with your own values:
5151

5252
[!INCLUDE [ua-character-limit](~/includes/managed-identity-ua-character-limits.md)]

articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-cli.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,6 @@ In this article, you learn how to create, list and delete a user-assigned manage
2929

3030
- If you're unfamiliar with managed identities for Azure resources, check out the [overview section](overview.md). **Be sure to review the [difference between a system-assigned and user-assigned managed identity](overview.md#how-does-it-work)**.
3131
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before continuing.
32-
- To perform the management operations in this article, your account needs the following role assignments:
33-
- [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role to create, read (list), update, and delete a user-assigned managed identity.
34-
- [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) role to read (list) the properties of a user-assigned managed identity.
3532
- To run the CLI script examples, you have three options:
3633
- Use [Azure Cloud Shell](../../cloud-shell/overview.md) from the Azure portal (see next section).
3734
- Use the embedded Azure Cloud Shell via the "Try It" button, located in the top right corner of each code block.
@@ -41,7 +38,9 @@ In this article, you learn how to create, list and delete a user-assigned manage
4138

4239
## Create a user-assigned managed identity
4340

44-
To create a user-assigned managed identity, use the [az identity create](/cli/azure/identity#az-identity-create) command. The `-g` parameter specifies the resource group where to create the user-assigned managed identity, and the `-n` parameter specifies its name. Replace the `<RESOURCE GROUP>` and `<USER ASSIGNED IDENTITY NAME>` parameter values with your own values:
41+
To create a user-assigned managed identity, your account needs the [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role assignment.
42+
43+
Use the [az identity create](/cli/azure/identity#az-identity-create) command to create a user-assigned managed identity. The `-g` parameter specifies the resource group where to create the user-assigned managed identity, and the `-n` parameter specifies its name. Replace the `<RESOURCE GROUP>` and `<USER ASSIGNED IDENTITY NAME>` parameter values with your own values:
4544

4645
[!INCLUDE [ua-character-limit](~/includes/managed-identity-ua-character-limits.md)]
4746

@@ -50,6 +49,8 @@ az identity create -g <RESOURCE GROUP> -n <USER ASSIGNED IDENTITY NAME>
5049
```
5150
## List user-assigned managed identities
5251

52+
To list/read a user-assigned managed identity, your account needs the [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) or [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role assignment.
53+
5354
To list user-assigned managed identities, use the [az identity list](/cli/azure/identity#az-identity-list) command. Replace the `<RESOURCE GROUP>` with your own value:
5455

5556
```azurecli-interactive
@@ -61,6 +62,8 @@ In the json response, user-assigned managed identities have `"Microsoft.ManagedI
6162

6263
## Delete a user-assigned managed identity
6364

65+
To delete a user-assigned managed identity, your account needs the [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role assignment.
66+
6467
To delete a user-assigned managed identity, use the [az identity delete](/cli/azure/identity#az-identity-delete) command. The -n parameter specifies its name and the -g parameter specifies the resource group where the user-assigned managed identity was created. Replace the `<USER ASSIGNED IDENTITY NAME>` and `<RESOURCE GROUP>` parameters values with your own values:
6568

6669
```azurecli-interactive

0 commit comments

Comments
 (0)