Skip to content

Commit 2307788

Browse files
authored
Merge pull request #48325 from CelesteDG/celested-aaddev-renameb5
Rename AAD dev docs for pre-Ignite work, batch 5
2 parents 31ae7f8 + 018d0a7 commit 2307788

File tree

66 files changed

+160
-85
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+160
-85
lines changed

.openpublishing.redirection.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15460,6 +15460,66 @@
1546015460
"redirect_url": "/azure/active-directory/develop/v2-id-and-access-tokens",
1546115461
"redirect_document_id": false
1546215462
},
15463+
{
15464+
"source_path": "articles/active-directory/develop/active-directory-permissions.md",
15465+
"redirect_url": "/azure/active-directory/develop/v1-permissions-and-consent",
15466+
"redirect_document_id": false
15467+
},
15468+
{
15469+
"source_path": "articles/active-directory/develop/active-directory-v2-scopes.md",
15470+
"redirect_url": "/azure/active-directory/develop/v2-permissions-and-consent",
15471+
"redirect_document_id": false
15472+
},
15473+
{
15474+
"source_path": "articles/active-directory/develop/active-directory-conditional-access-developer.md",
15475+
"redirect_url": "/azure/active-directory/develop/conditional-access-dev-guide",
15476+
"redirect_document_id": false
15477+
},
15478+
{
15479+
"source_path": "articles/active-directory/develop/active-directory-v2-compare.md",
15480+
"redirect_url": "/azure/active-directory/develop/azure-ad-endpoint-comparison",
15481+
"redirect_document_id": false
15482+
},
15483+
{
15484+
"source_path": "articles/active-directory/develop/active-directory-single-sign-on-protocol-reference.md",
15485+
"redirect_url": "/azure/active-directory/develop/single-sign-on-saml-protocol",
15486+
"redirect_document_id": false
15487+
},
15488+
{
15489+
"source_path": "articles/active-directory/develop/active-directory-single-sign-out-protocol-reference.md",
15490+
"redirect_url": "/azure/active-directory/develop/single-sign-out-saml-protocol",
15491+
"redirect_document_id": false
15492+
},
15493+
{
15494+
"source_path": "articles/active-directory/develop/active-directory-federation-metadata.md",
15495+
"redirect_url": "/azure/active-directory/develop/azure-ad-federation-metadata",
15496+
"redirect_document_id": false
15497+
},
15498+
{
15499+
"source_path": "articles/active-directory/develop/active-directory-branding-guidelines.md",
15500+
"redirect_url": "/azure/active-directory/develop/howto-add-branding-in-azure-ad-apps",
15501+
"redirect_document_id": false
15502+
},
15503+
{
15504+
"source_path": "articles/active-directory/develop/active-directory-app-terms-service-privacy-statement.md",
15505+
"redirect_url": "/azure/active-directory/develop/howto-add-terms-of-service-privacy-statement",
15506+
"redirect_document_id": false
15507+
},
15508+
{
15509+
"source_path": "articles/active-directory/develop/active-directory-sso-android.md",
15510+
"redirect_url": "/azure/active-directory/develop/howto-v1-enable-sso-on-android",
15511+
"redirect_document_id": false
15512+
},
15513+
{
15514+
"source_path": "articles/active-directory/develop/active-directory-sso-ios.md",
15515+
"redirect_url": "/azure/active-directory/develop/howto-v1-enable-sso-on-ios",
15516+
"redirect_document_id": false
15517+
},
15518+
{
15519+
"source_path": "articles/active-directory/develop/active-directory-saml-debugging.md",
15520+
"redirect_url": "/azure/active-directory/develop/howto-v1-debug-saml-sso-issues",
15521+
"redirect_document_id": false
15522+
},
1546315523
{
1546415524
"source_path": "articles/virtual-machines/virtual-machines-linux-expand-disks.md",
1546515525
"redirect_url": "/azure/virtual-machines/linux/expand-disks",

articles/active-directory/active-directory-apps-index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ This section provides quick access to relevant troubleshooting guides. More info
3737

3838
| Feature Area | |
3939
|:---:| --- |
40-
| Federated Single Sign-On |[Troubleshooting SAML-Based Single Sign-On](active-directory-saml-debugging.md) |
40+
| Federated Single Sign-On |[Troubleshooting SAML-Based Single Sign-On](develop/howto-v1-debug-saml-sso-issues.md) |
4141
| Password-Based Single Sign-On |[Troubleshooting the Access Panel Extension for Internet Explorer](active-directory-saas-ie-troubleshooting.md) |
4242
| Application Proxy |[App Proxy Troubleshooting Guide](manage-apps/application-proxy-troubleshoot.md) |
4343
| Single sign-on between on-prem AD and Azure AD |[Troubleshooting Password Hash Synchronization](connect/active-directory-aadconnectsync-implement-password-hash-synchronization.md#troubleshoot-password-hash-synchronization)<br /><br />[Troubleshooting Password Writeback](authentication/active-directory-passwords-troubleshoot.md#troubleshoot-password-writeback) |
@@ -53,7 +53,7 @@ Single sign-on allows users to access a variety of apps and services using only
5353
| Thousands of SaaS apps that are pre-integrated with Azure AD with simplified single sign-on configuration steps |[Getting started with the Azure AD application gallery](manage-apps/what-is-single-sign-on.md#get-started-with-the-azure-ad-application-gallery)<br /><br />[Full List of Pre-Integrated Apps that Support Federation](saas-apps/tutorial-list.md)<br /><br />[How to Add Your App to the Azure AD App Gallery](active-directory-app-gallery-listing.md) |
5454
| More than 150 app tutorials on how to configure single sign-on for apps such as [Salesforce](saas-apps/salesforce-tutorial.md), [ServiceNow](saas-apps/servicenow-tutorial.md), [Google Apps](saas-apps/google-apps-tutorial.md), [Workday](saas-apps/workday-tutorial.md), and many more |[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](saas-apps/tutorial-list.md) |
5555
| How to manually set up and customize your single sign-on configuration |[How to Configure Federated Single Sign-On to Apps that are not in the Azure Active Directory Application Gallery](application-config-sso-how-to-configure-federated-sso-non-gallery.md)<br /><br />[How to Customize Claims Issued in the SAML Token for Pre-Integrated Apps](active-directory-saml-claims-customization.md) |
56-
| Troubleshooting guide for federated apps that use the SAML protocol |[Troubleshooting SAML-Based Single Sign-On](active-directory-saml-debugging.md) |
56+
| Troubleshooting guide for federated apps that use the SAML protocol |[Troubleshooting SAML-Based Single Sign-On](develop/howto-v1-debug-saml-sso-issues.md) |
5757
| How to configure your app's certificate's expiration date, and how to renew your certificates |[Managing Certificates for Federated Single Sign-On in Azure Active Directory](manage-apps/manage-certificates-for-federated-single-sign-on.md) |
5858

5959
Federated single sign-on is available for all editions of Azure AD for up to ten apps per user. [Azure AD Premium](https://azure.microsoft.com/pricing/details/active-directory/) supports unlimited applications. If your organization has [Azure AD Basic](https://azure.microsoft.com/pricing/details/active-directory/) or [Azure AD Premium](https://azure.microsoft.com/pricing/details/active-directory/), then you can [use groups to assign access to federated applications](#managing-access-to-applications).

articles/active-directory/active-directory-saas-custom-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ Assigning a user will allow Azure AD to issue a token for the user. It also caus
144144
145145
### Test the SAML application
146146
147-
Before testing the SAML application, you must have set up the application with Azure AD, and assigned users or groups to the application. To test the SAML application, see [How to debug SAML-based single sign-on to applications in Azure Active Directory](develop/active-directory-saml-debugging.md).
147+
Before testing the SAML application, you must have set up the application with Azure AD, and assigned users or groups to the application. To test the SAML application, see [How to debug SAML-based single sign-on to applications in Azure Active Directory](develop/howto-v1-debug-saml-sso-issues.md).
148148
149149
## Password single sign-on
150150

articles/active-directory/develop/TOC.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -70,9 +70,9 @@
7070
- name: Multi-tenant apps
7171
href: howto-convert-app-to-be-multi-tenant.md
7272
- name: Conditional access
73-
href: active-directory-conditional-access-developer.md
73+
href: conditional-access-dev-guide.md
7474
- name: Permissions
75-
href: active-directory-permissions.md
75+
href: v1-permissions-and-consent.md
7676
- name: OAuth & OpenID Connect
7777
items:
7878
- name: OpenID Connect protocol
@@ -89,23 +89,23 @@
8989
- name: Customize claims
9090
href: active-directory-saml-claims-customization.md
9191
- name: Debug SAML-based SSO
92-
href: active-directory-saml-debugging.md
92+
href: howto-v1-debug-saml-sso-issues.md
9393
- name: Single sign-on SAML protocol
94-
href: active-directory-single-sign-on-protocol-reference.md
94+
href: single-sign-on-saml-protocol.md
9595
- name: Single sign-out SAML protocol
96-
href: active-directory-single-sign-out-protocol-reference.md
96+
href: single-sign-out-saml-protocol.md
9797
- name: Create a tenant
9898
href: quickstart-create-new-tenant.md
9999
- name: Terms of service and privacy statement
100-
href: active-directory-app-terms-service-privacy-statement.md
100+
href: howto-add-terms-of-service-privacy-statement.md
101101
- name: Branding guidelines
102-
href: active-directory-branding-guidelines.md
102+
href: howto-add-branding-in-azure-ad-apps.md
103103
- name: Mobile & Desktop SSO
104104
items:
105105
- name: Enable SSO on Android
106-
href: active-directory-sso-android.md
106+
href: howto-v1-enable-sso-on-android.md
107107
- name: Enable SSO on iOS
108-
href: active-directory-sso-ios.md
108+
href: howto-v1-enable-sso-on-ios.md
109109
- name: Azure AD B2B
110110
href: ../active-directory-b2b-what-is-azure-ad-b2b.md
111111
- name: User provisioning with SCIM
@@ -169,7 +169,7 @@
169169
- name: Signing key rollover
170170
href: active-directory-signing-key-rollover.md
171171
- name: Federation metadata
172-
href: active-directory-federation-metadata.md
172+
href: azure-ad-federation-metadata.md
173173
- name: Certificate credentials
174174
href: active-directory-certificate-credentials.md
175175
- name: Application objects
@@ -193,7 +193,7 @@
193193
- name: Limitations
194194
href: active-directory-v2-limitations.md
195195
- name: v1-v2 comparison
196-
href: active-directory-v2-compare.md
196+
href: azure-ad-endpoint-comparison.md
197197
- name: Get Started
198198
items:
199199
- name: Mobile & Desktop apps
@@ -262,7 +262,7 @@
262262
- name: Tokens
263263
href: v2-id-and-access-tokens.md
264264
- name: Scopes & Consent
265-
href: active-directory-v2-scopes.md
265+
href: v2-permissions-and-consent.md
266266
- name: Resources
267267
items:
268268
- name: Getting help

articles/active-directory/develop/active-directory-appmodel-v2-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Explore in-depth information about the Azure AD v2.0 endpoint platform:
4444
* [Azure AD v2.0 protocols reference](active-directory-v2-protocols.md)
4545
* [Azure AD v2.0 tokens reference](v2-id-and-access-tokens.md)
4646
* [Azure AD v2.0 authentication libraries reference](active-directory-v2-libraries.md)
47-
* [Scopes and consent in the Azure AD v2.0 endpoint](active-directory-v2-scopes.md)
47+
* [Scopes and consent in the Azure AD v2.0 endpoint](v2-permissions-and-consent.md)
4848
* [The Microsoft Graph API](https://graph.microsoft.io)
4949

5050
> [!NOTE]

articles/active-directory/develop/active-directory-authentication-protocols.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Azure Active Directory (Azure AD) supports several of the most widely used authe
2626
## Authentication Protocols Articles and Reference
2727
* [Important Information About Signing Key Rollover in Azure AD](active-directory-signing-key-rollover.md) – Learn about Azure AD’s signing key rollover cadence, changes you can make to update the key automatically, and discussion for how to update the most common application scenarios.
2828
* [Supported Token and Claim Types](v1-id-and-access-tokens.md) - Learn about the claims in the tokens that Azure AD issues.
29-
* [Federation Metadata](active-directory-federation-metadata.md) - Learn how to find and interpret the metadata documents that Azure AD generates.
29+
* [Federation Metadata](azure-ad-federation-metadata.md) - Learn how to find and interpret the metadata documents that Azure AD generates.
3030
* [OAuth 2.0 in Azure AD](v1-protocols-oauth-code.md) - Learn about the implementation of OAuth 2.0 in Azure AD.
3131
* [OpenID Connect 1.0](v1-protocols-openid-connect-code.md) - Learn how to use OAuth 2.0, an authorization protocol, for authentication.
3232
* [Service to Service Calls with Client Credentials](v1-oauth2-client-creds-grant-flow.md) - Learn how to use OAuth 2.0 client credentials grant flow for service to service calls.

articles/active-directory/develop/active-directory-protocols-oauth-get-jwt-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ The following headers are required:
5454
| tenant | required | The `{tenant}` value in the path of the request can be used to control who can sign into the application. The allowed values are `common`, `organizations`, `consumers`, and tenant identifiers. For more detail, see [protocol basics](active-directory-v2-protocols.md#endpoints). |
5555
| client_id | required | The Application ID that the registration portal ([apps.dev.microsoft.com](https://apps.dev.microsoft.com/?referrer=https://azure.microsoft.com/documentation/articles&deeplink=/appList)) assigned your app. |
5656
| grant_type | required | Must be `authorization_code` for the authorization code flow. |
57-
| scope | required | A space-separated list of scopes. The scopes requested in this leg must be equivalent to or a subset of the scopes in the call to `/authorize`. If the scopes specified in this request span multiple resource server, then the v2.0 endpoint will return a token for the resource specified in the first scope. For a more detailed explanation of scopes, refer to [permissions, consent, and scopes](active-directory-v2-scopes.md). |
57+
| scope | required | A space-separated list of scopes. The scopes requested in this leg must be equivalent to or a subset of the scopes in the call to `/authorize`. If the scopes specified in this request span multiple resource server, then the v2.0 endpoint will return a token for the resource specified in the first scope. For a more detailed explanation of scopes, refer to [permissions, consent, and scopes](v2-permissions-and-consent.md). |
5858
| code | required | The authorization_code that you acquired in the call to `/authorize` |
5959
| redirect_uri | required | The same redirect_uri value that was used to acquire the authorization_code. |
6060
| client_secret | required for web apps | The application secret that you created in the app registration portal for your app. Do not use in a native app, because client_secrets cannot be reliably stored on devices. It is required for web apps and web APIs, which have the ability to store the client_secret securely on the server side. Client secrets must be URL-encoded before being sent. |

articles/active-directory/develop/active-directory-saml-claims-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ There are some restricted claims in SAML. If you add these claims, then Azure AD
128128
## Next steps
129129
* [Article Index for Application Management in Azure Active Directory](../active-directory-apps-index.md)
130130
* [Configuring single sign-on to applications that are not in the Azure Active Directory application gallery](../application-config-sso-how-to-configure-federated-sso-non-gallery.md)
131-
* [Troubleshooting SAML-Based Single Sign-On](active-directory-saml-debugging.md)
131+
* [Troubleshooting SAML-Based Single Sign-On](howto-v1-debug-saml-sso-issues.md)
132132

133133
<!--Image references-->
134134
[1]: ./media/active-directory-saml-claims-customization/user-attribute-section.png

articles/active-directory/develop/active-directory-saml-protocol-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.reviewer: hirsin, dastrock
2121
---
2222

2323
# How Azure Active Directory uses the SAML protocol
24-
Azure Active Directory (Azure AD) uses the SAML 2.0 protocol to enable applications to provide a single sign-on experience to their users. The [Single Sign-On](active-directory-single-sign-on-protocol-reference.md) and [Single Sign-Out](active-directory-single-sign-out-protocol-reference.md) SAML profiles of Azure AD explain how SAML assertions, protocols, and bindings are used in the identity provider service.
24+
Azure Active Directory (Azure AD) uses the SAML 2.0 protocol to enable applications to provide a single sign-on experience to their users. The [Single Sign-On](single-sign-on-saml-protocol.md) and [Single Sign-Out](single-sign-out-saml-protocol.md) SAML profiles of Azure AD explain how SAML assertions, protocols, and bindings are used in the identity provider service.
2525

2626
SAML Protocol requires the identity provider (Azure AD) and the service provider (the application) to exchange information about themselves.
2727

@@ -36,4 +36,4 @@ Azure Active Directory exposes tenant-specific and common (tenant-independent) s
3636
* The tenant-independent endpoint is located at
3737
`https://login.microsoftonline.com/common/FederationMetadata/2007-06/FederationMetadata.xml`. In this endpoint address, **common** appears instead of a tenant domain name or ID.
3838

39-
For information about the federation metadata documents that Azure AD publishes, see [Federation Metadata](active-directory-federation-metadata.md).
39+
For information about the federation metadata documents that Azure AD publishes, see [Federation Metadata](azure-ad-federation-metadata.md).

0 commit comments

Comments
 (0)