Skip to content

Commit 24546b6

Browse files
committed
add resolvers tab screenshot
2 parents 0ae5eb9 + 885f716 commit 24546b6

File tree

2,485 files changed

+4658
-53470
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,485 files changed

+4658
-53470
lines changed

articles/active-directory-b2c/partner-arkose-labs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,9 +68,9 @@ The following diagram illustrates how the Arkose Labs platform integrates with A
6868

6969
### Create an ArkoseSessionToken custom attribute
7070

71-
To create a custom attribute:
71+
To create a custom attribute:
7272

73-
1. Go to the [Azure portal](https://ms.portal.azure.com/#home), then to **Azure AD B2C**.
73+
1. Go to the [Azure portal](https://portal.azure.com), then to **Azure AD B2C**.
7474
2. Select **User attributes**.
7575
3. Select **Add**.
7676
4. Enter **ArkoseSessionToken** as the attribute Name.

articles/active-directory/app-provisioning/application-provisioning-config-problem-scim-compatibility.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ Below are sample requests to help outline what the sync engine currently sends v
236236
## Upgrading from the older customappsso job to the SCIM job
237237
Following the steps below will delete your existing customappsso job and create a new SCIM job.
238238

239-
1. Sign into the [Azure portal](https://portal.azure.com).
239+
1. Sign in to the [Azure portal](https://portal.azure.com).
240240
2. In the **Azure Active Directory > Enterprise Applications** section of the Azure portal, locate and select your existing SCIM application.
241241
3. In the **Properties** section of your existing SCIM app, copy the **Object ID**.
242242
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
@@ -275,7 +275,7 @@ Following the steps below will delete your existing customappsso job and create
275275
## Downgrading from the SCIM job to the customappsso job (not recommended)
276276
We allow you to downgrade back to the old behavior but don't recommend it as the customappsso does not benefit from some of the updates we make, and may not be supported forever.
277277

278-
1. Sign into the [Azure portal](https://portal.azure.com).
278+
1. Sign in to the [Azure portal](https://portal.azure.com).
279279
2. In the **Azure Active Directory > Enterprise Applications > Create application** section of the Azure portal, create a new **Non-gallery** application.
280280
3. In the **Properties** section of your new custom app, copy the **Object ID**.
281281
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.

articles/active-directory/develop/howto-add-app-roles-in-apps.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,10 +55,12 @@ To create an app role by using the Azure portal's user interface:
5555
| **Allowed member types** | Specifies whether this app role can be assigned to users, applications, or both.<br/><br/>When available to `applications`, app roles appear as application permissions in an app registration's **Manage** section > **API permissions > Add a permission > My APIs > Choose an API > Application permissions**. | `Users/Groups` |
5656
| **Value** | Specifies the value of the roles claim that the application should expect in the token. The value should exactly match the string referenced in the application's code. The value can't contain spaces. | `Survey.Create` |
5757
| **Description** | A more detailed description of the app role displayed during admin app assignment and consent experiences. | `Writers can create surveys.` |
58-
| **Do you want to enable this app role?** | Specifies whether the app role is enabled. To delete an app role, deselect this checkbox and apply the change before attempting the delete operation. | _Checked_ |
58+
| **Do you want to enable this app role?** | Specifies whether the app role is enabled. To delete an app role, deselect this checkbox and apply the change before attempting the delete operation. This setting controls the app role's usage and availability while being able to temporarily or permanently disabling it without removing it entirely. | _Checked_ |
5959

6060
1. Select **Apply** to save your changes.
6161

62+
When the app role is set to enabled, any users, applications or groups who are assigned has it included in their tokens. These can be access tokens when your app is the API being called by an app or ID tokens when your app is signing in a user. If set to disabled, it becomes inactive and no longer assignable. Any previous assignees will still have the app role included in their tokens, but it has no effect as it is no longer actively assignable.
63+
6264
## Assign users and groups to roles
6365

6466
Once you've added app roles in your application, you can assign users and groups to the roles. Assignment of users and groups to roles can be done through the portal's UI, or programmatically using [Microsoft Graph](/graph/api/user-post-approleassignments). When the users assigned to the various app roles sign in to the application, their tokens will have their assigned roles in the `roles` claim.
@@ -112,7 +114,7 @@ The **Status** column should reflect that consent has been **Granted for \<tenan
112114

113115
## Usage scenario of app roles
114116

115-
If you're implementing app role business logic that signs in the users in your application scenario, first define the app roles in **App registrations**. Then, an admin assigns them to users and groups in the **Enterprise applications** pane. These assigned app roles are included with any token that's issued for your application, either access tokens when your app is the API being called by an app or ID tokens when your app is signing in a user.
117+
If you're implementing app role business logic that signs in the users in your application scenario, first define the app roles in **App registrations**. Then, an admin assigns them to users and groups in the **Enterprise applications** pane. These assigned app roles are included with any token that's issued for your application.
116118

117119
If you're implementing app role business logic in an app-calling-API scenario, you have two app registrations. One app registration is for the app, and a second app registration is for the API. In this case, define the app roles and assign them to the user or group in the app registration of the API. When the user authenticates with the app and requests an access token to call the API, a roles claim is included in the token. Your next step is to add code to your web API to check for those roles when the API is called.
118120

articles/active-directory/develop/test-setup-environment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Replicating conditional access policies ensures you don't encounter unexpected b
9494

9595
Viewing your production tenant conditional access policies may need to be performed by a company administrator.
9696

97-
1. Sign into the [Azure portal](https://portal.azure.com) using your production tenant account.
97+
1. Sign in to the [Azure portal](https://portal.azure.com) using your production tenant account.
9898
1. Go to **Azure Active Directory** > **Enterprise applications** > **Conditional Access**.
9999
1. View the list of policies in your tenant. Click the first one.
100100
1. Navigate to **Cloud apps or actions**.
@@ -110,7 +110,7 @@ In a new tab or browser session, sign in to the [Azure portal](https://portal.az
110110

111111
Replicating permission grant policies ensures you don't encounter unexpected prompts for admin consent when moving to production.
112112

113-
1. Sign into the [Azure portal](https://portal.azure.com) using your production tenant account.
113+
1. Sign in to the [Azure portal](https://portal.azure.com) using your production tenant account.
114114
1. Click on **Azure Active Directory**.
115115
1. Go to **Enterprise applications**.
116116
1. From your production tenant, go to **Azure Active Directory** > **Enterprise applications** > **Consent and permissions** > **User consent** settings. Copy the settings there to your test tenant.

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323

2424
# Product names and service plan identifiers for licensing
2525

26-
When managing licenses in the [Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products) or the [Microsoft 365 admin center](https://admin.microsoft.com), you see product names that look something like *Office 365 E3*. When you use PowerShell v1.0 cmdlets, the same product is identified using a specific but less friendly name: *ENTERPRISEPACK*. When using PowerShell v2.0 cmdlets or [Microsoft Graph](/graph/api/resources/subscribedsku), the same product is identified using a GUID value: *6fd2c87f-b296-42f0-b197-1e91e994b900*. The following table lists the most commonly used Microsoft online service products and provides their various ID values. These tables are for reference purposes in Azure Active Directory (Azure AD), part of Microsoft Entra, and are accurate only as of the date when this article was last updated. Microsoft will continue to make periodic updates to this document.
26+
When [managing licenses in the Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products) or the [Microsoft 365 admin center](https://admin.microsoft.com), you see product names that look something like *Office 365 E3*. When you use PowerShell v1.0 cmdlets, the same product is identified using a specific but less friendly name: *ENTERPRISEPACK*. When using PowerShell v2.0 cmdlets or [Microsoft Graph](/graph/api/resources/subscribedsku), the same product is identified using a GUID value: *6fd2c87f-b296-42f0-b197-1e91e994b900*. The following table lists the most commonly used Microsoft online service products and provides their various ID values. These tables are for reference purposes in Azure Active Directory (Azure AD), part of Microsoft Entra, and are accurate only as of the date when this article was last updated. Microsoft will continue to make periodic updates to this document.
2727

2828
- **Product name**: Used in management portals
2929
- **String ID**: Used by PowerShell v1.0 cmdlets when performing operations on licenses or by the **skuPartNumber** property of the **subscribedSku** Microsoft Graph API

articles/active-directory/external-identities/direct-federation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,7 @@ Next, configure federation with the IdP configured in step 1 in Azure AD. You ca
191191

192192
### To configure federation in the Azure portal
193193

194-
1. Sign in to the [Azure portal](https://portal.azure.com/) as an External Identity Provider Administrator or a Global Administrator.
194+
1. Sign in to the [Azure portal](https://portal.azure.com) as an External Identity Provider Administrator or a Global Administrator.
195195
2. In the left pane, select **Azure Active Directory**.
196196
3. Select **External Identities** > **All identity providers**.
197197
4. Select **New SAML/WS-Fed IdP**.
@@ -276,7 +276,7 @@ On the **All identity providers** page, you can view the list of SAML/WS-Fed ide
276276
You can remove your federation configuration. If you do, federation guest users who have already redeemed their invitations can no longer sign in. But you can give them access to your resources again by [resetting their redemption status](reset-redemption-status.md).
277277
To remove a configuration for an IdP in the Azure portal:
278278

279-
1. Sign in to the [Azure portal](https://portal.azure.com/). In the left pane, select **Azure Active Directory**.
279+
1. Sign in to the [Azure portal](https://portal.azure.com). In the left pane, select **Azure Active Directory**.
280280
1. Select **External Identities**.
281281
1. Select **All identity providers**.
282282
1. Under **SAML/WS-Fed identity providers**, scroll to the identity provider in the list or use the search box.

articles/active-directory/manage-apps/f5-bigip-deployment-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ You can deploy a BIG-IP in different topologies. This guide focuses on a network
6363

6464
To deploy BIG-IP VE from the [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps).
6565

66-
1. Log into the [Azure portal](https://portal.azure.com/#home) using an account with permissions to create VMs. For example, Contributor.
66+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) using an account with permissions to create VMs, such as Contributor.
6767
2. In the top ribbon search box, type **marketplace**
6868
3. Select **Enter**.
6969
4. Type **F5** into the Marketplace filter.

articles/active-directory/manage-apps/grant-admin-consent.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,10 +80,11 @@ https://login.microsoftonline.com/{organization}/adminconsent?client_id={client-
8080
where:
8181

8282
- `{client-id}` is the application's client ID (also known as app ID).
83-
- `{organization}` is the tenant ID or any verified domain name of the tenant you want to consent the application in. You can use the value `common`, which will cause the consent to happen in the home tenant of the user you sign in with.
83+
- `{organization}` is the tenant ID or any verified domain name of the tenant you want to consent the application in. You can use the value `organizations`, which will cause the consent to happen in the home tenant of the user you sign in with.
8484

8585
As always, carefully review the permissions an application requests before granting consent.
8686

87+
For more information on constructing the tenant-wide admin consent URL, see [Admin consent on the Microsoft identity platform](../develop/v2-admin-consent.md).
8788

8889
:::zone-end
8990

articles/active-directory/manage-apps/home-realm-discovery-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ The json object is an example HRD policy definition:
110110
{
111111
"AccelerateToFederatedDomain":true,
112112
"PreferredDomain":"federated.example.edu",
113-
"AllowCloudPasswordValidation":false,
113+
"AllowCloudPasswordValidation":false
114114
}
115115
}
116116
```

articles/active-directory/manage-apps/tenant-restrictions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ Fiddler is a free web debugging proxy that can be used to capture and modify HTT
160160

161161
1. In the Fiddler Web Debugger tool, select the **Rules** menu and select **Customize Rules…** to open the CustomRules file.
162162

163-
2. Add the following lines at the beginning of the `OnBeforeRequest` function. Replace \<List of tenant identifiers\> with a domain registered with your tenant (for example, `contoso.onmicrosoft.com`). Replace \<directory ID\> with your tenant's Azure AD GUID identifier. You **must** include the correct GUID identifier in order for the logs to appear in your tenant.
163+
2. Add the following lines within the `OnBeforeRequest` function. Replace \<List of tenant identifiers\> with a domain registered with your tenant (for example, `contoso.onmicrosoft.com`). Replace \<directory ID\> with your tenant's Azure AD GUID identifier. You **must** include the correct GUID identifier in order for the logs to appear in your tenant.
164164

165165
```JScript.NET
166166
// Allows access to the listed tenants.

0 commit comments

Comments
 (0)