You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 10/11/2022
12
+
ms.date: 02/07/2023
13
13
ms.author: godonnell
14
14
ms.subservice: B2C
15
15
ms.custom: fasttrack-edit, project-no-code
@@ -67,26 +67,6 @@ To enable sign-in for users with an Azure AD account from a specific Azure AD or
67
67
1. Select **Certificates & secrets**, and then select **New client secret**.
68
68
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
69
69
70
-
### Configuring optional claims
71
-
72
-
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
73
-
74
-
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
75
-
1. Select the **Directories + subscriptions** icon in the portal toolbar.
76
-
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
77
-
1. In the Azure portal, search for and select **Azure Active Directory**.
78
-
1. In the left menu, under **Manage**, select **App registrations**.
79
-
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
80
-
1. From the **Manage** section, select **Token configuration**.
81
-
1. Select **Add optional claim**.
82
-
1. For the **Token type**, select **ID**.
83
-
1. Select the optional claims to add, `family_name` and `given_name`.
84
-
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
85
-
86
-
## [Optional] Verify your app authenticity
87
-
88
-
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
89
-
90
70
::: zone pivot="b2c-user-flow"
91
71
92
72
## Configure Azure AD as an identity provider
@@ -254,6 +234,26 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
254
234
255
235
::: zone-end
256
236
237
+
### [Optional] Configuring optional claims
238
+
239
+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
240
+
241
+
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
242
+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
243
+
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
244
+
1. In the Azure portal, search for and select **Azure Active Directory**.
245
+
1. In the left menu, under **Manage**, select **App registrations**.
246
+
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
247
+
1. From the **Manage** section, select **Token configuration**.
248
+
1. Select **Add optional claim**.
249
+
1. For the **Token type**, select **ID**.
250
+
1. Select the optional claims to add, `family_name` and `given_name`.
251
+
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
252
+
253
+
## [Optional] Verify your app authenticity
254
+
255
+
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
256
+
257
257
## Next steps
258
258
259
259
Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-shared-devices.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,15 +9,15 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: conceptual
11
11
ms.workload: identity
12
-
ms.date: 02/06/2023
12
+
ms.date: 02/08/2023
13
13
ms.author: henrymbugua
14
14
ms.reviewer: brandwe
15
15
ms.custom: aaddev
16
16
---
17
17
18
18
# Overview of shared device mode
19
19
20
-
Shared device mode is a feature of Azure Active Directory(Azure AD) that allows you to build and deploy applications that support frontline workers and educational scenarios that require shared Android and iOS devices.
20
+
Shared device mode is a feature of Azure Active Directory(Azure AD) that allows you to build and deploy applications that support frontline workers and educational scenarios that require shared Android and iOS devices.
21
21
22
22
> [!IMPORTANT]
23
23
> Shared device mode for iOS [!INCLUDE [PREVIEW BOILERPLATE](../../../includes/active-directory-develop-preview.md)]
@@ -36,7 +36,7 @@ Azure AD enables these scenarios with a feature called **shared device mode**.
36
36
37
37
As mentioned, shared device mode is a feature of Azure AD that enables you to:
38
38
39
-
- Build applications that support frontline workers
39
+
- Build applications that support frontline workers.
40
40
- Deploy devices to frontline workers with apps that support shared device mode.
41
41
42
42
### Build applications that support frontline workers
The API for NoSQL Async Java SDK differs from the API for NoSQL Java SDK by providing asynchronous operations with support of the [Netty library](https://netty.io/). The pre-existing [API for NoSQL Java SDK](sdk-java-v2.md) does not support asynchronous operations.
21
21
22
22
> [!IMPORTANT]
23
-
> This is *not* the latest Java SDK for Azure Cosmos DB! Consider using [Azure Cosmos DB Java SDK v4](sdk-java-v4.md) for your project. To upgrade, follow the instructions in the [Migrate to Azure Cosmos DB Java SDK v4](migrate-java-v4-sdk.md) guide and the [Reactor vs RxJava](https://github.com/Azure-Samples/azure-cosmos-java-sql-api-samples/blob/main/reactor-rxjava-guide.md) guide.
23
+
> This is *not* the latest Java SDK for Azure Cosmos DB! We **strongly recommend** using [Azure Cosmos DB Java SDK v4](sdk-java-v4.md) for your project. To upgrade, follow the instructions in the [Migrate to Azure Cosmos DB Java SDK v4](migrate-java-v4-sdk.md) guide and the [Reactor vs RxJava](https://github.com/Azure-Samples/azure-cosmos-java-sql-api-samples/blob/main/reactor-rxjava-guide.md) guide.
24
24
>
25
25
26
26
> [!IMPORTANT]
27
27
> On August 31, 2024 the Azure Cosmos DB Async Java SDK v2.x
28
-
> will be retired; the SDK and all applications using the SDK
29
-
> **will continue to function**; Azure Cosmos DB will simply cease
30
-
> to provide further maintenance and support for this SDK.
31
-
> We recommend following the instructions above to migrate to
28
+
> will be retired. Azure Cosmos DB will cease
29
+
> to provide further maintenance and support for this SDK after retirement.
30
+
> Please follow the instructions above to migrate to
This is the original Azure Cosmos DB Sync Java SDK v2 for API for NoSQL which supports synchronous operations.
21
21
22
22
> [!IMPORTANT]
23
-
> This is *not* the latest Java SDK for Azure Cosmos DB! Consider using [Azure Cosmos DB Java SDK v4](sdk-java-v4.md) for your project. To upgrade, follow the instructions in the [Migrate to Azure Cosmos DB Java SDK v4](migrate-java-v4-sdk.md) guide and the [Reactor vs RxJava](https://github.com/Azure-Samples/azure-cosmos-java-sql-api-samples/blob/main/reactor-rxjava-guide.md) guide.
23
+
> This is *not* the latest Java SDK for Azure Cosmos DB! We **strongly recommend** using [Azure Cosmos DB Java SDK v4](sdk-java-v4.md) for your project. To upgrade, follow the instructions in the [Migrate to Azure Cosmos DB Java SDK v4](migrate-java-v4-sdk.md) guide and the [Reactor vs RxJava](https://github.com/Azure-Samples/azure-cosmos-java-sql-api-samples/blob/main/reactor-rxjava-guide.md) guide.
24
24
>
25
25
26
26
> [!IMPORTANT]
27
27
> On February 29, 2024 the Azure Cosmos DB Sync Java SDK v2.x
28
-
> will be retired; the SDK and all applications using the SDK
29
-
> **will continue to function**; Azure Cosmos DB will simply cease
30
-
> to provide further maintenance and support for this SDK.
31
-
> We recommend following the instructions above to migrate to
28
+
> will be retired. Azure Cosmos DB will cease
29
+
> to provide further maintenance and support for this SDK after retirement.
30
+
> Please follow the instructions above to migrate to
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/integration-defender-for-endpoint.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -217,6 +217,8 @@ If you've never enabled the integration for Windows, endpoint protection enables
217
217
218
218
1. From Defender for Cloud's menu, select **Environment settings** and select the subscription with the Linux machines that you want to receive Defender for Endpoint.
219
219
220
+
1. In the Monitoring coverage column of the Defender for Server plan, select **Settings**.
221
+
220
222
1. In the status of the Endpoint protection component, select **On** to enable the integration with Microsoft Defender for Endpoint.
221
223
222
224
:::image type="content" source="media/integration-defender-for-endpoint/enable-defender-for-endpoint.png" alt-text="Screenshot of Status toggle that enables Microsoft Defender for Endpoint." lightbox="media/integration-defender-for-endpoint/enable-defender-for-endpoint.png":::
@@ -229,6 +231,8 @@ If you've never enabled the integration for Windows, endpoint protection enables
229
231
230
232
Onboarding might take up to 1 hour.
231
233
234
+
1. Select **Continue** and **Save** to save your settings.
235
+
232
236
1. To verify installation of Defender for Endpoint on a Linux machine, run the following shell command on your machines:
233
237
234
238
`mdatp health`
@@ -339,8 +343,9 @@ To remove the Defender for Endpoint solution from your machines:
339
343
340
344
1. Disable the integration:
341
345
1. From Defender for Cloud's menu, select **Environment settings** and select the subscription with the relevant machines.
342
-
1. Open **Integrations** and clear the checkbox for **Allow Microsoft Defender for Endpoint to access my data**.
343
-
1. Select **Save**.
346
+
1. In the Monitoring coverage column of the Defender for Servers plan, select **Settings**.
347
+
1. In the status of the Endpoint protection component, select **Off** to disable the integration with Microsoft Defender for Endpoint.
348
+
1. Select **Continue** and **Save** to save your settings.
344
349
345
350
1. Remove the MDE.Windows/MDE.Linux extension from the machine.
Copy file name to clipboardExpand all lines: articles/hdinsight/hdinsight-upgrade-cluster.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,14 +5,14 @@ description: Learn guidelines to migrate your Azure HDInsight cluster to a newer
5
5
ms.service: hdinsight
6
6
ms.topic: how-to
7
7
ms.custom: hdinsightactive
8
-
ms.date: 10/25/2022
8
+
ms.date: 02/08/2023
9
9
---
10
10
# Migrate HDInsight cluster to a newer version
11
11
12
12
To take advantage of the latest HDInsight features, we recommend that HDInsight clusters be regularly migrated to latest version. HDInsight doesn't support in-place upgrades where an existing cluster is upgraded to a newer component version. You must create a new cluster with the desired component and platform version and then migrate your applications to use the new cluster. Follow the below guidelines to migrate your HDInsight cluster versions.
13
13
14
14
> [!NOTE]
15
-
> For information on supported versions of HDInsight, see [HDInsight component versions](hdinsight-component-versioning.md#supported-hdinsight-versions).
15
+
> If you are creating a Hive cluster with a primary storage container, copy it from an existing HDInsight cluster. Don'tt copy the complete content. Copy only the data folders which are configured.
16
16
17
17
## Migration tasks
18
18
@@ -40,7 +40,7 @@ The following documents provide guidance on how to migrate specific workloads:
For more information about database backup and restore, see [Recover a database in Azure SQL Database by using automated database backups](/azure/azure-sql/database/recovery-using-backups).
46
46
@@ -51,13 +51,13 @@ As mentioned above, Microsoft recommends that HDInsight clusters be regularly mi
51
51
* The cluster version is [Retired](hdinsight-retired-versions.md) or if you're having a cluster issue that would be resolved with a newer version.
52
52
* The root cause of a cluster issue is determined to relate an undersized VM. [View Microsoft's recommended node configuration](hdinsight-supported-node-configuration.md).
53
53
* A customer opens a support case and the Microsoft engineering team determines the issue has already been fixed in a newer cluster version.
54
-
* A default metastore database (Ambari, Hive, Oozie, Ranger) has reached its utilization limit. Microsoft will ask you to recreate the cluster using a [custom metastore](hdinsight-use-external-metadata-stores.md#custom-metastore) database.
54
+
* A default metastore database (Ambari, Hive, Oozie, Ranger) has reached its utilization limit. Microsoft asks you to recreate the cluster using a [custom metastore](hdinsight-use-external-metadata-stores.md#custom-metastore) database.
55
55
* The root cause of a cluster issue is due to an **Unsupported Operation**. Here are some of the common unsupported operations:
56
56
***Moving or Adding a service in Ambari**. See the information on the cluster services in Ambari, one of the actions available from the Service Actions menu is **Move [Service Name]**. Another action is **Add [Service Name]**. Both of these options are unsupported.
57
57
***Python package corruption**. HDInsight clusters depend on the built-in Python environments, Python 2.7 and Python 3.5. Directly installing custom packages in those default built-in environments may cause unexpected library version changes and break the cluster. Learn how to [safely install custom external Python packages](./spark/apache-spark-python-package-installation.md#safely-install-external-python-packages) for your Spark applications.
58
58
***Third-party software**. Customers have the ability to install third-party software on their HDInsight clusters; however, we'll recommend recreating the cluster if it breaks the existing functionality.
59
59
***Multiple workloads on the same cluster**. In HDInsight 4.0, the Hive Warehouse Connector needs separate clusters for Spark and Interactive Query workloads. [Follow these steps to set up both clusters in Azure HDInsight](interactive-query/apache-hive-warehouse-connector.md). Similarly, integrating [Spark with HBASE](hdinsight-using-spark-query-hbase.md) requires two different clusters.
60
-
***Custom Ambari DB password changed**. The Ambari DB password is set during cluster creation and there's no current mechanism to update it. If a customer deploys the cluster with a [custom Ambari DB](hdinsight-custom-ambari-db.md), they'll have the ability to change the DB password on the SQL DB; however, there's no way to update this password for a running HDInsight cluster.
60
+
***Custom Ambari DB password changed**. The Ambari DB password is set during cluster creation and there's no current mechanism to update it. If a customer deploys the cluster with a [custom Ambari DB](hdinsight-custom-ambari-db.md), they have the ability to change the DB password on the SQL DB; however, there's no way to update this password for a running HDInsight cluster.
0 commit comments