Skip to content

Commit 263a69b

Browse files
authored
Merge pull request #89676 from MicrosoftDocs/master
9/25 OOB Publish
2 parents 3f22ae3 + 6646aaf commit 263a69b

File tree

63 files changed

+3354
-513
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

63 files changed

+3354
-513
lines changed

articles/active-directory-domain-services/join-centos-linux-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ In the *hosts* file, update the *localhost* address. In the following example:
6565
Update these names with your own values:
6666

6767
```console
68-
127.0.0.1 centos centos.contoso.com
68+
127.0.0.1 centos.contoso.com centos
6969
```
7070

7171
When done, save and exit the *hosts* file using the `:wq` command of the editor.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,23 +40,24 @@ After the feature has been running in audit mode for a reasonable period, you ca
4040
## Deployment requirements
4141

4242
* Licensing requirements for Azure AD password protection can be found in the article [Eliminate bad passwords in your organization](concept-password-ban-bad.md#license-requirements).
43-
* All domain controllers that get the DC Agent service for Azure AD password protection installed must run Windows Server 2012 or later. This requirement does not imply that the Active Directory domain or forest must also be at Windows Server 2012 domain or forest functional level. As mentioned in [Design Principles](concept-password-ban-bad-on-premises.md#design-principles), there is no minimum DFL or FFL required for either the DC agent or proxy software to run.
43+
* All machines where the Azure AD Password Protection DC Agent software will be installed must run Windows Server 2012 or later. This requirement does not imply that the Active Directory domain or forest must also be at Windows Server 2012 domain or forest functional level. As mentioned in [Design Principles](concept-password-ban-bad-on-premises.md#design-principles), there is no minimum DFL or FFL required for either the DC agent or proxy software to run.
4444
* All machines that get the DC agent service installed must have .NET 4.5 installed.
45-
* All machines that get the proxy service for Azure AD password protection installed must run Windows Server 2012 R2 or later.
45+
* All machines where the Azure AD Password Protection Proxy service will be installed must run Windows Server 2012 R2 or later.
4646
> [!NOTE]
47-
> Proxy service deployment is a mandatory requirement for deploying Azure AD password protection even though the Domain controller may have outbound direct internet connectivity.
47+
> Proxy service deployment is a mandatory requirement for deploying Azure AD password protection even though the domain controller may have outbound direct internet connectivity.
4848
>
4949
* All machines where the Azure AD Password Protection Proxy service will be installed must have .NET 4.7 installed.
5050
.NET 4.7 should already be installed on a fully updated Windows Server. If this is not the case, download and run the installer found at [The .NET Framework 4.7 offline installer for Windows](https://support.microsoft.com/help/3186497/the-net-framework-4-7-offline-installer-for-windows).
51-
* All machines, including domain controllers, that get Azure AD password protection components installed must have the Universal C Runtime installed. You can get the runtime by making sure you have all updates from Windows Update. Or you can get it in an OS-specific update package. For more information, see [Update for Universal C Runtime in Windows](https://support.microsoft.com/help/2999226/update-for-uniersal-c-runtime-in-windows).
51+
* All machines, including domain controllers, that have Azure AD password protection components installed must have the Universal C Runtime installed. You can get the runtime by making sure you have all updates from Windows Update. Or you can get it in an OS-specific update package. For more information, see [Update for Universal C Runtime in Windows](https://support.microsoft.com/help/2999226/update-for-uniersal-c-runtime-in-windows).
5252
* Network connectivity must exist between at least one domain controller in each domain and at least one server that hosts the proxy service for password protection. This connectivity must allow the domain controller to access RPC endpoint mapper port 135 and the RPC server port on the proxy service. By default, the RPC server port is a dynamic RPC port, but it can be configured to [use a static port](#static).
53-
* All machines that host the proxy service must have network access to the following endpoints:
53+
* All machines where the Azure AD Password Protection Proxy service will be installed must have network access to the following endpoints:
5454

5555
|**Endpoint**|**Purpose**|
5656
| --- | --- |
5757
|`https://login.microsoftonline.com`|Authentication requests|
5858
|`https://enterpriseregistration.windows.net`|Azure AD password protection functionality|
5959

60+
You must also enable network access for the set of ports and urls specified in the [Application Proxy environment setup procedures](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-add-on-premises-application#prepare-your-on-premises-environment). These configuration steps are required in order for the Microsoft Azure AD Connect Agent Updater service to be able to function (this service is installed side-by-side with the Proxy service). It is not recommended to install Azure AD Password Protection Proxy and Application Proxy side by side on the same machine, due to incompatibilities between the versions of the Microsoft Azure AD Connect Agent Updater software.
6061
* All machines that host the proxy service for password protection must be configured to grant domain controllers the ability to logon to the proxy service. This is controlled via the "Access this computer from the network" privilege assignment.
6162
* All machines that host the proxy service for password protection must be configured to allow outbound TLS 1.2 HTTP traffic.
6263
* A Global Administrator account to register the proxy service for password protection and forest with Azure AD.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-faq.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,8 @@ No. Since the proxy server is stateless, it's not important which specific proxy
9898

9999
Yes. The Azure AD Password Protection Proxy service and Azure AD Connect should never conflict directly with each other.
100100

101+
Unfortunately, an incompatibility has been found between the version of the Microsoft Azure AD Connect Agent Updater service that is installed by the Azure AD Password Protection Proxy software and the version of the service that is installed by the [Azure Active Directory Application Proxy](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy) software. This incompatibility may result in the Agent Updater service being unable to contact Azure for software updates. It is not recommended to install Azure AD Password Protection Proxy and Azure Active Directory Application Proxy on the same machine.
102+
101103
**Q: In what order should the DC agents and proxies be installed and registered?**
102104

103105
Any ordering of Proxy agent installation, DC agent installation, forest registration, and Proxy registration is supported.

articles/active-directory/develop/TOC.yml

Lines changed: 45 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
href: v2-overview.md
1010
- name: Quickstarts
1111
items:
12-
- name: Set up a dev environment
12+
- name: Set up a tenant
1313
href: quickstart-create-new-tenant.md
1414
- name: Configure an application
1515
items:
@@ -49,7 +49,7 @@
4949
items:
5050
- name: Android
5151
href: quickstart-v2-android.md
52-
- name: iOS
52+
- name: iOS and macOS
5353
href: quickstart-v2-ios.md
5454
- name: Universal Windows Platform
5555
href: quickstart-v2-uwp.md
@@ -75,7 +75,7 @@
7575
items:
7676
- name: Android
7777
href: tutorial-v2-android.md
78-
- name: iOS
78+
- name: iOS and macOS
7979
href: tutorial-v2-ios.md
8080
- name: Universal Windows Platform
8181
href: tutorial-v2-windows-uwp.md
@@ -223,12 +223,14 @@
223223
items:
224224
- name: Overview
225225
href: msal-overview.md
226-
- name: Migration
226+
- name: Migration from ADAL
227227
items:
228228
- name: Migrate to MSAL.NET
229229
href: msal-net-migration.md
230230
- name: Migrate to MSAL.js
231231
href: msal-compare-msal-js-and-adal-js.md
232+
- name: Migrate to MSAL for iOS and MacOS
233+
href: migrate-objc-adal-msal.md
232234
- name: Migrate Xamarin apps using brokers from ADAL.NET to MSAL.NET
233235
href: msal-net-migration-ios-broker.md
234236
- name: Supported authentication flows
@@ -239,8 +241,6 @@
239241
href: msal-acquire-cache-tokens.md
240242
- name: Scopes for v1.0 apps
241243
href: msal-v1-app-scopes.md
242-
- name: Token cache serialization (.NET)
243-
href: msal-net-token-cache-serialization.md
244244
- name: Client applications
245245
items:
246246
- name: Client applications
@@ -257,18 +257,28 @@
257257
href: msal-handling-exceptions.md
258258
- name: Logging
259259
href: msal-logging.md
260-
- name: Single sign-on (JS)
261-
href: msal-js-sso.md
262-
- name: Prompt behavior (JS)
263-
href: msal-js-prompt-behavior.md
264-
- name: ADFS support (.NET)
265-
href: msal-net-adfs-support.md
260+
- name: Single sign-on
261+
items:
262+
- name: Single sign-on with MSAL.js
263+
href: msal-js-sso.md
264+
- name: Single sign-on with MSAL for iOS and macOS
265+
items:
266+
- name: SSO between MSAL apps
267+
href: single-sign-on-macos-ios.md
268+
- name: SSO between ADAL and MSAL apps
269+
href: sso-between-adal-msal-apps-macos-ios.md
270+
- name: Integrate with ADFS
271+
items:
272+
- name: ADFS support in MSAL.NET
273+
href: msal-net-adfs-support.md
266274
- name: Integrate with Azure AD B2C
267275
items:
268276
- name: JavaScript
269277
href: msal-b2c-overview.md
270278
- name: .NET
271279
href: msal-net-aad-b2c-considerations.md
280+
- name: iOS and macOS
281+
href: config-authority.md#b2c
272282
- name: Considerations and known issues
273283
items:
274284
- name: MSAL.NET
@@ -283,6 +293,10 @@
283293
href: msal-js-known-issues-ie-edge-browsers.md
284294
- name: Known issues- Safari
285295
href: msal-js-known-issues-safari-browser.md
296+
- name: MSAL for iOS and macOS
297+
items:
298+
- name: SSL issues
299+
href: ssl-issues.md
286300
- name: Authentication protocol
287301
items:
288302
- name: Application types and OAuth2.0
@@ -378,6 +392,8 @@
378392
items:
379393
- name: Acquire a token from the cache
380394
href: msal-net-acquire-token-silently.md
395+
- name: Token cache serialization
396+
href: msal-net-token-cache-serialization.md
381397
- name: Clear the token cache
382398
href: msal-net-clear-token-cache.md
383399
- name: Instantiate a public client with options
@@ -393,7 +409,21 @@
393409
- name: Avoid page reloads
394410
href: msal-js-avoid-page-reloads.md
395411
- name: Pass custom state in authentication requests
396-
href: msal-js-pass-custom-state-authentication-request.md
412+
href: msal-js-pass-custom-state-authentication-request.md
413+
- name: Prompt behavior
414+
href: msal-js-prompt-behavior.md
415+
- name: MSAL for iOS and macOS
416+
items:
417+
- name: Microsoft Authentication Library for iOS and macOS differences
418+
href: msal-differences-ios-macos.md
419+
- name: Configure keychain
420+
href: howto-v2-keychain-objc.md
421+
- name: Customize browsers and WebViews
422+
href: customize-webviews.md
423+
- name: Request custom claims
424+
href: request-custom-claims.md
425+
- name: Redirect URI configuration
426+
href: redirect-uris-ios.md
397427
- name: Work with Visual Studio
398428
items:
399429
- name: Use the Active Directory connected service
@@ -428,7 +458,7 @@
428458
href: v1-overview.md
429459
- name: Quickstarts
430460
items:
431-
- name: Set up a dev environment
461+
- name: Set up a tenant
432462
href: quickstart-create-new-tenant.md
433463
- name: Configure an application
434464
items:
@@ -468,7 +498,7 @@
468498
items:
469499
- name: Android
470500
href: quickstart-v1-android.md
471-
- name: iOS
501+
- name: iOS and MacOS
472502
href: quickstart-v1-ios.md
473503
- name: Windows Desktop .NET
474504
href: quickstart-v1-dotnet.md

0 commit comments

Comments
 (0)