Skip to content

Commit 30224ef

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into carve
2 parents 9d9f0f9 + 50ba02a commit 30224ef

File tree

130 files changed

+2208
-1547
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

130 files changed

+2208
-1547
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2872,6 +2872,11 @@
28722872
"redirect_url": "https://github.com/Azure-Samples/active-directory-dotnet-native-uwp-v2",
28732873
"redirect_document_id": false
28742874
},
2875+
{
2876+
"source_path": "articles/active-directory/develop/quickstart-v2-javascipt-auth-code.md",
2877+
"redirect_url": "/azure/active-directory/develop/quickstart-v2-javascript-auth-code",
2878+
"redirect_document_id": true
2879+
},
28752880
{
28762881
"source_path": "articles/active-directory/develop/active-directory-v2-devquickstarts-wpf.md",
28772882
"redirect_url": "https://docs.microsoft.com/azure/active-directory/develop/guidedsetups/active-directory-windesktop",

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -813,7 +813,7 @@ Requests from Azure Active Directory include an OAuth 2.0 bearer token. Any serv
813813

814814
In the token, the issuer is identified by an iss claim, like `"iss":"https://sts.windows.net/cbb1a5ac-f33b-45fa-9bf5-f37db0fed422/"`. In this example, the base address of the claim value, `https://sts.windows.net`, identifies Azure Active Directory as the issuer, while the relative address segment, _cbb1a5ac-f33b-45fa-9bf5-f37db0fed422_, is a unique identifier of the Azure Active Directory tenant for which the token was issued.
815815

816-
The audience for the token will be the application template ID for the application in the gallery, each of the applications registered in a single tenant may receive the same `iss` claim with SCIM requests. The application template ID for each application in the gallery varies, please contact [[email protected]](mailto:[email protected]) for questions around the application template ID for a gallery application. The application template ID for all custom apps is _8adf8e6e-67b2-4cf2-a259-e3dc5476c621_.
816+
The audience for the token will be the application template ID for the application in the gallery, each of the applications registered in a single tenant may receive the same `iss` claim with SCIM requests. The application template ID for all custom apps is _8adf8e6e-67b2-4cf2-a259-e3dc5476c621_. The token generated by the Azure AD provisioning service should only be used for testing. It should not be used in production environments.
817817

818818
In the sample code, requests are authenticated using the Microsoft.AspNetCore.Authentication.JwtBearer package. The following code enforces that requests to any of the service’s endpoints are authenticated using the bearer token issued by Azure Active Directory for a specified tenant:
819819

articles/active-directory/develop/scenario-web-app-call-api-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ public void ConfigureServices(IServiceCollection services)
4646
{
4747
// more code here
4848
49-
services.AddSignIn(Configuration, "AzureAd");
49+
services.AddSignIn(Configuration, "AzureAd")
5050
.AddWebAppCallsProtectedWebApi(Configuration,
5151
initialScopes: new string[] { "user.read" })
5252
.AddInMemoryTokenCaches();

articles/active-directory/governance/entitlement-management-troubleshoot.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,13 +85,19 @@ This article describes some items you should check to help you troubleshoot Azur
8585

8686
If the request has any delivery errors, the request status will be **Undelivered** or **Partially delivered**.
8787

88-
If there are any delivery errors, in the request's detail pane, there will be a count of delivery errors.
88+
If there are any delivery errors, a count of delivery errors will be displayed in the request's detail pane.
8989

9090
1. Click the count to see all of the request's delivery errors.
9191

9292
### Reprocess a request
9393

94-
If a request encounters an error, you can reprocess the request to try it again. You can only reprocess a request that has a status of **Delivery failed** or **Partially delivered** and a completed date of less than one week.
94+
If an error is met after triggering an access package reprocess request, you must wait while the system reprocesses the request. The system tries multiple times to reprocess for several hours, so you can't force reprocessing during this time.
95+
96+
You can only reprocess a request that has a status of **Delivery failed** or **Partially delivered** and a completed date of less than one week.
97+
98+
- If the error is fixed during the trials window, the request status will change to **Delivering**. The request will reprocess without additional actions from the user.
99+
100+
- If the error wasn't fixed during the trials window, the request status may be **Delivery failed** or **partially delivered**. You can then use the **reprocess** button. You'll have seven days to reprocess the request.
95101

96102
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
97103

articles/active-directory/hybrid/choose-ad-authn.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -65,11 +65,11 @@ Details on decision questions:
6565

6666
1. Azure AD can handle sign-in for users without relying on on-premises components to verify passwords.
6767
2. Azure AD can hand off user sign-in to a trusted authentication provider such as Microsoft’s AD FS.
68-
3. If you need to apply user-level Active Directory security policies such as account expired, disabled account, password expired, account locked out, and sign-in hours on each user sign-in, Azure AD requires some on-premises components.
68+
3. If you need to apply, user-level Active Directory security policies such as account expired, disabled account, password expired, account locked out, and sign-in hours on each user sign-in, Azure AD requires some on-premises components.
6969
4. Sign-in features not natively supported by Azure AD:
7070
* Sign-in using smartcards or certificates.
7171
* Sign-in using on-premises MFA Server.
72-
* Sign-in using third party authentication solution.
72+
* Sign-in using third-party authentication solution.
7373
* Multi-site on-premises authentication solution.
7474
5. Azure AD Identity Protection requires Password Hash Sync regardless of which sign-in method you choose, to provide the *Users with leaked credentials* report. Organizations can fail over to Password Hash Sync if their primary sign-in method fails and it was configured before the failure event.
7575

@@ -128,7 +128,7 @@ Refer to [implementing pass-through authentication](../../active-directory/hybri
128128

129129
* **User experience**. The user experience of federated authentication depends on the implementation of the features, topology, and configuration of the federation farm. Some organizations need this flexibility to adapt and configure the access to the federation farm to suit their security requirements. For example, it's possible to configure internally connected users and devices to sign in users automatically, without prompting them for credentials. This configuration works because they already signed in to their devices. If necessary, some advanced security features make users' sign-in process more difficult.
130130

131-
* **Advanced scenarios**. A federated authentication solution is usually required when customers have an authentication requirement that Azure AD doesn't support natively. See detailed information to help you [choose the right sign-in option](https://blogs.msdn.microsoft.com/samueld/2017/06/13/choosing-the-right-sign-in-option-to-connect-to-azure-ad-office-365/). Consider the following common requirements:
131+
* **Advanced scenarios**. A federated authentication solution is required when customers have an authentication requirement that Azure AD doesn't support natively. See detailed information to help you [choose the right sign-in option](https://blogs.msdn.microsoft.com/samueld/2017/06/13/choosing-the-right-sign-in-option-to-connect-to-azure-ad-office-365/). Consider the following common requirements:
132132

133133
* Authentication that requires smartcards or certificates.
134134
* On-premises MFA servers or third-party multifactor providers requiring a federated identity provider.
@@ -197,7 +197,7 @@ Use or enable password hash synchronization for whichever authentication method
197197

198198
2. **On-premises outage survival**. The consequences of an on-premises outage due to a cyber-attack or disaster can be substantial, ranging from reputational brand damage to a paralyzed organization unable to deal with the attack. Recently, many organizations were victims of malware attacks, including targeted ransomware, which caused their on-premises servers to go down. When Microsoft helps customers deal with these kinds of attacks, it sees two categories of organizations:
199199

200-
* Organizations that previously turned on password hash synchronization changed their authentication method to use password hash synchronization. They were back online in a matter of hours. By using access to email via Office 365, they worked to resolve issues and access other cloud-based workloads.
200+
* Organizations that previously also turned on password hash synchronization on top of federated or pass-through authentication changed their primary authentication method to then use password hash synchronization. They were back online in a matter of hours. By using access to email via Office 365, they worked to resolve issues and access other cloud-based workloads.
201201

202202
* Organizations that didn’t previously enable password hash synchronization had to resort to untrusted external consumer email systems for communications to resolve issues. In those cases, it took them weeks to restore their on-premises identity infrastructure, before users were able to sign in to cloud-based apps again.
203203

articles/active-directory/hybrid/how-to-connect-pta-quick-start.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ Azure Active Directory (Azure AD) Pass-through Authentication allows your users
2727
>[!IMPORTANT]
2828
>If you are migrating from AD FS (or other federation technologies) to Pass-through Authentication, we highly recommend that you follow our detailed deployment guide published [here](https://aka.ms/adfstoPTADPDownload).
2929
30+
>[!NOTE]
31+
>If you deploying Pass Through Authentication with the Azure Government cloud, view [Hybrid Identity Considerations for Azure Government](https://docs.microsoft.com/azure/active-directory/hybrid/reference-connect-government-cloud).
32+
3033
Follow these instructions to deploy Pass-through Authentication on your tenant:
3134

3235
## Step 1: Check the prerequisites
@@ -69,7 +72,7 @@ Ensure that the following prerequisites are in place.
6972
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products you may already have these URLs unblocked.
7073

7174
### Azure Government cloud prerequisite
72-
Prior to enabling Pass-through Authentication through Azure AD Connect with Step 2, download the latest release of the PTA agent from the Azure portal. You need to ensure that your agent is versions **x.x.xxx.x** or later. To verify your agent see [Upgrade authentication agents](how-to-connect-pta-upgrade-preview-authentication-agents.md)
75+
Prior to enabling Pass-through Authentication through Azure AD Connect with Step 2, download the latest release of the PTA agent from the Azure portal. You need to ensure that your agent is versions **1.5.1742.0.** or later. To verify your agent see [Upgrade authentication agents](how-to-connect-pta-upgrade-preview-authentication-agents.md)
7376

7477
After downloading the latest release of the agent, proceed with the below instructions to configure Pass-Through Authentication through Azure AD Connect.
7578

articles/active-directory/saas-apps/float-tutorial.md

Lines changed: 5 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -80,31 +80,16 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8080

8181
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
8282

83-
a. In the **Identifier** text box, type any of the following URLs:
83+
a. In the **Identifier** text box, type this URL: `https://app.float.com/sso/metadata`.
8484

85-
| |
86-
|--|
87-
| `https://app.float.com/sso/metadata`|
88-
| `https://app.develop.float.com/sso/metadata`|
89-
90-
b. In the **Reply URL** text box, type a URL using any one of the following patterns:
91-
92-
| |
93-
|--|
94-
| `https://<hostname>.float.com/sso/azuread`|
95-
| `https://<hostname>.develop.float.com/sso/azuread`|
85+
b. In the **Reply URL** text box, type a URL using the pattern `https://<hostname>.float.com/sso/azuread`.
9686

9787
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
9888

99-
In the **Sign-on URL** text box, type a URL using any one of the following patterns:
100-
101-
| |
102-
|--|
103-
| `https://<hostname>.float.com/login`|
104-
| `https://<hostname>.develop.float.com/login`|
89+
In the **Sign-on URL** text box, type a URL in the pattern `https://<hostname>.float.com/login`.
10590

106-
> [!NOTE]
107-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Float Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
91+
> [!NOTE]
92+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Float Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
10893
10994
1. Float application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
11095

articles/active-directory/users-groups-roles/roles-delegate-by-task.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,9 @@ Configure company properties | Global Administrator |
7373

7474
Task | Least privileged role | Additional roles
7575
---- | --------------------- | ----------------
76-
Passthrough authentication | Hybrid Identity Administrator |
77-
Read all configuration | Global reader | Hybrid Identity Administrator |
78-
Seamless single sign-on | Hybrid Identity Administrator |
76+
Passthrough authentication | Global Administrator |
77+
Read all configuration | Global reader | Global Administrator |
78+
Seamless single sign-on | Global Administrator |
7979

8080
## Connect Health
8181

articles/aks/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -252,7 +252,7 @@
252252
- name: View container data real-time
253253
href: ../azure-monitor/insights/container-insights-livedata-overview.md
254254
maintainContext: true
255-
- name: Use Windows Server containers (preview)
255+
- name: Use Windows Server containers
256256
items:
257257
- name: Create an AKS cluster
258258
href: windows-container-cli.md

0 commit comments

Comments
 (0)