Skip to content

Commit 329758b

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into sharedDisks
2 parents 8d5dff8 + aa8b94f commit 329758b

File tree

619 files changed

+5579
-8008
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

619 files changed

+5579
-8008
lines changed

.openpublishing.redirection.json

Lines changed: 367 additions & 102 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/claimsschema.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 03/02/2020
11+
ms.date: 02/12/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -47,7 +47,7 @@ The **ClaimType** element contains the following elements:
4747
| Element | Occurrences | Description |
4848
| ------- | ----------- | ----------- |
4949
| DisplayName | 1:1 | The title that's displayed to users on various screens. The value can be [localized](localization.md). |
50-
| DataType | 1:1 | The type of the claim. The data types of boolean, date, dateTime, int, long, string, stringCollection can be used. Primitive data type represents the equivalent of C# variable data type. stringCollection represents a collection of strings. For more information see [C# Types and variables](https://docs.microsoft.com/dotnet/csharp/tour-of-csharp/types-and-variables). Date follows ISO 8601 convention. |
50+
| DataType | 1:1 | The type of the claim. The data types of boolean, date, dateTime, int, long, string, stringCollection and phoneNumber can be used. Primitive data type represents the equivalent of C# variable data type. stringCollection represents a collection of strings. For more information see [C# Types and variables](https://docs.microsoft.com/dotnet/csharp/tour-of-csharp/types-and-variables). Date follows ISO 8601 convention. |
5151
| DefaultPartnerClaimTypes | 0:1 | The partner default claim types to use for a specified protocol. The value can be overwritten in the **PartnerClaimType** specified in the **InputClaim** or **OutputClaim** elements. Use this element to specify the default name for a protocol. |
5252
| Mask | 0:1 | An optional string of masking characters that can be applied when displaying the claim. For example, the phone number 324-232-4343 can be masked as XXX-XXX-4343. |
5353
| UserHelpText | 0:1 | A description of the claim type that can be helpful for users to understand its purpose. The value can be [localized](localization.md). |

articles/active-directory-b2c/phone-number-claims-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 12/17/2019
12+
ms.date: 02/12/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -29,7 +29,7 @@ This claim validates the format of the phone number. If it is in a valid format,
2929
| Item | TransformationClaimType | Data Type | Notes |
3030
| ---- | ----------------------- | --------- | ----- |
3131
| InputClaim | inputClaim | string | The claim of string type converting from. |
32-
| OutputClaim | outputClaim | string | The result of this claims transformation. |
32+
| OutputClaim | outputClaim | phoneNumber | The result of this claims transformation. |
3333

3434
The **ConvertStringToPhoneNumberClaim** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md) or [display control](display-controls.md). The **UserMessageIfClaimsTransformationInvalidPhoneNumber** self-asserted technical profile metadata controls the error message that is presented to the user.
3535

articles/active-directory/azuread-dev/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -176,6 +176,8 @@
176176
items:
177177
- name: Glossary
178178
href: ../develop/developer-glossary.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
179+
- name: Videos
180+
href: videos.md
179181
- name: Azure roadmap
180182
href: https://azure.microsoft.com/roadmap/?category=security-identity
181183
- name: Azure AD blog

articles/active-directory/azuread-dev/v1-overview.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,5 +53,8 @@ The following articles provide detailed information about APIs, protocol message
5353
| [Glossary](../develop/developer-glossary.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json) | Terminology and definitions of words that are used throughout this documentation. |
5454
| | |
5555

56+
## Videos
57+
58+
See [Azure Active Directory developer platform videos](videos.md) for help migrating to the new Microsoft identity platform.
5659

5760
[!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
---
2+
title: Azure ADAL to MSAL migration videos | Azure
3+
description: Videos that help you migrate from the Azure Active Directory developer platform to the Microsoft identity platform
4+
services: active-directory
5+
author: mmacy
6+
manager: CelesteDG
7+
ms.service: active-directory
8+
ms.subservice: develop
9+
ms.topic: conceptual
10+
ms.workload: identity
11+
ms.date: 02/12/2020
12+
ms.author: marsma
13+
ms.custom: aaddev
14+
ms.reviewer: celested
15+
titleSuffix: Microsoft identity platform
16+
---
17+
18+
# Azure Active Directory developer platform videos
19+
20+
Learn about the new Microsoft identity platform and how to migrate to it from the Azure Active Directory (Azure AD) developer platform. The videos are typically 1-2 minutes long.
21+
22+
## Migrate from v1.0 to v2.0
23+
24+
**Learn about migrating to the the latest version of the Microsoft identity platform**
25+
26+
:::row:::
27+
:::column:::
28+
New Microsoft identity platform overview
29+
:::column-end:::
30+
:::column:::
31+
> [!VIDEO https://www.youtube.com/embed/bNlcFuIo3r8]
32+
:::column-end:::
33+
:::column:::
34+
Introduction to the MSAL libraries
35+
:::column-end:::
36+
:::column:::
37+
> [!VIDEO https://www.youtube.com/embed/apbbx2n4tnU]
38+
:::column-end:::
39+
:::row-end:::
40+
:::row:::
41+
:::column:::
42+
Endpoints and the benefits of moving to v2.0
43+
:::column-end:::
44+
:::column:::
45+
> [!VIDEO https://www.youtube.com/embed/qpdC45tZYDg]
46+
:::column-end:::
47+
:::column:::
48+
Migrating your ADAL codebase to MSAL
49+
:::column-end:::
50+
:::column:::
51+
> [!VIDEO https://www.youtube.com/embed/xgL_z9yCnrE]
52+
:::column-end:::
53+
:::row-end:::
54+
:::row:::
55+
:::column:::
56+
Why migrate from ADAL to MSAL
57+
:::column-end:::
58+
:::column:::
59+
> [!VIDEO https://www.youtube.com/embed/qpdC45tZYDg]
60+
:::column-end:::
61+
:::column:::
62+
Advantages of MSAL over ADAL
63+
:::column-end:::
64+
:::column:::
65+
> [!VIDEO https://www.youtube.com/embed/q-TDszj2O-4]
66+
:::column-end:::
67+
:::row-end:::
68+
69+
## Next steps
70+
71+
Learn about the new [Microsoft identity platform](https://docs.microsoft.com/azure/active-directory/develop)

articles/active-directory/conditional-access/TOC.yml

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -19,20 +19,30 @@
1919
href: concept-conditional-access-policy-common.md
2020
- name: Conditional Access policy components
2121
href: concept-conditional-access-policies.md
22-
- name: Cloud apps and actions
23-
href: concept-conditional-access-cloud-apps.md
24-
- name: Conditions
25-
href: conditions.md
26-
- name: Location conditions
27-
href: location-condition.md
28-
- name: Controls
29-
href: controls.md
22+
- name: Assignments
23+
items:
24+
- name: Users and groups
25+
href: concept-conditional-access-users-groups.md
26+
- name: Cloud apps or actions
27+
href: concept-conditional-access-cloud-apps.md
28+
- name: Conditions
29+
href: concept-conditional-access-conditions.md
30+
- name: Access controls
31+
items:
32+
- name: Grant
33+
href: concept-conditional-access-grant.md
34+
- name: Session
35+
href: concept-conditional-access-session.md
3036
- name: Report-only mode
3137
href: concept-conditional-access-report-only.md
3238
- name: Service dependencies
3339
href: service-dependencies.md
40+
- name: Location conditions
41+
href: location-condition.md
3442
- name: What if tool
3543
href: what-if-tool.md
44+
- name: Controls
45+
href: controls.md
3646
- name: Classic policy migrations
3747
href: policy-migration.md
3848
- name: Baseline protection policies
@@ -84,10 +94,6 @@
8494
items:
8595
- name: Troubleshoot using the What If tool
8696
href: troubleshoot-conditional-access-what-if.md
87-
- name: Reference
88-
items:
89-
- name: Technical reference
90-
href: technical-reference.md
9197
- name: Resources
9298
items:
9399
- name: Azure feedback forum

articles/active-directory/conditional-access/app-based-conditional-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,15 +35,15 @@ In the Conditional Access terminology, these client apps are known as **approved
3535

3636
![Conditional Access](./media/app-based-conditional-access/05.png)
3737

38-
For a list of approved client apps, see [approved client app requirement](technical-reference.md#approved-client-app-requirement).
38+
For a list of approved client apps, see [approved client app requirement](concept-conditional-access-grant.md).
3939

4040
You can combine app-based Conditional Access policies with other policies such as [device-based Conditional Access policies](require-managed-devices.md) to provide flexibility in how to protect data for both personal and corporate devices.
4141

4242
## Before you begin
4343

4444
This topic assumes that you are familiar with:
4545

46-
- The [approved client app requirement](technical-reference.md#approved-client-app-requirement) technical reference.
46+
- The [approved client app requirement](concept-conditional-access-grant.md).
4747
- The basic concepts of [Conditional Access in Azure Active Directory](overview.md).
4848
- How to [configure a Conditional Access policy](app-based-mfa.md).
4949
- The [migration of Conditional Access policies](best-practices.md#policy-migration).

articles/active-directory/conditional-access/app-protection-based-conditional-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In the Conditional Access terminology, these client apps are known to be policy
3535

3636
![Conditional Access](./media/app-protection-based-conditional-access/05.png)
3737

38-
For a list of policy-protected client apps, see [App protection policy requirement](technical-reference.md#approved-client-app-requirement).
38+
For a list of policy-protected client apps, see [App protection policy requirement](concept-conditional-access-grant.md).
3939

4040
You can combine app-protection-based Conditional Access policies with other policies, such as [device-based Conditional Access policies](require-managed-devices.md). This way, you can provide flexibility in how to protect data for both personal and corporate devices.
4141

@@ -54,8 +54,8 @@ Similar to compliance that's reported by Intune for iOS and Android for a manage
5454

5555
This article assumes that you're familiar with:
5656

57-
- The [app protection policy requirement](technical-reference.md#app-protection-policy-requirement) technical reference.
58-
- The [approved client app requirement](technical-reference.md#approved-client-app-requirement) technical reference.
57+
- The [app protection policy requirement](concept-conditional-access-grant.md).
58+
- The [approved client app requirement](concept-conditional-access-grant.md).
5959
- The basic concepts of [Conditional Access in Azure Active Directory](overview.md).
6060
- How to [configure a Conditional Access policy](app-based-mfa.md).
6161

articles/active-directory/conditional-access/app-sign-in-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818
---
1919
# Quickstart: Block access when a session risk is detected with Azure Active Directory Conditional Access
2020

21-
To keep your environment protected, you might want to block suspicious users from sign-in. [Azure Active Directory (Azure AD) Identity Protection](../active-directory-identityprotection.md) analyzes each sign-in and calculates the likelihood that a sign-in attempt was not performed by the legitimate owner of a user account. The likelihood (low, medium, high) is indicated in form of a calculated value called [sign-in risk levels](conditions.md#sign-in-risk). By setting the sign-in risk condition, you can configure a Conditional Access policy to respond to specific sign-in risk levels.
21+
To keep your environment protected, you might want to block suspicious users from sign-in. [Azure Active Directory (Azure AD) Identity Protection](../active-directory-identityprotection.md) analyzes each sign-in and calculates the likelihood that a sign-in attempt was not performed by the legitimate owner of a user account. The likelihood (low, medium, high) is indicated in form of a calculated value called [sign-in risk levels](concept-conditional-access-conditions.md#sign-in-risk). By setting the sign-in risk condition, you can configure a Conditional Access policy to respond to specific sign-in risk levels.
2222

2323
This quickstart shows how to configure a [Conditional Access policy](../active-directory-conditional-access-azure-portal.md) that blocks a sign-in when a configured sign-in risk level has been detected.
2424

0 commit comments

Comments
 (0)