Skip to content

Commit 3486e2d

Browse files
authored
Merge pull request #94252 from MicrosoftDocs/master
10/31 AM Publish
2 parents fa5ce89 + a4af571 commit 3486e2d

File tree

58 files changed

+769
-517
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+769
-517
lines changed

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The Azure AD default for browser session persistence allows users on personal de
5050
Conditional Access is an Azure AD Premium capability and requires a premium license. If you would like to learn more about Conditional Access, see [What is Conditional Access in Azure Active Directory?](overview.md#license-requirements)
5151

5252
> [!WARNING]
53-
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on November 1 and replace it with the Conditional Access authentication session management feature.
53+
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on May 1, 2020 and replace it with the Conditional Access authentication session management feature.
5454
5555
### Policy 1: Sign-in frequency control
5656

articles/active-directory/develop/quickstart-v2-android.md

Lines changed: 161 additions & 132 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/tutorial-v2-android.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,21 +12,29 @@ ms.devlang: na
1212
ms.topic: tutorial
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 07/09/2019
15+
ms.date: 10/10/2019
1616
ms.author: jmprieur
1717
ms.reviwer: brandwe
1818
ms.custom: aaddev, identityplatformtop40
1919
ms.collection: M365-identity-device-management
2020
---
2121

22-
# Sign in users and call the Microsoft Graph from an Android app
22+
# Tutorial: Sign in users and call the Microsoft Graph from an Android app
2323

2424
> [!NOTE]
2525
> This tutorial has not yet been updated to work with MSAL for Android version 1.0 library. It works with an earlier version, as configured in this tutorial.
2626
2727
In this tutorial, you'll learn how to integrate an Android app with the Microsoft identity platform. Your app will sign in a user, get an access token to call the Microsoft Graph API, and make a request to the Microsoft Graph API.
2828

29-
When you've completed the guide, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory.
29+
> [!div class="checklist"]
30+
> * Integrate an Android app with the Microsoft identity platform
31+
> * Sign in a user
32+
> * Get an access token to call the Microsoft Graph API
33+
> * Call the Microsoft Graph API.
34+
35+
When you've completed this tutorial, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) as well as work or school accounts from any company or organization that uses Azure Active Directory.
36+
37+
If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
3038

3139
## How this tutorial works
3240

@@ -52,7 +60,7 @@ This sample uses the Microsoft Authentication library for Android (MSAL) to impl
5260

5361
## Create a project
5462

55-
This tutorial will create a new project. If you want to download the completed tutorial instead, [download the code](https://github.com/Azure-Samples/active-directory-android-native-v2/archive/master.zip).
63+
This tutorial will create a new project. If you want to download the completed tutorial instead, [download the code](https://github.com/Azure-Samples/ms-identity-android-java/archive/master.zip).
5664

5765
1. Open Android Studio, and select **Start a new Android Studio project**.
5866
2. Select **Basic Activity** and select **Next**.
@@ -535,6 +543,10 @@ After you sign in, the app will display the data returned from the Microsoft Gra
535543

536544
The first time any user signs into your app, they will be prompted by Microsoft identity to consent to the permissions requested. While most users are capable of consenting, some Azure AD tenants have disabled user consent which requires admins to consent on behalf of all users. To support this scenario, register your app's scopes in the Azure portal.
537545

546+
## Clean up resources
547+
548+
When no longer needed, delete the app object that you created in the [Register your application](#register-your-application) step.
549+
538550
## Get help
539551

540552
Visit [Help and support](https://docs.microsoft.com/azure/active-directory/develop/developer-support-help-options) if you have trouble with this tutorial or with the Microsoft identity platform.

articles/active-directory/manage-apps/application-proxy-configure-connectors-with-proxy-servers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ Allow access to the following URLs:
110110
| --- | --- |
111111
| \*.msappproxy.net<br>\*.servicebus.windows.net | Communication between the connector and the Application Proxy cloud service |
112112
| mscrl.microsoft.com:80<br>crl.microsoft.com:80<br>ocsp.msocsp.com:80<br>www.microsoft.com:80 | Azure uses these URLs to verify certificates |
113-
| login.windows.net<br>login.microsoftonline.com | The connector uses these URLs during the registration process. |
113+
| login.windows.net<br>secure.aadcdn.microsoftonline-p.com<br>*.microsoftonline.com<br>*.microsoftonline-p.com<br>*.msauth.net<br>*.msauthimages.net<br>*.msecnd.net<br>*.msftauth.net<br>*.msftauthimages.net<br>*.phonefactor.net<br>enterpriseregistration.windows.net<br>management.azure.com<br>policykeyservice.dc.ad.msft.net | The connector uses these URLs during the registration process. |
114114

115115
If your firewall or proxy allows you to configure DNS allow lists, you can allow connections to \*.msappproxy.net and \*.servicebus.windows.net. If not, you need to allow access to the [Azure DataCenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653). The IP ranges are updated each week.
116116

articles/active-directory/manage-apps/use-scim-to-provision-users-and-groups.md

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -258,7 +258,7 @@ This section provides example SCIM requests emitted by the Azure AD SCIM client
258258
###### <a name="request-1"></a>Request
259259
*GET /Users/5d48a0a8e9f04aa38008*
260260

261-
###### <a name="response-1"></a>Response
261+
###### <a name="response-1"></a>Response (User found)
262262
*HTTP/1.1 200 OK*
263263
```json
264264
{
@@ -285,6 +285,21 @@ This section provides example SCIM requests emitted by the Azure AD SCIM client
285285
}
286286
```
287287

288+
###### Request
289+
*GET /Users/5171a35d82074e068ce2*
290+
291+
###### Response (User not found. Note that the detail is not required, only status.)
292+
293+
```json
294+
{
295+
"schemas": [
296+
"urn:ietf:params:scim:api:messages:2.0:Error"
297+
],
298+
"status": "404",
299+
"detail": "Resource 23B51B0E5D7AE9110A49411D@7cca31655d49f3640a494224 not found"
300+
}
301+
```
302+
288303
#### Get User by query
289304

290305
##### <a name="request-2"></a>Request
@@ -469,7 +484,6 @@ This section provides example SCIM requests emitted by the Azure AD SCIM client
469484
"schemas": ["urn:ietf:params:scim:schemas:core:2.0:Group", "http://schemas.microsoft.com/2006/11/ResourceManagement/ADSCIM/2.0/Group"],
470485
"externalId": "8aa1a0c0-c4c3-4bc0-b4a5-2ef676900159",
471486
"displayName": "displayName",
472-
"members": [],
473487
"meta": {
474488
"resourceType": "Group"
475489
}

0 commit comments

Comments
 (0)