You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ The Azure AD default for browser session persistence allows users on personal de
50
50
Conditional Access is an Azure AD Premium capability and requires a premium license. If you would like to learn more about Conditional Access, see [What is Conditional Access in Azure Active Directory?](overview.md#license-requirements)
51
51
52
52
> [!WARNING]
53
-
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on November 1 and replace it with the Conditional Access authentication session management feature.
53
+
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on May 1, 2020 and replace it with the Conditional Access authentication session management feature.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/tutorial-v2-android.md
+16-4Lines changed: 16 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,21 +12,29 @@ ms.devlang: na
12
12
ms.topic: tutorial
13
13
ms.tgt_pltfrm: na
14
14
ms.workload: identity
15
-
ms.date: 07/09/2019
15
+
ms.date: 10/10/2019
16
16
ms.author: jmprieur
17
17
ms.reviwer: brandwe
18
18
ms.custom: aaddev, identityplatformtop40
19
19
ms.collection: M365-identity-device-management
20
20
---
21
21
22
-
# Sign in users and call the Microsoft Graph from an Android app
22
+
# Tutorial: Sign in users and call the Microsoft Graph from an Android app
23
23
24
24
> [!NOTE]
25
25
> This tutorial has not yet been updated to work with MSAL for Android version 1.0 library. It works with an earlier version, as configured in this tutorial.
26
26
27
27
In this tutorial, you'll learn how to integrate an Android app with the Microsoft identity platform. Your app will sign in a user, get an access token to call the Microsoft Graph API, and make a request to the Microsoft Graph API.
28
28
29
-
When you've completed the guide, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory.
29
+
> [!div class="checklist"]
30
+
> * Integrate an Android app with the Microsoft identity platform
31
+
> * Sign in a user
32
+
> * Get an access token to call the Microsoft Graph API
33
+
> * Call the Microsoft Graph API.
34
+
35
+
When you've completed this tutorial, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) as well as work or school accounts from any company or organization that uses Azure Active Directory.
36
+
37
+
If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
30
38
31
39
## How this tutorial works
32
40
@@ -52,7 +60,7 @@ This sample uses the Microsoft Authentication library for Android (MSAL) to impl
52
60
53
61
## Create a project
54
62
55
-
This tutorial will create a new project. If you want to download the completed tutorial instead, [download the code](https://github.com/Azure-Samples/active-directory-android-native-v2/archive/master.zip).
63
+
This tutorial will create a new project. If you want to download the completed tutorial instead, [download the code](https://github.com/Azure-Samples/ms-identity-android-java/archive/master.zip).
56
64
57
65
1. Open Android Studio, and select **Start a new Android Studio project**.
58
66
2. Select **Basic Activity** and select **Next**.
@@ -535,6 +543,10 @@ After you sign in, the app will display the data returned from the Microsoft Gra
535
543
536
544
The first time any user signs into your app, they will be prompted by Microsoft identity to consent to the permissions requested. While most users are capable of consenting, some Azure AD tenants have disabled user consent which requires admins to consent on behalf of all users. To support this scenario, register your app's scopes in the Azure portal.
537
545
546
+
## Clean up resources
547
+
548
+
When no longer needed, delete the app object that you created in the [Register your application](#register-your-application) step.
549
+
538
550
## Get help
539
551
540
552
Visit [Help and support](https://docs.microsoft.com/azure/active-directory/develop/developer-support-help-options) if you have trouble with this tutorial or with the Microsoft identity platform.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-proxy-configure-connectors-with-proxy-servers.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,7 +110,7 @@ Allow access to the following URLs:
110
110
| --- | --- |
111
111
|\*.msappproxy.net<br>\*.servicebus.windows.net | Communication between the connector and the Application Proxy cloud service |
112
112
| mscrl.microsoft.com:80<br>crl.microsoft.com:80<br>ocsp.msocsp.com:80<br>www.microsoft.com:80 | Azure uses these URLs to verify certificates |
113
-
| login.windows.net<br>login.microsoftonline.com | The connector uses these URLs during the registration process. |
113
+
| login.windows.net<br>secure.aadcdn.microsoftonline-p.com<br>*.microsoftonline.com<br>*.microsoftonline-p.com<br>*.msauth.net<br>*.msauthimages.net<br>*.msecnd.net<br>*.msftauth.net<br>*.msftauthimages.net<br>*.phonefactor.net<br>enterpriseregistration.windows.net<br>management.azure.com<br>policykeyservice.dc.ad.msft.net| The connector uses these URLs during the registration process. |
114
114
115
115
If your firewall or proxy allows you to configure DNS allow lists, you can allow connections to \*.msappproxy.net and \*.servicebus.windows.net. If not, you need to allow access to the [Azure DataCenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653). The IP ranges are updated each week.
0 commit comments