Skip to content

Commit 349f19c

Browse files
committed
2 parents 26c0902 + 941d2b1 commit 349f19c

File tree

152 files changed

+349
-341
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

152 files changed

+349
-341
lines changed

articles/active-directory/authentication/concept-certificate-based-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ The following scenarios are supported:
6666

6767
The following scenarios aren't supported:
6868

69-
- Certificate Authority hints aren't supported, so the list of certificates that appears for users in the certificate picket UI isn't scoped.
69+
- Certificate Authority hints aren't supported, so the list of certificates that appears for users in the certificate picker UI isn't scoped.
7070
- Only one CRL Distribution Point (CDP) for a trusted CA is supported.
7171
- The CDP can be only HTTP URLs. We don't support Online Certificate Status Protocol (OCSP), or Lightweight Directory Access Protocol (LDAP) URLs.
7272
- Configuring other certificate-to-user account bindings, such as using the **Subject**, **Subject + Issuer** or **Issuer + Serial Number**, aren’t available in this release.

articles/active-directory/authentication/howto-authentication-methods-activity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ The registration details report shows the following information for each user:
112112
- SSPR Registered (Registered, Not Registered)
113113
- SSPR Enabled (Enabled, Not Enabled)
114114
- SSPR Capable (Capable, Not Capable)
115-
- Methods registered (Email, Mobile Phone, Alternative Mobile Phone, Office Phone, Microsoft Authenticator Push, Software One Time Passcode, FIDO2, Security Key, Security questions, Hardware OATH token)
115+
- Methods registered (Alternate Mobile Phone, Email, FIDO2 Security Key, Hardware OATH token, Microsoft Authenticator app, Microsoft Passwordless phone sign-in, Mobile Phone, Office Phone, Security questions, Software OATH token, Temporary Access Pass, Windows Hello for Business)
116116

117117
![Screenshot of user registration details](media/how-to-authentication-methods-usage-insights/registration-details.png)
118118

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,9 @@ To enable combined registration, complete these steps:
3636

3737
![Enable the combined security info experience for users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info.png)
3838

39+
> [!IMPORTANT]
40+
> If your Azure tenant has already been enabled for combined registration, you might not see the configuration option for **Users can use the combined security information registration experience** or even see it grayed out.
41+
3942
> [!NOTE]
4043
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Azure AD Multi-Factor Authentication and SSPR, if those methods are enabled in the Azure AD Multi-Factor Authentication and SSPR policies.
4144
>

articles/active-directory/develop/msal-js-pass-custom-state-authentication-request.md

Lines changed: 9 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -20,58 +20,23 @@ ms.custom: aaddev
2020

2121
The *state* parameter, as defined by OAuth 2.0, is included in an authentication request and is also returned in the token response to prevent cross-site request forgery attacks. By default, the Microsoft Authentication Library for JavaScript (MSAL.js) passes a randomly generated unique *state* parameter value in the authentication requests.
2222

23-
The state parameter can also be used to encode information of the app's state before redirect. You can pass the user's state in the app, such as the page or view they were on, as input to this parameter. The MSAL.js library allows you to pass your custom state as state parameter in the `Request` object:
23+
The state parameter can also be used to encode information of the app's state before redirect. You can pass the user's state in the app, such as the page or view they were on, as input to this parameter. The MSAL.js library allows you to pass your custom state as state parameter in the [Request](https://azuread.github.io/microsoft-authentication-library-for-js/ref/modules/_azure_msal_browser.html#redirectrequest) object. For example:
2424

2525
```javascript
26-
// Request type
27-
export type AuthenticationParameters = {
28-
scopes?: Array<string>;
29-
extraScopesToConsent?: Array<string>;
30-
prompt?: string;
31-
extraQueryParameters?: QPDict;
32-
claimsRequest?: string;
33-
authority?: string;
34-
state?: string;
35-
correlationId?: string;
36-
account?: Account;
37-
sid?: string;
38-
loginHint?: string;
39-
forceRefresh?: boolean;
40-
};
41-
```
42-
43-
> [!Note]
44-
> If you would like to skip a cached token and go to the server, please pass in the boolean `forceRefresh` into the AuthenticationParameters object used to make a login/token request.
45-
> `forceRefresh` should not be used by default, because of the performance impact on your application.
46-
> Relying on the cache will give your users a better experience.
47-
> Skipping the cache should only be used in scenarios where you know the currently cached data does not have up-to-date information.
48-
> Such as an Admin tool that adds roles to a user that needs to get a new token with updated roles.
26+
import {PublicClientApplication} from "@azure/msal-browser";
4927

50-
For example:
28+
const myMsalObj = new PublicClientApplication({
29+
clientId: "ENTER_CLIENT_ID_HERE"
30+
});
5131

52-
```javascript
5332
let loginRequest = {
54-
scopes: ["user.read", "user.write"],
33+
scopes: ["user.read"],
5534
state: "page_url"
5635
}
5736

58-
myMSALObj.loginPopup(loginRequest);
37+
myMSALObj.loginRedirect(loginRequest);
5938
```
6039

61-
The passed in state is appended to the unique GUID set by MSAL.js when sending the request. When the response is returned, MSAL.js checks for a state match and then returns the custom passed in state in the `Response` object as `accountState`.
62-
63-
```javascript
64-
export type AuthResponse = {
65-
uniqueId: string;
66-
tenantId: string;
67-
tokenType: string;
68-
idToken: IdToken;
69-
accessToken: string;
70-
scopes: Array<string>;
71-
expiresOn: Date;
72-
account: Account;
73-
accountState: string;
74-
};
75-
```
40+
The passed in state is appended to the unique GUID set by MSAL.js when sending the request. When the response is returned, MSAL.js checks for a state match and then returns the custom passed in state in the [Response](https://azuread.github.io/microsoft-authentication-library-for-js/ref/modules/_azure_msal_common.html#authenticationresult) object as `state`.
7641

77-
To learn more, read about [building a single-page application (SPA)](scenario-spa-overview.md) using MSAL.js.
42+
To learn more, read about [building a single-page application (SPA)](scenario-spa-overview.md) using MSAL.js.

articles/active-directory/develop/workload-identity-federation-create-trust-user-assigned-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ For a workflow triggered by a pull request event, specify an **Entity type** of
137137
138138
Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and **Name** fields:
139139
140-
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
140+
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
141141
- **Service account name** is the name of the Kubernetes service account, which provides an identity for processes that run in a Pod.
142142
- **Namespace** is the service account namespace.
143143
- **Name** is the name of the federated credential, which can't be changed later.

articles/active-directory/develop/workload-identity-federation-create-trust.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,6 @@ To add a federated identity for GitHub actions, follow these steps:
6464

6565
:::image type="content" source="media/workload-identity-federation-create-trust/add-credential.png" alt-text="Screenshot of the Add a credential window, showing sample values." :::
6666

67-
6867
Use the following values from your Azure AD application registration for your GitHub workflow:
6968

7069
- `AZURE_CLIENT_ID` the **Application (client) ID**
@@ -146,7 +145,7 @@ Select the **Kubernetes accessing Azure resources** scenario from the dropdown m
146145
147146
Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and **Name** fields:
148147
149-
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
148+
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
150149
- **Service account name** is the name of the Kubernetes service account, which provides an identity for processes that run in a Pod.
151150
- **Namespace** is the service account namespace.
152151
- **Name** is the name of the federated credential, which can't be changed later.
@@ -220,7 +219,7 @@ az ad app federated-credential create --id f6475511-fd81-4965-a00e-41e7792b7b9c
220219

221220
### Kubernetes example
222221

223-
*issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
222+
*issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
224223

225224
*subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
226225

@@ -309,6 +308,7 @@ az ad app federated-credential delete --id f6475511-fd81-4965-a00e-41e7792b7b9c
309308
::: zone pivot="identity-wif-apps-methods-powershell"
310309

311310
## Prerequisites
311+
312312
- To run the example scripts, you have two options:
313313
- Use [Azure Cloud Shell](../../cloud-shell/overview.md), which you can open by using the **Try It** button in the upper-right corner of code blocks.
314314
- Run scripts locally with Azure PowerShell, as described in the next section.
@@ -364,7 +364,7 @@ New-AzADAppFederatedCredential -ApplicationObjectId $appObjectId -Audience api:/
364364
### Kubernetes example
365365

366366
- *ApplicationObjectId*: the object ID of the app (not the application (client) ID) you previously registered in Azure AD.
367-
- *Issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
367+
- *Issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
368368
- *Subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
369369
- *Name* is the name of the federated credential, which can't be changed later.
370370
- *Audience* lists the audiences that can appear in the `aud` claim of the external token.
@@ -464,7 +464,7 @@ And you get the response:
464464

465465
Run the following method to configure a federated identity credential on an app and create a trust relationship with a Kubernetes service account. Specify the following parameters:
466466

467-
- *issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
467+
- *issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
468468
- *subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
469469
- *name* is the name of the federated credential, which can't be changed later.
470470
- *audiences* lists the audiences that can appear in the external token. This field is mandatory. The recommended value is "api://AzureADTokenExchange".

0 commit comments

Comments
 (0)