Skip to content

Commit 367ccf3

Browse files
committed
fixing merge conflict
2 parents b449c2c + 3849351 commit 367ccf3

File tree

273 files changed

+2886
-944
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

273 files changed

+2886
-944
lines changed

articles/active-directory/b2b/customize-invitation-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ In this mode, whoever is using the API needs to have the permissions to be creat
7373
### App only mode
7474
In app only context, the app needs the User.Invite.All scope for the invitation to succeed.
7575
76-
For more information, refer to: https://graph.microsoft.io/docs/authorization/permission_scopes
76+
For more information, refer to: https://developer.microsoft.com/graph/docs/authorization/permission_scopes
7777
7878
7979
## PowerShell

articles/active-directory/develop/active-directory-graph-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.custom: aaddev
2222
# Azure Active Directory Graph API
2323

2424
> [!IMPORTANT]
25-
> We strongly recommend that you use [Microsoft Graph](https://graph.microsoft.io/) instead of Azure AD Graph API to access Azure Active Directory resources. Our development efforts are now concentrated on Microsoft Graph and no further enhancements are planned for Azure AD Graph API. There are a very limited number of scenarios for which Azure AD Graph API might still be appropriate; for more information, see the [Microsoft Graph or the Azure AD Graph](https://dev.office.com/blogs/microsoft-graph-or-azure-ad-graph) blog post in the Office Dev Center.
25+
> We strongly recommend that you use [Microsoft Graph](https://developer.microsoft.com/graph/) instead of Azure AD Graph API to access Azure Active Directory resources. Our development efforts are now concentrated on Microsoft Graph and no further enhancements are planned for Azure AD Graph API. There are a very limited number of scenarios for which Azure AD Graph API might still be appropriate; for more information, see the [Microsoft Graph or the Azure AD Graph](https://dev.office.com/blogs/microsoft-graph-or-azure-ad-graph) blog post in the Office Dev Center.
2626
2727
This article applies to Azure AD Graph API. For similar info related to Microsoft Graph API, see [Use the Microsoft Graph API](https://developer.microsoft.com/en-us/graph/docs/concepts/use_the_api).
2828

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 10/05/2018
16+
ms.date: 11/08/2018
1717
ms.author: celested
1818
ms.reviewer: paulgarn, hirsin
1919
ms.custom: aaddev
@@ -38,7 +38,7 @@ One of the goals of the [v2.0 Azure AD endpoint](active-directory-appmodel-v2-ov
3838
| Account Type | V1.0 Endpoint | V2.0 Endpoint |
3939
|--------------|---------------|----------------|
4040
| Personal Microsoft account | N/A - RPS Tickets are used instead | Support coming |
41-
| Azure AD account | Supported | Supported with caveats |
41+
| Azure AD account | Supported | Supported with caveats |
4242

4343
> [!IMPORTANT]
4444
> Apps that support both personal accounts and Azure AD (registered through the [app registration portal](https://apps.dev.microsoft.com)) cannot use optional claims. However, apps registered for just Azure AD using the v2.0 endpoint can get the optional claims they requested in the manifest. In the Azure portal, you can use the application manifest editor in the existing **App registrations** experience to edit your optional claims. However, this functionality is not yet available using the application manifest editor in the new **App registrations (Preview)** experience.
@@ -56,8 +56,6 @@ The set of optional claims available by default for applications to use are list
5656
|-----------------------------|----------------|------------|-----------|--------|
5757
| `auth_time` | Time when the user last authenticated. See OpenID Connect spec.| JWT | | |
5858
| `tenant_region_scope` | Region of the resource tenant | JWT | | |
59-
| `signin_state` | Sign in state claim | JWT | | 6 return values, as flags:<br> "dvc_mngd": Device is managed<br> "dvc_cmp": Device is compliant<br> "dvc_dmjd": Device is domain joined<br> "dvc_mngd_app": Device is managed via MDM<br> "inknownntwk": Device is inside a known network.<br> "kmsi": Keep Me Signed In was used. <br> |
60-
| `controls` | Multivalue claim containing the session controls enforced by Conditional Access policies. | JWT | | 3 values:<br> "app_res": The app needs to enforce more granular restrictions. <br> "ca_enf": Conditional Access enforcement was deferred and is still required. <br> "no_cookie": This token is insufficient to exchange for a cookie in the browser. <br> |
6159
| `home_oid` | For guest users, the object ID of the user in the user’s home tenant.| JWT | | |
6260
| `sid` | Session ID, used for per-session user signout. | JWT | | |
6361
| `platf` | Device platform | JWT | | Restricted to managed devices that can verify device type.|
@@ -72,6 +70,7 @@ The set of optional claims available by default for applications to use are list
7270
| `xms_pl` | User preferred language | JWT ||The user’s preferred language, if set. Sourced from their home tenant, in guest access scenarios. Formatted LL-CC (“en-us”). |
7371
| `xms_tpl` | Tenant preferred language| JWT | | The resource tenant’s preferred language, if set. Formatted LL (“en”). |
7472
| `ztdid` | Zero-touch Deployment ID | JWT | | The device identity used for [Windows AutoPilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot) |
73+
|`email` | The addressable email for this user, if the user has one. | JWT, SAML | | This value is included by default if the user is a guest in the tenant. For managed users (those inside the tenant), it must be requested through this optional claim or, on v2.0 only, with the OpenID scope. For managed users, the email address must be set in the [Office admin portal](https://portal.office.com/adminportal/home#/users).|
7574
| `acct` | Users account status in tenant. | JWT, SAML | | If the user is a member of the tenant, the value is `0`. If they are a guest, the value is `1`. |
7675
| `upn` | UserPrincipalName claim. | JWT, SAML | | Although this claim is automatically included, you can specify it as an optional claim to attach additional properties to modify its behavior in the guest user case. <br> Additional properties: <br> `include_externally_authenticated_upn` <br> `include_externally_authenticated_upn_without_hash` |
7776

articles/active-directory/develop/azure-ad-endpoint-comparison.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ When developing a new application, it is important to know the differences betwe
3737

3838
* Both v1.0 and v2.0 endpoints also accept sign-ins of *[guest users](https://docs.microsoft.com/azure/active-directory/b2b/what-is-b2b)* of an Azure AD directory for applications configured as *[single-tenant](single-and-multi-tenant-apps.md)* or for *multi-tenant* applications configured to point to the tenant-specific endpoint (`https://login.microsoftonline.com/{TenantId_or_Name}`).
3939

40-
The v2.0 endpoint allows you to write apps that accept sign-in from both personal and work and school accounts, giving you the ability to write your app completely account-agnostic. For instance, if your app calls the [Microsoft Graph](https://graph.microsoft.io), some additional functionality and data will be available to work accounts, such as their SharePoint sites or Directory data. But for many actions, such as [Reading a user's mail](https://graph.microsoft.io/docs/api-reference/v1.0/resources/message), the same code can access the email for both personal and work and school accounts.
40+
The v2.0 endpoint allows you to write apps that accept sign-in from both personal and work and school accounts, giving you the ability to write your app completely account-agnostic. For instance, if your app calls the [Microsoft Graph](https://developer.microsoft.com/graph), some additional functionality and data will be available to work accounts, such as their SharePoint sites or Directory data. But for many actions, such as [Reading a user's mail](https://developer.microsoft.com/graph/docs/api-reference/v1.0/resources/message), the same code can access the email for both personal and work and school accounts.
4141

4242
For v2.0 endpoint, you can use a single library (MSAL) to gain access to both the consumer, educational and enterprise worlds.
4343

articles/active-directory/develop/consent-framework.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ ms.custom: aaddev
2323

2424
The Azure Active Directory (Azure AD) consent framework makes it easy to develop multi-tenant web and native client applications. These applications allow sign-in by user accounts from an Azure AD tenant that's different from the one where the application is registered. They may also need to access web APIs such as the Microsoft Graph API (to access Azure AD, Intune, and services in Office 365) and other Microsoft services' APIs, in addition to your own web APIs.
2525

26-
The framework is based on a user or an administrator giving consent to an application that asks to be registered in their directory, which may involve accessing directory data. For example, if a web client application needs to read calendar information about the user from Office 365, that user is required to consent to the client application first. After consent is given, the client application will be able to call the Microsoft Graph API on behalf of the user, and use the calendar information as needed. The [Microsoft Graph API](https://graph.microsoft.io) provides access to data in Office 365 (like calendars and messages from Exchange, sites and lists from SharePoint, documents from OneDrive, notebooks from OneNote, tasks from Planner, and workbooks from Excel), as well as users and groups from Azure AD and other data objects from more Microsoft cloud services.
26+
The framework is based on a user or an administrator giving consent to an application that asks to be registered in their directory, which may involve accessing directory data. For example, if a web client application needs to read calendar information about the user from Office 365, that user is required to consent to the client application first. After consent is given, the client application will be able to call the Microsoft Graph API on behalf of the user, and use the calendar information as needed. The [Microsoft Graph API](https://developer.microsoft.com/graph) provides access to data in Office 365 (like calendars and messages from Exchange, sites and lists from SharePoint, documents from OneDrive, notebooks from OneNote, tasks from Planner, and workbooks from Excel), as well as users and groups from Azure AD and other data objects from more Microsoft cloud services.
2727

2828
The consent framework is built on OAuth 2.0 and its various flows, such as authorization code grant and client credentials grant, using public or confidential clients. By using OAuth 2.0, Azure AD makes it possible to build many different types of client applications--such as on a phone, tablet, server, or a web application--and gain access to the required resources.
2929

30-
For more info about using the consent framework with OAuth2.0 authorization grants, see [Authorize access to web applications using OAuth 2.0 and Azure AD](v1-protocols-oauth-code.md) and [Authentication scenarios for Azure AD](authentication-scenarios.md). For info about getting authorized access to Office 365 through Microsoft Graph, see [App authentication with Microsoft Graph](https://graph.microsoft.io/docs/authorization/auth_overview).
30+
For more info about using the consent framework with OAuth2.0 authorization grants, see [Authorize access to web applications using OAuth 2.0 and Azure AD](v1-protocols-oauth-code.md) and [Authentication scenarios for Azure AD](authentication-scenarios.md). For info about getting authorized access to Office 365 through Microsoft Graph, see [App authentication with Microsoft Graph](https://developer.microsoft.com/graph/docs/authorization/auth_overview).
3131

3232
## Consent experience - an example
3333

articles/active-directory/develop/developer-glossary.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ Use the following comments section to provide feedback and help to refine and sh
240240
[AZURE-portal]: https://portal.azure.com
241241
[AAD-RBAC]: ../../role-based-access-control/role-assignments-portal.md
242242
[JWT]: https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32
243-
[Microsoft-Graph]: https://graph.microsoft.io
243+
[Microsoft-Graph]: https://developer.microsoft.com/graph
244244
[O365-Perm-Ref]: https://msdn.microsoft.com/office/office365/howto/application-manifest
245245
[OAuth2-Access-Token-Scopes]: https://tools.ietf.org/html/rfc6749#section-3.3
246246
[OAuth2-AuthZ-Endpoint]: https://tools.ietf.org/html/rfc6749#section-3.1

articles/active-directory/develop/howto-convert-app-to-be-multi-tenant.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Some permissions can be consented to by a regular user, while others require a t
114114

115115
App-only permissions always require a tenant administrator’s consent. If your application requests an app-only permission and a user tries to sign in to the application, an error message is displayed saying the user isn’t able to consent.
116116

117-
Certain delegated permissions also require a tenant administrator’s consent. For example, the ability to write back to Azure AD as the signed in user requires a tenant administrator’s consent. Like app-only permissions, if an ordinary user tries to sign in to an application that requests a delegated permission that requires administrator consent, your application receives an error. Whether a permission requires admin consent is determined by the developer that published the resource, and can be found in the documentation for the resource. The permissions documentation for the [Azure AD Graph API][AAD-Graph-Perm-Scopes] and [Microsoft Graph API][MSFT-Graph-permision-scopes] indicate which permissions require admin consent.
117+
Certain delegated permissions also require a tenant administrator’s consent. For example, the ability to write back to Azure AD as the signed in user requires a tenant administrator’s consent. Like app-only permissions, if an ordinary user tries to sign in to an application that requests a delegated permission that requires administrator consent, your application receives an error. Whether a permission requires admin consent is determined by the developer that published the resource, and can be found in the documentation for the resource. The permissions documentation for the [Azure AD Graph API][AAD-Graph-Perm-Scopes] and [Microsoft Graph API][MSFT-Graph-permission-scopes] indicate which permissions require admin consent.
118118

119119
If your application uses permissions that require admin consent, you need to have a gesture such as a button or link where the admin can initiate the action. The request your application sends for this action is the usual OAuth2/OpenID Connect authorization request that also includes the `prompt=admin_consent` query string parameter. Once the admin has consented and the service principal is created in the customer’s tenant, subsequent sign-in requests do not need the `prompt=admin_consent` parameter. Since the administrator has decided the requested permissions are acceptable, no other users in the tenant are prompted for consent from that point forward.
120120

@@ -180,7 +180,7 @@ In this article, you learned how to build an application that can sign in a user
180180
* [Application objects and service principal objects][AAD-App-SP-Objects]
181181
* [Integrating applications with Azure Active Directory][AAD-Integrating-Apps]
182182
* [Overview of the Consent Framework][AAD-Consent-Overview]
183-
* [Microsoft Graph API permission scopes][MSFT-Graph-permision-scopes]
183+
* [Microsoft Graph API permission scopes][MSFT-Graph-permission-scopes]
184184
* [Azure AD Graph API permission scopes][AAD-Graph-Perm-Scopes]
185185

186186
<!--Reference style links IN USE -->
@@ -197,8 +197,8 @@ In this article, you learned how to build an application that can sign in a user
197197
[AAD-Samples-MT]: https://azure.microsoft.com/documentation/samples/?service=active-directory&term=multitenant
198198
[AAD-Why-To-Integrate]: ./active-directory-how-to-integrate.md
199199
[AZURE-portal]: https://portal.azure.com
200-
[MSFT-Graph-overview]: https://graph.microsoft.io/en-us/docs/overview/overview
201-
[MSFT-Graph-permision-scopes]: https://developer.microsoft.com/en-us/graph/docs/concepts/permissions_reference
200+
[MSFT-Graph-overview]: https://developer.microsoft.com/graph/docs/overview/overview
201+
[MSFT-Graph-permission-scopes]: https://developer.microsoft.com/graph/docs/concepts/permissions_reference
202202

203203
<!--Image references-->
204204
[AAD-Sign-In]: ./media/active-directory-devhowto-multi-tenant-overview/sign-in-with-microsoft-light.png

articles/active-directory/develop/quickstart-register-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.reviewer: lenalepa, sureshja
2424

2525
Enterprise developers and software-as-a-service (SaaS) providers can develop commercial cloud services or line-of-business applications that can be integrated with Microsoft identity platform to provide secure sign-in and authorization for their services.
2626

27-
This quickstart shows you how to add and register an application using the **App registrations (Preview)** experience in the Azure portal so that your app can be integrated with the Microsoft identity platform.
27+
This quickstart shows you how to add and register an application using the **App registrations (Preview)** experience in the Azure portal so that your app can be integrated with the Microsoft identity platform. To learn more about the new features and improvements in the new app registrations experience, see [this blog post](https://developer.microsoft.com/graph/blogs/new-app-registration/).
2828

2929
## Prerequisite
3030

articles/active-directory/develop/quickstart-v1-android.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ ms.custom: aaddev
2828
If you're developing an Android application, Microsoft makes it simple and straightforward to sign in Azure Active Directory (Azure AD) users. Azure AD enables your application to access user data through the Microsoft Graph or your own protected web API.
2929

3030
The Azure AD Authentication Library (ADAL) Android library gives your app the ability to begin using the
31-
[Microsoft Azure Cloud](https://cloud.microsoft.com) & [Microsoft Graph API](https://graph.microsoft.io) by supporting [Microsoft Azure Active Directory accounts](https://azure.microsoft.com/services/active-directory/) using industry standard OAuth 2.0 and OpenID Connect.
31+
[Microsoft Azure Cloud](https://cloud.microsoft.com) & [Microsoft Graph API](https://developer.microsoft.com/graph) by supporting [Microsoft Azure Active Directory accounts](https://azure.microsoft.com/services/active-directory/) using industry standard OAuth 2.0 and OpenID Connect.
3232

3333
In this quickstart, you'll learn how to:
3434

0 commit comments

Comments
 (0)