You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/troubleshoot.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -134,7 +134,7 @@ If one or more users in your Azure AD tenant can't sign in to the Azure AD DS ma
134
134
* You've deployed, or updated to, the [latest recommended release of Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
135
135
* You've configured Azure AD Connect to [perform a full synchronization][hybrid-phs].
136
136
* Depending on the size of your directory, it may take a while for user accounts and credential hashes to be available in Azure AD DS. Make sure you wait long enough before trying to authenticate against the managed domain.
137
-
* If the issue persists after verifying the previous steps, try restarting the *Microsoft Azure AD Sync Service*. From your [management VM][management-vm], open a command prompt and run the following commands:
137
+
* If the issue persists after verifying the previous steps, try restarting the *Microsoft Azure AD Sync Service*. From your Azure AD Connect server, open a command prompt and run the following commands:
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-grant.md
+2-35Lines changed: 2 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,35 +64,7 @@ Organizations can choose to use the device identity as part of their Conditional
64
64
65
65
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile-device management (MDM) solution.
66
66
67
-
This setting applies to the following client apps:
68
-
69
-
- Microsoft Azure Information Protection
70
-
- Microsoft Bookings
71
-
- Microsoft Cortana
72
-
- Microsoft Dynamics 365
73
-
- Microsoft Edge
74
-
- Microsoft Excel
75
-
- Microsoft Flow
76
-
- Microsoft Intune Managed Browser
77
-
- Microsoft Invoicing
78
-
- Microsoft Kaizala
79
-
- Microsoft Launcher
80
-
- Microsoft OneDrive
81
-
- Microsoft OneNote
82
-
- Microsoft Outlook
83
-
- Microsoft Planner
84
-
- Microsoft PowerApps
85
-
- Microsoft Power BI
86
-
- Microsoft PowerPoint
87
-
- Microsoft SharePoint
88
-
- Microsoft Skype for Business
89
-
- Microsoft StaffHub
90
-
- Microsoft Stream
91
-
- Microsoft Teams
92
-
- Microsoft To-Do
93
-
- Microsoft Visio
94
-
- Microsoft Word
95
-
- Microsoft Yammer
67
+
Supported applications can be found in the article, [Microsoft Intune protected apps](/intune/apps/apps-supported-intune-apps).
96
68
97
69
**Remarks**
98
70
@@ -105,12 +77,7 @@ This setting applies to the following client apps:
105
77
106
78
In your Conditional Access policy, you can require an [Intune app protection policy](/intune/app-protection-policy) be present on the client app before access is available to the selected cloud apps.
107
79
108
-
This setting applies to the following client apps:
109
-
110
-
- Microsoft Cortana
111
-
- Microsoft OneDrive
112
-
- Microsoft Outlook
113
-
- Microsoft Planner
80
+
Supported applications can be found in the article, [Microsoft Intune protected apps](/intune/apps/apps-supported-intune-apps).
In this quickstart, you'll learn how to integrate a Java web application with the Microsoft identity platform. Your app will sign in a user, get an access token to call the Microsoft Graph API, and make a request to the Microsoft Graph API.
20
20
21
-
When you've completed this quickstart, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory.
22
-
23
-

21
+
When you've completed this quickstart, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory. (See [How the sample works](#how-the-sample-works) for an illustration.)
24
22
25
23
## Prerequisites
26
24
27
25
To run this sample you will need:
28
26
29
27
-[Java Development Kit (JDK)](https://openjdk.java.net/) 8 or greater, and [Maven](https://maven.apache.org/).
30
-
- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [How to get an Azure AD tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/).
31
28
32
29
> [!div renderon="docs"]
33
30
> ## Register and download your quickstart app
@@ -69,7 +66,7 @@ To run this sample you will need:
69
66
>
70
67
> For the code sample for this quickstart to work, you need to:
71
68
>
72
-
> 1. Add reply URLs as `https://localhost:8080/msal4jsamples/secure/aad` and `https://localhost:8080/msal4jsamples/graph/me`.
69
+
> 1. Add reply URLs as `https://localhost:8080/msal4jsample/secure/aad` and `https://localhost:8080/msal4jsample/graph/me`.
@@ -78,46 +75,65 @@ To run this sample you will need:
78
75
> >  Your application is configured with these attributes.
79
76
80
77
#### Step 2: Download the code sample
78
+
> [!div renderon="docs"]
79
+
> [Download the Code Sample](https://github.com/Azure-Samples/ms-identity-java-webapp/archive/master.zip)
81
80
82
-
[Download the Code Sample](https://github.com/Azure-Samples/ms-identity-java-webapp/archive/master.zip)
83
-
84
-
#### Step 3: Configure the code sample
85
-
86
-
1. Extract the zip file to a local folder.
87
-
1. If you use an integrated development environment, open the sample in your favorite IDE (optional).
88
-
1. Open the application.properties file, which can be found in src/main/resources/ folder and replace the value of the fields *aad.clientId*, *aad.authority* and *aad.secretKey* with the respective values of **Application Id**, **Tenant Id** and **Client Secret** as the following:
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
103
-
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
104
-
> - `Enter_the_Tenant_Info_Here` - is the **Directory (tenant) ID** value of the application you registered.
105
-
106
-
1. To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
> Download the project and extract the zip file to a local folder closer to the root folder - for example, **C:\Azure-Samples**
83
+
>
84
+
> To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
> 1. If you use an integrated development environment, open the sample in your favorite IDE (optional).
104
+
> 1. Open the application.properties file, which can be found in src/main/resources/ folder and replace the value of the fields *aad.clientId*, *aad.authority* and *aad.secretKey* with the respective values of **Application Id**, **Tenant Id** and **Client Secret** as the following:
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
117
+
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
118
+
> - `Enter_the_Tenant_Info_Here` - is the **Directory (tenant) ID** value of the application you registered.
119
+
> 1. To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
> Put the generated keystore file in the "resources" folder.
117
131
118
-
Put the generated keystore file in the "resources" folder.
119
132
120
-
#### Step 4: Run the code sample
133
+
> [!div class="sxs-lookup" renderon="portal"]
134
+
> #### Step 3: Run the code sample
135
+
> [!div renderon="docs"]
136
+
> #### Step 4: Run the code sample
121
137
122
138
To run the project, you can either:
123
139
@@ -133,11 +149,16 @@ If you are running the web application from an IDE, click on run, then navigate
133
149
- *Sign Out*: Signs the current user out of the application and redirects them to the home page.
134
150
- *Show User Info*: Acquires a token for Microsoft Graph and calls Microsoft Graph with a request containing the token, which returns basic information about the signed-in user.
135
151
152
+
153
+
136
154
> [!IMPORTANT]
137
155
> This quickstart application uses a client secret to identify itself as confidential client. Because the client secret is added as a plain-text to your project files, for security reasons it is recommended that you use a certificate instead of a client secret before considering the application as production application. For more information on how to use a certificate, see [Certificate credentials for application authentication](https://docs.microsoft.com/azure/active-directory/develop/active-directory-certificate-credentials).
138
156
139
157
## More information
140
158
159
+
### How the sample works
160
+

161
+
141
162
### Getting MSAL
142
163
143
164
MSAL for Java (MSAL4J) is the Java library used to sign in users and request tokens used to access an API protected by the Microsoft identity Platform.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v2-javascript.md
+38-33Lines changed: 38 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,9 +25,10 @@ In this quickstart, you use a code sample to learn how a JavaScript single-page
25
25
## Prerequisites
26
26
27
27
* Azure subscription - [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
28
-
*[Node.js](https://nodejs.org/en/download/).
28
+
*[Node.js](https://nodejs.org/en/download/)
29
29
*[Visual Studio Code](https://code.visualstudio.com/download) (to edit project files)
30
30
31
+
31
32
> [!div renderon="docs"]
32
33
> ## Register and download your quickstart application
33
34
> To start your quickstart application, use either of the following options.
@@ -70,38 +71,39 @@ In this quickstart, you use a code sample to learn how a JavaScript single-page
70
71
71
72
#### Step 2: Download the project
72
73
73
-
Select the option that's suitable to your development environment:
74
+
> [!div renderon="docs"]
75
+
> To run the project with a web server by using Node.js, [download the core project files](https://github.com/Azure-Samples/active-directory-javascript-graphapi-v2/archive/quickstart.zip).
74
76
75
-
* To run the project with a web server by using Node.js, [download the core project files](https://github.com/Azure-Samples/active-directory-javascript-graphapi-v2/archive/quickstart.zip). To open the files, use an editor such as [Visual Studio Code](https://code.visualstudio.com/).
77
+
> [!div renderon="portal"]
78
+
> Run the project with a web server by using Node.js
cacheLocation:"sessionStorage", // This configures where your cache will be stored
96
-
storeAuthStateInCookie:false, // Set this to "true" if you are having issues on IE11 or Edge
97
-
forceRefresh:false// Set this to "true" to skip a cached token and go to the server to get a new
98
-
}
99
-
};
100
-
101
-
```
102
104
> [!div renderon="portal"]
103
105
> > [!NOTE]
104
-
> > This quickstart supports Enter_the_Supported_Account_Info_Here.
106
+
> > Enter_the_Supported_Account_Info_Here
105
107
106
108
> [!div renderon="docs"]
107
109
>
@@ -116,19 +118,22 @@ Select the option that's suitable to your development environment:
116
118
> > [!TIP]
117
119
> > To find the values of **Application (client) ID**, **Directory (tenant) ID**, and **Supported account types**, go to the app's **Overview** page in the Azure portal.
118
120
>
121
+
> [!div class="sxs-lookup" renderon="portal"]
122
+
> #### Step 3: Your app is configured and ready to run
123
+
> We have configured your project with values of your app's properties.
119
124
120
-
#### Step 4: Run the project
125
+
> [!div renderon="docs"]
126
+
> #### Step 4: Run the project
121
127
122
-
If you're using [Node.js](https://nodejs.org/en/download/):
128
+
Run the project with a web server by using [Node.js](https://nodejs.org/en/download/):
123
129
124
130
1. To start the server, run the following command from the project directory:
125
-
126
-
```batch
127
-
npm install
128
-
npm start
129
-
```
130
-
131
+
```batch
132
+
npm install
133
+
npm start
134
+
```
131
135
1. Open a web browser and go to `http://localhost:3000/`.
136
+
132
137
1. Select **Sign In** to start the sign-in, and then call Microsoft Graph API.
133
138
134
139
After the browser loads the application, select **Sign In**. The first time that you sign in, you're prompted to provide your consent to allow the application to access your profile and to sign you in. After you're signed in successfully, your user profile information should be displayed on the page.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/reference-connect-accounts-permissions.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,11 +50,10 @@ In addition to these three accounts used to run Azure AD Connect, you will also
50
50
> [!NOTE]
51
51
> It is supported to manage the administrative accounts used in Azure AD Connect from an ESAE Administrative Forest (also know as "Red forest").
52
52
> Dedicated administrative forests allow organizations to host administrative accounts, workstations, and groups in an environment that has stronger security controls than the production environment.
53
-
> To learn more about dedicated administrative forests please refer to [ESAE Administrative Forest Design Approach](https://docs.microsoft.com/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material#esae-administrative-forest-design-approach)
54
-
>>>>>>> e683a61b0ed62ae739941410f658a127534e2481
53
+
> To learn more about dedicated administrative forests please refer to [ESAE Administrative Forest Design Approach](https://docs.microsoft.com/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material#esae-administrative-forest-design-approach).
55
54
56
55
> [!NOTE]
57
-
> The Global Administrator role is not required after the initial setup and the only required account will be the **Directory Synchronization Accounts** role account. That does not necssarily mean that you will want to just remove the account with the Global Administrator role. It is better to change the role to a less powerful role, as totally removing the account may introduce issues if you ever need to re-run the wizard again. By reducing the privilege of the role you can always re-elevate the priviliges if you have to utilize the Azure AD Connect wizard again.
56
+
> The Global Administrator role is not required after the initial setup and the only required account will be the **Directory Synchronization Accounts** role account. That does not necessarily mean that you will want to just remove the account with the Global Administrator role. It is better to change the role to a less powerful role, as totally removing the account may introduce issues if you ever need to re-run the wizard again. By reducing the privilege of the role you can always re-elevate the privileges if you have to utilize the Azure AD Connect wizard again.
58
57
59
58
## Installing Azure AD Connect
60
59
The Azure AD Connect installation wizard offers two different paths:
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-proxy-configure-custom-domain.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -127,9 +127,9 @@ There's no restriction on the certificate signature methods. Elliptic Curve Cryp
127
127
128
128
You can use wildcard certificates as long as the wildcard matches the external URL. You must use wildcard certificates for [wildcard applications](application-proxy-wildcard.md). If you want to use the certificate to also access subdomains, you must add the subdomain wildcards as subject alternative names in the same certificate. For example, a certificate for *\*.adventure-works.com* won't work for *\*.apps.adventure-works.com* unless you add *\*.apps.adventure-works.com* as a subject alternative name.
129
129
130
-
You can use certificates issued by your own public key infrastructure (PKI) if the certificate chain is installed on your client devices. Intune can deploy these certificates to managed devices. For non-managed devices, you must manually install these certificates.
130
+
You can use certificates issued by your own public key infrastructure (PKI) if the certificate chain is installed on your client devices. Intune can deploy these certificates to managed devices. For non-managed devices, you must manually install these certificates.
131
131
132
-
It's not a good idea to use a private root CA. The private root CA would also need to be pushed to client machines, which introduces many challenges.
132
+
We do not recommend using a private root CA since the private root CA would also need to be pushed to client machines, which may introduce many challenges.
0 commit comments