Skip to content

Commit 3bad5de

Browse files
authored
Merge pull request #208570 from MicrosoftDocs/main
8/19 PM Publishing
2 parents cc6be98 + 65cb3e5 commit 3bad5de

File tree

286 files changed

+4033
-1296
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

286 files changed

+4033
-1296
lines changed

articles/active-directory/develop/active-directory-schema-extensions.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,11 @@ For example, here is a claims-mapping policy to emit a single claim from a direc
5959

6060
Where *xxxxxxx* is the appID (or Client ID) of the application that the extension was registered with.
6161

62+
> [!WARNING]
63+
> When you define a claims mapping policy for a directory extension attribute, use the `ExtensionID` property instead of the `ID` property within the body of the `ClaimsSchema` array, as shown in the example above.
64+
6265
> [!TIP]
6366
> Case consistency is important when setting directory extension attributes on objects. Extension attribute names aren't cases sensitive when being set up, but they are case sensitive when being read from the directory by the token service. If an extension attribute is set on a user object with the name "LegacyId" and on another user object with the name "legacyid", when the attribute is mapped to a claim using the name "LegacyId" the data will be successfully retrieved and the claim included in the token for the first user but not the second.
64-
>
65-
> The "Id" parameter in the claims schema used for built-in directory attributes is "ExtensionID" for directory extension attributes.
6667
6768
## Next steps
6869
- Learn how to [add custom or additional claims to the SAML 2.0 and JSON Web Tokens (JWT) tokens](active-directory-optional-claims.md).

articles/active-directory/develop/reply-url.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,8 @@ This table shows the maximum number of redirect URIs you can add to an app regis
4545
| Microsoft work or school accounts in any organization's Azure Active Directory (Azure AD) tenant | 256 | `signInAudience` field in the application manifest is set to either *AzureADMyOrg* or *AzureADMultipleOrgs* |
4646
| Personal Microsoft accounts and work and school accounts | 100 | `signInAudience` field in the application manifest is set to *AzureADandPersonalMicrosoftAccount* |
4747

48+
The maximum number of redirect URIS can't be raised for [security reasons](#restrictions-on-wildcards-in-redirect-uris). If your scenario requires more redirect URIs than the maximum limit allowed, consider the following [state parameter approach](#use-a-state-parameter) as the solution.
49+
4850
## Maximum URI length
4951

5052
You can use a maximum of 256 characters for each redirect URI you add to an app registration.

articles/active-directory/fundamentals/auth-header-based.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"

articles/active-directory/fundamentals/auth-kcd.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"
@@ -50,4 +50,4 @@ There is a need to provide remote access, protect with pre-authentication, and p
5050

5151
* [Kerberos Constrained Delegation for single sign-on to your apps with Application Proxy](../app-proxy/application-proxy-configure-single-sign-on-with-kcd.md)
5252

53-
* [Add an on-premises application for remote access through Application Proxy in Azure Active Directory](../app-proxy/application-proxy-add-on-premises-application.md)
53+
* [Add an on-premises application for remote access through Application Proxy in Azure Active Directory](../app-proxy/application-proxy-add-on-premises-application.md)

articles/active-directory/fundamentals/auth-ldap.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"

articles/active-directory/fundamentals/auth-oauth2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"

articles/active-directory/fundamentals/auth-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"

articles/active-directory/fundamentals/auth-password-based-sso.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"
@@ -45,4 +45,4 @@ You need to protect with pre-authentication and provide SSO through password vau
4545

4646
* [Configure password based SSO for cloud applications ](../manage-apps/configure-password-single-sign-on-non-gallery-applications.md)
4747

48-
* [Configure password-based SSO for on-premises applications with Application Proxy](../app-proxy/application-proxy-configure-single-sign-on-password-vaulting.md)
48+
* [Configure password-based SSO for on-premises applications with Application Proxy](../app-proxy/application-proxy-configure-single-sign-on-password-vaulting.md)

articles/active-directory/fundamentals/auth-radius.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"

articles/active-directory/fundamentals/auth-remote-desktop-gateway.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"
@@ -42,4 +42,4 @@ You need to provide remote access and protect your Remote Desktop Services deplo
4242

4343
* [Publish remote desktop with Azure AD Application Proxy](../app-proxy/application-proxy-integrate-with-remote-desktop-services.md)
4444

45-
* [Add an on-premises application for remote access through Application Proxy in Azure AD](../app-proxy/application-proxy-add-on-premises-application.md)
45+
* [Add an on-premises application for remote access through Application Proxy in Azure AD](../app-proxy/application-proxy-add-on-premises-application.md)

0 commit comments

Comments
 (0)