You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> | microsoft.directory/applicationPolicies/owners/read | Read owners on application policies |
177
177
> | microsoft.directory/applicationPolicies/owners/update | Update the owner property of application policies |
178
178
> | microsoft.directory/applicationPolicies/policyAppliedTo/read | Read application policies applied to objects list |
179
179
> | microsoft.directory/applicationPolicies/standard/read | Read standard properties of application policies |
180
180
> | microsoft.directory/servicePrincipals/allProperties/allTasks | Create and delete servicePrincipals, and read and update all properties in Azure Active Directory |
181
-
> | microsoft.directory/servicePrincipals/allProperties/read | Read all properties on servicePrincipals |
182
-
> | microsoft.directory/servicePrincipals/allProperties/update | Update all properties on servicePrincipals |
181
+
> | microsoft.directory/servicePrincipals/allProperties/read | Read all properties (including privileged properties) on servicePrincipals |
182
+
> | microsoft.directory/servicePrincipals/allProperties/update | Update all properties (including privileged properties) on servicePrincipals |
183
183
> | microsoft.directory/servicePrincipals/appRoleAssignedTo/read | Read service principal role assignments |
184
184
> | microsoft.directory/servicePrincipals/appRoleAssignedTo/update | Update service principal role assignments |
185
185
> | microsoft.directory/servicePrincipals/appRoleAssignments/read | Read role assignments assigned to service principals |
186
186
> | microsoft.directory/servicePrincipals/audience/update | Update audience properties on service principals |
187
187
> | microsoft.directory/servicePrincipals/authentication/update | Update authentication properties on service principals |
188
188
> | microsoft.directory/servicePrincipals/basic/update | Update basic properties on service principals |
189
189
> | microsoft.directory/servicePrincipals/create | Create service principals |
190
-
> | microsoft.directory/servicePrincipals/createAsOwner | Create service principals. Creator is added as the first owner |
191
-
> | microsoft.directory/servicePrincipals/credentials/update | Update credentials properties on service principals |
190
+
> | microsoft.directory/servicePrincipals/createAsOwner | Create service principals, with creator as the first owner |
191
+
> | microsoft.directory/servicePrincipals/credentials/update | Update credentials of service principals |
192
192
> | microsoft.directory/servicePrincipals/delete | Delete service principals |
193
193
> | microsoft.directory/servicePrincipals/disable | Disable service principals |
194
194
> | microsoft.directory/servicePrincipals/enable | Enable service principals |
195
195
> | microsoft.directory/servicePrincipals/getPasswordSingleSignOnCredentials | Read password single sign-on credentials on service principals |
196
196
> | microsoft.directory/servicePrincipals/managePasswordSingleSignOnCredentials | Manage password single sign-on credentials on service principals |
197
197
> | microsoft.directory/servicePrincipals/oAuth2PermissionGrants/read | Read delegated permission grants on service principals |
198
-
> | microsoft.directory/servicePrincipals/owners/read | Read owners on service principals |
199
-
> | microsoft.directory/servicePrincipals/owners/update | Update owners on service principals |
198
+
> | microsoft.directory/servicePrincipals/owners/read | Read owners of service principals |
199
+
> | microsoft.directory/servicePrincipals/owners/update | Update owners of service principals |
200
200
> | microsoft.directory/servicePrincipals/permissions/update | Update permissions of service principals |
201
-
> | microsoft.directory/servicePrincipals/policies/read | Read policies on service principals |
202
-
> | microsoft.directory/servicePrincipals/policies/update | Update policies on service principals |
203
-
> | microsoft.directory/servicePrincipals/standard/read | Read standard properties of service principals |
201
+
> | microsoft.directory/servicePrincipals/policies/read | Read policies of service principals |
202
+
> | microsoft.directory/servicePrincipals/policies/update | Update policies of service principals |
203
+
> | microsoft.directory/servicePrincipals/standard/read | Read basic properties of service principals |
204
204
> | microsoft.directory/servicePrincipals/synchronization/standard/read | Read provisioning settings associated with your service principal |
205
-
> | microsoft.directory/servicePrincipals/tag/update | Update tags property on service principals |
205
+
> | microsoft.directory/servicePrincipals/tag/update | Update the tag property for service principals |
> | microsoft.directory/applications/applicationProxy/read | Read all application proxy properties of all types of applications |
210
-
> | microsoft.directory/applications/applicationProxy/update | Update all application proxy properties of all types of applications |
211
-
> | microsoft.directory/applications/applicationProxyAuthentication/update | Update application proxy authentication properties of all types of applications |
212
-
> | microsoft.directory/applications/applicationProxyUrlSettings/update | Update application proxy internal and external URLs of all types of applications|
213
-
> | microsoft.directory/applications/applicationProxySslCertificate/update | Update application proxy custom domains of all types of applications|
207
+
> | microsoft.directory/auditLogs/allProperties/read | Read all properties on audit logs, including privileged properties|
208
+
> | microsoft.directory/signInReports/allProperties/read | Read all properties on sign-in reports, including privileged properties|
209
+
> | microsoft.directory/applications/applicationProxy/read | Read all application proxy properties |
210
+
> | microsoft.directory/applications/applicationProxy/update | Update all application proxy properties |
211
+
> | microsoft.directory/applications/applicationProxyAuthentication/update | Update authentication on all types of applications |
212
+
> | microsoft.directory/applications/applicationProxyUrlSettings/update | Update URL settings for application proxy|
|| JIRA SAML SSO add-on redirects to incorrect URL from mobile browser. | 7.0.0 to 9.5.0 |
132
+
|| The mark log section after enabling the JIRA plugin. ||
133
+
|| The last login date for a user doesn't update when user signs in via SSO ||
134
+
||||
135
+
| 1.0.19 | New Feature: | Jira Core and Software: |
136
+
|| Application Proxy Support - Checkbox on the configure plugin screen to toggle the App Proxy mode so as to make the Reply URL editable as per the need to point the App Proxy mode so as to make the Reply URL editable as per the need to point it to the proxy server URL | 6.0 to 9.3.1 |
137
+
||| Jira Service Desk: 3.0.0 to 4.22.1 |
138
+
||||
139
+
| 1.0.18 | Bug Fixes: | Jira Core and Software: |
140
+
|| Bug fix for the 405 error upon clicking on the Configure button of the Jira Azure AD SSO Plugin.| 6.0 to 9.1.0. |
141
+
|| JIRA server isn't rendering the "Project Setting Page" correctly. | Jira Service Desk: 3.0.0 to 4.22.1. |
142
+
|| JIRA isn't forcing Azure AD Login. An extra button click was required. ||
143
+
|| We have now resolved the security fix in this version. This will protect you from user impersonation vulnerability.||
144
+
|| JIRA Service Desk logout issue is resolved. ||
145
+
146
+
147
+
127
148
## Troubleshooting
128
149
129
150
***You're getting multiple certificate errors**: Sign in to Azure AD and remove the multiple certificates that are available against the app. Ensure that only one certificate is present.
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-customize-sign-in-out.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,7 @@ Here's a simple sign-out link in a webpage:
91
91
<ahref="/.auth/logout">Sign out</a>
92
92
```
93
93
94
-
By default, a successful sign-out redirects the client to the URL `/.auth/logout/done`. You can change the post-sign-out redirect page by adding the `post_logout_redirect_uri` query parameter. For example:
94
+
By default, a successful sign-out redirects the client to the URL `/.auth/logout/complete`. You can change the post-sign-out redirect page by adding the `post_logout_redirect_uri` query parameter. For example:
95
95
96
96
```
97
97
GET /.auth/logout?post_logout_redirect_uri=/index.html
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-provider-google.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ To complete the procedure in this topic, you must have a Google account that has
18
18
19
19
## <aname="register"> </a>Register your application with Google
20
20
21
-
1. Follow the Google documentation at [Google Sign-In for server-side apps](https://developers.google.com/identity/sign-in/web/server-side-flow) to create a client ID and client secret. There's no need to make any code changes. Just use the following information:
21
+
1. Follow the Google documentation at [SignIn with Google for Web - Setup](https://developers.google.com/identity/gsi/web/guides/get-google-api-clientid) to create a client ID and client secret. There's no need to make any code changes. Just use the following information:
22
22
- For **Authorized JavaScript Origins**, use `https://<app-name>.azurewebsites.net` with the name of your app in *\<app-name>*.
23
23
- For **Authorized Redirect URI**, use `https://<app-name>.azurewebsites.net/.auth/login/google/callback`.
Copy file name to clipboardExpand all lines: articles/app-service/configure-language-java.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -470,7 +470,7 @@ You can interact or debug the Java Key Tool by [opening an SSH connection](confi
470
470
471
471
## Configure APM platforms
472
472
473
-
This section shows how to connect Java applications deployed on Azure App Service with Azure Monitor application insights, NewRelic, and AppDynamics application performance monitoring (APM) platforms.
473
+
This section shows how to connect Java applications deployed on Azure App Service with Azure Monitor Application Insights, NewRelic, and AppDynamics application performance monitoring (APM) platforms.
0 commit comments