Skip to content

Commit 3cea84d

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into cy_azure_master
2 parents 0db0260 + db285e5 commit 3cea84d

24 files changed

+268
-393
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,2 @@
11
{:allowed-branchname-matches ["^master$" "^release..*"]
2-
:allowed-filename-matches ["articles" "includes"]
3-
4-
:template-header
5-
"
6-
## Acrolinx Scorecards
7-
8-
**A minimum Acrolinx score of 80 is required.**
9-
10-
Click the scorecard links for each article to review the Acrolinx feedback on grammar, spelling, punctuation, writing style, and terminology:
11-
12-
| Article | Score | Issues | Scorecard |
13-
| ------- | ----- | ------ | --------- |
14-
"
15-
16-
;; do not remove the spaces at the end of lines! That is markdown for
17-
;; linebreak
18-
:template-change
19-
"| **${github/filename}** | ${acrolinx/qualityscore} | ${acrolinx/flags/issues} | [link](${acrolinx/scorecard}) |
20-
"
21-
22-
:template-footer
23-
"
24-
**More info about Acrolinx**
25-
26-
- [Install Acrolinx locally for VSCode](https://review.docs.microsoft.com/en-us/help/contribute/contribute-acrolinx-vscode)
27-
- [Report false positives or issues](https://aka.ms/acrolinxbug)
28-
29-
"}
2+
:allowed-filename-matches ["articles" "includes"]}

.openpublishing.redirection.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27249,7 +27249,7 @@
2724927249
},
2725027250
{
2725127251
"source_path": "articles/active-directory/application-proxy-sso-overview.md",
27252-
"redirect_url": "/azure/active-directory/manage-apps/application-proxy-single-sign-on",
27252+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
2725327253
"redirect_document_id": false
2725427254
},
2725527255
{
@@ -28415,8 +28415,8 @@
2841528415
},
2841628416
{
2841728417
"source_path": "articles/active-directory/application-config-sso-how-to-choose-sign-on-method.md",
28418-
"redirect_url": "/azure/active-directory/manage-apps/single-sign-on-modes",
28419-
"redirect_document_id": true
28418+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
28419+
"redirect_document_id": false
2842028420
},
2842128421
{
2842228422
"source_path": "articles/active-directory/application-config-sso-how-to-configure-federated-sso-gallery.md",
@@ -28643,6 +28643,16 @@
2864328643
"redirect_url": "/azure/active-directory/manage-apps/developer-guidance-for-integrating-applications",
2864428644
"redirect_document_id": true
2864528645
},
28646+
{
28647+
"source_path": "articles/active-directory/manage-apps/application-proxy-single-sign-on.md",
28648+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
28649+
"redirect_document_id": false
28650+
},
28651+
{
28652+
"source_path": "articles/active-directory/manage-apps/single-sign-on-modes.md",
28653+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
28654+
"redirect_document_id": false
28655+
},
2864628656
{
2864728657
"source_path": "articles/virtual-machines/linux/classic/cli-use-docker.md",
2864828658
"redirect_url": "/azure/virtual-machines/linux/dockerextension",

articles/active-directory/fundamentals/active-directory-faq.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.component: fundamentals
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 12/14/2017
13+
ms.date: 11/12/2018
1414
ms.author: lizross
1515
---
1616

@@ -167,7 +167,7 @@ For more information, see:
167167
* Direct sign-in to federated apps
168168
* Deep links to federated, password-based, or existing apps
169169

170-
For more information, see [Deploying Azure AD integrated applications to users](../manage-apps/what-is-single-sign-on.md#deploying-azure-ad-integrated-applications-to-users).
170+
For more information, see [End user experiences for applications](../manage-apps/end-user-experiences.md).
171171

172172
- - -
173173
**Q: What are the different ways Azure AD enables authentication and single sign-on to applications?**
@@ -178,7 +178,7 @@ For more information, see:
178178

179179
* [Authentication Scenarios for Azure AD](../develop/authentication-scenarios.md)
180180
* [Active Directory authentication protocols](https://msdn.microsoft.com/library/azure/dn151124.aspx)
181-
* [How does single sign-on with Azure Active Directory work?](../manage-apps/what-is-single-sign-on.md#how-does-single-sign-on-with-azure-active-directory-work)
181+
* [Single sign-on for applications in Azure AD](../manage-apps/what-is-single-sign-on.md)
182182

183183
- - -
184184
**Q: Can I add applications I’m running on-premises?**

articles/active-directory/manage-apps/application-proxy-configure-for-claims-aware-applications.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: conceptual
15-
ms.date: 08/04/2017
15+
ms.date: 11/08/2018
1616
ms.author: barbkess
17-
ms.reviewer: harshja
17+
ms.reviewer: japere
1818

1919
---
2020

@@ -51,7 +51,7 @@ If all the internal URLs for your applications are fully qualified domain names
5151
![Add an Endpoint - set Trusted URL value - screenshot](./media/application-proxy-configure-for-claims-aware-applications/appproxyendpointtrustedurl.png)
5252

5353
## Next steps
54-
* [Enable single-sign on](application-proxy-single-sign-on.md) for applications that aren't claims-aware
54+
* [Enable single-sign on](configure-single-sign-on-portal.md) for applications that aren't claims-aware
5555
* [Enable native client apps to interact with proxy applications](application-proxy-configure-native-client-application.md)
5656

5757

articles/active-directory/manage-apps/application-proxy-configure-native-client-application.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: conceptual
15-
ms.date: 01/31/2018
15+
ms.date: 11/08/2018
1616
ms.author: barbkess
17-
ms.reviewer: harshja
17+
ms.reviewer: japere
1818
ms.custom: it-pro
1919

2020
---
@@ -95,4 +95,4 @@ Once the ADAL is edited with these parameters, your users should be able to auth
9595

9696
For more information about the native application flow, see [Native application to web API](../develop/native-app.md)
9797

98-
Learn about setting up [Single sign-on for Application Proxy](application-proxy-single-sign-on.md)
98+
Learn about setting up [Single sign-on for Application Proxy](what-is-single-sign-on.md#single- sign-on-methods)

articles/active-directory/manage-apps/application-proxy-configure-single-sign-on-password-vaulting.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,20 +9,18 @@ manager: mtillman
99
ms.service: active-directory
1010
ms.component: app-mgmt
1111
ms.workload: identity
12-
ms.tgt_pltfrm: na
13-
ms.devlang: na
1412
ms.topic: conceptual
15-
ms.date: 07/20/2017
13+
ms.date: 11/12/2018
1614
ms.author: barbkess
17-
ms.reviewer: harshja
15+
ms.reviewer: japere
1816
ms.custom: it-pro
1917
---
2018

2119
# Password vaulting for single sign-on with Application Proxy
2220

2321
Azure Active Directory Application Proxy helps you improve productivity by publishing on-premises applications so that remote employees can securely access them, too. In the Azure portal, you can also set up single sign-on (SSO) to these apps. Your users only need to authenticate with Azure AD, and they can access your enterprise application without having to sign in again.
2422

25-
Application Proxy supports several [single sign-on modes](application-proxy-single-sign-on.md). Password-based sign-on is intended for applications that use a username/password combination for authentication. When you configure password-based sign-on for your application, your users have to sign in to the on-premises application once. After that, Azure Active Directory stores the sign-in information and automatically provides it to the application when your users access it remotely.
23+
Application Proxy supports several [single sign-on modes](what-is-single-sign-on.md#choosing-a-single-sign-on-method). Password-based sign-on is intended for applications that use a username/password combination for authentication. When you configure password-based sign-on for your application, your users have to sign in to the on-premises application once. After that, Azure Active Directory stores the sign-in information and automatically provides it to the application when your users access it remotely.
2624

2725
You should already have published and tested your app with Application Proxy. If not, follow the steps in [Publish applications using Azure AD Application Proxy](application-proxy-publish-azure-portal.md) then come back here.
2826

@@ -52,5 +50,5 @@ Go to external URL that you configured for remote access to your application. Si
5250

5351
## Next steps
5452

55-
- Read about other ways to implement [Single sign-on with Application Proxy](application-proxy-single-sign-on.md)
53+
- Read about other ways to implement [Single sign-on](what-is-single-sign-on.md)
5654
- Learn about [Security considerations for accessing apps remotely with Azure AD Application Proxy](application-proxy-security.md)

articles/active-directory/manage-apps/application-proxy-connector-groups.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22
title: Publishing applications on separate networks and locations using connector groups in Azure AD App Proxy | Microsoft Docs
33
description: Covers how to create and manage groups of connectors in Azure AD Application Proxy.
44
services: active-directory
5-
documentationcenter: ''
65
author: barbkess
76
manager: mtillman
87

@@ -12,10 +11,9 @@ ms.workload: identity
1211
ms.tgt_pltfrm: na
1312
ms.devlang: na
1413
ms.topic: conceptual
15-
ms.date: 01/31/2018
14+
ms.date: 11/08/2018
1615
ms.author: barbkess
17-
ms.reviewer: harshja
18-
ms.custom: H1Hack27Feb2017; it-pro
16+
ms.reviewer: japere
1917

2018
---
2119

@@ -124,6 +122,6 @@ In the example below, the company has two datacenters, A and B, with two connect
124122
## Next steps
125123

126124
* [Understand Azure AD Application Proxy connectors](application-proxy-connectors.md)
127-
* [Enable single-sign on](application-proxy-single-sign-on.md)
125+
* [Enable single-sign on](what-is-single-sign-on.md)
128126

129127

articles/active-directory/manage-apps/application-proxy-single-sign-on.md

Lines changed: 0 additions & 78 deletions
This file was deleted.

articles/active-directory/manage-apps/choose-application-type.md

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,20 +13,15 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: conceptual
16-
ms.date: 09/09/2018
16+
ms.date: 11/08/2018
1717
ms.author: barbkess
1818

1919
---
2020

21-
# How to choose which application type to use when adding an application
21+
# Choosing the application type when adding an application in Azure Active Directory
22+
Learn about the four types of applications you can add to Azure Active Directory (Azure AD). When you are adding an application in Azure Active Directory, you'll be prompted to choose one of the four application type.
2223

23-
This article help you to understand the four main types of applications you can integrate with Azure AD:
24-
25-
* What is supported by each of them
26-
* Why you might choose which application
27-
* How to configure those application’s core properties, like how users are **provisioned**, or what **single sign-on** technology to use.
28-
29-
## Supported application types in Azure AD
24+
## What are the types of applications?
3025

3126
Azure AD supports four main application types that you can add using the **Add** feature found under **Enterprise Applications**. These include:
3227

@@ -38,7 +33,7 @@ Azure AD supports four main application types that you can add using the **Add**
3833

3934
- **Non-Gallery Applications** – Bring your own applications! Any web link you want, or any application that renders a username and password field, supports SAML or OpenID Connect protocols, or supports SCIM that you wish to integrate for single sign-on with Azure AD.
4035

41-
## Features and capabilities supported by all the preceding application types
36+
## Features and capabilities supported by the application types
4237

4338
The following features are supported by any of the preceding four application types in Azure AD:
4439

articles/active-directory/manage-apps/configure-automatic-user-provisioning-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ ms.reviewer: asmalser
2020

2121
---
2222
# Managing user account provisioning for enterprise apps in the Azure portal
23-
This article describes how to use the [Azure portal](https://portal.azure.com) to manage automatic user account provisioning and de-provisioning for applications that support it, particularly ones that have been added from the "featured" category of the [Azure Active Directory application gallery](what-is-single-sign-on.md#get-started-with-the-azure-ad-application-gallery). To learn more about automatic user account provisioning and how it works, see [Automate User Provisioning and Deprovisioning to SaaS Applications with Azure Active Directory](user-provisioning.md).
23+
This article describes how to use the [Azure portal](https://portal.azure.com) to manage automatic user account provisioning and de-provisioning for applications that support it. To learn more about automatic user account provisioning and how it works, see [Automate User Provisioning and Deprovisioning to SaaS Applications with Azure Active Directory](user-provisioning.md).
2424

2525
## Finding your apps in the portal
26-
All applications that are configured for single sign-on in a directory, by a directory administrator using the [Azure Active Directory application gallery](what-is-single-sign-on.md#get-started-with-the-azure-ad-application-gallery), can be viewed and managed in the [Azure portal](https://portal.azure.com). The applications can be found in the **All Services** > **Enterprise Applications** section of the portal. Enterprise apps are apps that are deployed and used within your organization.
26+
All applications that are configured for single sign-on in a directory can be viewed and managed in the [Azure portal](https://portal.azure.com). The applications can be found in the **All Services** > **Enterprise Applications** section of the portal. Enterprise apps are apps that are deployed and used within your organization.
2727

2828
![Enterprise Applications pane](./media/configure-automatic-user-provisioning-portal/enterprise-apps-pane.png)
2929

0 commit comments

Comments
 (0)