Skip to content

Commit 404d0b1

Browse files
committed
resolve conflict
2 parents cf01fed + 01a7aba commit 404d0b1

File tree

635 files changed

+11103
-5595
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

635 files changed

+11103
-5595
lines changed

.openpublishing.publish.config.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -458,6 +458,12 @@
458458
"branch": "main",
459459
"branch_mapping": {}
460460
},
461+
{
462+
"path_to_root": "azureml-examples-v2samplesreorg",
463+
"url": "https://github.com/azure/azureml-examples",
464+
"branch": "v2samplesreorg",
465+
"branch_mapping": {}
466+
},
461467
{
462468
"path_to_root": "azureml-examples-sdk-preview",
463469
"url": "https://github.com/azure/azureml-examples",
@@ -674,6 +680,12 @@
674680
"branch": "main",
675681
"branch_mapping": {}
676682
},
683+
{
684+
"path_to_root": "cosmos-db-sql-api-javascript-samples",
685+
"url": "https://github.com/Azure-Samples/cosmos-db-sql-api-javascript-samples",
686+
"branch": "main",
687+
"branch_mapping": {}
688+
},
677689
{
678690
"path_to_root": "azure-cosmos-db-python-getting-started",
679691
"url": "https://github.com/Azure-Samples/azure-cosmos-db-python-getting-started",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29139,6 +29139,11 @@
2913929139
"redirect_url": "/azure/iot-dps/quick-enroll-device-tpm",
2914029140
"redirect_document_id": false
2914129141
},
29142+
{
29143+
"source_path_from_root": "/articles/iot-dps/how-to-use-custom-allocation-policies.md",
29144+
"redirect_url": "/azure/iot-dps/tutorial-custom-allocation-policies",
29145+
"redirect_document_id": false
29146+
},
2914229147
{
2914329148
"source_path_from_root": "/articles/app-service/environment/app-service-app-service-environment-web-application-firewall.md",
2914429149
"redirect_url": "/azure/app-service/environment/integrate-with-application-gateway",

.openpublishing.redirection.virtual-desktop.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,11 @@
2929
"source_path_from_root": "/articles/virtual-desktop/shortpath-public.md",
3030
"redirect_url": "/azure/virtual-desktop/rdp-shortpath",
3131
"redirect_document_id": false
32-
}
32+
},
33+
{
34+
"source_path_from_root": "/articles/virtual-machines/windows/using-visual-studio-vm.md",
35+
"redirect_url": "/visualstudio/install/using-visual-studio-vm",
36+
"redirect_document_id": false
37+
}
3338
]
3439
}

articles/active-directory/app-proxy/application-proxy-add-on-premises-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ Now that you've prepared your environment and installed a connector, you're read
214214
| **Name** | The name of the application that will appear on My Apps and in the Azure portal. |
215215
| **Internal URL** | The URL for accessing the application from inside your private network. You can provide a specific path on the backend server to publish, while the rest of the server is unpublished. In this way, you can publish different sites on the same server as different apps, and give each one its own name and access rules.<br><br>If you publish a path, make sure that it includes all the necessary images, scripts, and style sheets for your application. For example, if your app is at `https://yourapp/app` and uses images located at `https://yourapp/media`, then you should publish `https://yourapp/` as the path. This internal URL doesn't have to be the landing page your users see. For more information, see [Set a custom home page for published apps](application-proxy-configure-custom-home-page.md). |
216216
| **External URL** | The address for users to access the app from outside your network. If you don't want to use the default Application Proxy domain, read about [custom domains in Azure AD Application Proxy](./application-proxy-configure-custom-domain.md). |
217-
| **Pre Authentication** | How Application Proxy verifies users before giving them access to your application.<br><br>**Azure Active Directory** - Application Proxy redirects users to sign in with Azure AD, which authenticates their permissions for the directory and application. We recommend keeping this option as the default so that you can take advantage of Azure AD security features like Conditional Access and Multi-Factor Authentication. **Azure Active Directory** is required for monitoring the application with Microsoft Cloud Application Security.<br><br>**Passthrough** - Users don't have to authenticate against Azure AD to access the application. You can still set up authentication requirements on the backend. |
217+
| **Pre Authentication** | How Application Proxy verifies users before giving them access to your application.<br><br>**Azure Active Directory** - Application Proxy redirects users to sign in with Azure AD, which authenticates their permissions for the directory and application. We recommend keeping this option as the default so that you can take advantage of Azure AD security features like Conditional Access and Multi-Factor Authentication. **Azure Active Directory** is required for monitoring the application with Microsoft Defender for Cloud Apps.<br><br>**Passthrough** - Users don't have to authenticate against Azure AD to access the application. You can still set up authentication requirements on the backend. |
218218
| **Connector Group** | Connectors process the remote access to your application, and connector groups help you organize connectors and apps by region, network, or purpose. If you don't have any connector groups created yet, your app is assigned to **Default**.<br><br>If your application uses WebSockets to connect, all connectors in the group must be version 1.5.612.0 or later. |
219219
220220
6. If necessary, configure **Additional settings**. For most applications, you should keep these settings in their default states.

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Use additional context in Microsoft Authenticator notifications - Azure Active Directory
2+
title: Use additional context in Microsoft Authenticator notifications (Preview) - Azure Active Directory
33
description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 09/15/2022
7+
ms.date: 09/22/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1313
---
14-
# How to use additional context in Microsoft Authenticator notifications - Authentication methods policy
14+
# How to use additional context in Microsoft Authenticator notifications (Preview) - Authentication methods policy
1515

1616
This topic covers how to improve the security of user sign-in by adding the application name and geographic location of the sign-in to Microsoft Authenticator passwordless and push notifications.
1717

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Use number matching in multifactor authentication (MFA) notifications - Azure Active Directory
2+
title: Use number matching in multifactor authentication (MFA) notifications (Preview) - Azure Active Directory
33
description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 09/15/2022
7+
ms.date: 09/22/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1313
---
14-
# How to use number matching in multifactor authentication (MFA) notifications - Authentication methods policy
14+
# How to use number matching in multifactor authentication (MFA) notifications (Preview) - Authentication methods policy
1515

1616
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
1717

articles/active-directory/cloud-sync/how-to-prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ If there's a firewall between your servers and Azure AD, configure the following
165165
|-----|-----|
166166
|&#42;.msappproxy.us</br>&#42;.servicebus.usgovcloudapi.net|The agent uses these URLs to communicate with the Azure AD cloud service. |
167167
|`mscrl.microsoft.us:80` </br>`crl.microsoft.us:80` </br>`ocsp.msocsp.us:80` </br>`www.microsoft.us:80`| The agent uses these URLs to verify certificates.|
168-
|login.windows.us </br>secure.aadcdn.microsoftonline-p.com </br>&#42;.microsoftonline.us </br>&#42;.microsoftonline-p.us </br>&#42;.msauth.net </br>&#42;.msauthimages.net </br>&#42;.msecnd.net</br>&#42;.msftauth.net </br>&#42;.msftauthimages.net</br>&#42;.phonefactor.net </br>enterpriseregistration.windows.net</br>management.azure.com </br>policykeyservice.dc.ad.msft.net</br>ctldl.windowsupdate.us:80| The agent uses these URLs during the registration process.
168+
|login.windows.us </br>secure.aadcdn.microsoftonline-p.com </br>&#42;.microsoftonline.us </br>&#42;.microsoftonline-p.us </br>&#42;.msauth.net </br>&#42;.msauthimages.net </br>&#42;.msecnd.net</br>&#42;.msftauth.net </br>&#42;.msftauthimages.net</br>&#42;.phonefactor.net </br>enterpriseregistration.windows.net</br>management.azure.com </br>policykeyservice.dc.ad.msft.net</br>ctldl.windowsupdate.us:80 </br>aadcdn.msftauthimages.us </br>*.microsoft.us </br>msauthimages.us </br>mfstauthimages.us| The agent uses these URLs during the registration process.
169169
170170
171171

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -139,13 +139,15 @@ The following client apps are confirmed to support this setting:
139139
- Microsoft Cortana
140140
- Microsoft Edge
141141
- Microsoft Excel
142+
- Microsoft Launcher
142143
- Microsoft Lists
143144
- Microsoft Office
144145
- Microsoft OneDrive
145146
- Microsoft OneNote
146147
- Microsoft Outlook
147148
- Microsoft Planner
148149
- Microsoft Power BI
150+
- Microsoft PowerApps
149151
- Microsoft PowerPoint
150152
- Microsoft SharePoint
151153
- Microsoft Teams
@@ -156,6 +158,7 @@ The following client apps are confirmed to support this setting:
156158
- MultiLine for Intune
157159
- Nine Mail - Email and Calendar
158160
- Notate for Intune
161+
- Yammer (iOS and iPadOS)
159162

160163
This list is not all encompassing, if your app is not in this list please check with the application vendor to confirm support.
161164

articles/active-directory/develop/msal-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,29 +9,29 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 07/22/2021
12+
ms.date: 09/20/2022
1313
ms.author: marsma
1414
ms.reviewer: saeeda
1515
ms.custom: aaddev, identityplatformtop40, has-adal-ref
1616
#Customer intent: As an application developer, I want to learn about the Microsoft Authentication Library so I can decide if this platform meets my application development needs and requirements.
1717
---
1818

1919
# Overview of the Microsoft Authentication Library (MSAL)
20-
The Microsoft Authentication Library (MSAL) enables developers to acquire [tokens](developer-glossary.md#security-token) from the Microsoft identity platform in order to authenticate users and access secured web APIs. It can be used to provide secure access to Microsoft Graph, other Microsoft APIs, third-party web APIs, or your own web API. MSAL supports many different application architectures and platforms including .NET, JavaScript, Java, Python, Android, and iOS.
20+
The Microsoft Authentication Library (MSAL) enables developers to acquire [security tokens](developer-glossary.md#security-token) from the Microsoft identity platform to authenticate users and access secured web APIs. It can be used to provide secure access to Microsoft Graph, other Microsoft APIs, third-party web APIs, or your own web API. MSAL supports many different application architectures and platforms including .NET, JavaScript, Java, Python, Android, and iOS.
2121

22-
MSAL gives you many ways to get tokens, with a consistent API for a number of platforms. Using MSAL provides the following benefits:
22+
MSAL gives you many ways to get tokens, with a consistent API for many platforms. Using MSAL provides the following benefits:
2323

2424
* No need to directly use the OAuth libraries or code against the protocol in your application.
25-
* Acquires tokens on behalf of a user or on behalf of an application (when applicable to the platform).
26-
* Maintains a token cache and refreshes tokens for you when they are close to expire. You don't need to handle token expiration on your own.
27-
* Helps you specify which audience you want your application to sign in (your org, several orgs, work, and school and Microsoft personal accounts, social identities with Azure AD B2C, users in sovereign, and national clouds).
25+
* Acquires tokens on behalf of a user or application (when applicable to the platform).
26+
* Maintains a token cache and refreshes tokens for you when they're close to expiring. You don't need to handle token expiration on your own.
27+
* Helps you specify which audience you want your application to sign in. The sign in audience can include personal Microsoft accounts, social identities with Azure AD B2C organizations, work, school, or users in sovereign and national clouds.
2828
* Helps you set up your application from configuration files.
2929
* Helps you troubleshoot your app by exposing actionable exceptions, logging, and telemetry.
3030

3131
> [!VIDEO https://www.youtube.com/embed/zufQ0QRUHUk]
3232
3333
## Application types and scenarios
34-
Using MSAL, a token can be acquired for a number of application types: web applications, web APIs, single-page apps (JavaScript), mobile and native applications, and daemons and server-side applications.
34+
Using MSAL, a token can be acquired for many application types: web applications, web APIs, single-page apps (JavaScript), mobile and native applications, and daemons and server-side applications.
3535

3636
MSAL can be used in many application scenarios, including the following:
3737

articles/active-directory/develop/reference-aadsts-error-codes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -348,6 +348,7 @@ The `error` field has several possible values - review the protocol documentatio
348348
| AADSTS700022 | InvalidMultipleResourcesScope - The provided value for the input parameter scope isn't valid because it contains more than one resource. |
349349
| AADSTS700023 | InvalidResourcelessScope - The provided value for the input parameter scope isn't valid when request an access token. |
350350
| AADSTS7000215 | Invalid client secret is provided. Developer error - the app is attempting to sign in without the necessary or correct authentication parameters.|
351+
| AADSTS7000218 | The request body must contain the following parameter: 'client_assertion' or 'client_secret'. |
351352
| AADSTS7000222 | InvalidClientSecretExpiredKeysProvided - The provided client secret keys are expired. Visit the Azure portal to create new keys for your app, or consider using certificate credentials for added security: [https://aka.ms/certCreds](./active-directory-certificate-credentials.md) |
352353
| AADSTS700005 | InvalidGrantRedeemAgainstWrongTenant - Provided Authorization Code is intended to use against other tenant, thus rejected. OAuth2 Authorization Code must be redeemed against same tenant it was acquired for (/common or /{tenant-ID} as appropriate) |
353354
| AADSTS1000000 | UserNotBoundError - The Bind API requires the Azure AD user to also authenticate with an external IDP, which hasn't happened yet. |

0 commit comments

Comments
 (0)