Skip to content

Commit 4347633

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-roles-may
2 parents 20bff15 + 0907a5e commit 4347633

File tree

256 files changed

+2109
-1350
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

256 files changed

+2109
-1350
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -38913,21 +38913,6 @@
3891338913
"redirect_url": "/azure/media-services/latest/cli-upload-file-asset",
3891438914
"redirect_document_id": false
3891538915
},
38916-
{
38917-
"source_path": "articles/aks/rdp.md",
38918-
"redirect_url": "https://cloudblogs.microsoft.com/opensource/2019/03/25/windows-server-containers-now-supported-kubernetes/",
38919-
"redirect_document_id": false
38920-
},
38921-
{
38922-
"source_path": "articles/aks/windows-container-cli.md",
38923-
"redirect_url": "https://cloudblogs.microsoft.com/opensource/2019/03/25/windows-server-containers-now-supported-kubernetes/",
38924-
"redirect_document_id": false
38925-
},
38926-
{
38927-
"source_path": "articles/aks/windows-node-limitations.md",
38928-
"redirect_url": "https://cloudblogs.microsoft.com/opensource/2019/03/25/windows-server-containers-now-supported-kubernetes/",
38929-
"redirect_document_id": false
38930-
},
3893138916
{
3893238917
"source_path": "articles/media-services/latest/scripts/cli-samples.md",
3893338918
"redirect_url": "/azure/media-services/latest/create-account-cli-how-to",

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/03/2019
11+
ms.date: 05/16/2019
1212
ms.author: davidmu
1313
ms.subservice: B2C
1414
---
@@ -27,7 +27,7 @@ ms.subservice: B2C
2727
## Add signing and encryption keys
2828

2929
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
30-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Click the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
30+
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Click the **Directory and subscription filter** in the top menu and choose the directory that contains your tenant.
3131
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
3232
4. On the Overview page, select **Identity Experience Framework**.
3333

@@ -66,17 +66,23 @@ Azure AD B2C requires you to register two applications that are used to sign up
6666

6767
### Register the IdentityExperienceFramework application
6868

69-
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **App registrations**.
70-
2. Select **New application registration**.
71-
3. For **Name**, enter `IdentityExperienceFramework`.
72-
4. For **Application type**, choose **Web app/API**.
73-
5. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name.
74-
6. Click **Create**.
75-
7. After it's created, copy the application ID and save it to use later.
69+
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure Active Directory**.
70+
2. In the menu, select **App registrations (Legacy)**.
71+
3. Select **New application registration**.
72+
4. For **Name**, enter `IdentityExperienceFramework`.
73+
5. For **Application type**, choose **Web app/API**.
74+
6. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name.
75+
7. Click **Create**. After it's created, copy the application ID and save it to use later.
76+
77+
```
78+
https://your--B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com
79+
```
80+
81+
All URLs should now be using [b2clogin.com](b2clogin.md).
7682
7783
### Register the ProxyIdentityExperienceFramework application
7884
79-
1. Select **App registrations**, and then select **New application registration**.
85+
1. In **App registrations (Legacy)**, select **New application registration**.
8086
2. For **Name**, enter `ProxyIdentityExperienceFramework`.
8187
3. For **Application type**, choose **Native**.
8288
4. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `yourtenant` is your Azure AD B2C tenant.

articles/active-directory-b2c/active-directory-b2c-reference-custom-attr.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,11 @@ ms.subservice: B2C
1717

1818
Every customer-facing application has unique requirements for the information that needs to be collected. Your Azure Active Directory (Azure AD) B2C tenant comes with a built-in set of information stored in attributes, such as Given Name, Surname, City, and Postal Code. With Azure AD B2C, you can extend the set of attributes stored on each customer account.
1919

20-
You can create custom attributes in the [Azure portal](https://portal.azure.com/) and use them in your sign-up user flows, sign-up or sign-in user flows, or profile editing user flows. You can also read and write these attributes by using the [Azure AD Graph API](active-directory-b2c-devquickstarts-graph-dotnet.md). Custom attributes in Azure AD B2C use [Azure AD Graph API Directory Schema Extensions](/previous-versions/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
20+
You can create custom attributes in the [Azure portal](https://portal.azure.com/) and use them in your sign-up user flows, sign-up or sign-in user flows, or profile editing user flows. You can also read and write these attributes by using the [Azure AD Graph API](active-directory-b2c-devquickstarts-graph-dotnet.md). Custom attributes in Azure AD B2C use [Azure AD Graph API Directory Schema Extensions](/previous-versions/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
21+
22+
> [!NOTE]
23+
> Support for newer [Microsoft Graph API](https://docs.microsoft.com/en-us/graph/overview?view=graph-rest-1.0) for querying Azure AD B2C tenant is still under development.
24+
>
2125
2226
## Create a custom attribute
2327

@@ -37,7 +41,8 @@ ms.subservice: B2C
3741
7. Optionally, enter a **Description** for informational purposes.
3842
8. Click **Create**.
3943

40-
The custom attribute is now available in the list of **User attributes** and for use in your user flows. A custom attribute is only created the first time it is used in any user flow, and not when you add it to the list of **User attributes**.
44+
The custom attribute is now available in the list of **User attributes** and for use in your user flows. A custom attribute is only created the first time it is used in any user flow, and not when you add it to the list of **User attributes**.
45+
4146

4247
## Use a custom attribute in your user flow
4348

@@ -47,5 +52,5 @@ The custom attribute is now available in the list of **User attributes** and for
4752
5. Select **Application claims** and then select the custom attribute.
4853
6. Click **Save**.
4954

50-
You can use the **Run user flow** feature on the user flow to verify the customer experience. You should now see **ShoeSize** in the list of attributes collected during the sign-up journey, and see it in the token sent back to your application.
55+
Once you have created a new user using a user flow which uses the newly created custom attribute, the object can be queried in [Azure AD Graph Explorer](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-graph-api-quickstart). Alternatively you can use the [**Run user flow**](https://docs.microsoft.com/en-us/azure/active-directory-b2c/tutorial-create-user-flows) feature on the user flow to verify the customer experience. You should now see **ShoeSize** in the list of attributes collected during the sign-up journey, and see it in the token sent back to your application.
5156

articles/active-directory/authentication/howto-sspr-windows-7-8.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,8 @@ You must register for SSPR before you will be able to use the "Forgot password"
5858

5959
Using the Microsoft Authenticator app for notifications and codes to reset your password does not work in this initial release. Users must have alternate methods registered that meet the requirements of your policy.
6060

61+
If more than one 3rd party credential provider is enabled on your machine, users will see more than one user profile on the logon screen.
62+
6163
## Troubleshooting
6264

6365
Events will be logged both on the machine and in Azure AD.

articles/active-directory/authentication/tutorial-sspr-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818
---
1919
# Tutorial: Azure AD password reset from the login screen
2020

21-
In this tutorial, you enable users to reset their passwords from the Windows 10 login screen. With the new Windows 10 April 2018 Update, users with **Azure AD joined** or **hybrid Azure AD joined** devices can use a “Reset password” link on their login screen. When users click this link, they are brought to the same self-service password reset (SSPR) experience they are familiar with.
21+
In this tutorial, you enable users to reset their passwords from the Windows 10 login screen. With the new Windows 10 April 2018 Update, users with **Azure AD joined** or **hybrid Azure AD joined** devices can use a “Reset password” link on their login screen. When users click this link, they are brought to the same self-service password reset (SSPR) experience they are familiar with. If a user is locked out this process does not unlock accounts in on-premises Active Directory.
2222

2323
> [!div class="checklist"]
2424
> * Configure Reset password link using Intune

articles/active-directory/conditional-access/conditions.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,18 +15,17 @@ ms.devlang: na
1515
ms.topic: article
1616
ms.tgt_pltfrm: na
1717
ms.workload: identity
18-
ms.date: 12/14/2018
18+
ms.date: 05/17/2019
1919
ms.author: joflore
2020
ms.reviewer: calebb
2121

2222
#Customer intent: As an IT admin, I need to understand the conditions in conditional access so that I can set them according to my business needs
2323

2424
ms.collection: M365-identity-device-management
2525
---
26+
# What are conditions in Azure Active Directory conditional access?
2627

27-
# What are conditions in Azure Active Directory conditional access?
28-
29-
You can control how users access your cloud apps by using [Azure Active Directory (Azure AD) conditional access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access-azure-portal). In a conditional access policy, you define the response ("Then do this") to the reason for triggering your policy ("When this happens").
28+
You can control how users access your cloud apps by using [Azure Active Directory (Azure AD) conditional access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access-azure-portal). In a conditional access policy, you define the response ("Then do this") to the reason for triggering your policy ("When this happens").
3029

3130
![Reason and response](./media/conditions/10.png)
3231

@@ -36,7 +35,7 @@ In the context of conditional access, **When this happens** is called a **condit
3635
![Conditional access policy](./media/conditions/61.png)
3736

3837

39-
Conditions you haven't configured in a conditional access policy aren't applied. Some conditions are [mandatory](best-practices.md) to apply a conditional access policy to an environment.
38+
Conditions you haven't configured in a conditional access policy aren't applied. Some conditions are [mandatory](best-practices.md) to apply a conditional access policy to an environment.
4039

4140
This article is an overview of the conditions and how they're used in a conditional access policy.
4241

@@ -72,7 +71,7 @@ Organizations can choose from the following:
7271
> [!NOTE]
7372
> You can exclude specific apps from a policy. However, these apps are still subject to the policies applied to the services they access.
7473
75-
**User actions** are tasks that can be performed by a user. The only currently supported action is **Register security information (preview)**, which allows conditional access policy to enforce when a user registers their security information.
74+
**User actions** are tasks that can be performed by a user. The only currently supported action is **Register security information (preview)**, which allows conditional access policy to enforce when users who are enabled for combined registration attempt to register their security information. More information can be found in the article, [Enable combined security information registration (preview)](../authentication/howto-registration-mfa-sspr-combined.md).
7675

7776
## Sign-in risk
7877

articles/active-directory/develop/about-microsoft-identity-platform.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323

2424
# Evolution of Microsoft identity platform
2525

26-
Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) identity service and developer platform. It allows developers to build applications that sign in users, get tokens to call APIs, such as Microsoft Graph, or APIs that developers have built. It consists of an authentication service, open-source libraries, application registration, and configuration (through a developer portal and application API), full developer documentation, quickstart samples, code samples, tutorials, how-to guides, and other developer content. The Microsoft identity platform supports industry standard protocols such as OAuth 2.0 and OpenID Connect.
26+
Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) developer platform. It allows developers to build applications that sign in users, get tokens to call APIs, such as Microsoft Graph, or APIs that developers have built. It consists of an authentication service, open-source libraries, application registration, and configuration (through a developer portal and application API), full developer documentation, quickstart samples, code samples, tutorials, how-to guides, and other developer content. The Microsoft identity platform supports industry standard protocols such as OAuth 2.0 and OpenID Connect.
2727

2828
Up until now, most developers have worked with the Azure AD v1.0 platform to authenticate work and school accounts (provisioned by Azure AD) by requesting tokens from the Azure AD v1.0 endpoint, using Azure AD Authentication Library (ADAL), Azure portal for application registration and configuration, and Azure AD Graph API for programmatic application configuration.
2929

@@ -70,4 +70,4 @@ Microsoft identity platform (v2.0) endpoint is now OIDC certified. It works with
7070
Learn more about v1.0 and v2.0.
7171

7272
* [Microsoft identity platform (v2.0) overview](v2-overview.md)
73-
* [Azure Active Directory for developers (v1.0) overview](v1-overview.md)
73+
* [Azure Active Directory for developers (v1.0) overview](v1-overview.md)

articles/active-directory/develop/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ metadata:
1515
ms.date: 05/07/2019
1616
ms.author: celested
1717
abstract:
18-
description: Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) identity service and developer platform. It allows developers to build applications that sign in all Microsoft identities and get tokens to call Microsoft APIs such as Microsoft Graph or APIs that developers have built. It’s a full-featured platform that consists of an OAuth 2.0 and OpenID Connect standard-compliant authentication service, open-source libraries, application registration and configuration, robust conceptual and reference documentation, quickstart samples, code samples, tutorials, and how-to guides.
18+
description: Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) developer platform. It allows developers to build applications that sign in all Microsoft identities and get tokens to call Microsoft APIs such as Microsoft Graph or APIs that developers have built. It’s a full-featured platform that consists of an OAuth 2.0 and OpenID Connect standard-compliant authentication service, open-source libraries, application registration and configuration, robust conceptual and reference documentation, quickstart samples, code samples, tutorials, and how-to guides.
1919
aside:
2020
image:
2121
alt:

articles/active-directory/develop/sample-v2-code.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ These samples show how to write a single-page application secured with Microsoft
4646
| Platform | Description | Link |
4747
| -------- | --------------------- | -------- |
4848
| ![JavaScript](media/sample-v2-code/logo_js.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core) | Calls Microsoft Graph |[javascript-graphapi-web-v2](https://github.com/Azure-Samples/active-directory-javascript-graphapi-web-v2) |
49-
| ![JavaScript](media/sample-v2-code/logo_js.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core) | Calls Calls B2C |[b2c-javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp) |
49+
| ![JavaScript](media/sample-v2-code/logo_js.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core) | Calls B2C |[b2c-javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp) |
5050
| ![JavaScript](media/sample-v2-code/logo_js.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core) | Calls own web API |[javascript-singlepageapp-dotnet-webapi-v2](https://github.com/Azure-Samples/active-directory-javascript-singlepageapp-dotnet-webapi-v2) |
5151
| ![Angular JS](media/sample-v2-code/logo_angular.png) [JavaScript (MSAL AngularJS)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-angularjs)| Calls Microsoft Graph | [MsalAngularjsDemoApp](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-angularjs/samples/MsalAngularjsDemoApp)
5252
| ![Angular](media/sample-v2-code/logo_angular.png) [JavaScript (MSAL Angular)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-angular)| Calls Microsoft Graph | [MSALAngularDemoApp](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-angular/samples/MSALAngularDemoApp) |

articles/active-directory/develop/v2-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323

2424
# Microsoft identity platform (v2.0) overview
2525

26-
Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) identity service and developer platform. It allows developers to build applications that sign in all Microsoft identities and get tokens to call Microsoft APIs, such as Microsoft Graph, or APIs that developers have built. The Microsoft identity platform consists of:
26+
Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) developer platform. It allows developers to build applications that sign in all Microsoft identities and get tokens to call Microsoft APIs, such as Microsoft Graph, or APIs that developers have built. The Microsoft identity platform consists of:
2727

2828
- **OAuth 2.0 and OpenID Connect standard-compliant authentication service** that enables developers to authenticate any Microsoft identity, including:
2929
- Work or school accounts (provisioned through Azure AD)
@@ -76,4 +76,4 @@ When you’re ready to launch your app into a **production environment**, review
7676

7777
## Learn more
7878

79-
If you’d planning to build a customer-facing application that signs in social and local identities, take a look at the [Azure AD B2C overview](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-add-identity-providers).
79+
If you’re planning to build a customer-facing application that signs in social and local identities, see the [Azure AD B2C overview](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-add-identity-providers).

0 commit comments

Comments
 (0)