Skip to content

Commit 44c2a96

Browse files
authored
Merge pull request #95624 from MicrosoftDocs/master
Merge Master to Live, 3 AM
2 parents a100744 + 5277f64 commit 44c2a96

File tree

143 files changed

+703
-388
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

143 files changed

+703
-388
lines changed

articles/active-directory/develop/access-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -260,9 +260,9 @@ Refresh tokens can be invalidated or revoked at any time, for different reasons.
260260
| [Single sign-out](v1-protocols-openid-connect-code.md#single-sign-out) on web | Revoked | Stays alive | Revoked | Stays alive | Stays alive |
261261

262262
> [!NOTE]
263-
> A "Non-password based" login is one where the user didn't type in a password to get it. For example, using your face with Windows Hello, a FIDO key, or a PIN.
263+
> A "Non-password based" login is one where the user didn't type in a password to get it. For example, using your face with Windows Hello, a FIDO2 key, or a PIN.
264264
>
265-
> A known issue exists with the Windows Primary Refresh Token. If the PRT is obtained via a password, and then the user logs in via Hello, this does not change the origination of the PRT, and it will be revoked if the user changes their password.
265+
> Primary Refresh Tokens (PRT) on Windows 10 are segregated based on the credential. For example, Windows Hello and password have their respective PRTs, isolated from one another. When a user signs-in with a Hello credential (PIN or biometrics) and then changes the password, the password based PRT obtained previously will be revoked. Signing back in with a password invalidates the old PRT and requests a new one.
266266
>
267267
> Refresh tokens aren't invalidated or revoked when used to fetch a new access token and refresh token.
268268

articles/active-directory/develop/quickstart-v2-android.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -211,9 +211,9 @@ PublicClientApplication.createSingleAccountPublicClientApplication(getContext(),
211211
@Override
212212
public void onCreated(ISingleAccountPublicClientApplication application) {
213213
/**
214-
* This test app assumes that the app is only going to support one account.
215-
* This requires "account_mode" : "SINGLE" in the config json file.
216-
**/
214+
* This test app assumes that the app is only going to support one account.
215+
* This requires "account_mode" : "SINGLE" in the config json file.
216+
**/
217217
mSingleAccountApp = application;
218218
loadAccount();
219219
}
@@ -280,17 +280,17 @@ The code to get a token interactively, that is with UI that will involve the use
280280
* - password change
281281
* - the resource you're acquiring a token for has a stricter set of requirement than your Single Sign-On refresh token.
282282
* - you're introducing a new scope which the user has never consented for.
283-
*/
283+
**/
284284
mSingleAccountApp.acquireToken(getActivity(), getScopes(), getAuthInteractiveCallback());
285285
```
286286
287287
If the user has already signed in, `acquireTokenSilentAsync()` allows apps to request tokens silently as shown in `initializeUI()`, in the `callGraphApiSilentButton` click handler:
288288
289289
```java
290290
/**
291-
* Once you've signed the user in,
292-
* you can perform acquireTokenSilent to obtain resources without interrupting the user.
293-
*/
291+
* Once you've signed the user in,
292+
* you can perform acquireTokenSilent to obtain resources without interrupting the user.
293+
**/
294294
mSingleAccountApp.acquireTokenSilentAsync(getScopes(), AUTHORITY, getAuthSilentCallback());
295295
```
296296
@@ -391,7 +391,7 @@ An example of a multiple account app is a mail app that allows you to work with
391391
In the `MultipleAccountModeFragment.java` file, in `onCreateView()`, a multiple account app object (`IMultipleAccountPublicClientApplication`) is created using the config information stored in the `auth_config_multiple_account.json file`:
392392

393393
```java
394-
// Creates a PublicClientApplication object with res/raw/auth_config_single_account.json
394+
// Creates a PublicClientApplication object with res/raw/auth_config_multiple_account.json
395395
PublicClientApplication.createMultipleAccountPublicClientApplication(getContext(),
396396
R.raw.auth_config_multiple_account,
397397
new IPublicClientApplication.IMultipleAccountApplicationCreatedListener() {
@@ -416,8 +416,8 @@ Multiple account apps usually call `getAccounts()` to select the account to use
416416

417417
```java
418418
/**
419-
* Load currently signed-in accounts, if there's any.
420-
*/
419+
* Load currently signed-in accounts, if there's any.
420+
**/
421421
private void loadAccounts() {
422422
if (mMultipleAccountApp == null) {
423423
return;
@@ -463,7 +463,7 @@ Multiple account apps should typically acquire tokens interactively, that is wit
463463
* - password change
464464
* - the resource you're acquiring a token for has a stricter set of requirement than your SSO refresh token.
465465
* - you're introducing a new scope which the user has never consented for.
466-
*/
466+
**/
467467
mMultipleAccountApp.acquireToken(getActivity(), getScopes(), getAuthInteractiveCallback());
468468
```
469469
@@ -484,12 +484,12 @@ mMultipleAccountApp.acquireTokenSilentAsync(getScopes(),
484484

485485
#### Remove an account
486486

487-
The code to remove an account, and any cached tokens for the account, is in the `MultipleAccountModeFragment.java` file in `initializeUI()` in the handler for the remove account button. Before you can remove an account, you need an account object, which you obtain from MSAL functions like `getAccounts()` and `acquireToken()`. Because removing an account is an asynchronous operation, the `onRemoved` callback is supplied to update the UI.
487+
The code to remove an account, and any cached tokens for the account, is in the `MultipleAccountModeFragment.java` file in `initializeUI()` in the handler for the remove account button. Before you can remove an account, you need an account object, which you obtain from MSAL methods like `getAccounts()` and `acquireToken()`. Because removing an account is an asynchronous operation, the `onRemoved` callback is supplied to update the UI.
488488

489489
```java
490490
/**
491-
* Removes the selected account and cached tokens from this app (or device, if the device is in shared mode).
492-
*/
491+
* Removes the selected account and cached tokens from this app (or device, if the device is in shared mode).
492+
**/
493493
mMultipleAccountApp.removeAccount(accountList.get(accountListSpinner.getSelectedItemPosition()),
494494
new IMultipleAccountPublicClientApplication.RemoveAccountCallback() {
495495
@Override

articles/active-directory/develop/v2-supported-account-types.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ In the Microsoft Azure public Cloud, most types of apps can sign in users with a
3737
- With their work or school or personal Microsoft account.
3838
- With only personal Microsoft account.
3939
> [!NOTE]
40-
> Currently the Microsoft identity platform supports personal Microsoft accounts only by registering an app for **work or school or Microsoft personal accounts**, and then, restrict sign-in in the code for the application by specifying an Azure AD authority, when building the application, such as `https://login.onmicrosoftonline.com/consumers`.
40+
> Currently the Microsoft identity platform supports personal Microsoft accounts only by registering an app for **work or school or Microsoft personal accounts**, and then, restrict sign-in in the code for the application by specifying an Azure AD authority, when building the application, such as `https://login.microsoftonline.com/consumers`.
4141
4242
- If you're writing a business to consumers application, you can also sign in users with their social identities, using Azure AD B2C.
4343

@@ -57,4 +57,4 @@ Some account types can't be used with certain authentication flows. For instance
5757
## Next steps
5858

5959
- Learn more about [Tenancy in Azure Active Directory](./single-and-multi-tenant-apps.md)
60-
- Learn more about [National Clouds](./authentication-national-cloud.md)
60+
- Learn more about [National Clouds](./authentication-national-cloud.md)

articles/active-directory/develop/vs-active-directory-add-connected-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Add an Azure Active Directory using Connected Services in Visual Studio | Azure
2+
title: Add an Azure Active Directory using Connected Services | Azure
33
description: Add an Azure Active Directory by using the Visual Studio Add Connected Services dialog box
44
author: ghogen
55
manager: jillfra

articles/active-directory/develop/vs-active-directory-error.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to diagnose errors with the Azure Active Directory connected service
2+
title: Diagnose errors with Azure Active Directory connected service
33
description: The active directory connected service detected an incompatible authentication type
44
author: ghogen
55
manager: jillfra

articles/active-directory/fundamentals/add-users-azure-active-directory.md

Lines changed: 20 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,60 +9,66 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 04/01/2019
12+
ms.date: 11/11/2019
1313
ms.author: ajburnle
1414
ms.reviewer: jeffsta
1515
ms.custom: "it-pro, seodec18"
1616
ms.collection: M365-identity-device-management
1717
---
1818

1919
# Add or delete users using Azure Active Directory
20-
Add new users or delete existing users from your Azure Active Directory (Azure AD) organization. To add or delete users you must be a User administrator or Global administrator.
20+
21+
Add new users or delete existing users from your Azure Active Directory (Azure AD) organization. To add or delete users you must be a User administrator or Global administrator.
2122

2223
## Add a new user
24+
2325
You can create a new user using the Azure Active Directory portal.
2426

2527
### To add a new user
28+
2629
1. Sign in to the [Azure portal](https://portal.azure.com/) as a User administrator for the organization.
2730

2831
2. Select **Azure Active Directory**, select **Users**, and then select **New user**.
2932

3033
![Users - All users page with New user highlighted](media/add-users-azure-active-directory/new-user-all-users-blade.png)
3134

32-
3. On the **User** page, fill out the required information.
35+
3. On the **New user** page, select **Create user** and then add the user's information.
3336

3437
![Add new user, User page with user info](media/add-users-azure-active-directory/new-user-user-blade.png)
3538

36-
- **Name (required).** The first and last name of the new user. For example, Mary Parker.
39+
- **Name (required)**: The first and last name of the new user. For example, Chris Green.
40+
41+
- **User name (required)**: The user name of the new user. For example, [email protected].
3742

38-
- **User name (required).** The user name of the new user. For example, [email protected].
39-
40-
The domain part of the user name must use either the initial default domain name, <_yourdomainname_>.onmicrosoft.com, or a custom domain name, such as contoso.com. For more information about how to create a custom domain name, see [How to add a custom domain name to Azure Active Directory](add-custom-domain.md).
43+
The domain part of the user name must use either the initial default domain name, <_yourdomainname_>.onmicrosoft.com, or a custom domain name in your Azure AD organization such as contoso.com. For more information about how to create a custom domain name, see [How to add a custom domain name to Azure Active Directory](add-custom-domain.md).
4144

42-
- **Profile.** Optionally, you can add more information about the user. You can also add user information at a later time. For more information about adding user info, see [How to add or change user profile information](active-directory-users-profile-azure-portal.md).
45+
- **Groups**: You can add the user to one or more existing groups, or you can do it later. For more information about adding users to groups, see [How to create a basic group and add members](active-directory-groups-create-azure-portal.md).
4346

44-
- **Groups.** Optionally, you can add the user to one or more existing groups. You can also add the user to groups at a later time. For more information about adding users to groups, see [How to create a basic group and add members](active-directory-groups-create-azure-portal.md).
47+
- **Directory role**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role. You can assign the user to be a Global administrator or one or more of the limited administrator roles in Azure AD. For more information about assigning roles, see [How to assign roles to users](active-directory-users-assign-role-azure-portal.md).
4548

46-
- **Directory role.** Optionally, you can add the user to an Azure AD administrator role. You can assign the user to be a Global administrator or one or more of the limited administrator roles in Azure AD. For more information about assigning roles, see [How to assign roles to users](active-directory-users-assign-role-azure-portal.md).
49+
- **Job info**: You can add more information about the user here, or do it later. For more information about adding user info, see [How to add or change user profile information](active-directory-users-profile-azure-portal.md).
4750

4851
4. Copy the auto-generated password provided in the **Password** box. You'll need to give this password to the user for the initial sign-in process.
4952

5053
5. Select **Create**.
5154

52-
The user is created and added to your Azure AD tenant.
55+
The user is created and added to your Azure AD organization.
5356

5457
## Add a new user within a hybrid environment
58+
5559
If you have an environment with both Azure Active Directory (cloud) and Windows Server Active Directory (on-premises), you can add new users by syncing the existing user account data. For more information about hybrid environments and users, see [Integrate your on-premises directories with Azure Active Directory](../hybrid/whatis-hybrid-identity.md).
5660

5761
## Delete a user
62+
5863
You can delete an existing user using Azure Active Directory portal.
5964

6065
### To delete a user
66+
6167
1. Sign in to the [Azure portal](https://portal.azure.com/) using a User administrator account for the organization.
6268

63-
2. Select **Azure Active Directory**, select **Users**, and then search for and select the user you want to delete from your Azure AD tenant. For example, _Mary Parker_.
69+
1. Select **Azure Active Directory**, select **Users**, and then search for and select the user you want to delete from your Azure AD tenant. For example, _Mary Parker_.
6470

65-
3. Select **Delete user**.
71+
1. Select **Delete user**.
6672

6773
![Users - All users page with Delete user highlighted](media/add-users-azure-active-directory/delete-user-all-users-blade.png)
6874

@@ -83,4 +89,4 @@ After you've added your users, you can perform the following basic processes:
8389

8490
- [Work with dynamic groups and users](../users-groups-roles/groups-create-rule.md)
8591

86-
Or you can perform other user management tasks, such as [adding guest users from another directory](../b2b/what-is-b2b.md) or [restoring a deleted user](active-directory-users-restore.md). For more information about other available actions, see [Azure Active Directory user management documentation](../users-groups-roles/index.yml).
92+
Or you can perform other user management tasks, such as [adding guest users from another Azure AD organization](../b2b/what-is-b2b.md) or [restoring a deleted user](active-directory-users-restore.md). For more information about other available actions, see [Azure Active Directory user management documentation](../users-groups-roles/index.yml).
95.1 KB
Loading

0 commit comments

Comments
 (0)