Skip to content

Commit 4aa98b8

Browse files
authored
Merge branch 'main' into five-memo-22-09-articles
2 parents 2d4ad6c + ecfb160 commit 4aa98b8

File tree

647 files changed

+8911
-5303
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

647 files changed

+8911
-5303
lines changed

.openpublishing.publish.config.json

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -860,6 +860,12 @@
860860
"url": "https://github.com/Azure/azure-webpubsub",
861861
"branch": "main",
862862
"branch_mapping": {}
863+
},
864+
{
865+
"path_to_root": "functions-sql-todo-sample",
866+
"url": "https://github.com/Azure-Samples/azure-sql-binding-func-dotnet-todo",
867+
"branch": "docs-snippets",
868+
"branch_mapping": {}
863869
}
864870

865871
],
@@ -885,6 +891,7 @@
885891
"redirection_files": [
886892
".openpublishing.redirection.json",
887893
".openpublishing.redirection.active-directory.json",
894+
".openpublishing.redirection.azure-blob.json",
888895
".openpublishing.redirection.azure-sql.json",
889896
"articles/data-factory/.openpublishing.redirection.data-factory.json",
890897
".openpublishing.redirection.defender-for-cloud.json",
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/storage/blobs/storage-upload-process-images.md",
5+
"redirect_url": "/azure/storage/blobs/blob-upload-function-trigger",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/storage/blobs/storage-secure-access-application.md",
10+
"redirect_url": "/azure/storage/blobs/blob-upload-function-trigger",
11+
"redirect_document_id": true
12+
},
13+
{
14+
"source_path_from_root": "/articles/storage/blobs/storage-monitor-troubleshoot-storage-application.md",
15+
"redirect_url": "/azure/storage/blobs/blob-upload-function-trigger",
16+
"redirect_document_id": false
17+
}
18+
]
19+
}

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/31/2022
11+
ms.date: 04/12/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -177,7 +177,11 @@ Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6Ik5HVEZ2ZEstZn
177177
```
178178

179179
## 4. Refresh the token
180-
Access tokens and ID tokens are short-lived. After they expire, you must refresh them to continue to access resources. To do this, submit another POST request to the `/token` endpoint. This time, provide the `refresh_token` instead of the `code`:
180+
181+
Access tokens and ID tokens are short-lived. After they expire, you must refresh them to continue to access resources. When you refresh the access token, Azure AD B2C returns a new token. The refreshed access token will have updated `nbf` (not before), `iat` (issued at), and `exp` (expiration) claim values. All other claim values will be the same as the originally issued access token.
182+
183+
184+
To refresh the toke, submit another POST request to the `/token` endpoint. This time, provide the `refresh_token` instead of the `code`:
181185

182186
```http
183187
POST https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/token HTTP/1.1

articles/active-directory-b2c/custom-email-mailjet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ If you don't already have one, start by setting up a Mailjet account (Azure cust
3737

3838
1. Follow the setup instructions at [Create a Mailjet Account](https://www.mailjet.com/guides/azure-mailjet-developer-resource-user-guide/enabling-mailjet/).
3939
1. To be able to send email, [register and validate](https://www.mailjet.com/guides/azure-mailjet-developer-resource-user-guide/enabling-mailjet/#how-to-configure-mailjet-for-use) your Sender email address or domain.
40-
2. Navigate to the [API Key Management page](https://app.mailjet.com/account/api_keys). Record the **API Key** and **Secret Key** for use in a later step. Both keys are generated automatically when your account is created.
40+
2. Navigate to the [API Key Management page](https://dev.mailjet.com/email/guides/senders-and-domains/#use-a-sender-on-all-api-keys-(metasender)). Record the **API Key** and **Secret Key** for use in a later step. Both keys are generated automatically when your account is created.
4141

4242
> [!IMPORTANT]
4343
> Mailjet offers customers the ability to send emails from shared IP and [dedicated IP addresses](https://documentation.mailjet.com/hc/articles/360043101973-What-is-a-dedicated-IP). When using dedicated IP addresses, you need to build your own reputation properly with an IP address warm-up. For more information, see [How do I warm up my IP ?](https://documentation.mailjet.com/hc/articles/1260803352789-How-do-I-warm-up-my-IP-).

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 43 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 03/10/2021
11+
ms.date: 04/12/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -422,6 +422,48 @@ The following are the IDs for a [Verification display control](display-control-v
422422
</LocalizedResources>
423423
```
424424

425+
## TOTP MFA controls display control user interface elements
426+
427+
The following are the IDs for a [time-based one-time password (TOTP) display control](display-control-time-based-one-time-password.md) with [page layout version](page-layout.md) 2.1.9 and later.
428+
429+
| ID | Default value |
430+
| --- | ------------- |
431+
|title_text |Download the Microsoft Authenticator using the download links for iOS and Android or use any other authenticator app of your choice. |
432+
| DN |Once you've downloaded the Authenticator app, you can use any of the methods below to continue with enrollment. |
433+
|DisplayName |Once you've downloaded the Authenticator app, you can use any of the methods below to continue with enrollment. |
434+
|title_text |Scan the QR code |
435+
|info_msg |You can download the Microsoft Authenticator app or use any other authenticator app of your choice. |
436+
|link_text |Can't scan? Try this |
437+
|title_text| Enter the account details manually. |
438+
|account_name | Account Name: |
439+
|display_prefix | Secret |
440+
|collapse_text | Still having trouble? |
441+
|DisplayName | Enter the verification code from your authenticator app​.|
442+
|DisplayName | Enter your code. |
443+
| button_continue | Verify |
444+
445+
### TOTP MFA controls display control example
446+
447+
```xml
448+
<LocalizedResources Id="api.selfasserted.totp.en">
449+
<LocalizedStrings>
450+
<LocalizedString ElementType="DisplayControl" ElementId="authenticatorAppIconControl" StringId="title_text">Download the Microsoft Authenticator using the download links for iOS and Android or use any other authenticator app of your choice.</LocalizedString>
451+
<LocalizedString ElementType="DisplayControl" ElementId="authenticatorAppIconControl" StringId="DN">Once you&#39;ve downloaded the Authenticator app, you can use any of the methods below to continue with enrollment.</LocalizedString>
452+
<LocalizedString ElementType="ClaimType" ElementId="QrCodeScanInstruction" StringId="DisplayName">Once you've downloaded the Authenticator app, you can use any of the methods below to continue with enrollment.</LocalizedString>
453+
<LocalizedString ElementType="DisplayControl" ElementId="totpQrCodeControl" StringId="title_text">Scan the QR code</LocalizedString>
454+
<LocalizedString ElementType="DisplayControl" ElementId="totpQrCodeControl" StringId="info_msg">You can download the Microsoft Authenticator app or use any other authenticator app of your choice.</LocalizedString>
455+
<LocalizedString ElementType="DisplayControl" ElementId="totpQrCodeControl" StringId="link_text">Can&#39;t scan? Try this</LocalizedString>
456+
<LocalizedString ElementType="DisplayControl" ElementId="authenticatorInfoControl" StringId="title_text">Enter the account details manually</LocalizedString>
457+
<LocalizedString ElementType="DisplayControl" ElementId="authenticatorInfoControl" StringId="account_name">Account Name:</LocalizedString>
458+
<LocalizedString ElementType="DisplayControl" ElementId="authenticatorInfoControl" StringId="display_prefix">Secret</LocalizedString>
459+
<LocalizedString ElementType="DisplayControl" ElementId="authenticatorInfoControl" StringId="collapse_text">Still having trouble?</LocalizedString>
460+
<LocalizedString ElementType="ClaimType" ElementId="QrCodeVerifyInstruction" StringId="DisplayName">Enter the verification code from your authenticator app​.</LocalizedString>
461+
<LocalizedString ElementType="ClaimType" ElementId="otpCode" StringId="DisplayName">Enter your code.</LocalizedString>
462+
<LocalizedString ElementType="UxElement" StringId="button_continue">Verify</LocalizedString>
463+
</LocalizedStrings>
464+
</LocalizedResources>
465+
```
466+
425467
## Restful service error messages
426468

427469
The following are the IDs for [Restful service technical profile](restful-technical-profile.md) error messages:

articles/active-directory-b2c/openid-connect.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 02/07/2022
11+
ms.date: 04/12/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -214,7 +214,9 @@ Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6Ik5HVEZ2ZEstZn
214214

215215
## Refresh the token
216216

217-
ID tokens expire in a short period of time. Refresh the tokens after they expire to continue being able to access resources. You can refresh a token by submitting another `POST` request to the `/token` endpoint. This time, provide the `refresh_token` parameter instead of the `code` parameter:
217+
Access tokens and ID tokens are short-lived. After they expire, you must refresh them to continue to access resources. When you refresh the access token, Azure AD B2C returns a new token. The refreshed access token will have updated `nbf` (not before), `iat` (issued at), and `exp` (expiration) claim values. All other claim values will be the same as the originally issued access token.
218+
219+
Refresh a token by submitting another `POST` request to the `/token` endpoint. This time, provide the `refresh_token` parameter instead of the `code` parameter:
218220

219221
```http
220222
POST https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/token HTTP/1.1

articles/active-directory-b2c/page-layout.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/08/2022
12+
ms.date: 04/12/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -52,6 +52,11 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
5252

5353
## Self-asserted page (selfasserted)
5454

55+
**2.1.10**
56+
57+
- Correcting to the tab index
58+
- Fixing WCAG 2.1 accessibility and screen reader issues
59+
5560
**2.1.9**
5661

5762
- TOTP multifactor authentication support. Adding links that allows users to download and install the Microsoft authenticator app to complete the enrollment of the TOTP on the authenticator.

articles/active-directory/app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 12/10/2021
11+
ms.date: 04/11/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -25,7 +25,7 @@ Scoping filters can be used differently depending on the type of provisioning co
2525
* **Outbound provisioning from Azure AD to SaaS applications**. When Azure AD is the source system, [user and group assignments](../manage-apps/assign-user-or-group-access-portal.md) are the most common method for determining which users are in scope for provisioning. These assignments also are used for enabling single sign-on and provide a single method to manage access and provisioning. Scoping filters can be used optionally, in addition to assignments or instead of them, to filter users based on attribute values.
2626

2727
>[!TIP]
28-
> You can disable provisioning based on assignments for an enterprise application by changing settings in the [Scope](../app-provisioning/user-provisioning.md#how-do-i-set-up-automatic-provisioning-to-an-application) menu under the provisioning settings to **Sync all users and groups**.
28+
> The more users and groups in scope for provisioning, the longer the synchronization process can take. Setting the scope to sync assigned users and groups, limiting the number of groups assigned to the app, and limiting the size of the groups will reduce the time it takes to synchronize everyone that is in scope.
2929
3030
* **Inbound provisioning from HCM applications to Azure AD and Active Directory**. When an [HCM application such as Workday](../saas-apps/workday-tutorial.md) is the source system, scoping filters are the primary method for determining which users should be provisioned from the HCM application to Active Directory or Azure AD.
3131

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenhoran
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 04/04/2022
10+
ms.date: 04/11/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -138,8 +138,21 @@ You can also check whether all the required ports are open.
138138
- Microsoft Azure AD Connect Agent Updater
139139
- Microsoft Azure AD Connect Provisioning Agent Package
140140

141+
### Provisioning agent history
142+
This article lists the versions and features of Azure Active Directory Connect Provisioning Agent that have been released. The Azure AD team regularly updates the Provisioning Agent with new features and functionality. Please ensure that you do not use the same agent for on-prem provisioning and Cloud Sync / HR-driven provisioning.
141143

144+
Microsoft provides direct support for the latest agent version and one version before.
142145

146+
## Download link
147+
You can download the latest version of the agent using [this link](https://aka.ms/onpremprovisioningagent).
148+
149+
## 1.1.846.0
150+
151+
April 11th, 2022 - released for download
152+
153+
### Fixed issues
154+
155+
- We added support for ObjectGUID as an anchor for the generic LDAP connector when provisioning users into AD LDS.
143156

144157

145158
## Next steps

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ An Azure AD Kerberos Server object is created in your on-premises Active Directo
3333
Azure AD generates a Kerberos TGT for the user's on-premises Active Directory domain. The TGT includes the user's SID only, and no authorization data.
3434

3535
1. The TGT is returned to the client along with the user's Azure AD Primary Refresh Token (PRT).
36-
1. The client machine contacts an on-premises Azure AD DC and trades the partial TGT for a fully formed TGT.
36+
1. The client machine contacts an on-premises Active Directory Domain Controller and trades the partial TGT for a fully formed TGT.
3737
1. The client machine now has an Azure AD PRT and a full Active Directory TGT and can access both cloud and on-premises resources.
3838

3939
## Prerequisites

0 commit comments

Comments
 (0)