Skip to content

Commit 4b408dc

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into arcsight
2 parents 085cd6a + 9bd9e10 commit 4b408dc

File tree

267 files changed

+4217
-1837
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

267 files changed

+4217
-1837
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -233,27 +233,27 @@
233233
},
234234
{
235235
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-examples.md",
236-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
236+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
237237
"redirect_document_id": false
238238
},
239239
{
240240
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-options.md",
241-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
241+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
242242
"redirect_document_id": false
243243
},
244244
{
245245
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-overview.md",
246-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
246+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
247247
"redirect_document_id": false
248248
},
249249
{
250250
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-tasks.md",
251-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
251+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
252252
"redirect_document_id": false
253253
},
254254
{
255255
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-tiles.md",
256-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
256+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
257257
"redirect_document_id": false
258258
},
259259
{
@@ -268,7 +268,7 @@
268268
},
269269
{
270270
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-add-text.md",
271-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-add-workbook-elements",
271+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-create-workbook",
272272
"redirect_document_id": false
273273
},
274274
{
@@ -341,6 +341,11 @@
341341
"redirect_url": "/azure/data-explorer/data-explorer-insights",
342342
"redirect_document_id": false
343343
},
344+
{
345+
"source_path_from_root": "/articles/azure-monitor/insights/troubleshoot-workbooks.md" ,
346+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
347+
"redirect_document_id": false
348+
},
344349
{
345350
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-ga-release-faq.md" ,
346351
"redirect_url": "/azure/azure-monitor/faq#vm-insights",

articles/active-directory/develop/active-directory-certificate-credentials.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ To compute the assertion, you can use one of the many JWT libraries in the langu
3939

4040
Claim type | Value | Description
4141
---------- | ---------- | ----------
42-
`aud` | `https://login.microsoftonline.com/{tenantId}/V2.0/token` | The "aud" (audience) claim identifies the recipients that the JWT is intended for (here Azure AD) See [RFC 7519, Section 4.1.3](https://tools.ietf.org/html/rfc7519#section-4.1.3). In this case, that recipient is the login server (login.microsoftonline.com).
42+
`aud` | `https://login.microsoftonline.com/{tenantId}/oauth2/V2.0/token` | The "aud" (audience) claim identifies the recipients that the JWT is intended for (here Azure AD) See [RFC 7519, Section 4.1.3](https://tools.ietf.org/html/rfc7519#section-4.1.3). In this case, that recipient is the login server (login.microsoftonline.com).
4343
`exp` | 1601519414 | The "exp" (expiration time) claim identifies the expiration time on or after which the JWT MUST NOT be accepted for processing. See [RFC 7519, Section 4.1.4](https://tools.ietf.org/html/rfc7519#section-4.1.4). This allows the assertion to be used until then, so keep it short - 5-10 minutes after `nbf` at most. Azure AD does not place restrictions on the `exp` time currently.
4444
`iss` | {ClientID} | The "iss" (issuer) claim identifies the principal that issued the JWT, in this case your client application. Use the GUID application ID.
4545
`jti` | (a Guid) | The "jti" (JWT ID) claim provides a unique identifier for the JWT. The identifier value MUST be assigned in a manner that ensures that there is a negligible probability that the same value will be accidentally assigned to a different data object; if the application uses multiple issuers, collisions MUST be prevented among values produced by different issuers as well. The "jti" value is a case-sensitive string. [RFC 7519, Section 4.1.7](https://tools.ietf.org/html/rfc7519#section-4.1.7)

articles/active-directory/develop/reference-third-party-cookies-spas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ For the Microsoft identity platform, SPAs and native clients follow similar prot
4141

4242
SPAs have two additional restrictions:
4343

44-
- [The redirect URI must be marked as type `spa`](v2-oauth2-auth-code-flow.md#redirect-uri-setup-required-for-single-page-apps) to enable CORS on login endpoints.
44+
- [The redirect URI must be marked as type `spa`](v2-oauth2-auth-code-flow.md#redirect-uris-for-single-page-apps-spas) to enable CORS on login endpoints.
4545
- Refresh tokens issued through the authorization code flow to `spa` redirect URIs have a 24-hour lifetime rather than a 90-day lifetime.
4646

4747
:::image type="content" source="media/v2-oauth-auth-code-spa/active-directory-oauth-code-spa.svg" alt-text="Diagram showing the OAuth 2 authorization code flow between a single-page app and the security token service endpoint." border="false":::

articles/active-directory/develop/v2-oauth2-auth-code-flow.md

Lines changed: 24 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,41 +1,50 @@
11
---
22
title: Microsoft identity platform and OAuth 2.0 authorization code flow
3-
description: Build web applications using the Microsoft identity platform implementation of the OAuth 2.0 authentication protocol.
4-
services: active-directory
3+
description: Protocol reference for the Microsoft identity platform's implementation of the OAuth 2.0 authorization code grant
54
author: davidmu1
65
manager: CelesteDG
76

87
ms.service: active-directory
98
ms.subservice: develop
10-
ms.workload: identity
11-
ms.topic: conceptual
12-
ms.date: 02/02/2022
9+
ms.topic: reference
10+
ms.date: 07/29/2022
1311
ms.author: davidmu
1412
ms.reviewer: ludwignick
1513
ms.custom: aaddev, identityplatformtop40
1614
---
1715

1816
# Microsoft identity platform and OAuth 2.0 authorization code flow
1917

20-
The OAuth 2.0 authorization code grant can be used in apps that are installed on a device to gain access to protected resources, such as web APIs. Using the Microsoft identity platform implementation of OAuth 2.0 and Open ID Connect (OIDC), you can add sign in and API access to your mobile and desktop apps.
18+
The OAuth 2.0 authorization code grant type, or _auth code flow_, enables a client application to obtain authorized access to protected resources like web APIs. The auth code flow requires a user-agent that supports redirection from the authorization server (the Microsoft identity platform) back to your application. For example, a web browser, desktop, or mobile application operated by a user to sign in to your app and access their data.
2119

22-
This article describes how to program directly against the protocol in your application using any language. When possible, we recommend you use the supported Microsoft Authentication Libraries (MSAL) to [acquire tokens and call secured web APIs](authentication-flows-app-scenarios.md#scenarios-and-supported-authentication-flows). For more information, look at [sample apps that use MSAL](sample-v2-code.md).
20+
This article describes low-level protocol details usually required only when manually crafting and issuing raw HTTP requests to execute the flow, which we do **not** recommend. Instead, use a [Microsoft-built and supported authentication library](reference-v2-libraries.md) to get security tokens and call protected web APIs in your apps.
2321

24-
The OAuth 2.0 authorization code flow is described in [section 4.1 of the OAuth 2.0 specification](https://tools.ietf.org/html/rfc6749). With OIDC, this flow does authentication and authorization for most app types. These types include [single page apps](v2-app-types.md#single-page-apps-javascript), [web apps](v2-app-types.md#web-apps), and [natively installed apps](v2-app-types.md#mobile-and-native-apps). The flow enables apps to securely acquire an `access_token` that can be used to access resources secured by the Microsoft identity platform. Apps can refresh tokens to get other access tokens and ID tokens for the signed in user.
22+
## Applications that support the auth code flow
2523

26-
[!INCLUDE [try-in-postman-link](includes/try-in-postman-link.md)]
24+
Use the auth code flow paired with Proof Key for Code Exchange (PKCE) and OpenID Connect (OIDC) to get access tokens and ID tokens in these types of apps:
25+
26+
- [Single-page web application (SPA)](v2-app-types.md#single-page-apps-javascript)
27+
- [Standard (server-based) web application](v2-app-types.md#web-apps)
28+
- [Desktop and mobile apps](v2-app-types.md#mobile-and-native-apps)
29+
30+
## Protocol details
2731

28-
## Protocol diagram
32+
The OAuth 2.0 authorization code flow is described in [section 4.1 of the OAuth 2.0 specification](https://tools.ietf.org/html/rfc6749). Apps using the OAuth 2.0 authorization code flow acquire an `access_token` to include in requests to resources protected by the Microsoft identity platform (typically APIs). Apps can also request new ID and access tokens for previously authenticated entities by using a refresh mechanism.
2933

30-
This diagram provides a high-level overview of the authentication flow for an application:
34+
[!INCLUDE [try-in-postman-link](includes/try-in-postman-link.md)]
35+
36+
This diagram shows a high-level view of the authentication flow:
3137

3238
![Diagram shows OAuth authorization code flow. Native app and Web A P I interact by using tokens as described in this article.](./media/v2-oauth2-auth-code-flow/convergence-scenarios-native.svg)
3339

34-
## Redirect URI setup required for single-page apps
40+
## Redirect URIs for single-page apps (SPAs)
41+
42+
Redirect URIs for SPAs that use the auth code flow require special configuration.
3543

36-
The authorization code flow for single page applications requires additional setup. Follow the instructions for [creating your single-page application](scenario-spa-app-registration.md#redirect-uri-msaljs-20-with-auth-code-flow) to correctly mark your redirect URI as enabled for Cross-Origin Resource Sharing (CORS). To update an existing redirect URI to enable CORS, open the manifest editor and set the `type` field for your redirect URI to `spa` in the `replyUrlsWithType` section. Or, you can select the redirect URI in **Authentication** > **Web** and select URIs to migrate to using the authorization code flow.
44+
- **Add a redirect URI** that supports auth code flow with PKCE and cross-origin resource sharing (CORS): Follow the steps in [Redirect URI: MSAL.js 2.0 with auth code flow](scenario-spa-app-registration.md#redirect-uri-msaljs-20-with-auth-code-flow).
45+
- **Update a redirect URI**: Set the redirect URI's `type` to `spa` by using the [application manifest editor](reference-app-manifest.md) in the Azure portal.
3746

38-
The `spa` redirect type is backwards compatible with the implicit flow. Apps currently using the implicit flow to get tokens can move to the `spa` redirect URI type without issues and continue using the implicit flow.
47+
The `spa` redirect type is backward-compatible with the implicit flow. Apps currently using the implicit flow to get tokens can move to the `spa` redirect URI type without issues and continue using the implicit flow.
3948

4049
If you attempt to use the authorization code flow without setting up CORS for your redirect URI, you will see this error in the console:
4150

@@ -323,7 +332,7 @@ This example is an Error response:
323332
|`invalid_scope` | The scope requested by the app is invalid. | Update the value of the `scope` parameter in the authentication request to a valid value. |
324333

325334
> [!NOTE]
326-
> Single page apps may receive an `invalid_request` error indicating that cross-origin token redemption is permitted only for the 'Single-Page Application' client-type. This indicates that the redirect URI used to request the token has not been marked as a `spa` redirect URI. Review the [application registration steps](#redirect-uri-setup-required-for-single-page-apps) on how to enable this flow.
335+
> Single page apps may receive an `invalid_request` error indicating that cross-origin token redemption is permitted only for the 'Single-Page Application' client-type. This indicates that the redirect URI used to request the token has not been marked as a `spa` redirect URI. Review the [application registration steps](#redirect-uris-for-single-page-apps-spas) on how to enable this flow.
327336
328337
## Use the access token
329338

articles/active-directory/develop/v2-oauth2-on-behalf-of-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -213,8 +213,8 @@ A service-to-service request for a SAML assertion contains the following paramet
213213

214214
The response contains a SAML token encoded in UTF8 and Base64url.
215215

216-
- **SubjectConfirmationData for a SAML assertion sourced from an OBO call**: If the target application requires a recipient value in **SubjectConfirmationData**, then the value must be a non-wildcard Reply URL in the resource application configuration.
217-
- **The SubjectConfirmationData node**: The node can't contain an **InResponseTo** attribute since it's not part of a SAML response. The application receiving the SAML token must be able to accept the SAML assertion without an **InResponseTo** attribute.
216+
- **SubjectConfirmationData for a SAML assertion sourced from an OBO call**: If the target application requires a `Recipient` value in `SubjectConfirmationData`, then the value must be configured as the first non-wildcard Reply URL in the resource application configuration. Since the default Reply URL isn't used to determine the `Recipient` value, you might have to reorder the Reply URLs in the application configuration.
217+
- **The SubjectConfirmationData node**: The node can't contain an `InResponseTo` attribute since it's not part of a SAML response. The application receiving the SAML token must be able to accept the SAML assertion without an `InResponseTo` attribute.
218218
- **API permissions**: You have to [add the necessary API permissions](quickstart-configure-app-access-web-apis.md) on the middle-tier application to allow access to the SAML application, so that it can request a token for the `/.default` scope of the SAML application.
219219
- **Consent**: Consent must have been granted to receive a SAML token containing user data on an OAuth flow. For information, see [Gaining consent for the middle-tier application](#gaining-consent-for-the-middle-tier-application) below.
220220

articles/active-directory/devices/concept-azure-ad-join-hybrid.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,12 +27,12 @@ Hybrid Azure AD joined devices require network line of sight to your on-premises
2727
| **Primary audience** | Suitable for hybrid organizations with existing on-premises AD infrastructure |
2828
| | Applicable to all users in an organization |
2929
| **Device ownership** | Organization |
30-
| **Operating Systems** | Windows 10 or newer, 8.1 and 7 |
31-
| | Windows Server 2008/R2, 2012/R2, 2016 and 2019 |
32-
| **Provisioning** | Windows 10 or newer, Windows Server 2016/2019 |
30+
| **Operating Systems** | Windows 11, Windows 10 or 8.1 |
31+
| | Windows Server 2008/R2, 2012/R2, 2016, 2019 and 2022 |
32+
| **Provisioning** | Windows 11, Windows 10, Windows Server 2016/2019/2022 |
3333
| | Domain join by IT and autojoin via Azure AD Connect or ADFS config |
3434
| | Domain join by Windows Autopilot and autojoin via Azure AD Connect or ADFS config |
35-
| | Windows 8.1, Windows 7, Windows Server 2012 R2, Windows Server 2012, and Windows Server 2008 R2 - Require MSI |
35+
| | Windows 8.1, Windows Server 2012 R2, Windows Server 2012, and Windows Server 2008 R2 - Require MSI |
3636
| **Device sign in options** | Organizational accounts using: |
3737
| | Password |
3838
| | Windows Hello for Business for Win10 and above |
@@ -48,7 +48,7 @@ Hybrid Azure AD joined devices require network line of sight to your on-premises
4848

4949
Use Azure AD hybrid joined devices if:
5050

51-
- You support down-level devices running Windows 7 and 8.1.
51+
- You support down-level devices running 8.1.
5252
- You want to continue to use [Group Policy](/mem/configmgr/comanage/faq#my-environment-has-too-many-group-policy-objects-and-legacy-authenticated-apps--do-i-have-to-use-hybrid-azure-ad-) to manage device configuration.
5353
- You want to continue to use existing imaging solutions to deploy and configure devices.
5454
- You have Win32 apps deployed to these devices that rely on Active Directory machine authentication.

0 commit comments

Comments
 (0)