Skip to content

Commit 4c3d6c2

Browse files
authored
Merge pull request #93621 from MicrosoftDocs/master
10/25 PM Publish
2 parents 5205c71 + 28e8c26 commit 4c3d6c2

File tree

1,065 files changed

+10356
-2916
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,065 files changed

+10356
-2916
lines changed

.openpublishing.redirection.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36168,6 +36168,46 @@
3616836168
"redirect_url": "/azure/key-vault/vs-key-vault-add-connected-service",
3616936169
"redirect_document_id": false
3617036170
},
36171+
{
36172+
"source_path": "articles/iot-central/core/howto-create-event-rules-pnp.md",
36173+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36174+
"redirect_document_id": false
36175+
},
36176+
{
36177+
"source_path": "articles/iot-central/core/howto-create-telemetry-rules-pnp.md",
36178+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36179+
"redirect_document_id": false
36180+
},
36181+
{
36182+
"source_path": "articles/iot-central/core/tutorial-configure-rules-pnp.md",
36183+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36184+
"redirect_document_id": false
36185+
},
36186+
{
36187+
"source_path": "articles/iot-central/core/tutorial-monitor-devices-pnp.md",
36188+
"redirect_url": "/azure/iot-central/core/quick-monitor-devices-pnp",
36189+
"redirect_document_id": false
36190+
},
36191+
{
36192+
"source_path": "articles/iot-central/tutorial-add-device-pnp.md",
36193+
"redirect_url": "/azure/iot-central/quick-create-pnp-device-pnp",
36194+
"redirect_document_id": false
36195+
},
36196+
{
36197+
"source_path": "articles/iot-central/tutorial-define-device-type-pnp.md",
36198+
"redirect_url": "/azure/iot-central/quick-create-pnp-device-pnp",
36199+
"redirect_document_id": false
36200+
},
36201+
{
36202+
"source_path": "articles/iot-central/howto-export-data-blob-storage-pnp.md",
36203+
"redirect_url": "/azure/iot-central/howto-export-data-pnp",
36204+
"redirect_document_id": false
36205+
},
36206+
{
36207+
"source_path": "articles/iot-central/howto-export-data-event-hubs-service-bus-pnp.md",
36208+
"redirect_url": "/azure/iot-central/howto-export-data-pnp",
36209+
"redirect_document_id": false
36210+
},
3617136211
{
3617236212
"source_path": "articles/iot-central/howto-generate-connection-string.md",
3617336213
"redirect_url": "/azure/iot-central",

articles/active-directory-b2c/active-directory-b2c-how-to-enable-billing.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -41,14 +41,14 @@ Here's how to make the switch to MAU billing for an existing Azure AD B2C resour
4141

4242
1. Sign in to the [Azure portal](https://portal.azure.com) as the subscription owner.
4343
1. Select the **Directory + subscription** filter in the top menu, and then select the Azure AD B2C directory that you want to upgrade to MAU billing.<br/>
44-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-01-select-b2c-directory.png" alt-text="Directory and subscription filter in Azure portal":::
44+
![Directory and subscription filter in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-01-select-b2c-directory.png)
4545
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
4646
1. On the **Overview** page of the Azure AD B2C tenant, select the link under **Resource name**. You're directed to the Azure AD B2C resource in your Azure AD tenant.<br/>
47-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-02-b2c-resource-link.png" alt-text="Azure AD B2C resource link highlighted in Azure portal":::
47+
![Azure AD B2C resource link highlighted in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-02-b2c-resource-link.png)
4848
1. On the **Overview** page of the Azure AD B2C resource, under **Billable Units**, select the **Per Authentication (Change to MAU)** link.<br/>
49-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-03-change-to-mau-link.png" alt-text="Change to MAU link highlighted in Azure portal":::
49+
![Change to MAU link highlighted in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-03-change-to-mau-link.png)
5050
1. Select **Confirm** to complete the upgrade to MAU billing.<br/>
51-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-04-confirm-change-to-mau.png" alt-text="MAU-based billing confirmation dialog in Azure portal":::
51+
![MAU-based billing confirmation dialog in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-04-confirm-change-to-mau.png)
5252

5353
### What to expect when you transition to MAU billing from per-authentication billing
5454

articles/active-directory-b2c/active-directory-b2c-tutorials-spa.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,9 @@ The sample supports sign-up, sign-in, profile editing, and password reset. This
111111
112112
### Sign up using an email address
113113
114+
> [!WARNING]
115+
> After sign-up or sign-in, you might see an [insufficient permissions error](#error-insufficient-permissions). Due to the code sample's current implementation, this error is expected. This issue will be resolved in a future version of the code sample, at which time this warning will be removed.
116+
114117
1. Select **Login** to initiate the *B2C_1_signupsignin1* user flow you specified in an earlier step.
115118
1. Azure AD B2C presents a sign-in page with a sign-up link. Since you don't yet have an account, select the **Sign up now** link.
116119
1. The sign-up workflow presents a page to collect and verify the user's identity using an email address. The sign-up workflow also collects the user's password and the requested attributes defined in the user flow.
@@ -127,15 +130,15 @@ You can now use your email address and password to sign in to the application.
127130
128131
### Error: insufficient permissions
129132
130-
After you sign in, the app displays an insufficient permissions error - this is **expected**:
133+
After you sign in, the application may return an insufficient permissions error:
131134
132135
```Output
133136
ServerError: AADB2C90205: This application does not have sufficient permissions against this web resource to perform the operation.
134137
Correlation ID: ce15bbcc-0000-0000-0000-494a52e95cd7
135138
Timestamp: 2019-07-20 22:17:27Z
136139
```
137140
138-
You receive this error because the web application is attempting to access a web API protected by the demo directory, *fabrikamb2c*. Because your access token is valid only for your Azure AD directory, the API call is therefore unauthorized.
141+
You receive this error because the web application is attempting to access a web API protected by the demo directory, *fabrikamb2c*. Because your access token is valid only for your Azure AD directory, the API call is unauthorized.
139142
140143
To fix this error, continue on to the next tutorial in the series (see [Next steps](#next-steps)) to create a protected web API for your directory.
141144

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ The following are sample test cases for passwordless authentication with securit
183183
| The user can sign in with FIDO2 device (1809) | User can select Security Key from sign in window, and successfully sign in. |
184184
| The user can register FIDO2 device (1903) | User can register FIDO2 device at Settings > Accounts > sign in options > Security Key |
185185
| The user can reset FIDO2 device (1903) | User can reset FIDO2 device at Settings > Accounts > sign in options > Security Key |
186-
| The user can sign in with FIDO2 device (1809) | User can select Security Key from sign in window, and successfully sign in. |
186+
| The user can sign in with FIDO2 device (1903) | User can select Security Key from sign in window, and successfully sign in. |
187187

188188
**Passwordless FIDO sign in to Azure AD web apps**
189189

articles/active-directory/develop/migrate-objc-adal-msal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ There are two ways to provide scopes in MSAL:
7171

7272
* Provide a list of all the permissions your apps needs. For example:
7373

74-
`@[@"https://graph.microsot.com/directory.read", @"https://graph.microsoft.com/directory.write"]`
74+
`@[@"https://graph.microsoft.com/directory.read", @"https://graph.microsoft.com/directory.write"]`
7575

7676
In this case, the app requests the `directory.read` and `directory.write` permissions. The user will be asked to consent for those permissions if they haven't consented to them before for this app. The application might also receive additional permissions that the user has already consented to for the application. The user will only be prompted to consent for new permissions, or permissions that haven't been granted.
7777

articles/active-directory/develop/msal-js-known-issues-ie-edge-browsers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Known issues on browsers (Microsoft Authentication Library for JavaScript)
2+
title: Known issues on Internet Explorer and Microsoft Edge (MSAL for JavaScript)
33
titleSuffix: Microsoft identity platform
44
description: Learn about know issues when using the Microsoft Authentication Library for JavaScript (MSAL.js) with Internet Explorer and Microsoft Edge browsers.
55
services: active-directory

articles/active-directory/develop/msal-js-known-issues-safari-browser.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Known issues on browsers (Microsoft Authentication Library for JavaScript)
2+
title: Known issues on Safari browser (MSAL for JavaScript)
33
titleSuffix: Microsoft identity platform
44
description: Learn about know issues when using the Microsoft Authentication Library for JavaScript (MSAL.js) with Safari browser.
55
services: active-directory

articles/active-directory/develop/tutorial-v2-android.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,9 @@ ms.collection: M365-identity-device-management
2121

2222
# Sign in users and call the Microsoft Graph from an Android app
2323

24+
> [!NOTE]
25+
> This tutorial has not yet been updated to work with MSAL for Android version 1.0 library. It works with an earlier version, as configured in this tutorial.
26+
2427
In this tutorial, you'll learn how to integrate an Android app with the Microsoft identity platform. Your app will sign in a user, get an access token to call the Microsoft Graph API, and make a request to the Microsoft Graph API.
2528

2629
When you've completed the guide, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory.
@@ -173,7 +176,7 @@ This tutorial will create a new project. If you want to download the completed t
173176

174177
```gradle
175178
implementation 'com.android.volley:volley:1.1.1'
176-
implementation 'com.microsoft.identity.client:msal:1.0.+'
179+
implementation 'com.microsoft.identity.client:msal:0.3+'
177180
```
178181

179182
### Use MSAL

articles/active-directory/governance/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,8 @@
4242
items:
4343
- name: Delegate to catalog creators
4444
href: entitlement-management-delegate-catalog.md
45+
- name: Add a connected organization
46+
href: entitlement-management-organization.md
4547
- name: Govern access for external users
4648
href: entitlement-management-external-users.md
4749
- name: View reports and logs

articles/active-directory/governance/entitlement-management-delegate.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,7 @@ The following table lists the tasks that the entitlement management roles can pe
9898
| Task | Admin | Catalog creator | Catalog owner | Access package manager |
9999
| --- | :---: | :---: | :---: | :---: |
100100
| [Delegate to a catalog creator](entitlement-management-delegate-catalog.md) | :heavy_check_mark: | | | |
101+
| [Add a connected organization](entitlement-management-organization.md) | :heavy_check_mark: | | | |
101102
| [Create a new catalog](entitlement-management-catalog-create.md) | :heavy_check_mark: | :heavy_check_mark: | | |
102103
| [Add a resource to a catalog](entitlement-management-catalog-create.md#add-resources-to-a-catalog) | :heavy_check_mark: | | :heavy_check_mark: | |
103104
| [Add a catalog owner](entitlement-management-catalog-create.md#add-additional-catalog-owners) | :heavy_check_mark: | | :heavy_check_mark: | |

0 commit comments

Comments
 (0)