Skip to content

Commit 4cee71a

Browse files
authored
Merge pull request #103290 from MicrosoftDocs/master
2/4 AM Publish again
2 parents ef18da0 + 59bce29 commit 4cee71a

File tree

131 files changed

+1469
-2491
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

131 files changed

+1469
-2491
lines changed

.openpublishing.redirection.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47875,6 +47875,24 @@
4787547875
"source_path": "articles/cognitive-services/speech-service/quickstart-platform-python.md",
4787647876
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/setup-platform?pivots=programming-language-python",
4787747877
"redirect_document_id": false
47878+
},
47879+
{
47880+
"source_path": "articles/cognitive-services/Bing-News-Search/vs-bing-news-search-connected-service.md",
47881+
"redirect_url": "/azure/cognitive-services/bing-news-search/search-the-web",
47882+
"redirect_document_id": false
47883+
},
47884+
{
47885+
"source_path": "articles/cognitive-services/Computer-vision/vs-computer-vision-connected-service.md",
47886+
"redirect_url": "/azure/cognitive-services/computer-vision/",
47887+
"redirect_document_id": false
47888+
}, {
47889+
"source_path": "articles/cognitive-services/Face/vs-face-connected-service.md",
47890+
"redirect_url": "/azure/cognitive-services/face/",
47891+
"redirect_document_id": false
47892+
}, {
47893+
"source_path": "articles/cognitive-services/text-analytics/vs-text-connected-service.md",
47894+
"redirect_url": "/azure/cognitive-services/text-analytics/",
47895+
"redirect_document_id": false
4787847896
}
4787947897
]
4788047898
}

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -142,11 +142,11 @@ The ID attribute of the **ContentDefinition** element specifies the type of page
142142
| **api.error** | [exception.cshtml](https://login.microsoftonline.com/static/tenant/default/exception.cshtml) | **Error page** - Displays an error page when an exception or an error is encountered. |
143143
| **api.idpselections** | [idpSelector.cshtml](https://login.microsoftonline.com/static/tenant/default/idpSelector.cshtml) | **Identity provider selection page** - Lists identity providers that users can choose from during sign-in. The options are usually enterprise identity providers, social identity providers such as Facebook and Google+, or local accounts. |
144144
| **api.idpselections.signup** | [idpSelector.cshtml](https://login.microsoftonline.com/static/tenant/default/idpSelector.cshtml) | **Identity provider selection for sign-up** - Lists identity providers that users can choose from during sign-up. The options are usually enterprise identity providers, social identity providers such as Facebook and Google+, or local accounts. |
145-
| **api.localaccountpasswordreset** | [selfasserted.html](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Forgot password page** - Displays a form that users must complete to initiate a password reset. |
146-
| **api.localaccountsignin** | [selfasserted.html](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Local account sign-in page** - Displays a form for signing in with a local account that's based on an email address or a user name. The form can contain a text input box and password entry box. |
147-
| **api.localaccountsignup** | [selfasserted.html](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Local account sign-up page** - Displays a form for signing up for a local account that's based on an email address or a user name. The form can contain various input controls, such as: a text input box, a password entry box, a radio button, single-select drop-down boxes, and multi-select check boxes. |
145+
| **api.localaccountpasswordreset** | [selfasserted.cshtml](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Forgot password page** - Displays a form that users must complete to initiate a password reset. |
146+
| **api.localaccountsignin** | [selfasserted.cshtml](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Local account sign-in page** - Displays a form for signing in with a local account that's based on an email address or a user name. The form can contain a text input box and password entry box. |
147+
| **api.localaccountsignup** | [selfasserted.cshtml](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Local account sign-up page** - Displays a form for signing up for a local account that's based on an email address or a user name. The form can contain various input controls, such as: a text input box, a password entry box, a radio button, single-select drop-down boxes, and multi-select check boxes. |
148148
| **api.phonefactor** | [multifactor-1.0.0.cshtml](https://login.microsoftonline.com/static/tenant/default/multifactor-1.0.0.cshtml) | **Multi-factor authentication page** - Verifies phone numbers, by using text or voice, during sign-up or sign-in. |
149-
| **api.selfasserted** | [selfasserted.html](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Social account sign-up page** - Displays a form that users must complete when they sign up by using an existing account from a social identity provider. This page is similar to the preceding social account sign up page, except for the password entry fields. |
150-
| **api.selfasserted.profileupdate** | [updateprofile.html](https://login.microsoftonline.com/static/tenant/default/updateProfile.cshtml) | **Profile update page** - Displays a form that users can access to update their profile. This page is similar to the social account sign up page, except for the password entry fields. |
151-
| **api.signuporsignin** | [unified.html](https://login.microsoftonline.com/static/tenant/default/unified.cshtml) | **Unified sign-up or sign-in page** - Handles the user sign-up and sign-in process. Users can use enterprise identity providers, social identity providers such as Facebook or Google+, or local accounts. |
149+
| **api.selfasserted** | [selfasserted.cshtml](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Social account sign-up page** - Displays a form that users must complete when they sign up by using an existing account from a social identity provider. This page is similar to the preceding social account sign up page, except for the password entry fields. |
150+
| **api.selfasserted.profileupdate** | [updateprofile.cshtml](https://login.microsoftonline.com/static/tenant/default/updateProfile.cshtml) | **Profile update page** - Displays a form that users can access to update their profile. This page is similar to the social account sign up page, except for the password entry fields. |
151+
| **api.signuporsignin** | [unified.cshtml](https://login.microsoftonline.com/static/tenant/default/unified.cshtml) | **Unified sign-up or sign-in page** - Handles the user sign-up and sign-in process. Users can use enterprise identity providers, social identity providers such as Facebook or Google+, or local accounts. |
152152

articles/active-directory/authentication/concept-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ Passwords are *not* written back in any of the following situations:
160160
* Any administrator-initiated end-user password reset from the [Microsoft 365 admin center](https://admin.microsoft.com)
161161

162162
> [!WARNING]
163-
> Use of the checkbox "User must change password at next logon" in on-premises Active Directory administrative tools like Active Directory Users and Computers or the Active Directory Administrative Center is supported as a preview feature of Azure AD Connect. For more information, see the article, [Implement password hash synchronization with Azure AD Connect sync](../hybrid/how-to-connect-password-hash-synchronization.md#public-preview-of-synchronizing-temporary-passwords-and-force-password-reset-on-next-logon).
163+
> Use of the checkbox "User must change password at next logon" in on-premises Active Directory administrative tools like Active Directory Users and Computers or the Active Directory Administrative Center is supported as a preview feature of Azure AD Connect. For more information, see the article, [Implement password hash synchronization with Azure AD Connect sync](../hybrid/how-to-connect-password-hash-synchronization.md#public-preview-of-synchronizing-temporary-passwords-and-force-password-change-on-next-logon).
164164
165165
## Next steps
166166

articles/active-directory/cloud-provisioning/concept-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ To view the schema and verify it, follow these steps.
6969
1. Go to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
7070
1. Sign in with your global administrator account.
7171
1. On the left, select **modify permissions** and ensure that **Directory.ReadWrite.All** is *Consented*.
72-
1. Run the query https://graph.microsoft.com/beta/serviceprincipals/. This query returns a list of service principals.
72+
1. Run the query https://graph.microsoft.com/beta/serviceprincipals/?$filter=startswith(Displayname,'Active'). This query returns a filtered list of service principals.
7373
1. Locate `"appDisplayName": "Active Directory to Azure Active Directory Provisioning"` and note the value for `"id"`.
7474
```
7575
"value": [

articles/active-directory/cloud-provisioning/reference-cloud-provisioning-faq.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,10 @@ Cloud provisioning is scheduled to run every 2 mins. Every 2 mins, any user, gro
2626

2727
This is expected. The failures are due to the user object not present in Azure AD. Once the user is provisioned to Azure AD, password hashes should provisioning in the subsequent run. Wait for a couple of runs and confirm that password hash sync no longer has the errors.
2828

29+
**Q: What happens if the Active Directory instance has attributes that are not supported by cloud provisoning (for instance, directory extensions)?**
30+
31+
Cloud provisioning will run and provision the supported attributes. The unsupported attributes will not be provisioned to Azure AD. Review the directory extensions in Active Directory and ensure that you don't need those attribute to flow to Azure AD. If one or more attributes are required, consider using Azure AD Connect sync or moving the required information to one of the supported attributes (for instance, extension attributes 1-15).
32+
2933
**Q: What's the difference between Azure AD Connect sync and cloud provisioning?**
3034

3135
With Azure AD Connect sync, provisioning runs on the on-premises sync server. Configuration is stored on the on-premises sync server. With Azure AD Connect cloud provisioning, the provisioning configuration is stored in the cloud and runs in the cloud as part of the Azure AD provisioning service.

articles/active-directory/cloud-provisioning/what-is-cloud-provisioning.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,8 @@ The following table provides a comparison between Azure AD Connect and Azure AD
4242
| Support for contact objects |||
4343
| Support for device objects || |
4444
| Allow basic customization for attribute flows |||
45+
| Sychronize Exchange online attributes |||
46+
| Synchronize extension attributes 1-15 |||
4547
| Synchronize customer defined AD attributes (directory extensions) || |
4648
| Support for Password Hash Sync |||
4749
| Support for Pass-Through Authentication |||
@@ -56,7 +58,7 @@ The following table provides a comparison between Azure AD Connect and Azure AD
5658
| Allow advanced customization for attribute flows || |
5759
| Support for writeback (passwords, devices, groups) || |
5860
| Azure AD Domain Services support|| |
59-
| Exchange hybrid configuration || |
61+
| [Exchange hybrid writeback](../hybrid/reference-connect-sync-attributes-synchronized.md#exchange-hybrid-writeback) || |
6062
| Support for more than 50,000 objects per AD domain || |
6163

6264
## Next steps
54.6 KB
Loading

articles/active-directory/develop/single-sign-on-macos-ios.md

Lines changed: 22 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: identity
17-
ms.date: 08/28/2019
17+
ms.date: 02/03/2020
1818
ms.author: twhitney
1919
ms.reviewer:
2020
ms.custom: aaddev
@@ -67,9 +67,9 @@ For the Microsoft identity platform to know which applications can share tokens,
6767

6868
The way the Microsoft identity platform tells apps that use the same Application ID apart is by their **Redirect URIs**. Each application can have multiple Redirect URIs registered in the onboarding portal. Each app in your suite will have a different redirect URI. For example:
6969

70-
App1 Redirect URI: `msauth.com.contoso.mytestapp1://auth`
71-
App2 Redirect URI: `msauth.com.contoso.mytestapp2://auth`
72-
App3 Redirect URI: `msauth.com.contoso.mytestapp3://auth`
70+
App1 Redirect URI: `msauth.com.contoso.mytestapp1://auth`
71+
App2 Redirect URI: `msauth.com.contoso.mytestapp2://auth`
72+
App3 Redirect URI: `msauth.com.contoso.mytestapp3://auth`
7373

7474
> [!IMPORTANT]
7575
> The format of redirect uris must be compatible with the format MSAL supports, which is documented in [MSAL Redirect URI format requirements](redirect-uris-ios.md#msal-redirect-uri-format-requirements).
@@ -94,6 +94,18 @@ When you have the entitlements set up correctly, you'll see a `entitlements.plis
9494
</plist>
9595
```
9696

97+
#### Add a new keychain group
98+
99+
Add a new keychain group to your project **Capabilities**. The keychain group should be:
100+
* `com.microsoft.adalcache` on iOS
101+
* `com.microsoft.identity.universalstorage` on macOS.
102+
103+
![keychain example](media/single-sign-on-macos-ios/keychain-example.png)
104+
105+
For more information, see [keychain groups](howto-v2-keychain-objc.md).
106+
107+
## Configure the application object
108+
97109
Once you have the keychain entitlement enabled in each of your applications, and you're ready to use SSO, configure `MSALPublicClientApplication` with your keychain access group as in the following example:
98110

99111
Objective-C:
@@ -111,17 +123,15 @@ Swift:
111123
```swift
112124
let config = MSALPublicClientApplicationConfig(clientId: "<my-client-id>")
113125
config.cacheConfig.keychainSharingGroup = "my.keychain.group"
114-
126+
115127
do {
116-
let application = try MSALPublicClientApplication(configuration: config)
117-
// continue on with application
128+
let application = try MSALPublicClientApplication(configuration: config)
129+
// continue on with application
118130
} catch let error as NSError {
119131
// handle error here
120-
}
132+
}
121133
```
122134

123-
124-
125135
> [!WARNING]
126136
> When you share a keychain across your applications, any application can delete users or even all of the tokens across your application.
127137
> This is particularly impactful if you have applications that rely on tokens to do background work.
@@ -204,7 +214,7 @@ func scene(_ scene: UIScene, openURLContexts URLContexts: Set<UIOpenURLContext>)
204214
MSALPublicClientApplication.handleMSALResponse(url, sourceApplication: sourceApp)
205215
}
206216
```
207-
217+
208218
## Next steps
209219

210-
Learn more about [Authentication flows and application scenarios](authentication-flows-app-scenarios.md)
220+
Learn more about [Authentication flows and application scenarios](authentication-flows-app-scenarios.md)

articles/active-directory/hybrid/how-to-connect-password-hash-synchronization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ Caveat: If there are synchronized accounts that need to have non-expiring passwo
119119
> [!NOTE]
120120
> This feature is in Public Preview right now.
121121
122-
#### Public Preview of synchronizing temporary passwords and "Force Password Reset on Next Logon"
122+
#### Public Preview of synchronizing temporary passwords and "Force Password Change on Next Logon"
123123

124124
It is typical to force a user to change their password during their first logon, especially after an admin password reset occurs. It is commonly known as setting a "temporary" password and is completed by checking the "User must change password at next logon" flag on a user object in Active Directory (AD).
125125

articles/active-directory/hybrid/reference-connect-ports.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -30,21 +30,21 @@ This table describes the ports and protocols that are required for communication
3030
| --- | --- | --- |
3131
| DNS |53 (TCP/UDP) |DNS lookups on the destination forest. |
3232
| Kerberos |88 (TCP/UDP) |Kerberos authentication to the AD forest. |
33-
| MS-RPC |135 (TCP/UDP) |Used during the initial configuration of the Azure AD Connect wizard when it binds to the AD forest, and also during Password synchronization. |
33+
| MS-RPC |135 (TCP) |Used during the initial configuration of the Azure AD Connect wizard when it binds to the AD forest, and also during Password synchronization. |
3434
| LDAP |389 (TCP/UDP) |Used for data import from AD. Data is encrypted with Kerberos Sign & Seal. |
35-
| SMB | 445 (TCP/UDP) |Used by Seamless SSO to create a computer account in the AD forest. |
35+
| SMB | 445 (TCP) |Used by Seamless SSO to create a computer account in the AD forest. |
3636
| LDAP/SSL |636 (TCP/UDP) |Used for data import from AD. The data transfer is signed and encrypted. Only used if you are using SSL. |
37-
| RPC |49152- 65535 (Random high RPC Port)(TCP/UDP) |Used during the initial configuration of Azure AD Connect when it binds to the AD forests, and during Password synchronization. See [KB929851](https://support.microsoft.com/kb/929851), [KB832017](https://support.microsoft.com/kb/832017), and [KB224196](https://support.microsoft.com/kb/224196) for more information. |
38-
|WinRM | 5985 (TCP/UDP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard|
39-
|AD DS Web Services | 9389 (TCP/UDP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard |
37+
| RPC |49152- 65535 (Random high RPC Port)(TCP) |Used during the initial configuration of Azure AD Connect when it binds to the AD forests, and during Password synchronization. See [KB929851](https://support.microsoft.com/kb/929851), [KB832017](https://support.microsoft.com/kb/832017), and [KB224196](https://support.microsoft.com/kb/224196) for more information. |
38+
|WinRM | 5985 (TCP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard|
39+
|AD DS Web Services | 9389 (TCP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard |
4040

4141
## Table 2 - Azure AD Connect and Azure AD
4242
This table describes the ports and protocols that are required for communication between the Azure AD Connect server and Azure AD.
4343

4444
| Protocol | Ports | Description |
4545
| --- | --- | --- |
46-
| HTTP |80 (TCP/UDP) |Used to download CRLs (Certificate Revocation Lists) to verify SSL certificates. |
47-
| HTTPS |443(TCP/UDP) |Used to synchronize with Azure AD. |
46+
| HTTP |80 (TCP) |Used to download CRLs (Certificate Revocation Lists) to verify SSL certificates. |
47+
| HTTPS |443(TCP) |Used to synchronize with Azure AD. |
4848

4949
For a list of URLs and IP addresses you need to open in your firewall, see [Office 365 URLs and IP address ranges](https://support.office.com/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2).
5050

@@ -53,23 +53,23 @@ This table describes the ports and protocols that are required for communication
5353

5454
| Protocol | Ports | Description |
5555
| --- | --- | --- |
56-
| HTTP |80 (TCP/UDP) |Used to download CRLs (Certificate Revocation Lists) to verify SSL certificates. |
57-
| HTTPS |443(TCP/UDP) |Used to synchronize with Azure AD. |
56+
| HTTP |80 (TCP) |Used to download CRLs (Certificate Revocation Lists) to verify SSL certificates. |
57+
| HTTPS |443(TCP) |Used to synchronize with Azure AD. |
5858
| WinRM |5985 |WinRM Listener |
5959

6060
## Table 4 - WAP and Federation Servers
6161
This table describes the ports and protocols that are required for communication between the Federation servers and WAP servers.
6262

6363
| Protocol | Ports | Description |
6464
| --- | --- | --- |
65-
| HTTPS |443(TCP/UDP) |Used for authentication. |
65+
| HTTPS |443(TCP) |Used for authentication. |
6666

6767
## Table 5 - WAP and Users
6868
This table describes the ports and protocols that are required for communication between users and the WAP servers.
6969

7070
| Protocol | Ports | Description |
7171
| --- | --- | --- |
72-
| HTTPS |443(TCP/UDP) |Used for device authentication. |
72+
| HTTPS |443(TCP) |Used for device authentication. |
7373
| TCP |49443 (TCP) |Used for certificate authentication. |
7474

7575
## Table 6a & 6b - Pass-through Authentication with Single Sign On (SSO) and Password Hash Sync with Single Sign On (SSO)

0 commit comments

Comments
 (0)