Skip to content

Commit 50673ec

Browse files
authored
Merge pull request #115730 from MicrosoftDocs/master
5/19 PM Publish
2 parents fdec8e8 + 4ab68f7 commit 50673ec

File tree

537 files changed

+5496
-3444
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

537 files changed

+5496
-3444
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/cosmos-db/sql-api-async-java-samples.md",
5+
"redirect_url": "/azure/cosmos-db/sql-api-java-sdk-samples",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/cosmos-db/sql-api-java-samples.md",
10+
"redirect_url": "/azure/cosmos-db/sql-api-java-sdk-samples",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "articles/openshift/howto-azure-monitor-v4.md",
515
"redirect_url": "articles/azure-monitor/insights/container-insights-azure-redhat4-setup.md",
@@ -40281,6 +40291,16 @@
4028140291
"redirect_url": "/azure/governance/policy/samples/index",
4028240292
"redirect_document_id": false
4028340293
},
40294+
{
40295+
"source_path": "articles/governance/policy/concepts/rego-for-aks.md",
40296+
"redirect_url": "/azure/governance/policy/concepts/policy-for-kubernetes",
40297+
"redirect_document_id": false
40298+
},
40299+
{
40300+
"source_path": "articles/governance/policy/concepts/aks-engine.md",
40301+
"redirect_url": "/azure/governance/policy/concepts/policy-for-kubernetes",
40302+
"redirect_document_id": false
40303+
},
4028440304
{
4028540305
"source_path": "articles/azure-stack/azure-stack-tools-paas-services.md",
4028640306
"redirect_url": "/azure/azure-stack/azure-stack-offer-services-overview",

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/20/2020
12+
ms.date: 05/18/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit
@@ -19,8 +19,6 @@ ms.custom: fasttrack-edit
1919

2020
In this article, you learn how to configure Azure Active Directory B2C (Azure AD B2C) to act as a Security Assertion Markup Language (SAML) identity provider (IdP) to your applications.
2121

22-
[!INCLUDE [active-directory-b2c-public-preview](../../includes/active-directory-b2c-public-preview.md)]
23-
2422
## Scenario overview
2523

2624
Organizations that use Azure AD B2C as their customer identity and access management solution might require interaction with identity providers or applications that are configured to authenticate using the SAML protocol.

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 04/28/2020
12+
ms.date: 05/19/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -65,7 +65,7 @@ Custom policy/Identity Experience Framework capabilities are under constant and
6565
| [OAuth2 implicit flow](implicit-flow-single-page-application.md) | | | X | |
6666
| [OAuth2 resource owner password credentials](ropc-custom.md) | | X | | |
6767
| [OIDC Connect](openid-connect.md) | | | X | |
68-
| [SAML2](connect-with-saml-service-providers.md) | |X | | POST and Redirect bindings. |
68+
| [SAML2](connect-with-saml-service-providers.md) | | |X | POST and Redirect bindings. |
6969
| OAuth1 | | | | Not supported. |
7070
| WSFED | X | | | |
7171

articles/active-directory/authentication/howto-mfaserver-deploy-userportal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Installing the user portal on a server other than the Azure Multi-Factor Authent
102102
* Find the key **"USE_WEB_SERVICE_SDK"** and change **value="false"** to **value="true"**
103103
* Find the key **"WEB_SERVICE_SDK_AUTHENTICATION_USERNAME"** and change **value=""** to **value="DOMAIN\User"** where DOMAIN\User is a Service Account that is a part of "PhoneFactor Admins" Group.
104104
* Find the key **"WEB_SERVICE_SDK_AUTHENTICATION_PASSWORD"** and change **value=""** to **value="Password"** where Password is the password for the Service Account entered in the previous line.
105-
* Find the value **https://www.contoso.com/MultiFactorAuthWebServiceSdk/PfWsSdk.asmx** and change this placeholder URL to the Web Service SDK URL we installed in step 2.
105+
* Find the value `https://www.contoso.com/MultiFactorAuthWebServiceSdk/PfWsSdk.asmx` and change this placeholder URL to the Web Service SDK URL we installed in step 2.
106106
* Save the Web.Config file and close Notepad.
107107

108108
6. Open a web browser from any computer and navigate to the URL where the user portal was installed (Example: `https://mfa.contoso.com/MultiFactorAuth`). Ensure that no certificate warnings or errors are displayed.

articles/active-directory/b2b/facebook-federation.md

Lines changed: 36 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ ms.collection: M365-identity-device-management
2020
# Add Facebook as an identity provider for External Identities
2121

2222
You can add Facebook to your self-service sign-up user flows (Preview) so that users can sign in to your applications using their own Facebook accounts. To allow users to sign in using Facebook, you'll first need to [enable self-service sign-up](self-service-sign-up-user-flow.md) for your tenant. After you add Facebook as an identity provider, set up a user flow for the application and select Facebook as one of the sign-in options.
23+
> [!NOTE]
24+
> Users can only use their Facebook accounts to sign up through apps using self-service sign-up and user flows. Users cannot be invited and redeem their invitation using a Facebook account.
2325
2426
## Create an app in the Facebook developers console
2527

@@ -51,7 +53,9 @@ To use a Facebook account as an [identity provider](identity-providers.md), you
5153
18. To make your Facebook application available to Azure AD, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point the Status should change from **Development** to **Live**.
5254

5355
## Configure a Facebook account as an identity provider
56+
Now you'll set the Facebook client ID and client secret, either by entering it in the Azure AD portal or by using PowerShell. You can test your Facebook configuration by signing up via a user flow on an app enabled for self-service sign-up.
5457

58+
### To configure Facebook federation in the Azure AD portal
5559
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of your Azure AD tenant.
5660
2. Under **Azure services**, select **Azure Active Directory**.
5761
3. In the left menu, select **External Identities**.
@@ -62,8 +66,39 @@ To use a Facebook account as an [identity provider](identity-providers.md), you
6266
![Screenshot showing the Add social identity provider page](media/facebook-federation/add-social-identity-provider-page.png)
6367

6468
7. Select **Save**.
69+
### To configure Facebook federation by using PowerShell
70+
1. Install the latest version of the Azure AD PowerShell for Graph module ([AzureADPreview](https://www.powershellgallery.com/packages/AzureADPreview)).
71+
2. Run the following command:
72+
`Connect-AzureAD`.
73+
3. At the sign-in prompt, sign in with the managed Global Administrator account.
74+
4. Run the following command:
75+
76+
`New-AzureADMSIdentityProvider -Type Facebook -Name Facebook -ClientId [Client ID] -ClientSecret [Client secret]`
77+
78+
> [!NOTE]
79+
> Use the client ID and client secret from the app you created above in the Facebook developer console. For more information, see the [New-AzureADMSIdentityProvider](https://docs.microsoft.com/powershell/module/azuread/new-azureadmsidentityprovider?view=azureadps-2.0-preview) article.
80+
81+
## How do I remove Facebook federation?
82+
You can delete your Facebook federation setup. If you do so, any users who have signed up through user flows with their Facebook accounts will no longer be able to log in.
83+
84+
### To delete Facebook federation in the Azure AD portal:
85+
1. Go to the [Azure portal](https://portal.azure.com). In the left pane, select **Azure Active Directory**.
86+
2. Select **External Identities**.
87+
3. Select **All identity providers**.
88+
4. On the **Facebook** line, select the context menu (**...**) and then select **Delete**.
89+
5. Select **Yes** to confirm deletion.
90+
91+
### To delete Facebook federation by using PowerShell:
92+
1. Install the latest version of the Azure AD PowerShell for Graph module ([AzureADPreview](https://www.powershellgallery.com/packages/AzureADPreview)).
93+
2. Run `Connect-AzureAD`.
94+
4. In the sign-in prompt, sign in with the managed Global Administrator account.
95+
5. Enter the following command:
96+
97+
`Remove-AzureADMSIdentityProvider -Id Facebook-OAUTH`
98+
99+
> [!NOTE]
100+
> For more information, see [Remove-AzureADMSIdentityProvider](https://docs.microsoft.com/powershell/module/azuread/Remove-AzureADMSIdentityProvider?view=azureadps-2.0-preview).
65101
66102
## Next steps
67103

68-
- [Invite external users for collaboration](add-users-administrator.md)
69104
- [Add self-service sign-up to an app](self-service-sign-up-user-flow.md)

articles/active-directory/cloud-provisioning/how-to-install.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: daveba
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 02/26/2020
10+
ms.date: 05/19/2020
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -72,14 +72,7 @@ To verify the agent is being seen by Azure, follow these steps.
7272

7373
![On-premises provisioning agents screen](media/how-to-install/verify1.png)</br>
7474

75-
### Verify the port
76-
To verify that Azure is listening on port 443 and that your agent can communicate with it, follow these steps.
7775

78-
https://aadap-portcheck.connectorporttest.msappproxy.net/
79-
80-
This test verifies that your agents can communicate with Azure over port 443. Open a browser, and go to the previous URL from the server where the agent is installed.
81-
82-
![Verification of port reachability](media/how-to-install/verify2.png)
8376

8477
### On the local server
8578
To verify that the agent is running, follow these steps.

articles/active-directory/cloud-provisioning/tutorial-pilot-aadc-aadccp.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: daveba
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 03/04/2020
10+
ms.date: 05/19/2020
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -196,7 +196,9 @@ Azure AD Connect sync synchronizes changes occurring in your on-premises directo
196196
3. Run `Start-ADSyncSyncCycle`. Hit Enter.
197197

198198
>[!NOTE]
199-
>If you are running your own custom scheduler for AAD Connect sync, then please enable the scheduler.
199+
>If you are running your own custom scheduler for Azure AD Connect sync, then please enable the scheduler.
200+
201+
Once the scheduler is enabled, Azure AD Connect will stop exporting any changes on objects with `cloudNoFlow=true` in the metaverse, unless any reference attribute (eg. manager) is being updated. In case there is any reference attribute update on the object, Azure AD Connect will ignore the `cloudNoFlow` signal and export all updates on the object.
200202

201203
## Something went wrong
202204
In case the pilot does not work as expected, you can go back to the Azure AD Connect sync setup by following the steps below:

articles/active-directory/conditional-access/app-protection-based-conditional-access.md

Lines changed: 38 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 04/02/2020
9+
ms.date: 05/08/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -19,10 +19,11 @@ ms.collection: M365-identity-device-management
1919

2020
People regularly use their mobile devices for both personal and work tasks. While making sure staff can be productive, organizations also want to prevent data loss from potentially unsecure applications. With Conditional Access, organizations can restrict access to approved (modern authentication capable) client apps with Intune app protection policies applied to them.
2121

22-
This article presents two scenarios to configure Conditional Access policies for resources like Office 365, Exchange Online, and SharePoint Online.
22+
This article presents three scenarios to configure Conditional Access policies for resources like Office 365, Exchange Online, and SharePoint Online.
2323

2424
- [Scenario 1: Office 365 apps require approved apps with app protection policies](#scenario-1-office-365-apps-require-approved-apps-with-app-protection-policies)
25-
- [Scenario 2: Exchange Online and SharePoint Online require an approved client app and app protection policy](#scenario-2-exchange-online-and-sharepoint-online-require-an-approved-client-app-and-app-protection-policy)
25+
- [Scenario 2: Browser apps require approved apps with app protection policies](#scenario-2-browser-apps-require-approved-apps-with-app-protection-policies)
26+
- [Scenario 3: Exchange Online and SharePoint Online require an approved client app and app protection policy](#scenario-3-exchange-online-and-sharepoint-online-require-an-approved-client-app-and-app-protection-policy)
2627

2728
In the Conditional Access, these client apps are known to be protected with an app protection policy. More information about app protection policies can be found in the article, [App protection policies overview](/intune/apps/app-protection-policy)
2829

@@ -83,7 +84,40 @@ For the Conditional Access policy in this step, configure the following componen
8384

8485
Review the article [How to create and assign app protection policies](/intune/apps/app-protection-policies), for steps to create app protection policies for Android and iOS.
8586

86-
## Scenario 2: Exchange Online and SharePoint Online require an approved client app and app protection policy
87+
## Scenario 2: Browser apps require approved apps with app protection policies
88+
89+
In this scenario, Contoso has decided that all mobile web browsing access to Office 365 resources must use an approved client app, like Edge for iOS and Android, protected by an app protection policy prior to receiving access. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
90+
91+
Organizations must complete the following steps in order to require the use of an approved client app on mobile devices.
92+
93+
**Step 1: Configure an Azure AD Conditional Access policy for Office 365**
94+
95+
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
96+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
97+
1. Select **New policy**.
98+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
99+
1. Under **Assignments**, select **Users and groups**
100+
1. Under **Include**, select **All users** or the specific **Users and groups** you wish to apply this policy to.
101+
1. Select **Done**.
102+
1. Under **Cloud apps or actions** > **Include**, select **Office 365 (preview)**.
103+
1. Under **Conditions**, select **Device platforms**.
104+
1. Set **Configure** to **Yes**.
105+
1. Include **Android** and **iOS**.
106+
1. Under **Conditions**, select **Client apps (preview)**.
107+
1. Set **Configure** to **Yes**.
108+
1. Select **Browser**.
109+
1. Under **Access controls** > **Grant**, select the following options:
110+
- **Require approved client app**
111+
- **Require app protection policy (preview)**
112+
- **Require all the selected controls**
113+
1. Confirm your settings and set **Enable policy** to **On**.
114+
1. Select **Create** to create and enable your policy.
115+
116+
**Step 2: Configure Intune app protection policy for iOS and Android client applications**
117+
118+
Review the article [How to create and assign app protection policies](/intune/apps/app-protection-policies), for steps to create app protection policies for Android and iOS.
119+
120+
## Scenario 3: Exchange Online and SharePoint Online require an approved client app and app protection policy
87121

88122
In this scenario, Contoso has decided that users may only access email and SharePoint data on mobile devices as long as they use an approved client app like Outlook mobile protected by an app protection policy prior to receiving access. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
89123

articles/active-directory/develop/TOC.yml

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,9 @@
2828
items:
2929
- name: Angular
3030
href: quickstart-v2-angular.md
31-
- name: JavaScript
31+
- name: JavaScript - Auth code flow
32+
href: quickstart-v2-javascript-auth-code.md
33+
- name: JavaScript - Implicit flow
3234
href: quickstart-v2-javascript.md
3335
- name: Web apps
3436
items:
@@ -73,7 +75,9 @@
7375
items:
7476
- name: Angular
7577
href: tutorial-v2-angular.md
76-
- name: JavaScript
78+
- name: JavaScript - Auth code flow
79+
href: tutorial-v2-javascript-auth-code.md
80+
- name: JavaScript - Implicit flow
7781
href: tutorial-v2-javascript-spa.md
7882
- name: Web apps
7983
items:
@@ -479,6 +483,10 @@
479483
href: active-directory-optional-claims.md
480484
- name: Configure token lifetimes
481485
href: active-directory-configurable-token-lifetimes.md
486+
- name: Handle SameSite cookie changes in Chrome browser
487+
href: howto-handle-samesite-cookie-changes-chrome-browser.md
488+
- name: Handle ITP in Safari
489+
href: reference-third-party-cookies-spas.md
482490
- name: Application configuration
483491
displayName: App configuration
484492
items:
@@ -505,7 +513,7 @@
505513
href: howto-configure-publisher-domain.md
506514
- name: Configure Terms of Service and Privacy Statement
507515
href: howto-add-terms-of-service-privacy-statement.md
508-
- name: Configure publisher verification for your app
516+
- name: Configure publisher verification for your app
509517
items:
510518
- name: Mark your app as publisher verified (preview)
511519
href: mark-app-as-publisher-verified.md
@@ -576,7 +584,7 @@
576584
href: vs-active-directory-webapi-what-happened.md
577585
- name: Diagnose errors during authentication
578586
href: vs-active-directory-error.md
579-
- name: References
587+
- name: Reference
580588
items:
581589
- name: Application manifest
582590
href: reference-app-manifest.md

articles/active-directory/develop/identity-videos.md

Lines changed: 50 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 04/08/2020
12+
ms.date: 05/19/2020
1313
ms.author: marsma
1414
ms.custom: aaddev
1515
ms.reviewer: celested
@@ -19,9 +19,57 @@ ms.reviewer: celested
1919

2020
Learn the basics of modern authentication, the Microsoft identity platform, and the Microsoft Authentication Libraries (MSAL).
2121

22+
## Microsoft identity platform for developers
23+
24+
The *Identity for Developers* video series focuses on just what you need to know to get started adding identity support to your application. Tuned for quick delivery of the fundamental aspects of the platform and how to use its authentication libraries, these are a good place to start for any developer.
25+
___
26+
27+
:::row:::
28+
:::column:::
29+
1 - Overview of the Microsoft identity platform for developers (33:55)
30+
:::column-end:::
31+
:::column:::
32+
> [!VIDEO https://www.youtube.com/embed/zjezqZPPOfc]
33+
:::column-end:::
34+
:::column:::
35+
2 - How to authenticate users of your apps with the Microsoft identity platform (29:09)
36+
:::column-end:::
37+
:::column:::
38+
> [!VIDEO https://www.youtube.com/embed/Mtpx_lpfRLs]
39+
:::column-end:::
40+
:::row-end:::
41+
:::row:::
42+
:::column:::
43+
3 - Microsoft identity platform’s permissions and consent framework (45:08)
44+
:::column-end:::
45+
:::column:::
46+
> [!VIDEO https://www.youtube.com/embed/toAWRNqqDL4]
47+
:::column-end:::
48+
:::column:::
49+
4 - How to protect APIs using the Microsoft identity platform (33:17)
50+
:::column-end:::
51+
:::column:::
52+
> [!VIDEO https://www.youtube.com/embed/IIQ7QW4bYqA]
53+
:::column-end:::
54+
:::row-end:::
55+
:::row:::
56+
:::column:::
57+
5 - Application roles and security groups on the Microsoft identity platform (15:52)
58+
:::column-end:::
59+
:::column:::
60+
> [!VIDEO https://www.youtube.com/embed/-BK2iBDrmNo]
61+
:::column-end:::
62+
:::column:::
63+
<!-- BLANK TITLE CELL -->
64+
:::column-end:::
65+
:::column:::
66+
<!-- BLANK VIDEO CELL -->
67+
:::column-end:::
68+
:::row-end:::
69+
2270
## Authentication fundamentals
2371

24-
If you're new to concepts like identity providers, security tokens, claims, and audience, this video series is a good place to start.
72+
If you're new to concepts like identity providers, security tokens, claims, and audience, this video series can help clear up the concepts and components in modern authentication.
2573
___
2674

2775
:::row:::

0 commit comments

Comments
 (0)