Skip to content

Commit 525c927

Browse files
authored
Merge pull request #248678 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST, 8/18
2 parents 5b9e04d + 9ed4be2 commit 525c927

File tree

236 files changed

+2415
-1380
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

236 files changed

+2415
-1380
lines changed

.openpublishing.redirection.json

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23253,6 +23253,51 @@
2325323253
"redirect_url": "/azure/active-directory/develop/index-spa",
2325423254
"redirect_document_id": false
2325523255
},
23256+
{
23257+
"source_path_from_root": "/articles/active-directory/develop/api-find-an-api-how-to.md",
23258+
"redirect_url": "/azure/active-directory/develop/quickstart-configure-app-expose-web-apis",
23259+
"redirect_document_id": false
23260+
},
23261+
{
23262+
"source_path_from_root": "/articles/active-directory/develop/consent-framework-links.md",
23263+
"redirect_url": "/azure/active-directory/develop/permissions-consent-overview",
23264+
"redirect_document_id": false
23265+
},
23266+
{
23267+
"source_path_from_root": "/articles/active-directory/develop/authentication-protocols.md",
23268+
"redirect_url": "/azure/active-directory/develop/v2-oauth2-auth-code-flow",
23269+
"redirect_document_id": false
23270+
},
23271+
{
23272+
"source_path_from_root": "/articles/active-directory/develop/delegated-and-app-perms.md",
23273+
"redirect_url": "/azure/active-directory/develop/permissions-consent-overview",
23274+
"redirect_document_id": false
23275+
},
23276+
{
23277+
"source_path_from_root": "/articles/active-directory/develop/perms-for-given-api.md",
23278+
"redirect_url": "/azure/active-directory/develop/scopes-oidc",
23279+
"redirect_document_id": false
23280+
},
23281+
{
23282+
"source_path_from_root": "/articles/active-directory/develop/setup-multi-tenant-app.md",
23283+
"redirect_url": "/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant",
23284+
"redirect_document_id": false
23285+
},
23286+
{
23287+
"source_path_from_root": "/articles/active-directory/develop/registration-config-specific-application-property-how-to.md",
23288+
"redirect_url": "/azure/active-directory/develop/quickstart-register-app",
23289+
"redirect_document_id": false
23290+
},
23291+
{
23292+
"source_path_from_root": "/articles/active-directory/develop/registration-config-how-to.md",
23293+
"redirect_url": "/azure/active-directory/develop/quickstart-register-app",
23294+
"redirect_document_id": false
23295+
},
23296+
{
23297+
"source_path_from_root": "/articles/active-directory/develop/registration-config-sso-how-to.md",
23298+
"redirect_url": "/azure/active-directory/develop/quickstart-register-app",
23299+
"redirect_document_id": false
23300+
},
2325623301
{
2325723302
"source_path_from_root": "/articles/networking/azure-orbital-overview.md",
2325823303
"redirect_url": "/azure/orbital/overview",
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: Microsoft Entra architecture icons
3+
description: Learn about the official collection of Microsoft Entra icons that you can use in architectural diagrams, training materials, or documentation.
4+
author: CelesteDG
5+
manager: CelesteDG
6+
ms.service: active-directory
7+
ms.subservice: fundamentals
8+
ms.topic: conceptual
9+
ms.date: 08/15/2023
10+
ms.author: celested
11+
ms.reviewer: nicholepet
12+
13+
# Customer intent: As a new or existing customer, I want to learn how I can use the official Microsoft Entra icons in architectural diagrams, training materials, or documentation.
14+
---
15+
16+
# Microsoft Entra architecture icons
17+
18+
Helping our customers design and architect new solutions is core to the Microsoft Entra mission. Architecture diagrams can help communicate design decisions and the relationships between components of a given workload. This article provides information about the official collection of Microsoft Entra icons that you can use in architectural diagrams, training materials, or documentation.
19+
20+
## General guidelines
21+
22+
### Do's
23+
24+
- Use the icon to illustrate how products can work together.
25+
- In diagrams, we recommend including the product name somewhere close to the icon.
26+
27+
### Don'ts
28+
29+
- Don't crop, flip, or rotate icons.
30+
- Don't distort or change the icon shape in any way.
31+
- Don't use Microsoft product icons to represent your product or service.
32+
- Don't use Microsoft product icons in marketing communications.
33+
34+
## Icon updates
35+
36+
| Month | Change description |
37+
|-------|--------------------|
38+
| August 2023 | Added a downloadable package that contains the Microsoft Entra architecture icons, branding playbook (which contains guidelines about the Microsoft Security visual identity), and terms of use. |
39+
40+
## Icon terms
41+
42+
Microsoft permits the use of these icons in architectural diagrams, training materials, or documentation. You may copy, distribute, and display the icons only for the permitted use unless granted explicit permission by Microsoft. Microsoft reserves all other rights.
43+
44+
<div id="consent-checkbox">
45+
I agree to the above terms.
46+
</div>
47+
48+
> [!div class="button"]
49+
> [Download icons](https://download.microsoft.com/download/a/4/2/a4289cad-4eaf-4580-87fd-ce999a601516/Microsoft-Entra-architecture-icons.zip?wt.mc_id=microsoftentraicons_downloadmicrosoftentraicons_content_cnl_csasci)
50+
51+
## More icon sets from Microsoft
52+
53+
- [Azure architecture icons](/azure/architecture/icons)
54+
- [Microsoft 365 architecture icons and templates](/microsoft-365/solutions/architecture-icons-templates)
55+
- [Dynamics 365 icons](/dynamics365/get-started/icons)
56+
- [Microsoft Power Platform icons](/power-platform/guidance/icons)

articles/active-directory/architecture/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ items:
77
items:
88
- name: Azure AD architecture
99
href: architecture.md
10+
- name: Microsoft Entra architecture icons
11+
href: architecture-icons.md
1012
- name: Road to the cloud
1113
items:
1214
- name: Introduction

articles/active-directory/develop/api-find-an-api-how-to.md

Lines changed: 0 additions & 31 deletions
This file was deleted.

articles/active-directory/develop/authentication-flows-app-scenarios.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,30 @@
11
---
2-
title: Microsoft identity platform authentication flows & app scenarios
2+
title: Microsoft identity platform app types and authentication flows
33
description: Learn about application scenarios for the Microsoft identity platform, including authenticating identities, acquiring tokens, and calling protected APIs.
44
services: active-directory
55
author: cilwerner
66
manager: CelesteDG
77

8-
ms.assetid:
98
ms.service: active-directory
109
ms.subservice: develop
1110
ms.topic: conceptual
1211
ms.workload: identity
13-
ms.date: 05/05/2022
12+
ms.date: 08/11/2023
1413
ms.author: cwerner
1514
ms.reviewer: jmprieur
1615
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, has-adal-ref
17-
#Customer intent: As an app developer, I want to learn about authentication flows and application scenarios so I can create applications protected by the Microsoft identity platform.
16+
# Customer intent: As an app developer, I want to learn about authentication flows and application scenarios so I can create applications protected by the Microsoft identity platform.
1817
---
1918

20-
# Authentication flows and application scenarios
19+
# Microsoft identity platform app types and authentication flows
2120

2221
The Microsoft identity platform supports authentication for different kinds of modern application architectures. All of the architectures are based on the industry-standard protocols [OAuth 2.0 and OpenID Connect](./v2-protocols.md). By using the [authentication libraries for the Microsoft identity platform](reference-v2-libraries.md), applications authenticate identities and acquire tokens to access protected APIs.
2322

2423
This article describes authentication flows and the application scenarios that they're used in.
2524

2625
## Application categories
2726

28-
Tokens can be acquired from several types of applications, including:
27+
[Security tokens](./security-tokens.md) can be acquired from several types of applications, including:
2928

3029
- Web apps
3130
- Mobile apps
@@ -40,7 +39,7 @@ The following sections describe the categories of applications.
4039

4140
Authentication scenarios involve two activities:
4241

43-
- **Acquiring security tokens for a protected web API**: We recommend that you use the [Microsoft Authentication Library (MSAL)](reference-v2-libraries.md), developed and supported by Microsoft.
42+
- **Acquiring security tokens for a protected web API**: We recommend that you use the [Microsoft Authentication Library (MSAL)](msal-overview.md), developed and supported by Microsoft.
4443
- **Protecting a web API or a web app**: One challenge of protecting these resources is validating the security token. On some platforms, Microsoft offers [middleware libraries](reference-v2-libraries.md).
4544

4645
### With users or without users
@@ -75,7 +74,7 @@ The available authentication flows differ depending on the sign-in audience. Som
7574

7675
For more information, see [Supported account types](v2-supported-account-types.md#account-type-support-in-authentication-flows).
7776

78-
## Application scenarios
77+
## Application types
7978

8079
The Microsoft identity platform supports authentication for these app architectures:
8180

@@ -127,7 +126,7 @@ For a desktop app to call a web API that signs in users, use the interactive tok
127126

128127
There's another possibility for Windows-hosted applications on computers joined either to a Windows domain or by Azure Active Directory (Azure AD). These applications can silently acquire a token by using [integrated Windows authentication](https://aka.ms/msal-net-iwa).
129128

130-
Applications running on a device without a browser can still call an API on behalf of a user. To authenticate, the user must sign in on another device that has a web browser. This scenario requires that you use the [device code flow](https://aka.ms/msal-net-device-code-flow).
129+
Applications running on a device without a browser can still call an API on behalf of a user. To authenticate, the user must sign in on another device that has a web browser. This scenario requires that you use the [device code flow](v2-oauth2-device-code.md).
131130

132131
![Device code flow](media/scenarios/device-code-flow-app.svg)
133132

@@ -147,7 +146,7 @@ Similar to a desktop app, a mobile app calls the interactive token-acquisition m
147146

148147
MSAL iOS and MSAL Android use the system web browser by default. However, you can direct them to use the embedded web view instead. There are specificities that depend on the mobile platform: Universal Windows Platform (UWP), iOS, or Android.
149148

150-
Some scenarios, like those that involve Conditional Access related to a device ID or a device enrollment, require a broker to be installed on the device. Examples of brokers are Microsoft Company Portal on Android and Microsoft Authenticator on Android and iOS. MSAL can now interact with brokers. For more information about brokers, see [Leveraging brokers on Android and iOS](https://github.com/AzureAD/azure-activedirectory-library-for-dotnet/wiki/leveraging-brokers-on-Android-and-iOS).
149+
Some scenarios, like those that involve Conditional Access related to a device ID or a device enrollment, require a broker to be installed on the device. Examples of brokers are Microsoft Company Portal on Android and Microsoft Authenticator on Android and iOS. MSAL can now interact with brokers. For more information about brokers, see [Leveraging brokers on Android and iOS](msal-net-use-brokers-with-xamarin-apps.md).
151150

152151
For more information, see [Mobile app that calls web APIs](scenario-mobile-overview.md).
153152

articles/active-directory/develop/authentication-protocols.md

Lines changed: 0 additions & 36 deletions
This file was deleted.

articles/active-directory/develop/consent-framework-links.md

Lines changed: 0 additions & 30 deletions
This file was deleted.

articles/active-directory/develop/delegated-and-app-perms.md

Lines changed: 0 additions & 28 deletions
This file was deleted.

articles/active-directory/develop/msal-client-application-configuration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 07/15/2022
12+
ms.date: 08/11/2023
1313
ms.author: cwerner
1414
ms.reviewer: saeeda
1515
ms.custom: aaddev, has-adal-ref
@@ -45,8 +45,8 @@ The authority you specify in your code needs to be consistent with the **Support
4545
The authority can be:
4646

4747
- An Azure AD cloud authority.
48-
- An Azure AD B2C authority. See [B2C specifics](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/AAD-B2C-specifics).
49-
- An Active Directory Federation Services (AD FS) authority. See [AD FS support](https://aka.ms/msal-net-adfs-support).
48+
- An Azure AD B2C authority. See [B2C specifics](msal-net-b2c-considerations.md).
49+
- An Active Directory Federation Services (AD FS) authority. See [AD FS support](msal-net-adfs-support.md).
5050

5151
Azure AD cloud authorities have two parts:
5252

@@ -129,7 +129,7 @@ You can override the redirect URI by using the `RedirectUri` property (for examp
129129
- `RedirectUriOnAndroid` = "msauth-5a434691-ccb2-4fd1-b97b-b64bcfbc03fc://com.microsoft.identity.client.sample";
130130
- `RedirectUriOnIos` = $"msauth.{Bundle.ID}://auth";
131131

132-
For more iOS details, see [Migrate iOS applications that use Microsoft Authenticator from ADAL.NET to MSAL.NET](msal-net-migration-ios-broker.md) and [Leveraging the broker on iOS](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/Leveraging-the-broker-on-iOS).
132+
For more iOS details, see [Migrate iOS applications that use Microsoft Authenticator from ADAL.NET to MSAL.NET](msal-net-migration-ios-broker.md) and [Leveraging the broker on iOS](msal-net-use-brokers-with-xamarin-apps.md).
133133
For more Android details, see [Brokered auth in Android](msal-android-single-sign-on.md).
134134

135135
### Redirect URI for confidential client apps

0 commit comments

Comments
 (0)