Skip to content

Commit 540e1e1

Browse files
authored
Merge pull request #241336 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 6/13
2 parents 1b300a2 + 0d60ecc commit 540e1e1

File tree

115 files changed

+1432
-827
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

115 files changed

+1432
-827
lines changed

articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -78,14 +78,9 @@ The logic documented here may be different for certain connectors to ensure best
7878
After the failure, the first retry will happen in 6 hours.
7979
- The second retry happens 12 hours after the first failure.
8080
- The third retry happens 24 hours after the first failure.
81-
- The fourth retry happens 48 hours after the first failure.
82-
- The fifth retry happens 96 hours after the first failure.
83-
- The sixth retry happens 192 hours after the first failure.
84-
- The seventh retry happens 384 hours after the first failure.
85-
- The eighth retry happens 768 hours after the first failure.
86-
87-
The retries are stopped after the 8th retry and the escrow entry is removed. The job will continue unless it hits the escrow thresholds from the section above
8881

82+
There will be retries every 24 hours after the 3rd retry. The retries will go on for 28 days after the first failure after which the escrow entry is removed and the job is disabled.
83+
If any of the retries above gets a successful response, the job is automatically put out of quarantine and shall resume regular sync behavior.
8984

9085
## How do I get my application out of quarantine?
9186

articles/active-directory/develop/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,10 @@
1414
- name: Basics of the identity platform
1515
displayName: introduction, basics, overview
1616
items:
17+
- name: Identity fundamentals
18+
href: ../fundamentals/identity-fundamental-concepts.md?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json
19+
- name: Introduction to identity and access management
20+
href: ../fundamentals/introduction-identity-access-management.md?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json
1721
- name: Authentication vs. authorization
1822
href: authentication-vs-authorization.md
1923
- name: OAuth 2.0 and OpenID Connect

articles/active-directory/develop/breadcrumb/toc.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,3 +12,6 @@
1212
- name: Develop
1313
tocHref: /azure/developer/java/spring-framework/
1414
topicHref: /azure/active-directory/develop/index
15+
- name: Develop
16+
tocHref: /azure/active-directory/fundamentals/
17+
topicHref: /azure/active-directory/develop/index

articles/active-directory/develop/v2-oauth2-auth-code-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ The following table describes the various error codes that can be returned in th
146146

147147
### Request an ID token as well or hybrid flow
148148

149-
To learn who the user is before redeeming an authorization code, it's common for applications to also request an ID token when they request the authorization code. This approach is called the *hybrid flow* because it mixes the implicit grant with the authorization code flow.
149+
To learn who the user is before redeeming an authorization code, it's common for applications to also request an ID token when they request the authorization code. This approach is called the *hybrid flow* because it mixes OIDC with the OAuth2 authorization code flow.
150150

151151
The hybrid flow is commonly used in web apps to render a page for a user without blocking on code redemption, notably in [ASP.NET](quickstart-v2-aspnet-core-webapp.md). Both single-page apps and traditional web apps benefit from reduced latency in this model.
152152

articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-configure-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.date: 06/09/2023
1616

1717
# Tutorial: Handle authentication flows in a vanilla JavaScript single-page app
1818

19-
In the [previous article](./how-to-single-page-app-vanillajs-prepare-app.md), you created a vanilla JavaScript (JS) single-page application (SPA) and a server to host it. This article shows you how to configure the application to authenticate and authorize users to access protected resources.
19+
In the [previous article](./how-to-single-page-app-vanillajs-prepare-app.md), you created a vanilla JavaScript (JS) single-page application (SPA) and a server to host it. This tutorial demonstrates how to configure the application to authenticate and authorize users to access protected resources.
2020

2121
In this tutorial;
2222

@@ -278,4 +278,4 @@ The application uses *authPopup.js* to handle the authentication flow when the u
278278
## Next steps
279279

280280
> [!div class="nextstepaction"]
281-
> [Sign in and sign out of the vanilla JS SPA](./how-to-single-page-app-vanillajs-sign-in-sign-out.md)
281+
> [Sign in and sign out of the vanilla JS SPA](./how-to-single-page-app-vanillajs-sign-in-sign-out.md)
61.7 KB
Loading
62.1 KB
Loading
95.4 KB
Loading
92.7 KB
Loading
20.2 KB
Loading

0 commit comments

Comments
 (0)