Skip to content

Commit 5735529

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-preview-vmware
2 parents 77a07dd + 7a8b120 commit 5735529

File tree

524 files changed

+4119
-2195
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

524 files changed

+4119
-2195
lines changed

.openpublishing.redirection.json

Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51485,6 +51485,121 @@
5148551485
"redirect_url": "/azure/media-services",
5148651486
"redirect_document_id": false
5148751487
},
51488+
{
51489+
"source_path": "articles/databox-online/data-box-edge-deploy-add-shares.md",
51490+
"redirect_url": "/azure/databox-online/azure-stack-edge-deploy-add-shares",
51491+
"redirect_document_id": false
51492+
},
51493+
{
51494+
"source_path": "articles/databox-online/data-box-edge-connect-powershell-interface.md",
51495+
"redirect_url": "/azure/databox-online/azure-stack-edge-connect-powershell-interface",
51496+
"redirect_document_id": false
51497+
},
51498+
{
51499+
"source_path": "articles/databox-online/data-box-edge-contact-microsoft-support.md",
51500+
"redirect_url": "/azure/databox-online/azure-stack-edge-contact-microsoft-support",
51501+
"redirect_document_id": false
51502+
},
51503+
{
51504+
"source_path": "articles/databox-online/data-box-edge-create-iot-edge-module.md",
51505+
"redirect_url": "/azure/databox-online/azure-stack-edge-create-iot-edge-module",
51506+
"redirect_document_id": false
51507+
},
51508+
{
51509+
"source_path": "articles/databox-online/data-box-edge-deploy-configure-compute.md",
51510+
"redirect_url": "/azure/databox-online/azure-stack-edge-deploy-configure-compute",
51511+
"redirect_document_id": false
51512+
},
51513+
{
51514+
"source_path": "articles/databox-online/data-box-edge-deploy-configure-compute-advanced.md",
51515+
"redirect_url": "/azure/databox-online/azure-stack-edge-deploy-configure-compute-advanced",
51516+
"redirect_document_id": false
51517+
},
51518+
{
51519+
"source_path": "articles/databox-online/data-box-edge-deploy-connect-setup-activate.md",
51520+
"redirect_url": "/azure/databox-online/azure-stack-edge-deploy-connect-setup-activate",
51521+
"redirect_document_id": false
51522+
},
51523+
{
51524+
"source_path": "articles/databox-online/data-box-edge-deploy-install.md",
51525+
"redirect_url": "/azure/databox-online/azure-stack-edge-deploy-install",
51526+
"redirect_document_id": false
51527+
},
51528+
{
51529+
"source_path": "articles/databox-online/data-box-edge-deploy-prep.md",
51530+
"redirect_url": "/azure/databox-online/azure-stack-edge-deploy-prep",
51531+
"redirect_document_id": false
51532+
},
51533+
{
51534+
"source_path": "articles/databox-online/data-box-edge-extend-compute-access-modules.md",
51535+
"redirect_url": "/azure/databox-online/azure-stack-edge-extend-compute-access-modules",
51536+
"redirect_document_id": false
51537+
},
51538+
{
51539+
"source_path": "articles/databox-online/data-box-edge-limits.md",
51540+
"redirect_url": "/azure/databox-online/azure-stack-edge-limits",
51541+
"redirect_document_id": false
51542+
},
51543+
{
51544+
"source_path": "articles/databox-online/data-box-edge-manage-access-power-connectivity-mode.md",
51545+
"redirect_url": "/azure/databox-online/azure-stack-edge-manage-access-power-connectivity-mode",
51546+
"redirect_document_id": false
51547+
},
51548+
{
51549+
"source_path": "articles/databox-online/data-box-edge-manage-bandwidth-schedules.md",
51550+
"redirect_url": "/azure/databox-online/azure-stack-edge-manage-bandwidth-schedules",
51551+
"redirect_document_id": false
51552+
},
51553+
{
51554+
"source_path": "articles/databox-online/data-box-edge-manage-compute.md",
51555+
"redirect_url": "/azure/databox-online/azure-stack-edge-manage-compute",
51556+
"redirect_document_id": false
51557+
},
51558+
{
51559+
"source_path": "articles/databox-online/data-box-edge-manage-shares.md",
51560+
"redirect_url": "/azure/databox-online/azure-stack-edge-manage-shares",
51561+
"redirect_document_id": false
51562+
},
51563+
{
51564+
"source_path": "articles/databox-online/data-box-edge-manage-users.md",
51565+
"redirect_url": "/azure/databox-online/azure-stack-edge-manage-users",
51566+
"redirect_document_id": false
51567+
},
51568+
{
51569+
"source_path": "articles/databox-online/data-box-edge-monitor.md",
51570+
"redirect_url": "/azure/databox-online/azure-stack-edge-monitor",
51571+
"redirect_document_id": false
51572+
},
51573+
{
51574+
"source_path": "articles/databox-online/data-box-edge-overview.md",
51575+
"redirect_url": "/azure/databox-online/azure-stack-edge-overview",
51576+
"redirect_document_id": false
51577+
},
51578+
{
51579+
"source_path": "articles/databox-online/data-box-edge-return-device.md",
51580+
"redirect_url": "/azure/databox-online/azure-stack-edge-return-device",
51581+
"redirect_document_id": false
51582+
},
51583+
{
51584+
"source_path": "articles/databox-online/data-box-edge-security.md",
51585+
"redirect_url": "/azure/databox-online/azure-stack-edge-security",
51586+
"redirect_document_id": false
51587+
},
51588+
{
51589+
"source_path": "articles/databox-online/data-box-edge-system-requirements.md",
51590+
"redirect_url": "/azure/databox-online/azure-stack-edge-system-requirements",
51591+
"redirect_document_id": false
51592+
},
51593+
{
51594+
"source_path": "articles/databox-online/data-box-edge-technical-specifications-compliance.md",
51595+
"redirect_url": "/azure/databox-online/azure-stack-edge-technical-specifications-compliance",
51596+
"redirect_document_id": false
51597+
},
51598+
{
51599+
"source_path": "articles/databox-online/data-box-edge-troubleshoot.md",
51600+
"redirect_url": "/azure/databox-online/azure-stack-edge-troubleshoot",
51601+
"redirect_document_id": false
51602+
},
5148851603
{
5148951604
"source_path": "articles/aks/kubernetes-draft.md",
5149051605
"redirect_url": "/azure/aks/quickstart-helm",

articles/active-directory-b2c/userjourneys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ The **OrchestrationStep** element contains the following attributes:
6060
| Attribute | Required | Description |
6161
| --------- | -------- | ----------- |
6262
| `Order` | Yes | The order of the orchestration steps. |
63-
| `Type` | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**GetClaims** - Indicates that the orchestration step reads the input claims.</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
63+
| `Type` | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**GetClaims** - Specifies that the orchestration step should process claim data sent to Azure AD B2C from the relying party via its `InputClaims` configuration.</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
6464
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples - if the type of the orchestration step is one of following: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`, Azure AD B2C needs to display the identity provider selection without having a technical profile. |
6565
| CpimIssuerTechnicalProfileReferenceId | No | The type of the orchestration step is `SendClaims`. This property defines the technical profile identifier of the claims provider that issues the token for the relying party. If absent, no relying party token is created. |
6666

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222

2323
Automatic provisioning refers to creating user identities and roles in the cloud applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Before you start a deployment, you can review this article to learn how Azure AD provision works and get configuration recommendations.
2424

25-
The **Azure AD Provisioning Service** provisions users to SaaS apps and other systems by connecting to a System for Cross-Domain Identity Management (SCIM) 2.0 user management API endpoint provided by the application vendor. This SCIM endpoint allows Azure AD to programmatically create, update, and remove users. For selected applications, the provisioning service can also create, update, and remove additional identity-related objects, such as groups and roles. The channel used for provisioning between Azure AD and the application is encrypted using HTTPS TLS encryption.
25+
The **Azure AD Provisioning Service** provisions users to SaaS apps and other systems by connecting to a System for Cross-Domain Identity Management (SCIM) 2.0 user management API endpoint provided by the application vendor. This SCIM endpoint allows Azure AD to programmatically create, update, and remove users. For selected applications, the provisioning service can also create, update, and remove additional identity-related objects, such as groups and roles. The channel used for provisioning between Azure AD and the application is encrypted using HTTPS TLS 1.2 encryption.
2626

2727

2828
![Azure AD Provisioning Service](./media/how-provisioning-works/provisioning0.PNG)

articles/active-directory/develop/authentication-flows-app-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Applications can be categorized as in the following list:
4141
- [Protected resources vs. client applications](#protected-resources-vs-client-applications): Some scenarios are about protecting resources like web apps or web APIs. Other scenarios are about acquiring a security token to call a protected web API.
4242
- [With users or without users](#with-users-or-without-users): Some scenarios involve a signed-in user, but others, like daemon scenarios, don't involve a user.
4343
- [Single-page, public client, and confidential client applications](#single-page-public-client-and-confidential-client-applications): These types are three large categories of applications. Each is used with different libraries and objects.
44-
- [Sign-in audience](v2-supported-account-types.md#certain-authentication-flows-dont-support-all-the-account-types): The available authentication flows differ depending on the sign-in audience. Some flows are available only for work or school accounts. And some are available both for work or school accounts and for personal Microsoft accounts. The allowed audience depends on the authentication flows.
44+
- [Sign-in audience](v2-supported-account-types.md): The available authentication flows differ depending on the sign-in audience. Some flows are available only for work or school accounts. And some are available both for work or school accounts and for personal Microsoft accounts. The allowed audience depends on the authentication flows.
4545
- [Supported OAuth 2.0 flows](#scenarios-and-supported-authentication-flows): Authentication flows are used to implement the application scenarios that are requesting tokens. There isn't a one-to-one mapping between application scenarios and authentication flows.
4646
- [Supported platforms](#scenarios-and-supported-platforms-and-languages): Not all application scenarios are available for every platform.
4747

articles/active-directory/develop/scenario-web-app-call-api-call-api.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,10 +56,9 @@ public async Task<IActionResult> Profile()
5656
var content = await response.Content.ReadAsStringAsync();
5757

5858
dynamic me = JsonConvert.DeserializeObject(content);
59-
return me;
59+
ViewData["Me"] = me;
6060
}
6161

62-
ViewData["Me"] = me;
6362
return View();
6463
}
6564
```
Lines changed: 21 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Supported accounts types - Microsoft identity platform | Azure
2+
title: Supported account types - Microsoft identity platform | Azure
33
description: Conceptual documentation about audiences and supported account types in applications
44
services: active-directory
55
author: jmprieur
@@ -17,39 +17,37 @@ ms.custom: aaddev, identityplatformtop40
1717

1818
# Supported account types
1919

20-
This article explains what accounts types (sometimes named audiences) are supported in applications.
20+
This article explains what account types (sometimes called *audiences*) are supported in Microsoft identity platform applications.
2121

2222
<!-- This section can be in an include for many of the scenarios (SPA, web app signing-in users, protecting a web API, Desktop (depending on the flows), Mobile -->
2323

24-
## Supported accounts types in Microsoft Identity platform applications
24+
## Account types in the public cloud
2525

26-
In the Microsoft Azure public Cloud, most types of apps can sign in users with any audience:
26+
In the Microsoft Azure public cloud, most types of apps can sign in users with any audience:
2727

28-
- If you're writing a Line of Business (LOB) application, you can sign in users in your own organization. Such an application is sometimes named **single tenant**.
29-
- If you're an ISV, you can write an application which signs-in users:
28+
- If you're writing a line-of-business (LOB) application, you can sign in users in your own organization. Such an application is sometimes called *single-tenant*.
29+
- If you're an ISV, you can write an application that signs in users:
3030

31-
- In any organization. Such an application is named a **multi-tenant** web application. You'll sometimes read that it signs-in users with their work or school accounts.
32-
- With their work or school or personal Microsoft account.
33-
- With only personal Microsoft account.
34-
> [!NOTE]
35-
> Currently the Microsoft identity platform supports personal Microsoft accounts only by registering an app for **work or school or Microsoft personal accounts**, and then, restrict sign-in in the code for the application by specifying an Azure AD authority, when building the application, such as `https://login.microsoftonline.com/consumers`.
31+
- In any organization. Such an application is called a *multitenant* web application. You'll sometimes read that it signs in users with their work or school accounts.
32+
- With their work or school or personal Microsoft accounts.
33+
- With only personal Microsoft accounts.
34+
35+
- If you're writing a business-to-consumer application, you can also sign in users with their social identities, by using Azure Active Directory B2C (Azure AD B2C).
3636

37-
- If you're writing a business to consumers application, you can also sign in users with their social identities, using Azure AD B2C.
37+
## Account type support in authentication flows
3838

39-
## Certain authentication flows don't support all the account types
39+
Some account types can't be used with certain authentication flows. For instance, in desktop, UWP, or daemon applications:
4040

41-
Some account types can't be used with certain authentication flows. For instance, in desktop, UWP applications, or daemon applications:
41+
- Daemon applications can be used only with Azure AD organizations. It doesn't make sense to try to use daemon applications to manipulate Microsoft personal accounts. The admin consent will never be granted.
42+
- You can use the Integrated Windows Authentication flow only with work or school accounts (in your organization or any organization). Integrated Windows Authentication works with domain accounts, it and requires the machines to be domain joined or Azure AD joined. This flow doesn't make sense for personal Microsoft accounts.
43+
- The [Resource Owner Password Credentials grant](./v2-oauth-ropc.md) (username/password) can't be used with personal Microsoft accounts. Personal Microsoft accounts require that the user consents to accessing personal resources at each sign-in session. That's why this behavior isn't compatible with non-interactive flows.
44+
- Device code flow doesn't work with personal Microsoft accounts.
4245

43-
- Daemon applications can only be used with Azure Active Directory organizations. It doesn't make sense to attempt to use daemon applications to manipulate Microsoft personal accounts (the admin consent will never be granted).
44-
- You can only use the Integrated Windows Authentication flow with work or school accounts (in your organization or any organization). Indeed, Integrated Windows Authentication works with domain accounts, and requires the machines to be domain joined or Azure AD joined. This flow doesn't make sense for personal Microsoft Accounts.
45-
- The [Resource Owner Password Grant](./v2-oauth-ropc.md) (Username/Password), can't be used with personal Microsoft accounts. Indeed, personal Microsoft accounts require that the user consents to accessing personal resources at each sign-in session. That's why, this behavior isn't compatible with non-interactive flows.
46-
- Device code flow doesn't yet work with personal Microsoft accounts.
46+
## Account types in national clouds
4747

48-
## Supported account types in national clouds
49-
50-
Apps can also sign in users in [national clouds](authentication-national-cloud.md). However, Microsoft personal accounts aren't supported in these clouds (by definition of these clouds). That's why the supported account types are reduced, for these clouds, to your organization (single tenant) or any organizations (multi-tenant applications).
48+
Apps can also sign in users in [national clouds](authentication-national-cloud.md). However, Microsoft personal accounts aren't supported in these clouds. That's why the supported account types are reduced, for these clouds, to your organization (single tenant) or any organizations (multitenant applications).
5149

5250
## Next steps
5351

54-
- Learn more about [Tenancy in Azure Active Directory](./single-and-multi-tenant-apps.md)
55-
- Learn more about [National Clouds](./authentication-national-cloud.md)
52+
- Learn more about [tenancy in Azure Active Directory](./single-and-multi-tenant-apps.md).
53+
- Learn more about [national clouds](./authentication-national-cloud.md).

articles/active-directory/saas-apps/docusign-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ In this section, you'll grant B.Simon access to DocuSign so that this user can u
218218

219219
1. Copy the **Service Provider Assertion Consumer Service URL**, and then paste it into the **Reply URL** box in **Basic SAML Configuration** section in the Azure portal.
220220

221-
1. Copy the **Service Provider Login URL**, and then paste it into the **Sign On URL** box in **Basic SAML Configuration** section in the Azure portal.
221+
1. Copy the **Service Provider Login URL**, and then paste it into the **Sign On URL** box in **Basic SAML Configuration** section in the Azure portal. At the end of the **Service Provider Login URL** you will get the IDPID value.
222222

223223
1. Select **Close**.
224224

articles/active-directory/users-groups-roles/groups-naming-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ You can enforce naming policy for groups in two different ways:
3737

3838
### Prefix-suffix naming policy
3939

40-
The general structure of the naming convention is ‘Prefix[GroupName]Suffix’. While you can define multiple prefixes and suffixes, you can only have one instance of the [GroupName] in the setting. The prefixes or suffixes can be either fixed strings or user attributes such as \[Department\] that are substituted based on the user who is creating the group. The total allowable number of characters for your prefix and suffix strings combined is 53 characters.
40+
The general structure of the naming convention is ‘Prefix[GroupName]Suffix’. While you can define multiple prefixes and suffixes, you can only have one instance of the [GroupName] in the setting. The prefixes or suffixes can be either fixed strings or user attributes such as \[Department\] that are substituted based on the user who is creating the group. The total allowable number of characters for your prefix and suffix strings including group name is 53 characters.
4141

4242
Prefixes and suffixes can contain special characters that are supported in group name and group alias. Any characters in the prefix or suffix that are not supported in the group alias are still applied in the group name, but removed from the group alias. Because of this restriction, the prefixes and suffixes applied to the group name might be different from the ones applied to the group alias.
4343

0 commit comments

Comments
 (0)