Skip to content

Commit 5988b65

Browse files
committed
Merge branch 'master' of https://github.com/Microsoft/azure-docs-pr into wafupdate0529
2 parents 794c8fc + 0bbb77a commit 5988b65

File tree

43 files changed

+1045
-1036
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+1045
-1036
lines changed

articles/active-directory/develop/msal-client-application-configuration.md

Lines changed: 54 additions & 55 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/msal-client-applications.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -17,37 +17,37 @@ ms.date: 04/25/2019
1717
ms.author: ryanwi
1818
ms.reviewer: saeeda
1919
ms.custom: aaddev
20-
#Customer intent: As an application developer, I want to learn about the types of client application so I can decide if this platform meets my application development needs and requirements.
20+
#Customer intent: As an application developer, I want to learn about the types of client apps so I can decide if this platform meets my app development requirements.
2121
ms.collection: M365-identity-device-management
2222
---
2323

2424
# Public client and confidential client applications
25-
Microsoft Authentication Library (MSAL) defines two types of clients: public clients and confidential clients. The two client types are distinguished by their ability to authenticate securely with the authorization server and maintain the confidentiality of their client credentials. In contrast, Azure AD Authentication Library (ADAL) has the concept of authentication context (which is a connection to Azure AD).
25+
Microsoft Authentication Library (MSAL) defines two types of clients: public clients and confidential clients. The two client types are distinguished by their ability to authenticate securely with the authorization server and maintain the confidentiality of their client credentials. In contrast, Azure AD Authentication Library (ADAL) uses what's called *authentication context* (which is a connection to Azure AD).
2626

27-
- **Confidential client applications** are applications, which run on servers (Web Apps, Web API, or even service/daemon applications). They are considered difficult to access, and therefore capable of keeping an application secret. Confidential clients are able to hold configuration time secrets. Each instance of the client has a distinct configuration (including clientId and secret). These values are difficult for end users to extract. A web app is the most common confidential client. The client ID is exposed through the web browser, but the secret is passed only in the back channel and never directly exposed.
27+
- **Confidential client applications** are apps that run on servers (web apps, Web API apps, or even service/daemon apps). They're considered difficult to access, and for that reason capable of keeping an application secret. Confidential clients can hold configuration-time secrets. Each instance of the client has a distinct configuration (including client ID and client secret). These values are difficult for end users to extract. A web app is the most common confidential client. The client ID is exposed through the web browser, but the secret is passed only in the back channel and never directly exposed.
2828

2929
Confidential client apps: <BR>
3030
![Web app](media/msal-client-applications/web-app.png) ![Web API](media/msal-client-applications/web-api.png) ![Daemon/service](media/msal-client-applications/daemon-service.png)
3131

32-
- **Public client applications** are applications, which run on devices or desktop machines or in a web browser. They are not trusted to safely keep application secrets, and therefore only access Web APIs on behalf of the user (they only support public client flows). Public clients are unable to hold configuration time secrets, and as a result have no client secret.
32+
- **Public client applications** are apps that run on devices or desktop computers or in a web browser. They're not trusted to safely keep application secrets, so they only access Web APIs on behalf of the user. (They support only public client flows.) Public clients can't hold configuration-time secrets, so they don't have client secrets.
3333

34-
Public client applications: <BR>
34+
Public client apps: <BR>
3535
![Desktop app](media/msal-client-applications/desktop-app.png) ![Browserless API](media/msal-client-applications/browserless-app.png) ![Mobile app](media/msal-client-applications/mobile-app.png)
3636

3737
> [!NOTE]
38-
> In MSAL.js, there is no separation of public and confidential client apps. MSAL.js represents client apps as user-agent-based apps, a public client in which the client code is executed in a user-agent such as a web browser. These clients do not store secrets, since the browser context is openly accessible.
38+
> In MSAL.js, there is no separation of public and confidential client apps. MSAL.js represents client apps as user agent-based apps, public clients in which the client code is executed in a user agent like a web browser. These clients don't store secrets because the browser context is openly accessible.
3939
4040
## Comparing the client types
41-
There are some commonalities and differences between public client and confidential client applications:
41+
Here are some similarities and differences between public client and confidential client apps:
4242

43-
- Both kinds of applications maintain a user token cache and can acquire a token silently (in cases where the token is already in the token cache). Confidential client applications also have an app token cache for tokens, which are for the app itself.
44-
- Both manage user accounts and can get the accounts from the user token cache, get an account from its identifier, or remove an account.
45-
- Public client applications have four ways of acquiring a token (four authentication flows), whereas confidential client applications have three (and one method to compute the URL of the identity provider authorize endpoint). For more information, see Scenarios and Acquiring tokens.
43+
- Both kinds of app maintain a user token cache and can acquire a token silently (when the token is already in the token cache). Confidential client apps also have an app token cache for tokens that are for the app itself.
44+
- Both types of app manage user accounts and can get an account from the user token cache, get an account from its identifier, or remove an account.
45+
- Public client apps have four ways to acquire a token (four authentication flows). Confidential client apps have three ways to acquire a token (and one way to compute the URL of the identity provider authorize endpoint). For more information, see [Acquiring tokens](msal-acquire-cache-tokens.md).
4646

47-
If you used ADAL in the past, you might notice that, contrary to ADAL's authentication context, in MSAL the client ID (also named application ID or app ID) is passed once at the construction of the application, and no longer needs to be repeated when acquiring a token. This is the case both for public and confidential client applications. Constructors of confidential client applications are also passed client credentials: the secret they share with the identity provider.
47+
If you've used ADAL, you might notice that, unlike ADAL's authentication context, in MSAL the client ID (also called the *application ID* or *app ID*) is passed once at the construction of the application. It doesn't need to be passed again when the app acquires a token. This is true for both for public and confidential client apps. Constructors of confidential client apps are also passed client credentials: the secret they share with the identity provider.
4848

4949
## Next steps
5050
Learn about:
5151
- [Client application configuration options](msal-client-application-configuration.md)
52-
- [Instantiating client applications using MSAL.NET](msal-net-initializing-client-applications.md).
53-
- [Instantiating client applications using MSAL.js](msal-js-initializing-client-applications.md).
52+
- [Instantiating client applications by using MSAL.NET](msal-net-initializing-client-applications.md)
53+
- [Instantiating client applications by using MSAL.js](msal-js-initializing-client-applications.md)

articles/app-service/containers/configure-custom-container.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure customer containers - Azure App Service | Microsoft Docs
2+
title: Configure custom container - Azure App Service | Microsoft Docs
33
description: Learn how to configure Node.js apps to work in Azure App Service
44
services: app-service
55
documentationcenter: ''

articles/automation/automation-manage-send-joblogs-log-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ Diagnostics from Azure Automation creates two types of records in Azure Monitor
9292
| Caller_s |Who initiated the operation. Possible values are either an email address or system for scheduled jobs. |
9393
| Tenant_g | GUID that identifies the tenant for the Caller. |
9494
| JobId_g |GUID that is the Id of the runbook job. |
95-
| ResultType |The status of the runbook job. Possible values are:<br>- New<br>- Started<br>- Stopped<br>- Suspended<br>- Failed<br>- Completed |
95+
| ResultType |The status of the runbook job. Possible values are:<br>- New<br>- Created<br>- Started<br>- Stopped<br>- Suspended<br>- Failed<br>- Completed |
9696
| Category | Classification of the type of data. For Automation, the value is JobLogs. |
9797
| OperationName | Specifies the type of operation performed in Azure. For Automation, the value is Job. |
9898
| Resource | Name of the Automation account |

articles/azure-monitor/platform/alert-log-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: alerts
1313

1414
This article shows you how to resolve common issues that might happen when you're setting up log alerts in Azure Monitor. It also provides solutions to common problems with functionality or configuration of log alerts.
1515

16-
The term *log alerts* describes alerts that fire based on a log query in an [Azure Log Analytics workspace](../learn/tutorial-viewdata.md) or in [Azure Application Insights](../../azure-monitor/app/analytics.md). Learn more about functionality, terminology, and types in [Log alerts in Azure Monitor](../platform/alerts-unified-log.md).
16+
The term *log alerts* describe rules that fire based on a log query in an [Azure Log Analytics workspace](../learn/tutorial-viewdata.md) or in [Azure Application Insights](../../azure-monitor/app/analytics.md). Learn more about functionality, terminology, and types in [Log alerts in Azure Monitor](../platform/alerts-unified-log.md).
1717

1818
> [!NOTE]
1919
> This article doesn't consider cases where the Azure portal shows an alert rule triggered and a notification is not performed by an associated action group. For such cases, see the details in [Create and manage action groups in the Azure portal](../platform/action-groups.md).

articles/azure-monitor/platform/alerts-log.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Create, view and manage log alerts Using Azure Monitor | Microsoft Docs
3-
description: Use the Azure Monitor to author, view and manage log alert rules in Azure.
2+
title: Create, view, and manage log alerts Using Azure Monitor | Microsoft Docs
3+
description: Use the Azure Monitor to author, view, and manage log alert rules in Azure.
44
author: msvijayn
55
services: azure-monitor
66
ms.service: azure-monitor
@@ -331,7 +331,7 @@ Azure Monitor - [Scheduled Query Rules API](https://docs.microsoft.com/rest/api/
331331
> [!NOTE]
332332
> Log alerts for Log Analytics can also be managed using legacy [Log Analytics Alert API](api-alerts.md) and legacy templates of [Log Analytics saved searches and alerts](../insights/solutions-resources-searches-alerts.md) as well. For more information on using the new ScheduledQueryRules API detailed here by default, see [Switch to new API for Log Analytics Alerts](alerts-log-api-switch.md).
333333
334-
Log alerts currently do not have dedicated CLI commands currently; but as illustrated below can be used via Azure Resource Manager CLI command for sample Resource Template shown earlier (sampleScheduledQueryRule.json) in the Resource Template section :
334+
Log alerts currently do not have dedicated CLI commands currently; but as illustrated below can be used via Azure Resource Manager CLI command for sample Resource Template shown earlier (sampleScheduledQueryRule.json) in the Resource Template section:
335335

336336
```azurecli
337337
az group deployment create --resource-group contosoRG --template-file sampleScheduledQueryRule.json

0 commit comments

Comments
 (0)