Skip to content

Commit 59d9566

Browse files
authored
Merge branch 'master' into repo_sync_working_branch
2 parents ce25229 + cde15fa commit 59d9566

File tree

243 files changed

+3600
-2792
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

243 files changed

+3600
-2792
lines changed

.openpublishing.redirection.json

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9243,6 +9243,11 @@
92439243
"redirect_url": "https://docs.microsoft.com/azure/log-analytics/log-analytics-quick-collect-azurevm",
92449244
"redirect_document_id": false
92459245
},
9246+
{
9247+
"source_path": "articles/log-analytics/log-analytics-log-search-transition.md",
9248+
"redirect_url": "https://docs.microsoft.com/azure/log-analytics/query-language/get-started-queries",
9249+
"redirect_document_id": false
9250+
},
92469251
{
92479252
"source_path": "articles/machine-learning/machine-learning-apps-text-analytics.md",
92489253
"redirect_url": "/azure/cognitive-services/cognitive-services-text-analytics-quick-start",
@@ -21147,9 +21152,19 @@
2114721152
"redirect_url": "/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-autoscale-powershell",
2114821153
"redirect_document_id": false
2114921154
},
21155+
{
21156+
"source_path": "articles/security-center/security-center-platform-migration.md",
21157+
"redirect_url": "/azure/security-center/security-center-enable-data-collection",
21158+
"redirect_document_id": false
21159+
},
21160+
{
21161+
"source_path": "articles/security-center/security-center-platform-migration-faq.md",
21162+
"redirect_url": "/azure/security-center/security-center-enable-data-collection",
21163+
"redirect_document_id": false
21164+
},
2115021165
{
2115121166
"source_path": "articles/security-center/security-center-resolve-endpoint-protection-health-alerts.md",
21152-
"redirect_url": "/azure/security-center",
21167+
"redirect_url": "/azure/security-center-faq.md",
2115321168
"redirect_document_id": false
2115421169
},
2115521170
{
@@ -27380,6 +27395,11 @@
2738027395
"source_path": "articles/security-center/security-center-disk-encryption.md",
2738127396
"redirect_url": "/azure/security/azure-security-disk-encryption-overview",
2738227397
"redirect_document_id": false
27398+
},
27399+
{
27400+
"source_path": "articles/cognitive-services/LUIS/luis-reference-gdpr.md",
27401+
"redirect_url": "/azure/cognitive-services/LUIS/luis-user-privacy",
27402+
"redirect_document_id": true
2738327403
}
2738427404
]
2738527405
}

articles/active-directory/TOC.md

Lines changed: 0 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -128,31 +128,6 @@
128128
#### [Register for self-service password reset](user-help/active-directory-passwords-reset-register.md)
129129

130130

131-
## Manage devices
132-
### [Overview](devices/overview.md)
133-
134-
### Quickstarts
135-
#### [Set up Azure AD registered Windows 10 devices](user-help/device-management-azuread-registered-devices-windows10-setup.md)
136-
#### [Set up Azure AD joined devices](user-help/device-management-azuread-joined-devices-setup.md)
137-
138-
### Tutorials
139-
#### [Configure hybrid Azure AD join for managed domains](devices/hybrid-azuread-join-managed-domains.md)
140-
#### [Configure hybrid Azure AD join for federated domains](devices/hybrid-azuread-join-federated-domains.md)
141-
#### [Configure hybrid Azure AD join manually](devices/hybrid-azuread-join-manual-steps.md)
142-
#### [Configure Azure AD join during Windows 10 first-run experience](devices/azuread-joined-devices-frx.md)
143-
144-
### How-to-guides
145-
#### [Plan Azure AD join](devices/azureadjoin-plan.md)
146-
#### [Plan your hybrid Azure AD join implementation](devices/hybrid-azuread-join-plan.md)
147-
#### [Control the hybrid Azure AD join of your devices](devices/hybrid-azuread-join-control.md)
148-
#### [Assign local admins to Azure AD joined devices](devices/assign-local-admin.md)
149-
#### [Troubleshoot hybrid Azure AD joined Windows current devices](devices/troubleshoot-hybrid-join-windows-current.md)
150-
#### [Troubleshoot hybrid Azure AD joined legacy Windows devices](devices/troubleshoot-hybrid-join-windows-legacy.md)
151-
152-
### Concepts
153-
#### [Manage devices using the Azure portal](devices/device-management-azure-portal.md)
154-
#### [FAQs](devices/faq.md)
155-
156131
## Manage apps
157132
### [Overview](manage-apps/what-is-application-management.md)
158133
### [Getting started](manage-apps/plan-an-application-integration.md)

articles/active-directory/conditional-access/controls.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.devlang: na
1515
ms.topic: article
1616
ms.tgt_pltfrm: na
1717
ms.workload: identity
18-
ms.date: 06/13/2018
18+
ms.date: 08/28/2018
1919
ms.author: markvi
2020
ms.reviewer: calebb
2121

@@ -118,10 +118,13 @@ Providers currently offering a compatible service include:
118118

119119
- [Duo Security](https://duo.com/docs/azure-ca)
120120

121+
- [Entrust Datacard](https://www.entrustdatacard.com/products/authentication/intellitrust)
122+
121123
- RSA
122124

123125
- [Trusona](https://www.trusona.com/docs/azure-ad-integration-guide)
124126

127+
125128
For more information on those services, contact the providers directly.
126129

127130
### Creating custom controls

articles/active-directory/develop/reference-app-manifest.md

Lines changed: 41 additions & 36 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/v1-permissions-and-consent.md

Lines changed: 20 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 06/25/2018
17+
ms.date: 08/27/2018
1818
ms.author: celested
1919
ms.reviewer: jesakowi, justhu
2020
ms.custom: aaddev
@@ -34,10 +34,10 @@ Effective permissions are the permissions that your app will have when making re
3434

3535
* For delegated permissions, the effective permissions of your app will be the least privileged intersection of the delegated permissions the app has been granted (through consent) and the privileges of the currently signed-in user. Your app can never have more privileges than the signed-in user. Within organizations, the privileges of the signed-in user may be determined by policy or by membership in one or more administrator roles. For more information about administrator roles, see [Assigning administrator roles in Azure AD](../users-groups-roles/directory-assign-admin-roles.md).
3636
For example, assume your app has been granted the `User.ReadWrite.All` delegated permission in Microsoft Graph. This permission nominally grants your app permission to read and update the profile of every user in an organization. If the signed-in user is a global administrator, your app will be able to update the profile of every user in the organization. However, if the signed-in user is not in an administrator role, your app will be able to update only the profile of the signed-in user. It will not be able to update the profiles of other users in the organization because the user that it has permission to act on behalf of does not have those privileges.
37-
* For application permissions, the effective permissions of your app are the full level of privileges implied by the permission. For example, an app that has the `User.ReadWrite.All` application permission can update the profile of every user in the organization.
37+
* For application permissions, the effective permissions of your app are the full level of privileges implied by the permission. For example, an app that has the `User.ReadWrite.All` application permission can update the profile of every user in the organization.
3838

3939
## Permission attributes
40-
Permissions in Azure AD have a number of properties that help users, administrators, or app developers make informed decisions about what the permission grants access to.
40+
Permissions in Azure AD have a number of properties that help users, administrators, or app developers make informed decisions about what the permission grants access to.
4141

4242
> [!NOTE]
4343
> You can view the permissions that an Azure AD Application or Service Principal exposes using the Azure portal, or PowerShell. Try this script to view the permissions exposed by Microsoft Graph.
@@ -51,27 +51,28 @@ Permissions in Azure AD have a number of properties that help users, administrat
5151
> (Get-AzureADServicePrincipal -filter "DisplayName eq 'Microsoft Graph'").AppRoles
5252
> ```
5353
54-
| Property name | Description | Example |
54+
| Property name | Description | Example |
5555
| --- | --- | --- |
56-
| `ID` | Is a GUID value that uniquely identifies this permission. | 570282fd-fa5c-430d-a7fd-fc8dc98a9dca |
57-
| `IsEnabled` | Indicates whether this permission is available for use. | true |
58-
| `Type` | Indicates whether this permission requires user consent or admin consent. | User |
59-
| `AdminConsentDescription` | Is a description that's shown to administrators during the admin consent experiences | Allows the app to read email in user mailboxes. |
60-
| `AdminConsentDisplayName` | Is the friendly name that's shown to administrators during the admin consent experience. | Read user mail |
61-
| `UserConsentDescription` | Is a description that's shown to users during a user consent experience. | Allows the app to read email in your mailbox. |
62-
| `UserConsentDisplayName` | Is the friendly name that's shown to users during a user consent experience. | Read your mail |
63-
| `Value` | Is the string that's used to identify the permission during OAuth 2.0 authorize flows. `Value` may also be combined with the App ID URI string in order to form a fully qualified permission name. | `Mail.Read` |
56+
| `ID` | Is a GUID value that uniquely identifies this permission. | 570282fd-fa5c-430d-a7fd-fc8dc98a9dca |
57+
| `IsEnabled` | Indicates whether this permission is available for use. | true |
58+
| `Type` | Indicates whether this permission requires user consent or admin consent. | User |
59+
| `AdminConsentDescription` | Is a description that's shown to administrators during the admin consent experiences | Allows the app to read email in user mailboxes. |
60+
| `AdminConsentDisplayName` | Is the friendly name that's shown to administrators during the admin consent experience. | Read user mail |
61+
| `UserConsentDescription` | Is a description that's shown to users during a user consent experience. | Allows the app to read email in your mailbox. |
62+
| `UserConsentDisplayName` | Is the friendly name that's shown to users during a user consent experience. | Read your mail |
63+
| `Value` | Is the string that's used to identify the permission during OAuth 2.0 authorize flows. `Value` may also be combined with the App ID URI string in order to form a fully qualified permission name. | `Mail.Read` |
6464
6565
## Types of consent
66+
6667
Applications in Azure AD rely on consent in order to gain access to necessary resources or APIs. There are a number of kinds of consent that your app may need to know about in order to be successful. If you are defining permissions, you will also need to understand how your users will gain access to your app or API.
6768
6869
* **Static user consent** - Occurs automatically during the [OAuth 2.0 authorize flow](v1-protocols-oauth-code.md#request-an-authorization-code) when you specify the resource that your app wants to interact with. In the static user consent scenario, your app must have already specified all the permissions it needs in the app's configuration in the Azure portal. If the user (or administrator, as appropriate) has not granted consent for this app, then Azure AD will prompt the user to provide consent at this time.
6970
7071
Learn more about registering an Azure AD app that requests access to a static set of APIs.
7172
* **Dynamic user consent** - Is a feature of the v2 Azure AD app model. In this scenario, your app requests a set of permissions that it needs in the [OAuth 2.0 authorize flow for v2 apps](/azure/active-directory/develop/active-directory-v2-scopes#requesting-individual-user-consent). If the user has not consented already, they will be prompted to consent at this time. [Learn more about dynamic consent](/azure/active-directory/develop/active-directory-v2-compare#incremental-and-dynamic-consent).
7273
73-
> [!NOTE]
74-
> Dynamic consent can be convenient, but presents a big challenge for permissions that require admin consent, since the admin consent experience doesn't know about those permissions at consent time. If you require admin privileged permissions, your app must register them in the Azure Portal.
74+
> [!IMPORTANT]
75+
> Dynamic consent can be convenient, but presents a big challenge for permissions that require admin consent, since the admin consent experience doesn't know about those permissions at consent time. If you require admin privileged permissions or if your app uses dynamic consent, you must register all of the permissions in the Azure portal (not just the subset of permissions that require admin consent). This enables tenant admins to consent on behalf of all their users.
7576
7677
* **Admin consent** - Is required when your app needs access to certain high-privilege permissions. Admin consent ensures that administrators have some additional controls before authorizing apps or users to access highly privileged data from the organization. [Learn more about how to grant admin consent](/azure/active-directory/develop/active-directory-v2-scopes#using-the-admin-consent-endpoint).
7778
@@ -80,7 +81,7 @@ Applications in Azure AD rely on consent in order to gain access to necessary re
8081
### Client best practices
8182
8283
- Only request for permissions that your app needs. Apps with too many permissions are at risk of exposing user data if they are compromised.
83-
- Choose between delegated permissions and application permissions based on the scenario that your app supports.
84+
- Choose between delegated permissions and application permissions based on the scenario that your app supports.
8485
- Always use delegated permissions if the call is being made on behalf of a user.
8586
- Only use application permissions if the app is non-interactive and not making calls on behalf of any specific user. Application permissions are highly privileged and should only be used when absolutely necessary.
8687
- When using an app based on the v2.0 endpoint, always set the static permissions (those specified in your application registration) to be the superset of the dynamic permissions you request at runtime (those specified in code and sent as query parameters in your authorize request) so that scenarios like admin consent works correctly.
@@ -91,16 +92,11 @@ Applications in Azure AD rely on consent in order to gain access to necessary re
9192
- Resources should explicitly define `Read` and `ReadWrite` permissions separately.
9293
- Resources should mark any permissions that allow access to data across user boundaries as `Admin` permissions.
9394
- Resources should follow the naming pattern `Subject.Permission[.Modifier]`, where:
94-
- `Subject` corresponds with the type of data that is available,
95-
- `Permission` corresponds to the action that a user may take upon that data, and
96-
- `Modifier` is used optionally to describe specializations of another permission.
95+
- `Subject` corresponds with the type of data that is available
96+
- `Permission` corresponds to the action that a user may take upon that data
97+
- `Modifier` is used optionally to describe specializations of another permission
9798
98-
For example:
99+
For example:
99100
* Mail.Read - Allows users to read mail.
100101
* Mail.ReadWrite - Allows users to read or write mail.
101102
* Mail.ReadWrite.All - Allows an administrator or user to access all mail in the organization.
102-
103-
104-
105-
106-

0 commit comments

Comments
 (0)