Skip to content

Commit 5bef2eb

Browse files
authored
Merge pull request #99066 from MicrosoftDocs/master
12/16 AM Publish
2 parents 1b0d676 + d9adfd1 commit 5bef2eb

File tree

136 files changed

+1212
-989
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

136 files changed

+1212
-989
lines changed

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ If you don't yet have a SAML service provider and an associated metadata endpoin
6161
To build a trust relationship between your service provider and Azure AD B2C, you need to provide X509 certificates and their private keys.
6262

6363
* **Service provider certificates**
64-
* Certificate with a private key stored in your Web App. This certificate is used to by your service provider to sign the SAML request sent to Azure AD B2C. Azure AD B2C reads the public key from the service provider metadata to validate the signature.
64+
* Certificate with a private key stored in your Web App. This certificate is used by your service provider to sign the SAML request sent to Azure AD B2C. Azure AD B2C reads the public key from the service provider metadata to validate the signature.
6565
* (Optional) Certificate with a private key stored in your Web App. Azure AD B2C reads the public key from the service provider metadata to encrypt the SAML assertion. The service provider then uses the private key to decrypt the assertion.
6666
* **Azure AD B2C certificates**
6767
* Certificate with a private key in Azure AD B2C. This certificate is used by Azure AD B2C to sign the SAML response sent to your service provider. Your service provider reads the Azure AD B2C metadata public key to validate the signature of the SAML response.
@@ -96,7 +96,7 @@ If you don't already have a certificate, you can use a self-signed certificate f
9696
Next, upload the SAML assertion and response signing certificate to Azure AD B2C.
9797
9898
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to your Azure AD B2C tenant.
99-
1. Select **Settings** > **Identity Experience Framework** > **Policy Keys**.
99+
1. Under **Policies**, select **Identity Experience Framework** and then **Policy keys**.
100100
1. Select **Add**, and then select **Options** > **Upload**.
101101
1. Enter a **Name**, for example *SamlIdpCert*. The prefix *B2C_1A_* is automatically added to the name of your key.
102102
1. Upload your certificate using the upload file control.
@@ -318,7 +318,7 @@ For this tutorial, in which you use the SAML test application, set the `url` pro
318318

319319
#### LogoutUrl (Optional)
320320

321-
This optional property represents the `Logout` URL (`SingleLogoutService` URL in the relying party metadata), and the `BindingType` for this is assumed to be `HttpDirect`.
321+
This optional property represents the `Logout` URL (`SingleLogoutService` URL in the relying party metadata), and the `BindingType` for this is assumed to be `Http-Redirect`.
322322

323323
For this tutorial which uses the SAML test application, leave `logoutUrl` set to `https://samltestapp2.azurewebsites.net/logout`:
324324

@@ -374,4 +374,4 @@ The following SAML relying party (RP) scenarios are supported via your own metad
374374
You can find more information about the [SAML protocol on the OASIS website](https://www.oasis-open.org/).
375375

376376
<!-- LINKS - External -->
377-
[samltest]: https://aka.ms/samltestapp
377+
[samltest]: https://aka.ms/samltestapp

articles/active-directory-b2c/custom-email.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,8 @@ The `GenerateOtp` technical profile generates a code for the email address. The
256256
<InputClaim ClaimTypeReferenceId="verificationCode" PartnerClaimType="otpToVerify" />
257257
</InputClaims>
258258
</TechnicalProfile>
259-
</ClaimsProviders>
259+
</TechnicalProfiles>
260+
</ClaimsProviders>
260261
```
261262

262263
## Add a REST API technical profile

articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ Once you've added app roles in your application, you can assign users and groups
121121

122122
- [Authorization in a web app using Azure AD application roles &amp; role claims (Sample)](https://github.com/Azure-Samples/active-directory-dotnet-webapp-roleclaims)
123123
- [Using Security Groups and Application Roles in your apps (Video)](https://www.youtube.com/watch?v=V8VUPixLSiM)
124-
- [Azure Active Directory, now with Group Claims and Application Roles](https://cloudblogs.microsoft.com/enterprisemobility/2014/12/18/azure-active-directory-now-with-group-claims-and-application-roles)
124+
- [Azure Active Directory, now with Group Claims and Application Roles](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-Active-Directory-now-with-Group-Claims-and-Application/ba-p/243862)
125125
- [Azure Active Directory app manifest](https://docs.microsoft.com/azure/active-directory/develop/reference-app-manifest)
126126
- [AAD Access tokens](access-tokens.md)
127127
- [AAD `id_tokens`](id-tokens.md)

articles/active-directory/develop/msal-net-xamarin-android-considerations.md

Lines changed: 19 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Xamarin Android considerations (MSAL.NET) | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn about specific considerations when using Xamarin Android with the Microsoft Authentication Library for .NET (MSAL.NET).
55
services: active-directory
6-
author: TylerMSFT
6+
author: jmprieur
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -80,6 +80,23 @@ The `AndroidManifest.xml` should contain the following values:
8080
</activity>
8181
```
8282

83+
Or, you can [create the activity in code](https://docs.microsoft.com/xamarin/android/platform/android-manifest#the-basics) and not manually edit `AndroidManifest.xml`. For that, you must create a class that has the `Activity` and `IntentFilter` attribute. A class that represents the same values of the above xml would be:
84+
85+
```csharp
86+
[Activity]
87+
[IntentFilter(new[] { Intent.ActionView },
88+
Categories = new[] { Intent.CategoryBrowsable, Intent.CategoryDefault },
89+
DataHost = "auth",
90+
DataScheme = "msal{client_id}")]
91+
public class MsalActivity : BrowserTabActivity
92+
{
93+
}
94+
```
95+
96+
### XamarinForms 4.3.X manifest
97+
98+
The code generated by XamarinForms 4.3.x sets the `package` attribute to `com.companyname.{appName}` in the `AndroidManifest.xml`. You might want to change the value to be same as the `MainActivity.cs` namespace, if you use the `DataScheme` as `msal{client_id}`.
99+
83100
## Use the embedded web view (optional)
84101

85102
By default MSAL.NET uses the system web browser, which enables you to get SSO with Web applications and other apps. In some rare cases, you might want to specify that you want to use the embedded web view. For more information, see [MSAL.NET uses a Web browser](msal-net-web-browsers.md) and [Android system browser](msal-net-system-browser-android-considerations.md).
@@ -124,4 +141,4 @@ More details and samples are provided in the [Android Specific Considerations](h
124141
125142
| Sample | Platform | Description |
126143
| ------ | -------- | ----------- |
127-
|[https://github.com/Azure-Samples/active-directory-xamarin-native-v2](https://github.com/azure-samples/active-directory-xamarin-native-v2) | Xamarin iOS, Android, UWP | A simple Xamarin Forms app showcasing how to use MSAL to authenticate MSA and Azure AD via the AADD v2.0 endpoint, and access the Microsoft Graph with the resulting token. <br>![Topology](media/msal-net-xamarin-android-considerations/topology.png) |
144+
|[https://github.com/Azure-Samples/active-directory-xamarin-native-v2](https://github.com/azure-samples/active-directory-xamarin-native-v2) | Xamarin iOS, Android, UWP | A simple Xamarin Forms app showcasing how to use MSAL to authenticate MSA and Azure AD via the AADD v2.0 endpoint, and access the Microsoft Graph with the resulting token. <br>![Topology](media/msal-net-xamarin-android-considerations/topology.png) |

articles/active-directory/develop/msal-net-xamarin-ios-considerations.md

Lines changed: 13 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Xamarin iOS considerations (MSAL.NET) | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn about specific considerations when using Xamarin iOS with the Microsoft Authentication Library for .NET (MSAL.NET).
55
services: active-directory
6-
author: TylerMSFT
6+
author: jmprieur
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -27,13 +27,6 @@ On Xamarin iOS, there are several considerations that you must take into account
2727
- [Enable token cache sharing](#enable-token-cache-sharing-across-ios-applications)
2828
- [Enable Keychain access](#enable-keychain-access)
2929

30-
## Known issues with iOS 12 and authentication
31-
Microsoft has released a [security advisory](https://github.com/aspnet/AspNetCore/issues/4647) to provide information about an incompatibility between iOS12 and some types of authentication. The incompatibility breaks social, WSFed, and OIDC logins. This advisory also provides guidance on what developers can do to remove current security restrictions added by ASP.NET to their applications to become compatible with iOS12.
32-
33-
When developing MSAL.NET applications on Xamarin iOS, you may see an infinite loop when trying to sign in to websites from iOS 12 (similar to this [ADAL issue](https://github.com/AzureAD/azure-activedirectory-library-for-dotnet/issues/1329).
34-
35-
You might also see a break in ASP.NET Core OIDC authentication with iOS 12 Safari as described in this [WebKit issue](https://bugs.webkit.org/show_bug.cgi?id=188165).
36-
3730
## Implement OpenUrl
3831

3932
First you need to override the `OpenUrl` method of the `FormsApplicationDelegate` derived class and call `AuthenticationContinuationHelper.SetAuthenticationContinuationEventArgs`.
@@ -53,40 +46,28 @@ You'll also need to define a URL scheme, require permissions for your app to cal
5346
To enable keychain access, your application must have a keychain access group.
5447
You can set your keychain access group by using the `WithIosKeychainSecurityGroup()` api when creating your application as shown below:
5548

56-
To enable single sign-on, you need to set the `PublicClientApplication.iOSKeychainSecurityGroup` property to the same value in all of the applications.
49+
To benefit from the cache and single sign-on, you need to set the keychain access group to the same value in all of your applications.
5750

58-
An example of this using MSAL v3.x would be:
51+
An example of this using MSAL v4.x would be:
5952
```csharp
6053
var builder = PublicClientApplicationBuilder
6154
.Create(ClientId)
62-
.WithIosKeychainSecurityGroup("com.microsoft.msalrocks")
55+
.WithIosKeychainSecurityGroup("com.microsoft.adalcache")
6356
.Build();
6457
```
6558

66-
The entitlements.plist should be updated to look like the following XML fragment:
67-
6859
This change is *in addition* to enabling keychain access in the `Entitlements.plist` file, using either the below access group or your own:
6960

7061
```xml
71-
<?xml version="1.0" encoding="UTF-8" ?>
72-
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
73-
<plist version="1.0">
7462
<dict>
7563
<key>keychain-access-groups</key>
7664
<array>
77-
<string>$(AppIdentifierPrefix)com.microsoft.msalrocks</string>
65+
<string>$(AppIdentifierPrefix)com.microsoft.adalcache</string>
7866
</array>
7967
</dict>
80-
</plist>
8168
```
8269

83-
An example of this using MSAL v4.x would be:
84-
85-
```csharp
86-
PublicClientApplication.iOSKeychainSecurityGroup = "com.microsoft.msalrocks";
87-
```
88-
89-
When using the `WithIosKeychainSecurityGroup()` api, MSAL will automatically append your security group to the end of the application's "team ID" (AppIdentifierPrefix) because when you build your application using xcode, it will do the same. [See iOS entitlements documentation for more details](https://developer.apple.com/documentation/security/keychain_services/keychain_items/sharing_access_to_keychain_items_among_a_collection_of_apps). That's why you need to update the entitlements to include $(AppIdentifierPrefix) before the keychain access group in the entitlements.plist.
70+
When you use the `WithIosKeychainSecurityGroup()` api, MSAL automatically appends your security group to the end of the application's *team ID* (AppIdentifierPrefix) because when you build your application using xcode, it will do the same. For more information, see [iOS entitlements documentation](https://developer.apple.com/documentation/security/keychain_services/keychain_items/sharing_access_to_keychain_items_among_a_collection_of_apps). That's why the entitlements need to include `$(AppIdentifierPrefix)` before the keychain access group in the `Entitlements.plist`.
9071

9172
### Enable token cache sharing across iOS applications
9273

@@ -125,3 +106,10 @@ Sample | Platform | Description
125106
[https://github.com/Azure-Samples/active-directory-xamarin-native-v2](https://github.com/azure-samples/active-directory-xamarin-native-v2) | Xamarin iOS, Android, UWP | A simple Xamarin Forms app showcasing how to use MSAL to authenticate MSA and Azure AD via the Azure AD V2.0 endpoint, and access the Microsoft Graph with the resulting token.
126107

127108
<!--- https://github.com/Azure-Samples/active-directory-xamarin-native-v2/blob/master/ReadmeFiles/Topology.png -->
109+
110+
## Known issues with iOS 12 and authentication
111+
Microsoft has released a [security advisory](https://github.com/aspnet/AspNetCore/issues/4647) to provide information about an incompatibility between iOS12 and some types of authentication. The incompatibility breaks social, WSFed, and OIDC logins. This advisory also provides guidance on what developers can do to remove current security restrictions added by ASP.NET to their applications to become compatible with iOS12.
112+
113+
When developing MSAL.NET applications on Xamarin iOS, you might see an infinite loop when trying to sign in to websites from iOS 12 (similar to this [ADAL issue](https://github.com/AzureAD/azure-activedirectory-library-for-dotnet/issues/1329)).
114+
115+
You might also see a break in ASP.NET Core OIDC authentication with iOS 12 Safari as described in this [WebKit issue](https://bugs.webkit.org/show_bug.cgi?id=188165).

articles/asc-for-iot/how-to-deploy-linux-cs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To deploy the security agent, use the following steps:
4848

4949
1. Add running permissions to the **InstallSecurityAgent script** by running `chmod +x InstallSecurityAgent.sh`
5050

51-
1. Next, run:
51+
1. Next, run the following command with **root privileges**:
5252

5353
```
5454
./InstallSecurityAgent.sh -i -aui <authentication identity> -aum <authentication method> -f <file path> -hn <host name> -di <device id> -cl <certificate location kind>
@@ -122,4 +122,4 @@ To uninstall the agent, run the script with the –u parameter: `./InstallSecuri
122122
- Learn more about Azure Security Center for IoT [Architecture](architecture.md)
123123
- Enable the [service](quickstart-onboard-iot-hub.md)
124124
- Read the [FAQ](resources-frequently-asked-questions.md)
125-
- Understand [alerts](concept-security-alerts.md)
125+
- Understand [alerts](concept-security-alerts.md)

articles/automation/automation-tutorial-installed-software.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,10 @@ title: Discover what software is installed on your machines with Azure Automatio
33
description: Use Inventory to discover what software is installed on the machines across your environment.
44
services: automation
55
keywords: inventory, automation, change, tracking
6-
author: jennyhunter-msft
7-
ms.author: jehunte
86
ms.date: 04/11/2018
97
ms.topic: tutorial
10-
ms.service: automation
118
ms.subservice: change-inventory-management
129
ms.custom: mvc
13-
manager: carmonm
1410
---
1511
# Discover what software is installed on your Azure and non-Azure machines
1612

articles/automation/automation-tutorial-troubleshoot-changes.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,11 @@
22
title: Troubleshoot changes on an Azure virtual machine | Microsoft Docs
33
description: Use Change Tracking to troubleshoot changes on an Azure virtual machine.
44
services: automation
5-
ms.service: automation
65
ms.subservice: change-inventory-management
76
keywords: change, tracking, automation
8-
author: jennyhunter-msft
9-
ms.author: jehunte
107
ms.date: 12/05/2018
118
ms.topic: tutorial
129
ms.custom: mvc
13-
manager: carmonm
1410
---
1511

1612
# Troubleshoot changes in your environment

articles/automation/automation-tutorial-update-management.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,9 @@
22
title: Manage updates and patches for your Azure VMs
33
description: This article provides an overview of how to use Azure Automation Update Management to manage updates and patches for your Azure and non-Azure VMs.
44
services: automation
5-
author: mgoedtel
6-
ms.service: automation
75
ms.subservice: update-management
86
ms.topic: tutorial
97
ms.date: 12/03/2019
10-
ms.author: magoedte
118
ms.custom: mvc
129
---
1310
# Manage updates and patches for your Azure VMs

articles/automation/automation-update-azure-modules.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,9 @@
22
title: Update Azure modules in Azure Automation
33
description: This article describes how you can now update common Azure PowerShell modules provided by default in Azure Automation.
44
services: automation
5-
ms.service: automation
65
ms.subservice: process-automation
7-
author: mgoedtel
8-
ms.author: magoedte
96
ms.date: 06/14/2019
107
ms.topic: conceptual
11-
manager: carmonm
128
---
139

1410
# How to update Azure PowerShell modules in Azure Automation

0 commit comments

Comments
 (0)