Skip to content

Commit 5cee9bb

Browse files
author
Dana Sindona
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into transact-upadtes
2 parents 94da1f8 + 5c8dd10 commit 5cee9bb

File tree

888 files changed

+7591
-5694
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

888 files changed

+7591
-5694
lines changed

.openpublishing.redirection.json

Lines changed: 131 additions & 191 deletions
Large diffs are not rendered by default.

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ When you configure provisioning to a SaaS application, one of the types of attri
6363

6464
For outbound provisioning from Azure AD to a SaaS application, relying on [user or group assignments](../manage-apps/assign-user-or-group-access-portal.md) is the most common way to determine which users are in scope for provisioning. Because user assignments are also used for enabling single sign-on, the same method can be used for managing both access and provisioning. Assignment-based scoping doesn't apply to inbound provisioning scenarios such as Workday and Successfactors.
6565

66-
* **Groups.** With an Azure AD Premium license plan, you can use groups to assign access to a SaaS application. Then, when the provisioning scope is set to **Sync only assigned users and groups**, the Azure AD provisioning service will provision or de-provision users based on whether they're members of a group that's assigned to the application. The group object itself isn't provisioned unless the application supports group objects.
66+
* **Groups.** With an Azure AD Premium license plan, you can use groups to assign access to a SaaS application. Then, when the provisioning scope is set to **Sync only assigned users and groups**, the Azure AD provisioning service will provision or de-provision users based on whether they're members of a group that's assigned to the application. The group object itself isn't provisioned unless the application supports group objects. Ensure that groups assigned to your application have the property "SecurityEnabled" set to "False".
6767

6868
* **Dynamic groups.** The Azure AD user provisioning service can read and provision users in [dynamic groups](../users-groups-roles/groups-create-rule.md). Keep these caveats and recommendations in mind:
6969

articles/active-directory/azuread-dev/active-directory-devhowto-adal-error-handling.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -538,7 +538,7 @@ To explore specific ADAL errors, the source code in the [azure-activedirectory-l
538538
539539
#### Operating system errors
540540
541-
iOS errors may arise during sign-in when users use web views, and the nature of authentication. This can be caused by conditions such as SSL errors, timeouts, or network errors:
541+
iOS errors may arise during sign-in when users use web views, and the nature of authentication. This can be caused by conditions such as TLS errors, timeouts, or network errors:
542542
543543
- For Entitlement Sharing, logins are not persistent and the cache appears empty. You can resolve by adding the following line of code to the keychain:
544544
`[[ADAuthenticationSettings sharedInstance] setSharedCacheKeychainGroup:nil];`

articles/active-directory/develop/GuidedSetups/active-directory-mobileanddesktopapp-windowsdesktop-configure-arp.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,13 @@
11
---
2-
title: Azure AD v2 Windows Desktop Getting Started - Config | Microsoft Docs
2+
title: Azure AD v2 Windows Desktop Getting Started - Config
33
description: How a Windows Desktop .NET (XAML) application can get an access token and call an API protected by Azure Active Directory v2 endpoint.
44
services: active-directory
5-
documentationcenter: dev-center-name
6-
author: andretms
5+
author: jmprieur
76
manager: CelesteDG
8-
editor: ''
97

10-
ms.assetid: 820acdb7-d316-4c3b-8de9-79df48ba3b06
118
ms.service: active-directory
129
ms.subservice: develop
13-
ms.devlang: na
1410
ms.topic: conceptual
15-
ms.tgt_pltfrm: na
1611
ms.workload: identity
1712
ms.date: 01/29/2020
1813
ms.author: ryanwi

articles/active-directory/develop/active-directory-authentication-protocols.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
2-
title: Microsoft identity platform authentication protocols | Microsoft Docs
2+
title: Microsoft identity platform authentication protocols
33
description: An overview of the authentication protocols supported by Microsoft identity platform
44
author: rwike77
55
services: active-directory
66
manager: CelesteDG
77

8-
ms.assetid: 7a838ae2-c24c-4304-b6c0-e77fb888e6c0
98
ms.service: active-directory
109
ms.subservice: develop
1110
ms.topic: conceptual

articles/active-directory/develop/active-directory-certificate-credentials.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ services: active-directory
66
author: rwike77
77
manager: CelesteDG
88

9-
ms.assetid: 88f0c64a-25f7-4974-aca2-2acadc9acbd8
109
ms.service: active-directory
1110
ms.subservice: develop
1211
ms.workload: identity

articles/active-directory/develop/active-directory-enterprise-app-role-management.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ services: active-directory
66
author: jeevansd
77
manager: CelesteDG
88

9-
ms.assetid: eb2b3741-3cde-45c8-b639-a636f3df3b74
109
ms.service: active-directory
1110
ms.subservice: develop
1211
ms.custom: aaddev

articles/active-directory/develop/active-directory-graph-api-quickstart.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ services: active-directory
55
author: rwike77
66
manager: CelesteDG
77

8-
ms.assetid: 9dc268a9-32e8-402c-a43f-02b183c295c5
98
ms.service: active-directory
109
ms.subservice: develop
1110
ms.topic: conceptual

articles/active-directory/develop/active-directory-graph-api.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
2-
title: Azure Active Directory Graph API | Microsoft Docs
2+
title: Azure Active Directory Graph API
33
description: An overview and quickstart guide for Azure AD Graph API, which allows programmatic access to Azure AD through REST API endpoints.
44
services: active-directory
55
author: rwike77
66
manager: CelesteDG
77

8-
ms.assetid: 5471ad74-20b3-44df-a2b5-43cde2c0a045
98
ms.service: active-directory
109
ms.subservice: develop
1110
ms.topic: conceptual

articles/active-directory/develop/active-directory-how-applications-are-added.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ services: active-directory
66
author: rwike77
77
manager: CelesteDG
88

9-
ms.assetid: 3321d130-f2a8-4e38-b35e-0959693f3576
109
ms.service: active-directory
1110
ms.subservice: develop
1211
ms.topic: conceptual

0 commit comments

Comments
 (0)