Skip to content

Commit 5da8ca8

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into defend
2 parents 40f1934 + b6c2f69 commit 5da8ca8

File tree

243 files changed

+5577
-1908
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

243 files changed

+5577
-1908
lines changed

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1362,6 +1362,7 @@ Use the checklist to onboard your application quickly and customers have a smoot
13621362
> * Establish engineering and support contacts to guide customers post gallery onboarding (Required)
13631363
> * 3 Non-expiring test credentials for your application (Required)
13641364
> * Support the OAuth authorization code grant or a long lived token as described in the example (Required)
1365+
> * OIDC apps must have at least 1 role (custom or default) defined
13651366
> * Establish an engineering and support point of contact to support customers post gallery onboarding (Required)
13661367
> * [Support schema discovery (required)](https://tools.ietf.org/html/rfc7643#section-6)
13671368
> * Support updating multiple group memberships with a single PATCH

articles/active-directory/app-proxy/app-proxy-protect-ndes.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -74,17 +74,12 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
7474
1. Select **+Add** to save your application.
7575

7676
1. Test whether you can access your NDES server via the Azure AD Application proxy by pasting the link you copied in step 15 into a browser. You should see a default IIS welcome page.
77-
7877
1. As a final test, add the *mscep.dll* path to the existing URL you pasted in the previous step:
79-
80-
`https://scep-test93635307549127448334.msappproxy.net/certsrv/mscep/mscep.dll`
81-
78+
`https://scep-test93635307549127448334.msappproxy.net/certsrv/mscep/mscep.dll`
8279
1. You should see an **HTTP Error 403 – Forbidden** response.
83-
8480
1. Change the NDES URL provided (via Microsoft Intune) to devices. This change could either be in Microsoft Configuration Manager or the Microsoft Intune admin center.
85-
86-
* For Configuration Manager, go to the certificate registration point and adjust the URL. This URL is what devices call out to and present their challenge.
87-
* For Intune standalone, either edit or create a new SCEP policy and add the new URL.
81+
- For Configuration Manager, go to the certificate registration point and adjust the URL. This URL is what devices call out to and present their challenge.
82+
- For Intune standalone, either edit or create a new SCEP policy and add the new URL.
8883

8984
## Next steps
9085

articles/active-directory/develop/apple-sso-plugin.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,13 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 03/13/2023
12+
ms.date: 04/18/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: brandwe
1515
ms.custom: aaddev
1616
---
1717

18-
# Microsoft Enterprise SSO plug-in for Apple devices (preview)
19-
20-
> [!IMPORTANT]
21-
> This feature is in public preview. This preview is provided without a service-level agreement. For more information, see [Supplemental terms of use for Microsoft Azure public previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
18+
# Microsoft Enterprise SSO plug-in for Apple devices
2219

2320
The *Microsoft Enterprise SSO plug-in for Apple devices* provides single sign-on (SSO) for Azure Active Directory (Azure AD) accounts on macOS, iOS, and iPadOS across all applications that support Apple's [enterprise single sign-on](https://developer.apple.com/documentation/authenticationservices) feature. The plug-in provides SSO for even old applications that your business might depend on but that don't yet support the latest identity libraries or protocols. Microsoft worked closely with Apple to develop this plug-in to increase your application's usability while providing the best protection available.
2421

@@ -50,12 +47,12 @@ To use the Microsoft Enterprise SSO plug-in for Apple devices:
5047

5148
### iOS requirements
5249
- iOS 13.0 or higher must be installed on the device.
53-
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. For Public Preview, these applications are the [Microsoft Authenticator app](https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc).
50+
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. This app is the [Microsoft Authenticator app](https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc).
5451

5552

5653
### macOS requirements
5754
- macOS 10.15 or higher must be installed on the device.
58-
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. For Public Preview, these applications include the [Intune Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp).
55+
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. This app is the [Intune Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp).
5956

6057
## Enable the SSO plug-in
6158

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
title: "Quickstart: Add sign in to a Angular SPA"
3+
description: Learn how to run a sample Angular SPA to sign in users
4+
services: active-directory
5+
author: kengaderdus
6+
manager: mwongerapk
7+
ms.author: kengaderdus
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ROBOTS: NOINDEX
11+
ms.subservice: ciam
12+
ms.topic: portal
13+
ms.date: 05/05/2023
14+
---
15+
16+
# Portal quickstart for Angular SPA
17+
18+
> In this quickstart, you download and run a code sample that demonstrates how a Angular single-page application (SPA) can sign in users with Azure Active Directory for customers.
19+
>
20+
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
21+
> 1. Make sure you've installed [Node.js](https://nodejs.org/en/download/).
22+
>
23+
> 1. Unzip the sample, `cd` into the folder that contains `package.json`, then run the following commands:
24+
> ```console
25+
> npm install && npm start
26+
> ```
27+
> 1. Open your browser, visit `http://locahost:4200`, select **Sign-in**, then follow the prompts.
28+
>
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
title: "Quickstart: Add sign in to a React SPA"
3+
description: Learn how to run a sample React SPA to sign in users
4+
services: active-directory
5+
author: kengaderdus
6+
manager: mwongerapk
7+
ms.author: kengaderdus
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ROBOTS: NOINDEX
11+
ms.subservice: ciam
12+
ms.topic: portal
13+
ms.date: 05/05/2023
14+
---
15+
16+
# Portal quickstart for React SPA
17+
18+
> In this quickstart, you download and run a code sample that demonstrates how a React single-page application (SPA) can sign in users with Azure Active Directory for customers.
19+
>
20+
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
21+
> 1. Make sure you've installed [Node.js](https://nodejs.org/en/download/).
22+
>
23+
> 1. Unzip the sample, `cd` into the folder that contains `package.json`, then run the following commands:
24+
> ```console
25+
> npm install && npm start
26+
> ```
27+
> 1. Open your browser, visit `http://locahost:3000`, select **Sign-in**, then follow the prompts.
28+
>
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
title: "Quickstart: Add sign in to a JavaScript SPA"
3+
description: Learn how to run a sample JavaScript SPA to sign in users
4+
services: active-directory
5+
author: kengaderdus
6+
manager: mwongerapk
7+
ms.author: kengaderdus
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ROBOTS: NOINDEX
11+
ms.subservice: ciam
12+
ms.topic: portal
13+
ms.date: 05/05/2023
14+
---
15+
16+
# Portal quickstart for JavaScript application
17+
18+
> In this quickstart, you download and run a code sample that demonstrates how a JavaScript SPA can sign in users with Azure Active Directory for customers.
19+
>
20+
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
21+
> 1. Make sure you've installed [Node.js](https://nodejs.org/en/download/).
22+
>
23+
> 1. Unzip the sample, `cd` into the app root folder, then run the following commands:
24+
> ```console
25+
> cd App && npm install && npm start
26+
> ```
27+
> 1. Open your browser, visit `http://locahost:3000`, select **Sign-in**, then follow the prompts.
28+
>
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
title: "Quickstart: Add sign in to ASP.NET web app"
3+
description: Learn how to run a sample ASP.NET web app to sign in users
4+
services: active-directory
5+
author: kengaderdus
6+
manager: mwongerapk
7+
ms.author: kengaderdus
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ROBOTS: NOINDEX
11+
ms.subservice: ciam
12+
ms.topic: portal
13+
ms.date: 05/05/2023
14+
---
15+
16+
# Portal quickstart for ASP.NET web app
17+
18+
> In this quickstart, you download and run a code sample that demonstrates how ASP.NET web app can sign in users with Azure Active Directory for customers.
19+
>
20+
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
21+
> 1. Make sure you've installed Make sure you've installed [.NET SDK v7](https://dotnet.microsoft.com/download/dotnet/7.0) or later.
22+
>
23+
> 1. Unzip the sample, `cd` into the app root folder, then run the following command:
24+
> ```console
25+
> dotnet run
26+
> ```
27+
> 1. Open your browser, visit `https://locahost:7274`, select **Sign-in**, then follow the prompts.
28+
>
Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: "Quickstart: Add sign in to a React SPA"
3-
description: Learn how to run a sample React SPA to sign in users
2+
title: "Quickstart: Add sign in to a Node.js/Express web app"
3+
description: Learn how to run a sample Node.js/Express web app to sign in users
44
services: active-directory
55
author: kengaderdus
66
manager: mwongerapk
@@ -10,12 +10,12 @@ ms.workload: identity
1010
ROBOTS: NOINDEX
1111
ms.subservice: ciam
1212
ms.topic: portal
13-
ms.date: 04/12/2023
13+
ms.date: 05/05/2023
1414
---
1515

16-
# Portal quickstart for React SPA
16+
# Portal quickstart for Node.js/Express web app
1717

18-
> In this quickstart, you download and run a code sample that demonstrates how a React single-page application (SPA) can sign in users with Azure AD CIAM.
18+
> In this quickstart, you download and run a code sample that demonstrates how a Node.js/Express web app can sign in users with Azure Active Directory for customers.
1919
>
2020
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
2121
> 1. Make sure you've installed [Node.js](https://nodejs.org/en/download/).
@@ -24,5 +24,5 @@ ms.date: 04/12/2023
2424
> ```console
2525
> npm install && npm start
2626
> ```
27-
> 1. Open your browser, visit `http://locahost:3000`, select **Sign-in** link, then follow the prompts.
27+
> 1. Open your browser, visit `http://locahost:3000`, select **Sign-in**, then follow the prompts.
2828
>

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.service: active-directory
1313
ms.subservice: enterprise-users
1414
ms.topic: reference
1515
ms.workload: identity
16-
ms.date: 04/17/2023
16+
ms.date: 04/20/2023
1717
ms.author: nicholak
1818
ms.reviewer: Nicholak-MS
1919
ms.custom: "it-pro;seo-update-azuread-jan"
@@ -32,7 +32,7 @@ When managing licenses in [the Azure portal](https://portal.azure.com/#blade/Mic
3232
- **Service plans included (friendly names)**: A list of service plans (friendly names) in the product that correspond to the string ID and GUID
3333

3434
>[!NOTE]
35-
>This information last updated on April 17th, 2023.<br/>You can also download a CSV version of this table [here](https://download.microsoft.com/download/e/3/e/e3e9faf2-f28b-490a-9ada-c6089a1fc5b0/Product%20names%20and%20service%20plan%20identifiers%20for%20licensing.csv).
35+
>This information last updated on April 20th, 2023.<br/>You can also download a CSV version of this table [here](https://download.microsoft.com/download/e/3/e/e3e9faf2-f28b-490a-9ada-c6089a1fc5b0/Product%20names%20and%20service%20plan%20identifiers%20for%20licensing.csv).
3636
><br/>
3737
3838
| Product name | String ID | GUID | Service plans included | Service plans included (friendly names) |
@@ -204,6 +204,7 @@ When managing licenses in [the Azure portal](https://portal.azure.com/#blade/Mic
204204
| Microsoft Cloud App Security | ADALLOM_STANDALONE | df845ce7-05f9-4894-b5f2-11bbfbcfd2b6 | EXCHANGE_S_FOUNDATION (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>ADALLOM_S_STANDALONE (2e2ddb96-6af9-4b1d-a3f0-d6ecfd22edb2) | Exchange Foundation (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>Microsoft Cloud App Security (2e2ddb96-6af9-4b1d-a3f0-d6ecfd22edb2) |
205205
| Microsoft Defender for Endpoint | WIN_DEF_ATP | 111046dd-295b-4d6d-9724-d52ac90bd1f2 | EXCHANGE_S_FOUNDATION (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>WINDEFATP (871d91ec-ec1a-452b-a83f-bd76c7d770ef) | Exchange Foundation (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>MICROSOFT DEFENDER FOR ENDPOINT (871d91ec-ec1a-452b-a83f-bd76c7d770ef) |
206206
| Microsoft Defender for Endpoint P1 | DEFENDER_ENDPOINT_P1 | 16a55f2f-ff35-4cd5-9146-fb784e3761a5 | Intune_Defender (1689aade-3d6a-4bfc-b017-46d2672df5ad)<br/>MDE_LITE (292cc034-7b7c-4950-aaf5-943befd3f1d4) | MDE_SecurityManagement (1689aade-3d6a-4bfc-b017-46d2672df5ad)<br/>Microsoft Defender for Endpoint Plan 1 (292cc034-7b7c-4950-aaf5-943befd3f1d4) |
207+
| Microsoft Defender for Endpoint P1 for EDU | DEFENDER_ENDPOINT_P1_EDU | bba890d4-7881-4584-8102-0c3fdfb739a7 | MDE_LITE (292cc034-7b7c-4950-aaf5-943befd3f1d4) | Microsoft Defender for Endpoint Plan 1 (292cc034-7b7c-4950-aaf5-943befd3f1d4) |
207208
| Microsoft Defender for Endpoint P2_XPLAT | MDATP_XPLAT | b126b073-72db-4a9d-87a4-b17afe41d4ab | EXCHANGE_S_FOUNDATION (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>Intune_Defender (1689aade-3d6a-4bfc-b017-46d2672df5ad)<br/>WINDEFATP (871d91ec-ec1a-452b-a83f-bd76c7d770ef) | Exchange Foundation (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>MDE_SecurityManagement (1689aade-3d6a-4bfc-b017-46d2672df5ad)<br/>Microsoft Defender for Endpoint (871d91ec-ec1a-452b-a83f-bd76c7d770ef) |
208209
| Microsoft Defender for Endpoint Server | MDATP_Server | 509e8ab6-0274-4cda-bcbd-bd164fd562c4 | EXCHANGE_S_FOUNDATION (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>WINDEFATP (871d91ec-ec1a-452b-a83f-bd76c7d770ef) | Exchange Foundation (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>Microsoft Defender for Endpoint (871d91ec-ec1a-452b-a83f-bd76c7d770ef) |
209210
| Microsoft Defender for Office 365 (Plan 1) Faculty | ATP_ENTERPRISE_FACULTY | 26ad4b5c-b686-462e-84b9-d7c22b46837f | ATP_ENTERPRISE (f20fedf3-f3c3-43c3-8267-2bfdd51c0939) | Microsoft Defender for Office 365 (Plan 1) (f20fedf3-f3c3-43c3-8267-2bfdd51c0939) |
@@ -226,7 +227,7 @@ When managing licenses in [the Azure portal](https://portal.azure.com/#blade/Mic
226227
| Microsoft Stream | STREAM | 1f2f344a-700d-42c9-9427-5cea1d5d7ba6 | EXCHANGE_S_FOUNDATION (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>MICROSOFTSTREAM (acffdce6-c30f-4dc2-81c0-372e33c515ec) | EXCHANGE FOUNDATION (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>MICROSOFT STREAM (acffdce6-c30f-4dc2-81c0-372e33c515ec) |
227228
| Microsoft Stream Plan 2 | STREAM_P2 | ec156933-b85b-4c50-84ec-c9e5603709ef | EXCHANGE_S_FOUNDATION (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>STREAM_P2 (d3a458d0-f10d-48c2-9e44-86f3f684029e) | Exchange Foundation (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>Microsoft Stream Plan 2 (d3a458d0-f10d-48c2-9e44-86f3f684029e) |
228229
| Microsoft Stream Storage Add-On (500 GB) | STREAM_STORAGE | 9bd7c846-9556-4453-a542-191d527209e8 | EXCHANGE_S_FOUNDATION (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>STREAM_STORAGE (83bced11-77ce-4071-95bd-240133796768) | Exchange Foundation (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>Microsoft Stream Storage Add-On (83bced11-77ce-4071-95bd-240133796768) |
229-
| Microsoft Teams Audio Conferencing select dial-out | Microsoft_Teams_Audio_Conferencing_select_dial_out | 1c27243e-fb4d-42b1-ae8c-fe25c9616588 | MCOMEETBASIC (9974d6cf-cd24-4ba2-921c-e2aa687da846) | Microsoft Teams Audio Conferencing with dial-out to select geographies (9974d6cf-cd24-4ba2-921c-e2aa687da846) |
230+
| Microsoft Teams Audio Conferencing with dial-out to USA/CAN | Microsoft_Teams_Audio_Conferencing_select_dial_out | 1c27243e-fb4d-42b1-ae8c-fe25c9616588 | MCOMEETBASIC (9974d6cf-cd24-4ba2-921c-e2aa687da846) | Microsoft Teams Audio Conferencing with dial-out to select geographies (9974d6cf-cd24-4ba2-921c-e2aa687da846) |
230231
| Microsoft Teams (Free) | TEAMS_FREE | 16ddbbfc-09ea-4de2-b1d7-312db6112d70 | EXCHANGE_S_FOUNDATION (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>MCOFREE (617d9209-3b90-4879-96e6-838c42b2701d)<br/>TEAMS_FREE (4fa4026d-ce74-4962-a151-8e96d57ea8e4)<br/>SHAREPOINTDESKLESS (902b47e5-dcb2-4fdc-858b-c63a90a2bdb9)<br/>TEAMS_FREE_SERVICE (bd6f2ac2-991a-49f9-b23c-18c96a02c228)<br/>WHITEBOARD_FIRSTLINE1 (36b29273-c6d0-477a-aca6-6fbe24f538e3) | EXCHANGE FOUNDATION (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>MCO FREE FOR MICROSOFT TEAMS (FREE) (617d9209-3b90-4879-96e6-838c42b2701d)<br/>MICROSOFT TEAMS (FREE) (4fa4026d-ce74-4962-a151-8e96d57ea8e4)<br/>SHAREPOINT KIOSK (902b47e5-dcb2-4fdc-858b-c63a90a2bdb9)<br/>TEAMS FREE SERVICE (bd6f2ac2-991a-49f9-b23c-18c96a02c228)<br/>WHITEBOARD (FIRSTLINE) (36b29273-c6d0-477a-aca6-6fbe24f538e3) |
231232
| Microsoft Teams Essentials | Teams_Ess | fde42873-30b6-436b-b361-21af5a6b84ae | TeamsEss (f4f2f6de-6830-442b-a433-e92249faebe2) | Microsoft Teams Essentials (f4f2f6de-6830-442b-a433-e92249faebe2) |
232233
| Microsoft Teams Essentials (AAD Identity) | TEAMS_ESSENTIALS_AAD | 3ab6abff-666f-4424-bfb7-f0bc274ec7bc | EXCHANGE_S_DESKLESS (4a82b400-a79f-41a4-b4e2-e94f5787b113)<br/>FORMS_PLAN_E1 (159f4cd6-e380-449f-a816-af1a9ef76344)<br/>MICROSOFT_SEARCH (94065c59-bc8e-4e8b-89e5-5138d471eaff)<br/>TEAMS1 (57ff2da0-773e-42df-b2af-ffb7a2317929)<br/>INTUNE_O365 (882e1d05-acd1-4ccb-8708-6ee03664b117)<br/>SHAREPOINTWAC (e95bec33-7c88-4a70-8e19-b10bd9d0c014)<br/>ONEDRIVE_BASIC_P2 (4495894f-534f-41ca-9d3b-0ebf1220a423)<br/>MCOIMP (afc06cb0-b4f4-4473-8286-d644f70d8faf) | Exchange Online Kiosk (4a82b400-a79f-41a4-b4e2-e94f5787b113)<br/>Microsoft Forms (Plan E1) (159f4cd6-e380-449f-a816-af1a9ef76344)<br/>Microsoft Search (94065c59-bc8e-4e8b-89e5-5138d471eaff)<br/>Microsoft Teams (57ff2da0-773e-42df-b2af-ffb7a2317929)<br/>Mobile Device Management for Office 365 (882e1d05-acd1-4ccb-8708-6ee03664b117)<br/>Office for the Web (e95bec33-7c88-4a70-8e19-b10bd9d0c014)<br/>OneDrive for Business (Basic 2) (4495894f-534f-41ca-9d3b-0ebf1220a423)<br/>Skype for Business Online (Plan 1) (afc06cb0-b4f4-4473-8286-d644f70d8faf) |

articles/active-directory/external-identities/reset-redemption-status.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Connect-MgGraph -Scopes "User.ReadWrite.All"
8282
$user = Get-MgUser -Filter "startsWith(mail, '[email protected]')"
8383
New-MgInvitation `
8484
-InvitedUserEmailAddress $user.Mail `
85-
-InviteRedirectUrl "http://myapps.microsoft.com" `
85+
-InviteRedirectUrl "https://myapps.microsoft.com" `
8686
-ResetRedemption `
8787
-SendInvitationMessage `
8888
-InvitedUser $user

0 commit comments

Comments
 (0)