Skip to content

Commit 5fd24c4

Browse files
authored
Merge pull request #98275 from MicrosoftDocs/master
12/06 PM Publish
2 parents 375b70d + 0bd7cee commit 5fd24c4

File tree

466 files changed

+2149
-1506
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

466 files changed

+2149
-1506
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1942,11 +1942,6 @@
19421942
"redirect_url": "/azure/cosmos-db/sql-api-get-started",
19431943
"redirect_document_id": false
19441944
},
1945-
{
1946-
"source_path": "articles/search/search-traffic-analytics.md",
1947-
"redirect_url": "/azure/search/search-monitor-usage",
1948-
"redirect_document_id": false
1949-
},
19501945
{
19511946
"source_path": "articles/search/knowledge-store-howto.md",
19521947
"redirect_url": "/azure/search/knowledge-store-create-rest",

articles/active-directory-b2c/b2clogin.md

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Set redirect URLs to b2clogin.com - Azure Active Directory B2C
2+
title: Migrate applications and APIs to b2clogin.com - Azure AD B2C
33
description: Learn about using b2clogin.com in your redirect URLs for Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 08/17/2019
11+
ms.date: 12/04/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -17,6 +17,16 @@ ms.subservice: B2C
1717

1818
When you set up an identity provider for sign-up and sign-in in your Azure Active Directory B2C (Azure AD B2C) application, you need to specify a redirect URL. You should no longer reference *login.microsoftonline.com* in your applications and APIs. Instead, use *b2clogin.com* for all new applications, and migrate existing applications from *login.microsoftonline.com* to *b2clogin.com*.
1919

20+
## Deprecation of login.microsoftonline.com
21+
22+
On 04 December 2019, we announced the scheduled retirement of login.microsoftonline.com support in Azure AD B2C on **04 December 2020**:
23+
24+
[Azure Active Directory B2C is deprecating login.microsoftonline.com](https://azure.microsoft.com/updates/b2c-deprecate-msol/)
25+
26+
The deprecation of login.microsoftonline.com goes into effect for all Azure AD B2C tenants on 04 December 2020, providing existing tenants one (1) year to migrate to b2clogin.com. New tenants created after 04 December 2019 will not accept requests from login.microsoftonline.com. All functionality remains the same on the b2clogin.com endpoint.
27+
28+
The deprecation of login.microsoftonline.com does not impact Azure Active Directory tenants. Only Azure Active Directory B2C tenants are affected by this change.
29+
2030
## Benefits of b2clogin.com
2131

2232
When you use *b2clogin.com* as your redirect URL:
@@ -68,6 +78,10 @@ For example, the authority endpoint for Contoso's sign-up/sign-in policy would n
6878
https://contosob2c.b2clogin.com/00000000-0000-0000-0000-000000000000/B2C_1_signupsignin1
6979
```
7080

81+
For information about migrating OWIN-based web applications to b2clogin.com, see [Migrate an OWIN-based web API to b2clogin.com](multiple-token-endpoints.md).
82+
83+
For migrating Azure API Management APIs protected by Azure AD B2C, see the [Migrate to b2clogin.com](secure-api-management.md#migrate-to-b2clogincom) section of [Secure an Azure API Management API with Azure AD B2C](secure-api-management.md).
84+
7185
## Microsoft Authentication Library (MSAL)
7286

7387
### ValidateAuthority property
@@ -92,6 +106,12 @@ this.clientApplication = new UserAgentApplication(
92106
);
93107
```
94108

109+
## Next steps
110+
111+
For information about migrating OWIN-based web applications to b2clogin.com, see [Migrate an OWIN-based web API to b2clogin.com](multiple-token-endpoints.md).
112+
113+
For migrating Azure API Management APIs protected by Azure AD B2C, see the [Migrate to b2clogin.com](secure-api-management.md#migrate-to-b2clogincom) section of [Secure an Azure API Management API with Azure AD B2C](secure-api-management.md).
114+
95115
<!-- LINKS - External -->
96116
[msal-dotnet]: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet
97117
[msal-dotnet-b2c]: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/AAD-B2C-specifics

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,10 @@ User accounts in Azure Multi-Factor Authentication have the following three dist
4949

5050
A user's state reflects whether an admin has enrolled them in Azure MFA, and whether they completed the registration process.
5151

52-
All users start out *Disabled*. When you enroll users in Azure MFA, their state changes to *Enabled*. When enabled users sign in and complete the registration process, their state changes to *Enforced*.
52+
All users start out *Disabled*. When you enroll users in Azure MFA, their state changes to *Enabled*. When enabled users sign in and complete the registration process, their state changes to *Enforced*.
53+
54+
> [!NOTE]
55+
> If MFA is re-enabled on a user object that already has registration details, such as phone or email, then administrators need to have that user re-register MFA via Azure portal or PowerShell. If the user doesn't re-register, their MFA state doesn't transition from *Enabled* to *Enforced* in MFA management UI.
5356
5457
### View the status for a user
5558

@@ -176,6 +179,8 @@ Get-MsolUser -All | Set-MfaState -State Disabled
176179

177180
> [!NOTE]
178181
> We recently changed the behavior and PowerShell script above accordingly. Previously, the script saved off the MFA methods, disabled MFA, and restored the methods. This is no longer necessary now that the default behavior for disable doesn't clear the methods.
182+
>
183+
> If MFA is re-enabled on a user object that already has registration details, such as phone or email, then administrators need to have that user re-register MFA via Azure portal or PowerShell. If the user doesn't re-register, their MFA state doesn't transition from *Enabled* to *Enforced* in MFA management UI.
179184
180185
## Next steps
181186

articles/active-directory/cloud-provisioning/what-is-cloud-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ With Azure AD Connect cloud provisioning, provisioning from AD to Azure AD is or
2929

3030
The following table provides a comparison between Azure AD Connect and Azure AD Connect cloud provisioning:
3131

32-
| Feature | Azure Active Directory Connect synch| Azure Active Directory Connect cloud provisioning |
32+
| Feature | Azure Active Directory Connect sync| Azure Active Directory Connect cloud provisioning |
3333
|:--- |:---:|:---:|
3434
|Connect to single on-premises AD forest|||
3535
| Connect to multiple on-premises AD forests |||

articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Add app roles in your Azure Active Directory-registered app and receive them in the token
2+
title: Add app roles and get them from a token | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn how to add app roles in an application registered in Azure Active Directory, assign users and groups to these roles and receive them in the `roles` claim in the token.
55
services: active-directory

articles/active-directory/develop/howto-app-gallery-listing.md

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
1212
ms.workload: identity
13-
ms.date: 09/16/2019
13+
ms.date: 12/06/2019
1414
ms.author: ryanwi
1515
ms.reviewer: jeedes
1616
ms.custom: aaddev, seoapril2019
@@ -39,6 +39,10 @@ This article shows how to list an application in the Azure Active Directory (Azu
3939
- For password SSO, make sure that your application supports form authentication so that password vaulting can be done to get single sign-on to work as expected.
4040
- You need a permanent account for testing with at least two users registered.
4141

42+
**How to get Azure AD for developers?**
43+
44+
You can get a free test account with all the premium Azure AD features - 90 days free and can get extended as long as you do dev work with it: https://docs.microsoft.com/office/developer-program/office-365-developer-program
45+
4246
## Submit the request in the portal
4347

4448
After you've tested that your application integration works with Azure AD, submit your request for access in the [Application Network portal](https://microsoft.sharepoint.com/teams/apponboarding/Apps). If you have an Office 365 account, use that to sign in to this portal. If not, use your Microsoft account, such as Outlook or Hotmail, to sign in.
@@ -57,6 +61,26 @@ Our team reviews the details and gives you access accordingly. After your reques
5761

5862
![Submit Request (ISV) tile on home page](./media/howto-app-gallery-listing/homepage.png)
5963

64+
## Issues on logging into portal
65+
66+
If you are seeing this error while logging in then here are the detail on the issue and this is how you can fix it.
67+
68+
* If your sign-in was blocked as shown below:
69+
70+
![issues resolving application in the gallery](./media/howto-app-gallery-listing/blocked.png)
71+
72+
**What’s happening:**
73+
74+
The guest user is federated to a home tenant which is also an Azure AD. The guest user is at High risk. Microsoft doesn’t allow High risk users to access its resources. All High risk users (employees or guests / vendors) must remediate / close their risk to access Microsoft resources. For guest users, this user risk comes from the home tenant and the policy comes from the resource tenant (Microsoft in this case).
75+
76+
**Secure solutions:**
77+
78+
* MFA registered guest users remediate their own user risk. This can be done by the guest user performing a secured password change or reset (https://aka.ms/sspr) at their home tenant (this needs MFA and SSPR at the home tenant). The secured password change or reset must be initiated on Azure AD and not on-prem.
79+
80+
* Guest users have their admins remediate their risk. In this case, the admin will perform a password reset (temporary password generation). This does not need Identity Protection. The guest user’s admin can go to https://aka.ms/RiskyUsers and click on ‘Reset password’.
81+
82+
* Guest users have their admins close / dismiss their risk. Again, this does not need Identity Protection. The admin can go to https://aka.ms/RiskyUsers and click on ‘Dismiss user risk’. However, the admin must do the due diligence to ensure this was a false positive risk assessment before closing the user risk. Otherwise, they are putting their and Microsoft’s resources at risk by suppressing a risk assessment without investigation.
83+
6084
> [!NOTE]
6185
> If you have any issues with access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
6286
@@ -76,6 +100,7 @@ To list an application in the Azure AD app gallery, you first need to implement
76100
![Listing a SAML 2.0 or WS-Fed application in the gallery](./media/howto-app-gallery-listing/saml.png)
77101

78102
* If you want to add your application to list in the gallery by using **SAML 2.0** or **WS-Fed**, select **SAML 2.0/WS-Fed** as shown.
103+
79104
* If you have any issues with access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
80105

81106
## Implement SSO by using the password SSO
34.5 KB
Loading

articles/active-directory/develop/msal-configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Understand the Android Microsoft Authentication Library (MSAL) configuration file
2+
title: Android Microsoft Authentication Library config file | Azure
33
titleSuffix: Microsoft identity platform
44
description: An overview of the Android Microsoft Authentication Library (MSAL) configuration file, which represents an application's configuration in Azure Active Directory.
55
services: active-directory
@@ -20,9 +20,9 @@ ms.reviewer: shoatman
2020
ms.collection: M365-identity-device-management
2121
---
2222

23-
# Android Microsoft Authentication Library (MSAL) configuration file
23+
# Android Microsoft Authentication Library configuration file
2424

25-
MSAL ships with a [default configuration JSON file](https://github.com/AzureAD/microsoft-authentication-library-for-android/blob/dev/msal/src/main/res/raw/msal_default_config.json) that you customize to define the behavior of your public client app for things such as the default authority, which authorities you'll use, and so on.
25+
The Android Microsoft Authentication Library (MSAL) ships with a [default configuration JSON file](https://github.com/AzureAD/microsoft-authentication-library-for-android/blob/dev/msal/src/main/res/raw/msal_default_config.json) that you customize to define the behavior of your public client app for things such as the default authority, which authorities you'll use, and so on.
2626

2727
This article will help you understand the various settings in the configuration file and how to specify the configuration file to use in your MSAL-based app.
2828

articles/active-directory/develop/msal-js-avoid-page-reloads.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Avoid page reloads (Microsoft Authentication Library for JavaScript)
2+
title: Avoid page reloads (MSAL.js) | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn how to avoid page reloads when acquiring and renewing tokens silently using the Microsoft Authentication Library for JavaScript (MSAL.js).
55
services: active-directory

articles/active-directory/develop/msal-js-initializing-client-applications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Initialize client applications (Microsoft Authentication Library for JavaScript)
2+
title: Initialize MSAL.js client apps | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn about initializing client applications using the Microsoft Authentication Library for JavaScript (MSAL.js).
55
services: active-directory

0 commit comments

Comments
 (0)