Skip to content

Commit 6069004

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-msix-codes
2 parents 11970f6 + f7e7ec6 commit 6069004

File tree

364 files changed

+4904
-4892
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

364 files changed

+4904
-4892
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14099,6 +14099,26 @@
1409914099
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
1410014100
"redirect_document_id": ""
1410114101
},
14102+
{
14103+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-aml-designer-custom-skill.md",
14104+
"redirect_url": "/previous-versions/azure/search/cognitive-search-tutorial-aml-designer-custom-skill",
14105+
"redirect_document_id": false
14106+
},
14107+
{
14108+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-aml-custom-skill.md",
14109+
"redirect_url": "/previous-versions/azure/search/cognitive-search-tutorial-aml-custom-skill",
14110+
"redirect_document_id": false
14111+
},
14112+
{
14113+
"source_path_from_root": "/articles/search/cognitive-search-custom-skill-form.md",
14114+
"redirect_url": "/previous-versions/azure/search/cognitive-search-custom-skill-form",
14115+
"redirect_document_id": false
14116+
},
14117+
{
14118+
"source_path_from_root": "/articles/search/cognitive-search-custom-skill-python.md",
14119+
"redirect_url": "/previous-versions/azure/search/cognitive-search-custom-skill-python",
14120+
"redirect_document_id": false
14121+
},
1410214122
{
1410314123
"source_path_from_root": "/articles/search/search-get-started-vs-code.md",
1410414124
"redirect_url": "/previous-versions/azure/search/search-get-started-vs-code",

articles/active-directory-b2c/identity-provider-facebook.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
5353
1. Select **Save Changes**.
5454
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
5555
1. From the menu, select **Facebook Login**, select **Settings**.
56-
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
56+
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-id/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-id/oauth2/authresp`. Replace `your-tenant-id` with the id of your tenant, and `your-domain-name` with your custom domain.
5757
1. Select **Save Changes** at the bottom of the page.
5858
1. To make your Facebook application available to Azure AD B2C, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
5959

@@ -135,4 +135,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
135135
- Learn how to [pass Facebook token to your application](idp-pass-through-user-flow.md).
136136
- Check out the Facebook federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook), and how to pass Facebook access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token)
137137

138-
::: zone-end
138+
::: zone-end

articles/active-directory/develop/desktop-quickstart-portal-wpf.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,7 @@ ms.author: owenrichards
1313
ms.custom: aaddev, identityplatformtop40, mode-api
1414
#Customer intent: As an application developer, I want to learn how my Windows Presentation Foundation (WPF) application can get an access token and call an API that's protected by the Microsoft identity platform.
1515
---
16-
17-
# Quickstart: Acquire a token and call the Microsoft Graph API from a Windows desktop app
16+
# Quickstart: Sign in users and call Microsoft Graph in a Windows desktop app
1817

1918
> [!div renderon="docs"]
2019
> Welcome! This probably isn't the page you were expecting. While we work on a fix, this link should take you to the right article:
@@ -24,7 +23,8 @@ ms.custom: aaddev, identityplatformtop40, mode-api
2423
> We apologize for the inconvenience and appreciate your patience while we work to get this resolved.
2524
2625
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
27-
26+
> ## Quickstart: Acquire a token and call the Microsoft Graph API from a Windows desktop application
27+
>
2828
> In this quickstart, you download and run a code sample that demonstrates how a Windows Presentation Foundation (WPF) application can sign in users and get an access token to call the Microsoft Graph API.
2929
>
3030
> See [How the sample works](#how-the-sample-works) for an illustration.

articles/active-directory/develop/msal-android-shared-devices.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 12/06/2022
12+
ms.date: 02/06/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: brandwe
1515
ms.custom: aaddev, identitypla | Azuretformtop40
@@ -96,6 +96,7 @@ These Microsoft applications support Azure AD's shared device mode:
9696
- [Microsoft Teams](/microsoftteams/platform/)
9797
- [Microsoft Managed Home Screen](/mem/intune/apps/app-configuration-managed-home-screen-app) app for Android Enterprise
9898
- [Microsoft Edge](/microsoft-edge) (in Public Preview)
99+
- [Outlook](/mem/intune/apps/app-configuration-policies-outlook) (in Public Preview)
99100
- [Microsoft Power Apps](/power-apps) (in Public Preview)
100101
- [Yammer](/yammer) (in Public Preview)
101102

articles/active-directory/develop/scenario-mobile-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 05/07/2019
12+
ms.date: 02/07/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: brandwe, jmprieur
1515
ms.custom: aaddev, identityplatformtop40
@@ -38,7 +38,7 @@ Considerations for mobile apps:
3838

3939
- **User experience is key**: Allow users to see the value of your app before you ask for sign-in. Request only the required permissions.
4040
- **Support all user configurations**: Many mobile business users must adhere to conditional-access policies and device-compliance policies. Be sure to support these key scenarios.
41-
- **Implement single sign-on (SSO)**: By using MSAL and Microsoft identity platform, you can enable single sign-on through the device's browser or Microsoft Authenticator (and Intune Company Portal on Android).
41+
- **Implement single sign-on (SSO)**: By using MSAL and Microsoft identity platform, you can enable SSO through the device's browser or Microsoft Authenticator (and Intune Company Portal on Android).
4242
- **Implement shared device mode**: Enable your application to be used in shared-device scenarios, for example hospitals, manufacturing, retail, and finance. [Read more about supporting shared device mode](msal-shared-devices.md).
4343

4444
## Specifics

articles/active-directory/develop/v2-supported-account-types.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,34 +9,34 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 07/14/2020
12+
ms.date: 02/06/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: saeeda, jmprieur
1515
ms.custom: aaddev, identityplatformtop40
1616
---
1717

1818
# Supported account types
1919

20-
This article explains what account types (sometimes called *audiences*) are supported in the Microsoft identity platform applications.
20+
This article explains what account types (sometimes called _audiences_) are supported in the Microsoft identity platform applications.
2121

2222
<!-- This section can be in an include for many of the scenarios (SPA, web app signing-in users, protecting a web API, Desktop (depending on the flows), Mobile -->
2323

2424
## Account types in the public cloud
2525

2626
In the Microsoft Azure public cloud, most types of apps can sign in users with any audience:
2727

28-
- If you're writing a line-of-business (LOB) application, you can sign in users in your own organization. Such an application is sometimes called *single-tenant*.
29-
- If you're an ISV, you can write an application that signs in users:
28+
- If you're writing a line-of-business (LOB) application, you can sign in users in your own organization. Such an application is sometimes called _single-tenant_.
29+
- If you're an independent software vendor (ISV), you can write an application that signs in users:
3030

31-
- In any organization. Such an application is called a *multitenant* web application. You'll sometimes read that it signs in users with their work or school accounts.
31+
- In any organization. Such an application is called a _multitenant_ web application. You'll sometimes read that it signs in users with their work or school accounts.
3232
- With their work or school or personal Microsoft accounts.
3333
- With only personal Microsoft accounts.
34-
34+
3535
- If you're writing a business-to-consumer application, you can also sign in users with their social identities, by using Azure Active Directory B2C (Azure AD B2C).
3636

3737
## Account type support in authentication flows
3838

39-
Some account types can't be used with certain authentication flows. For instance, in desktop, UWP, or daemon applications:
39+
Some account types can't be used with certain authentication flows. For instance, in desktop, Universal Windows Platform (UWP), or daemon applications:
4040

4141
- Daemon applications can be used only with Azure AD organizations. It doesn't make sense to try to use daemon applications to manipulate Microsoft personal accounts. The admin consent will never be granted.
4242
- You can use the integrated Windows authentication flow only with work or school accounts (in your organization or any organization). Integrated Windows authentication works with domain accounts, and it requires the machines to be domain-joined or Azure AD-joined. This flow doesn't make sense for personal Microsoft accounts.

0 commit comments

Comments
 (0)