Skip to content

Commit 60aacf6

Browse files
committed
2 parents 7342c06 + 05a8102 commit 60aacf6

File tree

279 files changed

+5471
-5191
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

279 files changed

+5471
-5191
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -302,11 +302,16 @@
302302
"url": "https://github.com/Azure-Samples/cosmos-dotnet-todo-app",
303303
"branch": "master"
304304
},
305-
{
305+
{
306306
"path_to_root": "samples-cosmosdb-dotnet-v3",
307307
"url": "https://github.com/Azure/azure-cosmos-dotnet-v3",
308308
"branch": "master"
309309
},
310+
{
311+
"path_to_root": "samples-cosmosdb-dotnet-v2",
312+
"url": "https://github.com/Azure/azure-cosmos-dotnet-v2",
313+
"branch": "master"
314+
},
310315
{
311316
"path_to_root": "samples-cosmosdb-dotnet-change-feed-processor",
312317
"url": "https://github.com/Azure-Samples/cosmos-dotnet-change-feed-processor",

.openpublishing.redirection.json

Lines changed: 131 additions & 86 deletions
Large diffs are not rendered by default.

.vscode/extensions.json

Lines changed: 0 additions & 5 deletions
This file was deleted.

articles/active-directory/develop/active-directory-saml-claims-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ From the **Choose name identifier format** dropdown, you can select one of the f
6262
| **EmailAddress** | Azure AD will use EmailAddress as the NameID format. |
6363
| **Unspecified** | Azure AD will use Unspecified as the NameID format. |
6464

65-
To learn more about the NameIDPolicy attribute, see [Single Sign-On SAML protocol](single-sign-on-saml-protocol.md).
65+
Transient NameID is also supported, but is not available in the dropdown and cannot be configured on Azure's side. To learn more about the NameIDPolicy attribute, see [Single Sign-On SAML protocol](single-sign-on-saml-protocol.md).
6666

6767
### Attributes
6868

articles/active-directory/develop/identity-platform-integration-checklist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Use the following checklist to ensure that your application is effectively integ
8484
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | [Understand the consent experience](application-consent-experience.md) and configure the pieces of your app’s consent prompt so that end users and admins have enough information to determine if they trust your app. |
8585
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Minimize the number of times a user needs to enter login credentials while using your app by attempting silent authentication (silent token acquisition) before interactive flows. |
8686
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Don't use “prompt=consent” for every sign-in. Only use prompt=consent if you’ve determined that you need to ask for consent for additional permissions (for example, if you’ve changed your app’s required permissions). |
87-
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Where applicable, enrich your application with user data. Use the [Microsoft Graph API](https://developer.microsoft.com/graph) is an easy way to do this. The [Graph explorer](https://developer.microsoft.com/graph/graph-explorer) tool that can help you get started. |
87+
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Where applicable, enrich your application with user data. Using the [Microsoft Graph API](https://developer.microsoft.com/graph) is an easy way to do this. The [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) tool that can help you get started. |
8888
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Register the full set of permissions that your app requires so admins can grant consent easily to their tenant. Use [incremental consent](azure-ad-endpoint-comparison.md#incremental-and-dynamic-consent) at run time to help users understand why your app is requesting permissions that may concern or confuse users when requested on first start. |
8989
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Implement a [clean single sign-out experience](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/1-WebApp-OIDC/1-6-SignOut). It’s a privacy and a security requirement, and makes for a good user experience. |
9090

articles/active-directory/develop/quickstart-v2-python-webapp.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,7 @@ To run this sample, you will need:
3535

3636
- [Python 2.7+](https://www.python.org/downloads/release/python-2713) or [Python 3+](https://www.python.org/downloads/release/python-364/)
3737
- [Flask](http://flask.pocoo.org/), [Flask-Session](https://pythonhosted.org/Flask-Session/), [requests](https://requests.kennethreitz.org//en/master/)
38-
- [MSAL Python](https://github.com/AzureAD/microsoft-authentication-library-for-python)
39-
- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [how to get an Azure AD tenant.](https://docs.microsoft.com/azure/active-directory/develop/quickstart-create-new-tenant)
38+
- [MSAL Python](https://github.com/AzureAD/microsoft-authentication-library-for-python)
4039

4140
> [!div renderon="docs"]
4241
>

articles/active-directory/fundamentals/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ New cmdlets were added to the AzureADPreview module, to help define and assign c
133133
**Service category:** Other
134134
**Product capability:** Directory
135135

136-
We've released an updated version of Azure AD Connect for auto-upgrade customers. This new version includes several new features, improvements, and bug fixes. For more information about this new version, see [Azure AD Connect: Version release history](https://docs.microsoft.com/azure/active-directory/hybrid/reference-connect-version-history#14x0).
136+
We've released an updated version of Azure AD Connect for auto-upgrade customers. This new version includes several new features, improvements, and bug fixes. For more information about this new version, see [Azure AD Connect: Version release history](https://docs.microsoft.com/azure/active-directory/hybrid/reference-connect-version-history#14250).
137137

138138
---
139139

articles/active-directory/hybrid/how-to-connect-pta-security-deep-dive.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,7 @@ Pass-through Authentication handles a user sign-in request as follows:
143143

144144
> [!NOTE]
145145
> If the Authentication Agent fails during the sign-in process, the whole sign-in request is dropped. There is no hand-off of sign-in requests from one Authentication Agent to another Authentication Agent on-premises. These agents only communicate with the cloud, and not with each other.
146+
146147
13. The Authentication Agent forwards the result back to Azure AD STS over an outbound mutually authenticated HTTPS channel over port 443. Mutual authentication uses the certificate previously issued to the Authentication Agent during registration.
147148
14. Azure AD STS verifies that this result correlates with the specific sign-in request on your tenant.
148149
15. Azure AD STS continues with the sign-in procedure as configured. For example, if the password validation was successful, the user might be challenged for Multi-Factor Authentication or redirected back to the application.

articles/active-directory/manage-apps/customize-application-attributes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,7 @@ Selecting this option will effectively force a resynchronization of all users wh
138138
- A recommended best practice is to keep the number of consecutive changes to your attribute-mappings at a minimum.
139139
- Adding a photo attribute to be provisioned to an app is not supported today as you cannot specify the format to sync the photo. You can request the feature on [User Voice](https://feedback.azure.com/forums/169401-azure-active-directory)
140140
- The attribute IsSoftDeleted is often part of the default mappings for an application. IsSoftdeleted can be true in one of four scenarios (the user is out of scope due to being unassigned from the application, the user is out of scope due to not meeting a scoping filter, the user has been soft deleted in Azure AD, or the property AccountEnabled is set to false on the user).
141+
- The Azure AD provisioning service does not support provisioning null values
141142

142143
## Next steps
143144

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323
---
2424
# Audit activity reports in the Azure Active Directory portal
2525

26-
With Azure Active Directory (Azure AD) reports, you can get the information you need to determine how your environment is doing..
26+
With Azure Active Directory (Azure AD) reports, you can get the information you need to determine how your environment is doing.
2727

2828
The reporting architecture consists of the following components:
2929

0 commit comments

Comments
 (0)