Skip to content

Commit 62c4cb2

Browse files
authored
Merge branch 'master' into fix-quickstart
2 parents 8a972c9 + 7290d77 commit 62c4cb2

File tree

232 files changed

+48047
-4449
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

232 files changed

+48047
-4449
lines changed

.openpublishing.redirection.azure-productivity.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,31 @@
44
"source_path_from_root": "/articles/lab-services/classroom-labs-overview.md",
55
"redirect_url": "/azure/lab-services/get-started-manage-labs",
66
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/devtest-labs/scripts/add-external-user-to-lab.md",
10+
"redirect_url": "/azure/devtest-labs/samples-powershell",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/devtest-labs/scripts/add-marketplace-images-to-lab.md",
15+
"redirect_url": "/azure/devtest-labs/samples-powershell",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/devtest-labs/scripts/create-custom-image-from-vhd.md",
20+
"redirect_url": "/azure/devtest-labs/samples-powershell",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/devtest-labs/scripts/create-custom-role-in-lab.md",
25+
"redirect_url": "/azure/devtest-labs/samples-powershell",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/devtest-labs/scripts/set-allowed-vm-sizes-in-lab.md",
30+
"redirect_url": "/azure/devtest-labs/samples-powershell",
31+
"redirect_document_id": false
732
}
833
]
934
}

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,26 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md).
1717

18+
## January 2022
19+
20+
### Updated articles
21+
22+
- [Tutorial: Secure Hybrid Access to applications with Azure AD B2C and F5 BIG-IP](partner-f5.md)
23+
- [Set up a force password reset flow in Azure Active Directory B2C](force-password-reset.md)
24+
- [Boolean claims transformations](boolean-transformations.md)
25+
- [Date claims transformations](date-transformations.md)
26+
- [General claims transformations](general-transformations.md)
27+
- [Integer claims transformations](integer-transformations.md)
28+
- [JSON claims transformations](json-transformations.md)
29+
- [Define phone number claims transformations in Azure AD B2C](phone-number-claims-transformations.md)
30+
- [Social accounts claims transformations](social-transformations.md)
31+
- [String claims transformations](string-transformations.md)
32+
- [StringCollection claims transformations](stringcollection-transformations.md)
33+
- [Billing model for Azure Active Directory B2C](billing.md)
34+
- [Configure SAML identity provider options with Azure Active Directory B2C](identity-provider-generic-saml-options.md)
35+
- [About claim resolvers in Azure Active Directory B2C custom policies](claim-resolver-overview.md)
36+
- [Add AD FS as a SAML identity provider using custom policies in Azure Active Directory B2C](identity-provider-adfs-saml.md)
37+
1838
## December 2021
1939

2040
### New articles

articles/active-directory/develop/v2-oauth2-client-creds-grant-flow.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ This type of authorization is common for daemons and service accounts that need
5454

5555
In order to enable this ACL-based authorization pattern, Azure AD doesn't require that applications be authorized to get tokens for another application. Thus, app-only tokens can be issued without a `roles` claim. Applications that expose APIs must implement permission checks in order to accept tokens.
5656

57-
If you'd like to prevent applications from getting role-less app-only access tokens for your application, [ensure that user assignment requirements are enabled for your app](../manage-apps/what-is-access-management.md#requiring-user-assignment-for-an-app). This will block users and applications without assigned roles from being able to get a token for this application.
57+
If you'd like to prevent applications from getting role-less app-only access tokens for your application, [ensure that assignment requirements are enabled for your app](../manage-apps/what-is-access-management.md#requiring-user-assignment-for-an-app). This will block users and applications without assigned roles from being able to get a token for this application.
5858

5959
### Application permissions
6060

@@ -65,9 +65,9 @@ Instead of using ACLs, you can use APIs to expose a set of **application permiss
6565
* Send mail as any user
6666
* Read directory data
6767

68-
To use application permissions with your own API (as opposed to Microsoft Graph), you must first [expose the API](howto-add-app-roles-in-azure-ad-apps.md) by defining scopes in the API's app registration in the Azure portal. Then, [configure access to the API](howto-add-app-roles-in-azure-ad-apps.md#assign-app-roles-to-applications) by selecting those permissions in your client application's app registration. If you haven't exposed any scopes in your API's app registration, you won't be able to specify application permissions to that API in your client application's app registration in the Azure portal.
68+
To use app roles (application permissions) with your own API (as opposed to Microsoft Graph), you must first [expose the app roles](howto-add-app-roles-in-azure-ad-apps.md) in the API's app registration in the Azure portal. Then, [configure the required app roles](howto-add-app-roles-in-azure-ad-apps.md#assign-app-roles-to-applications) by selecting those permissions in your client application's app registration. If you haven't exposed any app roles in your API's app registration, you won't be able to specify application permissions to that API in your client application's app registration in the Azure portal.
6969

70-
When authenticating as an application (as opposed to with a user), you can't use *delegated permissions* - scopes that are granted by a user - because there is no user for your app to act on behalf of. You must use application permissions, also known as roles, that are granted by an admin for the application or via pre-authorization by the web API.
70+
When authenticating as an application (as opposed to with a user), you can't use *delegated permissions* because there is no user for your app to act on behalf of. You must use application permissions, also known as app roles, that are granted by an admin or by the API's owner.
7171

7272
For more information about application permissions, see [Permissions and consent](v2-permissions-and-consent.md#permission-types).
7373

articles/active-directory/develop/whats-new-docs.md

Lines changed: 32 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
author: mmacy
77
manager: CelesteDG
88

9-
ms.date: 01/03/2022
9+
ms.date: 02/01/2022
1010
ms.service: active-directory
1111
ms.subservice: develop
1212
ms.topic: reference
@@ -19,6 +19,37 @@ ms.custom: has-adal-ref
1919

2020
Welcome to what's new in the Microsoft identity platform documentation. This article lists new docs that have been added and those that have had significant updates in the last three months.
2121

22+
## January 2022
23+
24+
### New articles
25+
26+
- [Access Azure AD protected resources from an app in Google Cloud (preview)](workload-identity-federation-create-trust-gcp.md)
27+
- [Quickstart: Acquire a token and call the Microsoft Graph API by using a console app's identity](console-app-quickstart.md)
28+
- [Quickstart: Acquire a token and call Microsoft Graph API from a desktop application](desktop-app-quickstart.md)
29+
- [Quickstart: Add sign-in with Microsoft to a web app](web-app-quickstart.md)
30+
- [Quickstart: Protect a web API with the Microsoft identity platform](web-api-quickstart.md)
31+
- [Quickstart: Sign in users and call the Microsoft Graph API from a mobile application](mobile-app-quickstart.md)
32+
33+
### Updated articles
34+
35+
- [Confidential client assertions](msal-net-client-assertions.md)
36+
- [Claims mapping policy type](reference-claims-mapping-policy-type.md)
37+
- [Configure an app to trust a GitHub repo (preview)](workload-identity-federation-create-trust-github.md)
38+
- [Configure an app to trust an external identity provider (preview)](workload-identity-federation-create-trust.md)
39+
- [Exchange a SAML token issued by AD FS for a Microsoft Graph access token](v2-saml-bearer-assertion.md)
40+
- [Logging in MSAL.js](msal-logging-js.md)
41+
- [Permissions and consent in the Microsoft identity platform](v2-permissions-and-consent.md)
42+
- [Quickstart: Acquire a token and call Microsoft Graph API from a Java console app using app's identity](quickstart-v2-java-daemon.md)
43+
- [Quickstart: Acquire a token and call Microsoft Graph API from a Python console app using app's identity](quickstart-v2-python-daemon.md)
44+
- [Quickstart: Add sign-in with Microsoft to a Java web app](quickstart-v2-java-webapp.md)
45+
- [Quickstart: Add sign-in with Microsoft to a Python web app](quickstart-v2-python-webapp.md)
46+
- [Quickstart: Add sign-in with Microsoft to an ASP.NET Core web app](quickstart-v2-aspnet-core-webapp.md)
47+
- [Quickstart: ASP.NET web app that signs in Azure AD users](quickstart-v2-aspnet-webapp.md)
48+
- [Quickstart: Get a token and call the Microsoft Graph API by using a console app's identity](quickstart-v2-netcore-daemon.md)
49+
- [Quickstart: Protect an ASP.NET Core web API with the Microsoft identity platform](quickstart-v2-aspnet-core-web-api.md)
50+
- [Quickstart: Sign in users and call the Microsoft Graph API from an Android app](quickstart-v2-android.md)
51+
- [Quickstart: Sign in users and call the Microsoft Graph API from an iOS or macOS app](quickstart-v2-ios.md)
52+
2253
## December 2021
2354

2455
### New articles
@@ -50,21 +81,3 @@ Welcome to what's new in the Microsoft identity platform documentation. This art
5081
- [Token cache serialization in MSAL.NET](msal-net-token-cache-serialization.md)
5182
- [What's new for authentication?](reference-breaking-changes.md)
5283

53-
## October 2021
54-
55-
### New articles
56-
57-
- [Configure an app to trust a GitHub repo (preview)](workload-identity-federation-create-trust-github.md)
58-
- [Configure an app to trust an external identity provider (preview)](workload-identity-federation-create-trust.md)
59-
- [Set up your application's Azure AD test environment](test-setup-environment.md)
60-
- [Throttling and service limits to consider for testing](test-throttle-service-limits.md)
61-
- [Workload identity federation (preview)](workload-identity-federation.md)
62-
63-
### Updated articles
64-
65-
- [Considerations for using Xamarin iOS with MSAL.NET](msal-net-xamarin-ios-considerations.md)
66-
- [Handle ITP in Safari and other browsers where third-party cookies are blocked](reference-third-party-cookies-spas.md)
67-
- [Initialize client applications using MSAL.js](msal-js-initializing-client-applications.md)
68-
- [Microsoft Graph API](microsoft-graph-intro.md)
69-
- [Microsoft identity platform and the OAuth 2.0 client credentials flow](v2-oauth2-client-creds-grant-flow.md)
70-
- [What's new for authentication?](reference-breaking-changes.md)

articles/active-directory/enterprise-users/groups-lifecycle.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ For information on how to download and install the Azure AD PowerShell cmdlets,
3939

4040
## Activity-based automatic renewal
4141

42-
With Azure AD intelligence, groups are now automatically renewed based on whether they have been recently used. This feature eliminates the need for manual action by group owners, because it's based on user activity in groups across Microsoft 365 services like Outlook, SharePoint, or Teams. For example, if an owner or a group member does something like upload a document to SharePoint, visit a Teams channel, or send an email to the group in Outlook, the group is automatically renewed around 35 days before the group expires and the owner does not get any renewal notifications. The "All Company" group converted in Yammer Native Mode to a Microsoft 365 Group doesn't currently support this type of automatic renewal, and Yammer activities for that group aren't counted as activities.
42+
With Azure AD intelligence, groups are now automatically renewed based on whether they have been recently used. This feature eliminates the need for manual action by group owners, because it's based on user activity in groups across Microsoft 365 services like Outlook, SharePoint, Teams, or Yammer. For example, if an owner or a group member does something like upload a document to SharePoint, visit a Teams channel, send an email to the group in Outlook, or view a post in Yammer, the group is automatically renewed around 35 days before the group expires and the owner does not get any renewal notifications.
4343

4444
For example, consider an expiration policy that is set so that a group expires after 30 days of inactivity. However, to keep from sending an expiration email the day that group expiration is enabled (because there's no record activity yet), Azure AD first waits five days. If there is activity in those five days, the expiration policy works as expected. If there is no activity within five days, we send an expiration/renewal email. Of course, if the group was inactive for five days, an email was sent, and then the group was active, we will autorenew it and start the expiration period again.
4545

@@ -50,6 +50,7 @@ The following user actions cause automatic group renewal:
5050
- SharePoint: View, edit, download, move, share, or upload files
5151
- Outlook: Join group, read/write group message from group space, Like a message (in Outlook Web Access)
5252
- Teams: Visit a Teams channel
53+
- Yammer: View a post within a Yammer community or an interactive email in Outlook
5354

5455
### Auditing and reporting
5556

0 commit comments

Comments
 (0)