Skip to content

Commit 6736aa6

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 0f5954e + 2426912 commit 6736aa6

File tree

625 files changed

+7676
-5759
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

625 files changed

+7676
-5759
lines changed

.openpublishing.redirection.defender-for-iot.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -142,12 +142,12 @@
142142
},
143143
{
144144
"source_path_from_root": "/articles/defender-for-iot/how-to-create-and-manage-users.md",
145-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-create-and-manage-users",
145+
"redirect_url": "/azure/defender-for-iot/organizations/manage-users-overview",
146146
"redirect_document_id": false
147147
},
148148
{
149149
"source_path_from_root": "/articles/defender-for-iot/how-to-define-global-user-access-control.md",
150-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-define-global-user-access-control",
150+
"redirect_url": "/azure/defender-for-iot/organizations/manage-users-on-premises-management-console#define-global-access-permission-for-on-premises-users",
151151
"redirect_document_id": false
152152
},
153153
{

.openpublishing.redirection.healthcare-apis.json

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -554,6 +554,34 @@
554554
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-iot-jsonpath-content-mappings",
555555
"redirect_document_id": false
556556
},
557+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-iot-connector-in-azure.md",
558+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-choose",
559+
"redirect_document_id": false
560+
},
561+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-02-new-button.md",
562+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-button",
563+
"redirect_document_id": false
564+
},
565+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-03-new-manual.md",
566+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-manual",
567+
"redirect_document_id": false
568+
},
569+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-05-new-config.md",
570+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-config",
571+
"redirect_document_id": false
572+
},
573+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-06-new-deploy.md",
574+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-deploy",
575+
"redirect_document_id": false
576+
},
577+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-08-new-ps-cli.md",
578+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-powershell-cli",
579+
"redirect_document_id": false
580+
},
581+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-new-bicep-ps-cli.md",
582+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-bicep-powershell-cli",
583+
"redirect_document_id": false
584+
},
557585
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
558586
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
559587
"redirect_document_id": false

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16323,6 +16323,11 @@
1632316323
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
1632416324
"redirect_document_id": ""
1632516325
},
16326+
{
16327+
"source_path_from_root": "/articles/search/search-how-to-index-power-query-data-sources.md",
16328+
"redirect_url": "/previous-versions/azure/search/search-how-to-index-power-query-data-sources",
16329+
"redirect_document_id": false
16330+
},
1632616331
{
1632716332
"source_path_from_root": "/articles/search/cognitive-search-quickstart-ocr.md",
1632816333
"redirect_url": "/azure/search/cognitive-search-quickstart-blob",

articles/active-directory/authentication/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -310,8 +310,12 @@
310310
href: /samples/browse/?products=azure
311311
- name: Azure PowerShell cmdlets
312312
href: /powershell/azure/
313-
- name: Microsoft Graph REST API beta
313+
- name: Authentication methods APIs - Microsoft Graph
314314
href: /graph/api/resources/authenticationmethods-overview
315+
- name: Authentication strengths APIs - Microsoft Graph (preview)
316+
href: /graph/api/resources/authenticationstrengths-overview
317+
- name: Authentication methods policy - Microsoft Graph
318+
href: /graph/api/resources/authenticationmethodspolicies-overview
315319
- name: Service limits and restrictions
316320
href: ../enterprise-users/directory-service-limits-restrictions.md
317321
- name: FIDO2 compatibility

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,6 @@ Number matching is available for the following scenarios. When enabled, all scen
3737
- [AD FS adapter](howto-mfaserver-adfs-windows-server.md)
3838
- [NPS extension](howto-mfa-nps-extension.md)
3939

40-
Number matching is available for sign-in for Azure Government. However, it's currently not available for Authenticator setup in combined registration. Number matching will be available for Authenticator setup in [combined registration](howto-registration-mfa-sspr-combined.md) by November 30, 2022 for Azure Government.
41-
4240
Number matching isn't supported for Apple Watch notifications. Apple Watch users need to use their phone to approve notifications when number matching is enabled.
4341

4442
### Multifactor authentication
@@ -53,7 +51,7 @@ During self-service password reset, the Authenticator app notification will show
5351

5452
### Combined registration
5553

56-
When a user goes through combined registration to set up the Authenticator app, the user is asked to approve a notification as part of adding the account. For users who are enabled for number matching, this notification will show a number that they need to type in their Authenticator app notification. Number matching will be available for Authenticator setup in combined registration in Azure Government by November 30, 2022.
54+
When a user goes through combined registration to set up the Authenticator app, the user is asked to approve a notification as part of adding the account. For users who are enabled for number matching, this notification will show a number that they need to type in their Authenticator app notification.
5755

5856
### AD FS adapter
5957

articles/active-directory/develop/tutorial-blazor-server.md

Lines changed: 20 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@ ms.author: jricketts
66
ms.service: active-directory
77
ms.subservice: develop
88
ms.topic: tutorial
9-
ms.date: 09/15/2020
9+
ms.date: 11/29/2022
10+
ms.custom: "engagement-fy23"
1011
#Customer intent: As a developer, I want to add authentication to a Blazor app.
1112
---
1213

@@ -19,36 +20,41 @@ We also have a tutorial for [Blazor WASM](tutorial-blazor-webassembly.md).
1920
In this tutorial:
2021

2122
> [!div class="checklist"]
22-
> * Create a new Blazor Server app configured to use Azure Active Directory (Azure AD) for authentication
23-
> * Handle both authentication and authorization using Microsoft.Identity.Web
24-
> * Retrieve data from a protected web API, Microsoft Graph
23+
>
24+
> - Create a new Blazor Server app configured to use Azure AD for authentication
25+
> - Handle both authentication and authorization using `Microsoft.Identity.Web`
26+
> - Retrieve data from a protected web API, Microsoft Graph
2527
2628
## Prerequisites
2729

2830
- [.NET Core 3.1 SDK](https://dotnet.microsoft.com/download/dotnet-core/3.1)
29-
- An Azure AD tenant where you can register an app. If you don’t have access to an Azure AD tenant, you can get one by registering with the [Microsoft 365 Developer Program](https://developer.microsoft.com/microsoft-365/dev-program) or by creating an [Azure free account](https://azure.microsoft.com/free).
31+
- An Azure account that has an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
32+
- The Azure account must have permission to manage applications in Azure Active Directory (Azure AD). Any of the following Azure AD roles include the required permissions:
33+
- [Application administrator](../roles/permissions-reference.md#application-administrator)
34+
- [Application developer](../roles/permissions-reference.md#application-developer)
35+
- [Cloud application administrator](../roles/permissions-reference.md#cloud-application-administrator)
3036

3137
## Register the app in the Azure portal
3238

33-
Every app that uses Azure Active Directory (Azure AD) for authentication must be registered with Azure AD. Follow the instructions in [Register an application](quickstart-register-app.md) with these additions:
39+
Every app that uses Azure AD for authentication must be registered with Azure AD. Follow the instructions in [Register an application](quickstart-register-app.md) with these additions:
3440

3541
- For **Supported account types**, select **Accounts in this organizational directory only**.
36-
- Leave the **Redirect URI** drop down set to **Web** and enter `https://localhost:5001/signin-oidc`. The default port for an app running on Kestrel is 5001. If the app is available on a different port, specify that port number instead of `5001`.
42+
- Leave the **Redirect URI** drop down set to **Web** and enter `https://localhost:5001/signin-oidc`. The default port for an app running on Kestrel is `5001`. If the app is available on a different port, specify that port number instead of `5001`.
3743

3844
Under **Manage**, select **Authentication** > **Implicit grant and hybrid flows**. Select **ID tokens**, and then select **Save**.
3945

4046
Finally, because the app calls a protected API (in this case Microsoft Graph), it needs a client secret in order to verify its identity when it requests an access token to call that API.
4147

4248
1. Within the same app registration, under **Manage**, select **Certificates & secrets** and then **Client secrets**.
4349
2. Create a **New client secret** that never expires.
44-
3. Make note of the secret's **Value** as you will use it in the next step. You can’t access it again once you navigate away from this pane. However, you can recreate it as needed.
50+
3. Make note of the secret's **Value** as you'll use it in the next step. You can’t access it again once you navigate away from this pane. However, you can recreate it as needed.
4551

4652
## Create the app using the .NET CLI
4753

48-
Run the following command to download the templates for Microsoft.Identity.Web, which we will make use of in this tutorial.
54+
Run the following command to download the templates for `Microsoft.Identity.Web`, which we'll make use of in this tutorial.
4955

5056
```dotnetcli
51-
dotnet new --install Microsoft.Identity.Web.ProjectTemplates
57+
dotnet new install Microsoft.Identity.Web.ProjectTemplates
5258
```
5359

5460
Then, run the following command to create the application. Replace the placeholders in the command with the proper information from your app's overview page and execute the command in a command shell. The output location specified with the `-o|--output` option creates a project folder if it doesn't exist and becomes part of the app's name.
@@ -64,7 +70,7 @@ dotnet new blazorserver2 --auth SingleOrg --calls-graph -o {APP NAME} --client-i
6470
| `{TENANT ID}` | Directory (tenant) ID | `e86c78e2-0000-0000-0000-918e0565a45e` |
6571
| `{DOMAIN}` | Primary domain | `tenantname.onmicrosoft.com` |
6672

67-
Now, navigate to your new Blazor app in your editor and add the client secret to the *appsettings.json* file, replacing the text "secret-from-app-registration".
73+
Now, navigate to your new Blazor app in your editor and add the client secret to the _appsettings.json_ file, replacing the text "secret-from-app-registration".
6874

6975
```json
7076
"ClientSecret": "secret-from-app-registration",
@@ -86,21 +92,21 @@ In your browser, navigate to `https://localhost:5001`, and log in using an Azure
8692

8793
Before you start, log out of your app since you'll be making changes to the required permissions, and your current token won't work. If you haven't already, run your app again and select **Log out** before updating the code below.
8894

89-
Now you will update your app's registration and code to pull a user's email and display the messages within the app. To achieve this, first extend the app registration permissions in Azure AD to enable access to the email data. Then, add code to the Blazor app to retrieve and display this data in one of the pages.
95+
Now you'll update your app's registration and code to pull a user's email and display the messages within the app. To achieve this, first extend the app registration permissions in Azure AD to enable access to the email data. Then, add code to the Blazor app to retrieve and display this data in one of the pages.
9096

9197
1. In the Azure portal, select your app in **App registrations**.
9298
1. Under **Manage**, select **API permissions**.
9399
1. Select **Add a permission** > **Microsoft Graph**.
94100
1. Select **Delegated Permissions**, then search for and select the **Mail.Read** permission.
95101
1. Select **Add permissions**.
96102

97-
In the *appsettings.json* file, update your code so it fetches the appropriate token with the right permissions. Add "mail.read" after the "user.read" scope under "DownstreamAPI". This is specifying which scopes (or permissions) the app will request access to.
103+
In the *appsettings.json* file, update your code so it fetches the appropriate token with the right permissions. Add `mail.read` after the `user.read` scope under `DownstreamAPI`. This is specifying which scopes (or permissions) the app will request access to.
98104

99105
```json
100106
"Scopes": "user.read mail.read"
101107
```
102108

103-
Next, update the code in the *FetchData.razor* file to retrieve email data instead of the default (random) weather details. Replace the code in that file with the following:
109+
Next, update the code in the *FetchData.razor* file to retrieve email data instead of the default (random) weather details. Replace the code in that file with the following code snippet:
104110

105111
```csharp
106112
@page "/fetchdata"

articles/active-directory/external-identities/api-connectors-overview.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: conceptual
8-
ms.date: 06/16/2020
8+
ms.date: 11/28/2022
99

1010
ms.author: mimart
1111
author: msmimart
1212
manager: celestedg
1313
ms.custom: "it-pro"
14-
ms.collection: M365-identity-device-management
14+
ms.collection: engagement-fy23, M365-identity-device-management
1515
---
1616

1717
# Use API connectors to customize and extend self-service sign-up
@@ -25,7 +25,7 @@ As a developer or IT administrator, you can use [API connectors](self-service-si
2525
- **Overwrite user attributes**. Reformat or assign a value to an attribute collected from the user. For example, if a user enters the first name in all lowercase or all uppercase letters, you can format the name with only the first letter capitalized.
2626
- **Run custom business logic**. You can trigger downstream events in your cloud systems to send push notifications, update corporate databases, manage permissions, audit databases, and perform other custom actions.
2727

28-
An API connector provides Azure Active Directory with the information needed to call API endpoint by defining the HTTP endpoint URL and authentication for the API call. Once you configure an API connector, you can enable it for a specific step in a user flow. When a user reaches that step in the sign up flow, the API connector is invoked and materializes as an HTTP POST request to your API, sending user information ("claims") as key-value pairs in a JSON body. The API response can affect the execution of the user flow. For example, the API response can block a user from signing up, ask the user to re-enter information, or overwrite and append user attributes.
28+
An API connector provides Azure Active Directory with the information needed to call API endpoint by defining the HTTP endpoint URL and authentication for the API call. Once you configure an API connector, you can enable it for a specific step in a user flow. When a user reaches that step in the sign-up flow, the API connector is invoked and materializes as an HTTP POST request to your API, sending user information ("claims") as key-value pairs in a JSON body. The API response can affect the execution of the user flow. For example, the API response can block a user from signing up, ask the user to reenter information, or overwrite and append user attributes.
2929

3030
## Where you can enable an API connector in a user flow
3131

@@ -39,7 +39,7 @@ There are two places in a user flow where you can enable an API connector:
3939
4040
### After federating with an identity provider during sign-up
4141

42-
An API connector at this step in the sign-up process is invoked immediately after the user authenticates with an identity provider (like Google, Facebook, & Azure AD). This step precedes the ***attribute collection page***, which is the form presented to the user to collect user attributes. This step is not invoked if a user is registering with a local account. The following are examples of API connector scenarios you might enable at this step:
42+
An API connector at this step in the sign-up process is invoked immediately after the user authenticates with an identity provider (like Google, Facebook, & Azure AD). This step precedes the [***attribute collection page***](self-service-sign-up-user-flow.md#select-the-layout-of-the-attribute-collection-form), which is the form presented to the user to collect user attributes. This step isn't invoked if a user is registering with a local account. The following are examples of API connector scenarios you might enable at this step:
4343

4444
- Use the email or federated identity that the user provided to look up claims in an existing system. Return these claims from the existing system, pre-fill the attribute collection page, and make them available to return in the token.
4545
- Implement an allow or blocklist based on social identity.
@@ -55,4 +55,5 @@ An API connector at this step in the sign-up process is invoked after the attrib
5555

5656
## Next steps
5757
- Learn how to [add an API connector to a user flow](self-service-sign-up-add-api-connector.md)
58+
- Learn about [Azure AD entitlement management](self-service-portal.md)
5859
- Learn how to [add a custom approval system to self-service sign-up](self-service-sign-up-add-approvals.md)

0 commit comments

Comments
 (0)