Skip to content

Commit 6860b86

Browse files
committed
Merge branch 'master' of https://github.com/microsoftdocs/azure-docs-pr into akv-reorg-working-branch
2 parents d3bbd3a + b54ec81 commit 6860b86

File tree

142 files changed

+1111
-852
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

142 files changed

+1111
-852
lines changed

articles/active-directory/authentication/TOC.yml

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -22,11 +22,7 @@
2222
items:
2323
- name: Authentication methods
2424
href: concept-authentication-methods.md
25-
- name: Passwordless authentication
26-
href: concept-authentication-passwordless.md
27-
- name: Security information registration
28-
href: concept-registration-mfa-sspr-combined.md
29-
- name: Password reset
25+
- name: Self-service password reset
3026
items:
3127
- name: How password reset works
3228
href: concept-sspr-howitworks.md
@@ -48,12 +44,16 @@
4844
href: https://docs.microsoft.com/office365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide
4945
- name: FAQ
5046
href: multi-factor-authentication-faq.md
51-
- name: Azure AD password protection
47+
- name: Passwordless authentication
48+
href: concept-authentication-passwordless.md
49+
- name: Password protection
5250
items:
5351
- name: Eliminate weak passwords in the cloud
5452
href: concept-password-ban-bad.md
5553
- name: Eliminate weak passwords on-premises
5654
href: concept-password-ban-bad-on-premises.md
55+
- name: Security information registration
56+
href: concept-registration-mfa-sspr-combined.md
5757
- name: Resilient access controls
5858
href: concept-resilient-controls.md
5959
- name: How-to guides
@@ -100,28 +100,6 @@
100100
href: howto-mfa-nps-extension-rdg.md
101101
- name: VPN
102102
href: howto-mfa-nps-extension-vpn.md
103-
- name: Security info registration
104-
items:
105-
- name: Enable combined registration
106-
href: howto-registration-mfa-sspr-combined.md
107-
- name: Troubleshoot combined registration
108-
href: howto-registration-mfa-sspr-combined-troubleshoot.md
109-
- name: Azure AD password protection
110-
items:
111-
- name: Plan and deploy on-premises
112-
href: howto-password-ban-bad-on-premises-deploy.md
113-
- name: Enable and configure on-premises
114-
href: howto-password-ban-bad-on-premises-operations.md
115-
- name: Monitor on-premises deployments
116-
href: howto-password-ban-bad-on-premises-monitor.md
117-
- name: Troubleshoot on-premises deployments
118-
href: howto-password-ban-bad-on-premises-troubleshoot.md
119-
- name: On-premises FAQs
120-
href: howto-password-ban-bad-on-premises-faq.md
121-
- name: On-premises agent version history
122-
href: howto-password-ban-bad-on-premises-agent-versions.md
123-
- name: Azure AD smart lockout
124-
href: howto-password-smart-lockout.md
125103
- name: Passwordless
126104
items:
127105
- name: Deploying passwordless
@@ -138,16 +116,38 @@
138116
href: howto-authentication-passwordless-phone.md
139117
- name: Windows Hello for Business
140118
href: https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-identity-verification
119+
- name: Security info registration
120+
items:
121+
- name: Enable combined registration
122+
href: howto-registration-mfa-sspr-combined.md
123+
- name: Troubleshoot combined registration
124+
href: howto-registration-mfa-sspr-combined-troubleshoot.md
125+
- name: On-premises password protection
126+
items:
127+
- name: Plan and deploy
128+
href: howto-password-ban-bad-on-premises-deploy.md
129+
- name: Enable and configure
130+
href: howto-password-ban-bad-on-premises-operations.md
131+
- name: Monitor
132+
href: howto-password-ban-bad-on-premises-monitor.md
133+
- name: Troubleshoot
134+
href: howto-password-ban-bad-on-premises-troubleshoot.md
135+
- name: FAQs
136+
href: howto-password-ban-bad-on-premises-faq.md
137+
- name: Agent version history
138+
href: howto-password-ban-bad-on-premises-agent-versions.md
141139
- name: Use SMS-based authentication (preview)
142140
href: howto-authentication-sms-signin.md
141+
- name: Azure AD smart lockout
142+
href: howto-password-smart-lockout.md
143143
- name: Certificate-based authentication
144144
items:
145145
- name: Get started with certificate auth
146146
href: active-directory-certificate-based-authentication-get-started.md
147147
items:
148-
- name: CBA on Android Devices
148+
- name: Use on Android Devices
149149
href: active-directory-certificate-based-authentication-android.md
150-
- name: CBA on iOS Devices
150+
- name: Use on iOS Devices
151151
href: active-directory-certificate-based-authentication-ios.md
152152
- name: Reporting
153153
items:

articles/active-directory/azuread-dev/azure-ad-endpoint-comparison.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: azuread-dev
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 11/26/2019
12+
ms.date: 3/20/2020
1313
ms.author: ryanwi
1414
ms.reviewer: saeeda, hirsin, jmprieur, sureshja, jesakowi, lenalepa, kkrishna, negoe
1515
ms.custom: aaddev
@@ -33,7 +33,7 @@ When developing a new application, it's important to know the differences betwee
3333

3434
The Microsoft identity platform endpoint allows you to write apps that accept sign-ins from personal Microsoft accounts, and work and school accounts. This gives you the ability to write your app completely account-agnostic. For example, if your app calls the [Microsoft Graph](https://graph.microsoft.io), some additional functionality and data will be available to work accounts, such as their SharePoint sites or directory data. But for many actions, such as [Reading a user's mail](https://docs.microsoft.com/graph/api/user-list-messages?view=graph-rest-1.0), the same code can access the email for both personal and work and school accounts.
3535

36-
For Microsoft identity platform endpoint, you can use the Microsoft Authentication Library (MSAL) to gain access to the consumer, educational, and enterprise worlds. The Azure AD v1.0 endpoint accepts sign-ins from work and school accounts only.
36+
For the Microsoft identity platform endpoint ("v2.0"), you can use the Microsoft Authentication Library (MSAL) to gain access to the consumer, educational, and enterprise worlds. The Azure AD v1.0 endpoint accepts sign-ins from work and school accounts only.
3737

3838
## Incremental and dynamic consent
3939

@@ -114,16 +114,16 @@ The Microsoft identity platform endpoint issues a smaller set of claims in its t
114114
115115
## Limitations
116116

117-
There are a few restrictions to be aware of when using Microsoft identity platform.
117+
There are a few restrictions and improved security practices to be aware of when using Microsoft identity platform.
118118

119-
When you build applications that integrate with the Microsoft identity platform, you need to decide whether the Microsoft identity platform endpoint and authentication protocols meet your needs. The v1.0 endpoint and platform is still fully supported and, in some respects, is more feature rich than Microsoft identity platform. However, Microsoft identity platform [introduces significant benefits](azure-ad-endpoint-comparison.md) for developers.
119+
When you build applications that integrate with the Microsoft identity platform, you need to decide whether the Microsoft identity platform endpoint and authentication protocols meet your needs. The v1.0 endpoint and platform is still fully supported and, in some respects, is more permissive and interoperable than Microsoft identity platform. However, Microsoft identity platform [introduces significant benefits](azure-ad-endpoint-comparison.md) for developers.
120120

121121
Here's a simplified recommendation for developers now:
122122

123123
* If you want or need to support personal Microsoft accounts in your application, or you're writing a new application, use Microsoft identity platform. But before you do, make sure you understand the limitations discussed in this article.
124124
* If you're migrating or updating an application that relies on SAML, you can't use Microsoft identity platform. Instead, refer to the [Azure AD v1.0 guide](v1-overview.md).
125125

126-
The Microsoft identity platform endpoint will evolve to eliminate the restrictions listed here, so that you'll only ever need to use the Microsoft identity platform endpoint. In the meantime, use this article to determine whether the Microsoft identity platform endpoint is right for you. We'll continue to update this article to reflect the current state of the Microsoft identity platform endpoint. Check back to reevaluate your requirements against Microsoft identity platform capabilities.
126+
The Microsoft identity platform endpoint will evolve to eliminate the limitations listed here, so that you'll only ever need to use the Microsoft identity platform endpoint. Your app may need to update to conform to best security practices however - those will not be relaxed on the Microsoft identity platform. In the meantime, use this article to determine whether the Microsoft identity platform endpoint is right for you. We'll continue to update this article to reflect the current state of the Microsoft identity platform endpoint. Check back to reevaluate your requirements against Microsoft identity platform capabilities.
127127

128128
### Restrictions on app registrations
129129

@@ -170,7 +170,7 @@ To learn how to register an app for use with Microsoft identity platform, see [R
170170

171171
### Restrictions on libraries and SDKs
172172

173-
Currently, library support for the Microsoft identity platform endpoint is limited. If you want to use the Microsoft identity platform endpoint in a production application, you have these options:
173+
Currently, Microsoft-provided library support for the Microsoft identity platform endpoint is limited compared to the Azure AD v1.0 endpoint. If you want to use the Microsoft identity platform endpoint in a production application, you have these options:
174174

175175
* If you're building a web application, you can safely use the generally available server-side middleware to do sign-in and token validation. These include the OWIN OpenID Connect middleware for ASP.NET and the Node.js Passport plug-in. For code samples that use Microsoft middleware, see the [Microsoft identity platform getting started](../develop/v2-overview.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json#getting-started) section.
176176
* If you're building a desktop or mobile application, you can use one of the Microsoft Authentication Libraries (MSAL). These libraries are generally available or in a production-supported preview, so it is safe to use them in production applications. You can read more about the terms of the preview and the available libraries in [authentication libraries reference](../develop/reference-v2-libraries.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json).
@@ -191,3 +191,7 @@ To better understand the scope of protocol functionality supported in the Micros
191191
#### SAML restrictions
192192

193193
If you've used Active Directory Authentication Library (ADAL) in Windows applications, you might have taken advantage of Windows Integrated authentication, which uses the Security Assertion Markup Language (SAML) assertion grant. With this grant, users of federated Azure AD tenants can silently authenticate with their on-premises Active Directory instance without entering credentials. The SAML assertion grant isn't supported on the Microsoft identity platform endpoint.
194+
195+
### Symmetric key security requirements
196+
197+
While the Azure AD v1.0 endpoint supports the use of symmetric keys as custom signing keys and encryption keys, this is not a best practice and is discouraged. The Microsoft identity platform enforces this best practice, and only allows the use of asymmetric keys. If your application is migrating to Microsoft identity platform from Azure AD v1.0, you should update your code to use asymmetric keys, upload proper keys for your application, and delete the symmetric keys on your application registration. Only then should your application migrate to using Microsoft identity platform.

articles/active-directory/develop/quickstart-v2-aspnet-core-webapp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.topic: quickstart
1111
ms.workload: identity
1212
ms.date: 04/11/2019
1313
ms.author: jmprieur
14-
ms.custom: aaddev, identityplatformtop40
14+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:aspnet-core
1515
#Customer intent: As an application developer, I want to know how to write an ASP.NET Core web app that can sign in personal accounts, as well as work and school accounts from any Azure Active Directory instance.
1616
---
1717

articles/active-directory/develop/quickstart-v2-netcore-daemon.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.topic: quickstart
1212
ms.workload: identity
1313
ms.date: 07/16/2019
1414
ms.author: jmprieur
15-
ms.custom: aaddev, identityplatformtop40
15+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:aspnet-core
1616
#Customer intent: As an application developer, I want to learn how my .NET Core app can get an access token and call an API that's protected by an Microsoft identity platform endpoint using client credentials flow.
1717
---
1818

articles/active-directory/manage-apps/application-proxy-connectors.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -148,12 +148,17 @@ To provide a secure service, connectors have to authenticate toward the service,
148148
149149
The certificates used are specific to the Application Proxy service. They get created during the initial registration and are automatically renewed by the connectors every couple of months.
150150
151+
After the first successful certificate renewal the Azure AD Application Proxy Connector service (Network Service) has no permission to remove the old certificate from the local machine store. If the certificate has expired or it won't be used by the service anymore, you can delete it safely.
152+
153+
To avoid problems with the certificate renewal, ensure that the network communication from the connector towards the [documented destinations](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-add-on-premises-application#prepare-your-on-premises-environment) is enabled.
154+
151155
If a connector is not connected to the service for several months, its certificates may be outdated. In this case, uninstall and reinstall the connector to trigger registration. You can run the following PowerShell commands:
152156
153157
```
154158
Import-module AppProxyPSModule
155159
Register-AppProxyConnector
156160
```
161+
To learn more about how to verify the certificate and troubleshoot problems see [Verify Machine and backend components support for Application Proxy trust certificate](application-proxy-connector-installation-problem.md#verify-machine-and-backend-components-support-for-application-proxy-trust-certificate).
157162
158163
## Under the hood
159164

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1532,6 +1532,8 @@
15321532
href: trakstar-tutorial.md
15331533
- name: Trello
15341534
href: trello-tutorial.md
1535+
- name: Trend Micro Web Security(TMWS)
1536+
href: trend-micro-tutorial.md
15351537
- name: TripActions
15361538
href: tripactions-tutorial.md
15371539
- name: Trisotech Digital Enterprise Server

0 commit comments

Comments
 (0)