Skip to content

Commit 7228d9d

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents ddd6cab + e9a46b4 commit 7228d9d

File tree

212 files changed

+2768
-1786
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

212 files changed

+2768
-1786
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 80 deletions
Original file line numberDiff line numberDiff line change
@@ -90,86 +90,6 @@
9090
"redirect_url": "https://docs.microsoft.com/previous-versions/azure/batch-ai/scripts/batch-ai-cli-sample-create-cluster-low-priority",
9191
"redirect_document_id": true
9292
},
93-
{
94-
"source_path": "articles/china/china-get-started-developer-guide.md",
95-
"redirect_url": "https://docs.microsoft.com/azure/china/resources-developer-guide",
96-
"redirect_document_id": true
97-
},
98-
{
99-
"source_path": "articles/china/china-get-started-plan.md",
100-
"redirect_url": "https://docs.microsoft.com/azure/china",
101-
"redirect_document_id": false
102-
},
103-
{
104-
"source_path": "articles/china/china-get-started-service-cdn.md",
105-
"redirect_url": "https://docs.microsoft.com/azure/china",
106-
"redirect_document_id": false
107-
},
108-
{
109-
"source_path": "articles/china/china-get-started-service-manage-and-connect.md",
110-
"redirect_url": "https://docs.microsoft.com/azure/china",
111-
"redirect_document_id": false
112-
},
113-
{
114-
"source_path": "articles/china/china-how-to-manage-performance.md",
115-
"redirect_url": "https://docs.microsoft.com/azure/china",
116-
"redirect_document_id": false
117-
},
118-
{
119-
"source_path": "articles/china/china-how-to-refactor.md",
120-
"redirect_url": "https://docs.microsoft.com/azure/china",
121-
"redirect_document_id": false
122-
},
123-
{
124-
"source_path": "articles/china/china-how-to-rehost.md",
125-
"redirect_url": "https://docs.microsoft.com/azure/china",
126-
"redirect_document_id": false
127-
},
128-
{
129-
"source_path": "articles/china/china-overview-faq.md",
130-
"redirect_url": "https://docs.microsoft.com/azure/china",
131-
"redirect_document_id": false
132-
},
133-
{
134-
"source_path": "articles/china/china-overview-operations.md",
135-
"redirect_url": "https://docs.microsoft.com/azure/china",
136-
"redirect_document_id": false
137-
},
138-
{
139-
"source_path": "articles/china/china-overview-policies.md",
140-
"redirect_url": "https://docs.microsoft.com/azure/china",
141-
"redirect_document_id": false
142-
},
143-
{
144-
"source_path": "articles/china/china-overview-service-hosting.md",
145-
"redirect_url": "https://docs.microsoft.com/azure/china",
146-
"redirect_document_id": false
147-
},
148-
{
149-
"source_path": "articles/china/china-overview-trust-cloud.md",
150-
"redirect_url": "https://docs.microsoft.com/azure/china",
151-
"redirect_document_id": false
152-
},
153-
{
154-
"source_path": "articles/china/china-resources-partners.md",
155-
"redirect_url": "https://docs.microsoft.com/azure/china",
156-
"redirect_document_id": false
157-
},
158-
{
159-
"source_path": "articles/china/china-resources-support.md",
160-
"redirect_url": "https://docs.microsoft.com/azure/china",
161-
"redirect_document_id": false
162-
},
163-
{
164-
"source_path": "articles/china/china-welcome.md",
165-
"redirect_url": "https://docs.microsoft.com/azure/china",
166-
"redirect_document_id": false
167-
},
168-
{
169-
"source_path": "articles/china/index.md",
170-
"redirect_url": "https://docs.microsoft.com/azure/china",
171-
"redirect_document_id": false
172-
},
17393
{
17494
"source_path": "articles/site-recovery/vmware-physical-mobility-service-install-manual.md",
17595
"redirect_url": "/azure/site-recovery/vmware-physical-mobility-service-overview#install-mobility-agent-through-ui",

articles/active-directory/authentication/active-directory-passwords-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Are you having a problem with Azure Active Directory (Azure AD) self-service pas
8080
| Error | Solution |
8181
| --- | --- |
8282
| The password reset service does not start on-premises. Error 6800 appears in the Azure AD Connect machine’s application event log. <br> <br> After onboarding, federated, pass-through authentication, or password-hash-synchronized users can't reset their passwords. | When password writeback is enabled, the sync engine calls the writeback library to perform the configuration (onboarding) by communicating to the cloud onboarding service. Any errors encountered during onboarding or while starting the Windows Communication Foundation (WCF) endpoint for password writeback results in errors in the event log, on your Azure AD Connect machine. <br> <br> During restart of the Azure AD Sync (ADSync) service, if writeback was configured, the WCF endpoint starts up. But, if the startup of the endpoint fails, we will log event 6800 and let the sync service start up. The presence of this event means that the password writeback endpoint did not start up. Event log details for this event 6800, along with event log entries generate by the PasswordResetService component, indicate why you can't start up the endpoint. Review these event log errors and try to restart the Azure AD Connect if password writeback still isn’t working. If the problem persists, try to disable and then re-enable password writeback.
83-
| When a user attempts to reset a password or unlock an account with password writeback enabled, the operation fails. <br> <br> In addition, you see an event in the Azure AD Connect event log that contains: “Synchronization Engine returned an error hr=800700CE, message=The filename or extension is too long” after the unlock operation occurs. | Find the Active Directory account for Azure AD Connect and reset the password so that it contains no more than 127 characters. Then open the **Synchronization Service** from the **Start** menu. Browse to **Connectors** and find the **Active Directory Connector**. Select it and then select **Properties**. Browse to the **Credentials** page and enter the new password. Select **OK** to close the page. |
83+
| When a user attempts to reset a password or unlock an account with password writeback enabled, the operation fails. <br> <br> In addition, you see an event in the Azure AD Connect event log that contains: “Synchronization Engine returned an error hr=800700CE, message=The filename or extension is too long” after the unlock operation occurs. | Find the Active Directory account for Azure AD Connect and reset the password so that it contains no more than 256 characters. Then open the **Synchronization Service** from the **Start** menu. Browse to **Connectors** and find the **Active Directory Connector**. Select it and then select **Properties**. Browse to the **Credentials** page and enter the new password. Select **OK** to close the page. |
8484
| At the last step of the Azure AD Connect installation process, you see an error indicating that password writeback couldn't be configured. <br> <br> The Azure AD Connect application event log contains error 32009 with the text “Error getting auth token.” | This error occurs in the following two cases: <br><ul><li>You have specified an incorrect password for the global administrator account specified at the beginning of the Azure AD Connect installation process.</li><li>You have attempted to use a federated user for the global administrator account specified at the beginning of the Azure AD Connect installation process.</li></ul> To fix this problem, ensure that you're not using a federated account for the global administrator you specified at the beginning of the installation process. Also ensure that the password specified is correct. |
8585
| The Azure AD Connect machine event log contains error 32002 that is thrown by running PasswordResetService. <br> <br> The error reads: “Error Connecting to ServiceBus. The token provider was unable to provide a security token.” | Your on-premises environment isn't able to connect to the Azure Service Bus endpoint in the cloud. This error is normally caused by a firewall rule blocking an outbound connection to a particular port or web address. See [Connectivity prerequisites](../hybrid/how-to-connect-install-prerequisites.md) for more info. After you have updated these rules, reboot the Azure AD Connect machine and password writeback should start working again. |
8686
| After working for some time, federated, pass-through authentication, or password-hash-synchronized users can't reset their passwords. | In some rare cases, the password writeback service can fail to restart when Azure AD Connect has restarted. In these cases, first, check whether password writeback appears to be enabled on-premises. You can check by using either the Azure AD Connect wizard or PowerShell (See the previous HowTos section). If the feature appears to be enabled, try enabling or disabling the feature again either through the UI or PowerShell. If this doesn’t work, try a complete uninstall and reinstall of Azure AD Connect. |

articles/active-directory/develop/access-tokens.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ services: active-directory
55
documentationcenter: ''
66
author: rwike77
77
manager: CelesteDG
8-
editor: ''
98

109
ms.service: active-directory
1110
ms.subservice: develop

articles/active-directory/develop/active-directory-signing-key-rollover.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121
---
2222

2323
# Signing key rollover in Azure Active Directory
24-
This article discusses what you need to know about the public keys that are used in Azure Active Directory (Azure AD) to sign security tokens. It is important to note that these keys rollover on a periodic basis and, in an emergency, could be rolled over immediately. All applications that use Azure AD should be able to programmatically handle the key rollover process or establish a periodic manual rollover process. Continue reading to understand how the keys work, how to assess the impact of the rollover to your application and how to update your application or establish a periodic manual rollover process to handle key rollover if necessary.
24+
This article discusses what you need to know about the public keys that are used in Azure Active Directory (Azure AD) to sign security tokens. It is important to note that these keys roll over on a periodic basis and, in an emergency, could be rolled over immediately. All applications that use Azure AD should be able to programmatically handle the key rollover process or establish a periodic manual rollover process. Continue reading to understand how the keys work, how to assess the impact of the rollover to your application and how to update your application or establish a periodic manual rollover process to handle key rollover if necessary.
2525

2626
## Overview of signing keys in Azure AD
2727
Azure AD uses public-key cryptography built on industry standards to establish trust between itself and the applications that use it. In practical terms, this works in the following way: Azure AD uses a signing key that consists of a public and private key pair. When a user signs in to an application that uses Azure AD for authentication, Azure AD creates a security token that contains information about the user. This token is signed by Azure AD using its private key before it is sent back to the application. To verify that the token is valid and originated from Azure AD, the application must validate the token’s signature using the public key exposed by Azure AD that is contained in the tenant’s [OpenID Connect discovery document](https://openid.net/specs/openid-connect-discovery-1_0.html) or SAML/WS-Fed [federation metadata document](azure-ad-federation-metadata.md).
@@ -39,7 +39,7 @@ How your application handles key rollover depends on variables such as the type
3939
* [Web applications / APIs protecting resources using .NET OWIN OpenID Connect, WS-Fed or WindowsAzureActiveDirectoryBearerAuthentication middleware](#owin)
4040
* [Web applications / APIs protecting resources using .NET Core OpenID Connect or JwtBearerAuthentication middleware](#owincore)
4141
* [Web applications / APIs protecting resources using Node.js passport-azure-ad module](#passport)
42-
* [Web applications / APIs protecting resources and created with Visual Studio 2015 or Visual Studio 2017](#vs2015)
42+
* [Web applications / APIs protecting resources and created with Visual Studio 2015 or later](#vs2015)
4343
* [Web applications protecting resources and created with Visual Studio 2013](#vs2013)
4444
* Web APIs protecting resources and created with Visual Studio 2013
4545
* [Web applications protecting resources and created with Visual Studio 2012](#vs2012)
@@ -52,12 +52,12 @@ This guidance is **not** applicable for:
5252
* On-premises applications published via application proxy don't have to worry about signing keys.
5353

5454
### <a name="nativeclient"></a>Native client applications accessing resources
55-
Applications that are only accessing resources (i.e Microsoft Graph, KeyVault, Outlook API and other Microsoft APIs) generally only obtain a token and pass it along to the resource owner. Given that they are not protecting any resources, they do not inspect the token and therefore do not need to ensure it is properly signed.
55+
Applications that are only accessing resources (i.e Microsoft Graph, KeyVault, Outlook API, and other Microsoft APIs) generally only obtain a token and pass it along to the resource owner. Given that they are not protecting any resources, they do not inspect the token and therefore do not need to ensure it is properly signed.
5656

5757
Native client applications, whether desktop or mobile, fall into this category and are thus not impacted by the rollover.
5858

5959
### <a name="webclient"></a>Web applications / APIs accessing resources
60-
Applications that are only accessing resources (i.e Microsoft Graph, KeyVault, Outlook API and other Microsoft APIs) generally only obtain a token and pass it along to the resource owner. Given that they are not protecting any resources, they do not inspect the token and therefore do not need to ensure it is properly signed.
60+
Applications that are only accessing resources (i.e Microsoft Graph, KeyVault, Outlook API, and other Microsoft APIs) generally only obtain a token and pass it along to the resource owner. Given that they are not protecting any resources, they do not inspect the token and therefore do not need to ensure it is properly signed.
6161

6262
Web applications and web APIs that are using the app-only flow (client credentials / client certificate), fall into this category and are thus not impacted by the rollover.
6363

@@ -124,8 +124,8 @@ passport.use(new OIDCStrategy({
124124
));
125125
```
126126

127-
### <a name="vs2015"></a>Web applications / APIs protecting resources and created with Visual Studio 2015 or Visual Studio 2017
128-
If your application was built using a web application template in Visual Studio 2015 or Visual Studio 2017 and you selected **Work And School Accounts** from the **Change Authentication** menu, it already has the necessary logic to handle key rollover automatically. This logic, embedded in the OWIN OpenID Connect middleware, retrieves and caches the keys from the OpenID Connect discovery document and periodically refreshes them.
127+
### <a name="vs2015"></a>Web applications / APIs protecting resources and created with Visual Studio 2015 or later
128+
If your application was built using a web application template in Visual Studio 2015 or later and you selected **Work Or School Accounts** from the **Change Authentication** menu, it already has the necessary logic to handle key rollover automatically. This logic, embedded in the OWIN OpenID Connect middleware, retrieves and caches the keys from the OpenID Connect discovery document and periodically refreshes them.
129129

130130
If you added authentication to your solution manually, your application might not have the necessary key rollover logic. You will need to write it yourself, or follow the steps in [Web applications / APIs using any other libraries or manually implementing any of the supported protocols](#other).
131131

articles/active-directory/develop/azure-ad-endpoint-comparison.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ services: active-directory
55
documentationcenter: ''
66
author: rwike77
77
manager: CelesteDG
8-
editor: ''
98

109
ms.service: active-directory
1110
ms.subservice: develop
@@ -15,7 +14,7 @@ ms.devlang: na
1514
ms.topic: conceptual
1615
ms.date: 05/07/2019
1716
ms.author: ryanwi
18-
ms.reviewer: saeeda, hirsin, jmprieur, sureshja, jesakowi, lenalepa, kkrishna, dadobali, negoe
17+
ms.reviewer: saeeda, hirsin, jmprieur, sureshja, jesakowi, lenalepa, kkrishna, negoe
1918
ms.custom: aaddev
2019
ms.collection: M365-identity-device-management
2120
---

articles/active-directory/develop/conditional-access-dev-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,12 @@ author: rwike77
77
manager: CelesteDG
88

99
ms.author: ryanwi
10-
ms.reviewer: dadobali
10+
ms.reviewer: jmprieur, saeeda
1111
ms.date: 02/28/2019
1212
ms.service: active-directory
1313
ms.subservice: develop
1414
ms.devlang: na
15-
ms.topic: article
15+
ms.topic: conceptual
1616
ms.tgt_pltfrm: na
1717
ms.workload: identity
1818
ms.collection: M365-identity-device-management

articles/active-directory/develop/developer-glossary.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.workload: identity
1717
ms.date: 04/13/2019
1818
ms.author: ryanwi
1919
ms.custom: aaddev
20-
ms.reviewer: jmprieur, saeeda, jesakowi, nacanuma, dadobali
20+
ms.reviewer: jmprieur, saeeda, jesakowi, nacanuma
2121
ms.collection: M365-identity-device-management
2222
---
2323

articles/active-directory/develop/developer-support-help-options.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,17 @@ services: active-directory
55
documentationcenter: dev-center-name
66
author: rwike77
77
manager: CelesteDG
8-
editor: ''
98

109
ms.assetid: 820acdb7-d316-4c3b-8de9-79df48ba3b06
1110
ms.service: active-directory
1211
ms.subservice: develop
1312
ms.devlang: na
14-
ms.topic: article
13+
ms.topic: conceptual
1514
ms.tgt_pltfrm: na
1615
ms.workload: identity
1716
ms.date: 02/14/2019
1817
ms.author: ryanwi
19-
ms.reviewer: jmprieur, dadobali
18+
ms.reviewer: jmprieur, saeeda
2019
ms.custom: aaddev
2120
ms.collection: M365-identity-device-management
2221
---

articles/active-directory/develop/howto-v1-debug-saml-sso-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.devlang: na
12-
ms.topic: article
12+
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
1515
ms.date: 02/18/2019

articles/active-directory/develop/howto-v1-enable-sso-android.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,17 @@ services: active-directory
55
documentationcenter: ''
66
author: rwike77
77
manager: CelesteDG
8-
editor: ''
98

109
ms.assetid: 40710225-05ab-40a3-9aec-8b4e96b6b5e7
1110
ms.service: active-directory
1211
ms.subservice: develop
1312
ms.workload: identity
1413
ms.tgt_pltfrm: android
1514
ms.devlang: java
16-
ms.topic: article
15+
ms.topic: conceptual
1716
ms.date: 09/24/2018
1817
ms.author: ryanwi
19-
ms.reviewer: dadobali
18+
ms.reviewer: brandwe, jmprieur
2019
ms.custom: aaddev
2120
ms.collection: M365-identity-device-management
2221
---

0 commit comments

Comments
 (0)