Skip to content

Commit 733253e

Browse files
committed
fix
2 parents 2b41376 + 9c5f129 commit 733253e

File tree

600 files changed

+10838
-5494
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

600 files changed

+10838
-5494
lines changed

.openpublishing.publish.config.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -800,7 +800,13 @@
800800
"url": "https://github.com/Azure-Samples/msdocs-python-django-webapp-quickstart",
801801
"branch": "main",
802802
"branch_mapping": {}
803-
}
803+
},
804+
{
805+
"path_to_root": "msdocs-nodejs-mongodb-azure-sample-app",
806+
"url": "https://github.com/Azure-Samples/msdocs-nodejs-mongodb-azure-sample-app",
807+
"branch": "main",
808+
"branch_mapping": {}
809+
}
804810
],
805811
"branch_target_mapping": {
806812
"live": [

.openpublishing.redirection.json

Lines changed: 37 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -2518,6 +2518,11 @@
25182518
"redirect_url": "/azure/machine-learning/how-to-configure-auto-train#troubleshooting",
25192519
"redirect_document_id": false
25202520
},
2521+
{
2522+
"source_path": "articles/machine-learning/how-to-compute-cluster-instance-os-upgrade.md",
2523+
"redirect_url": "/azure/machine-learning/concept-vulnerability-management",
2524+
"redirect_document_id": false
2525+
},
25212526
{
25222527
"source_path": "articles/machine-learning/how-to-deploy-custom-docker-image.md",
25232528
"redirect_url": "/azure/machine-learning/how-to-deploy-custom-container",
@@ -13474,7 +13479,7 @@
1347413479
},
1347513480
{
1347613481
"source_path_from_root": "/articles/connectors/connectors-create-api-excel.md",
13477-
"redirect_url": "/connectors/excelonlinebusiness/",
13482+
"redirect_url": "/connectors/excelonlinebusiness",
1347813483
"redirect_document_id": false
1347913484
},
1348013485
{
@@ -31327,11 +31332,6 @@
3132731332
"redirect_url": "https://azure.microsoft.com/updates/cleardb-removal-from-the-azure-marketplace/",
3132831333
"redirect_document_id": false
3132931334
},
31330-
{
31331-
"source_path_from_root": "/articles/connectors/connectors-create-api-box",
31332-
"redirect_url": "/connectors/box/",
31333-
"redirect_document_id": true
31334-
},
3133531335
{
3133631336
"source_path_from_root": "/articles/logic-apps/logic-apps-custom-connector-register.md",
3133731337
"redirect_url": "/connectors/custom-connectors",
@@ -31372,15 +31372,20 @@
3137231372
"redirect_url": "/connectors/custom-connectors/submit-certification",
3137331373
"redirect_document_id": false
3137431374
},
31375+
{
31376+
"source_path_from_root": "/articles/connectors/connectors-create-api-box",
31377+
"redirect_url": "/connectors/box/",
31378+
"redirect_document_id": false
31379+
},
3137531380
{
3137631381
"source_path_from_root": "/articles/connectors/connectors-create-api-dropbox",
3137731382
"redirect_url": "/connectors/dropbox/",
31378-
"redirect_document_id": true
31383+
"redirect_document_id": false
3137931384
},
3138031385
{
3138131386
"source_path_from_root": "/articles/connectors/connectors-create-api-facebook",
3138231387
"redirect_url": "/connectors/facebook/",
31383-
"redirect_document_id": true
31388+
"redirect_document_id": false
3138431389
},
3138531390
{
3138631391
"source_path_from_root": "/articles/connectors/connectors-create-api-googledrive.md",
@@ -31390,47 +31395,47 @@
3139031395
{
3139131396
"source_path_from_root": "/articles/connectors/connectors-create-api-mailchimp",
3139231397
"redirect_url": "/connectors/mailchimp/",
31393-
"redirect_document_id": true
31398+
"redirect_document_id": false
3139431399
},
3139531400
{
3139631401
"source_path_from_root": "/articles/connectors/connectors-create-api-microsofttranslator",
3139731402
"redirect_url": "/connectors/microsofttranslator/",
31398-
"redirect_document_id": true
31403+
"redirect_document_id": false
3139931404
},
3140031405
{
3140131406
"source_path_from_root": "/articles/connectors/connectors-create-api-office365-users",
3140231407
"redirect_url": "/connectors/office365users/",
31403-
"redirect_document_id": true
31408+
"redirect_document_id": false
3140431409
},
3140531410
{
3140631411
"source_path_from_root": "/articles/connectors/connectors-create-api-office365-video",
3140731412
"redirect_url": "/connectors/office365video/",
31408-
"redirect_document_id": true
31413+
"redirect_document_id": false
3140931414
},
3141031415
{
3141131416
"source_path_from_root": "/articles/connectors/connectors-create-api-projectonline",
3141231417
"redirect_url": "/connectors/projectonline/",
31413-
"redirect_document_id": true
31418+
"redirect_document_id": false
3141431419
},
3141531420
{
3141631421
"source_path_from_root": "/articles/connectors/connectors-create-api-rss",
3141731422
"redirect_url": "/connectors/rss/",
31418-
"redirect_document_id": true
31423+
"redirect_document_id": false
3141931424
},
3142031425
{
3142131426
"source_path_from_root": "/articles/connectors/connectors-create-api-trello",
3142231427
"redirect_url": "/connectors/trello/",
31423-
"redirect_document_id": true
31428+
"redirect_document_id": false
3142431429
},
3142531430
{
3142631431
"source_path_from_root": "/articles/connectors/connectors-create-api-twitter",
3142731432
"redirect_url": "/connectors/twitter/",
31428-
"redirect_document_id": true
31433+
"redirect_document_id": false
3142931434
},
3143031435
{
3143131436
"source_path_from_root": "/articles/connectors/connectors-create-api-yammer",
3143231437
"redirect_url": "/connectors/yammer/",
31433-
"redirect_document_id": true
31438+
"redirect_document_id": false
3143431439
},
3143531440
{
3143631441
"source_path_from_root": "/articles/connectors/connectors-create-api-wunderlist.md",
@@ -40767,6 +40772,21 @@
4076740772
"redirect_url": "/azure/aks/",
4076840773
"redirect_document_id": false
4076940774
},
40775+
{
40776+
"source_path": "articles/aks/open-service-mesh-ip-port-exclusion.md",
40777+
"redirect_url": "/azure/aks/open-service-mesh-about",
40778+
"redirect_document_id": false
40779+
},
40780+
{
40781+
"source_path": "articles/aks/open-service-mesh-deploy-new-application.md",
40782+
"redirect_url": "/azure/aks/open-service-mesh-about",
40783+
"redirect_document_id": false
40784+
},
40785+
{
40786+
"source_path": "articles/aks/open-service-mesh-deploy-existing-application.md",
40787+
"redirect_url": "/azure/aks/open-service-mesh-about",
40788+
"redirect_document_id": false
40789+
},
4077040790
{
4077140791
"source_path_from_root": "/articles/azure-monitor/platform/alerts-metric-create-templates.md",
4077240792
"redirect_url": "/azure/azure-monitor/alerts/alerts-metric-create-templates",

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,8 +122,9 @@ The following providers offer FIDO2 security keys of different form factors that
122122
| IDmelon Technologies Inc. | ![y] | ![y]| ![y]| ![y]| ![n] | https://www.idmelon.com/#idmelon |
123123
| Kensington | ![y] | ![y]| ![n]| ![n]| ![n] | https://www.kensington.com/solutions/product-category/why-biometrics/ |
124124
| KONA I | ![y] | ![n]| ![y]| ![y]| ![n] | https://konai.com/business/security/fido |
125-
| NEOWAVE | ![n] | ![y]| ![y]| ![n]| ![n] | https://neowave.fr/en/products/fido-range/ |
125+
| NeoWave | ![n] | ![y]| ![y]| ![n]| ![n] | https://neowave.fr/en/products/fido-range/ |
126126
| Nymi | ![y] | ![n]| ![y]| ![n]| ![n] | https://www.nymi.com/nymi-band |
127+
| Octatco | ![y] | ![y]| ![n]| ![n]| ![n] | https://octatco.com/ |
127128
| OneSpan Inc. | ![n] | ![y]| ![n]| ![y]| ![n] | https://www.onespan.com/products/fido |
128129
| Thales Group | ![n] | ![y]| ![y]| ![n]| ![n] | https://cpl.thalesgroup.com/access-management/authenticators/fido-devices |
129130
| Thetis | ![y] | ![y]| ![y]| ![y]| ![n] | https://thetis.io/collections/fido2 |
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
title: Don't send your middle-tier OBO token to any non-audience party
3+
description: Include file warning that access tokens acquired by the middle-tier shouldn't be sent to any party except that which is identified by the audience claim.
4+
services: active-directory
5+
author: iambmelt
6+
manager: CelesteDG
7+
8+
ms.service: active-directory
9+
ms.subservice: develop
10+
ms.workload: identity
11+
ms.topic: include
12+
ms.date: 12/7/2021
13+
ms.author: brianmel
14+
ms.reviewer: brianmel
15+
ms.custom: aaddev
16+
---
17+
18+
> [!WARNING]
19+
> **DO NOT** send access tokens that were issued to the middle tier to any other party. Access tokens issued to the middle tier are intended for use _only_ by that middle tier.
20+
>
21+
> Security risks of relaying access tokens from a middle-tier resource to a client (instead of the client getting the access tokens themselves) include:
22+
>
23+
> - Increased risk of token interception over compromised SSL/TLS channels.
24+
> - Inability to satisfy token binding and Conditional Access scenarios requiring claim step-up (for example, MFA, Sign-in Frequency).
25+
> - Incompatibility with admin-configured device-based policies (for example, MDM, location-based policies).

articles/active-directory/develop/publisher-verification-overview.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,12 @@ Publisher verification helps admins and end users understand the authenticity of
2323
When an application is marked as publisher verified, it means that the publisher has verified their identity using a [Microsoft Partner Network](https://partner.microsoft.com/membership) account that has completed the [verification](/partner-center/verification-responses) process and has associated this MPN account with their application registration.
2424

2525
A blue "verified" badge appears on the Azure AD consent prompt and other screens:
26+
2627
![Consent prompt](./media/publisher-verification-overview/consent-prompt.png)
2728

29+
> [!NOTE]
30+
> We recently changed the color of the "verified" badge from blue to gray. We will revert that change sometime in the last half of February 2022, so the "verified" badge will be blue.
31+
2832
This feature is primarily for developers building multi-tenant apps that leverage [OAuth 2.0 and OpenID Connect](active-directory-v2-protocols.md) with the [Microsoft identity platform](v2-overview.md). These apps can sign users in using OpenID Connect, or they may use OAuth 2.0 to request access to data using APIs like [Microsoft Graph](https://developer.microsoft.com/graph/).
2933

3034
## Benefits

articles/active-directory/develop/sample-v2-code.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The following samples show public client desktop applications that access the Mi
8383
> | Java | [Call Microsoft Graph](https://github.com/Azure-Samples/ms-identity-java-desktop/) | MSAL Java | Integrated Windows authentication |
8484
> | Node.js | [Sign in users](https://github.com/Azure-Samples/ms-identity-javascript-nodejs-desktop) | MSAL Node | Authorization code with PKCE |
8585
> | Powershell | [Call Microsoft Graph by signing in users using username/password](https://github.com/azure-samples/active-directory-dotnetcore-console-up-v2) | MSAL.NET | Resource owner password credentials |
86-
> | Python | [Sign in users](https://github.com/Azure-Samples/ms-identity-python-desktop) | MSAL Python | Authorization code with PKCE |
86+
> | Python | [Sign in users](https://github.com/Azure-Samples/ms-identity-python-desktop) | MSAL Python | Resource owner password credentials |
8787
> | Universal Window Platform (UWP) | [Call Microsoft Graph](https://github.com/Azure-Samples/active-directory-xamarin-native-v2/tree/main/2-With-broker) | MSAL.NET | Web account manager |
8888
> | Windows Presentation Foundation (WPF) | [Sign in users and call Microsoft Graph](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2/tree/master/2.%20Web%20API%20now%20calls%20Microsoft%20Graph) | MSAL.NET | Authorization code with PKCE |
8989
> | XAML | &#8226; [Sign in users and call ASP.NET core web API](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2/tree/master/1.%20Desktop%20app%20calls%20Web%20API) <br/> &#8226; [Sign in users and call Microsoft Graph](https://github.com/azure-samples/active-directory-dotnet-desktop-msgraph-v2) | MSAL.NET | Authorization code with PKCE |

articles/active-directory/develop/scenario-daemon-app-configuration.md

Lines changed: 36 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,12 @@ Configuration parameters for the [Node.js daemon sample](https://github.com/Azur
8181
# Credentials
8282
TENANT_ID=Enter_the_Tenant_Info_Here
8383
CLIENT_ID=Enter_the_Application_Id_Here
84+
85+
// You provide either a ClientSecret or a CertificateConfiguration, or a ClientAssertion. These settings are exclusive
8486
CLIENT_SECRET=Enter_the_Client_Secret_Here
87+
CERTIFICATE_THUMBPRINT=Enter_the_certificate_thumbprint_Here
88+
CERTIFICATE_PRIVATE_KEY=Enter_the_certificate_private_key_Here
89+
CLIENT_ASSERTION=Enter_the_Assertion_String_Here
8590

8691
# Endpoints
8792
// the Azure AD endpoint is the authority endpoint for token issuance
@@ -267,6 +272,7 @@ app = ConfidentialClientApplicationBuilder.Create(config.ClientId)
267272
.WithAuthority(new Uri(config.Authority))
268273
.Build();
269274
```
275+
270276
# [Java](#tab/java)
271277

272278
In MSAL Java, there are two builders to instantiate the confidential client application with certificates:
@@ -302,7 +308,24 @@ ConfidentialClientApplication cca =
302308

303309
# [Node.js](#tab/nodejs)
304310

305-
The sample application does not implement initialization with certificates at the moment.
311+
```JavaScript
312+
313+
const config = {
314+
auth: {
315+
clientId: process.env.CLIENT_ID,
316+
authority: process.env.AAD_ENDPOINT + process.env.TENANT_ID,
317+
clientCertificate: {
318+
thumbprint: process.env.CERTIFICATE_THUMBPRINT, // a 40-digit hexadecimal string
319+
privateKey: process.env.CERTIFICATE_PRIVATE_KEY,
320+
}
321+
}
322+
};
323+
324+
// Create an MSAL application object
325+
const cca = new msal.ConfidentialClientApplication(config);
326+
```
327+
328+
For details, see [Use certificate credentials with MSAL Node](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-node/docs/certificate-credentials.md).
306329

307330
# [Python](#tab/python)
308331

@@ -371,7 +394,18 @@ ConfidentialClientApplication cca =
371394

372395
# [Node.js](#tab/nodejs)
373396

374-
The sample application does not implement initialization with assertions at the moment.
397+
```JavaScript
398+
const clientConfig = {
399+
auth: {
400+
clientId: process.env.CLIENT_ID,
401+
authority: process.env.AAD_ENDPOINT + process.env.TENANT_ID,
402+
clientAssertion: process.env.CLIENT_ASSERTION
403+
}
404+
};
405+
const cca = new msal.ConfidentialClientApplication(clientConfig);
406+
```
407+
408+
For details, see [Initialize the ConfidentialClientApplication object](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-node/docs/initialize-confidential-client-application.md).
375409

376410
# [Python](#tab/python)
377411

articles/active-directory/develop/v2-oauth2-on-behalf-of-flow.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,8 @@ To request an access token, make an HTTP POST to the tenant-specific Microsoft i
5252
https://login.microsoftonline.com/<tenant>/oauth2/v2.0/token
5353
```
5454

55+
[!INCLUDE [remind-not-to-relay-token-nonaud](includes/remind-not-to-relay-token-nonaud.md)]
56+
5557
There are two cases depending on whether the client application chooses to be secured by a shared secret or a certificate.
5658

5759
### First case: Access token request with a shared secret

articles/active-directory/fundamentals/service-accounts-governing-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020
There are three types of service accounts in Azure Active Directory (Azure AD): [managed identities](service-accounts-managed-identities.md), [service principals](service-accounts-principal.md), and user accounts employed as service accounts. As you create these service accounts for automated use, they're granted permissions to access resources in Azure and Azure AD. Resources can include Microsoft 365 services, software as a service (SaaS) applications, custom applications, databases, HR systems, and so on. Governing Azure AD service accounts means that you manage their creation, permissions, and lifecycle to ensure security and continuity.
2121

2222
> [!IMPORTANT]
23-
> We do not recommend using user accounts as service accounts as they are inherently less secure. This includes on-premises service accounts that are synced to Azure AD, as they are not converted to service principals. Instead, we recommend the use of managed identities or service principals. Note that at this time the use of conditional access policies is not possible with service principals, but the functionality is coming.
23+
> We do not recommend using user accounts as service accounts as they are inherently less secure. This includes on-premises service accounts that are synced to Azure AD, as they are not converted to service principals. Instead, we recommend the use of managed identities or service principals. Note that at this time the use of conditional access policies with service principals is called Conditional Access for workload identities and it's in public preview.
2424
2525

2626
## Plan your service account

0 commit comments

Comments
 (0)