Skip to content

Commit 73540bf

Browse files
authored
Merge pull request #202774 from MicrosoftDocs/main
6/24 AM Publish
2 parents 63cbbdb + 7de25fe commit 73540bf

File tree

87 files changed

+735
-193
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+735
-193
lines changed

articles/active-directory-b2c/client-credentials-grant-flow.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/15/2022
12+
ms.date: 06/21/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -82,7 +82,17 @@ can't contain spaces. The following example demonstrates two app roles, read and
8282

8383
## Step 2. Register an application
8484

85-
To enable your app to sign in with Azure AD B2C using client credentials flow, register your applications (**App 1**). To create the web API app registration, follow these steps:
85+
To enable your app to sign in with Azure AD B2C using client credentials flow, you can use an existing application or register a new one (**App 1**).
86+
87+
If you're using an existing app, make sure the app's `accessTokenAcceptedVersion` is set to `2`:
88+
89+
1. In the Azure portal, search for and select **Azure AD B2C**.
90+
1. Select **App registrations**, and then select the your existing app from the list.
91+
1. In the left menu, under **Manage**, select **Manifest** to open the manifest editor.
92+
1. Locate the `accessTokenAcceptedVersion` element, and set its value to `2`.
93+
1. At the top of the page, select **Save** to save the changes.
94+
95+
To create a new web app registration, follow these steps:
8696

8797
1. In the Azure portal, search for and select **Azure AD B2C**
8898
1. Select **App registrations**, and then select **New registration**.

articles/active-directory-b2c/identity-provider-swissid.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ To enable sign-in for users with a SwissID account in Azure AD B2C, you need to
4444

4545
|Key |Note |
4646
|---------|---------|
47-
| Environment| The SwissID OpenId well-known configuration endpoint. For example, <https://login.sandbox.pre.swissid.ch/idp/oauth2/.well-known/openid-configuration>. |
48-
| Client ID | The SwissID client ID. For example, 11111111-2222-3333-4444-555555555555. |
47+
| Environment| The SwissID OpenId well-known configuration endpoint. For example, `https://login.sandbox.pre.swissid.ch/idp/oauth2/.well-known/openid-configuration`. |
48+
| Client ID | The SwissID client ID. For example, `11111111-2222-3333-4444-555555555555`. |
4949
| Password| The SwissID client secret.|
5050

5151

articles/active-directory/app-proxy/application-proxy-connector-installation-problem.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,9 +49,9 @@ When the installation of a connector fails, the root cause is usually one of the
4949
>
5050
>
5151
52-
**Review the pre-requisites required:**
52+
**Review the prerequisites required:**
5353

54-
1. Verify the machine supports TLS1.2 – All Windows versions after 2012 R2 should support TLS 1.2. If your connector machine is from a version of 2012 R2 or prior, make sure that the following KBs are installed on the machine: <https://support.microsoft.com/help/2973337/sha512-is-disabled-in-windows-when-you-use-tls-1.2>
54+
1. Verify the machine supports TLS1.2 – All Windows versions after 2012 R2 should support TLS 1.2. If your connector machine is from a version of 2012 R2 or prior, make sure that the [required updates](https://support.microsoft.com/help/2973337/sha512-is-disabled-in-windows-when-you-use-tls-1.2) are installed.
5555

5656
2. Contact your network admin and ask to verify that the backend proxy and firewall do not block SHA512 for outgoing traffic.
5757

articles/active-directory/develop/access-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Microsoft identity platform access tokens
33
description: Learn about access tokens emitted by the Azure AD v1.0 and Microsoft identity platform (v2.0) endpoints.
44
services: active-directory
5-
author: nickludwig
5+
author: davidmu1
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
1212
ms.date: 12/28/2021
13-
ms.author: ludwignick
13+
ms.author: davidmu
1414
ms.reviewer: marsma
1515
ms.custom: aaddev, identityplatformtop40, fasttrack-edit
1616
---

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
22
title: Customize Azure AD tenant app claims (PowerShell)
33
description: Learn how to customize claims emitted in tokens for an application in a specific Azure Active Directory tenant.
4-
author: rwike77
4+
author: davidmu1
55
manager: CelesteDG
66
ms.service: active-directory
77
ms.subservice: develop
88
ms.custom: aaddev
99
ms.workload: identity
1010
ms.topic: how-to
1111
ms.date: 06/16/2021
12-
ms.author: ryanwi
12+
ms.author: davidmu
1313
ms.reviewer: ludwignick
1414
---
1515

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
22
title: Provide optional claims to Azure AD apps
33
description: How to add custom or additional claims to the SAML 2.0 and JSON Web Tokens (JWT) tokens issued by Microsoft identity platform.
4-
author: rwike77
4+
author: davidmu1
55
manager: CelesteDG
66

77
ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.date: 04/04/2022
12-
ms.author: ryanwi
12+
ms.author: davidmu
1313
ms.reviewer: paulgarn, ludwignick
1414
ms.custom: aaddev
1515
---

articles/active-directory/develop/active-directory-saml-claims-customization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Customize app SAML token claims
33
description: Learn how to customize the claims issued by Microsoft identity platform in the SAML token for enterprise applications.
44
services: active-directory
5-
author: kenwith
5+
author: davidmu1
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
99
ms.workload: identity
1010
ms.topic: how-to
1111
ms.date: 02/07/2022
12-
ms.author: kenwith
12+
ms.author: davidmu
1313
ms.reviewer: luleon, paulgarn, jeedes
1414
ms.custom: aaddev
1515
---

articles/active-directory/develop/active-directory-schema-extensions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Use Azure AD schema extension attributes in claims
33
description: Describes how to use directory schema extension attributes for sending user data to applications in token claims.
44
services: active-directory
5-
author: rwike77
5+
author: davidmu1
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
99
ms.custom: aaddev
1010
ms.workload: identity
1111
ms.topic: how-to
1212
ms.date: 07/29/2020
13-
ms.author: ryanwi
13+
ms.author: davidmu
1414
ms.reviewer: paulgarn, ludwignick, jeedes, luleon
1515
---
1616
# Using directory schema extension attributes in claims

articles/active-directory/develop/reference-claims-mapping-policy-type.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Claims mapping policy
33
description: Learn about the claims mapping policy type, which is used to modify the claims emitted in tokens issued for specific applications.
44
services: active-directory
5-
author: rwike77
5+
author: davidmu1
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
99
ms.custom: aaddev
1010
ms.workload: identity
1111
ms.topic: reference
1212
ms.date: 03/04/2022
13-
ms.author: ryanwi
13+
ms.author: davidmu
1414
ms.reviewer: paulgarn, ludwignick, jeedes, luleon
1515
---
1616

articles/active-directory/develop/scenario-web-app-sign-user-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -288,7 +288,7 @@ In the code above:
288288
289289
- The `AddMicrosoftIdentityUI` extension method is defined in **Microsoft.Identity.Web.UI**. It provides a default controller to handle sign-in and sign-out.
290290
291-
You can find more details about how Microsoft.Identity.Web enables you to create web apps in <https://aka.ms/ms-id-web/webapp>
291+
For more information about how Microsoft.Identity.Web enables you to create web apps, see [Web Apps in microsoft-identity-web](https://aka.ms/ms-id-web/webapp).
292292
293293
# [ASP.NET](#tab/aspnet)
294294

0 commit comments

Comments
 (0)