Skip to content

Commit 75fbd89

Browse files
committed
Merge branch 'chunking' of https://github.com/ecfan/azure-docs-pr into chunking
2 parents 024dd7a + 1c36169 commit 75fbd89

File tree

54 files changed

+348
-209
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

54 files changed

+348
-209
lines changed

articles/active-directory/b2b/direct-federation.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 08/07/2019
9+
ms.date: 02/27/2019
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -61,6 +61,10 @@ If you specify the metadata URL in the identity provider settings, Azure AD will
6161

6262
### Limit on federation relationships
6363
Currently, a maximum of 1,000 federation relationships is supported. This limit includes both [internal federations](https://docs.microsoft.com/powershell/module/msonline/set-msoldomainfederationsettings?view=azureadps-1.0) and direct federations.
64+
65+
### Limit on multiple domains
66+
We don’t currently support direct federation with multiple domains from the same tenant.
67+
6468
## Frequently asked questions
6569
### Can I set up direct federation with a domain for which an unmanaged (email-verified) tenant exists?
6670
Yes. If the domain hasn't been verified and the tenant hasn't undergone an [admin takeover](../users-groups-roles/domains-admin-takeover.md), you can set up direct federation with that domain. Unmanaged, or email-verified, tenants are created when a user redeems a B2B invitation or performs a self-service sign-up for Azure AD using a domain that doesn’t currently exist. You can set up direct federation with these domains. If you try to set up direct federation with a DNS-verified domain, either in the Azure portal or via PowerShell, you'll see an error.

articles/active-directory/develop/TOC.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@
2929
href: quickstart-v2-javascript.md
3030
- name: Web apps
3131
items:
32-
- name: ASP .NET
32+
- name: ASP.NET
3333
href: quickstart-v2-aspnet-webapp.md
34-
- name: ASP .NET Core
34+
- name: ASP.NET Core
3535
href: quickstart-v2-aspnet-core-webapp.md
3636
- name: NodeJS
3737
href: quickstart-v2-nodejs-webapp.md
@@ -42,9 +42,9 @@
4242
href: quickstart-v2-python-webapp.md
4343
- name: Web APIs
4444
items:
45-
- name: ASP .NET
45+
- name: ASP.NET
4646
href: quickstart-v2-dotnet-native-aspnet.md
47-
- name: ASP .NET Core
47+
- name: ASP.NET Core
4848
href: https://azure.microsoft.com/resources/samples/active-directory-dotnet-native-aspnetcore-v2
4949
- name: Mobile and desktop apps
5050
items:
@@ -70,7 +70,7 @@
7070
href: tutorial-v2-javascript-spa.md
7171
- name: Web apps
7272
items:
73-
- name: ASP .NET
73+
- name: ASP.NET
7474
href: tutorial-v2-asp-webapp.md
7575
- name: Mobile and desktop apps
7676
items:
@@ -242,13 +242,15 @@
242242
href: brokered-auth.md
243243
- name: Migration
244244
items:
245+
- name: Overview
246+
href: msal-migration.md
245247
- name: Migrate to MSAL.NET
246248
href: msal-net-migration.md
247249
- name: Migrate to MSAL.js
248250
href: msal-compare-msal-js-and-adal-js.md
249251
- name: Migrate to MSAL.Android
250252
href: migrate-android-adal-msal.md
251-
- name: Migrate to MSAL.iOS / MacOS
253+
- name: Migrate to MSAL.iOS / macOS
252254
href: migrate-objc-adal-msal.md
253255
- name: Migrate to MSAL Python
254256
href: migrate-python-adal-msal.md
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: Migrate to Microsoft Authentication Library (MSAL)
3+
titleSuffix: Microsoft identity platform
4+
description: Learn about the differences between Microsoft Authentication Library (MSAL) and Azure AD Authentication Library (ADAL) and how to migrate to MSAL.
5+
services: active-directory
6+
author: jmprieur
7+
manager: CelesteDG
8+
9+
ms.service: active-directory
10+
ms.subservice: develop
11+
ms.topic: conceptual
12+
ms.workload: identity
13+
ms.date: 02/27/2020
14+
ms.author: jmprieur
15+
ms.reviewer: saeeda
16+
ms.custom: aaddev
17+
#Customer intent: As an application developer, I want to learn about the differences between the ADAL and MSAL libraries so I can migrate my applications to MSAL.
18+
---
19+
20+
# Migrate applications to Microsoft Authentication Library (MSAL)
21+
22+
Both Microsoft Authentication Library (MSAL) and Azure AD Authentication Library (ADAL) are used to authenticate Azure AD entities and request tokens from Azure AD. Up until now, most developers have worked with Azure AD for developers platform (v1.0) to authenticate Azure AD identities (work and school accounts) by requesting tokens using Azure AD Authentication Library (ADAL). Using MSAL:
23+
24+
- You can authenticate a broader set of Microsoft identities (Azure AD identities and Microsoft accounts, and social and local accounts through Azure AD B2C) as it uses the Microsoft identity platform endpoint.
25+
- Your users will get the best single-sign-on experience.
26+
- Your application can enable incremental consent, and supporting Conditional Access is easier.
27+
- You benefit from the innovation.
28+
29+
**MSAL is now the recommended auth library to use with the Microsoft identity platform**. No new features will be implemented on ADAL. The efforts are focused on improving MSAL.
30+
31+
The following articles describe the differences between the MSAL and ADAL libraries and help you migrate to MSAL:
32+
- [Migrate to MSAL.NET](msal-net-migration.md)
33+
- [Migrate to MSAL.js](msal-compare-msal-js-and-adal-js.md)
34+
- [Migrate to MSAL.Android](migrate-android-adal-msal.md)
35+
- [Migrate to MSAL.iOS / macOS](migrate-objc-adal-msal.md)
36+
- [Migrate to MSAL Python](migrate-python-adal-msal.md)
37+
- [Migrate to MSAL for Java](migrate-adal-msal-java.md)
38+
- [Migrate Xamarin apps using brokers to MSAL.NET](msal-net-migration-ios-broker.md)

articles/active-directory/develop/quickstart-v2-android.md

Lines changed: 10 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -17,14 +17,13 @@ ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:A
1717

1818
# Quickstart: Sign in users and call the Microsoft Graph API from an Android app
1919

20-
This quickstart uses a code sample to demonstrate how an Android application can sign in personal, work, or school accounts using the Microsoft identity platform, and then get an access token and call the Microsoft Graph API.
20+
This quickstart uses a code sample to demonstrate how an Android application can sign in personal, work, or school accounts using the Microsoft identity platform, and then get an access token and call the Microsoft Graph API. (See [How the sample works](#how-the-sample-works) for an illustration.)
2121

2222
Applications must be represented by an app object in Azure Active Directory so that the Microsoft identity platform can provide tokens to your application.
2323

2424
> [!div renderon="docs"]
2525
> As a convenience, the code sample comes with a default `redirect_uri` preconfigured in the `AndroidManifest.xml` file so that you don't have to first register your own app object. A `redirect_uri` is partly based on your app's signing key. The sample project is preconfigured with a signing key so that the provided `redirect_uri` will work. To learn more about registering an app object and integrating it with your application, see the [Sign in users and call the Microsoft Graph from an Android app](tutorial-v2-android.md) tutorial.
2626
27-
![Screenshot of the sample app](media/quickstart-v2-android/android-intro.svg)
2827

2928
> [!NOTE]
3029
> **Prerequisites**
@@ -41,73 +40,14 @@ Applications must be represented by an app object in Azure Active Directory so t
4140
> > ![Already configured](media/quickstart-v2-android/green-check.png) Your application is configured with these attributes
4241
>
4342
> ### Step 2: Download the project
44-
> * [Download the code sample](https://github.com/Azure-Samples/ms-identity-android-java/archive/master.zip)
45-
>
46-
> ### Step 3: Configure your project
47-
> 1. Extract and open the Project in Android Studio.
48-
> 2. Inside **app** > **src** > **main** > **res** > **raw**, open **auth_config_multiple_account.json** and replace it with the following code:
49-
> ```javascript
50-
> {
51-
> "client_id" : "Enter_the_Application_Id_Here",
52-
> "authorization_user_agent" : "DEFAULT",
53-
> "redirect_uri" : "Enter_the_Redirect_Uri_Here",
54-
> "account_mode" : "MULTIPLE",
55-
> "broker_redirect_uri_registered": true,
56-
> "authorities" : [
57-
> {
58-
> "type": "AAD",
59-
> "audience": {
60-
> "type": "Enter_the_Audience_Info_Here",
61-
> "tenant_id": "Enter_the_Tenant_Info_Here"
62-
> }
63-
> }
64-
> ]
65-
> }
66-
> ```
67-
6843
> [!div class="sxs-lookup" renderon="portal"]
69-
> 3. Inside **app** > **src** > **main** > **res** > **raw**, open **auth_config_single_account.json** and replace it with the following code:
70-
> ```javascript
71-
> {
72-
> "client_id" : "Enter_the_Application_Id_Here",
73-
> "authorization_user_agent" : "DEFAULT",
74-
> "redirect_uri" : "Enter_the_Redirect_Uri_Here",
75-
> "account_mode" : "SINGLE",
76-
> "broker_redirect_uri_registered": true,
77-
> "authorities" : [
78-
> {
79-
> "type": "AAD",
80-
> "audience": {
81-
> "type": "Enter_the_Audience_Info_Here",
82-
> "tenant_id": "Enter_the_Tenant_Info_Here"
83-
> }
84-
> }
85-
> ]
86-
> }
87-
> ```
88-
44+
> Run the project using Android Studio.
45+
> [!div renderon="portal" id="autoupdate" class="nextstepaction"]
46+
> [Download the code sample]()
47+
>
8948
> [!div class="sxs-lookup" renderon="portal"]
90-
> 4. Inside **app** > **src** > **main**, open **AndroidManifest.xml**.
91-
> 5. In the **manifest\application** node, replace the **activity android:name="com.microsoft.identity.client.BrowserTabActivity"** node with the following:
92-
> ```xml
93-
> <!--Intent filter to catch Microsoft's callback after Sign In-->
94-
> <activity android:name="com.microsoft.identity.client.BrowserTabActivity">
95-
> <intent-filter>
96-
> <action android:name="android.intent.action.VIEW" />
97-
> <category android:name="android.intent.category.DEFAULT" />
98-
> <category android:name="android.intent.category.BROWSABLE" />
99-
> <!--
100-
> Add in your scheme/host from registered redirect URI
101-
> note that the leading "/" is required for android:path
102-
> -->
103-
> <data
104-
> android:host="Enter_the_Package_Name"
105-
> android:path="/Enter_the_Signature_Hash"
106-
> android:scheme= "msauth" />
107-
> </intent-filter>
108-
> </activity>
109-
> ```
110-
> 6. Run the app!
49+
> ### Step 3: Your app is configured and ready to run
50+
> We have configured your project with values of your app's properties and it's ready to run.
11151
> The sample app starts on the **Single Account Mode** screen. A default scope, **user.read**, is provided by default, which is used when reading your own profile data during the Microsoft Graph API call. The URL for the Microsoft Graph API call is provided by default. You can change both of these if you wish.
11252
>
11353
> ![MSAL sample app showing single and multiple account usage](./media/quickstart-v2-android/quickstart-sample-app.png)
@@ -123,7 +63,7 @@ Applications must be represented by an app object in Azure Active Directory so t
12363
12464
> [!div class="sxs-lookup" renderon="portal"]
12565
> > [!NOTE]
126-
> > This quickstart supports Enter_the_Supported_Account_Info_Here.
66+
> > Enter_the_Supported_Account_Info_Here
12767
12868
> [!div renderon="docs"]
12969
> ## Step 1: Get the sample app
@@ -148,6 +88,8 @@ Applications must be represented by an app object in Azure Active Directory so t
14888
> In multiple account mode, you can repeat the same steps. Additionally, you can remove the signed-in account, which also removes the cached tokens for that account.
14989
15090
## How the sample works
91+
![Screenshot of the sample app](media/quickstart-v2-android/android-intro.svg)
92+
15193

15294
The code is organized into fragments that show how to write a single and multiple accounts MSAL app. The code files are organized as follows:
15395

articles/azure-app-configuration/quickstart-feature-flag-aspnet-core.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ Add the [Secret Manager tool](https://docs.microsoft.com/aspnet/core/security/ap
8989

9090
```dotnetcli
9191
dotnet add package Microsoft.Azure.AppConfiguration.AspNetCore
92-
dotnet add package Microsoft.FeatureManagement.AspNetCore --version 2.0.0-preview-010610001-1263
92+
dotnet add package Microsoft.FeatureManagement.AspNetCore
9393
```
9494

9595
1. Run the following command to restore packages for your project:

articles/azure-functions/functions-premium-plan.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -105,29 +105,30 @@ Below are the currently supported regions for each OS.
105105
|Australia Central 2| ✔<sup>1</sup> | |
106106
|Australia East|| ✔<sup>1</sup> |
107107
|Australia Southeast || ✔<sup>1</sup> |
108-
|Brazil South| ✔<sup>2</sup> | |
108+
|Brazil South| ✔<sup>2</sup> | ✔<sup>1</sup> |
109109
|Canada Central|| ✔<sup>1</sup> |
110-
|Central US|| |
111-
|East Asia|| |
110+
|Central US|| ✔<sup>1</sup> |
111+
|East Asia|| ✔<sup>1</sup> |
112112
|East US || ✔<sup>1</sup> |
113113
|East US 2|| ✔<sup>1</sup> |
114-
|France Central|| |
114+
|France Central|| ✔<sup>1</sup> |
115115
|Germany West Central|| |
116116
|Japan East|| ✔<sup>1</sup> |
117117
|Japan West|| ✔<sup>1</sup> |
118118
|Korea Central|| ✔<sup>1</sup> |
119-
|North Central US|| |
119+
|North Central US|| ✔<sup>1</sup> |
120120
|North Europe|| ✔<sup>1</sup> |
121+
|Norway East| ✔<sup>1</sup> | ✔<sup>1</sup> |
121122
|South Central US|| ✔<sup>1</sup> |
122123
|South India || |
123124
|Southeast Asia|| ✔<sup>1</sup> |
124125
|UK South|| ✔<sup>1</sup> |
125-
|UK West|| |
126+
|UK West|| ✔<sup>1</sup> |
126127
|West Europe|| ✔<sup>1</sup> |
127-
|West India|| |
128-
|West Central US| | ✔<sup>1</sup> |
128+
|West India|| ✔<sup>1</sup> |
129+
|West Central US| ✔<sup>1</sup> | ✔<sup>1</sup> |
129130
|West US|| ✔<sup>1</sup> |
130-
|West US 2|| |
131+
|West US 2|| ✔<sup>1</sup> |
131132

132133
<sup>1</sup>Maximum scale out limited to 20 instances.
133134
<sup>2</sup>Maximum scale out limited to 60 instances.

articles/azure-netapp-files/azure-netapp-files-understand-storage-hierarchy.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,16 @@ ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: overview
16-
ms.date: 04/16/2019
16+
ms.date: 02/27/2020
1717
ms.author: b-juche
1818
---
1919
# What is the storage hierarchy of Azure NetApp Files
2020

2121
Before creating a volume in Azure NetApp Files, you must purchase and set up a pool for provisioned capacity. To set up a capacity pool, you must have a NetApp account. Understanding the storage hierarchy helps you set up and manage your Azure NetApp Files resources.
2222

23+
> [!IMPORTANT]
24+
> Azure NetApp Files currently does not support resource migration between subscriptions.
25+
2326
## <a name="azure_netapp_files_account"></a>NetApp accounts
2427

2528
- A NetApp account serves as an administrative grouping of the constituent capacity pools.

articles/connectors/connectors-sftp-ssh.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -230,4 +230,4 @@ For more technical details about this connector, such as triggers, actions, and
230230
231231
## Next steps
232232

233-
* Learn about other [Logic Apps connectors](../connectors/apis-list.md)
233+
* Learn about other [Logic Apps connectors](../connectors/apis-list.md)

articles/cosmos-db/how-to-configure-firewall.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -38,20 +38,20 @@ When you enable an IP access control policy programmatically, you need to add th
3838
|US Gov|52.244.48.71|
3939
|All other regions|104.42.195.92,40.76.54.131,52.176.6.30,52.169.50.45,52.187.184.26|
4040

41-
You can enable access to the Azure portal by selecting the **Allow access from Azure portal** option, as shown in the following screenshot:
41+
You can enable requests to access the Azure portal by selecting the **Allow access from Azure portal** option, as shown in the following screenshot:
4242

4343
![Screenshot showing how to enable Azure portal access](./media/how-to-configure-firewall/enable-azure-portal.png)
4444

4545
### Allow requests from global Azure datacenters or other sources within Azure
4646

47-
If you access your Azure Cosmos DB account from services that don’t provide a static IP (for example, Azure Stream Analytics and Azure Functions), you can still use the IP firewall to limit access. To allow access to the Azure Cosmos DB account from such services, add the IP address 0.0.0.0 to the list of allowed IP addresses. The 0.0.0.0 address restricts requests to your Azure Cosmos DB account from Azure datacenter IP range. This setting does not allow access for any other IP ranges to your Azure Cosmos DB account.
47+
If you access your Azure Cosmos DB account from services that don’t provide a static IP (for example, Azure Stream Analytics and Azure Functions), you can still use the IP firewall to limit access. You can enable access from other sources within the Azure by selecting the **Accept connections from within Azure datacenters** option, as shown in the following screenshot:
4848

49-
> [!NOTE]
50-
> This option configures the firewall to allow all requests from Azure, including requests from the subscriptions of other customers deployed in Azure. The list of IPs allowed by this option is wide, so it limits the effectiveness of a firewall policy. Use this option only if your requests don’t originate from static IPs or subnets in virtual networks. Choosing this option automatically allows access from the Azure portal because the Azure portal is deployed in Azure.
49+
![Screenshot showing how to open the Firewall page in the Azure portal](./media/how-to-configure-firewall/enable-azure-services.png)
5150

52-
You can enable access to the Azure portal by selecting the **Accept connections from within Azure datacenters** option, as shown in the following screenshot:
51+
When you enable this option, the IP address `0.0.0.0` is added to the list of allowed IP addresses. The `0.0.0.0` IP address restricts requests to your Azure Cosmos DB account from Azure datacenter IP range. This setting does not allow access for any other IP ranges to your Azure Cosmos DB account.
5352

54-
![Screenshot showing how to open the Firewall page in the Azure portal](./media/how-to-configure-firewall/enable-azure-services.png)
53+
> [!NOTE]
54+
> This option configures the firewall to allow all requests from Azure, including requests from the subscriptions of other customers deployed in Azure. The list of IPs allowed by this option is wide, so it limits the effectiveness of a firewall policy. Use this option only if your requests don’t originate from static IPs or subnets in virtual networks. Choosing this option automatically allows access from the Azure portal because the Azure portal is deployed in Azure.
5555
5656
### Requests from your current IP
5757

articles/cosmos-db/sql-api-dotnet-application.md

Lines changed: 6 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,9 @@ First, we'll add a class that contains the logic to connect to and use Azure Cos
178178

179179
:::code language="csharp" source="~/samples-cosmosdb-dotnet-core-web-app/src/Services/CosmosDbService.cs":::
180180

181-
1. Repeat the previous two steps, but this time, use the name *ICosmosDBService*, and use the following code:
181+
1. Right-click the **Services** folder, select **Add** > **Class**. Name the new class *ICosmosDBService* and select **Add**.
182+
183+
1. Add the following code to *ICosmosDBService* class:
182184

183185
:::code language="csharp" source="~/samples-cosmosdb-dotnet-core-web-app/src/Services/ICosmosDbService.cs":::
184186

@@ -190,18 +192,11 @@ First, we'll add a class that contains the logic to connect to and use Azure Cos
190192

191193
1. Within the same file, add the following method **InitializeCosmosClientInstanceAsync**, which reads the configuration and initializes the client.
192194

193-
:::code language="csharp" source="~/samples-cosmosdb-dotnet-core-web-app/src/Startup.cs" id="InitializeCosmosClientInstanceAsync":::
195+
:::code language="csharp" source="~/samples-cosmosdb-dotnet-core-web-app/src/Startup.cs" id="InitializeCosmosClientInstanceAsync":::
194196

195-
1. Define the configuration in the project's *appsettings.json* file. Open the file and add a section called **CosmosDb**:
197+
1. Define the configuration in the project's *appsettings.json* file as shown in the following snippet:
196198

197-
```csharp
198-
"CosmosDb": {
199-
"Account": "<enter the URI from the Keys blade of the Azure Portal>",
200-
"Key": "<enter the PRIMARY KEY, or the SECONDARY KEY, from the Keys blade of the Azure Portal>",
201-
"DatabaseName": "Tasks",
202-
"ContainerName": "Items"
203-
}
204-
```
199+
:::code language="json" source="~/samples-cosmosdb-dotnet-core-web-app/src/appsettings.json":::
205200

206201
### <a name="add-a-controller"></a>Add a controller
207202

0 commit comments

Comments
 (0)