Skip to content

Commit 766a097

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-screen-backup
2 parents 570c167 + 6ff3347 commit 766a097

File tree

380 files changed

+9047
-6422
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

380 files changed

+9047
-6422
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5671,6 +5671,16 @@
56715671
"source_path_from_root": "/articles/azure-monitor/logs/azure-data-explorer-monitor-cross-service-query.md",
56725672
"redirect_url": "/azure/azure-monitor/logs/azure-monitor-data-explorer-proxy",
56735673
"redirect_document_id": false
5674+
},
5675+
{
5676+
"source_path_from_root": "/articles/azure-monitor/app/mobile-center-quickstart.md",
5677+
"redirect_url": "https://github.com/Microsoft/appcenter",
5678+
"redirect_document_id": false
5679+
},
5680+
{
5681+
"source_path_from_root": "/articles/azure-monitor/app/windows-desktop.md",
5682+
"redirect_url": "https://github.com/Microsoft/appcenter",
5683+
"redirect_document_id": false
56745684
}
56755685
]
56765686
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18384,6 +18384,11 @@
1838418384
"redirect_url": "/azure/sentinel/enable-monitoring",
1838518385
"redirect_document_id": false
1838618386
},
18387+
{
18388+
"source_path_from_root": "/articles/sentinel/web-normalization-schema.md",
18389+
"redirect_url": "/azure/sentinel/normalization-schema-web",
18390+
"redirect_document_id": true
18391+
},
1838718392
{
1838818393
"source_path_from_root": "/articles/sentinel/dns-normalization-schema.md",
1838918394
"redirect_url": "/azure/sentinel/normalization-schema-dns",

articles/active-directory-b2c/partner-datawiza.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.reviewer: kengaderdus
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/12/2022
12+
ms.date: 01/23/2023
1313
ms.author: gasinh
1414
ms.subservice: B2C
1515
---

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Azure Active Directory (Azure AD) allows the use of a range of authentication me
2424

2525
## Authentication methods policy
2626

27-
The Authentication methods policy is the recommended way to manage authentication methods, including modern methods like passwordless authentication. [Authentication Policy Administrators](../roles/permissions-reference.md#authentication-policy-administrator) can edit this policy to enable authentication methods for specific users and groups.
27+
The Authentication methods policy is the recommended way to manage authentication methods, including modern methods like passwordless authentication. [Authentication Policy Administrators](../roles/permissions-reference.md#authentication-policy-administrator) can edit this policy to enable authentication methods for all users or specific groups.
2828

2929
Methods enabled in the Authentication methods policy can typically be used anywhere in Azure AD - for both authentication and password reset scenarios. The exception is that some methods are inherently limited to use in authentication, such as FIDO2 and Windows Hello for Business, and others are limited to use in password reset, such as security questions. For more control over which methods are usable in a given authentication scenario, consider using the **Authentication Strengths** feature.
3030

@@ -106,8 +106,9 @@ Tenants are set to either Pre-migration or Migration in Progress by default, dep
106106
>
107107
> In the future, both of these features will be integrated with the Authentication methods policy.
108108
109-
## Known issues
110-
Some customers may see the control to enable Voice call grayed out due to a licensing requirement, despite having a premium license. This is a known issue that we are actively working to fix.
109+
## Known issues and limitations
110+
- Some customers may see the control to enable Voice call grayed out due to a licensing requirement, despite having a premium license. This is a known issue that we are actively working to fix.
111+
- As a part of the public preview we removed the ability to target individual users. Previously targeted users will remain in the policy but we recommend moving them to a targeted group.
111112

112113
## Next steps
113114

articles/active-directory/cloud-sync/what-is-cloud-sync.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ The following table provides a comparison between Azure AD Connect and Azure AD
6464
| Allow removing attributes from flowing from AD to Azure AD |||
6565
| Allow advanced customization for attribute flows || |
6666
| Support for password writeback |||
67-
| Support for device writeback|| |
67+
| Support for device writeback||Customers should use [Cloud kerberose trust](https://learn.microsoft.com/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust?tabs=intune) for this moving forward|
6868
| Support for group writeback|| |
6969
| Support for merging user attributes from multiple domains|| |
7070
| Azure AD Domain Services support|| |

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 09/12/2022
9+
ms.date: 01/24/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -47,6 +47,8 @@ Azure AD Conditional Access supports the following device platforms:
4747

4848
If you block legacy authentication using the **Other clients** condition, you can also set the device platform condition.
4949

50+
We don't support selecting macOS or Linux device platforms when selecting **Require approved client app** or **Require app protection policy** as the only grant controls or when you choose **Require all the selected controls**.
51+
5052
> [!IMPORTANT]
5153
> Microsoft recommends that you have a Conditional Access policy for unsupported device platforms. As an example, if you want to block access to your corporate resources from **Chrome OS** or any other unsupported clients, you should configure a policy with a Device platforms condition that includes any device and excludes supported device platforms and Grant control set to Block access.
5254

articles/active-directory/develop/consent-types-developer.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,7 @@ title: Microsoft identity platform developers' guide to requesting permissions t
33
description: Learn how developers can request for permissions through consent in the Microsoft identity platform endpoint.
44
services: active-directory
55
author: omondiatieno
6-
manager: mwongerapk
7-
6+
manager: celesteDG
87
ms.service: active-directory
98
ms.subservice: develop
109
ms.workload: identity

articles/active-directory/develop/customize-webviews.md

Lines changed: 31 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -7,52 +7,52 @@ manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
10-
ms.topic: how-to
10+
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 08/28/2019
12+
ms.date: 01/24/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: oldalton
1515
ms.custom: aaddev, has-adal-ref
1616
---
1717

1818
# Customize browsers and WebViews for iOS/macOS
1919

20-
A web browser is required for interactive authentication. On iOS and macOS 10.15+, the Microsoft Authentication Library (MSAL) uses the system web browser by default (which might appear on top of your app) to do interactive authentication to sign in users. Using the system browser has the advantage of sharing the Single Sign On (SSO) state with other applications and with web applications.
20+
A web browser is required for interactive authentication. On iOS and macOS 10.15+, the Microsoft Authentication Library (MSAL) uses the system web browser by default (which might appear on top of your app) to do interactive authentication to sign in users. Using the system browser has the advantage of sharing the single sign-on (SSO) state with other applications and with web applications.
2121

2222
You can change the experience by customizing the configuration to other options for displaying web content, such as:
2323

2424
For iOS only:
2525

26-
- [SFAuthenticationSession](https://developer.apple.com/documentation/safariservices/sfauthenticationsession?language=objc)
26+
- [SFAuthenticationSession](https://developer.apple.com/documentation/safariservices/sfauthenticationsession?language=objc)
2727
- [SFSafariViewController](https://developer.apple.com/documentation/safariservices/sfsafariviewcontroller?language=objc)
2828

2929
For iOS and macOS:
3030

3131
- [ASWebAuthenticationSession](https://developer.apple.com/documentation/authenticationservices/aswebauthenticationsession?language=objc)
3232
- [WKWebView](https://developer.apple.com/documentation/webkit/wkwebview?language=objc).
3333

34-
MSAL for macOS only supports `WKWebView` on older OS versions. `ASWebAuthenticationSession` is only supported on macOS 10.15 and above.
34+
MSAL for macOS only supports `WKWebView` on older OS versions. `ASWebAuthenticationSession` is only supported on macOS 10.15 and above.
3535

3636
## System browsers
3737

3838
For iOS, `ASWebAuthenticationSession`, `SFAuthenticationSession`, and `SFSafariViewController` are considered system browsers. For macOS, only `ASWebAuthenticationSession` is available. In general, system browsers share cookies and other website data with the Safari browser application.
3939

40-
By default, MSAL will dynamically detect iOS version and select the recommended system browser available on that version. On iOS 12+ it will be `ASWebAuthenticationSession`.
40+
By default, MSAL will dynamically detect iOS version and select the recommended system browser available on that version. On iOS 12+ it will be `ASWebAuthenticationSession`.
4141

4242
### Default configuration for iOS
4343

44-
| Version | Web browser |
45-
|:-------------:|:-------------:|
44+
| Version | Web browser |
45+
| :-----: | :------------------------: |
4646
| iOS 12+ | ASWebAuthenticationSession |
47-
| iOS 11 | SFAuthenticationSession |
48-
| iOS 10 | SFSafariViewController |
47+
| iOS 11 | SFAuthenticationSession |
48+
| iOS 10 | SFSafariViewController |
4949

5050
### Default configuration for macOS
5151

52-
| Version | Web browser |
53-
|:-------------:|:-------------:|
54-
| macOS 10.15+ | ASWebAuthenticationSession |
55-
| other versions | WKWebView |
52+
| Version | Web browser |
53+
| :------------: | :------------------------: |
54+
| macOS 10.15+ | ASWebAuthenticationSession |
55+
| other versions | WKWebView |
5656

5757
Developers can also select a different system browser for MSAL apps:
5858

@@ -63,19 +63,19 @@ Developers can also select a different system browser for MSAL apps:
6363

6464
[WKWebView](https://developer.apple.com/documentation/webkit/wkwebview) is an in-app browser that displays web content. It doesn't share cookies or web site data with other **WKWebView** instances, or with the Safari browser. WKWebView is a cross-platform browser that is available for both iOS and macOS.
6565

66-
## Cookie sharing and Single sign-on (SSO) implications
66+
## Cookie sharing and SSO implications
6767

6868
The browser you use impacts the SSO experience because of how they share cookies. The following tables summarize the SSO experiences per browser.
6969

70-
| Technology | Browser Type | iOS availability | macOS availability | Shares cookies and other data | MSAL availability | SSO |
71-
|:-------------:|:-------------:|:-------------:|:-------------:|:-------------:|:-------------:|-------------:|
72-
| [ASWebAuthenticationSession](https://developer.apple.com/documentation/authenticationservices/aswebauthenticationsession) | System | iOS12 and up | macOS 10.15 and up | Yes | iOS and macOS 10.15+ | w/ Safari instances
73-
| [SFAuthenticationSession](https://developer.apple.com/documentation/safariservices/sfauthenticationsession) | System | iOS11 and up | N/A | Yes | iOS only | w/ Safari instances
74-
| [SFSafariViewController](https://developer.apple.com/documentation/safariservices/sfsafariviewcontroller) | System | iOS11 and up | N/A | No | iOS only | No**
75-
| **SFSafariViewController** | System | iOS10 | N/A | Yes | iOS only | w/ Safari instances
76-
| **WKWebView** | In-app | iOS8 and up | macOS 10.10 and up | No | iOS and macOS | No**
70+
| Technology | Browser Type | iOS availability | macOS availability | Shares cookies and other data | MSAL availability | SSO |
71+
| :-----------------------------------------------------------------------------------------------------------------------: | :----------: | :--------------: | :----------------: | :---------------------------: | :------------------: | ------------------: |
72+
| [ASWebAuthenticationSession](https://developer.apple.com/documentation/authenticationservices/aswebauthenticationsession) | System | iOS12 and up | macOS 10.15 and up | Yes | iOS and macOS 10.15+ | w/ Safari instances |
73+
| [SFAuthenticationSession](https://developer.apple.com/documentation/safariservices/sfauthenticationsession) | System | iOS11 and up | N/A | Yes | iOS only | w/ Safari instances |
74+
| [SFSafariViewController](https://developer.apple.com/documentation/safariservices/sfsafariviewcontroller) | System | iOS11 and up | N/A | No | iOS only | No\*\* |
75+
| **SFSafariViewController** | System | iOS10 | N/A | Yes | iOS only | w/ Safari instances |
76+
| **WKWebView** | In-app | iOS8 and up | macOS 10.10 and up | No | iOS and macOS | No\*\* |
7777

78-
** For SSO to work, tokens need to be shared between apps. This requires a token cache, or broker application, such as Microsoft Authenticator for iOS.
78+
\*\* For SSO to work, tokens need to be shared between apps. This requires a token cache, or broker application, such as Microsoft Authenticator for iOS.
7979

8080
## Change the default browser for the request
8181

@@ -94,17 +94,20 @@ Additionally, MSAL supports passing in a custom `WKWebView` by setting the `MSAL
9494
For example:
9595

9696
Objective-C
97+
9798
```objc
9899
UIViewController *myParentController = ...;
99100
WKWebView *myCustomWebView = ...;
100101
MSALWebviewParameters *webViewParameters = [[MSALWebviewParameters alloc] initWithAuthPresentationViewController:myParentController];
101102
webViewParameters.webviewType = MSALWebviewTypeWKWebView;
102103
webViewParameters.customWebview = myCustomWebView;
103104
MSALInteractiveTokenParameters *interactiveParameters = [[MSALInteractiveTokenParameters alloc] initWithScopes:@[@"myscope"] webviewParameters:webViewParameters];
104-
105+
105106
[app acquireTokenWithParameters:interactiveParameters completionBlock:completionBlock];
106107
```
108+
107109
Swift
110+
108111
```swift
109112
let myParentController: UIViewController = ...
110113
let myCustomWebView: WKWebView = ...
@@ -149,17 +152,17 @@ typedef NS_ENUM(NSInteger, MSALWebviewType)
149152
For older macOS versions uses WKWebView
150153
*/
151154
MSALWebviewTypeDefault,
152-
155+
153156
/** Use ASWebAuthenticationSession where available.
154157
On older iOS versions uses SFAuthenticationSession
155158
Doesn't allow any other webview type, so if either of these are not present, fails the request*/
156159
MSALWebviewTypeAuthenticationSession,
157-
160+
158161
#if TARGET_OS_IPHONE
159-
162+
160163
/** Use SFSafariViewController for all versions. */
161164
MSALWebviewTypeSafariViewController,
162-
165+
163166
#endif
164167
/** Use WKWebView */
165168
MSALWebviewTypeWKWebView,

articles/active-directory/develop/delegated-access-primer.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,7 @@ title: Microsoft identity platform delegated access scenario
33
description: Learn about delegated access in the Microsoft identity platform endpoint.
44
services: active-directory
55
author: omondiatieno
6-
manager: mwongerapk
7-
6+
manager: celesteDG
87
ms.service: active-directory
98
ms.subservice: develop
109
ms.workload: identity

articles/active-directory/develop/permissions-consent-overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ description: Learn the foundational concepts and scenarios around consent and pe
44
services: active-directory
55
author: omondiatieno
66
manager: CelesteDG
7-
87
ms.service: active-directory
98
ms.subservice: develop
109
ms.workload: identity
@@ -52,7 +51,7 @@ There are other ways in which applications can be granted authorization for app-
5251

5352
### Comparison of delegated and application permissions
5453

55-
| | Delegated permissions | Application permissions |
54+
| Permission types | Delegated permissions | Application permissions |
5655
|--|--|--|
5756
| Types of apps | Web / Mobile / single-page app (SPA) | Web / Daemon |
5857
| Access context | Get access on behalf of a user | Get access without a user |

0 commit comments

Comments
 (0)