Skip to content

Commit 793cdbb

Browse files
authored
Merge pull request #236540 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 5/2
2 parents 87027cd + c70c0de commit 793cdbb

File tree

118 files changed

+1133
-1825
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

118 files changed

+1133
-1825
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2492,7 +2492,16 @@
24922492
},
24932493
{
24942494
"source_path_from_root": "/articles/active-directory/active-directory-configurable-token-lifetimes.md",
2495-
"redirect_url": "/azure/active-directory/develop/active-directory-configurable-token-lifetimes",
2495+
"redirect_url": "/azure/active-directory/develop/configurable-token-lifetimes",
2496+
"redirect_document_id": false
2497+
},
2498+
{
2499+
"source_path_from_root": "/articles/active-directory/develop/active-directory-configurable-token-lifetimes.md",
2500+
"redirect_url": "/azure/active-directory/develop/configurable-token-lifetimes",
2501+
"redirect_document_id": true
2502+
},{
2503+
"source_path_from_root": "/articles/active-directory/develop/reference-aadsts-error-codes.md",
2504+
"redirect_url": "/azure/active-directory/develop/reference-error-codes",
24962505
"redirect_document_id": true
24972506
},
24982507
{
@@ -2665,6 +2674,11 @@
26652674
"redirect_url": "/azure/active-directory/develop/active-directory-saml-debugging",
26662675
"redirect_document_id": false
26672676
},
2677+
{
2678+
"source_path_from_root": "/articles/active-directory/develop/howto-add-branding-in-azure-ad-apps.md",
2679+
"redirect_url": "/azure/active-directory/develop/howto-add-branding-in-apps.md",
2680+
"redirect_document_id": false
2681+
},
26682682
{
26692683
"source_path_from_root": "/articles/active-directory/active-directory-java-view-saml-returned-by-access-control.md",
26702684
"redirect_url": "/azure/active-directory/develop/active-directory-saml-protocol-reference",
@@ -2677,7 +2691,12 @@
26772691
},
26782692
{
26792693
"source_path_from_root": "/articles/active-directory/active-directory-signing-key-rollover.md",
2680-
"redirect_url": "/azure/active-directory/develop/active-directory-signing-key-rollover",
2694+
"redirect_url": "/azure/active-directory/develop/signing-key-rollover",
2695+
"redirect_document_id": false
2696+
},
2697+
{
2698+
"source_path_from_root": "/articles/active-directory/develop/active-directory-signing-key-rollover.md",
2699+
"redirect_url": "/azure/active-directory/develop/signing-key-rollover",
26812700
"redirect_document_id": false
26822701
},
26832702
{

.openpublishing.redirection.azure-monitor.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6026,11 +6026,6 @@
60266026
"redirect_url": "/previous-versions/azure/azure-monitor/alerts/monitoring-classic-retirement",
60276027
"redirect_document_id": false
60286028
},
6029-
{
6030-
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-log-api-switch.md",
6031-
"redirect_url": "/previous-versions/azure/azure-monitor/alerts/alerts-log-api-switch",
6032-
"redirect_document_id": false
6033-
},
60346029
{
60356030
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer.md",
60366031
"redirect_url": "/previous-versions/azure/azure-monitor/visualize/view-designer",

.openpublishing.redirection.azure-vmware.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,11 @@
44
"source_path_from_root": "/articles/azure-vmware/send-logs-to-log-analytics.md",
55
"redirect_url": "/azure/azure-vmware/configure-vmware-syslogs",
66
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/azure-vmware/attach-disk-pools-to-azure-vmware-solution-hosts.md",
10+
"redirect_url": "/azure/storage/elastic-san/elastic-san-introduction",
11+
"redirect_document_id": false
712
}
813
]
914
}

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -177,8 +177,8 @@ In the `ContosoCustomPolicy.XML` file, locate the `SignInUser` technical profile
177177
<Item Key="SignUpTarget">AccountTypeInputCollectorClaimsExchange</Item>
178178
</Metadata>
179179
<DisplayClaims>
180-
<OutputClaim ClaimTypeReferenceId="email" Required="true" />
181-
<OutputClaim ClaimTypeReferenceId="password" Required="true" />
180+
<DisplayClaim ClaimTypeReferenceId="email" Required="true" />
181+
<DisplayClaim ClaimTypeReferenceId="password" Required="true" />
182182
</DisplayClaims>
183183
<OutputClaims>
184184
<OutputClaim ClaimTypeReferenceId="email" />
@@ -327,4 +327,4 @@ You can sign in by entering the **Email Address** and **Password** of an existin
327327

328328
- Learn how to [Remove the sign-up link](add-sign-in-policy.md), so users can just sign in.
329329

330-
- Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).
330+
- Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).

articles/active-directory-b2c/custom-policies-series-validate-user-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ While the *Predicates* define the validation to check against a claim type, the
195195
</Parameters>
196196
</Predicate>
197197

198-
<Predicate Id="AllowedAADCharacters" Method="MatchesRegex" HelpText="An invalid character was provided.">
198+
<Predicate Id="AllowedCharacters" Method="MatchesRegex" HelpText="An invalid character was provided.">
199199
<Parameters>
200200
<Parameter Id="RegularExpression">(^([0-9A-Za-z\d@#$%^&amp;*\-_+=[\]{}|\\:',?/`~"();! ]|(\.(?!@)))+$)|(^$)</Parameter>
201201
</Parameters>

articles/active-directory/app-proxy/application-proxy-understand-cors-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ You can change your app to support CORS by adding the Access-Control-Allow-Origi
109109

110110
### Option 5: Extend the lifetime of the access token
111111

112-
Some CORS issues can't be resolved, such as when your app redirects to *login.microsoftonline.com* to authenticate, and the access token expires. The CORS call then fails. A workaround for this scenario is to extend the lifetime of the access token, to prevent it from expiring during a user’s session. For more information about how to do this, see [Configurable token lifetimes in Azure AD](../develop/active-directory-configurable-token-lifetimes.md).
112+
Some CORS issues can't be resolved, such as when your app redirects to *login.microsoftonline.com* to authenticate, and the access token expires. The CORS call then fails. A workaround for this scenario is to extend the lifetime of the access token, to prevent it from expiring during a user’s session. For more information about how to do this, see [Configurable token lifetimes in Azure AD](../develop/configurable-token-lifetimes.md).
113113

114114
## See also
115115
- [Tutorial: Add an on-premises application for remote access through Application Proxy in Azure Active Directory](../app-proxy/application-proxy-add-on-premises-application.md)

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ Smart lockout tracks the last three bad password hashes to avoid incrementing th
9393

9494

9595
## Default protections
96-
In addition to Smart lockout, Azure AD also protects against attacks by analyzing signals including IP traffic and identifying anomalous behavior. Azure AD will block these malicious sign-ins by default and return [AADSTS50053 - IdsLocked error code](../develop/reference-aadsts-error-codes.md), regardless of the password validity.
96+
In addition to Smart lockout, Azure AD also protects against attacks by analyzing signals including IP traffic and identifying anomalous behavior. Azure AD will block these malicious sign-ins by default and return [AADSTS50053 - IdsLocked error code](../develop/reference-error-codes.md), regardless of the password validity.
9797

9898
## Next steps
9999

articles/active-directory/azuread-dev/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@
108108
- name: Configure optional claims
109109
href: ../develop/active-directory-optional-claims.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
110110
- name: Configure token lifetimes
111-
href: ../develop/active-directory-configurable-token-lifetimes.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
111+
href: ../develop/configurable-token-lifetimes.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
112112
- name: ADAL error handling best practices
113113
href: active-directory-devhowto-adal-error-handling.md
114114
- name: Application configuration
@@ -156,7 +156,7 @@
156156
- name: Application manifest
157157
href: ../develop/reference-app-manifest.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
158158
- name: Authentication and authorization error codes
159-
href: ../develop/reference-aadsts-error-codes.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
159+
href: ../develop/reference-error-codes.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
160160
- name: Breaking changes
161161
href: ../develop/reference-breaking-changes.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
162162
- name: Resources

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Because risk and policy are evaluated in real time, clients that negotiate conti
107107

108108
Token lifetime is increased to long lived, up to 28 hours, in CAE sessions. Revocation is driven by critical events and policy evaluation, not just an arbitrary time period. This change increases the stability of applications without affecting security posture.
109109

110-
If you aren't using CAE-capable clients, your default access token lifetime will remain 1 hour. The default only changes if you configured your access token lifetime with the [Configurable Token Lifetime (CTL)](../develop/active-directory-configurable-token-lifetimes.md) preview feature.
110+
If you aren't using CAE-capable clients, your default access token lifetime will remain 1 hour. The default only changes if you configured your access token lifetime with the [Configurable Token Lifetime (CTL)](../develop/configurable-token-lifetimes.md) preview feature.
111111

112112
## Example flow diagrams
113113

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ In persistent browsers, cookies stay stored in the user’s device even after a
118118
Conditional Access is an Azure AD Premium capability and requires a premium license. If you would like to learn more about Conditional Access, see [What is Conditional Access in Azure Active Directory?](overview.md#license-requirements)
119119

120120
> [!WARNING]
121-
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft retired the configurable token lifetime feature for refresh and session token lifetimes on January 30, 2021 and replaced it with the Conditional Access authentication session management feature.
121+
> If you are using the [configurable token lifetime](../develop/configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft retired the configurable token lifetime feature for refresh and session token lifetimes on January 30, 2021 and replaced it with the Conditional Access authentication session management feature.
122122
>
123123
> Before enabling Sign-in Frequency, make sure other reauthentication settings are disabled in your tenant. If "Remember MFA on trusted devices" is enabled, be sure to disable it before using Sign-in frequency, as using these two settings together may lead to prompting users unexpectedly. To learn more about reauthentication prompts and session lifetime, see the article, [Optimize reauthentication prompts and understand session lifetime for Azure AD Multifactor Authentication](../authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md).
124124

0 commit comments

Comments
 (0)