Skip to content

Commit 7b881ee

Browse files
committed
Merge branch 'main' into release-ga-managed-grafana
2 parents 64a6034 + 9bb762a commit 7b881ee

File tree

303 files changed

+4740
-1327
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

303 files changed

+4740
-1327
lines changed

articles/active-directory/develop/active-directory-schema-extensions.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,11 @@ For example, here is a claims-mapping policy to emit a single claim from a direc
5959

6060
Where *xxxxxxx* is the appID (or Client ID) of the application that the extension was registered with.
6161

62+
> [!WARNING]
63+
> When you define a claims mapping policy for a directory extension attribute, use the `ExtensionID` property instead of the `ID` property within the body of the `ClaimsSchema` array, as shown in the example above.
64+
6265
> [!TIP]
6366
> Case consistency is important when setting directory extension attributes on objects. Extension attribute names aren't cases sensitive when being set up, but they are case sensitive when being read from the directory by the token service. If an extension attribute is set on a user object with the name "LegacyId" and on another user object with the name "legacyid", when the attribute is mapped to a claim using the name "LegacyId" the data will be successfully retrieved and the claim included in the token for the first user but not the second.
64-
>
65-
> The "Id" parameter in the claims schema used for built-in directory attributes is "ExtensionID" for directory extension attributes.
6667
6768
## Next steps
6869
- Learn how to [add custom or additional claims to the SAML 2.0 and JSON Web Tokens (JWT) tokens](active-directory-optional-claims.md).

articles/active-directory/develop/custom-rbac-for-developers.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 06/16/2022
12+
ms.date: 08/19/2022
1313
ms.custom: template-concept
1414
ms.author: davidmu
1515
ms.reviewer: john.garland, maggie.marxen, ian.bennett, marsma
@@ -43,7 +43,9 @@ Developers have the flexibility to provide their own implementation for how role
4343

4444
### App roles
4545

46-
Azure AD supports declaring app roles for an application. When a user signs into an application, Azure AD includes a [roles claim](./access-tokens.md#payload-claims) for each role that the user has been granted for that application. Applications receive the tokens that contain the role claims and then can use the information for permission assignments. The roles assigned to the user determine the level of access to resources and functionality.
46+
Azure AD allows you to [define app roles](./howto-add-app-roles-in-azure-ad-apps.md) for your application and assign those roles to users and other applications. The roles you assign to a user or application define their level of access to the resources and operations in your application.
47+
48+
When Azure AD issues an access token for an authenticated user or application, it includes the names of the roles you've assigned the entity (the user or application) in the access token's [`roles`](./access-tokens.md#payload-claims) claim. An application like a web API that receives that access token in a request can then make authorization decisions based on the values in the `roles` claim.
4749

4850
### Groups
4951

@@ -79,5 +81,5 @@ Although either app roles or groups can be used for authorization, key differenc
7981

8082
## Next steps
8183

82-
- [How to add app roles to your application and receive them in the token](./howto-add-app-roles-in-azure-ad-apps.md).
83-
- [Azure Identity Management and access control security best practices](../../security/fundamentals/identity-management-best-practices.md).
84+
- [How to add app roles to your application and receive them in the token](./howto-add-app-roles-in-azure-ad-apps.md)
85+
- [Azure Identity Management and access control security best practices](../../security/fundamentals/identity-management-best-practices.md)

articles/active-directory/develop/multi-service-web-app-access-microsoft-graph-as-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: app-service-web
99
ms.topic: tutorial
1010
ms.workload: identity
11-
ms.date: 04/25/2022
11+
ms.date: 08/19/2022
1212
ms.author: ryanwi
1313
ms.reviewer: stsoneff
1414
ms.devlang: csharp, javascript
@@ -90,7 +90,7 @@ webAppName="SecureWebApp-20201106120003"
9090
9191
spId=$(az resource list -n $webAppName --query [*].identity.principalId --out tsv)
9292
93-
graphResourceId=$(az ad sp list --display-name "Microsoft Graph" --query [0].objectId --out tsv)
93+
graphResourceId=$(az ad sp list --display-name "Microsoft Graph" --query [0].id --out tsv)
9494
9595
appRoleId=$(az ad sp list --display-name "Microsoft Graph" --query "[0].appRoles[?value=='User.Read.All' && contains(allowedMemberTypes, 'Application')].id" --output tsv)
9696

articles/active-directory/develop/reply-url.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,8 @@ This table shows the maximum number of redirect URIs you can add to an app regis
4545
| Microsoft work or school accounts in any organization's Azure Active Directory (Azure AD) tenant | 256 | `signInAudience` field in the application manifest is set to either *AzureADMyOrg* or *AzureADMultipleOrgs* |
4646
| Personal Microsoft accounts and work and school accounts | 100 | `signInAudience` field in the application manifest is set to *AzureADandPersonalMicrosoftAccount* |
4747

48+
The maximum number of redirect URIS can't be raised for [security reasons](#restrictions-on-wildcards-in-redirect-uris). If your scenario requires more redirect URIs than the maximum limit allowed, consider the following [state parameter approach](#use-a-state-parameter) as the solution.
49+
4850
## Maximum URI length
4951

5052
You can use a maximum of 256 characters for each redirect URI you add to an app registration.

articles/active-directory/fundamentals/auth-header-based.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"

articles/active-directory/fundamentals/auth-kcd.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"
@@ -50,4 +50,4 @@ There is a need to provide remote access, protect with pre-authentication, and p
5050

5151
* [Kerberos Constrained Delegation for single sign-on to your apps with Application Proxy](../app-proxy/application-proxy-configure-single-sign-on-with-kcd.md)
5252

53-
* [Add an on-premises application for remote access through Application Proxy in Azure Active Directory](../app-proxy/application-proxy-add-on-premises-application.md)
53+
* [Add an on-premises application for remote access through Application Proxy in Azure Active Directory](../app-proxy/application-proxy-add-on-premises-application.md)

articles/active-directory/fundamentals/auth-ldap.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"

articles/active-directory/fundamentals/auth-oauth2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"

articles/active-directory/fundamentals/auth-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"

articles/active-directory/fundamentals/auth-password-based-sso.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 10/10/2020
12+
ms.date: 08/19/2022
1313
ms.author: jricketts
1414
ms.reviewer: ajburnle
1515
ms.custom: "it-pro, seodec18"
@@ -45,4 +45,4 @@ You need to protect with pre-authentication and provide SSO through password vau
4545

4646
* [Configure password based SSO for cloud applications ](../manage-apps/configure-password-single-sign-on-non-gallery-applications.md)
4747

48-
* [Configure password-based SSO for on-premises applications with Application Proxy](../app-proxy/application-proxy-configure-single-sign-on-password-vaulting.md)
48+
* [Configure password-based SSO for on-premises applications with Application Proxy](../app-proxy/application-proxy-configure-single-sign-on-password-vaulting.md)

0 commit comments

Comments
 (0)