Skip to content

Commit 824e3d9

Browse files
authored
Merge pull request #91169 from MicrosoftDocs/master
10/09 PM Publish
2 parents 42748f8 + 7c06fa1 commit 824e3d9

File tree

228 files changed

+4587
-1695
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

228 files changed

+4587
-1695
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42203,7 +42203,7 @@
4220342203
},
4220442204
{
4220542205
"source_path": "articles/security/fundamentals/network-security.md",
42206-
"redirect_url": "/azure/security/fundamentals/network-security",
42206+
"redirect_url": "/azure/security/fundamentals/network-overview",
4220742207
"redirect_document_id": false
4220842208
},
4220942209
{

articles/active-directory-b2c/active-directory-b2c-custom-setup-goog-idp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: B2C
1717

1818
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1919

20-
This article shows you how to enable sign-in for users from a Google account by using [custom policies](active-directory-b2c-overview-custom.md) in Azure Active Directory B2C (Azure AD B2C).
20+
This article shows you how to enable sign-in for users with a Google account by using [custom policies](active-directory-b2c-overview-custom.md) in Azure Active Directory B2C (Azure AD B2C).
2121

2222
## Prerequisites
2323

articles/active-directory/develop/active-directory-saml-claims-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ From the **Choose name identifier format** dropdown, you can select one of the f
6262
| **EmailAddress** | Azure AD will use EmailAddress as the NameID format. |
6363
| **Unspecified** | Azure AD will use Unspecified as the NameID format. |
6464

65-
To learn more about the NameIDPolicy attribute, see [Single Sign-On SAML protocol](single-sign-on-saml-protocol.md).
65+
Transient NameID is also supported, but is not available in the dropdown and cannot be configured on Azure's side. To learn more about the NameIDPolicy attribute, see [Single Sign-On SAML protocol](single-sign-on-saml-protocol.md).
6666

6767
### Attributes
6868

articles/active-directory/develop/identity-platform-integration-checklist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Use the following checklist to ensure that your application is effectively integ
8484
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | [Understand the consent experience](application-consent-experience.md) and configure the pieces of your app’s consent prompt so that end users and admins have enough information to determine if they trust your app. |
8585
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Minimize the number of times a user needs to enter login credentials while using your app by attempting silent authentication (silent token acquisition) before interactive flows. |
8686
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Don't use “prompt=consent” for every sign-in. Only use prompt=consent if you’ve determined that you need to ask for consent for additional permissions (for example, if you’ve changed your app’s required permissions). |
87-
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Where applicable, enrich your application with user data. Use the [Microsoft Graph API](https://developer.microsoft.com/graph) is an easy way to do this. The [Graph explorer](https://developer.microsoft.com/graph/graph-explorer) tool that can help you get started. |
87+
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Where applicable, enrich your application with user data. Using the [Microsoft Graph API](https://developer.microsoft.com/graph) is an easy way to do this. The [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) tool that can help you get started. |
8888
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Register the full set of permissions that your app requires so admins can grant consent easily to their tenant. Use [incremental consent](azure-ad-endpoint-comparison.md#incremental-and-dynamic-consent) at run time to help users understand why your app is requesting permissions that may concern or confuse users when requested on first start. |
8989
| ![checkbox](./media/active-directory-integration-checklist/checkbox-two.svg) | Implement a [clean single sign-out experience](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/1-WebApp-OIDC/1-6-SignOut). It’s a privacy and a security requirement, and makes for a good user experience. |
9090

articles/active-directory/develop/quickstart-v2-java-webapp.md

Lines changed: 26 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: quickstart
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 09/18/2019
16+
ms.date: 10/09/2019
1717
ms.author: sagonzal
1818
ms.custom: aaddev
1919
---
@@ -48,18 +48,7 @@ To run this sample you will need:
4848
> ### Option 2: Register and manually configure your application and code sample
4949
>
5050
>
51-
> #### Step 1: Download the code sample
52-
>
53-
> - [Download the Code Sample](https://github.com/Azure-Samples/ms-identity-java-webapp/archive/master.zip)
54-
>
55-
> #### Step 2: Open application.properties
56-
>
57-
> 1. Extract the zip file to a local folder.
58-
> 1. (Optional) If you use an integrated development environment, open the sample in your favorite IDE.
59-
> 1. Open the *application.properties* file. You will insert values for `aad.clientId`, `aad.authority`, and `aad.secretKey` when you register your application in the next step.
60-
61-
62-
> #### Step 3: Register your application
51+
> #### Step 1: Register your application
6352
> To register your application and manually add the app's registration information to your solution, follow these steps:
6453
>
6554
> 1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
@@ -69,8 +58,8 @@ To run this sample you will need:
6958
> 1. When the **Register an application** page appears, enter your application's registration information:
7059
> - In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `java-webapp`.
7160
> - Leave **Redirect URI** blank for now, and select **Register**.
72-
> 1. Find the **Application (client) ID** value of the application. Update the value of `Enter_the_Application_Id_here` in the *application.properties* file.
73-
> 1. Find the **Directory (tenant) ID** value of the application. Update the value of `Enter_the_Tenant_Info_Here` in the *application.properties* file.
61+
> 1. Find the **Application (client) ID** value of the application. Copy this value, you will need it later.
62+
> 1. Find the **Directory (tenant) ID** value of the application. Copy this value, you will need it later.
7463
> 1. Select the **Authentication** menu, and then add the following information:
7564
> - In **Redirect URIs**, add `http://localhost:8080/msal4jsamples/secure/aad` and `https://localhost:8080/msal4jsamples/graph/users`.
7665
> - Select **Save**.
@@ -79,7 +68,7 @@ To run this sample you will need:
7968
> - Type a key description (of instance app secret).
8069
> - Select a key duration of **In 1 year**.
8170
> - When you click on **Add**, the key value will be displayed.
82-
> - Copy the value of the key. Open the *application.properties* file that you downloaded earlier and update the value of `Enter_the_Client_Secret_Here` with the key value.
71+
> - Copy the value of the key, you will need it later.
8372
>
8473
> [!div class="sxs-lookup" renderon="portal"]
8574
> #### Step 1: Configure your application in the Azure portal
@@ -91,20 +80,26 @@ To run this sample you will need:
9180
>
9281
> > [!div id="appconfigured" class="alert alert-info"]
9382
> > ![Already configured](media/quickstart-v2-aspnet-webapp/green-check.png) Your application is configured with these attributes.
94-
>
95-
> #### Step 2: Download the code sample
96-
>
97-
> - [Download the Code Sample](https://github.com/Azure-Samples/ms-identity-java-webapp/archive/master.zip)
98-
>
99-
> #### Step 3: Configure the code sample
100-
>
101-
> 1. Extract the zip file to a local folder.
102-
> 1. If you use an integrated development environment, open the sample in your favorite IDE (optional).
103-
> 1. Open the **application.properties** file, which can be found in *src/main/resources/*.
104-
> 1. Replace application properties.
105-
> 1. Find `aad.clientId` and update the value of `Enter_the_Application_Id_here` with the **Application (client) ID** value of the application you registered.
106-
> 1. Find `aad.authority` and update the value of `Enter_the_Tenant_Name_Here` with the **Directory (tenant) ID** value of the application you registered.
107-
> 1. Find `aad.secretKey` and update the value of `Enter_the_Client_Secret_Here` with the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
83+
84+
#### Step 2: Download the code sample
85+
86+
[Download the Code Sample](https://github.com/Azure-Samples/ms-identity-java-webapp/archive/master.zip)
87+
88+
#### Step 3: Configure the code sample
89+
90+
1. Extract the zip file to a local folder.
91+
1. If you use an integrated development environment, open the sample in your favorite IDE (optional).
92+
1. Open the **application.properties** file, which can be found in *src/main/resources/*.
93+
1. Replace application properties.
94+
1. Find `aad.clientId` and update the value of `Enter_the_Application_Id_here` with the **Application (client) ID** value of the application you registered.
95+
1. Find `aad.authority` and update the value of `Enter_the_Tenant_Name_Here` with the **Directory (tenant) ID** value of the application you registered.
96+
1. Find `aad.secretKey` and update the value of `Enter_the_Client_Secret_Here` with the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
97+
98+
> [!div renderon="docs"]
99+
> Where:
100+
>
101+
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
102+
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
108103
109104
#### Step 4: Run the code sample
110105
1. Run the code sample, and open a browser and navigate to *http://localhost:8080*.
@@ -113,7 +108,6 @@ To run this sample you will need:
113108
- *Sign Out*: Will sign out the current user from the application, and redirect them the home page.
114109
- *Show Users*: Will acquire a token for the Microsoft Graph, then call the Microsoft Graph with the token attached to the request to get all of the users in the tenant.
115110

116-
117111
## More information
118112

119113
### Getting MSAL
@@ -133,7 +127,7 @@ compile group: 'com.microsoft.azure', name: 'msal4j', version: '0.5.0-preview'
133127
```
134128

135129

136-
### Msal initialization
130+
### MSAL initialization
137131
You can add the reference to MSAL4J by adding the following code to the top of the file where you will be using MSAL4J:
138132

139133
```Java

articles/active-directory/develop/quickstart-v2-python-webapp.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,7 @@ To run this sample, you will need:
3535

3636
- [Python 2.7+](https://www.python.org/downloads/release/python-2713) or [Python 3+](https://www.python.org/downloads/release/python-364/)
3737
- [Flask](http://flask.pocoo.org/), [Flask-Session](https://pythonhosted.org/Flask-Session/), [requests](https://requests.kennethreitz.org//en/master/)
38-
- [MSAL Python](https://github.com/AzureAD/microsoft-authentication-library-for-python)
39-
- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [how to get an Azure AD tenant.](https://docs.microsoft.com/azure/active-directory/develop/quickstart-create-new-tenant)
38+
- [MSAL Python](https://github.com/AzureAD/microsoft-authentication-library-for-python)
4039

4140
> [!div renderon="docs"]
4241
>

articles/active-directory/manage-apps/customize-application-attributes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,7 @@ Selecting this option will effectively force a resynchronization of all users wh
138138
- A recommended best practice is to keep the number of consecutive changes to your attribute-mappings at a minimum.
139139
- Adding a photo attribute to be provisioned to an app is not supported today as you cannot specify the format to sync the photo. You can request the feature on [User Voice](https://feedback.azure.com/forums/169401-azure-active-directory)
140140
- The attribute IsSoftDeleted is often part of the default mappings for an application. IsSoftdeleted can be true in one of four scenarios (the user is out of scope due to being unassigned from the application, the user is out of scope due to not meeting a scoping filter, the user has been soft deleted in Azure AD, or the property AccountEnabled is set to false on the user).
141+
- The Azure AD provisioning service does not support provisioning null values
141142

142143
## Next steps
143144

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323
---
2424
# Audit activity reports in the Azure Active Directory portal
2525

26-
With Azure Active Directory (Azure AD) reports, you can get the information you need to determine how your environment is doing..
26+
With Azure Active Directory (Azure AD) reports, you can get the information you need to determine how your environment is doing.
2727

2828
The reporting architecture consists of the following components:
2929

articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-arcsight.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To use this feature, you need:
3333
* An Azure event hub that contains Azure AD activity logs. Learn how to [stream your activity logs to an event hub](quickstart-azure-monitor-stream-logs-to-event-hub.md).
3434
* A configured instance of ArcSight Syslog NG Daemon SmartConnector (SmartConnector) or ArcSight Load Balancer. If the events are sent to ArcSight Load Balancer, they are consequently sent to the SmartConnector by the Load Balancer.
3535

36-
Download and open the [configuration guide for ArcSight SmartConnector for Azure Monitor Event Hub](https://community.softwaregrp.com/dcvta86296/attachments/dcvta86296/connector-documentation/1232/2/Microsoft%20Azure%20Monitor%20Event%20Hub.pdf). This guide contains the steps you need to install and configure the ArcSight SmartConnector for Azure Monitor.
36+
Download and open the [configuration guide for ArcSight SmartConnector for Azure Monitor Event Hub](https://community.microfocus.com/dcvta86296/attachments/dcvta86296/connector-documentation/1232/8/Microsoft%20Azure%20Monitor%20Event%20Hub.pdf). This guide contains the steps you need to install and configure the ArcSight SmartConnector for Azure Monitor.
3737

3838
## Integrate Azure AD logs with ArcSight
3939

0 commit comments

Comments
 (0)