Skip to content

Commit 8422ce1

Browse files
authored
Merge pull request #223156 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST 01/06
2 parents cf25c3e + 70f3352 commit 8422ce1

File tree

175 files changed

+1133
-616
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

175 files changed

+1133
-616
lines changed

articles/active-directory-b2c/configure-authentication-sample-ios-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 07/29/2021
10+
ms.date: 01/06/2023
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -110,10 +110,10 @@ This sample acquires an access token with the relevant scopes that the mobile ap
110110
111111
## Step 4: Get the iOS mobile app sample
112112

113-
1. [Download the .zip file](https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal/archive/refs/heads/vNext.zip), or clone the sample web app from the [GitHub repo](https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal).
113+
1. [Download the .zip file](https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal/archive/refs/heads/master.zip), or clone the sample web app from the [GitHub repo](https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal).
114114

115115
```bash
116-
git clone https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal/tree/vNext.git
116+
git clone https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal
117117
```
118118

119119
1. Use [CocoaPods](https://cocoapods.org/) to install the MSAL library. In a terminal window, go to the project root folder. This folder contains the *podfile* file. Run the following command:

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,30 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## December 2022
19+
20+
### New articles
21+
22+
- [Build a global identity solution with funnel-based approach](azure-ad-b2c-global-identity-funnel-based-design.md)
23+
- [Azure Active Directory B2C global identity framework proof of concept for funnel-based configuration](azure-ad-b2c-global-identity-proof-of-concept-funnel.md)
24+
- [Azure Active Directory B2C global identity framework proof of concept for region-based configuration](azure-ad-b2c-global-identity-proof-of-concept-regional.md)
25+
- [Build a global identity solution with region-based approach](azure-ad-b2c-global-identity-region-based-design.md)
26+
- [Azure Active Directory B2C global identity framework](azure-ad-b2c-global-identity-solutions.md)
27+
28+
### Updated articles
29+
30+
- [Set up a resource owner password credentials flow in Azure Active Directory B2C](add-ropc-policy.md)
31+
- [Use API connectors to customize and extend sign-up user flows and custom policies with external identity data sources](api-connectors-overview.md)
32+
- [Azure Active Directory B2C: Region availability & data residency](data-residency.md)
33+
- [Tutorial: Configure Experian with Azure Active Directory B2C](partner-experian.md)
34+
- [Tutorial: Configure Microsoft Dynamics 365 Fraud Protection with Azure Active Directory B2C](partner-dynamics-365-fraud-protection.md)
35+
- [Tutorial: Configure Azure Active Directory B2C with Datawiza to provide secure hybrid access](partner-datawiza.md)
36+
- [Configure TheAccessHub Admin Tool with Azure Active Directory B2C](partner-n8identity.md)
37+
- [Tutorial: Configure Cloudflare Web Application Firewall with Azure Active Directory B2C](partner-cloudflare.md)
38+
- [Set up a password reset flow in Azure Active Directory B2C](add-password-reset-policy.md)
39+
- [What is Azure Active Directory B2C?](overview.md)
40+
- [Technical and feature overview of Azure Active Directory B2C](technical-overview.md)
41+
1842
## November 2022
1943

2044
### New articles
@@ -138,4 +162,4 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
138162
- [Application types that can be used in Active Directory B2C](application-types.md)
139163
- [Publish your Azure Active Directory B2C app to the Azure Active Directory app gallery](publish-app-to-azure-ad-app-gallery.md)
140164
- [Quickstart: Set up sign in for a desktop app using Azure Active Directory B2C](quickstart-native-app-desktop.md)
141-
- [Register a single-page application (SPA) in Azure Active Directory B2C](tutorial-register-spa.md)
165+
- [Register a single-page application (SPA) in Azure Active Directory B2C](tutorial-register-spa.md)

articles/active-directory/develop/authentication-vs-authorization.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,17 @@
22
title: Authentication vs. authorization
33
description: Learn about the basics of authentication and authorization in the Microsoft identity platform.
44
services: active-directory
5-
author: rwike77
5+
author: cilwerner
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
1212
ms.date: 11/02/2022
13-
ms.author: ryanwi
13+
ms.author: cwerner
1414
ms.reviewer: jmprieur, saeeda, sureshja, ludwignick
15-
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started
15+
ms.custom: aaddev, identityplatformtop40, microsoft-identity-platform, scenarios:getting-started
1616
#Customer intent: As an application developer, I want to understand the basic concepts of authentication and authorization in the Microsoft identity platform.
1717
---
1818

articles/active-directory/fundamentals/active-directory-data-storage-eu.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Administrators can choose to enable or disable certain Azure AD features. If the
7979

8080
* **Azure Active Directory Multi Tenant Collaboration** - With multi tenant collaboration scenarios enabled, customers can configure their tenant to collaborate with users from a different tenant. For example, a customer can invite users to their tenant in a B2B context. A customer can create a multi-tenant SaaS application that allows other third party tenants to provision the application in the third party tenant. Or, the customer can make two or more tenants affiliated with one another and act as a single tenant in certain scenarios, such as multi-tenant organization (MTO) formation, tenant to tenant sync, and shared e-mail domain sharing. Customer configuration and use of multi tenant collaboration may occur with tenants outside of the EU Data Residency and EU Data Boundary resulting in some customer data, such as user and device account data, usage data, and service configuration (application, policy, and group) stored and processed in the location of the collaborating tenant.
8181
* **Application Proxy** - Allows customers to access their on-premises web applications externally. Customers may choose advanced routing configurations that allow customer data to egress outside of the EU Data Residency and EU Data Boundary, including user account data, usage data, and application configuration data.
82-
* **Microsoft 365 Multi Geo** - Microsoft 365 Multi-Geo provides customers with the ability to expand their Microsoft 365 presence to multiple geographic regions/countries within a single existing Microsoft 365 tenant. Azure Active Directory will egress customer data to perform backup authentication to the locations configured by the customer. Types of customer data include user and device account data, branding data, and service configuration data (application, policy, and group).
82+
* **Microsoft 365 Multi Geo** - Microsoft 365 Multi-Geo provides customers with the ability to expand their Microsoft 365 presence to multiple geographic countries/regions within a single existing Microsoft 365 tenant. Azure Active Directory will egress customer data to perform backup authentication to the locations configured by the customer. Types of customer data include user and device account data, branding data, and service configuration data (application, policy, and group).
8383

8484
### Other EU Data Boundary online services
8585

articles/active-directory/saas-apps/amazon-business-tutorial.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 12/21/2022
1313
ms.author: jeedes
1414
---
1515

@@ -123,9 +123,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
123123

124124
1. Click **Save**.
125125

126-
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Metadata XML** and select **Download** to download the certificate and save it on your computer.
126+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
127127

128-
![The Certificate download link](common/metadataxml.png)
128+
![The Certificate download link](common/copy-metadataurl.png)
129129

130130
1. On the **Set up Amazon Business** section, copy the appropriate URL(s) based on your requirement.
131131

@@ -221,10 +221,13 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
221221

222222
![Screenshot shows New user account defaults with Microsoft S S O, Requisitioner, and Next selected.](media/amazon-business-tutorial/group.png)
223223

224-
1. On the **Upload your metadata file** wizard, click **Browse** to upload the **Metadata XML** file, which you have downloaded from the Azure portal and click **Upload**.
224+
1. On the **Upload your metadata file** wizard, choose **Paste XML Link** option to paste the **App Federation Metadata URL** value, which you have copied from Azure portal and click **Validate**.
225225

226226
![Screenshot shows Upload your metadata file, which allows you to browse to an x m l file and upload it.](media/amazon-business-tutorial/connection-data.png)
227227

228+
>[!NOTE]
229+
> Alternatively, you can also upload the **Federation Metadata XML** file by clicking on the **Upload XML File** option.
230+
228231
1. After uploading the downloaded metadata file, the fields in the **Connection data** section will populate automatically. After that click **Next**.
229232

230233
![Screenshot shows Connection data, where you can specify an Azure A D Identifier, Login U R L, and SAML Signing Certificate.](media/amazon-business-tutorial/connection.png)
@@ -237,7 +240,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
237240

238241
![Screenshot shows Attribute mapping, where you can edit your Amazon data SAML attribute names.](media/amazon-business-tutorial/attribute-mapping.png)
239242

240-
1. On the **Amazon connection data** wizard, click **Next**.
243+
1. On the **Amazon connection data** wizard, please confirm your IDP has configured and click **Continue**.
241244

242245
![Screenshot shows Amazon connection data, where you can click next to continue.](media/amazon-business-tutorial/amazon-connect.png)
243246

@@ -276,15 +279,15 @@ In this section, you test your Azure AD single sign-on configuration with follow
276279

277280
#### SP initiated:
278281

279-
* Click on **Test this application** in Azure portal. This will redirect to Amazon Business Sign on URL where you can initiate the login flow.
282+
* Click on **Test this application** in Azure portal. This will redirect to Amazon Business Sign-on URL where you can initiate the login flow.
280283

281-
* Go to Amazon Business Sign-on URL directly and initiate the login flow from there.
284+
* Go to the Amazon Business Single Sign-on URL directly and initiate the login flow from there.
282285

283286
#### IDP initiated:
284287

285288
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Amazon Business for which you set up the SSO.
286289

287-
You can also use Microsoft My Apps to test the application in any mode. When you click the Amazon Business tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Amazon Business for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
290+
You can also use Microsoft My Apps to test the application in any mode. When you click the Amazon Business tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Amazon Business for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
288291

289292
## Next steps
290293

6.84 KB
Loading
17.4 KB
Loading
-13.4 KB
Loading

articles/aks/api-server-vnet-integration.md

Lines changed: 21 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,6 @@ ms.custom: references_regions
1212

1313
An Azure Kubernetes Service (AKS) cluster configured with API Server VNet Integration (Preview) projects the API server endpoint directly into a delegated subnet in the VNet where AKS is deployed. API Server VNet Integartion enables network communication between the API server and the cluster nodes without requiring a private link or tunnel. The API server is available behind an Internal Load Balancer VIP in the delegated subnet, which the nodes are configured to utilize. By using API Server VNet Integration, you can ensure network traffic between your API server and your node pools remains on the private network only.
1414

15-
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
16-
1715
## API server connectivity
1816

1917
The control plane or API server is in an Azure Kubernetes Service (AKS)-managed Azure subscription. A customer's cluster or node pool is in the customer's subscription. The server and the virtual machines that make up the cluster nodes can communicate with each other through the API server VIP and pod IPs that are projected into the delegated subnet.
@@ -31,33 +29,37 @@ API Server VNet Integration is available in all global Azure regions except the
3129
* Azure CLI with aks-preview extension 0.5.97 or later.
3230
* If using ARM or the REST API, the AKS API version must be 2022-04-02-preview or later.
3331

34-
### Install the aks-preview CLI extension
32+
## Install the aks-preview Azure CLI extension
3533

36-
```azurecli-interactive
37-
# Install the aks-preview extension
34+
[!INCLUDE [preview features callout](includes/preview/preview-callout.md)]
35+
36+
To install the aks-preview extension, run the following command:
37+
38+
```azurecli
3839
az extension add --name aks-preview
40+
```
41+
42+
Run the following command to update to the latest version of the extension released:
3943

40-
# Update the extension to make sure you have the latest version installed
44+
```azurecli
4145
az extension update --name aks-preview
4246
```
4347

44-
### Register the `EnableAPIServerVnetIntegrationPreview` preview feature
45-
46-
To create an AKS cluster with API Server VNet Integration, you must enable the `EnableAPIServerVnetIntegrationPreview` feature flag on your subscription.
48+
## Register the 'EnableAPIServerVnetIntegrationPreview' feature flag
4749

48-
Register the `EnableAPIServerVnetIntegrationPreview` feature flag by using the `az feature register` command, as shown in the following example:
50+
Register the `EnableAPIServerVnetIntegrationPreview` feature flag by using the [az feature register][az-feature-register] command, as shown in the following example:
4951

5052
```azurecli-interactive
5153
az feature register --namespace "Microsoft.ContainerService" --name "EnableAPIServerVnetIntegrationPreview"
5254
```
5355

54-
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the `az feature list` command:
56+
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the [az feature show][az-feature-show] command:
5557

5658
```azurecli-interactive
57-
az feature list -o table --query "[?contains(name, 'Microsoft.ContainerService/EnableAPIServerVnetIntegrationPreview')].{Name:name,State:properties.state}"
59+
az feature show --namespace "Microsoft.ContainerService" --name "EnableAPIServerVnetIntegrationPreview"
5860
```
5961

60-
When the feature has been registered, refresh the registration of the *Microsoft.ContainerService* resource provider by using the `az provider register` command:
62+
When the status reflects *Registered*, refresh the registration of the *Microsoft.ContainerService* resource provider by using the [az provider register][az-provider-register] command:
6163

6264
```azurecli-interactive
6365
az provider register --namespace Microsoft.ContainerService
@@ -227,11 +229,12 @@ az aks update -n <cluster-name> \
227229
For associated best practices, see [Best practices for network connectivity and security in AKS][operator-best-practices-network].
228230

229231
<!-- LINKS - internal -->
230-
[az-provider-register]: /cli/azure/provider#az_provider_register
231-
[az-feature-register]: /cli/azure/feature#az_feature_register
232-
[az-feature-list]: /cli/azure/feature#az_feature_list
233-
[az-extension-add]: /cli/azure/extension#az_extension_add
234-
[az-extension-update]: /cli/azure/extension#az_extension_update
232+
[az-provider-register]: /cli/azure/provider#az-provider-register
233+
[az-feature-register]: /cli/azure/feature#az-feature-register
234+
[az-feature-list]: /cli/azure/feature#az-feature-list
235+
[az-feature-show]: /cli/azure/feature#az-feature-show
236+
[az-extension-add]: /cli/azure/extension#az-extension-add
237+
[az-extension-update]: /cli/azure/extension#az-extension-update
235238
[private-link-service]: ../private-link/private-link-service-overview.md#limitations
236239
[private-endpoint-service]: ../private-link/private-endpoint-overview.md
237240
[virtual-network-peering]: ../virtual-network/virtual-network-peering-overview.md

articles/aks/azure-cni-overlay.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -115,13 +115,13 @@ Register the `AzureOverlayPreview` feature flag by using the [az feature registe
115115
az feature register --namespace "Microsoft.ContainerService" --name "AzureOverlayPreview"
116116
```
117117

118-
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the [az feature list][az-feature-list] command:
118+
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the [az feature show][az-feature-show] command:
119119

120120
```azurecli-interactive
121-
az feature list -o table --query "[?contains(name, 'Microsoft.ContainerService/AzureOverlayPreview')].{Name:name,State:properties.state}"
121+
az feature show --namespace "Microsoft.ContainerService" --name "AzureOverlayPreview"
122122
```
123123

124-
When ready, refresh the registration of the *Microsoft.ContainerService* resource provider by using the [az provider register][az-provider-register] command:
124+
When the status reflects *Registered*, refresh the registration of the *Microsoft.ContainerService* resource provider by using the [az provider register][az-provider-register] command:
125125

126126
```azurecli-interactive
127127
az provider register --namespace Microsoft.ContainerService
@@ -157,4 +157,9 @@ The following steps create a new virtual network with a subnet for the cluster n
157157
158158
## Next steps
159159
160-
To learn how to utilize AKS with your own Container Network Interface (CNI) plugin, see [Bring your own Container Network Interface (CNI) plugin](use-byo-cni.md).
160+
To learn how to utilize AKS with your own Container Network Interface (CNI) plugin, see [Bring your own Container Network Interface (CNI) plugin](use-byo-cni.md).
161+
162+
<!-- LINKS - internal -->
163+
[az-provider-register]: /cli/azure/provider#az-provider-register
164+
[az-feature-register]: /cli/azure/feature#az-feature-register
165+
[az-feature-show]: /cli/azure/feature#az-feature-show

0 commit comments

Comments
 (0)