Skip to content

Commit 8741053

Browse files
Merge pull request #98292 from CelesteDG/celested-metadata-fixes
Batch 2 of metadata fixes
2 parents a5b2a1a + f00e4ae commit 8741053

File tree

92 files changed

+37
-377
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

92 files changed

+37
-377
lines changed

articles/active-directory/develop/howto-authenticate-service-principal-powershell.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,15 @@ title: Create identity for Azure app with PowerShell
33
titleSuffix: Microsoft identity platform
44
description: Describes how to use Azure PowerShell to create an Azure Active Directory application and service principal, and grant it access to resources through role-based access control. It shows how to authenticate application with a certificate.
55
services: active-directory
6-
documentationcenter: na
76
author: rwike77
87
manager: CelesteDG
98

109
ms.assetid: d2caf121-9fbe-4f00-bf9d-8f3d1f00a6ff
1110
ms.service: active-directory
1211
ms.subservice: develop
1312
ms.custom: aaddev
14-
ms.devlang: na
1513
ms.topic: conceptual
1614
ms.tgt_pltfrm: multiple
17-
ms.workload: na
1815
ms.date: 10/10/2019
1916
ms.author: ryanwi
2017
ms.reviewer: tomfitz

articles/active-directory/develop/howto-configure-publisher-domain.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,12 @@ title: Configure an application's publisher domain
33
titleSuffix: Microsoft identity platform
44
description: Learn how to configure an application's publisher domain to let users know where their information is being sent.
55
services: active-directory
6-
documentationcenter: dev-center-name
76
author: rwike77
87
manager: CelesteDG
9-
editor: ''
108

119
ms.service: active-directory
1210
ms.subservice: develop
13-
ms.devlang: na
1411
ms.topic: conceptual
15-
ms.tgt_pltfrm: na
1612
ms.workload: identity
1713
ms.date: 04/05/2019
1814
ms.author: ryanwi

articles/active-directory/develop/howto-convert-app-to-be-multi-tenant.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,13 @@ title: Build apps that sign in Azure AD users
33
titleSuffix: Microsoft identity platform
44
description: Shows how to build a multi-tenant application that can sign in a user from any Azure Active Directory tenant.
55
services: active-directory
6-
documentationcenter: ''
76
author: rwike77
87
manager: CelesteDG
9-
editor: ''
108

119
ms.assetid: 35af95cb-ced3-46ad-b01d-5d2f6fd064a3
1210
ms.service: active-directory
1311
ms.subservice: develop
14-
ms.devlang: na
1512
ms.topic: conceptual
16-
ms.tgt_pltfrm: na
1713
ms.workload: identity
1814
ms.date: 05/22/2019
1915
ms.author: ryanwi

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,12 @@ title: Create identity for Azure app in portal
33
titleSuffix: Microsoft identity platform
44
description: Describes how to create a new Azure Active Directory application and service principal that can be used with the role-based access control in Azure Resource Manager to manage access to resources.
55
services: active-directory
6-
documentationcenter: na
76
author: rwike77
87
manager: CelesteDG
98

109
ms.service: active-directory
1110
ms.subservice: develop
12-
ms.devlang: na
1311
ms.topic: conceptual
14-
ms.tgt_pltfrm: na
15-
ms.workload: na
1612
ms.date: 10/14/2019
1713
ms.author: ryanwi
1814
ms.reviewer: tomfitz

articles/active-directory/develop/howto-get-appsource-certified.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,21 +2,17 @@
22
title: How to get AppSource certified for Azure Active Directory| Microsoft Docs
33
description: Details on how to get your application AppSource certified for Azure Active Directory.
44
services: active-directory
5-
documentationcenter: ''
65
author: rwike77
76
manager: CelesteDG
8-
editor: ''
97

108
ms.assetid: 21206407-49f8-4c0b-84d1-c25e17cd4183
119
ms.service: active-directory
1210
ms.subservice: develop
13-
ms.devlang: na
1411
ms.topic: conceptual
15-
ms.tgt_pltfrm: na
1612
ms.workload: identity
1713
ms.date: 08/21/2018
1814
ms.author: ryanwi
19-
ms.reviewer: andret
15+
ms.reviewer: jeedes
2016
ms.custom: aaddev
2117
ms.collection: M365-identity-device-management
2218
---

articles/active-directory/develop/howto-reactivate-disabled-acs-namespaces.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,12 @@
22
title: How to reactivate disabled Azure Access Control Service (ACS) namespaces
33
description: Learn how to find and enable your Azure Access Control Service (ACS) namespaces and request an extension to keep them enabled until February 4, 2019.
44
services: active-directory
5-
documentationcenter: ''
65
author: rwike77
76
manager: CelesteDG
87

98
ms.service: active-directory
109
ms.subservice: develop
1110
ms.workload: identity
12-
ms.tgt_pltfrm: na
13-
ms.devlang: na
1411
ms.topic: conceptual
1512
ms.date: 01/21/2019
1613
ms.author: ryanwi

articles/active-directory/develop/howto-restrict-your-app-to-a-set-of-users.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,20 +3,16 @@ title: Restrict Azure Active Directory-registered app users | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn how to restrict access to your apps registered in Azure AD to a selected set of users.
55
services: active-directory
6-
documentationcenter: ''
76
author: kalyankrishna1
87
manager: CelesteDG
9-
editor: ''
108

119
ms.service: active-directory
1210
ms.subservice: develop
1311
ms.workload: identity
14-
ms.tgt_pltfrm: na
15-
ms.devlang: na
1612
ms.topic: conceptual
1713
ms.date: 09/24/2018
1814
ms.author: kkrishna
19-
ms.reviewer: ''
15+
ms.reviewer: jmprieur
2016
ms.custom: aaddev
2117
#Customer intent: As an application developer, I want to restrict an application that I have registered in Azure AD to a select set of users available in my Azure AD tenant
2218
ms.collection: M365-identity-device-management

articles/active-directory/develop/howto-v1-debug-saml-sso-issues.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,19 +3,16 @@ title: Debug SAML-based single sign-on - Azure Active Directory | Microsoft Docs
33
description: Debug SAML-based single sign-on to applications in Azure Active Directory.
44
services: active-directory
55
author: rwike77
6-
documentationcenter: na
76
manager: CelesteDG
87

98
ms.service: active-directory
109
ms.subservice: develop
11-
ms.devlang: na
1210
ms.topic: conceptual
13-
ms.tgt_pltfrm: na
1411
ms.workload: identity
1512
ms.date: 02/18/2019
1613
ms.author: ryanwi
1714
ms.custom: aaddev
18-
ms.reviewer: luleon, hirsin, smalser
15+
ms.reviewer: luleon, hirsin, paulgarn
1916
ms.collection: M365-identity-device-management
2017
---
2118

articles/active-directory/develop/howto-v1-enable-sso-android.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22
title: How to enable cross-app SSO on Android using ADAL | Microsoft Docs
33
description: How to use the features of the ADAL SDK to enable single sign-on across your applications.
44
services: active-directory
5-
documentationcenter: ''
65
author: rwike77
76
manager: CelesteDG
87

articles/active-directory/develop/howto-v2-keychain-objc.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,20 +3,16 @@ title: Configure keychain
33
titleSuffix: Microsoft identity platform
44
description: Learn how to configure keychain so that your app can cache tokens in the keychain.
55
services: active-directory
6-
documentationcenter: ''
76
author: TylerMSFT
87
manager: CelesteDG
9-
editor: ''
108

119
ms.service: active-directory
1210
ms.subservice: develop
1311
ms.workload: identity
14-
ms.tgt_pltfrm: na
15-
ms.devlang: na
1612
ms.topic: conceptual
1713
ms.date: 08/28/2019
1814
ms.author: twhitney
19-
ms.reviewer: ''
15+
ms.reviewer: oldalton
2016
ms.custom: aaddev
2117
ms.collection: M365-identity-device-management
2218
---
@@ -47,7 +43,7 @@ On macOS 10.15 onwards (macOS Catalina), MSAL uses keychain access group attribu
4743

4844
If you'd like to use a different keychain access group, you can pass your custom group when creating `MSALPublicClientApplicationConfig` before creating `MSALPublicClientApplication`, like this:
4945

50-
Objective-C:
46+
# [Objective-C](#tab/objc)
5147

5248
```objc
5349
MSALPublicClientApplicationConfig *config = [[MSALPublicClientApplicationConfig alloc] initWithClientId:@"your-client-id"
@@ -63,9 +59,7 @@ MSALPublicClientApplication *application = [[MSALPublicClientApplication alloc]
6359
// and only shared with other applications declaring the same access group
6460
```
6561
66-
67-
68-
Swift:
62+
# [Swift](#tab/swift)
6963
7064
```swift
7165
let config = MSALPublicClientApplicationConfig(clientId: "your-client-id",
@@ -81,26 +75,28 @@ do {
8175
}
8276
```
8377

84-
78+
---
8579

8680
## Disable keychain sharing
8781

8882
If you don't want to share SSO state between multiple apps, or use any keychain access group, disable keychain sharing by passing the application bundle ID as your keychainGroup:
8983

90-
Objective-C:
84+
# [Objective-C](#tab/objc)
9185

9286
```objc
9387
config.cacheConfig.keychainSharingGroup = [[NSBundle mainBundle] bundleIdentifier];
9488
```
9589

96-
Swift:
90+
# [Swift](#tab/swift)
9791

9892
```swift
9993
if let bundleIdentifier = Bundle.main.bundleIdentifier {
10094
config.cacheConfig.keychainSharingGroup = bundleIdentifier
10195
}
10296
```
10397

98+
---
99+
104100
## Handle -34018 error (failed to set item into keychain)
105101

106102
Error -34018 normally means that the keychain hasn't been configured correctly. Ensure the keychain access group that has been configured in MSAL matches the one configured in entitlements.

0 commit comments

Comments
 (0)