Skip to content

Commit 8bd2a2c

Browse files
Merge branch 'MicrosoftDocs:main' into customContainer
2 parents 7031816 + ec60f68 commit 8bd2a2c

File tree

350 files changed

+23180
-3513
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

350 files changed

+23180
-3513
lines changed

articles/active-directory-b2c/configure-authentication-sample-ios-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kengaderdus
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
9-
ms.topic: reference
9+
ms.topic: how-to
1010
ms.date: 01/06/2023
1111
ms.author: kengaderdus
1212
ms.subservice: B2C

articles/active-directory-b2c/custom-policy-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77

88
ms.service: active-directory
99
ms.workload: identity
10-
ms.topic: reference
10+
ms.topic: overview
1111
ms.date: 01/10/2023
1212
ms.author: kengaderdus
1313
ms.subservice: B2C

articles/active-directory-b2c/enable-authentication-web-api.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kengaderdus
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
9-
ms.topic: reference
9+
ms.topic: how-to
1010
ms.date: 01/10/2023
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
@@ -262,7 +262,7 @@ Add two endpoints to your web API:
262262

263263
# [ASP.NET Core](#tab/csharpclient)
264264

265-
Under the */Controllers* folder, add a *PublicController.cs* file, and then add to it the following code snippet:
265+
Under the */Controllers* folder, add a *PublicController.cs* file, and then add it to the following code snippet:
266266

267267
```csharp
268268
using System;
@@ -307,7 +307,7 @@ app.get('/public', (req, res) => res.send( {'date': new Date() } ));
307307

308308
# [ASP.NET Core](#tab/csharpclient)
309309

310-
Under the */Controllers* folder, add a *HelloController.cs* file, and then add to it the following code:
310+
Under the */Controllers* folder, add a *HelloController.cs* file, and then add it to the following code:
311311

312312
```csharp
313313
using Microsoft.AspNetCore.Authorization;
@@ -438,7 +438,7 @@ In the *appsettings.json* file, update the following properties:
438438

439439
# [Node.js](#tab/nodejsgeneric)
440440

441-
Under the project root folder, create a *config.json* file, and then add to it the following JSON snippet:
441+
Under the project root folder, create a *config.json* file, and then add it to the following JSON snippet:
442442

443443
```json
444444
{

articles/active-directory-b2c/index.yml

Lines changed: 15 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ metadata:
1616
ms.collection: collection
1717
author: kengaderdus
1818
ms.author: kengaderdus
19-
ms.date: 12/14/2022
19+
ms.date: 03/08/2023
2020

2121
## FRONT MATTER END
2222

@@ -219,6 +219,9 @@ conceptualContent:
219219
- text: Customize user experiences using custom policies
220220
url: add-sign-up-and-sign-in-policy.md?pivots=b2c-custom-policy
221221
itemType: how-to-guide
222+
- text: Custom policy how-to guide series
223+
url: custom-policies-series-overview.md
224+
itemType: how-to-guide
222225
# - text: Use API connectors
223226
# url: add-api-connector.md?pivots=b2c-user-flow
224227
# itemType: how-to-guide
@@ -330,38 +333,38 @@ conceptualContent:
330333

331334
## BAND 4 - TOOLS ###########################################################################################################################################
332335
tools:
333-
title: Easy app integration with Microsoft Authentication Libraries (MSAL)
336+
title: Use Microsoft Authentication Libraries (MSAL) for easy app integration
334337
summary: >
335-
GitHub hosts the open-source Microsoft Authentication Library (MSAL). Microsoft builds and supports MSAL. Access and use our MSAL samples for the most popular programming languages and frameworks.
338+
GitHub hosts the open-source Microsoft Authentication Library (MSAL). Microsoft builds and supports MSAL. We recommend MSAL for any app type that uses Azure AD B2C for authentication and authorization.
336339
items:
337340
## ROW 1 ######################
338341
- title: MSAL.NET
339-
url: https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi
342+
url: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet
340343
imageSrc: https://docs.microsoft.com/media/logos/logo_Csharp.svg
341344
- title: MSAL Android
342-
url: https://github.com/Azure-Samples/ms-identity-android-java#b2cmodefragment-class
345+
url: https://github.com/AzureAD/microsoft-authentication-library-for-android
343346
imageSrc: ../active-directory/develop/media/hub/android.svg
344347
- title: MSAL Angular
345-
url: https://github.com/Azure-Samples/ms-identity-javascript-angular-tutorial/tree/main/3-Authorization-II/2-call-api-b2c
348+
url: https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-angular
346349
imageSrc: ../active-directory/develop/media/hub/angular.svg
347350
## ROW 2 ######################
348351
- title: MSAL iOS
349-
url: https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal
352+
url: https://github.com/AzureAD/microsoft-authentication-library-for-objc
350353
imageSrc: https://docs.microsoft.com/media/logos/logo_ios.svg
351354
- title: MSAL Java
352-
url: https://github.com/Azure-Samples/ms-identity-msal-java-samples/tree/main/1.%20Server-Side%20Scenarios/msal-b2c-web-sample
355+
url: https://github.com/AzureAD/microsoft-authentication-library-for-java
353356
imageSrc: https://docs.microsoft.com/media/logos/logo_java.svg
354357
- title: MSAL.js
355-
url: https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa
358+
url: https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-browser
356359
imageSrc: https://docs.microsoft.com/media/logos/logo_js.svg
357360
## ROW 3 ######################
358361
- title: MSAL Node
359-
url: https://github.com/Azure-Samples/active-directory-b2c-msal-node-sign-in-sign-out-webapp
362+
url: https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node
360363
imageSrc: ../active-directory/develop/media/hub/node.svg
361364
- title: MSAL Python
362-
url: https://github.com/Azure-Samples/ms-identity-python-webapp
365+
url: https://github.com/AzureAD/microsoft-authentication-library-for-python
363366
imageSrc: https://docs.microsoft.com/media/logos/logo_python.svg
364367
- title: MSAL React
365-
url: https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/tree/main/3-Authorization-II/2-call-api-b2c
368+
url: https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-react
366369
imageSrc: ../active-directory/develop/media/hub/react.svg
367370
## BAND 4 - TOOLS END #######################################################################################################################################

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/07/2023
11+
ms.date: 03/08/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -222,7 +222,7 @@ Use the general guidelines when implementing a SCIM endpoint to ensure compatibi
222222
* If a value isn't present, don't send null values.
223223
* Property values should be camel cased (for example, readWrite).
224224
* Must return a list response.
225-
* The Azure AD Provisioning Service makes the /schemas request every time someone saves the provisioning configuration in the Azure portal or every time a user lands on the edit provisioning page in the Azure portal. Other attributes discovered are surfaced to customers in the attribute mappings under the target attribute list. Schema discovery only leads to more target attributes being added. Attributes aren't removed.
225+
* The Azure AD Provisioning Service makes the /schemas request when you save the provisioning configuration in the Azure portal. The request is also made when you open the edit provisioning page in the Azure portal. Other attributes discovered are surfaced to customers in the attribute mappings under the target attribute list. Schema discovery only leads to more target attributes being added. Attributes aren't removed.
226226

227227
### User provisioning and deprovisioning
228228

@@ -275,7 +275,7 @@ This article provides example SCIM requests emitted by the Azure Active Director
275275

276276
### User Operations
277277

278-
* Users can be queried by `userName` or `emails[type eq "work"]` attributes.
278+
* Use `userName` or `emails[type eq "work"]` attributes to query users.
279279

280280
#### Create User
281281

@@ -606,8 +606,8 @@ This article provides example SCIM requests emitted by the Azure Active Director
606606

607607
### Group Operations
608608

609-
* Groups shall always be created with an empty members list.
610-
* Groups can be queried by the `displayName` attribute.
609+
* Groups are created with an empty members list.
610+
* Use the `displayName` attribute to query groups.
611611
* Update to the group PATCH request should yield an *HTTP 204 No Content* in the response. Returning a body with a list of all the members isn't advisable.
612612
* It isn't necessary to support returning all the members of the group.
613613

@@ -924,7 +924,7 @@ Now that you've designed your schema and understood the Azure AD SCIM implementa
924924

925925
For guidance on how to build a SCIM endpoint including examples, see [Develop a sample SCIM endpoint](use-scim-to-build-users-and-groups-endpoints.md).
926926

927-
The open source .NET Core [reference code example](https://aka.ms/SCIMReferenceCode) published by the Azure AD provisioning team is one such resource that can jump start your development. Once you have built your SCIM endpoint, you'll want to test it out. You can use the collection of [Postman tests](https://github.com/AzureAD/SCIMReferenceCode/wiki/Test-Your-SCIM-Endpoint) provided as part of the reference code or run through the sample requests / responses provided [above](#user-operations).
927+
The open source .NET Core [reference code example](https://aka.ms/SCIMReferenceCode) published by the Azure AD provisioning team is one such resource that can jump start your development. Build a SCIM endpoint, then test it out. Use the collection of [Postman tests](https://github.com/AzureAD/SCIMReferenceCode/wiki/Test-Your-SCIM-Endpoint) provided as part of the reference code or run through the sample requests / responses [provided](#user-operations).
928928

929929
> [!Note]
930930
> The reference code is intended to help you get started building your SCIM endpoint and is provided "AS IS." Contributions from the community are welcome to help build and maintain the code.
@@ -968,7 +968,7 @@ The SCIM endpoint must have an HTTP address and server authentication certificat
968968
* WoSign
969969
* DST Root CA X3
970970

971-
The .NET Core SDK includes an HTTPS development certificate that can be used during development, the certificate is installed as part of the first-run experience. Depending on how you run the ASP.NET Core Web Application it will listen to a different port:
971+
The .NET Core SDK includes an HTTPS development certificate that is used during development. The certificate is installed as part of the first-run experience. Depending on how you run the ASP.NET Core Web Application it listens to a different port:
972972

973973
* Microsoft.SCIM.WebHostSample: `https://localhost:5001`
974974
* IIS Express: `https://localhost:44359`
@@ -1351,10 +1351,10 @@ Once the initial cycle has started, you can select **Provisioning logs** in the
13511351

13521352
## Publish your application to the Azure AD application gallery
13531353

1354-
If you're building an application that will be used by more than one tenant, you can make it available in the Azure AD application gallery. It's easy for organizations to discover the application and configure provisioning. Publishing your app in the Azure AD gallery and making provisioning available to others is easy. Check out the steps [here](../manage-apps/v2-howto-app-gallery-listing.md). Microsoft will work with you to integrate your application into our gallery, test your endpoint, and release onboarding [documentation](../saas-apps/tutorial-list.md) for customers to use.
1354+
If you're building an application used by more than one tenant, make it available in the Azure AD application gallery. It's easy for organizations to discover the application and configure provisioning. Publishing your app in the Azure AD gallery and making provisioning available to others is easy. Check out the steps [here](../manage-apps/v2-howto-app-gallery-listing.md). Microsoft works with you to integrate your application into the gallery, test your endpoint, and release onboarding [documentation](../saas-apps/tutorial-list.md) for customers.
13551355

13561356
### Gallery onboarding checklist
1357-
Use the checklist to onboard your application quickly and customers have a smooth deployment experience. The information will be gathered from you when onboarding to the gallery.
1357+
Use the checklist to onboard your application quickly and customers have a smooth deployment experience. The information is gathered from you when onboarding to the gallery.
13581358
> [!div class="checklist"]
13591359
> * Support a [SCIM 2.0](#understand-the-azure-ad-scim-implementation) user and group endpoint (Only one is required but both are recommended)
13601360
> * Support at least 25 requests per second per tenant to ensure that users and groups are provisioned and deprovisioned without delay (Required)
@@ -1418,7 +1418,7 @@ Best practices (recommended, but not required):
14181418
> [!NOTE]
14191419
> While it's not possible to setup OAuth on the non-gallery applications, you can manually generate an access token from your authorization server and input it as the secret token to a non-gallery application. This allows you to verify compatibility of your SCIM server with the Azure AD Provisioning Service before onboarding to the app gallery, which does support the OAuth code grant.
14201420

1421-
**Long-lived OAuth bearer tokens:** If your application doesn't support the OAuth authorization code grant flow, instead generate a long lived OAuth bearer token that an administrator can use to set up the provisioning integration. The token should be perpetual, or else the provisioning job will be [quarantined](application-provisioning-quarantine-status.md) when the token expires.
1421+
**Long-lived OAuth bearer tokens:** If your application doesn't support the OAuth authorization code grant flow, instead generate a long lived OAuth bearer token that an administrator can use to set up the provisioning integration. The token should be perpetual, or else the provisioning job is [quarantined](application-provisioning-quarantine-status.md) when the token expires.
14221422

14231423
For more authentication and authorization methods, let us know on [UserVoice](https://aka.ms/appprovisioningfeaturerequest).
14241424

articles/active-directory/develop/howto-add-terms-of-service-privacy-statement.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 09/27/2021
12+
ms.date: 03/07/2023
1313
ms.author: ryanwi
1414
ms.reviewer: sureshja
1515
ms.custom: aaddev
@@ -56,7 +56,7 @@ Follow these steps in the Azure portal.
5656

5757
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a> and select the correct Azure AD tenant(not B2C).
5858
2. Navigate to the **App registrations** section and select your app.
59-
3. Under **Manage**, select **Branding**.
59+
3. Under **Manage**, select **Branding & properties**.
6060
4. Fill out the **Terms of service URL** and **Privacy statement URL** fields.
6161
5. Select **Save**.
6262

@@ -66,10 +66,10 @@ Follow these steps in the Azure portal.
6666

6767
If you prefer to modify the app object JSON directly, you can use the manifest editor in the Azure portal or Application Registration Portal to include links to your app's terms of service and privacy statement.
6868

69-
1. Navigating to the **App Registrations** section and select your app.
69+
1. Navigate to the **App Registrations** section and select your app.
7070
2. Open the **Manifest** pane.
7171
3. Ctrl+F, Search for "informationalUrls". Fill in the information.
72-
4. Save your changes.
72+
4. Save your changes by downloading the app manifest, modifying it, and uploading it.
7373

7474
```json
7575
"informationalUrls": {
@@ -80,12 +80,12 @@ If you prefer to modify the app object JSON directly, you can use the manifest e
8080

8181
### <a name="msgraph-rest-api"></a>Using the Microsoft Graph API
8282

83-
To programmatically update all your apps, you can use the Microsoft Graph API to update all your apps to include links to the terms of service and privacy statement documents.
83+
To programmatically [update your app](/graph/api/application-update?view=graph-rest-1.0&tabs=http), you can use the Microsoft Graph API to update all your apps to include links to the terms of service and privacy statement documents.
8484

8585
```
86-
PATCH https://graph.microsoft.com/v1.0/applications/{application id}
86+
PATCH https://graph.microsoft.com/v1.0/applications/{applicationObjectId}
8787
{
88-
    "appId": "{your application id}",
88+
    "appId": "{your application object id}",
8989
    "info": {
9090
        "termsOfServiceUrl": "<your_terms_of_service_url>",
9191
        "supportUrl": null,

articles/active-directory/develop/reply-url.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ To add a redirect URI that uses the `http` scheme with the `127.0.0.1` loopback
116116

117117
## Restrictions on wildcards in redirect URIs
118118

119-
Wildcard URIs like `https://*.contoso.com` may seem convenient, but should be avoided due to security implications. According to the OAuth 2.0 specification ([section 3.1.2 of RFC 6749](https://tools.ietf.org/html/rfc6749#section-3.1.2)), a redirection endpoint URI must be an absolute URI.
119+
Wildcard URIs like `https://*.contoso.com` may seem convenient, but should be avoided due to security implications. According to the OAuth 2.0 specification ([section 3.1.2 of RFC 6749](https://tools.ietf.org/html/rfc6749#section-3.1.2)), a redirection endpoint URI must be an absolute URI. As such, when a configured wildcard URI matches a redirect URI, query strings and fragments in the redirect URI are stripped.
120120

121121
Wildcard URIs are currently unsupported in app registrations configured to sign in personal Microsoft accounts and work or school accounts. Wildcard URIs are allowed, however, for apps that are configured to sign in only work or school accounts in an organization's Azure AD tenant.
122122

articles/active-directory/fundamentals/security-operations-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Microsoft has many products and services that enable you to customize your IT en
8282
* [Monitor sign-ins with the Azure AD sign-in log](../reports-monitoring/concept-all-sign-ins.md)
8383
* [Audit activity reports in the Azure Active Directory portal](../reports-monitoring/concept-audit-logs.md)
8484
* [Investigate risk with Azure Active Directory Identity Protection](../identity-protection/howto-identity-protection-investigate-risk.md)
85-
* [Connect Azure AD Identity Protection data to Microsoft Sentinel](../../sentinel/data-connectors-reference.md#azure-active-directory-identity-protection)
85+
* [Connect Azure AD Identity Protection data to Microsoft Sentinel](../../sentinel/data-connectors/azure-active-directory-identity-protection.md)
8686

8787
* Active Directory Domain Services (AD DS)
8888

articles/active-directory/identity-protection/howto-export-risk-data.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,14 +69,14 @@ Azure Event Hubs can look at incoming data from sources like Azure AD Identity P
6969

7070
## Other options
7171

72-
Organizations can choose to [connect Azure AD data to Microsoft Sentinel](../../sentinel/data-connectors-reference.md#azure-active-directory-identity-protection) as well for further processing.
72+
Organizations can choose to [connect Azure AD data to Microsoft Sentinel](../../sentinel/data-connectors/azure-active-directory-identity-protection.md) as well for further processing.
7373

7474
Organizations can use the [Microsoft Graph API to programatically interact with risk events](howto-identity-protection-graph-api.md).
7575

7676
## Next steps
7777

7878
- [What is Azure Active Directory monitoring?](../reports-monitoring/overview-monitoring.md)
7979
- [Install and use the log analytics views for Azure Active Directory](../reports-monitoring/howto-install-use-log-analytics-views.md)
80-
- [Connect data from Azure Active Directory (Azure AD) Identity Protection](../../sentinel/data-connectors-reference.md#azure-active-directory-identity-protection)
80+
- [Connect data from Azure Active Directory (Azure AD) Identity Protection](../../sentinel/data-connectors/azure-active-directory-identity-protection.md)
8181
- [Azure Active Directory Identity Protection and the Microsoft Graph PowerShell SDK](howto-identity-protection-graph-api.md)
8282
- [Tutorial: Stream Azure Active Directory logs to an Azure event hub](../reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md)

0 commit comments

Comments
 (0)