Skip to content

Commit 8d2edb0

Browse files
committed
Merge branch 'master' of github.com:MicrosoftDocs/azure-docs-pr
2 parents af1dadf + 7281ec4 commit 8d2edb0

27 files changed

+369
-83
lines changed

articles/active-directory/develop/quickstart-v2-java-webapp.md

Lines changed: 61 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -32,27 +32,27 @@ To run this sample you will need:
3232
>
3333
> ### Option 1: Register and auto configure your app and then download your code sample
3434
>
35-
> 1. Go to the [Azure portal - App registrations](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps).
35+
> 1. Go to the [Azure portal - App registrations](https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/JavaQuickstartPage/sourceType/docs) quickstart experience.
3636
> 1. Enter a name for your application and select **Register**.
37-
> 1. Follow the instructions to download and automatically configure your new application.
37+
> 1. Follow the instructions in the portal's quickstart experience to download the automatically configured application code.
3838
>
3939
> ### Option 2: Register and manually configure your application and code sample
4040
>
4141
> #### Step 1: Register your application
4242
>
43-
> To register your application and manually add the app's registration information to your solution, follow these steps:
43+
> To register your application and manually add the app's registration information to your application, follow these steps:
4444
>
4545
> 1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
4646
> 1. If your account gives you access to more than one tenant, select your account in the top right corner, and set your portal session to the desired Azure AD tenant.
4747
>
48-
> 1. Navigate to the Microsoft identity platform for developers [App registrations](/azure/active-directory/develop/) page.
48+
> 1. Navigate to the Microsoft identity platform for developers [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) page.
4949
> 1. Select **New registration**.
5050
> 1. When the **Register an application** page appears, enter your application's registration information:
5151
> - In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `java-webapp`.
52-
> - Leave **Redirect URI** blank for now, and select **Register**.
52+
> - Select **Register**.
5353
> 1. On the **Overview** page, find the **Application (client) ID** and the **Directory (tenant) ID** values of the application. Copy these values for later.
5454
> 1. Select the **Authentication** from the menu, and then add the following information:
55-
> - In **Redirect URIs**, add `https://localhost:8080/msal4jsample/secure/aad` and `https://localhost:8080/msal4jsample/graph/me`.
55+
> - Add the **Web** platform configuration. Add these `https://localhost:8080/msal4jsample/secure/aad` and `https://localhost:8080/msal4jsample/graph/me` as **Redirect URIs**..
5656
> - Select **Save**.
5757
> 1. Select the **Certificates & secrets** from the menu and in the **Client secrets** section, click on **New client secret**:
5858
>
@@ -80,7 +80,7 @@ To run this sample you will need:
8080
8181
> [!div class="sxs-lookup" renderon="portal"]
8282
> Download the project and extract the zip file to a local folder closer to the root folder - for example, **C:\Azure-Samples**
83-
>
83+
>
8484
> To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
8585
>
8686
> ```
@@ -93,7 +93,7 @@ To run this sample you will need:
9393
> server.ssl.key-alias=testCert
9494
> ```
9595
> Put the generated keystore file in the "resources" folder.
96-
96+
9797
> [!div renderon="portal" id="autoupdate" class="nextstepaction"]
9898
> [Download the code sample](https://github.com/Azure-Samples/ms-identity-java-webapp/archive/master.zip)
9999
@@ -153,8 +153,56 @@ If you are running the web application from an IDE, click on run, then navigate
153153
- *Sign Out*: Signs the current user out of the application and redirects them to the home page.
154154
- *Show User Info*: Acquires a token for Microsoft Graph and calls Microsoft Graph with a request containing the token, which returns basic information about the signed-in user.
155155
156+
##### Running from Tomcat
157+
158+
If you would like to deploy the web sample to Tomcat, you will need to make a couple of changes to the source code.
159+
160+
1. Open ms-identity-java-webapp/pom.xml
161+
- Under `<name>msal-web-sample</name>` add `<packaging>war</packaging>`
162+
- Add dependency:
163+
164+
```xml
165+
<dependency>
166+
<groupId>org.springframework.boot</groupId>
167+
<artifactId>spring-boot-starter-tomcat</artifactId>
168+
<scope>provided</scope>
169+
</dependency>
170+
```
171+
172+
2. Open ms-identity-java-webapp/src/main/java/com.microsoft.azure.msalwebsample/MsalWebSampleApplication
173+
174+
- Delete all source code and replace with the following:
175+
176+
```Java
177+
package com.microsoft.azure.msalwebsample;
178+
179+
import org.springframework.boot.SpringApplication;
180+
import org.springframework.boot.autoconfigure.SpringBootApplication;
181+
import org.springframework.boot.builder.SpringApplicationBuilder;
182+
import org.springframework.boot.web.servlet.support.SpringBootServletInitializer;
183+
184+
@SpringBootApplication
185+
public class MsalWebSampleApplication extends SpringBootServletInitializer {
186+
187+
public static void main(String[] args) {
188+
SpringApplication.run(MsalWebSampleApplication.class, args);
189+
}
190+
191+
@Override
192+
protected SpringApplicationBuilder configure(SpringApplicationBuilder builder) {
193+
return builder.sources(MsalWebSampleApplication.class);
194+
}
195+
}
196+
```
197+
198+
3. Open a command prompt, go to the root folder of the project, and run `mvn package`
199+
- This will generate a `msal-web-sample-0.1.0.war` file in your /targets directory.
200+
- Rename this file to `ROOT.war`
201+
- Deploy this war file using Tomcat or any other J2EE container solution.
202+
- To deploy on Tomcat container, copy the .war file to the webapps folder under your Tomcat installation and then start the Tomcat server.
203+
204+
This WAR will automatically be hosted at https://localhost:8080/.
156205

157-
158206
> [!IMPORTANT]
159207
> This quickstart application uses a client secret to identify itself as confidential client. Because the client secret is added as a plain-text to your project files, for security reasons it is recommended that you use a certificate instead of a client secret before considering the application as production application. For more information on how to use a certificate, see [Certificate credentials for application authentication](https://docs.microsoft.com/azure/active-directory/develop/active-directory-certificate-credentials).
160208
@@ -169,6 +217,8 @@ MSAL for Java (MSAL4J) is the Java library used to sign in users and request tok
169217

170218
Add MSAL4J to your application by using Maven or Gradle to manage your dependencies by making the following changes to the application's pom.xml (Maven) or build.gradle (Gradle) file.
171219

220+
In pom.xml:
221+
172222
```XML
173223
<dependency>
174224
<groupId>com.microsoft.azure</groupId>
@@ -177,6 +227,8 @@ Add MSAL4J to your application by using Maven or Gradle to manage your dependenc
177227
</dependency>
178228
```
179229

230+
In build.gradle:
231+
180232
```$xslt
181233
compile group: 'com.microsoft.azure', name: 'msal4j', version: '1.0.0'
182234
```

articles/active-directory/develop/quickstart-v2-python-webapp.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.topic: quickstart
1111
ms.workload: identity
1212
ms.date: 09/25/2019
1313
ms.author: abpati
14-
ms.custom: aaddev
14+
ms.custom: aaddev
1515
---
1616

1717
# Quickstart: Add sign-in with Microsoft to a Python web app
@@ -38,8 +38,7 @@ To run this sample, you will need:
3838
>
3939
> ### Option 1: Register and auto configure your app and then download your code sample
4040
>
41-
> 1. Go to the [Azure portal - App registrations](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps).
42-
> 1. Select **New registration**.
41+
> 1. Go to the [Azure portal - App registrations](https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/PythonQuickstartPage/sourceType/docs).
4342
> 1. Enter a name for your application and select **Register**.
4443
> 1. Follow the instructions to download and automatically configure your new application.
4544
>
@@ -56,8 +55,11 @@ To run this sample, you will need:
5655
> 1. When the **Register an application** page appears, enter your application's registration information:
5756
> - In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `python-webapp`.
5857
> - Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
59-
> - Under the **Redirect URI** section, in the drop-down list, select the **Web** platform, and then set the value to `http://localhost:5000/getAToken`.
60-
> - Select **Register**. On the app **Overview** page, note the **Application (client) ID** value for later use.
58+
> - Select **Register**.
59+
> - On the app **Overview** page, note the **Application (client) ID** value for later use.
60+
> 1. Select the **Authentication** from the menu, and then add the following information:
61+
> - Add the **Web** platform configuration. Add `http://localhost:5000/getAToken` as **Redirect URIs**.
62+
> - Select **Save**.
6163
> 1. On the left hand menu, choose **Certificates & secrets** and click on **New client secret** in the **Client Secrets** section:
6264
>
6365
> - Type a key description (of instance app secret).
@@ -102,11 +104,11 @@ To run this sample, you will need:
102104
103105
> [!div renderon="docs"]
104106
> #### Step 3: Configure the Application
105-
>
107+
>
106108
> 1. Extract the zip file to a local folder closer to the root folder - for example, **C:\Azure-Samples**
107109
> 1. If you use an integrated development environment, open the sample in your favorite IDE (optional).
108110
> 1. Open the **app_config.py** file, which can be found in the root folder and replace with the following code snippet:
109-
>
111+
>
110112
> ```python
111113
> CLIENT_ID = "Enter_the_Application_Id_here"
112114
> CLIENT_SECRET = "Enter_the_Client_Secret_Here"

articles/active-directory/users-groups-roles/directory-assign-admin-roles.md

Lines changed: 36 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: users-groups-roles
1111
ms.topic: reference
12-
ms.date: 02/28/2020
12+
ms.date: 04/07/2020
1313
ms.author: curtand
1414
ms.reviewer: vincesm
1515
ms.custom: it-pro, fasttrack-edit
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
Using Azure Active Directory (Azure AD), you can designate limited administrators to manage identity tasks in less-privileged roles. Administrators can be assigned for such purposes as adding or changing users, assigning administrative roles, resetting user passwords, managing user licenses, and managing domain names. The default user permissions can be changed only in user settings in Azure AD.
2222

23-
## Limit the use of Global administrator
23+
## Limit use of Global administrator
2424

2525
Users who are assigned to the Global administrator role can read and modify every administrative setting in your Azure AD organization. By default, the person who signs up for an Azure subscription is assigned the Global administrator role for the Azure AD organization. Only Global administrators and Privileged Role administrators can delegate administrator roles. To reduce the risk to your business, we recommend that you assign this role to the fewest possible people in your organization.
2626

@@ -65,7 +65,8 @@ Users in this role can create application registrations when the "Users can regi
6565

6666
### [Authentication Administrator](#authentication-administrator-permissions)
6767

68-
Users in this role can set or reset non-password credentials, update passwords, require to re-register against existing non-password credential (for example, MFA or FIDO) and revoke **remember MFA on the device** (which prompts for MFA on the next sign-in) of users who are non-administrators or assigned the following roles only:
68+
The Authentication administrator role is currently in public preview. Users with this role can set or reset non-password credentials and can update passwords for all users. Authentication Administrators can require users to re-register against existing non-password credential (for example, MFA or FIDO) and revoke **remember MFA on the device**, which prompts for MFA on the next sign-in of users who are non-administrators or assigned the following roles only:
69+
6970
* Authentication Administrator
7071
* Directory Readers
7172
* Guest Inviter
@@ -134,7 +135,7 @@ Users in this role can enable, disable, and delete devices in Azure AD and read
134135

135136
### [Compliance Administrator](#compliance-administrator-permissions)
136137

137-
Users with this role have permissions to manage compliance-related features in the Microsoft 365 compliance center, Microsoft 365 admin center, Azure, and Office 365 Security & Compliance Center. Assignees can also create support tickets for Azure and Microsoft 365. More information is available at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d).
138+
Users with this role have permissions to manage compliance-related features in the Microsoft 365 compliance center, Microsoft 365 admin center, Azure, and Office 365 Security & Compliance Center. Assignees can also manage all features within the Exchange admin center and Teams & Skype for Business admin centers and create support tickets for Azure and Microsoft 365. More information is available at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d).
138139

139140
In | Can do
140141
----- | ----------
@@ -759,7 +760,10 @@ Can read and manage compliance configuration and reports in Azure AD and Office
759760
| microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets. |
760761
| microsoft.office365.webPortal/allEntities/basic/read | Read basic properties on all resources in microsoft.office365.webPortal. |
761762
| microsoft.office365.complianceManager/allEntities/allTasks | Manage all aspects of Office 365 Compliance Manager |
763+
| microsoft.office365.exchange/allEntities/allTasks | Manage all aspects of Exchange Online. |
762764
| microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Office 365 Service Health. |
765+
| microsoft.office365.sharepoint/allEntities/allTasks | Create and delete all resources, and read and update standard properties in microsoft.office365.sharepoint. |
766+
| microsoft.office365.skypeForBusiness/allEntities/allTasks | Manage all aspects of Skype for Business Online. |
763767
| microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Office 365 support tickets. |
764768

765769
### Compliance Data Administrator permissions
@@ -779,7 +783,10 @@ Creates and manages compliance content.
779783
| microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets. |
780784
| microsoft.office365.webPortal/allEntities/basic/read | Read basic properties on all resources in microsoft.office365.webPortal. |
781785
| microsoft.office365.complianceManager/allEntities/allTasks | Manage all aspects of Office 365 Compliance Manager |
786+
| microsoft.office365.exchange/allEntities/allTasks | Manage all aspects of Exchange Online. |
782787
| microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Office 365 Service Health. |
788+
| microsoft.office365.sharepoint/allEntities/allTasks | Create and delete all resources, and read and update standard properties in microsoft.office365.sharepoint. |
789+
| microsoft.office365.skypeForBusiness/allEntities/allTasks | Manage all aspects of Skype for Business Online. |
783790
| microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Office 365 support tickets. |
784791

785792
### Conditional Access Administrator permissions
@@ -1750,8 +1757,31 @@ The following roles should not be used. They have been deprecated and will be re
17501757
* Mailbox Administrator
17511758
* Workplace Device Join
17521759

1760+
## Roles not shown in the portal
1761+
1762+
Not every role returned by PowerShell or MS Graph API is visible in Azure portal. The following table organizes those differences.
1763+
1764+
API name | Azure portal name | Notes
1765+
-------- | ------------------- | -------------
1766+
Company Administrator | Global Administrator | [Name changed for better clarity](directory-assign-admin-roles.md#role-template-ids)
1767+
CRM Service Administrator | Dynamics 365 administrator | [Reflects current product branding](directory-assign-admin-roles.md#role-template-ids)
1768+
Device Join | Deprecated | [Deprecated roles documentation](directory-assign-admin-roles.md#deprecated-roles)
1769+
Device Managers | Deprecated | [Deprecated roles documentation](directory-assign-admin-roles.md#deprecated-roles)
1770+
Device Users | Deprecated | [Deprecated roles documentation](directory-assign-admin-roles.md#deprecated-roles)
1771+
Directory Synchronization Accounts | Not shown because it shouldn't be used | [Directory Synchronization Accounts documentation](directory-assign-admin-roles.md#directory-synchronization-accounts)
1772+
Directory Writers | Not shown because it shouldn't be used | [Directory Writers documentation](directory-assign-admin-roles.md#directory-writers)
1773+
Guest User | Not shown because it can't be used | NA
1774+
Lync Service Administrator | Skype for Business administrator | [Reflects current product branding](directory-assign-admin-roles.md#role-template-ids)
1775+
Partner Tier 1 Support | Not shown because it shouldn't be used | [Partner Tier1 Support documentation](directory-assign-admin-roles.md#partner-tier1-support)
1776+
Partner Tier 2 Support | Not shown because it shouldn't be used | [Partner Tier2 Support documentation](directory-assign-admin-roles.md#partner-tier2-support)
1777+
Printer Administrator | Work in progress | Work in progress
1778+
Printer Technician | Work in progress | Work in progress
1779+
Restricted Guest User | Not shown because it can't be used | NA
1780+
User | Not shown because it can't be used | NA
1781+
Workplace Device Join | Deprecated | [Deprecated roles documentation](directory-assign-admin-roles.md#deprecated-roles)
1782+
17531783
## Next steps
17541784

1755-
* To learn more about how to assign a user as an administrator of an Azure subscription, see [Manage access using RBAC and the Azure portal](../../role-based-access-control/role-assignments-portal.md)
1756-
* To learn more about how resource access is controlled in Microsoft Azure, see [Understanding resource access in Azure](../../role-based-access-control/rbac-and-directory-admin-roles.md)
1785+
* To learn more about how to assign a user as an administrator of an Azure subscription, see [Manage access using Azure roles (Azure RBAC)](../../role-based-access-control/role-assignments-portal.md)
1786+
* To learn more about how resource access is controlled in Microsoft Azure, see [Understand the different roles](../../role-based-access-control/rbac-and-directory-admin-roles.md)
17571787
* For more information on how Azure Active Directory relates to your Azure subscription, see [How Azure subscriptions are associated with Azure Active Directory](../fundamentals/active-directory-how-subscriptions-associated-directory.md)

0 commit comments

Comments
 (0)