Skip to content

Commit 8e27127

Browse files
authored
Merge pull request #93077 from MicrosoftDocs/master
10/23 PM Publish
2 parents ec2b75b + ed187e2 commit 8e27127

File tree

180 files changed

+2184
-1160
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

180 files changed

+2184
-1160
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42602,6 +42602,16 @@
4260242602
"source_path": "articles/security/fundamentals/mvp.md",
4260342603
"redirect_url": "https://mvp.microsoft.com/",
4260442604
"redirect_document_id": false
42605+
},
42606+
{
42607+
"source_path": "articles/azure-cache-for-redis/cache-how-to-troubleshoot.md",
42608+
"redirect_url": "/azure/azure-cache-for-redis/cache-troubleshoot-server",
42609+
"redirect_document_id": false
42610+
},
42611+
{
42612+
"source_path": "articles/azure-cache-for-redis/cache-howto-manage-redis-cache-powershell.md",
42613+
"redirect_url": "/azure/azure-cache-for-redis/cache-how-to-manage-redis-cache-powershell",
42614+
"redirect_document_id": false
4260542615
}
4260642616
]
4260742617
}

articles/active-directory/authentication/active-directory-passwords-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ A best practice when you troubleshoot problems with password writeback is to ins
140140
| 33001| ADUnKnownError| This event indicates that there was an unknown error returned by Active Directory. Check the Azure AD Connect server event log for events from the ADSync source for more information.|
141141
| 33002| ADUserNotFoundError| This event indicates that the user who is trying to reset or change a password was not found in the on-premises directory. This error can occur when the user has been deleted on-premises but not in the cloud. This error can also occur if there is a problem with sync. Check your sync logs and the last few sync run details for more information.|
142142
| 33003| ADMutliMatchError| When a password reset or change request originates from the cloud, we use the cloud anchor specified during the setup process of Azure AD Connect to determine how to link that request back to a user in your on-premises environment. This event indicates that we found two users in your on-premises directory with the same cloud anchor attribute. Check your sync logs and the last few sync run details for more information.|
143-
| 33004| ADPermissionsError| This event indicates that the Active Directory Management Agent (ADMA) service account does not have the appropriate permissions on the account in question to set a new password. Ensure that the ADMA account in the user’s forest has reset and change password permissions on all objects in the forest. For more information on how to set the permissions, see Step 4: Set up the appropriate Active Directory permissions.|
143+
| 33004| ADPermissionsError| This event indicates that the Active Directory Management Agent (ADMA) service account does not have the appropriate permissions on the account in question to set a new password. Ensure that the ADMA account in the user’s forest has reset and change password permissions on all objects in the forest. For more information on how to set the permissions, see Step 4: Set up the appropriate Active Directory permissions. This error could also occur when the user's attribute AdminCount is set to 1.|
144144
| 33005| ADUserAccountDisabled| This event indicates that we attempted to reset or change a password for an account that was disabled on-premises. Enable the account and try the operation again.|
145145
| 33006| ADUserAccountLockedOut| This event indicates that we attempted to reset or change a password for an account that was locked out on-premises. Lockouts can occur when a user has tried a change or reset password operation too many times in a short period. Unlock the account and try the operation again.|
146146
| 33007| ADUserIncorrectPassword| This event indicates that the user specified an incorrect current password when performing a password change operation. Specify the correct current password and try again.|

articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,11 @@ Before you can block legacy authentication in your directory, you need to first
3030

3131
1. Navigate to the Azure portal > Azure Active Directory > Sign-ins.
3232
1. Add the Client App column if it is not shown by clicking on Columns > Client App.
33-
1. Filter by Client App > Other Clients and click Apply.
33+
1. Filter by Client App > check all the Other Client options presented and click Apply.
34+
1. Filter by Status > Success and click Apply.
35+
1. Expand your date range if necessary using the Date filter.
3436

35-
Filtering will only show you sign-in attempts that were made by legacy authentication protocols. Clicking on each individual sign-in attempt will show you additional details. The Client App field under the Basic Info tab will indicate which legacy authentication protocol was used.
37+
Filtering will only show you successful sign-in attempts that were made by the selected legacy authentication protocols. Clicking on each individual sign-in attempt will show you additional details. The Client App column or the Client App field under the Basic Info tab after selecting an individual row of data will indicate which legacy authentication protocol was used.
3638
These logs will indicate which users are still depending on legacy authentication and which applications are using legacy protocols to make authentication requests. For users that do not appear in these logs and are confirmed to not be using legacy authentication, implement a Conditional Access policy or enable the Baseline policy: block legacy authentication for these users only.
3739

3840
## Moving away from legacy authentication

articles/active-directory/develop/quickstart-v2-java-webapp.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -100,19 +100,20 @@ To run this sample you will need:
100100
>
101101
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
102102
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
103+
> - `Enter_the_Tenant_Name_Here` - is the **Directory (tenant) ID** value of the application you registered.
103104
104105
#### Step 4: Run the code sample
105106
1. Run the code sample, and open a browser and navigate to *http://localhost:8080*.
106107
1. The front page contains a **sign-in** button. Click on the **sign-in** button to redirect to Azure Active Directory. The user will be prompted for their credentials.
107-
1. After successfully authenticating on Azure Active Directory, they will be redirected to *http://localhost:8080/msal4jsamples/secure/aad*. They are officially signed in to the application, and the page should show information for the signed in account. It will also contain buttons for:
108+
1. After successfully authenticating on Azure Active Directory, they will be redirected to *http://localhost:8080/msal4jsamples/secure/aad*. They are officially signed in to the application, and the page should show information for the signed in account. It will also contain buttons for:
108109
- *Sign Out*: Will sign out the current user from the application, and redirect them the home page.
109110
- *Show Users*: Will acquire a token for the Microsoft Graph, then call the Microsoft Graph with the token attached to the request to get all of the users in the tenant.
110111

111112
## More information
112113

113114
### Getting MSAL
114-
MSAL4J is the library used to sign in users and request tokens used to access an API protected by the Microsoft identity Platform.
115-
You can add MSAL4J to your application by using Maven or Gradle to manage your dependencies by making the following changes to the pom.xml or build.gradle file in your application.
115+
MSAL4J is the library used to sign in users and request tokens used to access an API protected by the Microsoft identity Platform.
116+
You can add MSAL4J to your application by using Maven or Gradle to manage your dependencies by making the following changes to the pom.xml or build.gradle file in your application.
116117

117118
```XML
118119
<dependency>

articles/active-directory/develop/quickstart-v2-python-webapp.md

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,15 +97,17 @@ To run this sample, you will need:
9797
1. Open the **app_config.py** file, which can be found in the root folder and replace with the following code snippet:
9898

9999
```python
100-
CLIENT_SECRET = "Enter_the_Client_Secret_Here"
101100
CLIENT_ID = "Enter_the_Application_Id_here"
101+
CLIENT_SECRET = "Enter_the_Client_Secret_Here"
102+
AUTHORITY = "https://login.microsoftonline.com/Enter_the_Tenant_Name_Here"
102103
```
103104

104105
> [!div renderon="docs"]
105106
> Where:
106107
>
107108
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
108109
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
110+
> - `Enter_the_Tenant_Name_Here` - is the **Directory (tenant) ID** value of the application you registered.
109111
110112
#### Step 4: Run the code sample
111113

@@ -120,6 +122,25 @@ CLIENT_ID = "Enter_the_Application_Id_here"
120122
```Shell
121123
python app.py
122124
```
125+
> [!IMPORTANT]
126+
> This quickstart application uses a client secret to identify itself as confidential client. Because the client secret is added as a plain-text to your project files, for security reasons, it is recommended that you use a certificate instead of a client secret before considering the application as production application. For more information on how to use a certificate, see [these instructions](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-certificate-credentials).
127+
128+
## More information
129+
130+
### Getting MSAL
131+
MSAL is the library used to sign in users and request tokens used to access an API protected by the Microsoft identity Platform.
132+
You can add MSAL Python to your application using Pip.
133+
134+
```Shell
135+
pip install msal
136+
```
137+
138+
### MSAL initialization
139+
You can add the reference to MSAL Python by adding the following code to the top of the file where you will be using MSAL:
140+
141+
```Python
142+
import msal
143+
```
123144

124145
## Next steps
125146

articles/active-directory/develop/sample-v2-code.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,8 @@ These samples show how to write a single-page application secured with Microsoft
4646
| ![This image shows the JavaScript logo](media/sample-v2-code/logo_js.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core) | Calls Microsoft Graph |[javascript-graphapi-web-v2](https://github.com/Azure-Samples/active-directory-javascript-graphapi-web-v2) |
4747
| ![This image shows the JavaScript logo](media/sample-v2-code/logo_js.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core) | Calls B2C |[b2c-javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp) |
4848
| ![This image shows the JavaScript logo](media/sample-v2-code/logo_js.png) [JavaScript (msal.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-core) | Calls own web API |[javascript-singlepageapp-dotnet-webapi-v2](https://github.com/Azure-Samples/active-directory-javascript-singlepageapp-dotnet-webapi-v2) |
49-
| ![This image shows the Angular JS logo](media/sample-v2-code/logo_angular.png) [JavaScript (MSAL AngularJS)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-angularjs)| Calls Microsoft Graph | [MsalAngularjsDemoApp](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-angularjs/samples/MsalAngularjsDemoApp)
50-
| ![This image shows the Angular logo](media/sample-v2-code/logo_angular.png) [JavaScript (MSAL Angular)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-angular)| Calls Microsoft Graph | [MSALAngularDemoApp](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-angular/samples/MSALAngularDemoApp) |
49+
| ![This image shows the Angular JS logo](media/sample-v2-code/logo_angular.png) [JavaScript (MSAL AngularJS)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-angularjs)| Calls Microsoft Graph | [MsalAngularjsDemoApp](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/MsalAngularjsDemoApp)
50+
| ![This image shows the Angular logo](media/sample-v2-code/logo_angular.png) [JavaScript (MSAL Angular)](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-angular)| Calls Microsoft Graph | [MSALAngularDemoApp](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/MSALAngularDemoApp) |
5151

5252
## Web applications
5353

articles/active-directory/reports-monitoring/concept-usage-insights-report.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Usage and insights report in the Azure Active Directory portal | Microsoft Docs
2+
title: Usage and insights report | Microsoft Docs
33
description: Introduction to usage and insights report in the Azure Active Directory portal
44
services: active-directory
55
documentationcenter: ''

articles/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Analyze Azure Active Directory activity logs using Azure Monitor logs | Microsoft Docs
2+
title: Analyze activity logs using Azure Monitor logs | Microsoft Docs
33
description: Learn how to analyze Azure Active Directory activity logs using Azure Monitor logs
44
services: active-directory
55
documentationcenter: ''

articles/active-directory/reports-monitoring/howto-find-activity-reports.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22

3-
title: Find Azure Active Directory user activity reports in Azure portal | Microsoft Docs
3+
title: Find user activity reports in Azure portal | Microsoft Docs
44
description: Learn where the Azure Active Directory user activity reports are in the Azure portal.
55
services: active-directory
66
documentationcenter: ''

articles/active-directory/reports-monitoring/howto-install-use-log-analytics-views.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to install and use the log analytics views for Azure Active Directory | Microsoft Docs
2+
title: How to install and use the log analytics views | Microsoft Docs
33
description: Learn how to install and use the log analytics views for Azure Active Directory
44
services: active-directory
55
documentationcenter: ''

0 commit comments

Comments
 (0)