Skip to content

Commit 8ed88ab

Browse files
authored
Merge pull request #228254 from MicrosoftDocs/main
2/22 PM Publish
2 parents 8e6ea77 + 95fc7a1 commit 8ed88ab

File tree

178 files changed

+2042
-954
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

178 files changed

+2042
-954
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,16 @@
3030
"redirect_url": "/azure/azure-monitor/change/change-analysis",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path_from_root": "/articles/azure-monitor/app/visual-studio.md",
35+
"redirect_url": "https://learn.microsoft.com/visualstudio/azure/azure-app-insights-add-connected-service",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/visual-studio-codelens.md",
40+
"redirect_url": "https://learn.microsoft.com/visualstudio/azure/azure-app-insights-add-connected-service",
41+
"redirect_document_id": false
42+
},
3343
{
3444
"source_path_from_root": "/articles/azure-monitor/app/javascript-react-plugin.md",
3545
"redirect_url": "/azure/azure-monitor/app/javascript-framework-extensions",

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 11/04/2022
11+
ms.date: 02/22/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -74,7 +74,7 @@ The following table lists an example of required attributes:
7474
|lastName|name.familyName|surName|
7575
|workMail|emails[type eq “work”].value|Mail|
7676
|manager|manager|manager|
77-
|tag|urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:tag|extensionAttribute1|
77+
|tag|`urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:tag`|extensionAttribute1|
7878
|status|active|isSoftDeleted (computed value not stored on user)|
7979

8080
The following JSON payload shows an example SCIM schema:
@@ -117,7 +117,7 @@ It helps to categorize between `/User` and `/Group` to map any default user attr
117117

118118
The following table lists an example of user attributes:
119119

120-
| Azure AD user | urn:ietf:params:scim:schemas:extension:enterprise:2.0:User |
120+
| Azure AD user | `urn:ietf:params:scim:schemas:extension:enterprise:2.0:User` |
121121
| --- | --- |
122122
| IsSoftDeleted |active |
123123
|department| `urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department`|
@@ -140,7 +140,7 @@ The following table lists an example of user attributes:
140140

141141
The following table lists an example of group attributes:
142142

143-
| Azure AD group | urn:ietf:params:scim:schemas:core:2.0:Group |
143+
| Azure AD group | `urn:ietf:params:scim:schemas:core:2.0:Group` |
144144
| --- | --- |
145145
| displayName |displayName |
146146
| members |members |

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ metadata:
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: faq
10-
ms.date: 10/05/2022
10+
ms.date: 02/21/2023
1111
ms.author: justinha
12-
author: vimrang
12+
author: justinha
1313
manager: amycolannino
1414
ms.reviewer: vimrang
1515
ms.collection: M365-identity-device-management
@@ -69,7 +69,7 @@ sections:
6969
7070
Use the [Set-AzureADTrustedCertificateAuthority](/powershell/module/azuread/set-azureadtrustedcertificateauthority) cmdlet:
7171
72-
```powershell
72+
```PowerShell
7373
$c=Get-AzureADTrustedCertificateAuthority
7474
$c[0]. crlDistributionPoint=""
7575
Set-AzureADTrustedCertificateAuthority -CertificateAuthorityInformation $c[0]
@@ -120,14 +120,14 @@ sections:
120120
The browser caches the certificate after the certificate picker appears. If the user retries, the cached certificate is used automatically. The user should close the browser, and reopen a new session to try CBA again.
121121
122122
- question: |
123-
Why does not proof up for registering other auth methods come up when I use single factor certificates?
123+
Why doesn't proof up for registering other auth methods come up when I use single factor certificates?
124124
answer: |
125-
A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods and should have MFA via another method to register other available auth methods.
125+
A user is considered capable for MFA when the user is in scope for **Certificate-based authentication** in the Authentication methods policy. This policy requirement means a user can't use proof up as part of their authentication to register other available methods.
126126
127127
- question: |
128128
How can I use single-factor certificates to complete MFA?
129129
answer: |
130-
We have support for single factor CBA to get MFA. CBA SF + PSI (passwordless phone sign in) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
130+
We have support for single factor CBA to get MFA. CBA SF + passwordless phone sign-in (PSI) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
131131
[MFA with single factor certificates](../authentication/concept-certificate-based-authentication-technical-deep-dive.md#mfa-authentication-flow-using-single-factor-certificates-and-passwordless-sign-in)
132132
133133
- question: |
@@ -146,7 +146,16 @@ sections:
146146
GET https://graph.microsoft.com/v1.0/users?$filter=certificateUserIds/any(x:x eq '[email protected]')
147147
```
148148
149-
149+
- question: |
150+
After a CRL endpoint is configured, end users aren't able to sign in and they see the following diagnostic message:
151+
152+
```http
153+
AADSTS500173: Unable to download CRL. Invalid status code Forbidden from CRL distribution point
154+
errorCode: 500173
155+
```
156+
157+
answer: |
158+
This is commonly seen when a firewall rule setting blocks access to the CRL endpoint.
150159
151160
additionalContent: |
152161
## Next steps

articles/active-directory/develop/desktop-quickstart-portal-nodejs-desktop.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,8 @@ ms.custom: mode-api
3737
>
3838
> #### Step 1: Configure the application in Azure portal
3939
> For the code sample for this quickstart to work, you need to add a reply URL as **msal://redirect**.
40-
> > [!div class="nextstepaction"]
41-
> > [Make this change for me]()
40+
>
41+
> <button id="makechanges" class="nextstepaction configure-app-button"> Make these changes for me </button>
4242
>
4343
> > [!div id="appconfigured" class="alert alert-info"]
4444
> > ![Already configured](media/quickstart-v2-windows-desktop/green-check.png) Your application is configured with these attributes.

articles/active-directory/develop/publisher-verification-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ App developers must meet a few requirements to complete the publisher verificati
5858

5959
- The app must be registered in an Azure AD tenant and have a [publisher domain](howto-configure-publisher-domain.md) set.
6060

61-
- The domain of the email address that's used during MPN account verification must either match the publisher domain that's set for the app or be a DNS-verified [custom domain](../fundamentals/add-custom-domain.md) that's added to the Azure AD tenant.
61+
- The domain of the email address that's used during MPN account verification must either match the publisher domain that's set for the app or be a DNS-verified [custom domain](../fundamentals/add-custom-domain.md) that's added to the Azure AD tenant. (**NOTE**__: the app's publisher domain can't be *.onmicrosoft.com to be publisher verified)
6262

6363
- The user who initiates verification must be authorized to make changes both to the app registration in Azure AD and to the MPN account in Partner Center. The user who initiates the verification must have one of the required roles in both Azure AD and Partner Center.
6464

articles/active-directory/develop/spa-quickstart-portal-javascript-auth-code.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ ms.custom: aaddev, "scenarios:getting-started", "languages:JavaScript", devx-tra
4343
>
4444
> <button id="makechanges" class="nextstepaction configure-app-button"> Make these changes for me </button>
4545
>
46-
> > [!div class="alert alert-info"]
46+
> > [!div id="appconfigured" class="alert alert-info"]
4747
> > ![Already configured](media/quickstart-v2-javascript/green-check.png) Your application is configured with these attributes.
4848
>
4949
> ### Step 2: Download the project
@@ -102,4 +102,4 @@ ms.custom: aaddev, "scenarios:getting-started", "languages:JavaScript", devx-tra
102102
> For a more detailed step-by-step guide on building the application used in this quickstart, see the following tutorial:
103103
>
104104
> > [!div class="nextstepaction"]
105-
> > [Tutorial: Sign in users and call Microsoft Graph](./tutorial-v2-javascript-auth-code.md)
105+
> > [Tutorial: Sign in users and call Microsoft Graph](./tutorial-v2-javascript-auth-code.md)

articles/active-directory/develop/web-app-quickstart-portal-aspnet-core.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ ms.custom: devx-track-csharp, aaddev, identityplatformtop40, "scenarios:getting-
3636
> - For **Front-channel logout URL**, enter **https://localhost:44321/signout-oidc**.
3737
>
3838
> The authorization endpoint will issue request ID tokens.
39+
>
3940
> <button id="makechanges" class="nextstepaction configure-app-button"> Make these changes for me </button>
4041
>
4142
> > [!div id="appconfigured" class="alert alert-info"]
@@ -129,4 +130,4 @@ ms.custom: devx-track-csharp, aaddev, identityplatformtop40, "scenarios:getting-
129130
> - Sign in users in national clouds or with social identities.
130131
>
131132
> > [!div class="nextstepaction"]
132-
> > [ASP.NET Core web app tutorials on GitHub](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/)
133+
> > [ASP.NET Core web app tutorials on GitHub](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/)

articles/active-directory/develop/web-app-quickstart-portal-java.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,7 @@ ms.custom: aaddev, "scenarios:getting-started", "languages:Java", devx-track-jav
4343
>
4444
> 1. Add reply URLs `https://localhost:8443/msal4jsample/secure/aad` and `https://localhost:8443/msal4jsample/graph/me`.
4545
> 1. Create a client secret.
46+
>
4647
> <button id="makechanges" class="nextstepaction configure-app-button"> Make these changes for me </button>
4748
>
4849
> > [!div id="appconfigured" class="alert alert-info"]

articles/active-directory/develop/web-app-quickstart-portal-node-js.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ ms.custom: aaddev, "scenarios:getting-started", "languages:js", devx-track-js, m
4040
>
4141
> #### Step 1: Configure the application in Azure portal
4242
> For the code sample for this quickstart to work, you need to create a client secret and add the following reply URL: `http:/> /localhost:3000/redirect`.
43+
>
4344
> <button id="makechanges" class="nextstepaction configure-app-button"> Make these changes for me </button>
4445
>
4546
> > [!div id="appconfigured" class="alert alert-info"]
@@ -86,4 +87,4 @@ ms.custom: aaddev, "scenarios:getting-started", "languages:js", devx-track-js, m
8687
> ## Next steps
8788
>
8889
> > [!div class="nextstepaction"]
89-
> > [Adding Auth to an existing web app - GitHub code sample >](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/auth-code)
90+
> > [Adding Auth to an existing web app - GitHub code sample >](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/auth-code)

0 commit comments

Comments
 (0)