Skip to content

Commit 8f2940d

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents ca49bf3 + 4759ff8 commit 8f2940d

File tree

136 files changed

+1863
-753
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

136 files changed

+1863
-753
lines changed

articles/active-directory/develop/howto-configure-publisher-domain.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 06/23/2021
12+
ms.date: 11/11/2022
1313
ms.author: ryanwi
14-
ms.reviewer: lenalepa, sureshja, zachowd
14+
ms.reviewer: xurobert, brianokoyo
1515
ms.custom: contperf-fy21q4, aaddev
1616
---
1717

articles/active-directory/develop/index.yml

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ metadata:
1616
author: Dickson-Mwendia
1717
manager: CelesteDG
1818
ms.author: dmwendia
19-
ms.date: 04/01/2022
19+
ms.date: 11/11/2022
2020
ms.service: active-directory
2121
ms.subservice: develop
2222
ms.topic: hub-page
@@ -27,20 +27,29 @@ metadata:
2727
highlightedContent:
2828
items:
2929
- title: What is the Microsoft identity platform?
30-
itemType: overview # controls the icon image and super-title text
30+
itemType: overview
3131
url: v2-overview.md
3232
- title: Authentication & authorization basics
3333
url: authentication-vs-authorization.md
3434
itemType: concept
35-
# - title: OAuth 2.0 and OpenID Connect (OIDC)
36-
# url: active-directory-v2-protocols.md
37-
# itemType: concept
3835
- title: App types and authentication flows
3936
url: authentication-flows-app-scenarios.md
4037
itemType: concept
4138
- title: Code samples
4239
url: sample-v2-code.md
4340
itemType: sample
41+
- title: What's new in docs
42+
url: whats-new-docs.md
43+
itemType: whats-new
44+
- title: OAuth 2.0 and OpenID Connect (OIDC)
45+
url: active-directory-v2-protocols.md
46+
itemType: concept
47+
- title: Migrate apps to MSAL
48+
url: msal-migration.md
49+
itemType: concept
50+
- title: Register an application
51+
url: quickstart-register-app.md
52+
itemType: quickstart
4453
## BAND 1 - HIGHLIGHTED CONTENT END ##########################################################################################################################
4554

4655

@@ -88,7 +97,7 @@ productDirectory:
8897
## BAND 3 - CONCEPTUAL CONTENT #############################################################################################################################
8998
conceptualContent:
9099
title: Get started
91-
summary: Quick access to documentation for adding core IAM features to your applications and guidance on the best practices for keeping your apps secure and available.
100+
summary: Quick access to guidance on adding core IAM features to your applications and best practices for keeping your apps secure and available.
92101
items:
93102
## CARD 1 ######################
94103
- title: Sign in users

articles/active-directory/develop/mark-app-as-publisher-verified.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,10 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 09/27/2021
11+
ms.date: 11/12/2022
1212
ms.author: ryanwi
1313
ms.custom: aaddev
14-
ms.reviewer: ardhanap, jesakowi
14+
ms.reviewer: xurobert, brianokoyo, ardhanap
1515
---
1616

1717
# Mark your app as publisher verified

articles/active-directory/develop/scenario-web-app-sign-user-sign-in.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ In ASP.NET Core, for Microsoft identity platform applications, the **Sign in** b
5454

5555
# [ASP.NET](#tab/aspnet)
5656

57-
In ASP.NET MVC, the sign-out button is exposed in `Views\Shared\_LoginPartial.cshtml`. It's displayed only when there's an authenticated account. That is, it's displayed when the user has previously signed in.
57+
In ASP.NET MVC, the **Sign in** button is exposed in `Views\Shared\_LoginPartial.cshtml`. It's displayed only when the user isn't authenticated. That is, it's displayed when the user hasn't yet signed in or has signed out.
5858

5959
```html
6060
@if (Request.IsAuthenticated)
@@ -125,7 +125,7 @@ This controller also handles the Azure AD B2C applications.
125125

126126
# [ASP.NET](#tab/aspnet)
127127

128-
In ASP.NET, signing out is triggered from the `SignOut()` method on a controller (for instance, [AccountController.cs#L16-L23](https://github.com/Azure-Samples/ms-identity-aspnet-webapp-openidconnect/blob/a2da310539aa613b77da1f9e1c17585311ab22b7/WebApp/Controllers/AccountController.cs#L16-L23)). This method isn't part of the ASP.NET framework (contrary to what happens in ASP.NET Core). It sends an OpenID sign-in challenge after proposing a redirect URI.
128+
In ASP.NET, Sign in is triggered from the `SignIn()` method on a controller (for instance, [AccountController.cs#L16-L23](https://github.com/Azure-Samples/ms-identity-aspnet-webapp-openidconnect/blob/a2da310539aa613b77da1f9e1c17585311ab22b7/WebApp/Controllers/AccountController.cs#L16-L23)). This method isn't part of the ASP.NET framework (contrary to what happens in ASP.NET Core). It sends an OpenID sign-in challenge after proposing a redirect URI.
129129

130130
```csharp
131131
public void SignIn()

articles/active-directory/external-identities/reset-redemption-status.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: how-to
10-
ms.date: 06/16/2022
10+
ms.date: 11/11/2022
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -28,13 +28,21 @@ In this article, you'll learn how to update the [guest user's](user-properties.m
2828

2929
To manage these scenarios previously, you had to manually delete the guest user’s account from your directory and reinvite the user. Now you can use the Azure portal, PowerShell or the Microsoft Graph invitation API to reset the user's redemption status and reinvite the user while keeping the user's object ID, group memberships, and app assignments. When the user redeems the new invitation, the [UPN](../hybrid/plan-connect-userprincipalname.md#what-is-userprincipalname) of the user doesn't change, but the user's sign-in name changes to the new email. Then the user can sign in using the new email or an email you've added to the `otherMails` property of the user object.
3030

31+
## Required Azure AD roles
32+
33+
To reset a user's redemption status, you'll need one of the following roles:
34+
35+
- [Guest Inviter](../roles/permissions-reference.md#guest-inviter) (least privileged)
36+
- [User Administrator](../roles/permissions-reference.md#user-administrator)
37+
- [Global Administrator](../roles/permissions-reference.md#global-administrator)
38+
3139
## Use the Azure portal to reset redemption status
3240

33-
1. Sign in to the [Azure portal](https://portal.azure.com/) using a Global administrator or User administrator account for the directory.
34-
1. Search for and select **Azure Active Directory**.
35-
1. Select **Users**.
36-
1. In the list, select the user's name to open their user profile.
37-
1. If the user wants to sign in using a different email:
41+
1. Sign in to the [Azure portal](https://portal.azure.com/) using an account that has one of the [required Azure AD roles](#required-azure-ad-roles).
42+
2. Search for and select **Azure Active Directory**.
43+
3. Select **Users**.
44+
4. In the list, select the user's name to open their user profile.
45+
5. If the user wants to sign in using a different email:
3846
- Select **Edit properties**.
3947
- Select the **Contact Information** tab.
4048
- Next to **Email**, type the new email.

articles/active-directory/governance/lifecycle-workflow-tasks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -301,7 +301,7 @@ For Microsoft Graph the parameters for the **Run a Custom Task Extension** task
301301
|category | joiner, leaver |
302302
|displayName | Run a Custom Task Extension (Customizable by user) |
303303
|description | Run a Custom Task Extension to call-out to an external system. (Customizable by user) |
304-
|taskDefinitionId | "d79d1fcc-16be-490c-a865-f4533b1639ee |
304+
|taskDefinitionId | d79d1fcc-16be-490c-a865-f4533b1639ee |
305305
|argument | Argument contains a name parameter that is the "customTaskExtensionID", and a value parameter that is the ID of the previously created extension that contains information about the Logic App. |
306306

307307

articles/active-directory/hybrid/four-steps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ Security logs and reports provide you with an electronic record of suspicious ac
164164

165165
### Assign least privileged admin roles for operations
166166

167-
As you think about your approach to operations, there are a couple levels of administration to consider. The first level places the burden of administration on your global administrator(s). Always using the global administrator role, might be appropriate for smaller companies. But for larger organizations with help desk personnel and administrators responsible for specific tasks, assigning the role of global administrator can be a security risk since it provides those individuals with the ability to manage tasks that are above and beyond what they should be capable of doing.
167+
As you think about your approach to operations, there are a couple levels of administration to consider. The first level places the burden of administration on your Hybrid Identity Administrator(s). Always using the Hybrid Identity Administrator role, might be appropriate for smaller companies. But for larger organizations with help desk personnel and administrators responsible for specific tasks, assigning the role of Hybrid Identity Administrator can be a security risk since it provides those individuals with the ability to manage tasks that are above and beyond what they should be capable of doing.
168168

169169
In this case, you should consider the next level of administration. Using Azure AD, you can designate end users as "limited administrators" who can manage tasks in less-privileged roles. For example, you might assign your help desk personnel the [security reader](../roles/permissions-reference.md#security-reader) role to provide them with the ability to manage security-related features with read-only access. Or perhaps it makes sense to assign the [authentication administrator](../roles/permissions-reference.md#authentication-administrator) role to individuals to give them the ability to reset non-password credentials or read and configure Azure Service Health.
170170

articles/active-directory/hybrid/how-to-bypassdirsyncoverrides.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,4 +138,4 @@ Clear-ADSyncToolsDirSyncOverridesUser '[email protected]' -MobilePhoneInAAD -Alt
138138

139139
## Next Steps
140140

141-
Learn more about [Azure AD Connect: ADSyncTools PowerShell Module](reference-connect-adsynctools.md)
141+
Learn more about [Azure AD Connect: ADSyncTools PowerShell Module](reference-connect-adsynctools.md)

articles/active-directory/hybrid/how-to-connect-create-custom-sync-rule.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ services: active-directory
55
documentationcenter: ''
66
author: billmath
77
manager: amycolannino
8-
editor: curtand
98
ms.service: active-directory
109
ms.workload: identity
1110
ms.tgt_pltfrm: na

articles/active-directory/hybrid/how-to-connect-device-writeback.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ services: active-directory
55
documentationcenter: ''
66
author: billmath
77
manager: amycolannino
8-
editor: curtand
98
ms.assetid: c0ff679c-7ed5-4d6e-ac6c-b2b6392e7892
109
ms.service: active-directory
1110
ms.workload: identity

0 commit comments

Comments
 (0)