Skip to content

Commit 9137240

Browse files
authored
Merge pull request #225437 from MicrosoftDocs/main
1/27 PM Publish
2 parents eaceca3 + 8d76c83 commit 9137240

File tree

427 files changed

+3378
-8969
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

427 files changed

+3378
-8969
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -999,6 +999,7 @@
999999
"articles/iot-dps/.openpublishing.redirection.iot-dps.json",
10001000
"articles/cloud-shell/.openpublishing.redirection.cloud-shell.json",
10011001
".openpublishing.redirection.azure-vmware.json",
1002-
".openpublishing.redirection.openshift.json"
1002+
".openpublishing.redirection.openshift.json",
1003+
".openpublishing.redirection.dev-box.json"
10031004
]
10041005
}

.openpublishing.redirection.azure-productivity.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,6 @@
3030
"redirect_url": "/azure/devtest-labs/samples-powershell",
3131
"redirect_document_id": false
3232
},
33-
{
34-
"source_path": "articles/dev-box/tutorial-connect-to-dev-box-with-remote-desktop-app.md",
35-
"redirect_url": "/azure/dev-box/quickstart-connect-to-dev-box-with-remote-desktop-app",
36-
"redirect_document_id": false
37-
},
3833
{
3934
"source_path": "articles/lab-services/how-to-create-schedules-within-teams.md",
4035
"redirect_url": "/azure/lab-services/how-to-manage-labs-within-teams",
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path": "articles/dev-box/tutorial-connect-to-dev-box-with-remote-desktop-app.md",
5+
"redirect_url": "/azure/dev-box/quickstart-connect-to-dev-box-with-remote-desktop-app",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/dev-box/quickstart-configure-dev-box-project.md",
10+
"redirect_url": "/azure/dev-box/quickstart-configure-dev-box-service",
11+
"redirect_document_id": false
12+
}
13+
]
14+
}

articles/active-directory-b2c/enable-authentication-react-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ The sample code is made up of the following components. Add these components fro
7777
> [!IMPORTANT]
7878
> If the App component file name is `App.js`, change it to `App.jsx`.
7979
80-
- [src/pages/Hello.jsx](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/pages/Hello.jsx) - Demonstrate how to call a protected resource with OAuth2 bearer token.
80+
- [src/pages/Hello.jsx](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/6-AdvancedScenarios/1-call-api-obo/SPA/src/pages/Hello.jsx) - Demonstrate how to call a protected resource with OAuth2 bearer token.
8181
- It uses the [useMsal](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-react/docs/hooks.md) hook that returns the PublicClientApplication instance.
8282
- With PublicClientApplication instance, it acquires an access token to call the REST API.
8383
- Invokes the [callApiWithToken](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/fetch.js) function to fetch the data from the REST API and renders the result using the **DataDisplay** component.

articles/active-directory/app-proxy/application-proxy-add-on-premises-application.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -212,6 +212,7 @@ Now that you've prepared your environment and installed a connector, you're read
212212
| Field | Description |
213213
| :--------------------- | :----------------------------------------------------------- |
214214
| **Name** | The name of the application that will appear on My Apps and in the Azure portal. |
215+
| **Maintenance Mode** | Select if you would like to enable maintenance mode and temporarily disable access for all users to the application. |
215216
| **Internal URL** | The URL for accessing the application from inside your private network. You can provide a specific path on the backend server to publish, while the rest of the server is unpublished. In this way, you can publish different sites on the same server as different apps, and give each one its own name and access rules.<br><br>If you publish a path, make sure that it includes all the necessary images, scripts, and style sheets for your application. For example, if your app is at `https://yourapp/app` and uses images located at `https://yourapp/media`, then you should publish `https://yourapp/` as the path. This internal URL doesn't have to be the landing page your users see. For more information, see [Set a custom home page for published apps](application-proxy-configure-custom-home-page.md). |
216217
| **External URL** | The address for users to access the app from outside your network. If you don't want to use the default Application Proxy domain, read about [custom domains in Azure AD Application Proxy](./application-proxy-configure-custom-domain.md). |
217218
| **Pre Authentication** | How Application Proxy verifies users before giving them access to your application.<br><br>**Azure Active Directory** - Application Proxy redirects users to sign in with Azure AD, which authenticates their permissions for the directory and application. We recommend keeping this option as the default so that you can take advantage of Azure AD security features like Conditional Access and Multi-Factor Authentication. **Azure Active Directory** is required for monitoring the application with Microsoft Defender for Cloud Apps.<br><br>**Passthrough** - Users don't have to authenticate against Azure AD to access the application. You can still set up authentication requirements on the backend. |
@@ -222,11 +223,11 @@ Now that you've prepared your environment and installed a connector, you're read
222223
| Field | Description |
223224
| :------------------------------ | :----------------------------------------------------------- |
224225
| **Backend Application Timeout** | Set this value to **Long** only if your application is slow to authenticate and connect. At default, the backend application timeout has a length of 85 seconds. When set to long, the backend timeout is increased to 180 seconds. |
225-
| **Use HTTP-Only Cookie** | Set this value to **Yes** to have Application Proxy cookies include the HTTPOnly flag in the HTTP response header. If using Remote Desktop Services, set this value to **No**. |
226-
| **Use Secure Cookie**| Set this value to **Yes** to transmit cookies over a secure channel such as an encrypted HTTPS request.
227-
| **Use Persistent Cookie**| Keep this value set to **No**. Only use this setting for applications that can't share cookies between processes. For more information about cookie settings, see [Cookie settings for accessing on-premises applications in Azure Active Directory](./application-proxy-configure-cookie-settings.md).
228-
| **Translate URLs in Headers** | Keep this value as **Yes** unless your application required the original host header in the authentication request. |
229-
| **Translate URLs in Application Body** | Keep this value as **No** unless you have hardcoded HTML links to other on-premises applications and don't use custom domains. For more information, see [Link translation with Application Proxy](./application-proxy-configure-hard-coded-link-translation.md).<br><br>Set this value to **Yes** if you plan to monitor this application with Microsoft Defender for Cloud Apps. For more information, see [Configure real-time application access monitoring with Microsoft Defender for Cloud Apps and Azure Active Directory](./application-proxy-integrate-with-microsoft-cloud-application-security.md). |
226+
| **Use HTTP-Only Cookie** | Select to have Application Proxy cookies include the HTTPOnly flag in the HTTP response header. If using Remote Desktop Services, keep this unselected. |
227+
| **Use Persistent Cookie**| Keep this unselected. Only use this setting for applications that can't share cookies between processes. For more information about cookie settings, see [Cookie settings for accessing on-premises applications in Azure Active Directory](./application-proxy-configure-cookie-settings.md).
228+
| **Translate URLs in Headers** | Keep this selected unless your application required the original host header in the authentication request. |
229+
| **Translate URLs in Application Body** | Keep this unselected unless you have hardcoded HTML links to other on-premises applications and don't use custom domains. For more information, see [Link translation with Application Proxy](./application-proxy-configure-hard-coded-link-translation.md).<br><br>Select if you plan to monitor this application with Microsoft Defender for Cloud Apps. For more information, see [Configure real-time application access monitoring with Microsoft Defender for Cloud Apps and Azure Active Directory](./application-proxy-integrate-with-microsoft-cloud-application-security.md). |
230+
| **Validate Backend SSL Certificate** | Select to enable backend SSL certificate validation for the application. |
230231
231232
7. Select **Add**.
232233

0 commit comments

Comments
 (0)