Skip to content

Commit 92b61b1

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents fe6ae52 + af1cbaa commit 92b61b1

File tree

182 files changed

+1422
-2124
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

182 files changed

+1422
-2124
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51236,6 +51236,11 @@
5123651236
"source_path": "articles/media-services/previous/media-services-configure-tricaster-live-encoder.md",
5123751237
"redirect_url": "/azure/media-services",
5123851238
"redirect_document_id": false
51239+
},
51240+
{
51241+
"source_path": "articles/aks/kubernetes-draft.md",
51242+
"redirect_url": "/azure/aks/quickstart-helm",
51243+
"redirect_document_id": false
5123951244
}
5124051245
]
5124151246
}

articles/active-directory/app-provisioning/functions-for-customizing-application-data.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -519,11 +519,11 @@ SelectUniqueValue(uniqueValueRule1, uniqueValueRule2, uniqueValueRule3, …)
519519
**Description:**<br>
520520
Requires a minimum of two arguments, which are unique value generation rules defined using expressions. The function evaluates each rule and then checks the value generated for uniqueness in the target app/directory. The first unique value found will be the one returned. If all of the values already exist in the target, the entry will get escrowed and the reason gets logged in the audit logs. There is no upper bound to the number of arguments that can be provided.
521521

522-
> [!NOTE]
523-
> - This is a top-level function, it cannot be nested.
524-
> - This function cannot be applied to attributes that have a matching precedence.
525-
> - This function is only meant to be used for entry creations. When using it with an attribute, set the **Apply Mapping** property to **Only during object creation**.
526-
> - This function is currently only supported for "Workday to Active Directory User Provisioning". It cannot be used with other provisioning applications.
522+
523+
- This is a top-level function, it cannot be nested.
524+
- This function cannot be applied to attributes that have a matching precedence.
525+
- This function is only meant to be used for entry creations. When using it with an attribute, set the **Apply Mapping** property to **Only during object creation**.
526+
- This function is currently only supported for "Workday to Active Directory User Provisioning". It cannot be used with other provisioning applications.
527527

528528

529529
**Parameters:**<br>

articles/active-directory/develop/scenario-daemon-acquire-token.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ If you don't yet have a library for your chosen language, you might want to use
172172

173173
#### First case: Access the token request by using a shared secret
174174

175-
```Text
175+
```HTTP
176176
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 //Line breaks for clarity.
177177
Host: login.microsoftonline.com
178178
Content-Type: application/x-www-form-urlencoded
@@ -185,7 +185,7 @@ client_id=535fb089-9ff3-47b6-9bfb-4f1264799865
185185

186186
#### Second case: Access the token request by using a certificate
187187

188-
```Text
188+
```HTTP
189189
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 // Line breaks for clarity.
190190
Host: login.microsoftonline.com
191191
Content-Type: application/x-www-form-urlencoded
@@ -215,7 +215,7 @@ If you get an error message telling you that you used an invalid scope, you prob
215215
If you get an **Insufficient privileges to complete the operation** error when you call the API, the tenant administrator needs to grant permissions to the application. See step 6 of Register the client app above.
216216
You'll typically see an error that looks like this error:
217217

218-
```JSon
218+
```json
219219
Failed to call the web API: Forbidden
220220
Content: {
221221
"error": {

articles/active-directory/develop/scenario-daemon-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The configuration file defines:
5858

5959
[appsettings.json](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/blob/master/1-Call-MSGraph/daemon-console/appsettings.json) from the [.NET Core console daemon](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2) sample.
6060

61-
```JSon
61+
```json
6262
{
6363
"Instance": "https://login.microsoftonline.com/{0}",
6464
"Tenant": "[Enter here the tenantID or domain name for your Azure AD tenant]",

articles/active-directory/develop/scenario-desktop-app-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ To learn more about how to configure an MSAL.NET desktop application:
111111

112112
Imagine a .NET Core console application that has the following `appsettings.json` configuration file:
113113

114-
```JSon
114+
```json
115115
{
116116
"Authentication": {
117117
"AzureCloudInstance": "AzurePublic",
@@ -213,7 +213,7 @@ Objective-C:
213213
```objc
214214
NSError *msalError = nil;
215215

216-
MSALPublicClientApplicationConfig *config = [[MSALPublicClientApplicationConfig alloc] initWithClientId:@"<your-client-id-here>"];
216+
MSALPublicClientApplicationConfig *config = [[MSALPublicClientApplicationConfig alloc] initWithClientId:@"<your-client-id-here>"];
217217
MSALPublicClientApplication *application = [[MSALPublicClientApplication alloc] initWithConfiguration:config error:&msalError];
218218
```
219219

articles/active-directory/develop/scenario-mobile-acquire-token.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ When you use the protocol to get tokens for mobile apps, make two requests:
265265

266266
#### Get an authorization code
267267

268-
```Text
268+
```
269269
https://login.microsoftonline.com/{tenant}/oauth2/v2.0/authorize?
270270
client_id=<CLIENT_ID>
271271
&response_type=code
@@ -277,7 +277,7 @@ client_id=<CLIENT_ID>
277277

278278
#### Get access and refresh the token
279279

280-
```Text
280+
```HTTP
281281
POST /{tenant}/oauth2/v2.0/token HTTP/1.1
282282
Host: https://login.microsoftonline.com
283283
Content-Type: application/x-www-form-urlencoded

articles/active-directory/develop/scenario-protected-web-api-app-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ To expose application permissions, you need to edit the manifest.
105105

106106
The following sample shows the contents of `appRoles`, where the value of `id` can be any unique GUID.
107107

108-
```JSon
108+
```json
109109
"appRoles": [
110110
{
111111
"allowedMemberTypes": [ "Application" ],

articles/active-directory/develop/scenario-web-app-call-api-call-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Now that you have a token, you can call a protected web API.
2323

2424
Here's simplified code for the action of the `HomeController`. This code gets a token to call Microsoft Graph. Code has been added to show how to call Microsoft Graph as a REST API. The URL for the Microsoft Graph API is provided in the appsettings.json file and is read in a variable named `webOptions`:
2525

26-
```JSon
26+
```json
2727
{
2828
"AzureAd": {
2929
"Instance": "https://login.microsoftonline.com/",

articles/active-directory/develop/v2-admin-consent.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom: aaddev
1717

1818
# Admin consent on the Microsoft identity platform
1919

20-
Some permissions require consent from an administrator before they can be granted within a tenant. You can also use the admin consent endpoint to grant permissions to an entire tenant.
20+
Some permissions require consent from an administrator before they can be granted within a tenant. You can also use the admin consent endpoint to grant permissions to an entire tenant.
2121

2222
## Recommended: Sign the user into your app
2323

@@ -29,15 +29,15 @@ When you sign the user into your app, you can identify the organization to which
2929

3030
When you're ready to request permissions from your organization's admin, you can redirect the user to the Microsoft identity platform *admin consent endpoint*.
3131

32-
```
32+
```HTTP
3333
// Line breaks are for legibility only.
34-
GET https://login.microsoftonline.com/{tenant}/v2.0/adminconsent?
35-
client_id=6731de76-14a6-49ae-97bc-6eba6914391e
36-
&state=12345
37-
&redirect_uri=http://localhost/myapp/permissions
38-
&scope=
39-
https://graph.microsoft.com/calendars.read
40-
https://graph.microsoft.com/mail.send
34+
GET https://login.microsoftonline.com/{tenant}/v2.0/adminconsent?
35+
client_id=6731de76-14a6-49ae-97bc-6eba6914391e
36+
&state=12345
37+
&redirect_uri=http://localhost/myapp/permissions
38+
&scope=
39+
https://graph.microsoft.com/calendars.read
40+
https://graph.microsoft.com/mail.send
4141
```
4242

4343

@@ -47,7 +47,7 @@ When you're ready to request permissions from your organization's admin, you can
4747
| `client_id` | Required | The **Application (client) ID** that the [Azure portal – App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience assigned to your app. |
4848
| `redirect_uri` | Required |The redirect URI where you want the response to be sent for your app to handle. It must exactly match one of the redirect URIs that you registered in the app registration portal. |
4949
| `state` | Recommended | A value included in the request that will also be returned in the token response. It can be a string of any content you want. Use the state to encode information about the user's state in the app before the authentication request occurred, such as the page or view they were on. |
50-
|`scope` | Required | Defines the set of permissions being requested by the application. This can be either static (using /.default) or dynamic scopes. This can include the OIDC scopes (`openid`, `profile`, `email`). |
50+
|`scope` | Required | Defines the set of permissions being requested by the application. This can be either static (using /.default) or dynamic scopes. This can include the OIDC scopes (`openid`, `profile`, `email`). |
5151

5252

5353
At this point, Azure AD requires a tenant administrator to sign in to complete the request. The administrator is asked to approve all the permissions that you have requested in the `scope` parameter. If you've used a static (`/.default`) value, it will function like the v1.0 admin consent endpoint and request consent for all scopes found in the required permissions for the app.

articles/active-directory/develop/v2-oauth-ropc.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,8 @@ The ROPC flow is a single request: it sends the client identification and user's
4646
> [![Try running this request in Postman](./media/v2-oauth2-auth-code-flow/runInPostman.png)](https://app.getpostman.com/run-collection/f77994d794bab767596d)
4747
4848

49-
```
50-
// Line breaks and spaces are for legibility only. This is a public client, so no secret is required.
49+
```HTTP
50+
// Line breaks and spaces are for legibility only. This is a public client, so no secret is required.
5151
5252
POST {tenant}/oauth2/v2.0/token
5353
Host: login.microsoftonline.com
@@ -63,13 +63,13 @@ client_id=6731de76-14a6-49ae-97bc-6eba6914391e
6363
| Parameter | Condition | Description |
6464
| --- | --- | --- |
6565
| `tenant` | Required | The directory tenant that you want to log the user into. This can be in GUID or friendly name format. This parameter can't be set to `common` or `consumers`, but may be set to `organizations`. |
66-
| `client_id` | Required | The Application (client) ID that the [Azure portal - App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) page assigned to your app. |
66+
| `client_id` | Required | The Application (client) ID that the [Azure portal - App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) page assigned to your app. |
6767
| `grant_type` | Required | Must be set to `password`. |
6868
| `username` | Required | The user's email address. |
6969
| `password` | Required | The user's password. |
7070
| `scope` | Recommended | A space-separated list of [scopes](v2-permissions-and-consent.md), or permissions, that the app requires. In an interactive flow, the admin or the user must consent to these scopes ahead of time. |
71-
| `client_secret`| Sometimes required | If your app is a public client, then the `client_secret` or `client_assertion` cannot be included. If the app is a confidential client, then it must be included. |
72-
| `client_assertion` | Sometimes required | A different form of `client_secret`, generated using a certificate. See [certificate credentials](active-directory-certificate-credentials.md) for more details. |
71+
| `client_secret`| Sometimes required | If your app is a public client, then the `client_secret` or `client_assertion` cannot be included. If the app is a confidential client, then it must be included. |
72+
| `client_assertion` | Sometimes required | A different form of `client_secret`, generated using a certificate. See [certificate credentials](active-directory-certificate-credentials.md) for more details. |
7373

7474
### Successful authentication response
7575

0 commit comments

Comments
 (0)