Skip to content

Commit 9528ae8

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-cmk-hpc-cache
2 parents 0498937 + 49342a4 commit 9528ae8

File tree

326 files changed

+1844
-1492
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

326 files changed

+1844
-1492
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -236,6 +236,11 @@
236236
"redirect_url": "/azure//virtual-machines/windows/sql/virtual-machines-windows-portal-sql-create-failover-cluster-premium-file-share",
237237
"redirect_document_id": false
238238
},
239+
{
240+
"source_path": "articles/virtual-machines/windows/encrypt-disks.md",
241+
"redirect_url": "/azure//virtual-machines/windows/disk-encryption-overview",
242+
"redirect_document_id": false
243+
},
239244
{
240245
"source_path": "articles/virtual-machines/linux/cli-manage-nodejs.md",
241246
"redirect_url": "/azure/virtual-machines/linux/create-cli-complete",

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Before combined registration, users registered authentication methods for Azure
2222
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
2323

2424
> [!div class="nextstepaction"]
25-
> [Enable combined security regiration](howto-registration-mfa-sspr-combined.md)
25+
> [Enable combined security registration](howto-registration-mfa-sspr-combined.md)
2626
2727
![My Profile showing registered Security info for a user](media/concept-registration-mfa-sspr-combined/combined-security-info-defualts-registered.png)
2828

articles/active-directory/develop/customize-webviews.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ Objective-C
9898
```objc
9999
UIViewController *myParentController = ...;
100100
WKWebView *myCustomWebView = ...;
101-
MSALWebviewParameters *webViewParameters = [[MSALWebviewParameters alloc] initWithParentViewController:myParentController];
101+
MSALWebviewParameters *webViewParameters = [[MSALWebviewParameters alloc] initWithAuthPresentationViewController:myParentController];
102102
webViewParameters.webviewType = MSALWebviewTypeWKWebView;
103103
webViewParameters.customWebview = myCustomWebView;
104104
MSALInteractiveTokenParameters *interactiveParameters = [[MSALInteractiveTokenParameters alloc] initWithScopes:@[@"myscope"] webviewParameters:webViewParameters];
@@ -109,7 +109,7 @@ Swift
109109
```swift
110110
let myParentController: UIViewController = ...
111111
let myCustomWebView: WKWebView = ...
112-
let webViewParameters = MSALWebviewParameters(parentViewController: myParentController)
112+
let webViewParameters = MSALWebviewParameters(authPresentationViewController: myParentController)
113113
webViewParameters.webviewType = MSALWebviewType.wkWebView
114114
webViewParameters.customWebview = myCustomWebView
115115
let interactiveParameters = MSALInteractiveTokenParameters(scopes: ["myscope"], webviewParameters: webViewParameters)

articles/active-directory/develop/reference-app-manifest.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 03/23/2020
11+
ms.date: 04/15/2020
1212
ms.author: ryanwi
1313
ms.custom: aaddev
1414
ms.reviewer: sureshja
1515
---
1616

1717
# Azure Active Directory app manifest
1818

19-
The application manifest contains a definition of all the attributes of an application object in the Microsoft identity platform. It also serves as a mechanism for updating the application object. For more info on the Application entity and its schema, see the [Graph API Application entity documentation](https://msdn.microsoft.com/Library/Azure/Ad/Graph/api/entity-and-complex-type-reference#application-entity).
19+
The application manifest contains a definition of all the attributes of an application object in the Microsoft identity platform. It also serves as a mechanism for updating the application object. For more info on the Application entity and its schema, see the [Graph API Application entity documentation](https://docs.microsoft.com/previous-versions/azure/ad/graph/api/entity-and-complex-type-reference#application-entity).
2020

2121
You can configure an app's attributes through the Azure portal or programmatically using [REST API](https://docs.microsoft.com/previous-versions/azure/ad/graph/api/entity-and-complex-type-reference#application-entity) or [PowerShell](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0#applications). However, there are some scenarios where you'll need to edit the app manifest to configure an app's attribute. These scenarios include:
2222

@@ -36,6 +36,20 @@ To configure the application manifest:
3636

3737
This section describes the attributes found in the application manifest.
3838

39+
### id attribute
40+
41+
| Key | Value type |
42+
| :--- | :--- |
43+
| id | String |
44+
45+
The unique identifier for the app in the directory. This ID is not the identifier used to identify the app in any protocol transaction. It's used for the referencing the object in directory queries.
46+
47+
Example:
48+
49+
```json
50+
"id": "f7f9acfc-ae0c-4d6c-b489-0a81dc1652dd",
51+
```
52+
3953
### accessTokenAcceptedVersion attribute
4054

4155
| Key | Value type |
@@ -225,19 +239,7 @@ Example:
225239
"optionalClaims": null,
226240
```
227241

228-
### id attribute
229242

230-
| Key | Value type |
231-
| :--- | :--- |
232-
| id | String |
233-
234-
The unique identifier for the app in the directory. This ID is not the identifier used to identify the app in any protocol transaction. It's used for the referencing the object in directory queries.
235-
236-
Example:
237-
238-
```json
239-
"id": "f7f9acfc-ae0c-4d6c-b489-0a81dc1652dd",
240-
```
241243

242244
### identifierUris attribute
243245

articles/active-directory/develop/scenario-mobile-acquire-token.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ If MSAL returns `MSALErrorInteractionRequired`, then try acquiring tokens intera
146146

147147
```objc
148148
UIViewController *viewController = ...; // Pass a reference to the view controller that should be used when getting a token interactively
149-
MSALWebviewParameters *webParameters = [[MSALWebviewParameters alloc] initWithParentViewController:viewController];
149+
MSALWebviewParameters *webParameters = [[MSALWebviewParameters alloc] initWithAuthPresentationViewController:viewController];
150150
MSALInteractiveTokenParameters *interactiveParams = [[MSALInteractiveTokenParameters alloc] initWithScopes:scopes webviewParameters:webParameters];
151151
[application acquireTokenWithParameters:interactiveParams completionBlock:^(MSALResult *result, NSError *error) {
152152
if (!error)
@@ -162,7 +162,7 @@ MSALInteractiveTokenParameters *interactiveParams = [[MSALInteractiveTokenParame
162162
163163
```swift
164164
let viewController = ... // Pass a reference to the view controller that should be used when getting a token interactively
165-
let webviewParameters = MSALWebviewParameters(parentViewController: viewController)
165+
let webviewParameters = MSALWebviewParameters(authPresentationViewController: viewController)
166166
let interactiveParameters = MSALInteractiveTokenParameters(scopes: scopes, webviewParameters: webviewParameters)
167167
application.acquireToken(with: interactiveParameters, completionBlock: { (result, error) in
168168

articles/active-directory/develop/tutorial-v2-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -384,7 +384,7 @@ Add the following after `initMSAL` method to the `ViewController` class.
384384

385385
```swift
386386
func initWebViewParams() {
387-
self.webViewParameters = MSALWebviewParameters(parentViewController: self)
387+
self.webViewParameters = MSALWebviewParameters(authPresentationViewController: self)
388388
}
389389
```
390390

articles/active-directory/hybrid/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ landingContent:
5454
url: whatis-phs.md
5555
- text: What is passthrough authentication?
5656
url: how-to-connect-pta.md
57-
- text: What is federtation?
57+
- text: What is federation?
5858
url: whatis-fed.md
5959
- text: What is single sign-on?
6060
url: how-to-connect-sso.md
@@ -100,4 +100,4 @@ landingContent:
100100

101101

102102

103-
103+

articles/active-directory/saas-apps/highground-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,15 +81,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8181
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
8282

8383
a. In the **Identifier** text box, type a URL using the following pattern:
84-
`https://<SUBDOMAIN>.highground.com/`
84+
`https://app.highground.com/`
8585

8686
b. In the **Reply URL** text box, type a URL using the following pattern:
87-
`https://<SUBDOMAIN>.highground.com/svc/SSONoAuth/<companyName>`
87+
`https://app.highground.com/svc/SSONoAuth/SAML?groupid=<company-guid>`
8888

8989
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
9090

9191
In the **Sign-on URL** text box, type a URL using the following pattern:
92-
`https://app.highground.com/#/login/<companyName>`
92+
`https://app.highground.com/#/login/<company-slug>`
9393

9494
> [!NOTE]
9595
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [HighGround Client support team](https://youearnedit.freshdesk.com/support/home) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
-36.2 KB
Loading
-22.3 KB
Loading

0 commit comments

Comments
 (0)