Skip to content

Commit 99c61ee

Browse files
Merge branch 'MicrosoftDocs:main' into main
2 parents dc061cc + eaceca3 commit 99c61ee

File tree

88 files changed

+997
-359
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

88 files changed

+997
-359
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11058,12 +11058,12 @@
1105811058
},
1105911059
{
1106011060
"source_path_from_root": "/articles/active-directory/privileged-identity-management/concept-privileged-access-versus-role-assignable.md",
11061-
"redirect_url": "azure/active-directory/privileged-identity-management/concept-pim-for-groups",
11061+
"redirect_url": "/azure/active-directory/privileged-identity-management/concept-pim-for-groups",
1106211062
"redirect_document_id": false
1106311063
},
1106411064
{
1106511065
"source_path_from_root": "/articles/active-directory/privileged-identity-management/groups-features.md",
11066-
"redirect_url": "azure/active-directory/privileged-identity-management/concept-pim-for-groups",
11066+
"redirect_url": "/azure/active-directory/privileged-identity-management/concept-pim-for-groups",
1106711067
"redirect_document_id": false
1106811068
},
1106911069
{

articles/active-directory-b2c/partner-nevis.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To get started, you'll need:
2929
- An [Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
3030

3131
>[!NOTE]
32-
>To integrate Nevis into your sign-up policy flow, configure the Azure AD B2C environment to use custom policies. </br>See, [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](/tutorial-create-user-flows.md?pivots=b2c-custom-policy).
32+
>To integrate Nevis into your sign-up policy flow, configure the Azure AD B2C environment to use custom policies. </br>See, [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](/azure/active-directory-b2c/tutorial-create-user-flows).
3333
3434
## Scenario description
3535

@@ -104,9 +104,9 @@ The diagram shows the implementation.
104104
2. In [/samples/Nevis/policy/nevis.html](https://github.com/azure-ad-b2c/partner-integrations/blob/master/samples/Nevis/policy/nevis.html) open the nevis.html file.
105105
3. Replace the **authentication_cloud_url** with the Nevis Admin console URL `https://<instance_id>.mauth.nevis.cloud`.
106106
4. Select **Save**.
107-
5. [Create an Azure Blob storage account](/customize-ui-with-html.md#2-create-an-azure-blob-storage-account).
107+
5. [Create an Azure Blob storage account](./customize-ui-with-html.md#2-create-an-azure-blob-storage-account).
108108
6. Upload the nevis.html file to your Azure blob storage.
109-
7. [Configure CORS](/customize-ui-with-html.md#3-configure-cors).
109+
7. [Configure CORS](./customize-ui-with-html.md#3-configure-cors).
110110
8. Enable cross-origin resource sharing (CORS) for the file.
111111
9. In the list, select the **nevis.html** file.
112112
10. In the **Overview** tab, next to the **URL**, select the **copy link** icon.

articles/active-directory-b2c/userjourneys.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 08/31/2021
11+
ms.date: 01/27/2023
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -232,7 +232,7 @@ Preconditions can check multiple preconditions. The following example checks whe
232232

233233
## Claims provider selection
234234

235-
Identity provider selection lets users select an action from a list of options. The identity provider selection consists of a pair of two orchestration steps:
235+
Claims provider selection lets users select an action from a list of options. The identity provider selection consists of a pair of two orchestration steps:
236236

237237
1. **Buttons** - It starts with type of `ClaimsProviderSelection`, or `CombinedSignInAndSignUp` that contains a list of options a user can choose from. The order of the options inside the `ClaimsProviderSelections` element controls the order of the buttons presented to the user.
238238
2. **Actions** - Followed by type of `ClaimsExchange`. The ClaimsExchange contains list of actions. The action is a reference to a technical profile, such as [OAuth2](oauth2-technical-profile.md), [OpenID Connect](openid-connect-technical-profile.md), [claims transformation](claims-transformation-technical-profile.md), or [self-asserted](self-asserted-technical-profile.md). When a user clicks on one of the buttons, the corresponding action is executed.

articles/active-directory/cloud-sync/concept-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ To view the schema and verify it, follow these steps.
7171
1. Go to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
7272
1. Sign in with your global administrator account.
7373
1. On the left, select **modify permissions** and ensure that **Directory.ReadWrite.All** is *Consented*.
74-
1. Run the query `https://graph.microsoft.com/beta/serviceprincipals/?$filter=startswith(DisplayName, ‘{sync config name}’)`. This query returns a filtered list of service principals. This can also be acquire via the App Registration node under Azure Active Directory.
74+
1. Run the query `https://graph.microsoft.com/beta/serviceprincipals/?$filter=startswith(DisplayName, ‘{sync config name}’)`. This query returns a filtered list of service principals. This can also be acquired via the App Registration node under Azure Active Directory.
7575
1. Locate `"appDisplayName": "Active Directory to Azure Active Directory Provisioning"` and note the value for `"id"`.
7676
```
7777
"value": [
@@ -239,7 +239,7 @@ To view the schema and verify it, follow these steps.
239239
```
240240
1. Now run the query `https://graph.microsoft.com/beta/serviceprincipals/{Service Principal Id}/synchronization/jobs/{AD2AAD Provisioning id}/schema`.
241241
242-
Example: https://graph.microsoft.com/beta/serviceprincipals/653c0018-51f4-4736-a3a3-94da5dcb6862/synchronization/jobs/AD2AADProvisioning.e9287a7367e444c88dc67a531c36d8ec/schema
242+
243243
244244
Replace `{Service Principal Id}` and `{AD2ADD Provisioning Id}` with your values.
245245

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ The **Configure** toggle when set to **Yes** applies to checked items, when set
8686
- Administrators can apply policy only to supported platforms (such as iOS, Android, and Windows) through the Conditional Access Microsoft Graph API.
8787
- Other clients
8888
- This option includes clients that use basic/legacy authentication protocols that don’t support modern authentication.
89-
- Authenticated SMTP - Used by POP and IMAP client's to send email messages.
89+
- SMTP - Used by POP and IMAP client's to send email messages.
9090
- Autodiscover - Used by Outlook and EAS clients to find and connect to mailboxes in Exchange Online.
9191
- Exchange Online PowerShell - Used to connect to Exchange Online with remote PowerShell. If you block Basic authentication for Exchange Online PowerShell, you need to use the Exchange Online PowerShell Module to connect. For instructions, see [Connect to Exchange Online PowerShell using multifactor authentication](/powershell/exchange/exchange-online/connect-to-exchange-online-powershell/mfa-connect-to-exchange-online-powershell).
9292
- Exchange Web Services (EWS) - A programming interface that's used by Outlook, Outlook for Mac, and third-party apps.

articles/active-directory/develop/access-tokens.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ ms.topic: conceptual
1212
ms.date: 12/28/2022
1313
ms.author: davidmu
1414
ms.custom: aaddev, identityplatformtop40, fasttrack-edit
15+
ms.reviewer: ludwignick
1516
---
1617

1718
# Microsoft identity platform access tokens

articles/active-directory/develop/accounts-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Microsoft identity platform accounts & tenant profiles on Android
33
description: An overview of the Microsoft identity platform accounts for Android
44
services: active-directory
5-
author: shoatman
5+
author: cilwerner
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.devlang: java
1212
ms.date: 09/14/2019
13-
ms.author: shoatman
13+
ms.author: cwerner
1414
ms.custom: aaddev, devx-track-java, has-adal-ref
1515
ms.reviewer: shoatman
1616
---

articles/active-directory/develop/app-resilience-continuous-access-evaluation.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,16 @@
22
title: "How to use Continuous Access Evaluation enabled APIs in your applications"
33
description: How to increase app security and resilience by adding support for Continuous Access Evaluation, enabling long-lived access tokens that can be revoked based on critical events and policy evaluation.
44
services: active-directory
5-
manager: martinco
5+
author: cilwerner
6+
manager: CelesteDG
7+
68
ms.service: active-directory
79
ms.subservice: develop
810
ms.topic: conceptual
911
ms.workload: identity
1012
ms.date: 07/09/2021
11-
author: janicericketts
12-
ms.author: jricketts
13-
ms.reviewer:
13+
ms.author: cwerner
14+
ms.reviewer: jricketts
1415
# Customer intent: As an application developer, I want to learn how to use Continuous Access Evaluation for building resiliency through long-lived, refreshable tokens that can be revoked based on critical events and policy evaluation.
1516
---
1617
# How to use Continuous Access Evaluation enabled APIs in your applications

articles/active-directory/develop/developer-guide-conditional-access-authentication-context.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,17 @@ title: Developer guidance for Azure AD Conditional Access authentication context
33
description: Developer guidance and scenarios for Azure AD Conditional Access authentication context
44

55
services: active-directory
6+
author: cilwerner
7+
manager: CelesteDG
8+
69
ms.service: active-directory
710
ms.subservice: develop
811
ms.topic: conceptual
912
ms.date: 11/15/2022
1013

11-
ms.author: kkrishna
12-
author: kalyankrishna1
13-
manager: CelesteDG
14-
ms.reviewer: joflore
15-
14+
ms.author: cwerner
15+
ms.reviewer: joflore, kkrishna
1616
ms.workload: identity
17-
1817
ms.custom: aaddev
1918
---
2019

articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,16 @@
22
title: Add app roles and get them from a token
33
description: Learn how to add app roles to an application registered in Azure Active Directory. Assign users and groups to these roles, and receive them in the 'roles' claim in the token.
44
services: active-directory
5-
author: kalyankrishna1
5+
author: cilwerner
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: how-to
1212
ms.date: 09/27/2022
13-
ms.author: kkrishna
14-
ms.reviewer: marsma, kkrishna, jmprieur
13+
ms.author: cwerner
14+
ms.reviewer: kkrishna, jmprieur
1515
ms.custom: aaddev
1616
---
1717

0 commit comments

Comments
 (0)