Skip to content

Commit 9e0f699

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents e4d9433 + b438652 commit 9e0f699

File tree

503 files changed

+4337
-2007
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

503 files changed

+4337
-2007
lines changed

.openpublishing.redirection.sentinel.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -179,6 +179,36 @@
179179
"source_path": "articles/sentinel/store-logs-in-azure-data-explorer.md",
180180
"redirect_url": "/azure/azure-monitor/logs/data-retention-archive",
181181
"redirect_document_id": true
182+
},
183+
{
184+
"source_path": "articles/sentinel/data-connectors/box-using-azure-function.md",
185+
"redirect_url": "/azure/sentinel/data-connectors/box-using-azure-functions",
186+
"redirect_document_id": true
187+
},
188+
{
189+
"source_path": "articles/sentinel/data-connectors/office-365.md",
190+
"redirect_url": "/azure/sentinel/data-connectors/microsoft-365",
191+
"redirect_document_id": true
192+
},
193+
{
194+
"source_path": "articles/sentinel/data-connectors/sophos-endpoint-protection-using-azure-function.md",
195+
"redirect_url": "/azure/sentinel/data-connectors/sophos-endpoint-protection-using-azure-functions",
196+
"redirect_document_id": true
197+
},
198+
{
199+
"source_path": "articles/sentinel/data-connectors/palo-alto-prisma-cloud-cspm-using-azure-function.md",
200+
"redirect_url": "/azure/sentinel/data-connectors/palo-alto-prisma-cloud-cspm-using-azure-functions",
201+
"redirect_document_id": true
202+
},
203+
{
204+
"source_path": "articles/sentinel/data-connectors/proofpoint-tap-using-azure-function.md",
205+
"redirect_url": "/azure/sentinel/data-connectors/proofpoint-tap-using-azure-functions",
206+
"redirect_document_id": true
207+
},
208+
{
209+
"source_path": "articles/sentinel/data-connectors/rubrik-security-cloud-data-connector-using-azure-function.md",
210+
"redirect_url": "/azure/sentinel/data-connectors/rubrik-security-cloud-data-connector-using-azure-functions",
211+
"redirect_document_id": true
182212
}
183213
]
184214
}

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 08/25/2023
4+
ms.date: 08/30/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/develop/howto-call-a-web-api-with-curl.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ zone_pivot_groups: web-api-howto-prereq
1919

2020
::: zone pivot="no-api"
2121

22-
This article shows you how to call a protected ASP.NET Core web API using Client URL (cURL). cURL is a command line tool that developers use to transfer data to and from a server. In this article, you'll register a web app and a web API in a tenant on the Azure portal. The web app is used to get an access token generated by the Microsoft identity platform. Next, you'll use the token to make an authorized call to the web API using cURL.
22+
This article shows you how to call a protected ASP.NET Core web API using Client URL (cURL). cURL is a command line tool that developers use to transfer data to and from a server. In this article, you'll register a web app and a web API in a tenant. The web app is used to get an access token generated by the Microsoft identity platform. Next, you'll use the token to make an authorized call to the web API using cURL.
2323

2424
::: zone-end
2525

@@ -70,10 +70,10 @@ The Microsoft identity platform requires your application to be registered befor
7070

7171
Follow these steps to create the web API registration:
7272

73-
1. Sign in to the [Azure portal](https://portal.azure.com).
73+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
7474
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
75-
1. Search for and select **Azure Active Directory**.
76-
1. Under **Manage**, select **App registrations > New registration**.
75+
1. Browse to **Identity** > **Applications** > **Application registrations**.
76+
1. Select **New registration**.
7777
1. Enter a **Name** for the application, such as *NewWebAPI1*.
7878
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select **Help me choose** option.
7979
1. Select **Register**.
@@ -118,8 +118,8 @@ Follow these steps to create the web app registration:
118118

119119
::: zone pivot="no-api"
120120

121-
1. Select **Home** to return to the home page. Search for and select **Azure Active Directory**.
122-
1. Under **Manage**, select **App registrations** > **New registration**.
121+
1. Select **Home** to return to the home page. Browse to **Identity** > **Applications** > **Application registrations**.
122+
1. Select **New registration**.
123123
1. Enter a **Name** for the application, such as `web-app-calls-web-api`.
124124
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
125125
1. Under **Redirect URI (optional)**, select **Web**, and then enter `http://localhost` in the URL text box.
@@ -129,26 +129,26 @@ Follow these steps to create the web app registration:
129129

130130
::: zone pivot="api"
131131

132-
1. Sign in to the [Azure portal](https://portal.azure.com).
133-
1. If access to multiple tenants is available, use the Directories + subscriptions filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
134-
1. Search for and select **Azure Active Directory**.
135-
1. Under **Manage**, select **App registrations** > **New registration**.
132+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
133+
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
134+
1. Browse to **Identity** > **Applications** > **Application registrations**.
135+
1. Select **New registration**.
136136
1. Enter a Name for the application, such as `web-app-calls-web-api`.
137137
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
138138
1. Under **Redirect URI (optional)**, select **Web**, and then enter `http://localhost` in the URL text box.
139139
1. Select **Register**.
140140

141141
::: zone-end
142142

143-
When registration is complete, the Azure portal displays the app registration's **Overview** pane. Record the **Directory (tenant) ID** and the **Application (client) ID** to be used in later steps.
143+
When registration is complete, the app registration is displayed on the **Overview** pane. Record the **Directory (tenant) ID** and the **Application (client) ID** to be used in later steps.
144144

145145
#### Add a client secret
146146

147147
A client secret is a string value your app can use to identity itself, and is sometimes referred to as an *application password*. The web app uses the client secret to prove its identity when it requests tokens.
148148

149149
Follow these steps to configure a client secret:
150150

151-
1. From the **Overview** pane in the Azure portal, under **Manage**, select **Certificates & secrets** > **Client secrets** > **New client secret**.
151+
1. From the **Overview** pane, under **Manage**, select **Certificates & secrets** > **Client secrets** > **New client secret**.
152152
1. Add a description for your client secret, for example *My client secret*.
153153
1. Select an expiration for the secret or specify a custom lifetime.
154154

@@ -164,14 +164,14 @@ By specifying a web API's scopes in the web app registration, the web app can ob
164164

165165
Follow these steps to configure the web app permissions to the web API:
166166

167-
1. From the **Overview** pane of your web application in the Azure portal (*web-app-that-calls-web-api*), under **Manage**, select **API permissions** > **Add a permission** > **My APIs**.
167+
1. From the **Overview** pane of your web application (*web-app-that-calls-web-api*), under **Manage**, select **API permissions** > **Add a permission** > **My APIs**.
168168
1. Select **NewWebAPI1** or the API that you wish to add permissions to.
169169
1. Under **Select permissions**, check the box next to **Forecast.Read**. You may need to expand the **Permission** list. This selects the permissions the client app should have on behalf of the signed-in user.
170170
1. Select **Add permissions** to complete the process.
171171

172172
After adding these permissions to your API, you should see the selected permissions under **Configured permissions**.
173173

174-
You may also notice the **User.Read** permission for the Microsoft Graph API. This permission is added automatically when you register an app in the Azure portal.
174+
You may also notice the **User.Read** permission for the Microsoft Graph API. This permission is added automatically when you register an app.
175175

176176
::: zone pivot="no-api"
177177

@@ -185,8 +185,8 @@ You may also notice the **User.Read** permission for the Microsoft Graph API. Th
185185

186186
1. Navigate to `ms-identity-docs-code-dotnet/web-api` folder and open `./appsettings.json` file, replace the `{APPLICATION_CLIENT_ID}` and `{DIRECTORY_TENANT_ID}` with:
187187

188-
- `{APPLICATION_CLIENT_ID}` is the web API **Application (client) ID** on the app's **Overview** pane **App registrations** in the Azure portal.
189-
- `{DIRECTORY_TENANT_ID}` is the web API **Directory (tenant) ID** on the app's **Overview** pane **App registrations** in the Azure portal.
188+
- `{APPLICATION_CLIENT_ID}` is the web API **Application (client) ID** on the app's **Overview** pane **App registrations**.
189+
- `{DIRECTORY_TENANT_ID}` is the web API **Directory (tenant) ID** on the app's **Overview** pane **App registrations**.
190190

191191
1. Execute the following command to start the app:
192192

@@ -258,9 +258,9 @@ The authorization code flow begins with the client directing the user to the `/a
258258
```
259259

260260
1. Copy the URL, replace the following parameters and paste it into your browser:
261-
- `{tenant_id}` is the web app **Directory (tenant) ID**. This should be the same value across both of the applications's **Overview** pane **App registrations** in the Azure portal.
262-
- `{web-app-calls-web-api_application_client_id}` is the **Application (client) ID** on the web app's (*web-app-calls-web-api*) **Overview** pane in the Azure portal.
263-
- `{web_API_application_client_id}` is the **Application (client) ID** on the web API's (*NewWebAPI1*) **Overview** pane in the Azure portal.
261+
- `{tenant_id}` is the web app **Directory (tenant) ID**. This should be the same value across both of the applications's **Overview** pane **App registrations**.
262+
- `{web-app-calls-web-api_application_client_id}` is the **Application (client) ID** on the web app's (*web-app-calls-web-api*) **Overview** pane.
263+
- `{web_API_application_client_id}` is the **Application (client) ID** on the web API's (*NewWebAPI1*) **Overview** pane.
264264
1. Sign in as a user in the Azure AD tenant in which the apps are registered. Consent to any requests for access, if necessary.
265265
1. Your browser will be redirected to `http://localhost/`. Refer to your browser's navigation bar and copy the `{authorization_code}` to use in the following steps. The URL takes the form of the following snippet:
266266

@@ -283,9 +283,9 @@ cURL can now be used to request an access token from the Microsoft identity plat
283283
-d 'grant_type=authorization_code' \
284284
-d 'client_secret={client_secret}'
285285
```
286-
- `{tenant_id}` is the web app **Directory (tenant) ID**. This should be the same value across both of the applications's **Overview** pane **App registrations** in the Azure portal.
287-
- `client_id={web-app-calls-web-api_application_client_id}`, and `session_state={web-app-calls-web-api_application_client_id}` is the **Application (client) ID** on the web application's (*web-app-calls-web-api*) **Overview** pane in the Azure portal.
288-
- `api://{web_API_application_client_id}/Forecast.Read` is the **Application (client) ID** on the web API's (*NewWebAPI1*) **Overview** pane in the Azure portal.
286+
- `{tenant_id}` is the web app **Directory (tenant) ID**. This should be the same value across both of the applications's **Overview** pane **App registrations**.
287+
- `client_id={web-app-calls-web-api_application_client_id}`, and `session_state={web-app-calls-web-api_application_client_id}` is the **Application (client) ID** on the web application's (*web-app-calls-web-api*) **Overview** pane.
288+
- `api://{web_API_application_client_id}/Forecast.Read` is the **Application (client) ID** on the web API's (*NewWebAPI1*) **Overview** pane.
289289
- `code={authorization_code}` is the authorization code that was received in [Request an authorization code](#request-an-authorization-code). This enables the cURL tool to request an access token.
290290
- `client_secret={client_secret}` is the client secret **Value** recorded in [Add a client secret](#add-a-client-secret).
291291

0 commit comments

Comments
 (0)