Skip to content

Commit a4488a1

Browse files
committed
fix
2 parents 18e02a1 + 8035824 commit a4488a1

File tree

160 files changed

+2623
-956
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

160 files changed

+2623
-956
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26419,6 +26419,21 @@
2641926419
"redirect_url": "/azure/marketplace/enable-appsource-marketplace-using-azure-ad",
2642026420
"redirect_document_id": true
2642126421
},
26422+
{
26423+
"source_path": "articles/azure/marketplace/become-publisher.md",
26424+
"redirect_url": "/azure/marketplace/partner-center-portal/create-account",
26425+
"redirect_document_id": true
26426+
},
26427+
{
26428+
"source_path": "articles/azure/marketplace/guidelines.md",
26429+
"redirect_url": "/azure/marketplace/partner-center-portal/manage-account",
26430+
"redirect_document_id": true
26431+
},
26432+
{
26433+
"source_path": "articles/azure/marketplace/register-dev-center.md",
26434+
"redirect_url": "/azure/marketplace/partner-center-portal/manage-account",
26435+
"redirect_document_id": false
26436+
},
2642226437
{
2642326438
"source_path": "articles/marketplace/gtm-benefits.md",
2642426439
"redirect_url": "/azure/marketplace/gtm-your-marketplace-benefits",

articles/active-directory-b2c/relyingparty.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,7 @@ The **OutputClaim** element contains the following attributes:
204204
### SubjectNamingInfo
205205

206206
With the **SubjectNameingInfo** element, you control the value of the token subject:
207-
- **JTW token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](active-directory-b2c-token-session-sso.md).
207+
- **JWT token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](active-directory-b2c-token-session-sso.md).
208208
- **SAML token** - the `<Subject><NameID>` element which identifies the subject element.
209209

210210
The **SubjectNamingInfo** element contains the following attribute:

articles/active-directory/authentication/tutorial-sspr-windows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ In this tutorial, you enable users to reset their passwords from the Windows 10
2727
2828
## Prerequisites
2929

30-
* You must running at least Windows 10, version April 2018 Update, and the devices must be either:
30+
* You must running at least Windows 10, version April 2018 Update (v1803), and the devices must be either:
3131
* [Azure AD-joined](../device-management-azure-portal.md)
3232
or
3333
* [Hybrid Azure AD-joined](../device-management-hybrid-azuread-joined-devices-setup.md), with network connectivity to a domain controller.
@@ -121,7 +121,7 @@ When testing this functionality using Remote Desktop or an Enhanced VM Session,
121121

122122
* Password reset is not currently supported from a Remote Desktop.
123123

124-
If Ctrl+Alt+Del is required by policy in versions of Windows 10 before 1809, **Reset password** will not work.
124+
If Ctrl+Alt+Del is required by policy in versions of Windows 10 before v1809, **Reset password** will not work.
125125

126126
If lock screen notifications are turned off, **Reset password** will not work.
127127

articles/active-directory/develop/scenario-protected-web-api-app-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ See [Quickstart: Register an application with the Microsoft identity platform](q
3131
The Microsoft identity platform endpoint can issue two types of tokens: v1.0 tokens and v2.0 tokens. You can learn more about these tokens in [Access tokens](access-tokens.md). The accepted token version depends on the **Supported account types** you chose when you created your application:
3232

3333
- If the value of **Supported account types** is **Accounts in any organizational directory and personal Microsoft accounts (e.g. Skype, Xbox, Outlook.com)**, the accepted token version will be v2.0.
34-
- Otherwise, the accepted token version will be v2.0.
34+
- Otherwise, the accepted token version will be v1.0.
3535

3636
Once you've created the application, you can change the accepted token version by following these steps:
3737

articles/active-directory/develop/scenario-web-app-sign-user-app-configuration.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,10 @@ In the same way, the sign out URI would be set to `https://localhost:44321/signo
107107

108108
In ASP.NET Core Web Apps (and Web APIs), the code doing the application initialization is located in the `Startup.cs` file, and, to add authentication with the Microsoft Identity platform (formerly Azure AD) v2.0, you'll need to add the following code. The comments in the code should be self-explanatory.
109109

110+
> [!NOTE]
111+
> If you start your project with default ASP.NET core web project within Visual studio or using `dotnet new mvc` the method `AddAzureAD` is available by default because the related packages are automatically loaded.
112+
> However if you build a project from scratch and are trying to use the below code we suggest you to add the NuGet Package **"Microsoft.AspNetCore.Authentication.AzureAD.UI"** to your project to make the `AddAzureAD` method available.
113+
110114
```CSharp
111115
services.AddAuthentication(AzureADDefaults.AuthenticationScheme)
112116
.AddAzureAD(options => configuration.Bind("AzureAd", options));

articles/active-directory/fundamentals/toc.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@
2929
href: active-directory-deployment-checklist-p2.md
3030
- name: Identity data storage for the EU
3131
href: active-directory-data-storage-eu.md
32+
- name: What's new in Microsoft 365 Government
33+
href: whats-new-microsoft-365-government.md
3234
- name: 'How-to guides'
3335
expanded: true
3436
items:
@@ -83,4 +85,4 @@
8385
- name: Azure Active Directory deployment plans
8486
href: active-directory-deployment-plans.md
8587
- name: Archive for What's new? in Azure AD
86-
href: whats-new-archive.md
88+
href: whats-new-archive.md
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
---
2+
title: What’s new for Azure Active Directory in Microsoft 365 Government - Azure Active Directory | Microsoft Docs
3+
description: Learn about some changes to Azure Active Directory (Azure AD) in the Microsoft 365 Government cloud instance, which might impact you.
4+
services: active-directory
5+
author: eross-msft
6+
manager: daveba
7+
ms.author: lizross
8+
ms.reviewer: sumitp
9+
10+
ms.service: active-directory
11+
ms.subservice: fundamentals
12+
ms.workload: identity
13+
ms.topic: conceptual
14+
ms.date: 05/07/2019
15+
ms.custom: it-pro
16+
ms.collection: M365-identity-device-management
17+
---
18+
19+
# What's new for Azure Active Directory in Microsoft 365 Government
20+
21+
We've made some changes to Azure Active Directory (Azure AD) in the Microsoft 365 Government cloud instance, which is applicable to customers using the following services:
22+
23+
- Microsoft Azure Government
24+
25+
- Microsoft 365 Government – GCC High
26+
27+
- Microsoft 365 Government – DoD
28+
29+
This article doesn't apply to Microsoft 365 Government – GCC customers.
30+
31+
## Changes to the initial domain name
32+
33+
During your organization's initial sign-up for a Microsoft 365 Government online service, you were asked to choose your organization's domain name, `<your-domain-name>.onmicrosoft.com`. If you already have a domain name with the .com suffix, nothing will change.
34+
35+
However, if you're signing up for a new Microsoft 365 Government service, you'll be asked to choose a domain name using the `.us` suffix. So, it will be `<your-domain-name>.onmicrosoft.us`.
36+
37+
>[!Note]
38+
>This change doesn't apply to any customers who are managed by cloud service providers (CSPs).
39+
40+
## Changes to portal access
41+
42+
We've updated the portal endpoints for Microsoft Azure Government, Microsoft 365 Government – GCC High, and Microsoft 365 Government – DoD, as shown in the [Endpoint mapping table](#endpoint-mapping).
43+
44+
Previously customers could sign in using the worldwide Azure (portal.azure.com) and Office 365 (portal.office.com) portals. With this update, customers must now sign in using the specific Microsoft Azure Government, Microsoft 365 Government - GCC High, and Microsoft 365 Government - DoD portals.
45+
46+
## Endpoint mapping
47+
48+
The following table shows the endpoints for all customers:
49+
50+
| Name | Endpoint details |
51+
|------|------------------|
52+
| Portals |Microsoft Azure Government: https://portal.azure.us<p>Microsoft 365 Government – GCC High: https://portal.office365.us<p>Microsoft 365 Government – DoD: https://portal.apps.mil |
53+
| Azure Active Directory Authority Endpoint | https://login.microsoftonline.us |
54+
| Azure Active Directory Graph API | https://graph.windows.net |
55+
| Microsoft Graph API for Microsoft 365 Government - GCC High | https://graph.microsoft.us |
56+
| Microsoft Graph API for Microsoft 365 Government - DoD | https://dod-graph.microsoft.us |
57+
| Azure Government services endpoints | For details, see [Azure Government developer guide](https://docs.microsoft.com/azure/azure-government/documentation-government-developer-guide) |
58+
| Microsoft 365 Government - GCC High endpoints | For details, see [Office 365 U.S. Government GCC High endpoints](https://docs.microsoft.com/office365/enterprise/office-365-u-s-government-gcc-high-endpoints) |
59+
| Microsoft 365 Government - DoD | For details, see [Office 365 U.S. Government DoD endpoints](https://docs.microsoft.com/office365/enterprise/office-365-u-s-government-dod-endpoints) |
60+
61+
## Next steps
62+
63+
For more information, see these articles:
64+
65+
- [What is Azure Government?](https://docs.microsoft.com/azure/azure-government/documentation-government-welcome)
66+
67+
- [Azure Government AAD Authority Endpoint Update](https://devblogs.microsoft.com/azuregov/azure-government-aad-authority-endpoint-update/)
68+
69+
- [Microsoft Graph endpoints in US Government cloud](https://developer.microsoft.com/graph/blogs/new-microsoft-graph-endpoints-in-us-government-cloud/)
70+
71+
- [Office 365 US Government GCC High and DoD](https://docs.microsoft.com/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/gcc-high-and-dod)

articles/active-directory/hybrid/reference-connect-health-version-history.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,13 @@ The Azure Active Directory team regularly updates Azure AD Connect Health with n
2828
Azure AD Connect Health for Sync is integrated with Azure AD Connect installation. Read more about [Azure AD Connect release history](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect-version-history)
2929
For feature feedback, vote at [Connect Health User Voice channel](https://feedback.azure.com/forums/169401-azure-active-directory/filters/new?category_id=165591)
3030

31+
32+
## May 2019
33+
**Agent Update:**
34+
* Azure AD Connect Health agent for AD FS (version 3.1.51.0)
35+
1. Bug fix to distinguish between multiple sign ins that share the same client-request-id.
36+
2. Bug fix to parse bad username/password errors on language localized servers.
37+
3138
## April 2019
3239
**Agent Update:**
3340
* Azure AD Connect Health agent for AD FS (version 3.1.46.0)

articles/active-directory/manage-apps/application-proxy-deployment-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: conceptual
1616
ms.date: 04-04-2019
17-
ms.author: barbaraselden
17+
ms.author: baselden
1818
ms.reviewer:
1919

2020
---

articles/active-directory/privileged-identity-management/pim-resource-roles-configure-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,4 +49,4 @@ Customize settings on the different alerts to work with your environment and sec
4949

5050
## Next steps
5151

52-
- [Configure security alerts for Azure resource roles in PIM](pim-resource-roles-configure-alerts.md)
52+
- [Configure Azure resource role settings in PIM](pim-resource-roles-configure-role-settings.md)

0 commit comments

Comments
 (0)