Skip to content

Commit a747eb7

Browse files
committed
Merge branch 'main' into release-apim-retirement-202209
2 parents 2e0e223 + a53a4ec commit a747eb7

File tree

282 files changed

+10995
-2091
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

282 files changed

+10995
-2091
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -287,19 +287,19 @@
287287
{
288288
"path_to_root": "azure-search-javascript-samples",
289289
"url": "https://github.com/Azure-Samples/azure-search-javascript-samples",
290-
"branch": "master",
290+
"branch": "main",
291291
"branch_mapping": {}
292292
},
293293
{
294294
"path_to_root": "azure-search-dotnet-samples",
295295
"url": "https://github.com/Azure-Samples/azure-search-dotnet-samples",
296-
"branch": "master",
296+
"branch": "main",
297297
"branch_mapping": {}
298298
},
299299
{
300300
"path_to_root": "azure-search-python-samples",
301301
"url": "https://github.com/Azure-Samples/azure-search-python-samples",
302-
"branch": "master",
302+
"branch": "main",
303303
"branch_mapping": {}
304304
},
305305
{
@@ -374,12 +374,6 @@
374374
"branch": "master",
375375
"branch_mapping": {}
376376
},
377-
{
378-
"path_to_root": "media-services-v3-dotnet-quickstarts",
379-
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-quickstarts",
380-
"branch": "master",
381-
"branch_mapping": {}
382-
},
383377
{
384378
"path_to_root": "media-services-v3-dotnet-tutorials",
385379
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-tutorials",

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/17/2022
9+
ms.date: 09/17/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -21,7 +21,7 @@ ms.custom: contperf-fy20q4
2121

2222
Microsoft recommends passwordless authentication methods such as Windows Hello, FIDO2 security keys, and the Microsoft Authenticator app because they provide the most secure sign-in experience. Although a user can sign-in using other common methods such as a username and password, passwords should be replaced with more secure authentication methods.
2323

24-
![Table of the strengths and preferred authentication methods in Azure AD](media/concept-authentication-methods/authentication-methods.png)
24+
:::image type="content" border="true" source="media/concept-authentication-methods/authentication-methods.png" alt-text="Illustration of the strengths and preferred authentication methods in Azure AD." :::
2525

2626
Azure AD Multi-Factor Authentication (MFA) adds additional security over only using a password when a user signs in. The user can be prompted for additional forms of authentication, such as to respond to a push notification, enter a code from a software or hardware token, or respond to an SMS or phone call.
2727

@@ -40,6 +40,7 @@ The following table outlines the security considerations for the available authe
4040
| Windows Hello for Business | High | High | High |
4141
| Microsoft Authenticator app | High | High | High |
4242
| FIDO2 security key | High | High | High |
43+
| Certificate-based authentication (preview)| High | High | High |
4344
| OATH hardware tokens (preview) | Medium | Medium | High |
4445
| OATH software tokens | Medium | Medium | High |
4546
| SMS | Medium | High | Medium |
@@ -65,13 +66,14 @@ The following table outlines when an authentication method can be used during a
6566
| Windows Hello for Business | Yes | MFA\* |
6667
| Microsoft Authenticator app | Yes | MFA and SSPR |
6768
| FIDO2 security key | Yes | MFA |
69+
| Certificate-based authentication (preview) | Yes | No |
6870
| OATH hardware tokens (preview) | No | MFA and SSPR |
6971
| OATH software tokens | No | MFA and SSPR |
7072
| SMS | Yes | MFA and SSPR |
7173
| Voice call | No | MFA and SSPR |
7274
| Password | Yes | |
7375

74-
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work sucessfully.
76+
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work successfully.
7577
7678
All of these authentication methods can be configured in the Azure portal, and increasingly using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
7779

@@ -80,6 +82,7 @@ To learn more about how each authentication method works, see the following sepa
8082
* [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview)
8183
* [Microsoft Authenticator app](concept-authentication-authenticator-app.md)
8284
* [FIDO2 security key](concept-authentication-passwordless.md#fido2-security-keys)
85+
* [Certificate-based authentication](concept-certificate-based-authentication.md)
8386
* [OATH hardware tokens (preview)](concept-authentication-oath-tokens.md#oath-hardware-tokens-preview)
8487
* [OATH software tokens](concept-authentication-oath-tokens.md#oath-software-tokens)
8588
* [SMS sign-in](howto-authentication-sms-signin.md) and [verification](concept-authentication-phone-options.md#mobile-phone-verification)
-507 Bytes
Loading

articles/active-directory/develop/active-directory-configurable-token-lifetimes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,10 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 11/22/2021
12+
ms.date: 09/07/2022
1313
ms.author: ryanwi
1414
ms.custom: aaddev, identityplatformtop40, contperf-fy21q1
15-
ms.reviewer: ludwignick, marsma
15+
ms.reviewer: ludwignick, sreyanthmora, marsma
1616
---
1717
# Configurable token lifetimes in the Microsoft identity platform (preview)
1818

articles/active-directory/develop/howto-create-self-signed-certificate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Azure Active Directory (Azure AD) supports two types of authentication for servi
2323
For testing, you can use a self-signed public certificate instead of a Certificate Authority (CA)-signed certificate. This article shows you how to use Windows PowerShell to create and export a self-signed certificate.
2424

2525
> [!CAUTION]
26-
> Using a self-signed certificate is only recommended for development, not production.
26+
> Self-signed certificates are not trusted by default and they can be difficult to maintain. Also, they may use outdated hash and cipher suites that may not be strong. For better security, purchase a certificate signed by a well-known certificate authority.
2727
2828
You configure various parameters for the certificate. For example, the cryptographic and hash algorithms, the certificate validity period, and your domain name. Then export the certificate with or without its private key depending on your application needs.
2929

articles/active-directory/manage-apps/application-properties.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 09/22/2021
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
#Customer intent: As an administrator of an Azure AD tenant, I want to learn more about the properties of an enterprise application that I can configure.
1414
---

articles/active-directory/manage-apps/application-sign-in-problem-application-error.md

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 07/11/2017
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.collection: M365-identity-device-management
1414
---
@@ -17,7 +17,14 @@ ms.collection: M365-identity-device-management
1717

1818
In this scenario, Azure Active Directory (Azure AD) signs the user in. But the application displays an error message and doesn't let the user finish the sign-in flow. The problem is that the app didn't accept the response that Azure AD issued.
1919

20-
There are several possible reasons why the app didn't accept the response from Azure AD. If the error message doesn't clearly identify what's missing from the response, try the following:
20+
There are several possible reasons why the app didn't accept the response from Azure AD. If there is an error message or code displayed, use the following resources to diagnose the error:
21+
22+
* [Azure AD Authentication and authorization error codes](../develop/reference-aadsts-error-codes.md)
23+
24+
* [Troubleshooting consent prompt errors](application-sign-in-unexpected-user-consent-error.md)
25+
26+
27+
If the error message doesn't clearly identify what's missing from the response, try the following:
2128

2229
- If the app is the Azure AD gallery, verify that you followed the steps in [How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
2330

@@ -58,13 +65,13 @@ To add an attribute in the Azure AD configuration that will be sent in the Azure
5865

5966
The next time that the user signs in to the app, Azure AD will send the new attribute in the SAML response.
6067

61-
## The app doesn't identify the user
68+
## The app cannot identify the user
6269

6370
Signing in to the app fails because the SAML response is missing an attribute such as a role. Or it fails because the app expects a different format or value for the **NameID** (User Identifier) attribute.
6471

6572
If you're using [Azure AD automated user provisioning](../app-provisioning/user-provisioning.md) to create, maintain, and remove users in the app, verify that the user has been provisioned to the SaaS app. For more information, see [No users are being provisioned to an Azure AD Gallery application](../app-provisioning/application-provisioning-config-problem-no-users-provisioned.md).
6673

67-
## Add an attribute to the Azure AD app configuration
74+
### Add an attribute to the Azure AD app configuration
6875

6976
To change the User Identifier value, follow these steps:
7077

@@ -87,7 +94,7 @@ To change the User Identifier value, follow these steps:
8794

8895
8. Under **User attributes**, select the unique identifier for the user from the **User Identifier** drop-down list.
8996

90-
## Change the NameID format
97+
### Change the NameID format
9198

9299
If the application expects another format for the **NameID** (User Identifier) attribute, see [Editing nameID](../develop/active-directory-saml-claims-customization.md#editing-nameid) to change the NameID format.
93100

@@ -155,4 +162,8 @@ To change the signing algorithm, follow these steps:
155162

156163
## Next steps
157164

158-
[How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
165+
* [How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
166+
167+
* [Azure AD Authentication and authorization error codes](../develop/reference-aadsts-error-codes.md)
168+
169+
* [Troubleshooting consent prompt errors](application-sign-in-unexpected-user-consent-error.md)

articles/active-directory/manage-apps/application-sign-in-unexpected-user-consent-error.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 07/11/2017
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.reviewer: phsignor, yuhko
1414
ms.collection: M365-identity-device-management
@@ -31,31 +31,27 @@ This error occurs when a user who is not a Global Administrator attempts to use
3131

3232
This error can also occur when a user is prevented from consenting to an application due to Microsoft detecting that the permissions request is risky. In this case, an audit event will also be logged with a Category of "ApplicationManagement", Activity Type of "Consent to application" and Status Reason of "Risky application detected".
3333

34-
Another scenario in which this error might occur is when the user assignment is required for the application, but no administrator consent was provided. In this case, the administrator must first provide administrator consent.
34+
Another scenario in which this error might occur is when the user assignment is required for the application, but no administrator consent was provided. In this case, the administrator must first provide tenant-wide admin consent for the application.
3535

3636
## Policy prevents granting permissions error
3737

3838
* **AADSTS90093:** An administrator of <tenantDisplayName> has set a policy that prevents you from granting <name of app> the permissions it is requesting. Contact an administrator of <tenantDisplayName>, who can grant permissions to this app on your behalf.
3939

40-
This error occurs when a Global Administrator turns off the ability for users to consent to applications, then a non-administrator user attempts to use an application that requires consent. This error can be resolved by an administrator granting access to the application on behalf of their organization.
40+
This error can occur when a Global Administrator turns off the ability for users to consent to applications, then a non-administrator user attempts to use an application that requires consent. This error can be resolved by an administrator granting access to the application on behalf of their organization.
4141

4242
## Intermittent problem error
4343

4444
* **AADSTS90090:** It looks like the sign-in process encountered an intermittent problem recording the permissions you attempted to grant to <clientAppDisplayName>. try again later.
4545

4646
This error indicates that an intermittent service side issue has occurred. It can be resolved by attempting to consent to the application again.
4747

48-
## Resource not available error
4948

50-
* **AADSTS65005:** The app <clientAppDisplayName> requested permissions to access a resource <resourceAppDisplayName> that is not available.
51-
52-
Contact the application developer.
5349

5450
## Resource not available in tenant error
5551

5652
* **AADSTS65005:** <clientAppDisplayName> is requesting access to a resource <resourceAppDisplayName> that is not available in your organization <tenantDisplayName>.
5753

58-
Ensure that this resource is available or contact an administrator of <tenantDisplayName>.
54+
Ensure that these resources that provide the permissions requested are available in your tenant or contact an administrator of <tenantDisplayName>. Otherwise, there is a misconfiguration in how the application requests resources, and you should contact the application developer.
5955

6056
## Permissions mismatch error
6157

@@ -91,3 +87,5 @@ End-users will not be able to grant consent to apps that have been detected as r
9187
[Apps, permissions, and consent in Azure Active Directory (v1 endpoint)](../develop/quickstart-register-app.md)<br>
9288

9389
[Scopes, permissions, and consent in the Azure Active Directory (v2.0 endpoint)](../develop/v2-permissions-and-consent.md)
90+
91+
[Unexpected consent prompt when signing in to an application](application-sign-in-unexpected-user-consent-prompt.md)

0 commit comments

Comments
 (0)