Skip to content

Commit aadec92

Browse files
authored
Merge pull request #228161 from MicrosoftDocs/main
Publish to Live Wednesday 4AM PST, 02/22
2 parents f747a6e + cf004c7 commit aadec92

File tree

253 files changed

+2029
-3821
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

253 files changed

+2029
-3821
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21965,6 +21965,16 @@
2196521965
"source_path": "articles/virtual-machines/workloads/sap/index.md",
2196621966
"redirect_URL": "/azure/sap/workloads/get-started",
2196721967
"redirect_document_id": false
21968+
},
21969+
{
21970+
"source_path": "articles/private-multi-access-edge-compute-mec/deploy-metaswitch-fusion-core-solution.md",
21971+
"redirect_URL": "/azure/private-5g-core",
21972+
"redirect_document_id": false
21973+
},
21974+
{
21975+
"source_path": "articles/private-multi-access-edge-compute-mec/metaswitch-fusion-core-overview.md",
21976+
"redirect_URL": "/azure/private-5g-core",
21977+
"redirect_document_id": false
2196821978
}
2196921979
]
2197021980
}

articles/active-directory/develop/daemon-quickstart-portal-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ ms.custom: aaddev, identityplatformtop40, devx-track-python, "scenarios:getting-
139139
> result = app.acquire_token_silent(config["scope"], account=None)
140140
>
141141
> if not result:
142-
> logging.info("No suitable token exists in cache. Let's get a new one from AAD.")
142+
> logging.info("No suitable token exists in cache. Let's get a new one from Azure AD.")
143143
> result = app.acquire_token_for_client(scopes=config["scope"])
144144
> ```
145145
>

articles/active-directory/develop/desktop-quickstart-portal-uwp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: "Quickstart: Sign in users and call Microsoft Graph in a Universal Windows Platform app"
33
description: In this quickstart, learn how a Universal Windows Platform (UWP) application can get an access token and call an API protected by Microsoft identity platform.
44
services: active-directory
5-
author: OwenRichards1
5+
author: Dickson-Mwendia
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: quickstart
1010
ms.workload: identity
1111
ms.date: 08/18/2022
1212
ROBOTS: NOINDEX
13-
ms.author: owenrichards
13+
ms.author: dmwendia
1414
ms.custom: aaddev, identityplatformtop40, "scenarios:getting-started", "languages:UWP", mode-api
1515
#Customer intent: As an application developer, I want to learn how my Universal Windows Platform (XAML) application can get an access token and call an API that's protected by the Microsoft identity platform.
1616
---

articles/active-directory/develop/msal-js-pass-custom-state-authentication-request.md

Lines changed: 9 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -20,58 +20,23 @@ ms.custom: aaddev
2020

2121
The *state* parameter, as defined by OAuth 2.0, is included in an authentication request and is also returned in the token response to prevent cross-site request forgery attacks. By default, the Microsoft Authentication Library for JavaScript (MSAL.js) passes a randomly generated unique *state* parameter value in the authentication requests.
2222

23-
The state parameter can also be used to encode information of the app's state before redirect. You can pass the user's state in the app, such as the page or view they were on, as input to this parameter. The MSAL.js library allows you to pass your custom state as state parameter in the `Request` object:
23+
The state parameter can also be used to encode information of the app's state before redirect. You can pass the user's state in the app, such as the page or view they were on, as input to this parameter. The MSAL.js library allows you to pass your custom state as state parameter in the [Request](https://azuread.github.io/microsoft-authentication-library-for-js/ref/modules/_azure_msal_browser.html#redirectrequest) object. For example:
2424

2525
```javascript
26-
// Request type
27-
export type AuthenticationParameters = {
28-
scopes?: Array<string>;
29-
extraScopesToConsent?: Array<string>;
30-
prompt?: string;
31-
extraQueryParameters?: QPDict;
32-
claimsRequest?: string;
33-
authority?: string;
34-
state?: string;
35-
correlationId?: string;
36-
account?: Account;
37-
sid?: string;
38-
loginHint?: string;
39-
forceRefresh?: boolean;
40-
};
41-
```
42-
43-
> [!Note]
44-
> If you would like to skip a cached token and go to the server, please pass in the boolean `forceRefresh` into the AuthenticationParameters object used to make a login/token request.
45-
> `forceRefresh` should not be used by default, because of the performance impact on your application.
46-
> Relying on the cache will give your users a better experience.
47-
> Skipping the cache should only be used in scenarios where you know the currently cached data does not have up-to-date information.
48-
> Such as an Admin tool that adds roles to a user that needs to get a new token with updated roles.
26+
import {PublicClientApplication} from "@azure/msal-browser";
4927

50-
For example:
28+
const myMsalObj = new PublicClientApplication({
29+
clientId: "ENTER_CLIENT_ID_HERE"
30+
});
5131

52-
```javascript
5332
let loginRequest = {
54-
scopes: ["user.read", "user.write"],
33+
scopes: ["user.read"],
5534
state: "page_url"
5635
}
5736

58-
myMSALObj.loginPopup(loginRequest);
37+
myMSALObj.loginRedirect(loginRequest);
5938
```
6039

61-
The passed in state is appended to the unique GUID set by MSAL.js when sending the request. When the response is returned, MSAL.js checks for a state match and then returns the custom passed in state in the `Response` object as `accountState`.
62-
63-
```javascript
64-
export type AuthResponse = {
65-
uniqueId: string;
66-
tenantId: string;
67-
tokenType: string;
68-
idToken: IdToken;
69-
accessToken: string;
70-
scopes: Array<string>;
71-
expiresOn: Date;
72-
account: Account;
73-
accountState: string;
74-
};
75-
```
40+
The passed in state is appended to the unique GUID set by MSAL.js when sending the request. When the response is returned, MSAL.js checks for a state match and then returns the custom passed in state in the [Response](https://azuread.github.io/microsoft-authentication-library-for-js/ref/modules/_azure_msal_common.html#authenticationresult) object as `state`.
7641

77-
To learn more, read about [building a single-page application (SPA)](scenario-spa-overview.md) using MSAL.js.
42+
To learn more, read about [building a single-page application (SPA)](scenario-spa-overview.md) using MSAL.js.

articles/active-directory/develop/msal-net-migration-public-client.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ result = await context.AcquireTokenAsync(resource, clientId,
192192
// to a URL to consent: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id={clientId}&response_type=code&scope=user.read
193193
194194
// AADSTS50079: The user is required to use multi-factor authentication.
195-
// There is no mitigation - if MFA is configured for your tenant and AAD decides to enforce it,
195+
// There is no mitigation - if MFA is configured for your tenant and Azure AD decides to enforce it,
196196
// you need to fallback to an interactive flows such as AcquireTokenInteractive or AcquireTokenByDeviceCode
197197
}
198198
catch (MsalServiceException ex)
@@ -210,7 +210,7 @@ result = await context.AcquireTokenAsync(resource, clientId,
210210
catch (MsalClientException ex)
211211
{
212212
// Error Code: unknown_user Message: Could not identify logged in user
213-
// Explanation: the library was unable to query the current Windows logged-in user or this user is not AD or AAD
213+
// Explanation: the library was unable to query the current Windows logged-in user or this user is not AD or Azure AD
214214
// joined (work-place joined users are not supported).
215215
216216
// Mitigation 1: on UWP, check that the application has the following capabilities: Enterprise Authentication,
@@ -222,7 +222,7 @@ result = await context.AcquireTokenAsync(resource, clientId,
222222
// Error Code: integrated_windows_auth_not_supported_managed_user
223223
// Explanation: This method relies on a protocol exposed by Active Directory (AD). If a user was created in Azure
224224
// Active Directory without AD backing ("managed" user), this method will fail. Users created in AD and backed by
225-
// AAD ("federated" users) can benefit from this non-interactive method of authentication.
225+
// Azure AD ("federated" users) can benefit from this non-interactive method of authentication.
226226
// Mitigation: Use interactive authentication
227227
}
228228
}
@@ -394,7 +394,7 @@ static async Task<AuthenticationResult> GetATokenForGraph()
394394
}
395395
catch (MsalUiRequiredException ex)
396396
{
397-
// No token found in the cache or AAD insists that a form interactive auth is required (e.g. the tenant admin turned on MFA)
397+
// No token found in the cache or Azure AD insists that a form interactive auth is required (e.g. the tenant admin turned on MFA)
398398
// If you want to provide a more complex user experience, check out ex.Classification
399399
400400
return await AcquireByDeviceCodeAsync(pca);

articles/active-directory/develop/quickstart-v2-python-daemon.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ ms.custom: aaddev, identityplatformtop40, devx-track-python, "scenarios:getting-
138138
> result = app.acquire_token_silent(config["scope"], account=None)
139139
>
140140
> if not result:
141-
> logging.info("No suitable token exists in cache. Let's get a new one from AAD.")
141+
> logging.info("No suitable token exists in cache. Let's get a new one from Azure AD.")
142142
> result = app.acquire_token_for_client(scopes=config["scope"])
143143
> ```
144144
>

articles/active-directory/develop/scenario-daemon-acquire-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ result = None
175175
result = app.acquire_token_silent(config["scope"], account=None)
176176

177177
if not result:
178-
logging.info("No suitable token exists in cache. Let's get a new one from AAD.")
178+
logging.info("No suitable token exists in cache. Let's get a new one from Azure AD.")
179179
result = app.acquire_token_for_client(scopes=config["scope"])
180180

181181
if "access_token" in result:

articles/active-directory/develop/scenario-daemon-app-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ When you build a confidential client with client secrets, the [parameters.json](
105105
"authority": "https://login.microsoftonline.com/<your_tenant_id>",
106106
"client_id": "your_client_id",
107107
"scope": [ "https://graph.microsoft.com/.default" ],
108-
"secret": "The secret generated by AAD during your confidential app registration",
108+
"secret": "The secret generated by Azure AD during your confidential app registration",
109109
"endpoint": "https://graph.microsoft.com/v1.0/users"
110110
}
111111
```
@@ -117,7 +117,7 @@ When you build a confidential client with certificates, the [parameters.json](ht
117117
"authority": "https://login.microsoftonline.com/<your_tenant_id>",
118118
"client_id": "your_client_id",
119119
"scope": [ "https://graph.microsoft.com/.default" ],
120-
"thumbprint": "790E... The thumbprint generated by AAD when you upload your public cert",
120+
"thumbprint": "790E... The thumbprint generated by Azure AD when you upload your public cert",
121121
"private_key_file": "server.pem",
122122
"endpoint": "https://graph.microsoft.com/v1.0/users"
123123
}

0 commit comments

Comments
 (0)