Skip to content

Commit b016524

Browse files
authored
Merge pull request #77632 from MicrosoftDocs/master
5/22 PM Publish
2 parents db3fe30 + e700fc3 commit b016524

File tree

173 files changed

+1389
-925
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

173 files changed

+1389
-925
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27889,6 +27889,11 @@
2788927889
"redirect_url": "/azure/active-directory/governance/manage-programs-controls",
2789027890
"redirect_document_id": true
2789127891
},
27892+
{
27893+
"source_path": "articles/active-directory/governance/manage-programs-controls.md",
27894+
"redirect_url": "/azure/active-directory/governance/create-access-review",
27895+
"redirect_document_id": false
27896+
},
2789227897
{
2789327898
"source_path": "articles/active-directory/active-directory-azure-ad-controls-manage-user-access-with-access-reviews.md",
2789427899
"redirect_url": "/azure/active-directory/governance/manage-user-access-with-access-reviews",
@@ -27904,6 +27909,11 @@
2790427909
"redirect_url": "/azure/active-directory/governance/retrieve-access-review",
2790527910
"redirect_document_id": true
2790627911
},
27912+
{
27913+
"source_path": "articles/active-directory/governance/retrieve-access-review.md",
27914+
"redirect_url": "/azure/active-directory/governance/complete-access-review",
27915+
"redirect_document_id": false
27916+
},
2790727917
{
2790827918
"source_path": "articles/active-directory/active-directory-tou.md",
2790927919
"redirect_url": "/azure/active-directory/conditional-access/terms-of-use",

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ OATH hardware tokens are being supported as part of a public preview. For more i
162162
Once tokens are acquired they must be uploaded in a comma-separated values (CSV) file format including the UPN, serial number, secret key, time interval, manufacturer, and model as the example below shows.
163163

164164
```csv
165-
upn,serial number,secret key,timeinterval,manufacturer,model
165+
upn,serial number,secret key,time interval,manufacturer,model
166166
[email protected],1234567,1234567890abcdef1234567890abcdef,60,Contoso,HardwareKey
167167
```
168168

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Complete these steps to enable combined registration:
4040
> Starting in March 2019, the phone call options won't be available to Multi-Factor Authentication and SSPR users in free/trial Azure AD tenants. SMS messages are not affected by this change. The phone call options will still be available to users in paid Azure AD tenants.
4141
4242
> [!NOTE]
43-
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Multi-Factor Authentication and SSPR, if those methods are enabled in the Multi-Factor Authentication and SSPR policies. If you then disable this experience, users who go to the previous SSPR registration page at `https:/aka.ms/ssprsetup` will be required to perform multi-factor authentication before they can access the page.
43+
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Multi-Factor Authentication and SSPR, if those methods are enabled in the Multi-Factor Authentication and SSPR policies. If you then disable this experience, users who go to the previous SSPR registration page at `https://aka.ms/ssprsetup` will be required to perform multi-factor authentication before they can access the page.
4444
4545
If you have configured the Site to Zone Assignment List in Internet Explorer, the following sites have to be in the same zone:
4646

@@ -89,4 +89,4 @@ The following policy applies to all selected users, who attempt to register usin
8989

9090
[Troubleshooting combined security info registration](howto-registration-mfa-sspr-combined-troubleshoot.md)
9191

92-
[What is the location condition in Azure Active Directory conditional access?](../conditional-access/location-condition.md)
92+
[What is the location condition in Azure Active Directory conditional access?](../conditional-access/location-condition.md)

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 03/27/2019
16+
ms.date: 05/22/2019
1717
ms.author: ryanwi
1818
ms.reviewer: paulgarn, hirsin
1919
ms.custom: aaddev
@@ -122,6 +122,9 @@ This OptionalClaims object causes the ID token returned to the client to include
122122

123123
You can configure optional claims for your application by modifying the application manifest (See example below). For more info, see the [Understanding the Azure AD application manifest article](reference-app-manifest.md).
124124

125+
> [!IMPORTANT]
126+
> Access tokens are **always** generated using the manifest of the resource, not the client. So in the request `...scope=https://graph.microsoft.com/user.read...` the resource is Graph. Thus, the access token is created using the Graph manifest, not the client's manifest. Changing the manifest for your application will never cause tokens for Graph to look different. In order to validate that your `accessToken` changes are in effect, request a token for your application, not another app.
127+
125128
**Sample schema:**
126129

127130
```json

articles/active-directory/develop/msal-compare-msal-js-and-adal-js.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ In v2.0, using the `https://login.microsoftonline.com/common` authority, will al
6060

6161
v2.0: scope = https://graph.microsoft.com/User.Read
6262

63-
You can request scopes for any resource API using the URI of the API in this format: appidURI/scope For example: https://mytenant.onmicrosoft.com/myapi/api.read
63+
You can request scopes for any resource API using the URI of the API in this format: appidURI/scope For example: https:\//mytenant.onmicrosoft.com/myapi/api.read
6464

6565
Only for the MS Graph API, a scope value `user.read` maps to https://graph.microsoft.com/User.Read and can be used interchangeably.
6666

articles/active-directory/develop/msal-net-user-gets-consent-for-multiple-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,8 @@ The Microsoft identity platform endpoint does not allow you to get a token for s
2929
3030
For example, if you have two resources that have 2 scopes each:
3131

32-
- https://mytenant.onmicrosoft.com/customerapi (with 2 scopes `customer.read` and `customer.write`)
33-
- https://mytenant.onmicrosoft.com/vendorapi (with 2 scopes `vendor.read` and `vendor.write`)
32+
- https:\//mytenant.onmicrosoft.com/customerapi (with 2 scopes `customer.read` and `customer.write`)
33+
- https:\//mytenant.onmicrosoft.com/vendorapi (with 2 scopes `vendor.read` and `vendor.write`)
3434

3535
You should use the `.WithExtraScopeToConsent` modifier which has the *extraScopesToConsent* parameter as shown in the following example:
3636

articles/active-directory/develop/quickstart-v1-android.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: mobile-android
1414
ms.devlang: java
1515
ms.topic: quickstart
16-
ms.date: 09/24/2018
16+
ms.date: 05/21/2019
1717
ms.author: ryanwi
1818
ms.reviewer: brandwe, jmprieur, saeeda
1919
ms.custom: aaddev
@@ -84,18 +84,17 @@ You will need to have a native client application registered with Microsoft usin
8484
- Select ***Azure Active Directory*** > ***App Registrations***.
8585

8686
2. Create the app
87-
- Select **New application registration**.
87+
- Select **New registration**.
8888
- Enter an app name in the **Name** field.
89-
- In **Application type** select **Native**.
90-
- In **Redirect URI**, enter `http://localhost`.
89+
- Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
90+
- In **Redirect URI**, select **Public client (mobile and desktop)** from the dropdown and enter `http://localhost`.
91+
- Click **Register**.
9192

9293
3. Configure Microsoft Graph
93-
- Select **Settings > Required permissions**.
94-
- Select **Add**, inside **Select an API** select ***Microsoft Graph***.
95-
- Select the permission **Sign in and read user profile**, then hit **Select** to save.
96-
- This permission maps to the `User.Read` scope.
97-
- Optional: Inside **Required permissions > Windows Azure Active Directory**, remove the selected permission **Sign in and read user profile**. This will avoid the user consent page listing the permission twice.
98-
94+
- Select **API permissions**.
95+
- Select **Add a permission**, inside **Select an API** select ***Microsoft Graph***.
96+
- Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save.
97+
9998
4. Congrats! Your app is successfully configured. In the next section, you'll need:
10099
- `Application ID`
101100
- `Redirect URI`

articles/active-directory/develop/quickstart-v1-dotnet.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: dotnet
1616
ms.topic: quickstart
17-
ms.date: 09/24/2018
17+
ms.date: 05/21/2019
1818
ms.author: ryanwi
1919
ms.reviewer: jmprieur
2020
ms.custom: aaddev
@@ -54,13 +54,15 @@ To enable your app to get tokens, register your app in your Azure AD tenant and
5454
1. Sign in to the [Azure portal](https://portal.azure.com).
5555
2. On the top bar, select your account and under the **Directory** list, choose the Active Directory tenant where you wish to register your application.
5656
3. Select on **All services** in the left-hand nav, and choose **Azure Active Directory**.
57-
4. On **App registrations**, choose **Add**.
58-
5. Follow the prompts and create a new **Native** client application.
59-
* The **Name** of the application will describe your application to end users
60-
* The **Redirect Uri** is a scheme and string combination that Azure AD will use to return token responses. Enter a value specific to your application, for example, `http://DirectorySearcher`.
57+
4. On **App registrations**, choose **New registration**.
58+
5. Follow the prompts to create a new client application.
59+
* **Name** is the application name and describes your application to end users.
60+
* Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
61+
* **Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value that is specific to your application (for example, `http://DirectorySearcher`) and is based on the previous redirect URI information. Also select **Public client (mobile and desktop)** from the dropdown.
6162

6263
6. Once you've completed registration, AAD will assign your app a unique Application ID. You'll need this value in the next sections, so copy it from the application page.
63-
7. From the **Settings** page, choose **Required permissions** and choose **Add**. Select **Microsoft Graph** as the API, and under **Delegated permissions** add the **Read directory data** permission. Setting this permission enables your application to query the Graph API for users.
64+
7. From the **API permissions** page, select **Add a permission**. Inside **Select an API** select ***Microsoft Graph***.
65+
8. Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save. This permission sets up your application to query the Azure AD Graph API for users.
6466

6567
## Step 2: Install and configure ADAL
6668

articles/active-directory/develop/quickstart-v1-ios.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: mobile-ios
1515
ms.devlang: objective-c
1616
ms.topic: quickstart
17-
ms.date: 09/24/2018
17+
ms.date: 05/21/2019
1818
ms.author: ryanwi
1919
ms.custom: aaddev
2020
ms.reviewer: brandwe
@@ -73,12 +73,13 @@ To set up your app to get tokens, you need to register the app in your Azure AD
7373
1. Sign in to the [Azure portal](https://portal.azure.com).
7474
2. On the top bar, select your account. Under the **Directory** list, choose the Active Directory tenant where you want to register your application.
7575
3. Select **All services** in the leftmost navigation pane, and then select **Azure Active Directory**.
76-
4. Select **App registrations**, and then select **Add**.
77-
5. Follow the prompts to create a new **Native** client application.
76+
4. Select **App registrations**, and then select **New registration**.
77+
5. Follow the prompts to create a new client application.
7878
* **Name** is the application name and describes your application to end users.
79-
* **Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value that is specific to your application and is based on the previous redirect URI information.
79+
* **Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value that is specific to your application and is based on the previous redirect URI information. Also select **Public client (mobile and desktop)** from the dropdown.
8080
6. After you've completed the registration, Azure AD assigns your app a unique application ID. You'll need this value in the next sections, so copy it from the application tab.
81-
7. From the **Settings** page, select **Required permissions > Add > Microsoft Graph**, and then under **Delegated permissions** add the **Read directory data** permission. This permission sets up your application to query the Azure AD Graph API for users.
81+
7. From the **API permissions** page, select **Add a permission**. Inside **Select an API** select ***Microsoft Graph***.
82+
8. Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save. This permission sets up your application to query the Azure AD Graph API for users.
8283

8384
## Step 3: Install and configure ADAL
8485

articles/active-directory/develop/quickstart-v1-xamarin.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: mobile-xamarin
1515
ms.devlang: dotnet
1616
ms.topic: quickstart
17-
ms.date: 09/24/2018
17+
ms.date: 05/22/2019
1818
ms.author: ryanwi
1919
ms.reviewer: jmprieur
2020
ms.custom: aaddev
@@ -53,14 +53,14 @@ To enable the app to get tokens, you first need to register it in your Azure AD
5353
1. Sign in to the [Azure portal](https://portal.azure.com).
5454
2. On the top bar, click your account. Then, under the **Directory** list, select the Active Directory tenant where you want to register the app.
5555
3. Click **All services** in the left pane, and then select **Azure Active Directory**.
56-
4. Click **App registrations**, and then select **Add**.
57-
5. To create a new **Native Client Application**, follow the prompts.
56+
4. Click **App registrations**, and then select **New registration**.
57+
5. To create a new client application, follow the prompts.
5858
* **Name** describes the app to users.
59+
* Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts**.
5960
* **Redirect URI** is a scheme and string combination that Azure AD uses to return token responses. Enter a value (for example, `http://DirectorySearcher`).
6061
6. After you’ve completed registration, Azure AD assigns the app a unique application ID. Copy the value from the **Application** tab, because you'll need it later.
61-
7. On the **Settings** page, select **Required Permissions**, and then select **Add**.
62-
8. Select **Microsoft Graph** as the API. Under **Delegated Permissions**, add the **Read Directory Data** permission.
63-
This action enables the app to query the Graph API for users.
62+
7. From the **API permissions** page, select **Add a permission**. Inside **Select an API** select ***Microsoft Graph***.
63+
8. Under **Delegated permissions**, select the permission **User.Read**, then hit **Add** to save. This permission sets up your application to query the Azure AD Graph API for users.
6464

6565
## Step 3: Install and configure ADAL
6666

0 commit comments

Comments
 (0)