Skip to content

Commit b0b6576

Browse files
authored
Merge pull request #108716 from CelesteDG/celested-v1-noindex
Added NOINDEX to v1 and ADAL content set
2 parents c6244a0 + c7013ae commit b0b6576

27 files changed

+98
-128
lines changed

articles/active-directory/azuread-dev/active-directory-acs-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ services: active-directory
55
author: rwike77
66
manager: CelesteDG
77

8-
ms.assetid: 820acdb7-d316-4c3b-8de9-79df48ba3b06
98
ms.service: active-directory
109
ms.subservice: azuread-dev
1110
ms.custom: aaddev
@@ -14,6 +13,7 @@ ms.workload: identity
1413
ms.date: 10/03/2018
1514
ms.author: ryanwi
1615
ms.reviewer: jlu, annaba, hirsin
16+
ROBOTS: NOINDEX
1717
---
1818

1919
# How to: Migrate from the Azure Access Control Service

articles/active-directory/azuread-dev/active-directory-authentication-libraries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ services: active-directory
55
author: rwike77
66
manager: CelesteDG
77

8-
ms.assetid: 2e4fc79a-0285-40be-8c77-65edee408a22
98
ms.service: active-directory
109
ms.subservice: azuread-dev
1110
ms.topic: conceptual
@@ -14,6 +13,7 @@ ms.date: 12/01/2018
1413
ms.author: ryanwi
1514
ms.reviewer: saeeda, jmprieur
1615
ms.custom: aaddev
16+
ROBOTS: NOINDEX
1717
---
1818

1919
# Azure Active Directory Authentication Libraries

articles/active-directory/azuread-dev/active-directory-devhowto-adal-error-handling.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ ms.custom: aaddev
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.date: 02/27/2017
14+
ROBOTS: NOINDEX
1415
---
1516

1617
# Error handling best practices for Azure Active Directory Authentication Library (ADAL) clients

articles/active-directory/azuread-dev/app-types.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ ms.date: 09/24/2018
1313
ms.author: ryanwi
1414
ms.reviewer: saeeda, jmprieur, andret
1515
ms.custom: aaddev
16+
ROBOTS: NOINDEX
1617
---
1718

1819
# Application types in v1.0
@@ -46,7 +47,7 @@ In addition, if your application needs a specific piece or segment of an end-to-
4647

4748
### Registering an app that uses the Azure AD v1.0 endpoint
4849

49-
Any application that outsources authentication to Azure AD must be registered in a directory. This step involves telling Azure AD about your application, including the URL where its located, the URL to send replies after authentication, the URI to identify your application, and more. This information is required for a few key reasons:
50+
Any application that outsources authentication to Azure AD must be registered in a directory. This step involves telling Azure AD about your application, including the URL where it's located, the URL to send replies after authentication, the URI to identify your application, and more. This information is required for a few key reasons:
5051

5152
* Azure AD needs to communicate with the application when handling sign-on or exchanging tokens. The information passed between Azure AD and the application includes the following:
5253

@@ -67,7 +68,7 @@ Provisioning becomes clearer when you understand that there are two categories o
6768

6869
### Additional considerations when developing single tenant or multi-tenant apps
6970

70-
Some additional considerations arise when developing a multi-tenant application instead of a single tenant application. For example, if you are making your application available to users in multiple directories, you need a mechanism to determine which tenant they’re in. A single tenant application only needs to look in its own directory for a user, while a multi-tenant application needs to identify a specific user from all the directories in Azure AD. To accomplish this task, Azure AD provides a common authentication endpoint where any multi-tenant application can direct sign-in requests, instead of a tenant-specific endpoint. This endpoint is `https://login.microsoftonline.com/common` for all directories in Azure AD, whereas a tenant-specific endpoint might be `https://login.microsoftonline.com/contoso.onmicrosoft.com`. The common endpoint is especially important to consider when developing your application because you’ll need the necessary logic to handle multiple tenants during sign-in, sign-out, and token validation.
71+
Some additional considerations arise when developing a multi-tenant application instead of a single tenant application. For example, if you are making your application available to users in multiple directories, you need a mechanism to determine which tenant they're in. A single tenant application only needs to look in its own directory for a user, while a multi-tenant application needs to identify a specific user from all the directories in Azure AD. To accomplish this task, Azure AD provides a common authentication endpoint where any multi-tenant application can direct sign-in requests, instead of a tenant-specific endpoint. This endpoint is `https://login.microsoftonline.com/common` for all directories in Azure AD, whereas a tenant-specific endpoint might be `https://login.microsoftonline.com/contoso.onmicrosoft.com`. The common endpoint is especially important to consider when developing your application because you'll need the necessary logic to handle multiple tenants during sign-in, sign-out, and token validation.
7172

7273
If you are currently developing a single tenant application but want to make it available to many organizations, you can easily make changes to the application and its configuration in Azure AD to make it multi-tenant capable. In addition, Azure AD uses the same signing key for all tokens in all directories, whether you are providing authentication in a single tenant or multi-tenant application.
7374

articles/active-directory/azuread-dev/azure-ad-endpoint-comparison.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ ms.date: 11/26/2019
1313
ms.author: ryanwi
1414
ms.reviewer: saeeda, hirsin, jmprieur, sureshja, jesakowi, lenalepa, kkrishna, negoe
1515
ms.custom: aaddev
16+
ROBOTS: NOINDEX
1617
---
1718

1819
# Why update to Microsoft identity platform (v2.0)?
@@ -99,7 +100,7 @@ Historically, the most basic OpenID Connect sign-in flow with Microsoft identity
99100

100101
The information that the `openid` scope affords your app access to is now restricted. The `openid` scope will only allow your app to sign in the user and receive an app-specific identifier for the user. If you want to get personal data about the user in your app, your app needs to request additional permissions from the user. Two new scopes, `email` and `profile`, will allow you to request additional permissions.
101102

102-
* The `email` scope allows your app access to the users primary email address through the `email` claim in the id_token, assuming the user has an addressable email address.
103+
* The `email` scope allows your app access to the user's primary email address through the `email` claim in the id_token, assuming the user has an addressable email address.
103104
* The `profile` scope affords your app access to all other basic information about the user, such as their name, preferred username, object ID, and so on, in the id_token.
104105

105106
These scopes allow you to code your app in a minimal-disclosure fashion so you can only ask the user for the set of information that your app needs to do its job. For more information on these scopes, see [the Microsoft identity platform scope reference](../develop/v2-permissions-and-consent.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json).
@@ -131,7 +132,7 @@ For each app that you want to integrate with the Microsoft identity platform end
131132
App registrations that support work and school accounts and personal accounts have the following caveats:
132133

133134
* Only two app secrets are allowed per application ID.
134-
* An application that wasn't registered in a tenant can only be managed by the account that registered it. It cant be shared with other developers. This is the case for most apps that were registered using a personal Microsoft account in the App Registration Portal. If youd like to share your app registration with multiple developers, register the application in a tenant using the new **App registrations** section of the Azure portal.
135+
* An application that wasn't registered in a tenant can only be managed by the account that registered it. It can't be shared with other developers. This is the case for most apps that were registered using a personal Microsoft account in the App Registration Portal. If you'd like to share your app registration with multiple developers, register the application in a tenant using the new **App registrations** section of the Azure portal.
135136
* There are several restrictions on the format of the redirect URL that is allowed. For more information about redirect URL, see the next section.
136137

137138
### Restrictions on redirect URLs

articles/active-directory/azuread-dev/azure-ad-federation-metadata.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,15 @@ description: This article describes the federation metadata document that Azure
44
services: active-directory
55
author: rwike77
66
manager: CelesteDG
7-
8-
ms.assetid: c2d5f80b-aa74-452c-955b-d8eb3ed62652
97
ms.service: active-directory
108
ms.subservice: azuread-dev
119
ms.workload: identity
1210
ms.topic: conceptual
1311
ms.date: 01/07/2017
1412
ms.author: ryanwi
15-
ms.reviewer: hirsin, dastrock
13+
ms.reviewer: hirsin
1614
ms.custom: aaddev
15+
ROBOTS: NOINDEX
1716
---
1817

1918
# Federation metadata

articles/active-directory/azuread-dev/conditional-access-dev-guide.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ ms.subservice: azuread-dev
1313
ms.custom: aaddev
1414
ms.topic: conceptual
1515
ms.workload: identity
16+
ROBOTS: NOINDEX
1617
---
1718

1819
# Developer guidance for Azure Active Directory Conditional Access
@@ -156,7 +157,7 @@ When an app needs an access token to call a Web API, it attempts an `acquireToke
156157

157158
![Single-page app using ADAL flow diagram](./media/conditional-access-dev-guide/spa-using-adal-scenario.png)
158159

159-
Let's walk through an example with our Conditional Access scenario. The end user just landed on the site and doesnt have a session. We perform a `login()` call, get an ID token without multi-factor authentication. Then the user hits a button that requires the app to request data from a web API. The app tries to do an `acquireToken()` call but fails since the user has not performed multi-factor authentication yet and needs to comply with the Conditional Access policy.
160+
Let's walk through an example with our Conditional Access scenario. The end user just landed on the site and doesn't have a session. We perform a `login()` call, get an ID token without multi-factor authentication. Then the user hits a button that requires the app to request data from a web API. The app tries to do an `acquireToken()` call but fails since the user has not performed multi-factor authentication yet and needs to comply with the Conditional Access policy.
160161

161162
Azure AD sends back the following HTTP response:
162163

articles/active-directory/azuread-dev/howto-app-gallery-listing.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,15 @@ services: active-directory
55
author: rwike77
66
manager: CelesteDG
77

8-
ms.assetid: 820acdb7-d316-4c3b-8de9-79df48ba3b06
98
ms.service: active-directory
109
ms.subservice: azuread-dev
1110
ms.topic: conceptual
1211
ms.workload: identity
1312
ms.date: 12/06/2019
1413
ms.author: ryanwi
1514
ms.reviewer: jeedes
16-
ms.custom: aaddev, seoapril2019
17-
15+
ms.custom: aaddev
16+
ROBOTS: NOINDEX
1817
---
1918

2019
# List your application in the Azure Active Directory application gallery
@@ -70,17 +69,17 @@ If you are seeing this error while logging in then here are the detail on the is
7069

7170
![issues resolving application in the gallery](./media/howto-app-gallery-listing/blocked.png)
7271

73-
**Whats happening:**
72+
**What's happening:**
7473

75-
The guest user is federated to a home tenant which is also an Azure AD. The guest user is at High risk. Microsoft doesnt allow High risk users to access its resources. All High risk users (employees or guests / vendors) must remediate / close their risk to access Microsoft resources. For guest users, this user risk comes from the home tenant and the policy comes from the resource tenant (Microsoft in this case).
74+
The guest user is federated to a home tenant which is also an Azure AD. The guest user is at High risk. Microsoft doesn't allow High risk users to access its resources. All High risk users (employees or guests / vendors) must remediate / close their risk to access Microsoft resources. For guest users, this user risk comes from the home tenant and the policy comes from the resource tenant (Microsoft in this case).
7675

7776
**Secure solutions:**
7877

7978
* MFA registered guest users remediate their own user risk. This can be done by the guest user performing a secured password change or reset (https://aka.ms/sspr) at their home tenant (this needs MFA and SSPR at the home tenant). The secured password change or reset must be initiated on Azure AD and not on-prem.
8079

81-
* Guest users have their admins remediate their risk. In this case, the admin will perform a password reset (temporary password generation). This does not need Identity Protection. The guest users admin can go to https://aka.ms/RiskyUsers and click on Reset password.
80+
* Guest users have their admins remediate their risk. In this case, the admin will perform a password reset (temporary password generation). This does not need Identity Protection. The guest user's admin can go to https://aka.ms/RiskyUsers and click on 'Reset password'.
8281

83-
* Guest users have their admins close / dismiss their risk. Again, this does not need Identity Protection. The admin can go to https://aka.ms/RiskyUsers and click on Dismiss user risk. However, the admin must do the due diligence to ensure this was a false positive risk assessment before closing the user risk. Otherwise, they are putting their and Microsofts resources at risk by suppressing a risk assessment without investigation.
82+
* Guest users have their admins close / dismiss their risk. Again, this does not need Identity Protection. The admin can go to https://aka.ms/RiskyUsers and click on 'Dismiss user risk'. However, the admin must do the due diligence to ensure this was a false positive risk assessment before closing the user risk. Otherwise, they are putting their and Microsoft's resources at risk by suppressing a risk assessment without investigation.
8483

8584
> [!NOTE]
8685
> If you have any issues with access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).

articles/active-directory/azuread-dev/howto-get-appsource-certified.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ services: active-directory
55
author: rwike77
66
manager: CelesteDG
77

8-
ms.assetid: 21206407-49f8-4c0b-84d1-c25e17cd4183
98
ms.service: active-directory
109
ms.subservice: azuread-dev
1110
ms.topic: conceptual
@@ -14,6 +13,7 @@ ms.date: 08/21/2018
1413
ms.author: ryanwi
1514
ms.reviewer: jeedes
1615
ms.custom: aaddev
16+
ROBOTS: NOINDEX
1717
---
1818

1919
# How to get AppSource Certified for Azure Active Directory
@@ -55,7 +55,7 @@ The customer-led trial is the experience that AppSource recommends as it offers
5555

5656
<table >
5757
<tr>
58-
<td valign="top" width="33%">1.<br/><img src="media/active-directory-devhowto-appsource-certified/customer-led-trial-step1.png" width="85%" alt-text="Shows Free trial for customer-led trial experience"/><ul><li>User finds your application in AppSource Web Site</li><li>Selects Free trial option</li></ul></td>
58+
<td valign="top" width="33%">1.<br/><img src="media/active-directory-devhowto-appsource-certified/customer-led-trial-step1.png" width="85%" alt-text="Shows Free trial for customer-led trial experience"/><ul><li>User finds your application in AppSource Web Site</li><li>Selects 'Free trial' option</li></ul></td>
5959
<td valign="top" width="33%">2.<br/><img src="media/active-directory-devhowto-appsource-certified/customer-led-trial-step2.png" width="85%" alt-text="Shows how user is redirected to a URL in your web site"/><ul><li>AppSource redirects user to a URL in your web site</li><li>Your web site starts the <i>single-sign-on</i> process automatically (on page load)</li></ul></td>
6060
<td valign="top" width="33%">3.<br/><img src="media/active-directory-devhowto-appsource-certified/customer-led-trial-step3.png" width="85%" alt-text="Shows the Microsoft sign-in page"/><ul><li>User is redirected to Microsoft Sign-in page</li><li>User provides credentials to sign in</li></ul></td>
6161
</tr>
@@ -72,7 +72,7 @@ You can use the partner trial experience when a manual or a long-term operation
7272

7373
<table valign="top">
7474
<tr>
75-
<td valign="top" width="33%">1.<br/><img src="media/active-directory-devhowto-appsource-certified/partner-led-trial-step1.png" width="85%" alt-text="Shows Contact me for partner-led trial experience"/><ul><li>User finds your application in AppSource web site</li><li>Selects Contact Me option</li></ul></td>
75+
<td valign="top" width="33%">1.<br/><img src="media/active-directory-devhowto-appsource-certified/partner-led-trial-step1.png" width="85%" alt-text="Shows Contact me for partner-led trial experience"/><ul><li>User finds your application in AppSource web site</li><li>Selects 'Contact Me' option</li></ul></td>
7676
<td valign="top" width="33%">2.<br/><img src="media/active-directory-devhowto-appsource-certified/partner-led-trial-step2.png" width="85%" alt-text="Shows an example form with contact info"/><ul><li>Fills out a form with contact information</li></ul></td>
7777
<td valign="top" width="33%">3.<br/><br/>
7878
<table bgcolor="#f7f7f7">

articles/active-directory/azuread-dev/howto-reactivate-disabled-acs-namespaces.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ ms.date: 01/21/2019
1313
ms.author: ryanwi
1414
ms.reviewer: jlu
1515
ms.custom: aaddev
16+
ROBOTS: NOINDEX
1617
---
1718

1819
# How to: Reactivate disabled Access Control Service namespaces
@@ -21,7 +22,7 @@ ms.custom: aaddev
2122

2223
On November 2017, we announced that Microsoft Azure Access Control Service (ACS), a service of Azure Active Directory (Azure AD), is being retired on November 7, 2018.
2324

24-
Since then, we've sent emails to the ACS subscriptions admin email about the ACS retirement 12 months, 9 months, 6 months, 3 months, 1 month, 2 weeks, 1 week, and 1 day before the retirement date of November 7, 2018.
25+
Since then, we've sent emails to the ACS subscriptions' admin email about the ACS retirement 12 months, 9 months, 6 months, 3 months, 1 month, 2 weeks, 1 week, and 1 day before the retirement date of November 7, 2018.
2526

2627
On October 3, 2018, we announced (through email and [a blog post](https://azure.microsoft.com/blog/one-month-retirement-notice-access-control-service/)) an extension offer to customers who can't finish their migration before November 7, 2018. The announcement also had instructions for requesting the extension.
2728

0 commit comments

Comments
 (0)