Skip to content

Commit b4665f4

Browse files
authored
Merge pull request #91335 from MicrosoftDocs/master
10/10 PM Publish
2 parents 1c2659a + 306e23c commit b4665f4

File tree

84 files changed

+1507
-934
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+1507
-934
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,12 @@
99
"source_path": "articles/azure-government/documentation-government-get-started-connect-with-vs.md",
1010
"redirect_url": "/azure/azure-government/documentation-government-welcome",
1111
"redirect_document_id": false
12-
},
12+
},
13+
{
14+
"source_path": "articles/container-registry/container-registry-auth-aks.md",
15+
"redirect_url": "/azure/aks/cluster-container-registry-integration",
16+
"redirect_document_id": true
17+
},
1318
{
1419
"source_path": "articles/security/develop/security-code-analysis-install.md",
1520
"redirect_url": "/azure/security/develop/security-code-analysis-onboard",

articles/active-directory/develop/customize-webviews.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222

2323
# How to: Customize browsers and WebViews for iOS/macOS
2424

25-
A web browser is required for interactive authentication. On iOS, the Microsoft Authentication Library (MSAL) uses a system web browser by default (which might appear on top of your app) to do interactive authentication to sign in users. Using the system browser has the significant advantage of sharing the Single Sign ON (SSO) state with other applications and with web applications.
25+
A web browser is required for interactive authentication. On iOS, the Microsoft Authentication Library (MSAL) uses the system web browser by default (which might appear on top of your app) to do interactive authentication to sign in users. Using the system browser has the advantage of sharing the Single Sign ON (SSO) state with other applications and with web applications.
2626

2727
You can change the experience by customizing the configuration to other options for displaying web content, such as:
2828

articles/active-directory/develop/howto-v2-keychain-objc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222

2323
# Configure keychain
2424

25-
When the [Microsoft Authentication Library for iOS and macOS](msal-overview.md) (MSAL) signs in a user, or refreshes a token, it tries to cache tokens in the keychain. By caching tokens in the keychain, MSAL can provide silent single sign-on (SSO) between multiple apps distributed by the same Apple developer. SSO is achieved via the keychain access groups functionality (see [Apple's documentation](https://developer.apple.com/documentation/security/keychain_services/keychain_items/sharing_access_to_keychain_items_among_a_collection_of_apps?language=objc))
25+
When the [Microsoft Authentication Library for iOS and macOS](msal-overview.md) (MSAL) signs in a user, or refreshes a token, it tries to cache tokens in the keychain. Caching tokens in the keychain allows MSAL to provide silent single sign-on (SSO) between multiple apps that are distributed by the same Apple developer. SSO is achieved via the keychain access groups functionality. For more information, see Apple's [Keychain Items documentation](https://developer.apple.com/documentation/security/keychain_services/keychain_items/sharing_access_to_keychain_items_among_a_collection_of_apps?language=objc).
2626

2727
This article covers how to configure app entitlements so that MSAL can write cached tokens to iOS and macOS keychain.
2828

articles/active-directory/develop/quickstart-v2-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -263,7 +263,7 @@ self.applicationContext!.acquireTokenSilent(with: silentParams) { (result, error
263263
> |Where: ||
264264
> |---------|---------|
265265
> | `scopes` | Contains the scopes being requested (that is, `[ "user.read" ]` for Microsoft Graph or `[ "<Application ID URL>/scope" ]` for custom Web APIs (`api://<Application ID>/access_as_user`) |
266-
> | `account` | The account a token is being requested for. This quickstart is a single account application, if you want to build a multi-account app you'll need to define logic to identify which account to use for token requests `applicationContext.account(forHomeAccountId: self.homeAccountId)` |
266+
> | `account` | The account a token is being requested for. This quickstart is about a single account application. If you want to build a multi-account app you'll need to define logic to identify which account to use for token requests using `applicationContext.account(forHomeAccountId: self.homeAccountId)` |
267267
268268
## Next steps
269269

articles/active-directory/develop/sso-between-adal-msal-apps-macos-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ You can save this identifier to use in MSAL for account lookups with the `accoun
107107

108108
If `homeAccountId` is not available, or you only have the displayable identifier, you can use ADAL's `userId` to lookup the account in MSAL.
109109

110-
In MSAL, first look up an account by `username` or `identifier`. Always use `identifier` for querying if you have it and only use `username` as a fallback. If account is found, use the account in the acquireTokenSilent calls.
110+
In MSAL, first look up an account by `username` or `identifier`. Always use `identifier` for querying if you have it, and only use `username` as a fallback. If the account is found, use the account in the `acquireTokenSilent` calls.
111111

112112
Objective-C:
113113

articles/active-directory/manage-apps/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,10 @@ metadata:
77
title: Application management documentation
88
description: Azure Active Directory provides secure and seamless access to cloud and on-premises applications. Plus, there's no need to manage passwords. Your end-users can sign in once to access Office 365 and thousands of other applications. Learn how to manage and deploy applications with our quickstarts, tutorials, and guidance.
99
ms.service: active-directory
10-
ms.subservice: manage-apps
10+
ms.subservice: app-mgmt
1111
ms.workload: identity
1212
ms.topic: landing-page
13-
ms.date: 08/16/2019
13+
ms.date: 10/10/2019
1414
author: msmimart
1515
ms.author: mimart
1616
manager: celested

articles/active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ To use this feature, you need:
3939

4040
1. Sign in to the [Azure portal](https://portal.azure.com).
4141

42-
2. Select **Azure Active Directory** > **Activity** > **Audit logs**.
42+
2. Select **Azure Active Directory** > **Monitoring** > **Audit logs**.
4343

4444
3. Select **Export Settings**.
4545

0 commit comments

Comments
 (0)