You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/howto-get-appsource-certified.md
+27-20Lines changed: 27 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,41 +14,46 @@ ms.devlang: na
14
14
ms.topic: article
15
15
ms.tgt_pltfrm: na
16
16
ms.workload: identity
17
-
ms.date: 08/03/2017
17
+
ms.date: 08/21/2018
18
18
ms.author: celested
19
19
ms.reviewer: andret
20
20
ms.custom: aaddev
21
21
---
22
22
23
23
# How to get AppSource Certified for Azure Active Directory
24
+
24
25
[Microsoft AppSource](https://appsource.microsoft.com/) is a destination for business users to discover, try, and manage line-of-business SaaS applications (standalone SaaS and add-on to existing Microsoft SaaS products).
25
26
26
-
To list a standalone SaaS application on AppSource, your application must accept single sign-on from work accounts from any company or organization that has Azure Active Directory. The sign-in process must use the [OpenID Connect](v1-protocols-openid-connect-code.md) or [OAuth 2.0](v1-protocols-oauth-code.md) protocols. SAML integration is not accepted for AppSource certification.
27
+
To list a standalone SaaS application on AppSource, your application must accept single sign-on from work accounts from any company or organization that has Azure Active Directory (Azure AD). The sign-in process must use the [OpenID Connect](v1-protocols-openid-connect-code.md) or [OAuth 2.0](v1-protocols-oauth-code.md) protocols. SAML integration is not accepted for AppSource certification.
27
28
28
29
## Guides and code samples
29
-
If you want to learn about how to integrate your application with Azure Active Directory using Open ID connect, follow our guides and code samples in the [Azure Active Directory developer's guide](azure-ad-developers-guide.md#get-started"Get Started with Azure AD for developers").
30
+
31
+
If you want to learn about how to integrate your application with Azure AD using Open ID connect, follow our guides and code samples in the [Azure Active Directory developer's guide](azure-ad-developers-guide.md#get-started"Get Started with Azure AD for developers").
30
32
31
33
## Multi-tenant applications
32
34
33
-
An applicationthat accepts sign-ins from users from any company or organization that have Azure Active Directory without requiring a separate instance, configuration, or deployment is known as a *multi-tenant application*. AppSource recommends that applications implement multi-tenancy to enable the *single-click* free trial experience.
35
+
A *multi-tenant application* is an application that accepts sign-ins from users from any company or organization that have Azure AD without requiring a separate instance, configuration, or deployment. AppSource recommends that applications implement multi-tenancy to enable the *single-click* free trial experience.
34
36
35
-
In order to enable multi-tenancy on your application:
36
-
- Set `Multi-Tenanted` property to `Yes` on your application registration's information in the [Azure Portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps) (by default, applications created in the Azure Portal are configured as *single-tenant*)
37
-
- Update your code to send requests to the '`common`' endpoint (update the endpoint from *https://login.microsoftonline.com/{yourtenant}* to *https://login.microsoftonline.com/common*)
38
-
- For some platforms, like ASP.NET, you need also to update your code to accept multiple issuers
37
+
To enable multi-tenancy on your application, follow these steps:
38
+
1. Set `Multi-Tenanted` property to `Yes` on your application registration's information in the [Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps). By default, applications created in the Azure portal are configured as *[single-tenant](#single-tenant-applications)*.
39
+
1. Update your code to send requests to the `common` endpoint. To do this, update the endpoint from `https://login.microsoftonline.com/{yourtenant}` to `https://login.microsoftonline.com/common*`.
40
+
1. For some platforms, like ASP.NET, you need also to update your code to accept multiple issuers.
39
41
40
-
For more information about multi-tenancy, see:[How to sign in any Azure Active Directory (AD) user using the multi-tenant application pattern](howto-convert-app-to-be-multi-tenant.md).
42
+
For more information about multi-tenancy, see [How to sign in any Azure Active Directory (Azure AD) user using the multi-tenant application pattern](howto-convert-app-to-be-multi-tenant.md).
41
43
42
44
### Single-tenant applications
43
-
Applications that only accept sign-ins from users of a defined Azure Active Directory instance are known as *single-tenant application*. External users (including Work or School accounts from other organizations, or personal account) can sign in to a single-tenant application after adding each user as *guest account* to the Azure Active Directory instance that the application is registered. You can add users as guest accounts to an Azure Active Directory via the [*Azure AD B2B collaboration*](../b2b/what-is-b2b.md) - and it can be done [programatically](../../active-directory-b2c/code-samples.md). When you add a user as guest account to an Azure Active Directory, an invitation email is sent to the user, who has to accept the invitation by clicking on the link in the invitation email. Invitations that are sent to an additional user in an inviting organization that is also a member of the partner organization are not required to accept an invitation to sign in.
44
45
45
-
Single-tenant applications can enable the *Contact Me* experience, but if you want to enable the single-click/ free trial experience that AppSource recommends, enable multi-tenancy on your application instead.
46
+
A *single-tenant application* is an application that only accepts sign-ins from users of a defined Azure AD instance. External users (including work or school accounts from other organizations, or personal accounts) can sign in to a single-tenant application after adding each user as a guest account to the Azure AD instance that the application is registered.
46
47
48
+
You can add users as guest accounts to Azure AD through the [Azure AD B2B collaboration](../b2b/what-is-b2b.md) and you can do this [programatically](../../active-directory-b2c/code-samples.md). When using B2B, users can create a self-service portal that does not require an invitation to sign in. For more info, see [Self-service portal for Azure AD B2B collaboration sign-up](https://docs.microsoft.com/azure/active-directory/b2b/self-service-portal).
49
+
50
+
Single-tenant applications can enable the *Contact Me* experience, but if you want to enable the single-click/free trial experience that AppSource recommends, enable multi-tenancy on your application instead.
47
51
48
52
## AppSource trial experiences
49
53
50
-
### Free Trial (Customer-led trial experience)
51
-
The *customer-led trial* is the experience that AppSource recommends as it offers a single-click access to your application. Below an illustration of how this experience looks like:<br/><br/>
54
+
### Free trial (customer-led trial experience)
55
+
56
+
The customer-led trial is the experience that AppSource recommends as it offers a single-click access to your application. Below an illustration of how this experience looks like:<br/><br/>
52
57
53
58
<table >
54
59
<tr>
@@ -63,8 +68,9 @@ The *customer-led trial* is the experience that AppSource recommends as it offer
63
68
</tr>
64
69
</table>
65
70
66
-
### Contact Me (Partner-led trial experience)
67
-
The *partner trial experience* can be used when a manual or a long-term operation needs to happen to provision the user/ company: for example, your application needs to provision virtual machines, database instances, or operations that take much time to complete. In this case, after user selects the *'Request Trial'* button and fills out a form, AppSource sends you the user's contact information. Upon receiving this information, you then provision the environment and send the instructions to the user on how to access the trial experience:<br/><br/>
71
+
### Contact me (partner-led trial experience)
72
+
73
+
You can use the partner trial experience when a manual or a long-term operation needs to happen to provision the user/company--for example, your application needs to provision virtual machines, database instances, or operations that take much time to complete. In this case, after the user selects the **Request Trial** button and fills out a form, AppSource sends you the user's contact information. When you receive this information, you then provision the environment and send the instructions to the user on how to access the trial experience:<br/><br/>
68
74
69
75
<tablevalign="top">
70
76
<tr>
@@ -97,17 +103,18 @@ The *partner trial experience* can be used when a manual or a long-term operatio
97
103
</table>
98
104
99
105
### More information
106
+
100
107
For more information about the AppSource trial experience, see [this video](https://aka.ms/trialexperienceforwebapps).
101
108
102
109
## Next Steps
103
110
104
-
- For more information on building applications that support Azure Active Directory sign-ins, see [Authentication Scenarios for Azure AD](https://docs.microsoft.com/azure/active-directory/develop/active-directory-authentication-scenarios)
105
-
111
+
- For more information on building applications that support Azure AD sign-ins, see [Authentication scenarios for Azure AD](https://docs.microsoft.com/azure/active-directory/develop/authentication-scenarios).
106
112
- For information on how to list your SaaS application in AppSource, go see [AppSource Partner Information](https://appsource.microsoft.com/partners)
107
113
108
114
109
-
## Get Support
110
-
For Azure Active Directory integration, we use [Stack Overflow](http://stackoverflow.com/questions/tagged/azure-active-directory+appsource) with the community to provide support.
115
+
## Get support
116
+
117
+
For Azure AD integration, we use [Stack Overflow](http://stackoverflow.com/questions/tagged/azure-active-directory+appsource) with the community to provide support.
111
118
112
119
We highly recommend you ask your questions on Stack Overflow first and browse existing issues to see if someone has asked your question before. Make sure that your questions or comments are tagged with [`[azure-active-directory]` and `[appsource]`](http://stackoverflow.com/questions/tagged/azure-active-directory+appsource).
113
120
@@ -121,4 +128,4 @@ Use the following comments section to provide feedback and help us refine and sh
Copy file name to clipboardExpand all lines: articles/active-directory/develop/v2-permissions-and-consent.md
+14-1Lines changed: 14 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: article
17
-
ms.date: 01/07/2017
17
+
ms.date: 08/21/2018
18
18
ms.author: celested
19
19
ms.reviewer: hirsin, dastrock
20
20
ms.custom: aaddev
@@ -70,6 +70,19 @@ If your app does not request the `offline_access` scope, it won't receive refres
70
70
71
71
For more information about how to get and use refresh tokens, see the [v2.0 protocol reference](active-directory-v2-protocols.md).
72
72
73
+
## Accessing v1.0 resources
74
+
v2.0 applications can request tokens and consent for v1.0 applications (such as the PowerBI API `https://analysis.windows.net/powerbi/api` or Sharepoint API `https://{tenant}.sharepoint.com`). To do so, you can reference the app URI and scope string in the `scope` parameter. For example, `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All` would request the PowerBI `View all Datasets` permission for your application.
75
+
76
+
To request multiple permissions, append the entire URI with a space or `+`, e.g. `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All+https://analysis.windows.net/powerbi/api/Report.Read.All`. This requests both the `View all Datasets` and `View all Reports` permissions. Note that as with all Azure AD scopes and permissions, applications can only make a request to one resource at a time - so the request `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All+https://api.skypeforbusiness.com/Conversations.Initiate`, which requests both the PowerBI `View all Datasets` permission and the Skype for Business `Initiate conversations` permission, will be rejected due to requesting permissions on two different resources.
77
+
78
+
### v1.0 resources and tenancy
79
+
Both the v1.0 and v2.0 Azure AD protocols use a `{tenant}` parameter embedded in the URI (`https://login.microsoftonline.com/{tenant}/oauth2/`). When using the v2.0 endpoint to access a v1.0 organizational resource, the `common` and `consumers` tenants cannot be used, as these resources are only accessible with organizational (Azure AD) accounts. Thus, when accessing these resources, only the tenant GUID or `organizations` can be used as the `{tenant}` parameter.
80
+
81
+
If an application attempts to access an organizational v1.0 resource using an incorrect tenant, an error similar to the one below will be returned.
82
+
83
+
`AADSTS90124: Resource 'https://analysis.windows.net/powerbi/api' (Microsoft.Azure.AnalysisServices) is not supported over the /common or /consumers endpoints. Please use the /organizations or tenant-specific endpoint.`
84
+
85
+
73
86
## Requesting individual user consent
74
87
In an [OpenID Connect or OAuth 2.0](active-directory-v2-protocols.md) authorization request, an app can request the permissions it needs by using the `scope` query parameter. For example, when a user signs in to an app, the app sends a request like the following example (with line breaks added for legibility):
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-proxy-publish-azure-portal.md
+3-6Lines changed: 3 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,19 +2,15 @@
2
2
title: Publish apps with Azure AD Application Proxy | Microsoft Docs
3
3
description: Publish on-premises applications to the cloud with Azure AD Application Proxy in the Azure portal.
4
4
services: active-directory
5
-
documentationcenter: ''
6
5
author: barbkess
7
6
manager: mtillman
8
-
9
7
ms.service: active-directory
10
8
ms.component: app-mgmt
11
9
ms.workload: identity
12
-
ms.tgt_pltfrm: na
13
-
ms.devlang: na
14
10
ms.topic: conceptual
15
-
ms.date: 05/24/2018
11
+
ms.date: 08/20/2018
16
12
ms.author: barbkess
17
-
ms.reviewer: harshja
13
+
ms.reviewer: japere
18
14
ms.custom: it-pro
19
15
---
20
16
@@ -69,6 +65,7 @@ Follow these steps to publish your apps with Application Proxy. If you haven't a
69
65

70
66
5. If necessary, configure additional settings. For most applications, you should keep these settings in their default states.
71
67
-**Backend Application Timeout**: Set this value to **Long** only if your application is slow to authenticate and connect.
68
+
-**Use HTTP-Only Cookie**: Set this value to **Yes** to have Application Proxy cookies include the HTTPOnly flag in the HTTP response header.
72
69
-**Translate URLs in Headers**: Keep this value as **Yes** unless your application required the original host header in the authentication request.
73
70
-**Translate URLs in Application Body**: Keep this value as **No** unless you have hardcoded HTML links to other on-premises applications, and don't use custom domains. For more information, see [Link translation with Application Proxy](application-proxy-configure-hard-coded-link-translation.md).
Copy file name to clipboardExpand all lines: articles/aks/kubelet-logs.md
+16-13Lines changed: 16 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,36 +1,34 @@
1
1
---
2
-
title: Get kubelet logs from Azure Kubernetes Service (AKS)
3
-
description: Get kubelet logs from Azure Kubernetes Service (AKS) cluster nodes
2
+
title: View kubelet logs in Azure Kubernetes Service (AKS)
3
+
description: How to view troubleshooting information in the kubelet logs from Azure Kubernetes Service (AKS) nodes
4
4
services: container-service
5
5
author: iainfoulds
6
-
manager: jeconnoc
7
6
8
7
ms.service: container-service
9
8
ms.topic: article
10
-
ms.date: 05/08/2018
9
+
ms.date: 08/21/2018
11
10
ms.author: iainfou
12
-
ms.custom: mvc
13
11
---
14
12
15
13
# Get kubelet logs from Azure Kubernetes Service (AKS) cluster nodes
16
14
17
-
Occasionally, you may need to get kubelet logs from an Azure Kubernetes Service (AKS) node for troubleshooting purposes. This document details one option for pulling these logs.
15
+
Occasionally, you may need to get *kubelet* logs from an Azure Kubernetes Service (AKS) node for troubleshooting purposes. This article shows you how you can use `journalctl` to view the *kubelet* logs.
18
16
19
17
## Create an SSH connection
20
18
21
-
First, create an SSH connection with the node on which you need to pull kubelet logs. This operation is detailed in the [SSH into Azure Kubernetes Service (AKS) cluster nodes][aks-ssh] document.
19
+
First, create an SSH connection with the node on which you need to view *kubelet* logs. This operation is detailed in the [SSH into Azure Kubernetes Service (AKS) cluster nodes][aks-ssh] document.
22
20
23
21
## Get kubelet logs
24
22
25
-
Once you have connected to the node, run the following command to pull the kubelet logs.
23
+
Once you have connected to the node, run the following command to pull the *kubelet* logs:
26
24
27
-
```azurecli-interactive
28
-
journalctl -u kubelet -o cat
25
+
```console
26
+
sudo journalctl -u kubelet -o cat
29
27
```
30
28
31
-
Sample Output:
29
+
The following sample output shows the *kubelet* log data:
32
30
33
-
```console
31
+
```
34
32
I0508 12:26:17.905042 8672 kubelet_node_status.go:497] Using Node Hostname from cloudprovider: "aks-agentpool-11482510-0"
35
33
I0508 12:26:27.943494 8672 kubelet_node_status.go:497] Using Node Hostname from cloudprovider: "aks-agentpool-11482510-0"
36
34
I0508 12:26:28.920125 8672 server.go:796] GET /stats/summary: (10.370874ms) 200 [[Ruby] 10.244.0.2:52292]
### Setup for role-based access control (RBAC) permissions
106
+
### Give Key Vault access to your Storage Account
107
107
108
-
The Azure Key Vault application identity needs permissions to *list* and
109
-
*regenerate* keys for a storage account. Set up these permissions using the
110
-
following steps:
108
+
Like many applications, Key Vault is registered with Azure AD in order to use OAuth to access other services. During registration, [a service principal](/azure/active-directory/develop/app-objects-and-service-principals) object is created, which is used to represent the application's identity at run time. The service principal is also used to authorize the application's identity to access another resource, through role-based access control (RBAC).
109
+
110
+
The Azure Key Vault application identity needs permissions to *list* and *regenerate* keys for your storage account. Set up these permissions using the following steps:
111
111
112
112
```powershell
113
113
# Get the resource ID of the Azure Storage Account you want to manage.
114
114
# Below, we are fetching a storage account using Azure Resource Manager
0 commit comments