Skip to content

Commit bc77258

Browse files
authored
Merge pull request #95082 from MicrosoftDocs/master
11/06 PM Publish
2 parents 609d4bd + 5e6c4a1 commit bc77258

File tree

280 files changed

+2286
-2375
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

280 files changed

+2286
-2375
lines changed

.openpublishing.redirection.json

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5286,6 +5286,21 @@
52865286
"redirect_url": "/azure/app-service-mobile",
52875287
"redirect_document_id": false
52885288
},
5289+
{
5290+
"source_path": "articles/application-gateway/application-gateway-web-application-firewall-portal.md",
5291+
"redirect_url": "/azure/web-application-firewall/ag/application-gateway-web-application-firewall-portal",
5292+
"redirect_document_id": false
5293+
},
5294+
{
5295+
"source_path": "articles/application-gateway/tutorial-restrict-web-traffic-powershell.md",
5296+
"redirect_url": "/azure/web-application-firewall/ag/tutorial-restrict-web-traffic-powershell",
5297+
"redirect_document_id": false
5298+
},
5299+
{
5300+
"source_path": "articles/application-gateway/tutorial-restrict-web-traffic-cli.md",
5301+
"redirect_url": "/azure/web-application-firewall/ag/tutorial-restrict-web-traffic-cli",
5302+
"redirect_document_id": false
5303+
},
52895304
{
52905305
"source_path": "articles/application-gateway/configure-waf-custom-rules.md",
52915306
"redirect_url": "/azure/web-application-firewall/ag/configure-waf-custom-rules",
@@ -43367,6 +43382,9 @@
4336743382
{
4336843383
"source_path": "articles/machine-learning/algorithm-module-reference/import-from-web-url-via-http.md",
4336943384
"redirect_url": "/azure/machine-learning/algorithm-module-reference/module-reference",
43385+
"redirect_document_id": false
43386+
},
43387+
{
4337043388
"source_path": "articles/industry/financial/actuarial-risk-analysis-and-financial-modeling-overview.md",
4337143389
"redirect_url": "/azure/industry-marketing/financial/actuarial-risk-analysis-and-financial-modeling-overview",
4337243390
"redirect_document_id": false
@@ -43486,11 +43504,6 @@
4348643504
"redirect_url": "/azure/industry-marketing/retail/visual-search-use-case-overview",
4348743505
"redirect_document_id": false
4348843506
},
43489-
{
43490-
"source_path": "articles/industry/index.md",
43491-
"redirect_url": "/azure/industry-marketing/index",
43492-
"redirect_document_id": false
43493-
},
4349443507
{
4349543508
"source_path": "articles/machine-learning/service/how-to-ui-sample-classification-predict-churn.md",
4349643509
"redirect_url": "how-to-designer-sample-classification-churn",

articles/active-directory-domain-services/deploy-azure-app-proxy.md

Lines changed: 68 additions & 74 deletions
Large diffs are not rendered by default.
74.3 KB
Loading
111 KB
Loading

articles/active-directory/develop/authentication-scenarios.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ This article covers many of the authentication concepts you'll need to understan
3434

3535
Instead of creating apps that each maintain their own username and password information, which incurs a high administrative burden when you need to add or remove users across multiple apps, apps can delegate that responsibility to a centralized identity provider.
3636

37-
Azure Active Directory (Azure AD) is a centralized identify provider in the cloud. Delegating authentication and authorization to it enables scenarios such as Conditional Access policies that require a user to be in a specific location, the use of multi-factor authentication, as well as enabling a user to sign in once and then be automatically signed in to all of the web apps that share the same centralized directory. This capability is referred to as Single Sign On (SSO).
37+
Azure Active Directory (Azure AD) is a centralized identity provider in the cloud. Delegating authentication and authorization to it enables scenarios such as Conditional Access policies that require a user to be in a specific location, the use of multi-factor authentication, as well as enabling a user to sign in once and then be automatically signed in to all of the web apps that share the same centralized directory. This capability is referred to as Single Sign On (SSO).
3838

3939
A centralized identity provider is even more important for apps that have users located around the globe that don't necessarily sign in from the enterprise's network. Azure AD authenticates users and provides access tokens. An access token is a security token that is issued by an authorization server. It contains information about the user and the app for which the token is intended, which can be used to access Web APIs and other protected resources.
4040

@@ -50,7 +50,7 @@ Azure AD also provides Azure Active Directory B2C so that organizations can sig
5050

5151
### Security tokens
5252

53-
Security tokens contain information about users and apps. Azure AD uses JSon based tokens (JWTs) that contain claims. A claim provides assertions about one entity to another. Applications can use claims for various tasks such as:
53+
Security tokens contain information about users and apps. Azure AD uses JSON based tokens (JWTs) that contain claims. A claim provides assertions about one entity to another. Applications can use claims for various tasks such as:
5454

5555
* Validating the token
5656
* Identifying the subject's directory tenant
@@ -80,7 +80,7 @@ Applications can sign in users themselves or delegate sign-in to an identity pro
8080
For an identity provider to know that a user has access to a particular app, both the user and the application must be registered with the identity provider. When you register your application with Azure AD, you are providing an identity configuration for your application that allows it to integrate with Azure AD. Registering the app also allows you to:
8181

8282
- customize the branding of your application in the sign-in dialog. This is important because this is the first experience a user will have with your app.
83-
- decide if you want to let users sign in only if they belong to your organization. This is a single tenant application. Or allow users to sign in using any work or school account. This is a multi-tenant application. You can also allow personal Microsoft accounts, or a social account from Linked-In, Google, and so on.
83+
- decide if you want to let users sign in only if they belong to your organization. This is a single tenant application. Or allow users to sign in using any work or school account. This is a multi-tenant application. You can also allow personal Microsoft accounts, or a social account from LinkedIn, Google, and so on.
8484
- request scope permissions. For example, you can request the "user.read" scope, which grants permission to read the profile of the signed-in user.
8585
- define scopes that define access to your Web API. Typically, when an app wants to access your API, it will need to request permissions to the scopes you define.
8686
- share a secret with Azure AD that proves the app's identity to Azure AD. This is relevant in the case where the app is a confidential client application. A confidential client application is an application that can hold credentials securely. They require a trusted backend server to store the credentials.
@@ -95,9 +95,9 @@ The Microsoft identity platform:
9595
* Holds all the data required to support authentication at runtime.
9696
* Holds all the data for deciding what resources an app might need to access, and under what circumstances a given request should be fulfilled.
9797
* Provides infrastructure for implementing app provisioning within the app developer's tenant, and to any other Azure AD tenant.
98+
* Handles user consent during token request time and facilitate the dynamic provisioning of apps across tenants
9899

99-
Handle user consent during token request time and facilitate the dynamic provisioning of apps across tenants
100-
Consent is the process of a resource owner granting authorization to a client application to access protected resources, under specific permissions, on behalf of the resource owner. The Microsoft identity platform:
100+
Consent is the process of a resource owner granting authorization for a client application to access protected resources, under specific permissions, on behalf of the resource owner. The Microsoft identity platform:
101101

102102
* Enables users and administrators to dynamically grant or deny consent for the app to access resources on their behalf.
103103
* Enables administrators to ultimately decide what apps are allowed to do and which users can use specific apps, and how the directory resources are accessed.

0 commit comments

Comments
 (0)