You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/troubleshoot.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -134,7 +134,7 @@ If one or more users in your Azure AD tenant can't sign in to the Azure AD DS ma
134
134
* You've deployed, or updated to, the [latest recommended release of Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
135
135
* You've configured Azure AD Connect to [perform a full synchronization][hybrid-phs].
136
136
* Depending on the size of your directory, it may take a while for user accounts and credential hashes to be available in Azure AD DS. Make sure you wait long enough before trying to authenticate against the managed domain.
137
-
* If the issue persists after verifying the previous steps, try restarting the *Microsoft Azure AD Sync Service*. From your [management VM][management-vm], open a command prompt and run the following commands:
137
+
* If the issue persists after verifying the previous steps, try restarting the *Microsoft Azure AD Sync Service*. From your Azure AD Connect server, open a command prompt and run the following commands:
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-grant.md
+2-35Lines changed: 2 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,35 +64,7 @@ Organizations can choose to use the device identity as part of their Conditional
64
64
65
65
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile-device management (MDM) solution.
66
66
67
-
This setting applies to the following client apps:
68
-
69
-
- Microsoft Azure Information Protection
70
-
- Microsoft Bookings
71
-
- Microsoft Cortana
72
-
- Microsoft Dynamics 365
73
-
- Microsoft Edge
74
-
- Microsoft Excel
75
-
- Microsoft Flow
76
-
- Microsoft Intune Managed Browser
77
-
- Microsoft Invoicing
78
-
- Microsoft Kaizala
79
-
- Microsoft Launcher
80
-
- Microsoft OneDrive
81
-
- Microsoft OneNote
82
-
- Microsoft Outlook
83
-
- Microsoft Planner
84
-
- Microsoft PowerApps
85
-
- Microsoft Power BI
86
-
- Microsoft PowerPoint
87
-
- Microsoft SharePoint
88
-
- Microsoft Skype for Business
89
-
- Microsoft StaffHub
90
-
- Microsoft Stream
91
-
- Microsoft Teams
92
-
- Microsoft To-Do
93
-
- Microsoft Visio
94
-
- Microsoft Word
95
-
- Microsoft Yammer
67
+
Supported applications can be found in the article, [Microsoft Intune protected apps](/intune/apps/apps-supported-intune-apps).
96
68
97
69
**Remarks**
98
70
@@ -105,12 +77,7 @@ This setting applies to the following client apps:
105
77
106
78
In your Conditional Access policy, you can require an [Intune app protection policy](/intune/app-protection-policy) be present on the client app before access is available to the selected cloud apps.
107
79
108
-
This setting applies to the following client apps:
109
-
110
-
- Microsoft Cortana
111
-
- Microsoft OneDrive
112
-
- Microsoft Outlook
113
-
- Microsoft Planner
80
+
Supported applications can be found in the article, [Microsoft Intune protected apps](/intune/apps/apps-supported-intune-apps).
# Quickstart: Add sign-in with Microsoft to an ASP.NET Core web app
20
-
21
-
In this quickstart, you'll learn how an ASP.NET Core web app can sign in personal accounts (hotmail.com, outlook.com, others) and work and school accounts from any Azure Active Directory (Azure AD) instance.
22
-
23
-

24
-
20
+
In this quickstart, you use a code sample to learn how an ASP.NET Core web app can sign in personal accounts (hotmail.com, outlook.com, others) and work and school accounts from any Azure Active Directory (Azure AD) instance. (See [How the sample works](#how-the-sample-works) for an illustration.)
25
21
> [!div renderon="docs"]
26
22
> ## Register and download your quickstart app
27
23
> You have two options to start your quickstart application:
@@ -63,22 +59,32 @@ In this quickstart, you'll learn how an ASP.NET Core web app can sign in persona
63
59
64
60
#### Step 2: Download your ASP.NET Core project
65
61
66
-
-[Download the Visual Studio 2019 solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore2-2.zip)
67
-
68
-
#### Step 3: Configure your Visual Studio project
69
-
70
-
1. Extract the zip file to a local folder within the root folder - for example, **C:\Azure-Samples**
71
-
1. If you use Visual Studio 2019, open the solution in Visual Studio (optional).
72
-
1. Edit the **appsettings.json** file. Find `ClientId` and update the value of `ClientId` with the **Application (client) ID** value of the application you registered.
62
+
> [!div renderon="docs"]
63
+
> [Download the Visual Studio 2019 solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore2-2.zip)
> #### Step 3: Your app is configured and ready to run
72
+
> We have configured your project with values of your app's properties and it's ready to run.
79
73
> [!div class="sxs-lookup" renderon="portal"]
80
74
> > [!NOTE]
81
-
> > This quickstart supports Enter_the_Supported_Account_Info_Here.
75
+
> > Enter_the_Supported_Account_Info_Here
76
+
> [!div renderon="docs"]
77
+
> #### Step 3: Run your Visual Studio project
78
+
> 1. Extract the zip file to a local folder within the root folder - for example, **C:\Azure-Samples**
79
+
> 1. Open the solution in Visual Studio
80
+
> 1. Edit the **appsettings.json** file. Find `ClientId` and update the value of `ClientId` with the **Application (client) ID** value of the application you registered.
81
+
>
82
+
> ```json
83
+
> "ClientId": "Enter_the_Application_Id_here"
84
+
> "TenantId": "Enter_the_Tenant_Info_Here"
85
+
> ```
86
+
87
+
82
88
83
89
> [!div renderon="docs"]
84
90
> Where:
@@ -95,6 +101,9 @@ In this quickstart, you'll learn how an ASP.NET Core web app can sign in persona
95
101
96
102
This section gives an overview of the code required to sign in users. This overview can be useful to understand how the code works, main arguments, and also if you want to add sign-in to an existing ASP.NET Core application.
97
103
104
+
### How the sample works
105
+

106
+
98
107
### Startup class
99
108
100
109
*Microsoft.AspNetCore.Authentication* middleware uses a Startup class that is executed when the hosting process initializes:
@@ -161,4 +170,4 @@ Check out the GitHub repo for this ASP.NET Core tutorial for more information in
161
170
Help us improve the Microsoft identity platform. Tell us what you think by completing a short two-question survey.
# Quickstart: Add Microsoft identity platform sign-in to an ASP.NET web app
20
-
21
-
In this quickstart, you'll enable an ASP.NET web app to sign in personal accounts (hotmail.com, outlook.com, others) and work and school accounts from any Azure Active Directory (Azure AD) instance.
22
-
23
-

24
-
20
+
In this quickstart, you use a code sample to learn how an ASP.NET web app to sign in personal accounts (hotmail.com, outlook.com, others) and work and school accounts from any Azure Active Directory (Azure AD) instance. (See [How the sample works](#how-the-sample-works) for an illustration.)
25
21
> [!div renderon="docs"]
26
22
> ## Register and download your quickstart app
27
23
> You have two options to start your quickstart application:
@@ -61,26 +57,33 @@ In this quickstart, you'll enable an ASP.NET web app to sign in personal account
61
57
62
58
#### Step 2: Download your project
63
59
64
-
[Download the Visual Studio 2019 solution](https://github.com/AzureADQuickStarts/AppModelv2-WebApp-OpenIDConnect-DotNet/archive/master.zip)
60
+
> [!div renderon="docs"]
61
+
> [Download the Visual Studio 2019 solution](https://github.com/AzureADQuickStarts/AppModelv2-WebApp-OpenIDConnect-DotNet/archive/master.zip)
> #### Step 3: Your app is configured and ready to run
70
+
> We have configured your project with values of your app's properties.
71
+
72
+
> [!div renderon="docs"]
73
+
> #### Step 3: Run your Visual Studio project
67
74
68
75
1. Extract the zip file to a local folder closer to the root folder - for example, **C:\Azure-Samples**
69
76
1. Open the solution in Visual Studio (AppModelv2-WebApp-OpenIDConnect-DotNet.sln)
70
77
1. Depending on the version of Visual Studio, you might need to right click on the project `AppModelv2-WebApp-OpenIDConnect-DotNet` and **Restore NuGet packages**
71
78
1. Open the Package Manager Console (View -> Other Windows -> Package Manager Console) and run `Update-Package Microsoft.CodeDom.Providers.DotNetCompilerPlatform -r`
72
-
1. Edit **Web.config** and replace the parameters `ClientId` and `Tenant` with:
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
85
88
> - `Enter_the_Tenant_Info_Here` - is one of the options below:
86
89
> - If your application supports **My organization only**, replace this value with the **Tenant Id** or **Tenant name** (for example, contoso.onmicrosoft.com)
@@ -91,10 +94,17 @@ In this quickstart, you'll enable an ASP.NET web app to sign in personal account
91
94
> > - To find the values of *Application ID*, *Directory (tenant) ID*, and *Supported account types*, go to the **Overview** page
92
95
> > - Ensure the value for `redirectUri` in the **Web.config** corresponds with the **Redirect URI** defined for the App Registration in Azure AD (if not, navigate to the **Authentication** menu for the App Registration and update the **REDIRECT URI** to match)
93
96
97
+
> [!div class="sxs-lookup" renderon="portal"]
98
+
> > [!NOTE]
99
+
> > Enter_the_Supported_Account_Info_Here
100
+
94
101
## More information
95
102
96
103
This section gives an overview of the code required to sign-in users. This overview can be useful to understand how the code works, main arguments, and also if you want to add sign-in to an existing ASP.NET application.
97
104
105
+
### How the sample works
106
+

107
+
98
108
### OWIN middleware NuGet packages
99
109
100
110
You can set up the authentication pipeline with cookie-based authentication using OpenID Connect in ASP.NET with OWIN Middleware packages. You can install these packages by running the following commands in Visual Studio's **Package Manager Console**:
In this quickstart, you'll learn how to integrate a Java web application with the Microsoft identity platform. Your app will sign in a user, get an access token to call the Microsoft Graph API, and make a request to the Microsoft Graph API.
20
20
21
-
When you've completed this quickstart, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory.
22
-
23
-

21
+
When you've completed this quickstart, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory. (See [How the sample works](#how-the-sample-works) for an illustration.)
24
22
25
23
## Prerequisites
26
24
27
25
To run this sample you will need:
28
26
29
27
-[Java Development Kit (JDK)](https://openjdk.java.net/) 8 or greater, and [Maven](https://maven.apache.org/).
30
-
- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [How to get an Azure AD tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/).
31
28
32
29
> [!div renderon="docs"]
33
30
> ## Register and download your quickstart app
@@ -69,7 +66,7 @@ To run this sample you will need:
69
66
>
70
67
> For the code sample for this quickstart to work, you need to:
71
68
>
72
-
> 1. Add reply URLs as `https://localhost:8080/msal4jsamples/secure/aad` and `https://localhost:8080/msal4jsamples/graph/me`.
69
+
> 1. Add reply URLs as `https://localhost:8080/msal4jsample/secure/aad` and `https://localhost:8080/msal4jsample/graph/me`.
@@ -78,46 +75,65 @@ To run this sample you will need:
78
75
> >  Your application is configured with these attributes.
79
76
80
77
#### Step 2: Download the code sample
78
+
> [!div renderon="docs"]
79
+
> [Download the Code Sample](https://github.com/Azure-Samples/ms-identity-java-webapp/archive/master.zip)
81
80
82
-
[Download the Code Sample](https://github.com/Azure-Samples/ms-identity-java-webapp/archive/master.zip)
83
-
84
-
#### Step 3: Configure the code sample
85
-
86
-
1. Extract the zip file to a local folder.
87
-
1. If you use an integrated development environment, open the sample in your favorite IDE (optional).
88
-
1. Open the application.properties file, which can be found in src/main/resources/ folder and replace the value of the fields *aad.clientId*, *aad.authority* and *aad.secretKey* with the respective values of **Application Id**, **Tenant Id** and **Client Secret** as the following:
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
103
-
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
104
-
> - `Enter_the_Tenant_Info_Here` - is the **Directory (tenant) ID** value of the application you registered.
105
-
106
-
1. To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
> Download the project and extract the zip file to a local folder closer to the root folder - for example, **C:\Azure-Samples**
83
+
>
84
+
> To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
> 1. If you use an integrated development environment, open the sample in your favorite IDE (optional).
104
+
> 1. Open the application.properties file, which can be found in src/main/resources/ folder and replace the value of the fields *aad.clientId*, *aad.authority* and *aad.secretKey* with the respective values of **Application Id**, **Tenant Id** and **Client Secret** as the following:
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
117
+
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
118
+
> - `Enter_the_Tenant_Info_Here` - is the **Directory (tenant) ID** value of the application you registered.
119
+
> 1. To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
> Put the generated keystore file in the "resources" folder.
117
131
118
-
Put the generated keystore file in the "resources" folder.
119
132
120
-
#### Step 4: Run the code sample
133
+
> [!div class="sxs-lookup" renderon="portal"]
134
+
> #### Step 3: Run the code sample
135
+
> [!div renderon="docs"]
136
+
> #### Step 4: Run the code sample
121
137
122
138
To run the project, you can either:
123
139
@@ -133,11 +149,16 @@ If you are running the web application from an IDE, click on run, then navigate
133
149
- *Sign Out*: Signs the current user out of the application and redirects them to the home page.
134
150
- *Show User Info*: Acquires a token for Microsoft Graph and calls Microsoft Graph with a request containing the token, which returns basic information about the signed-in user.
135
151
152
+
153
+
136
154
> [!IMPORTANT]
137
155
> This quickstart application uses a client secret to identify itself as confidential client. Because the client secret is added as a plain-text to your project files, for security reasons it is recommended that you use a certificate instead of a client secret before considering the application as production application. For more information on how to use a certificate, see [Certificate credentials for application authentication](https://docs.microsoft.com/azure/active-directory/develop/active-directory-certificate-credentials).
138
156
139
157
## More information
140
158
159
+
### How the sample works
160
+

161
+
141
162
### Getting MSAL
142
163
143
164
MSAL for Java (MSAL4J) is the Java library used to sign in users and request tokens used to access an API protected by the Microsoft identity Platform.
0 commit comments