Skip to content

Commit bdaa7ee

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 8126e39 + 96a26a0 commit bdaa7ee

File tree

230 files changed

+1668
-1385
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

230 files changed

+1668
-1385
lines changed

articles/active-directory-domain-services/troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ If one or more users in your Azure AD tenant can't sign in to the Azure AD DS ma
134134
* You've deployed, or updated to, the [latest recommended release of Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
135135
* You've configured Azure AD Connect to [perform a full synchronization][hybrid-phs].
136136
* Depending on the size of your directory, it may take a while for user accounts and credential hashes to be available in Azure AD DS. Make sure you wait long enough before trying to authenticate against the managed domain.
137-
* If the issue persists after verifying the previous steps, try restarting the *Microsoft Azure AD Sync Service*. From your [management VM][management-vm], open a command prompt and run the following commands:
137+
* If the issue persists after verifying the previous steps, try restarting the *Microsoft Azure AD Sync Service*. From your Azure AD Connect server, open a command prompt and run the following commands:
138138

139139
```console
140140
net stop 'Microsoft Azure AD Sync'

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 2 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -64,35 +64,7 @@ Organizations can choose to use the device identity as part of their Conditional
6464

6565
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile-device management (MDM) solution.
6666

67-
This setting applies to the following client apps:
68-
69-
- Microsoft Azure Information Protection
70-
- Microsoft Bookings
71-
- Microsoft Cortana
72-
- Microsoft Dynamics 365
73-
- Microsoft Edge
74-
- Microsoft Excel
75-
- Microsoft Flow
76-
- Microsoft Intune Managed Browser
77-
- Microsoft Invoicing
78-
- Microsoft Kaizala
79-
- Microsoft Launcher
80-
- Microsoft OneDrive
81-
- Microsoft OneNote
82-
- Microsoft Outlook
83-
- Microsoft Planner
84-
- Microsoft PowerApps
85-
- Microsoft Power BI
86-
- Microsoft PowerPoint
87-
- Microsoft SharePoint
88-
- Microsoft Skype for Business
89-
- Microsoft StaffHub
90-
- Microsoft Stream
91-
- Microsoft Teams
92-
- Microsoft To-Do
93-
- Microsoft Visio
94-
- Microsoft Word
95-
- Microsoft Yammer
67+
Supported applications can be found in the article, [Microsoft Intune protected apps](/intune/apps/apps-supported-intune-apps).
9668

9769
**Remarks**
9870

@@ -105,12 +77,7 @@ This setting applies to the following client apps:
10577

10678
In your Conditional Access policy, you can require an [Intune app protection policy](/intune/app-protection-policy) be present on the client app before access is available to the selected cloud apps.
10779

108-
This setting applies to the following client apps:
109-
110-
- Microsoft Cortana
111-
- Microsoft OneDrive
112-
- Microsoft Outlook
113-
- Microsoft Planner
80+
Supported applications can be found in the article, [Microsoft Intune protected apps](/intune/apps/apps-supported-intune-apps).
11481

11582
**Remarks**
11683

articles/active-directory/develop/quickstart-v2-aspnet-core-webapp.md

Lines changed: 27 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,7 @@ ms.custom: aaddev, identityplatformtop40
1717
---
1818

1919
# Quickstart: Add sign-in with Microsoft to an ASP.NET Core web app
20-
21-
In this quickstart, you'll learn how an ASP.NET Core web app can sign in personal accounts (hotmail.com, outlook.com, others) and work and school accounts from any Azure Active Directory (Azure AD) instance.
22-
23-
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-aspnet-core-webapp/aspnetcorewebapp-intro.svg)
24-
20+
In this quickstart, you use a code sample to learn how an ASP.NET Core web app can sign in personal accounts (hotmail.com, outlook.com, others) and work and school accounts from any Azure Active Directory (Azure AD) instance. (See [How the sample works](#how-the-sample-works) for an illustration.)
2521
> [!div renderon="docs"]
2622
> ## Register and download your quickstart app
2723
> You have two options to start your quickstart application:
@@ -63,22 +59,32 @@ In this quickstart, you'll learn how an ASP.NET Core web app can sign in persona
6359
6460
#### Step 2: Download your ASP.NET Core project
6561

66-
- [Download the Visual Studio 2019 solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore2-2.zip)
67-
68-
#### Step 3: Configure your Visual Studio project
69-
70-
1. Extract the zip file to a local folder within the root folder - for example, **C:\Azure-Samples**
71-
1. If you use Visual Studio 2019, open the solution in Visual Studio (optional).
72-
1. Edit the **appsettings.json** file. Find `ClientId` and update the value of `ClientId` with the **Application (client) ID** value of the application you registered.
62+
> [!div renderon="docs"]
63+
> [Download the Visual Studio 2019 solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore2-2.zip)
7364
74-
```json
75-
"ClientId": "Enter_the_Application_Id_here"
76-
"TenantId": "Enter_the_Tenant_Info_Here"
77-
```
65+
> [!div class="sxs-lookup" renderon="portal"]
66+
> Run the project using Visual Studio 2019.
67+
> [!div renderon="portal" id="autoupdate" class="nextstepaction"]
68+
> [Download the code sample]()
7869
70+
> [!div class="sxs-lookup" renderon="portal"]
71+
> #### Step 3: Your app is configured and ready to run
72+
> We have configured your project with values of your app's properties and it's ready to run.
7973
> [!div class="sxs-lookup" renderon="portal"]
8074
> > [!NOTE]
81-
> > This quickstart supports Enter_the_Supported_Account_Info_Here.
75+
> > Enter_the_Supported_Account_Info_Here
76+
> [!div renderon="docs"]
77+
> #### Step 3: Run your Visual Studio project
78+
> 1. Extract the zip file to a local folder within the root folder - for example, **C:\Azure-Samples**
79+
> 1. Open the solution in Visual Studio
80+
> 1. Edit the **appsettings.json** file. Find `ClientId` and update the value of `ClientId` with the **Application (client) ID** value of the application you registered.
81+
>
82+
> ```json
83+
> "ClientId": "Enter_the_Application_Id_here"
84+
> "TenantId": "Enter_the_Tenant_Info_Here"
85+
> ```
86+
87+
8288
8389
> [!div renderon="docs"]
8490
> Where:
@@ -95,6 +101,9 @@ In this quickstart, you'll learn how an ASP.NET Core web app can sign in persona
95101
96102
This section gives an overview of the code required to sign in users. This overview can be useful to understand how the code works, main arguments, and also if you want to add sign-in to an existing ASP.NET Core application.
97103
104+
### How the sample works
105+
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-aspnet-core-webapp/aspnetcorewebapp-intro.svg)
106+
98107
### Startup class
99108
100109
*Microsoft.AspNetCore.Authentication* middleware uses a Startup class that is executed when the hosting process initializes:
@@ -161,4 +170,4 @@ Check out the GitHub repo for this ASP.NET Core tutorial for more information in
161170
Help us improve the Microsoft identity platform. Tell us what you think by completing a short two-question survey.
162171

163172
> [!div class="nextstepaction"]
164-
> [Microsoft identity platform survey](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRyKrNDMV_xBIiPGgSvnbQZdUQjFIUUFGUE1SMEVFTkdaVU5YT0EyOEtJVi4u)
173+
> [Microsoft identity platform survey](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRyKrNDMV_xBIiPGgSvnbQZdUQjFIUUFGUE1SMEVFTkdaVU5YT0EyOEtJVi4u)

articles/active-directory/develop/quickstart-v2-aspnet-webapp.md

Lines changed: 27 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,7 @@ ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:A
1717
---
1818

1919
# Quickstart: Add Microsoft identity platform sign-in to an ASP.NET web app
20-
21-
In this quickstart, you'll enable an ASP.NET web app to sign in personal accounts (hotmail.com, outlook.com, others) and work and school accounts from any Azure Active Directory (Azure AD) instance.
22-
23-
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-aspnet-webapp/aspnetwebapp-intro.svg)
24-
20+
In this quickstart, you use a code sample to learn how an ASP.NET web app to sign in personal accounts (hotmail.com, outlook.com, others) and work and school accounts from any Azure Active Directory (Azure AD) instance. (See [How the sample works](#how-the-sample-works) for an illustration.)
2521
> [!div renderon="docs"]
2622
> ## Register and download your quickstart app
2723
> You have two options to start your quickstart application:
@@ -61,26 +57,33 @@ In this quickstart, you'll enable an ASP.NET web app to sign in personal account
6157
6258
#### Step 2: Download your project
6359

64-
[Download the Visual Studio 2019 solution](https://github.com/AzureADQuickStarts/AppModelv2-WebApp-OpenIDConnect-DotNet/archive/master.zip)
60+
> [!div renderon="docs"]
61+
> [Download the Visual Studio 2019 solution](https://github.com/AzureADQuickStarts/AppModelv2-WebApp-OpenIDConnect-DotNet/archive/master.zip)
6562
66-
#### Step 3: Configure your Visual Studio project
63+
> [!div renderon="portal"]
64+
> Run the project using Visual Studio 2019.
65+
> [!div renderon="portal" id="autoupdate" class="nextstepaction"]
66+
> [Download the code sample]()
67+
68+
> [!div class="sxs-lookup" renderon="portal"]
69+
> #### Step 3: Your app is configured and ready to run
70+
> We have configured your project with values of your app's properties.
71+
72+
> [!div renderon="docs"]
73+
> #### Step 3: Run your Visual Studio project
6774
6875
1. Extract the zip file to a local folder closer to the root folder - for example, **C:\Azure-Samples**
6976
1. Open the solution in Visual Studio (AppModelv2-WebApp-OpenIDConnect-DotNet.sln)
7077
1. Depending on the version of Visual Studio, you might need to right click on the project `AppModelv2-WebApp-OpenIDConnect-DotNet` and **Restore NuGet packages**
7178
1. Open the Package Manager Console (View -> Other Windows -> Package Manager Console) and run `Update-Package Microsoft.CodeDom.Providers.DotNetCompilerPlatform -r`
72-
1. Edit **Web.config** and replace the parameters `ClientId` and `Tenant` with:
73-
74-
```xml
75-
<add key="ClientId" value="Enter_the_Application_Id_here" />
76-
<add key="Tenant" value="Enter_the_Tenant_Info_Here" />
77-
```
78-
> [!div class="sxs-lookup" renderon="portal"]
79-
> > [!NOTE]
80-
> > This quickstart supports Enter_the_Supported_Account_Info_Here.
8179

8280
> [!div renderon="docs"]
83-
> Where:
81+
> 5. Edit **Web.config** and replace the parameters `ClientId` and `Tenant` with:
82+
> ```xml
83+
> <add key="ClientId" value="Enter_the_Application_Id_here" />
84+
> <add key="Tenant" value="Enter_the_Tenant_Info_Here" />
85+
> ```
86+
> Where:
8487
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
8588
> - `Enter_the_Tenant_Info_Here` - is one of the options below:
8689
> - If your application supports **My organization only**, replace this value with the **Tenant Id** or **Tenant name** (for example, contoso.onmicrosoft.com)
@@ -91,10 +94,17 @@ In this quickstart, you'll enable an ASP.NET web app to sign in personal account
9194
> > - To find the values of *Application ID*, *Directory (tenant) ID*, and *Supported account types*, go to the **Overview** page
9295
> > - Ensure the value for `redirectUri` in the **Web.config** corresponds with the **Redirect URI** defined for the App Registration in Azure AD (if not, navigate to the **Authentication** menu for the App Registration and update the **REDIRECT URI** to match)
9396
97+
> [!div class="sxs-lookup" renderon="portal"]
98+
> > [!NOTE]
99+
> > Enter_the_Supported_Account_Info_Here
100+
94101
## More information
95102
96103
This section gives an overview of the code required to sign-in users. This overview can be useful to understand how the code works, main arguments, and also if you want to add sign-in to an existing ASP.NET application.
97104
105+
### How the sample works
106+
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-aspnet-webapp/aspnetwebapp-intro.svg)
107+
98108
### OWIN middleware NuGet packages
99109
100110
You can set up the authentication pipeline with cookie-based authentication using OpenID Connect in ASP.NET with OWIN Middleware packages. You can install these packages by running the following commands in Visual Studio's **Package Manager Console**:

articles/active-directory/develop/quickstart-v2-java-webapp.md

Lines changed: 62 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -18,16 +18,13 @@ ms.custom: aaddev, scenarios:getting-started, languages:Java
1818

1919
In this quickstart, you'll learn how to integrate a Java web application with the Microsoft identity platform. Your app will sign in a user, get an access token to call the Microsoft Graph API, and make a request to the Microsoft Graph API.
2020

21-
When you've completed this quickstart, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory.
22-
23-
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-java-webapp/java-quickstart.svg)
21+
When you've completed this quickstart, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory. (See [How the sample works](#how-the-sample-works) for an illustration.)
2422

2523
## Prerequisites
2624

2725
To run this sample you will need:
2826

2927
- [Java Development Kit (JDK)](https://openjdk.java.net/) 8 or greater, and [Maven](https://maven.apache.org/).
30-
- An Azure Active Directory (Azure AD) tenant. For more information on how to get an Azure AD tenant, see [How to get an Azure AD tenant](https://azure.microsoft.com/documentation/articles/active-directory-howto-tenant/).
3128

3229
> [!div renderon="docs"]
3330
> ## Register and download your quickstart app
@@ -69,7 +66,7 @@ To run this sample you will need:
6966
>
7067
> For the code sample for this quickstart to work, you need to:
7168
>
72-
> 1. Add reply URLs as `https://localhost:8080/msal4jsamples/secure/aad` and `https://localhost:8080/msal4jsamples/graph/me`.
69+
> 1. Add reply URLs as `https://localhost:8080/msal4jsample/secure/aad` and `https://localhost:8080/msal4jsample/graph/me`.
7370
> 1. Create a Client Secret.
7471
> > [!div renderon="portal" id="makechanges" class="nextstepaction"]
7572
> > [Make these changes for me]()
@@ -78,46 +75,65 @@ To run this sample you will need:
7875
> > ![Already configured](media/quickstart-v2-aspnet-webapp/green-check.png) Your application is configured with these attributes.
7976
8077
#### Step 2: Download the code sample
78+
> [!div renderon="docs"]
79+
> [Download the Code Sample](https://github.com/Azure-Samples/ms-identity-java-webapp/archive/master.zip)
8180
82-
[Download the Code Sample](https://github.com/Azure-Samples/ms-identity-java-webapp/archive/master.zip)
83-
84-
#### Step 3: Configure the code sample
85-
86-
1. Extract the zip file to a local folder.
87-
1. If you use an integrated development environment, open the sample in your favorite IDE (optional).
88-
1. Open the application.properties file, which can be found in src/main/resources/ folder and replace the value of the fields *aad.clientId*, *aad.authority* and *aad.secretKey* with the respective values of **Application Id**, **Tenant Id** and **Client Secret** as the following:
89-
90-
```file
91-
aad.clientId=Enter_the_Application_Id_here
92-
aad.authority=https://login.microsoftonline.com/Enter_the_Tenant_Info_Here/
93-
aad.secretKey=Enter_the_Client_Secret_Here
94-
aad.redirectUriSignin=https://localhost:8080/msal4jsample/secure/aad
95-
aad.redirectUriGraph=https://localhost:8080/msal4jsample/graph/me
96-
aad.msGraphEndpointHost="https://graph.microsoft.com/"
97-
```
98-
99-
> [!div renderon="docs"]
100-
> Where:
101-
>
102-
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
103-
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
104-
> - `Enter_the_Tenant_Info_Here` - is the **Directory (tenant) ID** value of the application you registered.
105-
106-
1. To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
107-
108-
```
109-
Example:
110-
keytool -genkeypair -alias testCert -keyalg RSA -storetype PKCS12 -keystore keystore.p12 -storepass password
81+
> [!div class="sxs-lookup" renderon="portal"]
82+
> Download the project and extract the zip file to a local folder closer to the root folder - for example, **C:\Azure-Samples**
83+
>
84+
> To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
85+
>
86+
> ```
87+
> Example:
88+
> keytool -genkeypair -alias testCert -keyalg RSA -storetype PKCS12 -keystore keystore.p12 -storepass password
89+
>
90+
> server.ssl.key-store-type=PKCS12
91+
> server.ssl.key-store=classpath:keystore.p12
92+
> server.ssl.key-store-password=password
93+
> server.ssl.key-alias=testCert
94+
> ```
95+
> Put the generated keystore file in the "resources" folder.
96+
97+
> [!div renderon="portal" id="autoupdate" class="nextstepaction"]
98+
> [Download the code sample]()
11199
112-
server.ssl.key-store-type=PKCS12
113-
server.ssl.key-store=classpath:keystore.p12
114-
server.ssl.key-store-password=password
115-
server.ssl.key-alias=testCert
116-
```
100+
> [!div renderon="docs"]
101+
> #### Step 3: Configure the code sample
102+
> 1. Extract the zip file to a local folder.
103+
> 1. If you use an integrated development environment, open the sample in your favorite IDE (optional).
104+
> 1. Open the application.properties file, which can be found in src/main/resources/ folder and replace the value of the fields *aad.clientId*, *aad.authority* and *aad.secretKey* with the respective values of **Application Id**, **Tenant Id** and **Client Secret** as the following:
105+
>
106+
> ```file
107+
> aad.clientId=Enter_the_Application_Id_here
108+
> aad.authority=https://login.microsoftonline.com/Enter_the_Tenant_Info_Here/
109+
> aad.secretKey=Enter_the_Client_Secret_Here
110+
> aad.redirectUriSignin=https://localhost:8080/msal4jsample/secure/aad
111+
> aad.redirectUriGraph=https://localhost:8080/msal4jsample/graph/me
112+
> aad.msGraphEndpointHost="https://graph.microsoft.com/"
113+
> ```
114+
> Where:
115+
>
116+
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
117+
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
118+
> - `Enter_the_Tenant_Info_Here` - is the **Directory (tenant) ID** value of the application you registered.
119+
> 1. To use https with localhost, fill in the server.ssl.key properties. To generate a self-signed certificate, use the keytool utility (included in JRE).
120+
>
121+
> ```
122+
> Example:
123+
> keytool -genkeypair -alias testCert -keyalg RSA -storetype PKCS12 -keystore keystore.p12 -storepass password
124+
>
125+
> server.ssl.key-store-type=PKCS12
126+
> server.ssl.key-store=classpath:keystore.p12
127+
> server.ssl.key-store-password=password
128+
> server.ssl.key-alias=testCert
129+
> ```
130+
> Put the generated keystore file in the "resources" folder.
117131
118-
Put the generated keystore file in the "resources" folder.
119132
120-
#### Step 4: Run the code sample
133+
> [!div class="sxs-lookup" renderon="portal"]
134+
> #### Step 3: Run the code sample
135+
> [!div renderon="docs"]
136+
> #### Step 4: Run the code sample
121137
122138
To run the project, you can either:
123139
@@ -133,11 +149,16 @@ If you are running the web application from an IDE, click on run, then navigate
133149
- *Sign Out*: Signs the current user out of the application and redirects them to the home page.
134150
- *Show User Info*: Acquires a token for Microsoft Graph and calls Microsoft Graph with a request containing the token, which returns basic information about the signed-in user.
135151
152+
153+
136154
> [!IMPORTANT]
137155
> This quickstart application uses a client secret to identify itself as confidential client. Because the client secret is added as a plain-text to your project files, for security reasons it is recommended that you use a certificate instead of a client secret before considering the application as production application. For more information on how to use a certificate, see [Certificate credentials for application authentication](https://docs.microsoft.com/azure/active-directory/develop/active-directory-certificate-credentials).
138156
139157
## More information
140158
159+
### How the sample works
160+
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-java-webapp/java-quickstart.svg)
161+
141162
### Getting MSAL
142163
143164
MSAL for Java (MSAL4J) is the Java library used to sign in users and request tokens used to access an API protected by the Microsoft identity Platform.

0 commit comments

Comments
 (0)