Skip to content

Commit c07d48e

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into tamram-0520a
2 parents 7ef7133 + 80592cc commit c07d48e

File tree

208 files changed

+2800
-1951
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

208 files changed

+2800
-1951
lines changed

.openpublishing.redirection.json

Lines changed: 67 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -17552,16 +17552,6 @@
1755217552
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-load-with-data-factory",
1755317553
"redirect_document_id": false
1755417554
},
17555-
{
17556-
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-security-threat-detection.md",
17557-
"redirect_url": "/azure/sql-database/sql-database-threat-detection-overview",
17558-
"redirect_document_id": false
17559-
},
17560-
{
17561-
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-auditing-overview.md",
17562-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17563-
"redirect_document_id": false
17564-
},
1756517555
{
1756617556
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-migrate-code.md",
1756717557
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-overview-develop",
@@ -17827,26 +17817,6 @@
1782717817
"redirect_url": "/azure/synapse-analytics/quickstart-create-sql-pool-portal",
1782817818
"redirect_document_id": false
1782917819
},
17830-
{
17831-
"source_path": "articles/sql-database/sql-database-auditing-get-started.md",
17832-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17833-
"redirect_document_id": false
17834-
},
17835-
{
17836-
"source_path": "articles/sql-database/sql-database-auditing-portal.md",
17837-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17838-
"redirect_document_id": false
17839-
},
17840-
{
17841-
"source_path": "articles/sql-database/sql-database-auditing-powershell.md",
17842-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17843-
"redirect_document_id": false
17844-
},
17845-
{
17846-
"source_path": "articles/sql-database/sql-database-auditing-rest.md",
17847-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17848-
"redirect_document_id": false
17849-
},
1785017820
{
1785117821
"source_path": "articles/sql-database/sql-database-build-multi-tenant-apps.md",
1785217822
"redirect_url": "/azure/sql-database/saas-tenancy-app-design-patterns",
@@ -18557,16 +18527,6 @@
1855718527
"redirect_url": "/azure/sql-database/sql-database-advanced-data-security",
1855818528
"redirect_document_id": false
1855918529
},
18560-
{
18561-
"source_path": "articles/sql-database/sql-database-threat-detection-get-started.md",
18562-
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
18563-
"redirect_document_id": false
18564-
},
18565-
{
18566-
"source_path": "articles/sql-database/sql-database-threat-detection-portal.md",
18567-
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
18568-
"redirect_document_id": false
18569-
},
1857018530
{
1857118531
"source_path": "articles/sql-database/sql-database-troubleshoot-backup-and-restore.md",
1857218532
"redirect_url": "/azure/sql-database/sql-database-recovery-using-backups",
@@ -19302,11 +19262,6 @@
1930219262
"redirect_url": "/azure/load-balancer/load-balancer-get-started-internet-portal",
1930319263
"redirect_document_id": false
1930419264
},
19305-
{
19306-
"source_path": "articles/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-rp.md",
19307-
"redirect_url": "/azure/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-resource-provider",
19308-
"redirect_document_id": false
19309-
},
1931019265
{
1931119266
"source_path": "articles/load-balancer/load-balancer-configure-sqlao.md",
1931219267
"redirect_url": "/azure/virtual-machines/windows/sql/virtual-machines-windows-portal-sql-alwayson-int-listener",
@@ -29647,11 +29602,6 @@
2964729602
"redirect_url": "/azure/data-factory/v1/data-factory-amazon-redshift-connector",
2964829603
"redirect_document_id": true
2964929604
},
29650-
{
29651-
"source_path": "articles/data-factory/connector-azure-sql-database-managed-insance.md",
29652-
"redirect_url": "/azure/data-factory/connector-azure-sql-database-managed-instance",
29653-
"redirect_document_id": false
29654-
},
2965529605
{
2965629606
"source_path": "articles/data-factory/how-to-read-write-partitioned-data.md",
2965729607
"redirect_url": "/azure/data-factory/tutorial-incremental-copy-overview",
@@ -32857,11 +32807,6 @@
3285732807
"redirect_url": "/azure/service-fabric/service-fabric-security-controls",
3285832808
"redirect_document_id": false
3285932809
},
32860-
{
32861-
"source_path": "articles/sql-database/sql-database-security-attributes.md",
32862-
"redirect_url": "/azure/sql-database/sql-database-security-controls",
32863-
"redirect_document_id": false
32864-
},
3286532810
{
3286632811
"source_path": "articles/storage/common/storage-security-attributes.md",
3286732812
"redirect_url": "/azure/storage/common/storage-security-controls",
@@ -52299,11 +52244,6 @@
5229952244
"redirect_url": "/azure/developer/terraform/",
5230052245
"redirect_document_id": false
5230152246
},
52302-
{
52303-
"source_path": "articles/sql-database/sql-database-auditing-and-threat-detection-powershell.md",
52304-
"redirect_url": "/azure/sql-database/scripts/sql-database-auditing-and-threat-detection-powershell",
52305-
"redirect_document_id": true
52306-
},
5230752247
{
5230852248
"source_path": "articles/media-services/azure-media-player/azure-media-player-license.md",
5230952249
"redirect_url": "/legal/azure-media-player/azure-media-player-license",
@@ -52428,6 +52368,72 @@
5242852368
"source_path":"articles/azure-monitor/app/alerts.md",
5242952369
"redirect_url":"/azure/azure-monitor/platform/alerts-log",
5243052370
"redirect_document_id": false
52371+
},
52372+
{
52373+
"source_path": "articles/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-rp.md",
52374+
"redirect_url": "/azure/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-resource-provider",
52375+
"redirect_document_id": false
52376+
},
52377+
{
52378+
"source_path": "articles/sql-database/sql-database-security-attributes.md",
52379+
"redirect_url": "/azure/sql-database/sql-database-security-controls",
52380+
"redirect_document_id": false
52381+
},
52382+
{
52383+
"source_path": "articles/data-factory/connector-azure-sql-database-managed-insance.md",
52384+
"redirect_url": "/azure/data-factory/connector-azure-sql-database-managed-instance",
52385+
"redirect_document_id": false
52386+
},
52387+
{
52388+
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-security-threat-detection.md",
52389+
"redirect_url": "/azure/sql-database/sql-database-threat-detection-overview",
52390+
"redirect_document_id": false
52391+
},
52392+
{
52393+
"source_path": "articles/sql-database/sql-database-threat-detection-get-started.md",
52394+
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
52395+
"redirect_document_id": false
52396+
},
52397+
{
52398+
"source_path": "articles/sql-database/sql-database-threat-detection-portal.md",
52399+
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
52400+
"redirect_document_id": false
52401+
},
52402+
{
52403+
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-auditing-overview.md",
52404+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52405+
"redirect_document_id": false
52406+
},
52407+
{
52408+
"source_path": "articles/sql-database/sql-database-auditing-get-started.md",
52409+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52410+
"redirect_document_id": false
52411+
},
52412+
{
52413+
"source_path": "articles/sql-database/sql-database-auditing-portal.md",
52414+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52415+
"redirect_document_id": false
52416+
},
52417+
{
52418+
"source_path": "articles/sql-database/sql-database-auditing-powershell.md",
52419+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52420+
"redirect_document_id": false
52421+
},
52422+
{
52423+
"source_path": "articles/sql-database/sql-database-auditing-rest.md",
52424+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52425+
"redirect_document_id": false
52426+
},
52427+
{
52428+
"source_path": "articles/sql-database/sql-database-auditing-and-threat-detection-powershell.md",
52429+
"redirect_url": "/azure/sql-database/scripts/sql-database-auditing-and-threat-detection-powershell",
52430+
"redirect_document_id": true
52431+
},
52432+
{
52433+
"source_path": "articles/cdn/endpoint-multiorigin.md",
52434+
"redirect_url": "/azure/cdn/cdn-overview",
52435+
"redirect_document_id": false
5243152436
}
52432-
]
52437+
52438+
]
5243352439
}

articles/active-directory-b2c/custom-policy-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ Next, specify that the application should be treated as a public client:
134134

135135
1. Under **Manage**, select **Authentication**.
136136
1. Select **Try out the new experience** (if shown).
137-
1. Under **Advanced settings**, enable **Treat application as a public client** (select **Yes**).
137+
1. Under **Advanced settings**, enable **Treat application as a public client** (select **Yes**). Ensure that **"allowPublicClient": true** is set in the application manifest.
138138
1. Select **Save**.
139139

140140
Now, grant permissions to the API scope you exposed earlier in the *IdentityExperienceFramework* registration:

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -115,6 +115,10 @@ In addition to the Microsoft apps, administrators can add any Azure AD registere
115115
- [Custom applications not in the gallery](../manage-apps/add-non-gallery-app.md)
116116
- [Legacy applications published through app delivery controllers and networks](../manage-apps/secure-hybrid-access.md)
117117

118+
> [!NOTE]
119+
> Since Conditional access policy sets the requirements for accessing a service you are not able to apply it to a client (public/native) application. Other words the policy is not set directly on a client (public/native) application, but is applied when a client calls a service. For example, a policy set on SharePoint service applies to the clients calling SharePoint. A policy set on Exchange applies to the attempt to access the email using Outlook client. That is why client (public/native) applications are not available for selection in the Cloud Apps picker and Conditional Access option is not available in the application settings for the client (public/native) application registered in your tenant.
120+
121+
118122
## User actions
119123

120124
User actions are tasks that can be performed by a user. The only currently supported action is **Register security information**, which allows Conditional Access policy to enforce when users who are enabled for combined registration attempt to register their security information. More information can be found in the article, [Combined security information registration](../authentication/concept-registration-mfa-sspr-combined.md).

articles/active-directory/develop/active-directory-v2-protocols.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom: aaddev
1818

1919
# OAuth 2.0 and OpenID Connect protocols on Microsoft identity platform
2020

21-
The Microsoft identity platform endpoint for identity-as-a-service with industry standard protocols, OpenID Connect (OIDC) and OAuth 2.0. While the service is standards-compliant, there can be subtle differences between any two implementations of these protocols. The information here will be useful if you choose to write your code by directly sending and handling HTTP requests or use a third-party open-source library, rather than using one of our [open-source libraries](reference-v2-libraries.md).
21+
The Microsoft identity platform endpoint for identity-as-a-service implements authentication and authorization with industry standard protocols OpenID Connect (OIDC) and OAuth 2.0, respectively. While the service is standards-compliant, there can be subtle differences between any two implementations of these protocols. The information here will be useful if you choose to write your code by directly sending and handling HTTP requests or use a third-party open-source library, rather than using one of our [open-source libraries](reference-v2-libraries.md).
2222

2323
## The basics
2424

articles/active-directory/develop/single-sign-on-saml-protocol.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,10 +89,10 @@ The `Scoping` element, which includes a list of identity providers, is optional
8989
If provided, don't include the `ProxyCount` attribute, `IDPListOption` or `RequesterID` element, as they aren't supported.
9090

9191
### Signature
92-
Don't include a `Signature` element in `AuthnRequest` elements, as Azure AD does not support signed authentication requests.
92+
Don't include a `Signature` element in `AuthnRequest` elements. Azure AD does not validate signed authentication requests. Requestor verification is provided for by only responding to registered Assertion Consumer Service URLs.
9393

9494
### Subject
95-
Azure AD ignores the `Subject` element of `AuthnRequest` elements.
95+
Don't include a `Subject` element. Azure AD doesn't support specifying a subject for a request and will return an error if one is provided.
9696

9797
## Response
9898
When a requested sign-on completes successfully, Azure AD posts a response to the cloud service. A response to a successful sign-on attempt looks like the following sample:

articles/active-directory/develop/v2-conditional-access-dev-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ error_description=AADSTS50076: Due to a configuration change made by your admini
171171

172172
Our app needs to catch the `error=interaction_required`. The application can then use either `acquireTokenPopup()` or `acquireTokenRedirect()` on the same resource. The user is forced to do a multi-factor authentication. After the user completes the multi-factor authentication, the app is issued a fresh access token for the requested resource.
173173

174-
To try out this scenario, see our [JS SPA On-behalf-of code sample](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2/blob/master/Microsoft.Identity.Web/README.md#handle-conditional-access). This code sample uses the Conditional Access policy and web API you registered earlier with a JS SPA to demonstrate this scenario. It shows how to properly handle the claims challenge and get an access token that can be used for your web API. Alternatively, checkout the general [Angular.js code sample](https://github.com/Azure-Samples/active-directory-javascript-graphapi-v2) for guidance on an Angular SPA
174+
To try out this scenario, see our [JS SPA On-behalf-of code sample](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2/blob/a2b257381b410c765ee01ecb611aa6f98c099eb1/2.%20Web%20API%20now%20calls%20Microsoft%20Graph/README.md). This code sample uses the Conditional Access policy and web API you registered earlier with a JS SPA to demonstrate this scenario. It shows how to properly handle the claims challenge and get an access token that can be used for your web API. Alternatively, checkout the general [Angular.js code sample](https://github.com/Azure-Samples/active-directory-javascript-graphapi-v2) for guidance on an Angular SPA
175175

176176
## See also
177177

articles/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The logs are pushed to the **AuditLogs** and **SigninLogs** tables in the worksp
5757

5858
1. From the default query view in the previous section, select **Schema** and expand the workspace.
5959

60-
2. Expand the **Log Management** section and then expand either **AuditLogs** or **SignInLogs** to view the log schema.
60+
2. Expand the **Log Management** section and then expand either **AuditLogs** or **SigninLogs** to view the log schema.
6161
![Audit logs](./media/howto-analyze-activity-logs-log-analytics/auditlogschema.png)
6262
![Signin logs](./media/howto-analyze-activity-logs-log-analytics/signinlogschema.png)
6363

0 commit comments

Comments
 (0)