Skip to content

Commit c1c09eb

Browse files
authored
Merge pull request #108305 from IEvangelist/warningsAndSuggestions
Cleared all warnings and over 100 suggestions
2 parents f770110 + cc4e34f commit c1c09eb

File tree

135 files changed

+370
-505
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

135 files changed

+370
-505
lines changed

articles/active-directory/azuread-dev/active-directory-devhowto-adal-error-handling.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@ ms.custom: aaddev
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.date: 02/27/2017
14-
ms.author: ryanwi
1514
---
1615

1716
# Error handling best practices for Azure Active Directory Authentication Library (ADAL) clients
@@ -184,7 +183,7 @@ The operating system can also generate a set of errors, which require error hand
184183
185184
### Error cases and actionable steps: Native client applications
186185
187-
If you're building a native client application, there are a few error handling cases to consider which relate to network issues, transient failures, and other platform-specific errors. In most cases, an application shouldnt perform immediate retries, but rather wait for end-user interaction that prompts a sign-in.
186+
If you're building a native client application, there are a few error handling cases to consider which relate to network issues, transient failures, and other platform-specific errors. In most cases, an application shouldn't perform immediate retries, but rather wait for end-user interaction that prompts a sign-in.
188187
189188
There are a few special cases in which a single retry may resolve the issue. For example, when a user needs to enable data on a device, or completed the Azure AD broker download after the initial failure.
190189

articles/active-directory/b2b/add-user-without-invite.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22

33
title: Add B2B guests without an invitation link or email - Azure AD
44
description: You can let a guest user add other guest users to your Azure AD without redeeming an invitation in Azure Active Directory B2B collaboration.
5-
services: active-directory
65
documentationcenter: ''
76

87
services: active-directory

articles/active-directory/cloud-provisioning/what-is-cloud-provisioning.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ ms.topic: overview
1010
ms.date: 12/05/2019
1111
ms.subservice: hybrid
1212
ms.author: billmath
13-
ms.topic: conceptual
1413
ms.collection: M365-identity-device-management
1514
---
1615

@@ -52,7 +51,7 @@ The following table provides a comparison between Azure AD Connect and Azure AD
5251
| Supports installation on a Domain Controller |||
5352
| Support for Windows Server 2012 and Windows Server 2012 R2 |||
5453
| Filter on Domains/OUs/groups |||
55-
| Filter on objects attribute values || |
54+
| Filter on objects' attribute values || |
5655
| Allow minimal set of attributes to be synchronized (MinSync) |||
5756
| Allow removing attributes from flowing from AD to Azure AD |||
5857
| Allow advanced customization for attribute flows || |

articles/active-directory/develop/quickstart-v2-javascript.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.subservice: develop
11-
ms.custom: aaddev
1211
ms.topic: quickstart
1312
ms.workload: identity
1413
ms.date: 04/11/2019

articles/active-directory/develop/v2-permissions-and-consent.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,7 @@ ms.topic: conceptual
1717
ms.date: 1/3/2020
1818
ms.author: ryanwi
1919
ms.reviewer: hirsin, jesakowi, jmprieur
20-
ms.custom: aaddev
21-
ms.custom: fasttrack-edit
20+
ms.custom: aaddev, fasttrack-edit
2221
---
2322

2423
# Permissions and consent in the Microsoft identity platform endpoint
@@ -196,13 +195,13 @@ When you're ready to request permissions from your organization's admin, you can
196195
```
197196

198197

199-
| Parameter | Condition | Description |
198+
| Parameter | Condition | Description |
200199
|:--------------|:--------------|:-----------------------------------------------------------------------------------------|
201200
| `tenant` | Required | The directory tenant that you want to request permission from. Can be provided in GUID or friendly name format OR generically referenced with organizations as seen in the example. Do not use 'common', as personal accounts cannot provide admin consent except in the context of a tenant. To ensure best compatibility with personal accounts that manage tenants, use the tenant ID when possible. |
202201
| `client_id` | Required | The **Application (client) ID** that the [Azure portal – App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience assigned to your app. |
203202
| `redirect_uri` | Required |The redirect URI where you want the response to be sent for your app to handle. It must exactly match one of the redirect URIs that you registered in the app registration portal. |
204203
| `state` | Recommended | A value included in the request that will also be returned in the token response. It can be a string of any content you want. Use the state to encode information about the user's state in the app before the authentication request occurred, such as the page or view they were on. |
205-
|`scope` | Required | Defines the set of permissions being requested by the application. This can be either static (using [`/.default`](#the-default-scope)) or dynamic scopes. This can include the OIDC scopes (`openid`, `profile`, `email`). If you need application permissions, you must use `/.default` to request the statically configured list of permissions. |
204+
|`scope` | Required | Defines the set of permissions being requested by the application. This can be either static (using [`/.default`](#the-default-scope)) or dynamic scopes. This can include the OIDC scopes (`openid`, `profile`, `email`). If you need application permissions, you must use `/.default` to request the statically configured list of permissions. |
206205

207206

208207
At this point, Azure AD requires a tenant administrator to sign in to complete the request. The administrator is asked to approve all the permissions that you have requested in the `scope` parameter. If you've used a static (`/.default`) value, it will function like the v1.0 admin consent endpoint and request consent for all scopes found in the required permissions for the app.

articles/active-directory/fundamentals/active-directory-access-create-new-tenant.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,16 @@ ms.workload: identity
1111
ms.topic: quickstart
1212
ms.date: 09/10/2018
1313
ms.author: ajburnle
14-
ms.custom: "it-pro, seodec18"
14+
ms.custom: "it-pro, seodec18, fasttrack-edit"
1515
ms.collection: M365-identity-device-management
16-
ms.custom: fasttrack-edit
1716
---
1817

1918
# Quickstart: Create a new tenant in Azure Active Directory
2019
You can do all of your administrative tasks using the Azure Active Directory (Azure AD) portal, including creating a new tenant for your organization.
2120

2221
In this quickstart, you'll learn how to get to the Azure portal and Azure Active Directory, and you'll learn how to create a basic tenant for your organization.
2322

24-
If you dont have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
23+
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
2524

2625
## Create a new tenant for your organization
2726
After you sign in to the Azure portal, you can create a new tenant for your organization. Your new tenant represents your organization and helps you to manage a specific instance of Microsoft cloud services for your internal and external users.
@@ -53,7 +52,7 @@ After you sign in to the Azure portal, you can create a new tenant for your orga
5352
Your new tenant is created with the domain contoso.onmicrosoft.com.
5453

5554
## Clean up resources
56-
If youre not going to continue to use this application, you can delete the tenant using the following steps:
55+
If you're not going to continue to use this application, you can delete the tenant using the following steps:
5756

5857
- Ensure that you are signed in to the directory that you want to delete through the **Directory + subscription** filter in the Azure Portal, and switching to the target directory if needed.
5958
- Select **Azure Active Directory**, and then on the **Contoso - Overview** page, select **Delete directory**.

articles/active-directory/fundamentals/customize-branding.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,7 @@ ms.topic: conceptual
1212
ms.date: 09/18/2018
1313
ms.author: ajburnle
1414
ms.reviewer: kexia
15-
ms.custom: "it-pro, seodec18"
16-
ms.custom: fasttrack-edit
15+
ms.custom: "it-pro, seodec18, fasttrack-edit"
1716
ms.collection: M365-identity-device-management
1817
---
1918

@@ -29,7 +28,7 @@ You can customize your Azure AD sign-in pages, which appear when users sign in t
2928
Your custom branding won't immediately appear when your users go to sites such as, www\.office.com. Instead, the user has to sign-in before your customized branding appears. After the user has signed in, the branding may take 15 minutes or longer to appear.
3029

3130
> [!NOTE]
32-
> All branding elements are optional. For example, if you specify a banner logo with no background image, the sign-in page will show your logo with a default background image from the destination site (for example, Office 365).<br><br>Additionally, sign-in page branding doesnt carry over to personal Microsoft accounts. If your users or business guests sign in using a personal Microsoft account, the sign-in page won't reflect the branding of your organization.
31+
> All branding elements are optional. For example, if you specify a banner logo with no background image, the sign-in page will show your logo with a default background image from the destination site (for example, Office 365).<br><br>Additionally, sign-in page branding doesn't carry over to personal Microsoft accounts. If your users or business guests sign in using a personal Microsoft account, the sign-in page won't reflect the branding of your organization.
3332
3433
### To customize your branding
3534
1. Sign in to the [Azure portal](https://portal.azure.com/) using a Global administrator account for the directory.
@@ -67,11 +66,11 @@ Your custom branding won't immediately appear when your users go to sites such a
6766

6867
- **Sign-in page background color.** Specify the hexadecimal color (for example, white is #FFFFFF) that will appear in place of your background image in low-bandwidth connection situations. We recommend using the primary color of your banner logo or your organization color.
6968

70-
- **Square logo image.** Select a .png (preferred) or .jpg image of your organizations logo to appear to users during the setup process for new Windows 10 Enterprise devices. This image is only used for Windows authentication and appears only on tenants that are using [Windows Autopilot]( https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot) for deployment or for password entry pages in other Windows 10 experiences. In some cases it may also appear in the consent dialog.
69+
- **Square logo image.** Select a .png (preferred) or .jpg image of your organization's logo to appear to users during the setup process for new Windows 10 Enterprise devices. This image is only used for Windows authentication and appears only on tenants that are using [Windows Autopilot]( https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot) for deployment or for password entry pages in other Windows 10 experiences. In some cases it may also appear in the consent dialog.
7170

72-
The image cant be larger than 240x240 pixels in size and must have a file size of less than 10 KB. We recommend using a transparent image since the background might not match your logo background. We also recommend not adding padding around the image or it might make your logo look small.
71+
The image can't be larger than 240x240 pixels in size and must have a file size of less than 10 KB. We recommend using a transparent image since the background might not match your logo background. We also recommend not adding padding around the image or it might make your logo look small.
7372

74-
- **Square logo image, dark theme.** Same as the square logo image above. This logo image takes the place of the square logo image when used with a dark background, such as with Windows 10 Azure AD joined screens during the out-of-box experience (OOBE). If your logo looks good on white, dark blue, and black backgrounds, you dont need to add this image.
73+
- **Square logo image, dark theme.** Same as the square logo image above. This logo image takes the place of the square logo image when used with a dark background, such as with Windows 10 Azure AD joined screens during the out-of-box experience (OOBE). If your logo looks good on white, dark blue, and black backgrounds, you don't need to add this image.
7574

7675
- **Show option to remain signed in.** You can choose to let your users remain signed in to Azure AD until explicitly signing out. If you choose **No**, this option is hidden, and users must sign in each time the browser is closed and reopened.
7776

articles/active-directory/fundamentals/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,5 +74,5 @@ landingContent:
7474
url: add-users-azure-active-directory.md
7575
- text: Assign roles to users
7676
url: active-directory-users-assign-role-azure-portal.md
77-
text: Assign licenses to users
77+
- text: Assign licenses to users
7878
url: license-users-groups.md

articles/active-directory/hybrid/whatis-aadc-admin-agent.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ ms.topic: overview
1010
ms.date: 09/04/2019
1111
ms.subservice: hybrid
1212
ms.author: billmath
13-
ms.topic: conceptual
1413
ms.collection: M365-identity-device-management
1514
---
1615

@@ -28,20 +27,20 @@ The Azure AD Connect Administration Agent is not installed on the Azure AD Conne
2827
## Install the Azure AD Connect Administration Agent on the Azure AD Connect server
2928

3029
Prerequisites:
31-
1. Azure AD Connect is installed on the server
32-
2. Azure AD Connect Health is installed on the server
30+
1. Azure AD Connect is installed on the server
31+
2. Azure AD Connect Health is installed on the server
3332

3433
![admin agent](media/whatis-aadc-admin-agent/adminagent0.png)
3534

3635
The Azure AD Connect Administration Agent binaries are placed in the AAD Connect server. To install the agent, do the following:
3736

38-
1. Open powershell in admin mode
39-
2. Navigate to the directory where the application is located cd C:\Program Files\Microsoft Azure Active Directory Connect\Tools
40-
3. Run ConfigureAdminAgent.ps1
37+
1. Open powershell in admin mode
38+
2. Navigate to the directory where the application is located cd "C:\Program Files\Microsoft Azure Active Directory Connect\Tools"
39+
3. Run ConfigureAdminAgent.ps1
4140

4241
When prompted, please enter your Azure AD global admin credentials. This should be the same credentials entered during Azure AD Connect installation.
4342

44-
After the agent is installed, youll see the following two new programs in the Add/Remove Programs list in the Control Panel of your server:
43+
After the agent is installed, you'll see the following two new programs in the "Add/Remove Programs" list in the Control Panel of your server:
4544

4645
![admin agent](media/whatis-aadc-admin-agent/adminagent1.png)
4746

@@ -50,11 +49,11 @@ When you open a support case the Microsoft Support Engineer can see, for a give
5049

5150
The Microsoft Support Engineer cannot change any data in your system and cannot see any passwords.
5251

53-
## What if I dont want the Microsoft support engineer to access my data?
52+
## What if I don't want the Microsoft support engineer to access my data?
5453
Once the agent is installed, If you do not want the Microsoft service engineer to access your data for a support call, you can disable the functionality by modifying the service config file as described below:
5554

56-
1. Open **C:\Program Files\Microsoft Azure AD Connect Administration Agent\AzureADConnectAdministrationAgentService.exe.config** in notepad.
57-
2. Disable **UserDataEnabled** setting as shown below. If **UserDataEnabled** setting exists and is set to true, then set it to false. If the setting does not exist, then add the setting as shown below.
55+
1. Open **C:\Program Files\Microsoft Azure AD Connect Administration Agent\AzureADConnectAdministrationAgentService.exe.config** in notepad.
56+
2. Disable **UserDataEnabled** setting as shown below. If **UserDataEnabled** setting exists and is set to true, then set it to false. If the setting does not exist, then add the setting as shown below.
5857

5958
```xml
6059
<appSettings>
@@ -63,8 +62,8 @@ Once the agent is installed, If you do not want the Microsoft service engineer t
6362
</appSettings>
6463
```
6564

66-
3. Save the config file.
67-
4. Restart Azure AD Connect Administration Agent service as shown below
65+
3. Save the config file.
66+
4. Restart Azure AD Connect Administration Agent service as shown below
6867

6968
![admin agent](media/whatis-aadc-admin-agent/adminagent2.png)
7069

articles/active-directory/hybrid/whatis-azure-ad-connect.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,19 +10,18 @@ ms.topic: overview
1010
ms.date: 01/08/2020
1111
ms.subservice: hybrid
1212
ms.author: billmath
13-
ms.topic: conceptual
1413
ms.collection: M365-identity-device-management
1514
---
1615

1716
# What is Azure AD Connect?
1817

1918
Azure AD Connect is the Microsoft tool designed to meet and accomplish your hybrid identity goals. It provides the following features:
20-
19+
2120
- [Password hash synchronization](whatis-phs.md) - A sign-in method that synchronizes a hash of a users on-premises AD password with Azure AD.
2221
- [Pass-through authentication](how-to-connect-pta.md) - A sign-in method that allows users to use the same password on-premises and in the cloud, but doesn't require the additional infrastructure of a federated environment.
2322
- [Federation integration](how-to-connect-fed-whatis.md) - Federation is an optional part of Azure AD Connect and can be used to configure a hybrid environment using an on-premises AD FS infrastructure. It also provides AD FS management capabilities such as certificate renewal and additional AD FS server deployments.
2423
- [Synchronization](how-to-connect-sync-whatis.md) - Responsible for creating users, groups, and other objects. As well as, making sure identity information for your on-premises users and groups is matching the cloud. This synchronization also includes password hashes.
25-
- [Health Monitoring](whatis-hybrid-identity-health.md) - Azure AD Connect Health can provide robust monitoring and provide a central location in the Azure portal to view this activity.
24+
- [Health Monitoring](whatis-hybrid-identity-health.md) - Azure AD Connect Health can provide robust monitoring and provide a central location in the Azure portal to view this activity.
2625

2726

2827
![What is Azure AD Connect](./media/whatis-hybrid-identity/arch.png)

0 commit comments

Comments
 (0)