Skip to content

Commit c206412

Browse files
authored
Merge pull request #98976 from MicrosoftDocs/master
12/13 PM Publish
2 parents 5efb489 + 7a25a85 commit c206412

File tree

285 files changed

+2344
-1631
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

285 files changed

+2344
-1631
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24664,6 +24664,11 @@
2466424664
"redirect_url": "/azure/storage/common/storage-security-guide",
2466524665
"redirect_document_id": true
2466624666
},
24667+
{
24668+
"source_path": "articles/storage/common/storage-security-guide.md",
24669+
"redirect_url": "/azure/storage/blobs/security-recommendations",
24670+
"redirect_document_id": true
24671+
},
2466724672
{
2466824673
"source_path": "articles/storage/storage-service-encryption-customer-managed-keys.md",
2466924674
"redirect_url": "/azure/storage/common/storage-service-encryption-customer-managed-keys",

articles/active-directory-b2c/TOC.yml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,8 +76,11 @@
7676
items:
7777
- name: App integration
7878
items:
79-
- name: Register an application
79+
- name: Register an OIDC application
8080
href: tutorial-register-applications.md
81+
- name: Register a SAML service provider
82+
href: connect-with-saml-service-providers.md
83+
displayName: SP, RP, service provider, connect
8184
- name: Add a web API application
8285
href: add-web-application.md
8386
- name: Add a native client application
@@ -199,8 +202,10 @@
199202
items:
200203
- name: ADFS
201204
href: active-directory-b2c-custom-setup-adfs2016-idp.md
205+
displayName: SAML
202206
- name: Salesforce
203207
href: active-directory-b2c-setup-sf-app-custom.md
208+
displayName: SAML
204209
- name: Tokens and session management
205210
items:
206211
- name: Customize tokens

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 377 additions & 0 deletions
Large diffs are not rendered by default.
45.1 KB
Loading

articles/active-directory/develop/developer-glossary.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 10/28/2019
12+
ms.date: 12/13/2019
1313
ms.author: ryanwi
1414
ms.custom: aaddev
1515
ms.reviewer: jmprieur, saeeda, jesakowi, nacanuma
@@ -37,7 +37,7 @@ The unique identifier Azure AD issues to an application registration that identi
3737

3838
## application manifest
3939

40-
A feature provided by the [Azure portal][AZURE-portal], which produces a JSON representation of the application's identity configuration, used as a mechanism for updating its associated [Application][AAD-Graph-App-Entity] and [ServicePrincipal][AAD-Graph-Sp-Entity] entities. See [Understanding the Azure Active Directory application manifest][AAD-App-Manifest] for more details.
40+
A feature provided by the [Azure portal][AZURE-portal], which produces a JSON representation of the application's identity configuration, used as a mechanism for updating its associated [Application][Graph-App-Resource] and [ServicePrincipal][Graph-Sp-Resource] entities. See [Understanding the Azure Active Directory application manifest][AAD-App-Manifest] for more details.
4141

4242
## application object
4343

@@ -133,7 +133,7 @@ A [client application](#client-application) gains access to a [resource server](
133133

134134
They also surface during the [consent](#consent) process, giving the administrator or resource owner the opportunity to grant/deny the client access to resources in their tenant.
135135

136-
Permission requests are configured on the **API permissions** page for an application in the [Azure portal][AZURE-portal], by selecting the desired "Delegated Permissions" and "Application Permissions" (the latter requires membership in the Global Admin role). Because a [public client](#client-application) can't securely maintain credentials, it can only request delegated permissions, while a [confidential client](#client-application) has the ability to request both delegated and application permissions. The client's [application object](#application-object) stores the declared permissions in its [requiredResourceAccess property][AAD-Graph-App-Entity].
136+
Permission requests are configured on the **API permissions** page for an application in the [Azure portal][AZURE-portal], by selecting the desired "Delegated Permissions" and "Application Permissions" (the latter requires membership in the Global Admin role). Because a [public client](#client-application) can't securely maintain credentials, it can only request delegated permissions, while a [confidential client](#client-application) has the ability to request both delegated and application permissions. The client's [application object](#application-object) stores the declared permissions in its [requiredResourceAccess property][Graph-App-Resource].
137137

138138
## resource owner
139139

@@ -143,25 +143,25 @@ As defined by the [OAuth2 Authorization Framework][OAuth2-Role-Def], an entity c
143143

144144
As defined by the [OAuth2 Authorization Framework][OAuth2-Role-Def], a server that hosts protected resources, capable of accepting and responding to protected resource requests by [client applications](#client-application) that present an [access token](#access-token). Also known as a protected resource server, or resource application.
145145

146-
A resource server exposes APIs and enforces access to its protected resources through [scopes](#scopes) and [roles](#roles), using the OAuth 2.0 Authorization Framework. Examples include the Azure AD Graph API which provides access to Azure AD tenant data, and the Office 365 APIs that provide access to data such as mail and calendar. Both of these are also accessible via the [Microsoft Graph API][Microsoft-Graph].
146+
A resource server exposes APIs and enforces access to its protected resources through [scopes](#scopes) and [roles](#roles), using the OAuth 2.0 Authorization Framework. Examples include the [Microsoft Graph API][Microsoft-Graph] which provides access to Azure AD tenant data, and the Office 365 APIs that provide access to data such as mail and calendar.
147147

148-
Just like a client application, resource application's identity configuration is established via [registration](#application-registration) in an Azure AD tenant, providing both the application and service principal object. Some Microsoft-provided APIs, such as the Azure AD Graph API, have pre-registered service principals made available in all tenants during provisioning.
148+
Just like a client application, resource application's identity configuration is established via [registration](#application-registration) in an Azure AD tenant, providing both the application and service principal object. Some Microsoft-provided APIs, such as the Microsoft Graph API, have pre-registered service principals made available in all tenants during provisioning.
149149

150150
## roles
151151

152152
Like [scopes](#scopes), roles provide a way for a [resource server](#resource-server) to govern access to its protected resources. There are two types: a "user" role implements role-based access control for users/groups that require access to the resource, while an "application" role implements the same for [client applications](#client-application) that require access.
153153

154-
Roles are resource-defined strings (for example "Expense approver", "Read-only", "Directory.ReadWrite.All"), managed in the [Azure portal][AZURE-portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [appRoles property][AAD-Graph-Sp-Entity]. The Azure portal is also used to assign users to "user" roles, and configure client [application permissions](#permissions) to access an "application" role.
154+
Roles are resource-defined strings (for example "Expense approver", "Read-only", "Directory.ReadWrite.All"), managed in the [Azure portal][AZURE-portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [appRoles property][Graph-Sp-Resource]. The Azure portal is also used to assign users to "user" roles, and configure client [application permissions](#permissions) to access an "application" role.
155155

156-
For a detailed discussion of the application roles exposed by Azure AD's Graph API, see [Graph API Permission Scopes][AAD-Graph-Perm-Scopes]. For a step-by-step implementation example, see [Manage access using RBAC and the Azure portal][AAD-RBAC].
156+
For a detailed discussion of the application roles exposed by the Microsoft Graph API, see [Graph API Permission Scopes][Graph-Perm-Scopes]. For a step-by-step implementation example, see [Manage access using RBAC and the Azure portal][AAD-RBAC].
157157

158158
## scopes
159159

160160
Like [roles](#roles), scopes provide a way for a [resource server](#resource-server) to govern access to its protected resources. Scopes are used to implement [scope-based][OAuth2-Access-Token-Scopes] access control, for a [client application](#client-application) that has been given delegated access to the resource by its owner.
161161

162-
Scopes are resource-defined strings (for example "Mail.Read", "Directory.ReadWrite.All"), managed in the [Azure portal][AZURE-portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [oauth2Permissions property][AAD-Graph-Sp-Entity]. The Azure portal is also used to configure client application [delegated permissions](#permissions) to access a scope.
162+
Scopes are resource-defined strings (for example "Mail.Read", "Directory.ReadWrite.All"), managed in the [Azure portal][AZURE-portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [oauth2Permissions property][Graph-Sp-Resource]. The Azure portal is also used to configure client application [delegated permissions](#permissions) to access a scope.
163163

164-
A best practice naming convention, is to use a "resource.operation.constraint" format. For a detailed discussion of the scopes exposed by Azure AD's Graph API, see [Graph API Permission Scopes][AAD-Graph-Perm-Scopes]. For scopes exposed by Office 365 services, see [Office 365 API permissions reference][O365-Perm-Ref].
164+
A best practice naming convention, is to use a "resource.operation.constraint" format. For a detailed discussion of the scopes exposed by Microsoft Graph API, see [Graph API Permission Scopes][Graph-Perm-Scopes]. For scopes exposed by Office 365 services, see [Office 365 API permissions reference][O365-Perm-Ref].
165165

166166
## security token
167167

@@ -203,7 +203,7 @@ A type of [client application](#client-application) that downloads code from a w
203203

204204
## user principal
205205

206-
Similar to the way a service principal object is used to represent an application instance, a user principal object is another type of security principal, which represents a user. The Azure AD Graph [User entity][AAD-Graph-User-Entity] defines the schema for a user object, including user-related properties such as first and last name, user principal name, directory role membership, etc. This provides the user identity configuration for Azure AD to establish a user principal at run-time. The user principal is used to represent an authenticated user for Single Sign-On, recording [consent](#consent) delegation, making access control decisions, etc.
206+
Similar to the way a service principal object is used to represent an application instance, a user principal object is another type of security principal, which represents a user. The Microsoft Graph [User resource type][Graph-User-Resource] defines the schema for a user object, including user-related properties such as first and last name, user principal name, directory role membership, etc. This provides the user identity configuration for Azure AD to establish a user principal at run-time. The user principal is used to represent an authenticated user for Single Sign-On, recording [consent](#consent) delegation, making access control decisions, etc.
207207

208208
## web client
209209

@@ -222,10 +222,10 @@ Use the following comments section to provide feedback and help to refine and sh
222222
[AAD-App-SP-Objects]:app-objects-and-service-principals.md
223223
[AAD-Auth-Scenarios]:authentication-scenarios.md
224224
[AAD-Dev-Guide]:azure-ad-developers-guide.md
225-
[AAD-Graph-Perm-Scopes]: /graph/permissions-reference
226-
[AAD-Graph-App-Entity]: https://msdn.microsoft.com/Library/Azure/Ad/Graph/api/entity-and-complex-type-reference#application-entity
227-
[AAD-Graph-Sp-Entity]: https://msdn.microsoft.com/Library/Azure/Ad/Graph/api/entity-and-complex-type-reference#serviceprincipal-entity
228-
[AAD-Graph-User-Entity]: https://msdn.microsoft.com/Library/Azure/Ad/Graph/api/entity-and-complex-type-reference#user-entity
225+
[Graph-Perm-Scopes]: /graph/permissions-reference
226+
[Graph-App-Resource]: /graph/api/resources/application
227+
[Graph-Sp-Resource]: /graph/api/resources/serviceprincipal?view=graph-rest-beta
228+
[Graph-User-Resource]: /graph/api/resources/user
229229
[AAD-How-Subscriptions-Assoc]:../fundamentals/active-directory-how-subscriptions-associated-directory.md
230230
[AAD-How-To-Integrate]: ./active-directory-how-to-integrate.md
231231
[AAD-How-To-Tenant]:quickstart-create-new-tenant.md

articles/active-directory/develop/quickstart-v2-dotnet-native-aspnet.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: quickstart
1111
ms.workload: identity
12-
ms.date: 10/30/2019
12+
ms.date: 12/12/2019
1313
ms.author: jmprieur
1414
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:ASP.NET
1515
#Customer intent: As an application developer, I want to know how to set up OpenId Connect authentication in a web application built using Node.js with Express.
@@ -73,7 +73,7 @@ If you want to register your apps manually, as a first step you'll need to:
7373
- Keep **State** as **Enabled**
7474
- Select **Add scope**
7575

76-
### Configure the service and client projects to match the registered Web API
76+
### Configure the service project to match the registered Web API
7777

7878
1. Open the solution in Visual Studio and then open the **Web.config** file under the root of **TodoListService** project.
7979
1. Replace the value of `ida:ClientId` parameter with the **Client ID (Application ID)** from the application you just registered in the Application Registration Portal.
@@ -101,7 +101,7 @@ In this step, you configure your *TodoListClient* project by registering a new a
101101
- Change **Supported account types** to **Accounts in any organizational directory**.
102102
- Select **Register** to create the application.
103103
1. From the app's Overview page, select the **Authentication** section.
104-
- In the **Redirect URLs** | **Suggested Redirect URLs for public clients (mobile, desktop)** section, check **urn:ietf:wg:oauth:2.0:oob**
104+
- In the **Redirect URIs** | **Suggested Redirect URIs for public clients (mobile, desktop)** section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**
105105
- Select **Save**.
106106
1. Select the **API permissions** section
107107
- Click the **Add a permission** button and then,

articles/active-directory/develop/quickstart-v2-uwp.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: quickstart
1111
ms.workload: identity
12-
ms.date: 07/16/2019
12+
ms.date: 12/12/2019
1313
ms.author: jmprieur
1414
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:UWP
1515
#Customer intent: As an application developer, I want to learn how my Universal Windows Platform (XAML) application can get an access token and call an API that's protected by an Microsoft identity platform endpoint.
@@ -48,13 +48,12 @@ This quickstart contains a code sample that demonstrates how a Universal Windows
4848
> - In the **Supported account types** section, select **Accounts in any organizational directory and personal Microsoft accounts (for example, Skype, Xbox, Outlook.com)**.
4949
> - Select **Register** to create the application.
5050
> 1. In the list of pages for the app, select **Authentication**.
51-
> 1. Expand the **Desktop + devices** section. (If **Desktop + devices** is not visible, first click the top banner to view the preview Authentication experience)
52-
> 1. Under the **Redirect URI** section, select **Add URI**. Type **urn:ietf:wg:oauth:2.0:oob**.
51+
> 1. In the **Redirect URIs** | **Suggested Redirect URIs for public clients (mobile, desktop)** section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**.
5352
> 1. Select **Save**.
5453
5554
> [!div renderon="portal" class="sxs-lookup"]
5655
> #### Step 1: Configure your application
57-
> For the code sample for this quickstart to work, you need to add a redirect URI as **urn:ietf:wg:oauth:2.0:oob**.
56+
> For the code sample for this quickstart to work, you need to add a redirect URI as **https://login.microsoftonline.com/common/oauth2/nativeclient**.
5857
> > [!div renderon="portal" id="makechanges" class="nextstepaction"]
5958
> > [Make this change for me]()
6059
>

articles/active-directory/develop/quickstart-v2-windows-desktop.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: quickstart
1111
ms.workload: identity
12-
ms.date: 07/16/2019
12+
ms.date: 12/12/2019
1313
ms.author: jmprieur
1414
ms.custom: aaddev, identityplatformtop40
1515
#Customer intent: As an application developer, I want to learn how my Windows desktop .NET application can get an access token and call an API that's protected by an Microsoft identity platform endpoint.
@@ -47,13 +47,12 @@ In this quickstart, you'll learn how to write a Windows desktop .NET (WPF) appli
4747
> - In the **Supported account types** section, select **Accounts in any organizational directory and personal Microsoft accounts (for example, Skype, Xbox, Outlook.com)**.
4848
> - Select **Register** to create the application.
4949
> 1. In the list of pages for the app, select **Authentication**.
50-
> 1. Expand the **Desktop + devices** section. (If **Desktop + devices** is not visible, first click the top banner to view the preview Authentication experience)
51-
> 1. Under the **Redirect URI** section, select **Add URI**. Type **urn:ietf:wg:oauth:2.0:oob**.
50+
> 1. In the **Redirect URIs** | **Suggested Redirect URIs for public clients (mobile, desktop)** section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**.
5251
> 1. Select **Save**.
5352
5453
> [!div class="sxs-lookup" renderon="portal"]
5554
> #### Step 1: Configure your application in Azure portal
56-
> For the code sample for this quickstart to work, you need to add a reply URL as **urn:ietf:wg:oauth:2.0:oob**.
55+
> For the code sample for this quickstart to work, you need to add a reply URL as **https://login.microsoftonline.com/common/oauth2/nativeclient**.
5756
> > [!div renderon="portal" id="makechanges" class="nextstepaction"]
5857
> > [Make this change for me]()
5958
>

articles/active-directory/develop/tutorial-v2-windows-desktop.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: tutorial
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 04/10/2019
16+
ms.date: 12/12/2019
1717
ms.author: jmprieur
1818
ms.custom: aaddev, identityplatformtop40
1919
ms.collection: M365-identity-device-management
@@ -102,9 +102,9 @@ To register your application and add your application registration information t
102102
- Select **Register** to create the application.
103103
1. In the list of pages for the app, select **Authentication**.
104104
1. In the **Redirect URIs** section, in the Redirect URIs list:
105-
1. In the **TYPE** column select **Public client (mobile & desktop)**.
106-
1. In the **REDIRECT URI** column, enter `urn:ietf:wg:oauth:2.0:oob`
107-
1. Select **Save**.
105+
1. In the **TYPE** column select **Public client/native (mobile & desktop)**.
106+
1. In the **REDIRECT URI** column, enter `https://login.microsoftonline.com/common/oauth2/nativeclient`
107+
1. Select **Register**.
108108
1. Go to Visual Studio, open the *App.xaml.cs* file, and then replace `Enter_the_Application_Id_here` in the code snippet below with the application ID that you just registered and copied.
109109
110110
```csharp

articles/active-directory/develop/tutorial-v2-windows-uwp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: tutorial
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 09/24/2019
16+
ms.date: 12/13/2019
1717
ms.author: jmprieur
1818
ms.custom: aaddev, identityplatformtop40
1919
ms.collection: M365-identity-device-management
@@ -349,7 +349,7 @@ Now you need to register your application:
349349
Configure authentication for your application:
350350

351351
1. Back in the [Azure portal](https://portal.azure.com), under **Manage**, select **Authentication**.
352-
1. In the **Redirect URIs** list, for **TYPE**, select **Public client (mobile & desktop)** and enter `urn:ietf:wg:oauth:2.0:oob` for **REDIRECT URI**.
352+
1. In the **Redirect URIs** | **Suggested Redirect URIs for public clients (mobile, desktop)** section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**.
353353
1. Select **Save**.
354354

355355
Configure API permissions for your application:

0 commit comments

Comments
 (0)