Skip to content

Commit c79aa93

Browse files
authored
Merge pull request #88923 from MicrosoftDocs/master
Merge Master to Live, 3 AM
2 parents 8ef0a2d + e5d9f46 commit c79aa93

File tree

230 files changed

+2673
-819
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

230 files changed

+2673
-819
lines changed

articles/active-directory-domain-services/network-considerations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ As you design the virtual network for Azure AD DS, the following considerations
3232
* To minimize latency, keep your core applications close to, or in the same region as, the virtual network subnet for your Azure AD DS managed domain. You can use virtual network peering or virtual private network (VPN) connections between Azure virtual networks.
3333
* The virtual network can't rely on DNS services other than those provided by Azure AD DS.
3434
* Azure AD DS provides its own DNS service. The virtual network must be configured to use these DNS service addresses. Name resolution for additional namespaces can be accomplished using conditional forwarders.
35-
* You can't use custom DNS server settings to direct queries other DNS servers, including on VMs. Resources in the virtual network must use the DNS service provided by Azure AD DS.
35+
* You can't use custom DNS server settings to direct queries from other DNS servers, including on VMs. Resources in the virtual network must use the DNS service provided by Azure AD DS.
3636

3737
> [!IMPORTANT]
3838
> You can't move Azure AD DS to a different virtual network after you've enabled the service.

articles/active-directory/conditional-access/howto-baseline-protect-azure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ If the CLI can open your default browser, it will do so and load a sign-in page.
4747

4848
## Deployment considerations
4949

50-
Because the **Require MFA for service management** policy applies to all Azure Resource Manager users, several considerations need to be made to ensure a smooth deployment. These considerations include identifying users and service principles in Azure AD that cannot or should not perform MFA, as well as applications and clients used by your organization that do not support modern authentication.
50+
The **Require MFA for service management** policy applies to all Azure Resource Manager users.
5151

5252
## Enable the baseline policy
5353

@@ -67,4 +67,4 @@ For more information, see:
6767

6868
* [Conditional Access baseline protection policies](concept-baseline-protection.md)
6969
* [Five steps to securing your identity infrastructure](../../security/fundamentals/steps-secure-identity.md)
70-
* [What is Conditional Access in Azure Active Directory?](overview.md)
70+
* [What is Conditional Access in Azure Active Directory?](overview.md)

articles/active-directory/conditional-access/technical-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ This setting works with all browsers. However, to satisfy a device policy, like
123123
| Android | Microsoft Edge, Intune Managed Browser, Chrome |
124124
| Windows Phone | Microsoft Edge, Internet Explorer |
125125
| Windows Server 2019 | Microsoft Edge, Internet Explorer, Chrome |
126-
| Windows Server 2016 | Microsoft Edge, Internet Explorer |
126+
| Windows Server 2016 | Internet Explorer |
127127
| Windows Server 2012 R2 | Internet Explorer |
128128
| Windows Server 2008 R2 | Internet Explorer |
129129
| macOS | Chrome, Safari |

articles/active-directory/develop/msal-net-migration-ios-broker.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ This document assumes that you already have a Xamarin iOS app that is integrated
3333

3434
### What are brokers?
3535

36-
Brokers are applications, provided by Microsoft, on Android and iOS ([Microsoft Authenticator](https://www.microsoft.com/account/authenticator) on iOS and Android, Intune Company Portal on Android).
36+
Brokers are applications, provided by Microsoft, on Android and iOS ([Microsoft Authenticator](https://www.microsoft.com/en-us/account/authenticator) on iOS and Android, Intune Company Portal on Android).
3737

3838
They enable:
3939

articles/active-directory/develop/quickstart-v2-java-webapp.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,11 @@ When you've completed the guide, your application will accept sign-ins of person
3030

3131
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-java-webapp/java-quickstart.svg)
3232

33-
> ## Prerequisites
34-
> To run this sample you will need:
35-
> - Java Development Kit (JDK) 8 or greater and Maven.
36-
>
33+
## Prerequisites
34+
35+
To run this sample you will need:
36+
- Java Development Kit (JDK) 8 or greater and Maven.
37+
3738
> [!div renderon="docs"]
3839
> ## Register and download your quickstart app
3940
> You have two options to start your quickstart application: express (Option 1), or manual (Option 2)

articles/active-directory/develop/scenario-web-app-sign-user-app-configuration.md

Lines changed: 226 additions & 44 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/scenario-web-app-sign-user-app-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ This page explains the app registration specifics for a web app that signs-in us
2525

2626
To register your application, you can use:
2727

28-
- The [web app quickstarts](#register-an-app-using-the-quickstarts) - In addition to being a great first experience with creating an application, quickstarts in the Azure portal contain a button named **Make this change for me**. You can use this button to set the properties you need, even for an existing app. You'll need to adapt the values of these properties to your own case. In particular, the web API URL for your app is probably going to be different from the proposed default, which will also impact the sign out URI.
28+
- The [web app quickstarts](#register-an-app-using-the-quickstarts) - In addition to being a great first experience with creating an application, quickstarts in the Azure portal contain a button named **Make this change for me**. You can use this button to set the properties you need, even for an existing app. You'll need to adapt the values of these properties to your own case. In particular, the web API URL for your app is probably going to be different from the proposed default, which will also impact the sign-out URI.
2929
- The Azure portal to [register your application manually](#register-an-app-using-azure-portal)
3030
- PowerShell and command-line tools
3131

articles/active-directory/develop/scenario-web-app-sign-user-overview.md

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 05/07/2019
15+
ms.date: 09/17/2019
1616
ms.author: jmprieur
1717
ms.custom: aaddev, identityplatformtop40
1818
#Customer intent: As an application developer, I want to know how to write a web app that signs-in users using the Microsoft identity platform for developers.
@@ -29,16 +29,36 @@ Learn all you need to build a web app that signs-in users with the Microsoft ide
2929

3030
## Getting started
3131

32+
# [ASP.NET Core](#tab/aspnetcore)
33+
3234
If you want to create your first portable (ASP.NET Core) web apps that sign in users, follow this quickstart:
3335

3436
> [!div class="nextstepaction"]
3537
> [Quickstart: ASP.NET Core web app that signs-in users](quickstart-v2-aspnet-core-webapp.md)
3638
37-
If you prefer to stay with ASP.NET, try out the following tutorial:
39+
# [ASP.NET](#tab/aspnet)
40+
41+
f you want to understand how to add sign in to a legacy ASP.NET web application, try out the following tutorial:
3842

3943
> [!div class="nextstepaction"]
4044
> [Quickstart: ASP.NET web app that signs-in users](quickstart-v2-aspnet-webapp.md)
4145
46+
# [Java](#tab/java)
47+
48+
If you're a Java developer, try out the following quickstart:
49+
50+
> [!div class="nextstepaction"]
51+
> [Quickstart: Add sign-in with Microsoft to a Java web app](quickstart-v2-java-webapp.md)
52+
53+
# [Python](#tab/python)
54+
55+
if you develop with Python, try out:
56+
57+
> [!div class="nextstepaction"]
58+
> [Quickstart: Add sign-in with Microsoft to a Python web app](quickstart-v2-python-webapp.md)
59+
60+
---
61+
4262
## Overview
4363

4464
You add authentication to your web app, so that it can sign in users. Adding authentication enables your web app to access limited profile information, and, for instance customize the experience you offer to its users. Web apps authenticate a user in a web browser. In this scenario, the web application directs the user’s browser to sign them in to Azure AD. Azure AD returns a sign-in response through the user’s browser, which contains claims about the user in a security token. Signing-in users leverage the [Open ID Connect](./v2-protocols-oidc.md) standard protocol itself simplified by the use of middleware [libraries](scenario-web-app-sign-user-app-configuration.md#libraries-used-to-protect-web-apps).
@@ -48,7 +68,7 @@ You add authentication to your web app, so that it can sign in users. Adding aut
4868
As a second phase you can also enable your application to call Web APIs on behalf of the signed-in user. This next phase is a different scenario, which you'll find in [Web App calls Web APIs](scenario-web-app-call-api-overview.md)
4969

5070
> [!NOTE]
51-
> Adding sign-in to a web app is about protecting the web app, and validating a user token, which is what **middleware** libraries do. This scenario does not require yet the Microsoft Authentication Libraries (MSAL), which are about acquiring a token to call protected APIs. The authentication libraries will only be introduced in the follow-up scenario when the web app needs to call web APIs.
71+
> Adding sign-in to a web app is about protecting the web app, and validating a user token, which is what **middleware** libraries do. In the case of .NET, this scenario does not require yet the Microsoft Authentication Libraries (MSAL), which are about acquiring a token to call protected APIs. The authentication libraries will only be introduced in the follow-up scenario when the web app needs to call web APIs.
5272
5373
## Specifics
5474

articles/active-directory/develop/scenario-web-app-sign-user-production.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 05/07/2019
15+
ms.date: 09/17/2019
1616
ms.author: jmprieur
1717
ms.custom: aaddev
1818
#Customer intent: As an application developer, I want to know how to write a web app that signs-in users using the Microsoft identity platform for developers.
@@ -34,12 +34,16 @@ Once your web app signs-in users, it can call web APIs on behalf of the signed-i
3434
> [!div class="nextstepaction"]
3535
> [Web app that calls web APIs](scenario-web-app-call-api-overview.md)
3636
37-
### Deep dive - web app tutorial
37+
### Deep dive - ASP.NET Core web app tutorial
3838

39-
Learn about other ways of sign-in users with the ASP.NET Core tutorial: [ms-identity-aspnetcore-webapp-tutorial](https://github.com/Azure-Samples/ms-identity-aspnetcore-webapp-tutorial). This is a progressive tutorial with production ready code for a web app including how to add sign in.
39+
Learn about other ways of sign-in users with the ASP.NET Core tutorial: [ms-identity-aspnetcore-webapp-tutorial](https://github.com/Azure-Samples/ms-identity-aspnetcore-webapp-tutorial). This sample is a progressive tutorial with production ready code for a web app including how to add sign in with accounts in:
4040

41-
<!--- Removed the diagram as it's already shown in the above link to GitHub
41+
- your organization,
42+
- multiple organizations,
43+
- work or school accounts or personal Microsoft account,
44+
- with [Azure AD B2C](https://aka.ms/aadb2c),
45+
- or in national clouds.
4246

43-
![Tutorial overview](media/scenarios/aspnetcore-webapp-tutorial.svg)
47+
### Sample code - Java web app
4448

45-
--->
49+
Learn more about the Java web app from the sample on GitHub: [A Java Web application that signs in users with the Microsoft identity platform and calls Microsoft Graph](https://github.com/Azure-Samples/ms-identity-java-webapp)

0 commit comments

Comments
 (0)