Skip to content

Commit ce4a99b

Browse files
authored
Merge pull request #99807 from MicrosoftDocs/master
12/27 PM Publish
2 parents 8dff51c + 88b53c0 commit ce4a99b

File tree

74 files changed

+395
-155
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

74 files changed

+395
-155
lines changed

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -411,7 +411,13 @@ Based on the method chosen, a set of inputs and outputs is expected. Define the
411411

412412
### Custom signing key
413413

414-
A custom signing key must be assigned to the service principal object for a claims mapping policy to take effect. This ensures acknowledgment that tokens have been modified by the creator of the claims mapping policy and protects applications from claims mapping policies created by malicious actors. Apps that have claims mapping enabled must check a special URI for their token signing keys by appending `appid={client_id}` to their [OpenID Connect metadata requests](v2-protocols-oidc.md#fetch-the-openid-connect-metadata-document).
414+
A custom signing key must be assigned to the service principal object for a claims mapping policy to take effect. This ensures acknowledgment that tokens have been modified by the creator of the claims mapping policy and protects applications from claims mapping policies created by malicious actors. In order to add a custom signing key, you can use the Azure Powershell cmdlet `new-azureadapplicationkeycredential` to create a symmetric key credential for your Application object. For more information on this Azure Powershell cmdlet click [here](https://docs.microsoft.com/powershell/module/Azuread/New-AzureADApplicationKeyCredential?view=azureadps-2.0).
415+
416+
Apps that have claims mapping enabled must validate their token signing keys by appending `appid={client_id}` to their [OpenID Connect metadata requests](v2-protocols-oidc.md#fetch-the-openid-connect-metadata-document). Below is the format of the OpenID Connect metadata document you should use:
417+
418+
```
419+
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration?appid={client-id}
420+
```
415421

416422
### Cross-tenant scenarios
417423

@@ -516,4 +522,4 @@ In this example, you create a policy that emits a custom claim “JoinedData”
516522
517523
## See also
518524
519-
To learn how to customize claims issued in the SAML token through the Azure portal, see [How to: Customize claims issued in the SAML token for enterprise applications](active-directory-saml-claims-customization.md)
525+
To learn how to customize claims issued in the SAML token through the Azure portal, see [How to: Customize claims issued in the SAML token for enterprise applications](active-directory-saml-claims-customization.md)

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ You can configure optional claims for your application through the UI or applica
174174
}
175175
]
176176
}
177-
```
177+
```
178178

179179
2. When finished, click **Save**. Now the specified optional claims will be included in the tokens for your application.
180180

articles/active-directory/saas-apps/sap-successfactors-inbound-provisioning-cloud-only-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -170,8 +170,8 @@ This section provides steps for user account provisioning from SuccessFactors to
170170
* **Tenant URL –** Enter the name of the SuccessFactors OData API services endpoint. Only enter the host name of server without http or https. This value should look like: **api-server-name.successfactors.com**.
171171

172172
* **Notification Email –** Enter your email address, and check the “send email if failure occurs” checkbox.
173-
> [!NOTE]
174-
> The Azure AD Provisioning Service sends email notification if the provisioning job goes into a [quarantine](/azure/active-directory/manage-apps/application-provisioning-quarantine-status) state.
173+
> [!NOTE]
174+
> The Azure AD Provisioning Service sends email notification if the provisioning job goes into a [quarantine](/azure/active-directory/manage-apps/application-provisioning-quarantine-status) state.
175175
176176
* Click the **Test Connection** button. If the connection test succeeds, click the **Save** button at the top. If it fails, double-check that the SuccessFactors credentials and URL are valid.
177177
>[!div class="mx-imgBorder"]

articles/active-directory/saas-apps/sap-successfactors-inbound-provisioning-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -255,8 +255,8 @@ In this step, we establish connectivity with SuccessFactors and Active Directory
255255
> This setting only comes into play for user account creations if the *parentDistinguishedName* attribute is not configured in the attribute mappings. This setting is not used for user search or update operations. The entire domain sub tree falls in the scope of the search operation.
256256
257257
* **Notification Email –** Enter your email address, and check the “send email if failure occurs” checkbox.
258-
> [!NOTE]
259-
> The Azure AD Provisioning Service sends email notification if the provisioning job goes into a [quarantine](/azure/active-directory/manage-apps/application-provisioning-quarantine-status) state.
258+
> [!NOTE]
259+
> The Azure AD Provisioning Service sends email notification if the provisioning job goes into a [quarantine](/azure/active-directory/manage-apps/application-provisioning-quarantine-status) state.
260260
261261
* Click the **Test Connection** button. If the connection test succeeds, click the **Save** button at the top. If it fails, double-check that the SuccessFactors credentials and the AD credentials configured on the agent setup are valid.
262262
>[!div class="mx-imgBorder"]

articles/azure-maps/choose-map-style.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: Map style functionalities in Azure Maps| Microsoft Docs
2+
title: Choose a map style in Azure Maps
3+
titleSuffix: Azure Maps
34
description: Learn about Azure Maps style related functionalities.
45
author: walsehgal
56
ms.author: v-musehg

articles/azure-maps/set-android-map-styles.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: Map style functionalities in Azure Maps| Microsoft Docs
2+
title: Set a map style in Azure Maps using Android SDK
3+
titleSuffix: Azure Maps
34
description: Learn about Azure Maps style related functionalities for Android SDK.
45
author: walsehgal
56
ms.author: v-musehg

articles/azure-monitor/insights/solution-office-365.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.subservice:
66
ms.topic: conceptual
77
author: bwren
88
ms.author: bwren
9-
ms.date: 08/13/2019
9+
ms.date: 12/27/2019
1010

1111
---
1212

116 KB
Loading
109 KB
Loading
98.8 KB
Loading

0 commit comments

Comments
 (0)