Skip to content

Commit d322d0a

Browse files
authored
Merge pull request #107481 from MicrosoftDocs/master
3/12 AM Publish
2 parents 05a6507 + 9c10f0d commit d322d0a

File tree

50 files changed

+536
-130
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+536
-130
lines changed

articles/active-directory-b2c/custom-policy-password-complexity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,4 +149,4 @@ To configure the password complexity, override the `newPassword` and `reenterPas
149149
## Next steps
150150

151151
- Learn how to [Configure password change using custom policies in Azure Active Directory B2C](custom-policy-password-change.md).
152-
- - Learn more about the [Predicates](predicates.md) and [PredicateValidations](predicates.md#predicatevalidations) elements in the IEF reference.
152+
- Learn more about the [Predicates](predicates.md) and [PredicateValidations](predicates.md#predicatevalidations) elements in the IEF reference.

articles/active-directory/app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,8 @@ Scoping filters are configured as part of the attribute mappings for each Azure
9898

9999

100100
>[!IMPORTANT]
101-
> The IsMemberOf filter is not supported currently.
101+
> - The IsMemberOf filter is not supported currently.
102+
> - EQUALS and NOT EQUALS are not supported for multi-valued attributes
102103
103104
9. Optionally, repeat steps 7-8 to add more scoping clauses.
104105

articles/active-directory/b2b/b2b-quickstart-invite-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ When prompted, enter your credentials.
7878
1. To send an invitation to your test email account, run the following PowerShell command (replace **"Sanda"** and **sanda\@fabrikam.com** with your test email account name and email address):
7979

8080
```powershell
81-
New-AzureADMSInvitation -InvitedUserDisplayName "Sanda" -InvitedUserEmailAddress [email protected] -InviteRedirectURL https://myapps.azure.com -SendInvitationMessage $true
81+
New-AzureADMSInvitation -InvitedUserDisplayName "Sanda" -InvitedUserEmailAddress [email protected] -InviteRedirectURL https://myapps.microsoft.com -SendInvitationMessage $true
8282
```
8383
2. The command sends an invitation to the email address specified. Check the output, which should look similar to the following:
8484

articles/active-directory/develop/authentication-scenarios.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,9 +47,9 @@ Azure AD also provides Azure Active Directory B2C so that organizations can sign
4747

4848
Security tokens contain information about users and apps. Azure AD uses JSON based tokens (JWTs) that contain claims.
4949

50-
A claim provides assertions about one entity, such as a [client application](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#client-application) or [resource owner](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#resource-owner)), to another entity, such as a [resource server](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#resource-server)).
50+
A claim provides assertions about one entity, such as a [client application](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#client-application) or [resource owner](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#resource-owner), to another entity, such as a [resource server](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#resource-server).
5151

52-
Claims are name/value pairs that relay facts about the token subject. For example, a claim may contain facts about the security principal that was authenticated by the [authorization server](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#authorization-server)). The claims present in a given token depend on many things, including the type of token, the type of credential used to authenticate the subject, the application configuration, and so on.
52+
Claims are name/value pairs that relay facts about the token subject. For example, a claim may contain facts about the security principal that was authenticated by the [authorization server](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#authorization-server). The claims present in a given token depend on many things, including the type of token, the type of credential used to authenticate the subject, the application configuration, and so on.
5353

5454
Applications can use claims for various tasks such as:
5555

articles/active-directory/manage-apps/change-name-or-logo-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ It's easy to change the name or logo for a custom enterprise application in Azur
3737
7. In the file picker, select the file you want as the new logo. The name of the file appears in the box below the current logo image.
3838

3939
> [!NOTE]
40-
> Azure requires the logo image to be a PNG file, and it applies limits on width, height, and file size.
40+
> Azure requires the logo image to be a PNG file, and it applies limits on width, height, and file size. Custom logos must be exactly 215 × 215 pixels in size and be in PNG format. We recommend that you use a solid color background with no transparency in your application logo to appear best to users.
4141
8. Select **Save**. If you chose a new logo, the **Logo** field's image changes to reflect the new logo file.
4242

4343
## Next steps

articles/active-directory/saas-apps/github-tutorial.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,8 @@ ms.collection: M365-identity-device-management
2323

2424
In this tutorial, you'll learn how to integrate GitHub with Azure Active Directory (Azure AD). When you integrate GitHub with Azure AD, you can:
2525

26-
* Control in Azure AD who has access to GitHub.
27-
* Enable your users to be automatically signed-in to GitHub with their Azure AD accounts.
28-
* Manage your accounts in one central location - the Azure portal.
26+
* Control in Azure AD who has access to your GitHub Enterprise Cloud Organization.
27+
* Manage access to your GitHub Enterprise Cloud Organization in one central location - the Azure portal.
2928

3029
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
3130

@@ -42,7 +41,7 @@ In this tutorial, you configure and test Azure AD single sign-on in a test envir
4241

4342
* GitHub supports **SP** initiated SSO
4443

45-
* GitHub supports [**Automated** user provisioning](github-provisioning-tutorial.md)
44+
* GitHub supports [**Automated** user provisioning (organization invitations)](github-provisioning-tutorial.md)
4645
* Once you configure GitHub you can enforce Session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4746

4847
## Adding GitHub from the gallery

0 commit comments

Comments
 (0)