Skip to content

Commit d850835

Browse files
committed
Merge branch 'master' of github.com:MicrosoftDocs/azure-docs-pr
2 parents aee6953 + 213e72f commit d850835

File tree

129 files changed

+1612
-850
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

129 files changed

+1612
-850
lines changed

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,6 @@ For B2C tenants, there are two primary modes of communicating with the Graph API
2626

2727
In this article, you learn how to perform the automated use case. You'll build a .NET 4.5 `B2CGraphClient` that performs user create, read, update, and delete (CRUD) operations. The client will have a Windows command-line interface (CLI) that allows you to invoke various methods. However, the code is written to behave in a non-interactive, automated fashion.
2828

29-
>[!IMPORTANT]
30-
> You **must** use the [Azure AD Graph API](../active-directory/develop/active-directory-graph-api-quickstart.md) to manage users in an Azure AD B2C directory. The Azure AD Graph API is different from the Microsoft Graph API. Learn more in this MSDN blog post: [Microsoft Graph or Azure AD Graph](https://blogs.msdn.microsoft.com/aadgraphteam/2016/07/08/microsoft-graph-or-azure-ad-graph/).
31-
3229
## Prerequisites
3330

3431
Before you can create applications or users, you need an Azure AD B2C tenant. If you don't already have one, [Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).

articles/active-directory-b2c/manage-user-access.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -172,3 +172,4 @@ The following is an example of a Version based terms of use consent in a claim:
172172
## Next steps
173173

174174
- To learn how to delete and export user data, see [Manage user data](manage-user-data.md).
175+
- For an example custom policy that implements a terms of use prompt, see [A B2C IEF Custom Policy - Sign Up and Sign In with 'Terms of Use' prompt](https://github.com/azure-ad-b2c/samples/tree/master/policies/sign-in-sign-up-versioned-tou).
Lines changed: 14 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure Active Directory authentication protocols | Microsoft Docs
3-
description: An overview of the authentication protocols supported by Azure Active Directory (AD)
2+
title: Microsoft identity platform authentication protocols | Microsoft Docs
3+
description: An overview of the authentication protocols supported by Microsoft identity platform
44
author: rwike77
55
services: active-directory
66
manager: CelesteDG
@@ -10,29 +10,28 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
1212
ms.workload: identity
13-
ms.date: 04/27/2017
13+
ms.date: 12/18/2019
1414
ms.author: ryanwi
1515
ms.custom: aaddev
1616
ms.reviewer: hirsin
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Azure Active Directory authentication protocols
20+
# Microsoft identity platform authentication protocols
2121

22-
Azure Active Directory (Azure AD) supports several of the most widely used authentication and authorization protocols. The topics in this section describe the supported protocols and their implementation in Azure AD. The topics included a review of supported claim types, an introduction to the use of federation metadata, detailed OAuth 2.0. and SAML 2.0 protocol reference documentation, and a troubleshooting section.
22+
Microsoft identity platform supports several of the most widely used authentication and authorization protocols. The topics in this section describe the supported protocols and their implementation in Microsoft identity platform. The topics included a review of supported claim types, an introduction to the use of federation metadata, detailed OAuth 2.0. and SAML 2.0 protocol reference documentation, and a troubleshooting section.
2323

2424
## Authentication protocols articles and reference
2525

26-
* [Important Information About Signing Key Rollover in Azure AD](active-directory-signing-key-rollover.md) – Learn about Azure AD’s signing key rollover cadence, changes you can make to update the key automatically, and discussion for how to update the most common application scenarios.
27-
* [Supported Token and Claim Types](v1-id-and-access-tokens.md) - Learn about the claims in the tokens that Azure AD issues.
28-
* [Federation Metadata](azure-ad-federation-metadata.md) - Learn how to find and interpret the metadata documents that Azure AD generates.
29-
* [OAuth 2.0 in Azure AD](v1-protocols-oauth-code.md) - Learn about the implementation of OAuth 2.0 in Azure AD.
30-
* [OpenID Connect 1.0](v1-protocols-openid-connect-code.md) - Learn how to use OAuth 2.0, an authorization protocol, for authentication.
31-
* [Service to Service Calls with Client Credentials](v1-oauth2-client-creds-grant-flow.md) - Learn how to use OAuth 2.0 client credentials grant flow for service to service calls.
32-
* [Service to Service Calls with On-Behalf-Of Flow](v1-oauth2-on-behalf-of-flow.md) - Learn how to use OAuth 2.0 On-Behalf-Of flow for service to service calls.
33-
* [SAML Protocol Reference](active-directory-saml-protocol-reference.md) - Learn about the Single Sign-On and Single Sign-out SAML profiles of Azure AD.
26+
* [Important Information About Signing Key Rollover in Microsoft identity platform](active-directory-signing-key-rollover.md) – Learn about Microsoft identity platform’s signing key rollover cadence, changes you can make to update the key automatically, and discussion for how to update the most common application scenarios.
27+
* [Supported Token and Claim Types](id-tokens.md) - Learn about the claims in the tokens that Microsoft identity platform issues.
28+
* [OAuth 2.0 in Microsoft identity platform](v2-oauth2-auth-code-flow.md) - Learn about the implementation of OAuth 2.0 in Microsoft identity platform.
29+
* [OpenID Connect 1.0](v2-protocols-oidc.md) - Learn how to use OAuth 2.0, an authorization protocol, for authentication.
30+
* [Service to Service Calls with Client Credentials](v2-oauth2-client-creds-grant-flow.md) - Learn how to use OAuth 2.0 client credentials grant flow for service to service calls.
31+
* [Service to Service Calls with On-Behalf-Of Flow](v2-oauth2-on-behalf-of-flow.md) - Learn how to use OAuth 2.0 On-Behalf-Of flow for service to service calls.
32+
* [SAML Protocol Reference](active-directory-saml-protocol-reference.md) - Learn about the Single Sign-On and Single Sign-out SAML profiles of Microsoft identity platform.
3433

3534
## See also
3635

37-
* [Azure Active Directory Developer's Guide](v1-overview.md)
38-
* [Active Directory Code Samples](sample-v1-code.md)
36+
* [Microsoft identity platform overview](v2-overview.md)
37+
* [Active Directory Code Samples](sample-v2-code.md)

articles/active-directory/develop/active-directory-certificate-credentials.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Azure AD certificate credentials
2+
title: Microsoft identity platform certificate credentials
33
titleSuffix: Microsoft identity platform
4-
description: This article discusses the registration and use of certificate credentials for application authentication
4+
description: This article discusses the registration and use of certificate credentials for application authentication.
55
services: active-directory
66
author: rwike77
77
manager: CelesteDG
@@ -11,21 +11,21 @@ ms.service: active-directory
1111
ms.subservice: develop
1212
ms.workload: identity
1313
ms.topic: conceptual
14-
ms.date: 05/21/2019
14+
ms.date: 12/18/2019
1515
ms.author: ryanwi
1616
ms.reviewer: nacanuma, jmprieur
1717
ms.custom: aaddev
1818
ms.collection: M365-identity-device-management
1919
---
2020

21-
# Azure AD application authentication certificate credentials
21+
# Microsoft identity platform application authentication certificate credentials
2222

23-
Azure Active Directory (Azure AD) allows an application to use its own credentials for authentication, for example, in the OAuth 2.0 Client Credentials Grant flow ([v1.0](v1-oauth2-client-creds-grant-flow.md), [v2.0](v2-oauth2-client-creds-grant-flow.md)) and the On-Behalf-Of flow ([v1.0](v1-oauth2-on-behalf-of-flow.md), [v2.0](v2-oauth2-on-behalf-of-flow.md)).
23+
Microsoft identity platform allows an application to use its own credentials for authentication, for example, in the [OAuth 2.0 Client Credentials Grant flowv2.0](v2-oauth2-client-creds-grant-flow.md) and the [On-Behalf-Of flow](v2-oauth2-on-behalf-of-flow.md)).
2424

2525
One form of credential that an application can use for authentication is a JSON Web Token(JWT) assertion signed with a certificate that the application owns.
2626

2727
## Assertion format
28-
28+
Microsoft identity platform
2929
To compute the assertion, you can use one of the many [JSON Web Token](https://jwt.ms/) libraries in the language of your choice. The information carried by the token are as follows:
3030

3131
### Header
@@ -85,9 +85,9 @@ The following string is an example of encoded assertion. If you look carefully,
8585
Gh95kHCOEGq5E_ArMBbDXhwKR577scxYaoJ1P{a lot of characters here}KKJDEg"
8686
```
8787

88-
## Register your certificate with Azure AD
88+
## Register your certificate with Microsoft identity platform
8989

90-
You can associate the certificate credential with the client application in Azure AD through the Azure portal using any of the following methods:
90+
You can associate the certificate credential with the client application in Microsoft identity platform through the Azure portal using any of the following methods:
9191

9292
### Uploading the certificate file
9393

@@ -121,7 +121,7 @@ In the Azure app registration for the client application:
121121
}
122122
]
123123
```
124-
3. Save the edits to the application manifest and then upload the manifest to Azure AD.
124+
3. Save the edits to the application manifest and then upload the manifest to Microsoft identity platform.
125125

126126
The `keyCredentials` property is multi-valued, so you may upload multiple certificates for richer key management.
127127

@@ -130,4 +130,4 @@ In the Azure app registration for the client application:
130130
> [!NOTE]
131131
> You must calculate the X5T header by using the certificate's hash and converting it to a base64 string. In C# it would look something similar to that of : `System.Convert.ToBase64String(cert.GetCertHash());`
132132
133-
The code sample on [Authenticating to Azure AD in daemon apps with certificates](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential) shows how an application uses its own credentials for authentication. It also shows how you can [create a self-signed certificate](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential#create-a-self-signed-certificate) using the `New-SelfSignedCertificate` Powershell command. You can also take advantage and use the [app creation scripts](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential/blob/master/AppCreationScripts/AppCreationScripts.md) to create the certificates, compute the thumbprint, and so on.
133+
The code sample on [Authenticating to Microsoft identity platform in daemon apps with certificates](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential) shows how an application uses its own credentials for authentication. It also shows how you can [create a self-signed certificate](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential#create-a-self-signed-certificate) using the `New-SelfSignedCertificate` Powershell command. You can also take advantage and use the [app creation scripts](https://github.com/Azure-Samples/active-directory-dotnet-daemon-certificate-credential/blob/master/AppCreationScripts/AppCreationScripts.md) to create the certificates, compute the thumbprint, and so on.

articles/active-directory/develop/authentication-scenarios.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
1212
ms.workload: identity
13-
ms.date: 10/15/2019
13+
ms.date: 12/18/2019
1414
ms.author: ryanwi
1515
ms.reviewer: jmprieur, saeeda, sureshja, hirsin
1616
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started
@@ -162,6 +162,7 @@ By default, MSAL uses the system browser except for .NET Framework desktop appli
162162

163163
## Next steps
164164

165-
See the [Microsoft identity platform developer glossary](developer-glossary.md) to get familiar with common terms.
166-
See [Authentication flows and app scenarios](authentication-flows-app-scenarios.md) to learn more about other scenarios for authenticating users supported by the Microsoft identity platform.
167-
See [MSAL libraries](msal-overview.md) to learn about the Microsoft libraries that help you develop applications that work with Microsoft Accounts, Azure AD accounts, and Azure AD B2C users all in a single, streamlined programming model.
165+
- See the [Microsoft identity platform developer glossary](developer-glossary.md) to get familiar with common terms.
166+
- See [Authentication flows and app scenarios](authentication-flows-app-scenarios.md) to learn more about other scenarios for authenticating users supported by the Microsoft identity platform.
167+
- See [MSAL libraries](msal-overview.md) to learn about the Microsoft libraries that help you develop applications that work with Microsoft Accounts, Azure AD accounts, and Azure AD B2C users all in a single, streamlined programming model.
168+
- See [Integrate App Service with Microsfot identity platform](/azure/app-service/configure-authentication-provider-aad) to learn how to configure authentication for your App Service app.

articles/active-directory/develop/quickstart-v2-dotnet-native-aspnet.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Call Azure AD protected ASP.NET Web API - Microsoft identity platform
3-
description: In this quickstart, learn how to call an ASP.NET web API protected by Azure Active Directory from a Windows Desktop (WPF) application. The WPF client authenticates a user, requests an access token, and calls the web API.
2+
title: Call a ASP.NET Web API protected by Microsoft identity platform
3+
description: In this quickstart, learn how to call an ASP.NET web API protected by Microsoft identity platform from a Windows Desktop (WPF) application. The WPF client authenticates a user, requests an access token, and calls the web API.
44
services: active-directory
55
author: jmprieur
66
manager: CelesteDG
@@ -16,9 +16,9 @@ ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:A
1616
ms.collection: M365-identity-device-management
1717
---
1818

19-
# Quickstart: Call an ASP.NET Web API protected by Azure AD
19+
# Quickstart: Call an ASP.NET Web API protected by Microsoft identity platform
2020

21-
In this quickstart, you expose a Web API and protect it so that only authenticated user can access it. This sample shows how to expose a ASP.NET Web API so it can accept tokens issued by personal accounts (including outlook.com, live.com, and others) as well as work and school accounts from any company or organization that has integrated with Azure Active Directory.
21+
In this quickstart, you expose a Web API and protect it so that only authenticated user can access it. This sample shows how to expose a ASP.NET Web API so it can accept tokens issued by personal accounts (including outlook.com, live.com, and others) as well as work and school accounts from any company or organization that has integrated with Microsoft identity platform.
2222

2323
The sample also includes a Windows Desktop application (WPF) client that demonstrates how you can request an access token to access a Web API.
2424

0 commit comments

Comments
 (0)