Skip to content

Commit d923a35

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-bugfix
2 parents 27b8189 + 5cbf41f commit d923a35

File tree

205 files changed

+4541
-1324
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

205 files changed

+4541
-1324
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51925,7 +51925,7 @@
5192551925
},
5192651926
{
5192751927
"source_path": "articles/terraform/terraform-create-complete-vm.md",
51928-
"redirect_url": "/azure/developer/terraform/create-linux-virtual machine-with-infrastructure",
51928+
"redirect_url": "/azure/developer/terraform/create-linux-virtual-machine-with-infrastructure",
5192951929
"redirect_document_id": false
5193051930
},
5193151931
{

.vscode/settings.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@
5959
"YAML"
6060
],
6161
"cSpell.words": [
62-
"auditd"
62+
"auditd",
63+
"covid"
6364
],
6465
"git.ignoreLimitWarning": true
6566
}

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Applications and systems that support customization of the attribute list includ
102102
- Salesforce
103103
- ServiceNow
104104
- Workday
105-
- Azure Active Directory ([Microsoft Graph REST API v1.0 reference](https://docs.microsoft.com/graph/api/overview?view=graph-rest-1.0) and custom directory extensions are supported)
105+
- Azure Active Directory ([Azure AD Graph API default attributes](https://msdn.microsoft.com/Library/Azure/Ad/Graph/api/entity-and-complex-type-reference#user-entity) and custom directory extensions are supported)
106106
- Apps that support [SCIM 2.0](https://tools.ietf.org/html/rfc7643), where attributes defined in the [core schema](https://tools.ietf.org/html/rfc7643) need to be added
107107

108108
> [!NOTE]

articles/active-directory/authentication/concept-sspr-writeback.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,7 @@ Passwords aren't written back in any of the following situations:
137137
* **Unsupported administrator operations**
138138
* Any administrator-initiated end-user password reset from PowerShell version 1, version 2, or the Microsoft Graph API (the [Microsoft Graph API beta](https://docs.microsoft.com/graph/api/passwordauthenticationmethod-resetpassword?view=graph-rest-beta&tabs=http) is supported).
139139
* Any administrator-initiated end-user password reset from the [Microsoft 365 admin center](https://admin.microsoft.com).
140+
* Any administrator cannot use password reset tool to reset their own password for password writeback.
140141

141142
> [!WARNING]
142143
> Use of the checkbox "User must change password at next logon" in on-premises AD DS administrative tools like Active Directory Users and Computers or the Active Directory Administrative Center is supported as a preview feature of Azure AD Connect. For more information, see [Implement password hash synchronization with Azure AD Connect sync](../hybrid/how-to-connect-password-hash-synchronization.md).

articles/active-directory/conditional-access/howto-conditional-access-insights-reporting.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,6 @@ The following roles can access insights and reporting:
3333

3434
Users also need one of the following Log Analytics workspace roles:
3535

36-
- Reader
37-
- Monitoring reader
38-
- Log Analytics reader
3936
- Contributor
4037
- Owner
4138

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,11 @@ ms.assetid: ef2797d7-d440-4a9a-a648-db32ad137494
88
ms.service: active-directory
99
ms.topic: reference
1010
ms.workload: identity
11-
ms.date: 04/23/2020
11+
ms.date: 05/07/2020
1212
ms.subservice: hybrid
1313
ms.author: billmath
1414

1515
ms.collection: M365-identity-device-management
16-
ms.custom: has-adal-ref
1716
---
1817
# Azure AD Connect: Version release history
1918
The Azure Active Directory (Azure AD) team regularly updates Azure AD Connect with new features and functionality. Not all additions are applicable to all audiences.
@@ -50,10 +49,7 @@ Not all releases of Azure AD Connect will be made available for auto upgrade. Th
5049
05/07/2020: Released for download
5150

5251
### Fixed issues
53-
- Fixed an issue where unselected domains were getting incorrectly selected from the wizard UI.
54-
- Fixed an issue in the ADSyncConfig PowerShell module, where invoking DSACLS command used in all the Set-ADSync* Permissions cmdlets would cause one of the following errors:
55-
- `GrantAclsNoInheritance : The parameter is incorrect. The command failed to complete successfully.`
56-
- `GrantAcls : No GUID Found for computer …`
52+
This hotfix build fixes an issue where unselected domains were getting incorrectly selected from the wizard UI if only grandchild containers were selected.
5753

5854
## 1.5.29.0
5955

@@ -77,7 +73,10 @@ This hotfix build fixes an issue in build 1.5.20.0 if you have cloned the **In f
7773
04/09/2020: Released for download
7874

7975
### Fixed issues
80-
This hotfix build fixes an issue with build 1.5.18.0 if you have the Group Filtering feature enabled and use mS-DS-ConsistencyGuid as the source anchor.
76+
- This hotfix build fixes an issue with build 1.5.18.0 if you have the Group Filtering feature enabled and use mS-DS-ConsistencyGuid as the source anchor.
77+
- Fixed an issue in the ADSyncConfig PowerShell module, where invoking DSACLS command used in all the Set-ADSync* Permissions cmdlets would cause one of the following errors:
78+
- `GrantAclsNoInheritance : The parameter is incorrect. The command failed to complete successfully.`
79+
- `GrantAcls : No GUID Found for computer …`
8180

8281
> [!IMPORTANT]
8382
> If you have cloned the **In from AD - Group Join** sync rule and have not cloned the **In from AD - Group Common** sync rule and plan to upgrade, complete the following steps as part of the upgrade:
@@ -112,7 +111,6 @@ This hotfix build fixes an issue with build 1.5.18.0 if you have the Group Filte
112111
- Fixed an issue with the creation of the Azure Active Directory synchronization account where enabling Directory Extensions or PHS may fail because the account has not propagated across all service replicas before attempted use.
113112
- Fixed a bug in the sync errors compression utility that was not handling surrogate characters correctly.
114113
- Fixed a bug in the auto upgrade which left the server in the scheduler suspended state.
115-
- Fixed a bug in the Domain/OU filtering page that would remove the Run Profiles of a domain by just partially expanding the domain tree, without making any changes.
116114

117115
## 1.4.38.0
118116
### Release status

articles/active-directory/identity-protection/overview-identity-protection.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,8 @@ Identity Protection requires users be a Security Reader, Security Operator, Secu
8383
| Security operator | View all Identity Protection reports and Overview blade <br><br> Dismiss user risk, confirm safe sign-in, confirm compromise | Configure or change policies <br><br> Reset password for a user <br><br> Configure alerts |
8484
| Security reader | View all Identity Protection reports and Overview blade | Configure or change policies <br><br> Reset password for a user <br><br> Configure alerts <br><br> Give feedback on detections |
8585

86+
Currently, the security operator role cannot access the Risky sign-ins report.
87+
8688
Conditional Access administrators can also create policies that factor in sign-in risk as a condition, find more information in the article [Conditional Access: Conditions](../conditional-access/concept-conditional-access-conditions.md#sign-in-risk).
8789

8890
## License requirements

articles/active-directory/manage-apps/application-proxy-configure-native-client-application.md

Lines changed: 43 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -12,23 +12,23 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: conceptual
15-
ms.date: 04/15/2019
15+
ms.date: 05/12/2020
1616
ms.author: mimart
1717
ms.reviewer: japere
18-
ms.custom: it-pro, has-adal-ref
18+
ms.custom: it-pro
1919

2020
ms.collection: M365-identity-device-management
2121
---
2222

2323
# How to enable native client applications to interact with proxy applications
2424

25-
You can use Azure Active Directory (Azure AD) Application Proxy to publish web apps, but it also can be used to publish native client applications that are configured with the Azure AD Authentication Library (ADAL). Native client applications differ from web apps because they're installed on a device, while web apps are accessed through a browser.
25+
You can use Azure Active Directory (Azure AD) Application Proxy to publish web apps, but it also can be used to publish native client applications that are configured with the Microsoft Authentication Library (MSAL). Native client applications differ from web apps because they're installed on a device, while web apps are accessed through a browser.
2626

2727
To support native client applications, Application Proxy accepts Azure AD-issued tokens that are sent in the header. The Application Proxy service does the authentication for the users. This solution doesn't use application tokens for authentication.
2828

2929
![Relationship between end users, Azure AD, and published applications](./media/application-proxy-configure-native-client-application/richclientflow.png)
3030

31-
To publish native applications, use the Azure AD Authentication Library, which takes care of authentication and supports many client environments. Application Proxy fits into the [Native Application to Web API scenario](../azuread-dev/native-app.md).
31+
To publish native applications, use the Microsoft Authentication Library, which takes care of authentication and supports many client environments. Application Proxy fits into the [Desktop app that calls a web API on behalf of a signed-in user](https://docs.microsoft.com/azure/active-directory/develop/authentication-flows-app-scenarios#desktop-app-that-calls-a-web-api-on-behalf-of-a-signed-in-user) scenario.
3232

3333
This article walks you through the four steps to publish a native application with Application Proxy and the Azure AD Authentication Library.
3434

@@ -53,8 +53,7 @@ You now need to register your application in Azure AD, as follows:
5353
- To target only accounts that are internal to your organization, select **Accounts in this organizational directory only**.
5454
- To target only business or educational customers, select **Accounts in any organizational directory**.
5555
- To target the widest set of Microsoft identities, select **Accounts in any organizational directory and personal Microsoft accounts**.
56-
57-
1. In the **Redirect URI** heading, select **Public client (mobile & desktop)**, and then type the redirect URI for your application.
56+
1. Under **Redirect URI**, select **Public client (mobile & desktop)**, and then type the redirect URI `https://login.microsoftonline.com/common/oauth2/nativeclient` for your application.
5857
1. Select and read the **Microsoft Platform Policies**, and then select **Register**. An overview page for the new application registration is created and displayed.
5958

6059
For more detailed information about creating a new application registration, see [Integrating applications with Azure Active Directory](../develop/quickstart-register-app.md).
@@ -66,42 +65,60 @@ Now that you've registered your native application, you can give it access to ot
6665
1. In the sidebar of the new application registration page, select **API permissions**. The **API permissions** page for the new application registration appears.
6766
1. Select **Add a permission**. The **Request API permissions** page appears.
6867
1. Under the **Select an API** setting, select **APIs my organization uses**. A list appears, containing the applications in your directory that expose APIs.
69-
1. Type in the search box or scroll to find the proxy application that you published in [Step 1: Publish your proxy application](#step-1-publish-your-proxy-application), and then select the proxy application.
68+
1. Type in the search box or scroll to find the proxy application that you published in [Step 1: Publish your proxy application](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-configure-native-client-application#step-1-publish-your-proxy-application), and then select the proxy application.
7069
1. In the **What type of permissions does your application require?** heading, select the permission type. If your native application needs to access the proxy application API as the signed-in user, choose **Delegated permissions**.
7170
1. In the **Select permissions** heading, select the desired permission, and select **Add permissions**. The **API permissions** page for your native application now shows the proxy application and permission API that you added.
7271

73-
## Step 4: Edit the Active Directory Authentication Library
72+
## Step 4: Add the Microsoft Authentication Library to your code (.NET C# sample)
7473

75-
Edit the native application code in the authentication context of the Active Directory Authentication Library (ADAL) to include the following text:
74+
Edit the native application code in the authentication context of the Microsoft Authentication Library (MSAL) to include the following text:
7675

77-
```
76+
```
7877
// Acquire Access Token from AAD for Proxy Application
79-
AuthenticationContext authContext = new AuthenticationContext("https://login.microsoftonline.com/<Tenant ID>");
80-
AuthenticationResult result = await authContext.AcquireTokenAsync("< External Url of Proxy App >",
81-
"<App ID of the Native app>",
82-
new Uri("<Redirect Uri of the Native App>"),
83-
PromptBehavior.Never);
84-
85-
//Use the Access Token to access the Proxy Application
86-
HttpClient httpClient = new HttpClient();
87-
httpClient.DefaultRequestHeaders.Authorization = new AuthenticationHeaderValue("Bearer", result.AccessToken);
88-
HttpResponseMessage response = await httpClient.GetAsync("< Proxy App API Url >");
78+
IPublicClientApplication clientApp = PublicClientApplicationBuilder
79+
.Create(<App ID of the Native app>)
80+
.WithDefaultRedirectUri() // will automatically use the default Uri for native app
81+
.WithAuthority("https://login.microsoftonline.com/{<Tenant ID>}")
82+
.Build();
83+
84+
AuthenticationResult authResult = null;
85+
var accounts = await clientApp.GetAccountsAsync();
86+
IAccount account = accounts.FirstOrDefault();
87+
88+
IEnumerable<string> scopes = new string[] {"<Scope>"};
89+
90+
try
91+
{
92+
authResult = await clientApp.AcquireTokenSilent(scopes, account).ExecuteAsync();
93+
}
94+
catch (MsalUiRequiredException ex)
95+
{
96+
authResult = await clientApp.AcquireTokenInteractive(scopes).ExecuteAsync();
97+
}
98+
99+
if (authResult != null)
100+
{
101+
//Use the Access Token to access the Proxy Application
102+
103+
HttpClient httpClient = new HttpClient();
104+
HttpClient.DefaultRequestHeaders.Authorization = new AuthenticationHeaderValue("Bearer", authResult.AccessToken);
105+
HttpResponseMessage response = await httpClient.GetAsync("<Proxy App Url>");
106+
}
89107
```
90108

91109
The required info in the sample code can be found in the Azure AD portal, as follows:
92110

93111
| Info required | How to find it in the Azure AD portal |
94112
| --- | --- |
95113
| \<Tenant ID> | **Azure Active Directory** > **Properties** > **Directory ID** |
96-
| \<External Url of Proxy App> | **Enterprise applications** > *your proxy application* > **Application proxy** > **External Url** |
97-
| \<App ID of the Native app> | **Enterprise applications** > *your native application* > **Properties** > **Application ID** |
98-
| \<Redirect URI of the Native App> | **Azure Active Directory** > **App registrations** > *your native application* > **Redirect URIs** |
99-
| \<Proxy App API Url> | **Azure Active Directory** > **App registrations** > *your native application* > **API permissions** > **API / PERMISSIONS NAME** |
114+
| \<App ID of the Native app> | **Application registration** > *your native application* > **Overview** > **Application ID** |
115+
| \<Scope> | **Application registration** > *your native application* > **API permissions** > Click on the Permission API (user_impersonation) > A panel with the caption **user_impersonation** appears on the right hand side. > The scope is the URL in the edit box.
116+
| \<Proxy App Url> | the External Url and path to the API
100117

101-
After you edit the ADAL with these parameters, your users can authenticate to native client applications even when they're outside of the corporate network.
118+
After you edit the MSAL code with these parameters, your users can authenticate to native client applications even when they are outside of the corporate network.
102119

103120
## Next steps
104121

105122
For more information about the native application flow, see [Native apps in Azure Active Directory](../azuread-dev/native-app.md).
106123

107-
Learn about setting up [Single sign-on to applications in Azure Active Directory](what-is-single-sign-on.md#choosing-a-single-sign-on-method).
124+
Learn about setting up [Single sign-on to applications in Azure Active Directory](what-is-single-sign-on.md#choosing-a-single-sign-on-method).

0 commit comments

Comments
 (0)