Skip to content

Commit d98bfe7

Browse files
committed
Merge branch 'release-ga-managed-grafana' of https://github.com/MicrosoftDocs/azure-docs-pr into release-ga-auth
2 parents 4ecc5ba + 1e73b03 commit d98bfe7

File tree

1,025 files changed

+12616
-5881
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,025 files changed

+12616
-5881
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18319,14 +18319,19 @@
1831918319
"redirect_document_id": false
1832018320
},
1832118321
{
18322-
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
18322+
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
1832318323
"redirect_url": "/connectors/bingsearch",
18324-
"redirect_document_id": false
18324+
"redirect_document_id": false
1832518325
},
1832618326
{
18327-
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18328-
"redirect_url": "/connectors/twilio",
18329-
"redirect_document_id": false
18327+
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18328+
"redirect_url": "/connectors/twilio",
18329+
"redirect_document_id": false
18330+
},
18331+
{
18332+
"source_path_from_root": "/articles/connectors/connectors-create-api-sendgrid.md",
18333+
"redirect_url": "/connectors/sendgrid",
18334+
"redirect_document_id": false
1833018335
},
1833118336
{
1833218337
"source_path_from_root": "/articles/connectors/connectors-schema-migration.md",

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@
355355
items:
356356
- name: Multi-factor authentication
357357
href: multi-factor-authentication.md
358-
displayName: TOTP, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
358+
displayName: TOTP, multi-factor, multifactor, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
359359
- name: Partner integration
360360
items:
361361
- name: Asignio

articles/active-directory-b2c/configure-authentication-in-azure-static-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 06/28/2022
10+
ms.date: 08/22/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -30,7 +30,7 @@ OpenID Connect (OIDC) is an authentication protocol that's built on OAuth 2.0. U
3030
When the access token expires or the app session is invalidated, Azure Static Web App initiates a new authentication request and redirects users to Azure AD B2C. If the Azure AD B2C [SSO session](session-behavior.md) is active, Azure AD B2C issues an access token without prompting users to sign in again. If the Azure AD B2C session expires or becomes invalid, users are prompted to sign in again.
3131

3232
## Prerequisites
33-
33+
- A premium Azure subscription.
3434
- If you haven't created an app yet, follow the guidance how to create an [Azure Static Web App](../static-web-apps/overview.md).
3535
- Familiarize yourself with the Azure Static Web App [staticwebapp.config.json](../static-web-apps/configuration.md) configuration file.
3636
- Familiarize yourself with the Azure Static Web App [App Settings](../static-web-apps/application-settings.md).

articles/active-directory-b2c/json-transformations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ The following example generates a JSON string based on the claim value of "email
152152
<InputClaims>
153153
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.to.0.email" />
154154
<InputClaim ClaimTypeReferenceId="otp" TransformationClaimType="personalizations.0.dynamic_template_data.otp" />
155-
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
155+
<InputClaim ClaimTypeReferenceId="copiedEmail" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
156156
</InputClaims>
157157
<InputParameters>
158158
<InputParameter Id="template_id" DataType="string" Value="d-4c56ffb40fa648b1aa6822283df94f60"/>
@@ -169,6 +169,7 @@ The following claims transformation outputs a JSON string claim that will be the
169169

170170
- Input claims:
171171
- **email**, transformation claim type **personalizations.0.to.0.email**: "[email protected]"
172+
- **copiedEmail**, transformation claim type **personalizations.0.dynamic_template_data.verify-email**: "[email protected]"
172173
- **otp**, transformation claim type **personalizations.0.dynamic_template_data.otp** "346349"
173174
- Input parameter:
174175
- **template_id**: "d-4c56ffb40fa648b1aa6822283df94f60"

articles/active-directory-b2c/openid-connect.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/12/2022
11+
ms.date: 08/12/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -43,7 +43,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
4343
&response_type=code+id_token
4444
&redirect_uri=https%3A%2F%2Fjwt.ms%2F
4545
&response_mode=fragment
46-
&scope=&scope=openid%20offline_access%20{application-id-uri}/{scope-name}
46+
&scope=openid%20offline_access%20{application-id-uri}/{scope-name}
4747
&state=arbitrary_data_you_can_receive_in_the_response
4848
&nonce=12345
4949
```

articles/active-directory-b2c/user-flow-custom-attributes.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,12 @@ You can create these attributes by using the portal UI before or after you use t
143143

144144
|Name |Used in |
145145
|---------|---------|
146-
|`extension_loyaltyId` | Custom policy|
146+
|`extension_loyaltyId` | Custom policy|
147147
|`extension_<b2c-extensions-app-guid>_loyaltyId` | [Microsoft Graph API](microsoft-graph-operations.md#application-extension-directory-extension-properties)|
148148

149+
> [!NOTE]
150+
> When using a custom attribute in custom policies, you must prefix the claim type ID with `extension_` to allow the correct data mapping to take place within the Azure AD B2C directory.
151+
149152
The following example demonstrates the use of custom attributes in an Azure AD B2C custom policy claim definition.
150153

151154
```xml

articles/active-directory/develop/active-directory-schema-extensions.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,11 @@ For example, here is a claims-mapping policy to emit a single claim from a direc
5959

6060
Where *xxxxxxx* is the appID (or Client ID) of the application that the extension was registered with.
6161

62+
> [!WARNING]
63+
> When you define a claims mapping policy for a directory extension attribute, use the `ExtensionID` property instead of the `ID` property within the body of the `ClaimsSchema` array, as shown in the example above.
64+
6265
> [!TIP]
6366
> Case consistency is important when setting directory extension attributes on objects. Extension attribute names aren't cases sensitive when being set up, but they are case sensitive when being read from the directory by the token service. If an extension attribute is set on a user object with the name "LegacyId" and on another user object with the name "legacyid", when the attribute is mapped to a claim using the name "LegacyId" the data will be successfully retrieved and the claim included in the token for the first user but not the second.
64-
>
65-
> The "Id" parameter in the claims schema used for built-in directory attributes is "ExtensionID" for directory extension attributes.
6667
6768
## Next steps
6869
- Learn how to [add custom or additional claims to the SAML 2.0 and JSON Web Tokens (JWT) tokens](active-directory-optional-claims.md).

articles/active-directory/develop/custom-rbac-for-developers.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 06/16/2022
12+
ms.date: 08/19/2022
1313
ms.custom: template-concept
1414
ms.author: davidmu
1515
ms.reviewer: john.garland, maggie.marxen, ian.bennett, marsma
@@ -43,7 +43,9 @@ Developers have the flexibility to provide their own implementation for how role
4343

4444
### App roles
4545

46-
Azure AD supports declaring app roles for an application. When a user signs into an application, Azure AD includes a [roles claim](./access-tokens.md#payload-claims) for each role that the user has been granted for that application. Applications receive the tokens that contain the role claims and then can use the information for permission assignments. The roles assigned to the user determine the level of access to resources and functionality.
46+
Azure AD allows you to [define app roles](./howto-add-app-roles-in-azure-ad-apps.md) for your application and assign those roles to users and other applications. The roles you assign to a user or application define their level of access to the resources and operations in your application.
47+
48+
When Azure AD issues an access token for an authenticated user or application, it includes the names of the roles you've assigned the entity (the user or application) in the access token's [`roles`](./access-tokens.md#payload-claims) claim. An application like a web API that receives that access token in a request can then make authorization decisions based on the values in the `roles` claim.
4749

4850
### Groups
4951

@@ -79,5 +81,5 @@ Although either app roles or groups can be used for authorization, key differenc
7981

8082
## Next steps
8183

82-
- [How to add app roles to your application and receive them in the token](./howto-add-app-roles-in-azure-ad-apps.md).
83-
- [Azure Identity Management and access control security best practices](../../security/fundamentals/identity-management-best-practices.md).
84+
- [How to add app roles to your application and receive them in the token](./howto-add-app-roles-in-azure-ad-apps.md)
85+
- [Azure Identity Management and access control security best practices](../../security/fundamentals/identity-management-best-practices.md)

articles/active-directory/develop/msal-net-token-cache-serialization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ Here are examples of possible distributed caches:
9898
services.Configure<MsalDistributedTokenCacheAdapterOptions>(options =>
9999
{
100100
// Optional: Disable the L1 cache in apps that don't use session affinity
101-
// by setting DisableL1Cache to 'false'.
101+
// by setting DisableL1Cache to 'true'.
102102
options.DisableL1Cache = false;
103103

104104
// Or limit the memory (by default, this is 500 MB)

articles/active-directory/develop/multi-service-web-app-access-microsoft-graph-as-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: app-service-web
99
ms.topic: tutorial
1010
ms.workload: identity
11-
ms.date: 04/25/2022
11+
ms.date: 08/19/2022
1212
ms.author: ryanwi
1313
ms.reviewer: stsoneff
1414
ms.devlang: csharp, javascript
@@ -90,7 +90,7 @@ webAppName="SecureWebApp-20201106120003"
9090
9191
spId=$(az resource list -n $webAppName --query [*].identity.principalId --out tsv)
9292
93-
graphResourceId=$(az ad sp list --display-name "Microsoft Graph" --query [0].objectId --out tsv)
93+
graphResourceId=$(az ad sp list --display-name "Microsoft Graph" --query [0].id --out tsv)
9494
9595
appRoleId=$(az ad sp list --display-name "Microsoft Graph" --query "[0].appRoles[?value=='User.Read.All' && contains(allowedMemberTypes, 'Application')].id" --output tsv)
9696

0 commit comments

Comments
 (0)