Skip to content

Commit df2a828

Browse files
authored
Merge pull request #173782 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 61e7a03 + 5b5c919 commit df2a828

File tree

64 files changed

+382
-142
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+382
-142
lines changed

articles/active-directory/app-provisioning/accidental-deletions.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The feature lets you specify a deletion threshold, above which an admin
2121
needs to explicitly choose to allow the deletions to be processed.
2222

2323
> [!NOTE]
24-
> Accidental deletions are not supported for our Workday / SuccessFactors integrations. It is also not supported for changes in scoping (e.g. changing a scoping filter or changing from "sync all users and groups" to "sync assigned users and groups". Until the accidental deletions prevention feature is fully released, you will need to access the Azure portal using this URL: https://portal.azure.com/?Microsoft_AAD_IAM_userProvisioningDeleteThreshold=true
24+
> Accidental deletions are not supported for our Workday / SuccessFactors integrations. It is also not supported for changes in scoping (e.g. changing a scoping filter or changing from "sync all users and groups" to "sync assigned users and groups". Until the accidental deletions prevention feature is fully released, you will need to access the Azure portal using this URL: https://aka.ms/AccidentalDeletionsPreview
2525
2626

2727
## Configure accidental deletion prevention
@@ -79,8 +79,7 @@ To learn more about de-provisioning scenarios, see [How Application Provisioning
7979
### What scenarios count toward the deletion threshold?
8080
When a user is set to be removed from the target application, it will be counted against the
8181
deletion threshold. Scenarios that could lead to a user being removed from the target
82-
application could include: unassigning the user from the application, changing the sync scope
83-
from “sync all” to “sync assigned” to soft / hard deleting a user in the directory. Groups
82+
application could include: unassigning the user from the application and soft / hard deleting a user in the directory. Groups
8483
evaluated for deletion count towards the deletion threshold. In addition to deletions, the same functionality also works for disables.
8584

8685
### What is the interval that the deletion threshold is evaluated on?

articles/active-directory/azuread-dev/about-microsoft-identity-platform.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: overview
1111
ms.workload: identity
12-
ms.date: 12/09/2019
12+
ms.date: 09/27/2021
1313
ms.author: ryanwi
1414
ms.reviewer: agirling, saeeda, benv, marsma
1515
ms.custom: aaddev

articles/active-directory/develop/active-directory-authentication-protocols.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 12/18/2019
12+
ms.date: 09/27/2021
1313
ms.author: ryanwi
1414
ms.custom: aaddev
1515
ms.reviewer: hirsin

articles/active-directory/develop/api-find-an-api-how-to.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 06/28/2019
12+
ms.date: 09/27/2021
1313
ms.author: ryanwi
1414
ROBOTS: NOINDEX
1515
---
@@ -28,4 +28,4 @@ When you add permissions to your app registration, you can **add API access** to
2828

2929
## Next steps
3030

31-
- [Understanding the Azure Active Directory application manifest](./reference-app-manifest.md)
31+
- [Understanding the Azure Active Directory application manifest](./reference-app-manifest.md)

articles/active-directory/develop/application-model.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
1212
ms.workload: identity
13-
ms.date: 04/28/2020
13+
ms.date: 09/27/2021
1414
ms.author: ryanwi
1515
ms.reviewer: jmprieur, saeeda, sureshja, hirsin
1616
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started
@@ -83,4 +83,4 @@ For more information about the application model, see the following articles:
8383

8484
* For more information on application objects and service principals in the Microsoft identity platform, see [How and why applications are added to Azure AD](active-directory-how-applications-are-added.md).
8585
* For more information on single-tenant apps and multi-tenant apps, see [Tenancy in Azure Active Directory](single-and-multi-tenant-apps.md).
86-
* For more information on how Azure AD also provides Azure Active Directory B2C so that organizations can sign in users, typically customers, by using social identities like a Google account, see [Azure Active Directory B2C documentation](../../active-directory-b2c/index.yml).
86+
* For more information on how Azure AD also provides Azure Active Directory B2C so that organizations can sign in users, typically customers, by using social identities like a Google account, see [Azure Active Directory B2C documentation](../../active-directory-b2c/index.yml).

articles/active-directory/develop/consent-framework-links.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: develop
1010
ms.custom: aaddev
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 09/11/2018
13+
ms.date: 09/27/2021
1414
ms.author: ryanwi
1515
ROBOTS: NOINDEX
1616
---
@@ -27,4 +27,4 @@ This article is to help you learn more about how the Azure AD consent framework
2727
- For more depth, learn [how consent is supported at the OAuth 2.0 protocol layer during the authorization code grant flow.](../azuread-dev/v1-protocols-oauth-code.md#request-an-authorization-code)
2828

2929
## Next steps
30-
[AzureAD Microsoft Q&A](/answers/topics/azure-active-directory.html)
30+
[AzureAD Microsoft Q&A](/answers/topics/azure-active-directory.html)

articles/active-directory/develop/delegated-and-app-perms.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: develop
1010
ms.custom: aaddev
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 06/28/2019
13+
ms.date: 09/27/2021
1414
ms.author: ryanwi
1515
ROBOTS: NOINDEX
1616
---
@@ -24,4 +24,4 @@ ROBOTS: NOINDEX
2424
- For more depth, learn how resource applications expose [scopes](developer-glossary.md#scopes) and [application roles](developer-glossary.md#roles) to client applications, which manifest as delegated and application permissions respectively in the Azure portal.
2525

2626
## Next steps
27-
[AzureAD Microsoft Q&A](/answers/topics/azure-active-directory.html)
27+
[AzureAD Microsoft Q&A](/answers/topics/azure-active-directory.html)

articles/active-directory/develop/developer-glossary.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 04/24/2020
12+
ms.date: 09/27/2021
1313
ms.author: ryanwi
1414
ms.custom: aaddev
1515
ms.reviewer: jmprieur, saeeda, jesakowi, nacanuma
@@ -30,7 +30,7 @@ Access tokens are sometimes referred to as "User+App" or "App-Only", depending o
3030
* ["Authorization code" authorization grant](#authorization-grant), the end user authenticates first as the resource owner, delegating authorization to the client to access the resource. The client authenticates afterward when obtaining the access token. The token can sometimes be referred to more specifically as a "User+App" token, as it represents both the user that authorized the client application, and the application.
3131
* ["Client credentials" authorization grant](#authorization-grant), the client provides the sole authentication, functioning without the resource-owner's authentication/authorization, so the token can sometimes be referred to as an "App-Only" token.
3232

33-
See the [Microsoft identity platform Token Reference][AAD-Tokens-Claims] for more details.
33+
See the [access tokens reference][AAD-Tokens-Claims] for more details.
3434

3535
## application ID (client ID)
3636

@@ -109,7 +109,7 @@ See [consent framework](consent-framework.md) for more information.
109109

110110
An [OpenID Connect][OpenIDConnect-ID-Token] [security token](#security-token) provided by an [authorization server's](#authorization-server) [authorization endpoint](#authorization-endpoint), which contains [claims](#claim) pertaining to the authentication of an end user [resource owner](#resource-owner). Like an access token, ID tokens are also represented as a digitally signed [JSON Web Token (JWT)][JWT]. Unlike an access token though, an ID token's claims are not used for purposes related to resource access and specifically access control.
111111

112-
See the [Microsoft identity platform token reference][AAD-Tokens-Claims] for more details.
112+
See the [ID token reference](id-tokens.md) for more details.
113113

114114
## Microsoft identity platform
115115

@@ -142,6 +142,8 @@ A type of [security token](#security-token) issued by an [authorization server](
142142

143143
Unlike access tokens, refresh tokens can be revoked. If a client application attempts to request a new access token using a refresh token that has been revoked, the authorization server will deny the request, and the client application will no longer have permission to access the [resource server](#resource-server) on behalf of the [resource owner](#resource-owner).
144144

145+
See the [refresh tokens](refresh-tokens.md) for more details.
146+
145147
## resource owner
146148

147149
As defined by the [OAuth2 Authorization Framework][OAuth2-Role-Def], an entity capable of granting access to a protected resource. When the resource owner is a person, it is referred to as an end user. For example, when a [client application](#client-application) wants to access a user's mailbox through the [Microsoft Graph API][Microsoft-Graph], it requires permission from the resource owner of the mailbox.

articles/active-directory/develop/howto-add-terms-of-service-privacy-statement.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 05/22/2019
12+
ms.date: 09/27/2021
1313
ms.author: ryanwi
14-
ms.reviewer: lenalepa, sureshja
14+
ms.reviewer: sureshja
1515
ms.custom: aaddev
1616
---
1717

@@ -57,7 +57,7 @@ Follow these steps in the Azure portal.
5757
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a> and select the correct Azure AD tenant(not B2C).
5858
2. Navigate to the **App registrations** section and select your app.
5959
3. Under **Manage**, select **Branding**.
60-
4. Fill out the **Terms of Service URL** and **Privacy Statement URL** fields.
60+
4. Fill out the **Terms of service URL** and **Privacy statement URL** fields.
6161
5. Select **Save**.
6262

6363
![App properties contains terms of service and privacy statement URLs](./media/howto-add-terms-of-service-privacy-statement/azure-portal-terms-service-privacy-statement-urls.png)

articles/active-directory/develop/mark-app-as-publisher-verified.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 05/08/2020
11+
ms.date: 09/27/2021
1212
ms.author: ryanwi
1313
ms.custom: aaddev
1414
ms.reviewer: jesakowi
@@ -37,13 +37,13 @@ Make sure you have met the [pre-requisites](publisher-verification-overview.md#r
3737

3838
1. Ensure you are signed in using [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md) to an organizational (Azure AD) account that is authorized to make changes to the app(s) you want to mark as Publisher Verified and on the MPN Account in Partner Center.
3939

40-
- In Azure AD this user must be a member of one of the following [roles](../roles/permissions-reference.md): Application Admin, Cloud Application Admin, Global Admin.
40+
- In Azure AD this user must be a member of one of the following [roles](../roles/permissions-reference.md): Application Admin, Cloud Application Admin, or Global Admin.
4141

4242
- In Partner Center this user must have of the following [roles](/partner-center/permissions-overview): MPN Admin, Accounts Admin, or a Global Admin (this is a shared role mastered in Azure AD).
4343

44-
1. Navigate to the App Registration portal:
44+
1. Navigate to the **App registrations** blade:
4545

46-
1. Click on an app you would like to mark as Publisher Verified and open the Branding blade.
46+
1. Click on an app you would like to mark as Publisher Verified and open the **Branding** blade.
4747

4848
1. Ensure the app’s [publisher domain](howto-configure-publisher-domain.md) is set.
4949

0 commit comments

Comments
 (0)