Skip to content

Commit e31e5f9

Browse files
committed
Merge branch 'main' into release-preview-mswb
2 parents 5b41d1d + ecae78a commit e31e5f9

File tree

170 files changed

+1758
-1894
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

170 files changed

+1758
-1894
lines changed

.openpublishing.redirection.json

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23347,6 +23347,56 @@
2334723347
"redirect_url": "/azure/active-directory/develop/quickstart-register-app",
2334823348
"redirect_document_id": false
2334923349
},
23350+
{
23351+
"source_path_from_root": "/articles/active-directory/develop/migrate-adal-msal-java.md",
23352+
"redirect_url": "/entra/msal/java/advanced/support-for-adfs",
23353+
"redirect_document_id": false
23354+
},
23355+
{
23356+
"source_path_from_root": "/articles/active-directory/develop/msal-logging-java.md",
23357+
"redirect_url": "/entra/msal/java/advanced/msal-logging-java",
23358+
"redirect_document_id": false
23359+
},
23360+
{
23361+
"source_path_from_root": "/articles/active-directory/develop/msal-error-handling-java.md",
23362+
"redirect_url": "/entra/msal/java/advanced/msal-error-handling-java",
23363+
"redirect_document_id": false
23364+
},
23365+
{
23366+
"source_path_from_root": "/articles/active-directory/develop/msal-java-token-cache-serialization.md",
23367+
"redirect_url": "/entra/msal/java/advanced/msal-java-token-cache-serialization",
23368+
"redirect_document_id": false
23369+
},
23370+
{
23371+
"source_path_from_root": "/articles/active-directory/develop/msal-java-adfs-support.md",
23372+
"redirect_url": "/entra/msal/java/advanced/msal-java-adfs-support",
23373+
"redirect_document_id": false
23374+
},
23375+
{
23376+
"source_path_from_root": "/articles/active-directory/develop/msal-java-get-remove-accounts-token-cache.md",
23377+
"redirect_url": "/entra/msal/java/advanced/msal-java-get-remove-accounts-token-cache",
23378+
"redirect_document_id": false
23379+
},
23380+
{
23381+
"source_path_from_root": "/articles/active-directory/develop/migrate-python-adal-msal.md",
23382+
"redirect_url": "/entra/msal/python/advanced/migrate-python-adal-msal",
23383+
"redirect_document_id": false
23384+
},
23385+
{
23386+
"source_path_from_root": "/articles/active-directory/develop/msal-logging-python.md",
23387+
"redirect_url": "/entra/msal/python/advanced/msal-logging-python",
23388+
"redirect_document_id": false
23389+
},
23390+
{
23391+
"source_path_from_root": "/articles/active-directory/develop/msal-error-handling-python.md",
23392+
"redirect_url": "/entra/msal/python/advanced/msal-error-handling-python",
23393+
"redirect_document_id": false
23394+
},
23395+
{
23396+
"source_path_from_root": "/articles/active-directory/develop/msal-python-token-cache-serialization.md",
23397+
"redirect_url": "/entra/msal/python/advanced/msal-python-token-cache-serialization",
23398+
"redirect_document_id": false
23399+
},
2335023400
{
2335123401
"source_path_from_root": "/articles/networking/azure-orbital-overview.md",
2335223402
"redirect_url": "/azure/orbital/overview",

articles/active-directory-domain-services/faqs.yml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.subservice: domain-services
1212
ms.workload: identity
1313
ms.topic: faq
14-
ms.date: 08/01/2023
14+
ms.date: 09/05/2023
1515
ms.author: justinha
1616
title: Frequently asked questions (FAQs) about Azure Active Directory (AD) Domain Services
1717
summary: This page answers frequently asked questions about Azure Active Directory Domain Services.
@@ -106,6 +106,11 @@ sections:
106106
answer: |
107107
Any user account that's part of the managed domain can join a VM. Members of the *Azure AD DC Administrators* group are granted remote desktop access to machines that have been joined to the managed domain.
108108
109+
- question: |
110+
Is there any quota for the number of machines that I can join to the domain?
111+
answer: |
112+
There's no quota in Azure AD DS for domain-joined machines.
113+
109114
- question: |
110115
Do I have domain administrator privileges for the managed domain provided by Azure AD Domain Services?
111116
answer: |

articles/active-directory/architecture/resilience-client-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,8 @@ Learn more:
3737

3838
* [Token cache serialization](https://github.com/AzureAD/microsoft-identity-web/wiki/token-cache-serialization)
3939
* [Token cache serialization in MSAL.NET](../develop/msal-net-token-cache-serialization.md)
40-
* [Custom token cache serialization in MSAL for Java](../develop/msal-java-token-cache-serialization.md)
41-
* [Custom token cache serialization in MSAL for Python](../develop/msal-python-token-cache-serialization.md).
40+
* [Custom token cache serialization in MSAL for Java](/entra/msal/java/advanced/msal-java-token-cache-serialization)
41+
* [Custom token cache serialization in MSAL for Python](/entra/msal/python/advanced/msal-python-token-cache-serialization).
4242

4343
![Diagram of a device and and application using MSAL to call Microsoft Identity](media/resilience-client-app/resilience-with-microsoft-authentication-library.png)
4444

articles/active-directory/cloud-infrastructure-entitlement-management/faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ Customers can also remove, export or modify specific data if a Global Administra
139139

140140
If you're an enterprise customer, you can contact your Microsoft representative, account team, or tenant admin to file a high-priority IcM support ticket requesting a Data Subject Request. Do not include details or any personally identifiable information in the IcM request. We'll reach out to you for these details only after an IcM is filed.
141141

142-
If you're a self-service customer (you set up a trial or paid license in the Microsoft 365 admin center) you can contact the Permissions Management privacy team by selecting your profile drop-down menu, then **Account Settings** in Permissions Management. Follow the instructions to make a Data Subject Access Request.
142+
If you're a self-service customer (you set up a trial or paid license in the Microsoft 365 admin center) you can contact the Permissions Management privacy team by selecting your profile drop-down menu, then **Account Settings** in Permissions Management. Follow the instructions to make a Data Subject Request.
143143

144144
Learn more about [Azure Data Subject Requests](https://go.microsoft.com/fwlink/?linkid=2245178).
145145

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-controller-after-onboarding.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,17 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/16/2023
11+
ms.date: 08/24/2023
1212
ms.author: jfields
1313
---
1414

1515
# Enable or disable the controller after onboarding is complete
1616

17-
With the controller, you determine what level of access to provide Permissions Management.
17+
With the controller, you can decide what level of access to grant in Permissions Management.
1818

19-
* Enable to grant read and write access to your environment(s). You can manage permissions and remediate through Permissions Management.
19+
* Enable to grant read and write access to your environments. You can right-size permissions and remediate through Permissions Management.
2020

21-
* Disable to grant read-only access to your environment(s).
21+
* Disable to grant read-only access to your environments.
2222

2323

2424
This article describes how to enable the controller in Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) after onboarding is complete.
@@ -30,7 +30,7 @@ This article also describes how to disable the controller in Microsoft Azure and
3030
## Enable the controller in AWS
3131

3232
> [!NOTE]
33-
> You can enable the controller in AWS if you disabled it during onboarding. Once you enable the controller, you can’t disable it at this time.
33+
> You can enable the controller in AWS if you disabled it during onboarding. Once you enable the controller in AWS, you can’t disable it.
3434
3535
1. Sign in to the AWS console of the member account in a separate browser window.
3636
1. Go to the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.

articles/active-directory/conditional-access/how-to-app-protection-policy-windows.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 07/14/2023
9+
ms.date: 09/05/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -23,7 +23,7 @@ App protection policies apply mobile application management (MAM) to specific ap
2323

2424
## Prerequisites
2525

26-
Customers interested in the public preview will need to opt-in using the [MAM for Windows Public Preview Sign Up Form](https://aka.ms/MAMforWindowsPublic).
26+
Customers interested in the public preview need to opt in using the [MAM for Windows Public Preview Sign Up Form](https://aka.ms/MAMforWindowsPublic).
2727

2828
## User exclusions
2929
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
@@ -34,7 +34,7 @@ The following policy is put in to [Report-only mode](howto-conditional-access-in
3434

3535
### Require app protection policy for Windows devices
3636

37-
The following steps help create a Conditional Access policy requiring an app protection policy when using a Windows device. The app protection policy must also be configured and assigned to your users in Microsoft Intune. For more information about how to create the app protection policy, see the article [Preview: App protection policy settings for Windows](/mem/intune/apps/app-protection-policy-settings-windows).
37+
The following steps help create a Conditional Access policy requiring an app protection policy when using a Windows device. The app protection policy must also be configured and assigned to your users in Microsoft Intune. For more information about how to create the app protection policy, see the article [Preview: App protection policy settings for Windows](/mem/intune/apps/app-protection-policy-settings-windows). The following policy includes multiple controls allowing devices to either use app protection policies for mobile application management (MAM) or be managed and compliant with mobile device management (MDM) policies.
3838

3939
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
4040
1. Browse to **Protection** > **Conditional Access**.
@@ -52,16 +52,19 @@ The following steps help create a Conditional Access policy requiring an app pro
5252
1. **Client apps**, set **Configure** to **Yes**.
5353
1. Select **Browser** only.
5454
1. Under **Access controls** > **Grant**, select **Grant access**.
55-
1. Select **Require app protection policy**
55+
1. Select **Require app protection policy** and **Require device to be marked as compliant**.
5656
1. **For multiple controls** select **Require one of the selected controls**
5757
1. Confirm your settings and set **Enable policy** to **Report-only**.
5858
1. Select **Create** to create to enable your policy.
5959

60-
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
60+
After administrators confirm the settings using [report-only mode](howto-conditional-access-insights-reporting.md), they can move the **Enable policy** toggle from **Report-only** to **On**.
61+
62+
> [!TIP]
63+
> Organizations should also deploy a policy that [blocks access from unsupported or unknown device platforms](howto-policy-unknown-unsupported-device.md) along with this policy.
6164
6265
## Sign in to Windows devices
6366

64-
When users attempt to sign in to a site that is protected by an app protection policy for the first time, they're prompted: To access your service, app or website, you may need to sign in to Microsoft Edge using `[email protected]` or register your device with `organization` if you are already signed in.
67+
When users attempt to sign in to a site that is protected by an app protection policy for the first time, they're prompted: To access your service, app or website, you may need to sign in to Microsoft Edge using `[email protected]` or register your device with `organization` if you're already signed in.
6568

6669
Clicking on **Switch Edge profile** opens a window listing their Work or school account along with an option to **Sign in to sync data**.
6770

@@ -70,11 +73,13 @@ Clicking on **Switch Edge profile** opens a window listing their Work or school
7073
This process opens a window offering to allow Windows to remember your account and automatically sign you in to your apps and websites.
7174

7275
> [!CAUTION]
73-
> You must *CLEAR THE CHECKBOX* **Allow my organization to manage my device**. Leaving this checked enrolls your device in mobile device maangment (MDM) not mobile application management (MAM).
76+
> You must *CLEAR THE CHECKBOX* **Allow my organization to manage my device**. Leaving this checked enrolls your device in mobile device maangment (MDM) not mobile application management (MAM).
77+
>
78+
> Don't select **No, sign in to this app only**.
7479
7580
![Screenshot showing the stay signed in to all your apps window. Uncheck the allow my organization to manage my device checkbox.](./media/how-to-app-protection-policy-windows/stay-signed-in-to-all-your-apps.png)
7681

77-
After selecting **OK** you may see a progress window while policy is applied. After a few moments you should see a window saying "you're all set", app protection policies are applied.
82+
After selecting **OK**, you may see a progress window while policy is applied. After a few moments, you should see a window saying "you're all set", app protection policies are applied.
7883

7984
## Troubleshooting
8085

@@ -93,7 +98,7 @@ To resolve these possible scenarios:
9398

9499
### Existing account
95100

96-
If there's a pre-existing, unregistered account, like `[email protected]` in Microsoft Edge, or if a user signs in without registering using the Heads Up Page, then the account isn't properly enrolled in MAM. This configuration blocks the user from being properly enrolled in MAM. This is a known issue that is currently being worked on.
101+
If there's a pre-existing, unregistered account, like `[email protected]` in Microsoft Edge, or if a user signs in without registering using the Heads Up Page, then the account isn't properly enrolled in MAM. This configuration blocks the user from being properly enrolled in MAM. This is a known issue.
97102

98103
## Next steps
99104

articles/active-directory/conditional-access/howto-policy-unknown-unsupported-device.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 07/18/2023
9+
ms.date: 09/05/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,7 +17,9 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Common Conditional Access policy: Block access for unknown or unsupported device platform
1919

20-
Users will be blocked from accessing company resources when the device type is unknown or unsupported.
20+
Users are blocked from accessing company resources when the device type is unknown or unsupported.
21+
22+
The [device platform condition](concept-conditional-access-conditions.md#device-platforms) is based on user agent strings. Conditional Access policies using it should be used with another policy, like one requiring device compliance or app protection policies.
2123

2224
## User exclusions
2325
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
@@ -38,12 +40,15 @@ Users will be blocked from accessing company resources when the device type is u
3840
1. Set **Configure** to **Yes**.
3941
1. Under **Include**, select **Any device**
4042
1. Under **Exclude**, select **Android**, **iOS**, **Windows**, and **macOS**.
43+
> [!NOTE]
44+
> For the exclusion select any platforms that your organization knowingly uses, and leave the others unselected.
4145
1. Select, **Done**.
4246
1. Under **Access controls** > **Grant**, select **Block access**, then select **Select**.
4347
1. Confirm your settings and set **Enable policy** to **Report-only**.
4448
1. Select **Create** to create to enable your policy.
4549

4650
After administrators confirm the settings using [report-only mode](howto-conditional-access-insights-reporting.md), they can move the **Enable policy** toggle from **Report-only** to **On**.
51+
4752
## Next steps
4853

4954
[Conditional Access templates](concept-conditional-access-policy-common.md)

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -708,20 +708,7 @@
708708
- name: Migrate to MSAL.iOS / macOS
709709
href: migrate-objc-adal-msal.md
710710
- name: MSAL Java
711-
items:
712-
- name: Custom token cache serialization
713-
href: msal-java-token-cache-serialization.md
714-
- name: Get and remove accounts from the token cache
715-
href: msal-java-get-remove-accounts-token-cache.md
716-
- name: Migrate to MSAL for Java
717-
href: migrate-adal-msal-java.md
718-
- name: AD FS support in MSAL for Java
719-
href: msal-java-adfs-support.md
720-
- name: Handle errors and exceptions in MSAL for Java
721-
displayName: handling, catch
722-
href: msal-error-handling-java.md
723-
- name: Logging in MSAL for Java
724-
href: msal-logging-java.md
711+
href: /entra/msal/java
725712
- name: MSAL.js
726713
displayName: Angular, JavaScript, Node.js, React
727714
items:
@@ -830,18 +817,7 @@
830817
displayName: persistent, serialize, deserialize
831818
href: msal-node-extensions.md
832819
- name: MSAL Python
833-
items:
834-
- name: Custom token cache serialization
835-
href: msal-python-token-cache-serialization.md
836-
- name: Migrate to MSAL Python
837-
href: migrate-python-adal-msal.md
838-
- name: AD FS support in MSAL Python
839-
href: msal-python-adfs-support.md
840-
- name: Handle errors and exceptions in MSAL for Python
841-
displayName: handling, catch
842-
href: msal-error-handling-python.md
843-
- name: Logging in MSAL for Python
844-
href: msal-logging-python.md
820+
href: /entra/msal/python/
845821
- name: Protocol reference (OAuth, OIDC, SAML)
846822
items:
847823
- name: OAuth 2.0 and OpenID Connect (OIDC)

0 commit comments

Comments
 (0)