Skip to content

Commit e3a599b

Browse files
committed
resolving merge conflicts
2 parents 18b2c20 + f4ea45f commit e3a599b

File tree

808 files changed

+4268
-2987
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

808 files changed

+4268
-2987
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1942,11 +1942,6 @@
19421942
"redirect_url": "/azure/cosmos-db/sql-api-get-started",
19431943
"redirect_document_id": false
19441944
},
1945-
{
1946-
"source_path": "articles/search/search-traffic-analytics.md",
1947-
"redirect_url": "/azure/search/search-monitor-usage",
1948-
"redirect_document_id": false
1949-
},
19501945
{
19511946
"source_path": "articles/search/knowledge-store-howto.md",
19521947
"redirect_url": "/azure/search/knowledge-store-create-rest",
@@ -34106,6 +34101,21 @@
3410634101
"redirect_url": "/azure/active-directory-b2c/tutorial-create-tenant",
3410734102
"redirect_document_id": false
3410834103
},
34104+
{
34105+
"source_path": "articles/active-directory/authentication/concept-mfa-get-started.md",
34106+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-mfa-get-started",
34107+
"redirect_document_id": true
34108+
},
34109+
{
34110+
"source_path": "articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md",
34111+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication",
34112+
"redirect_document_id": true
34113+
},
34114+
{
34115+
"source_path": "articles/active-directory/conditional-access/concept-conditional-access-security-defaults.md",
34116+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
34117+
"redirect_document_id": true
34118+
},
3410934119
{
3411034120
"source_path": "articles/multi-factor-authentication/end-user/multi-factor-authentication-end-user-app-passwords.experimental.md",
3411134121
"redirect_url": "/azure/active-directory/user-help/multi-factor-authentication-end-user-app-passwords",

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -360,6 +360,5 @@ By using `B2CGraphClient`, you have a service application that can manage your B
360360
As you incorporate this functionality into your own application, remember a few key points for B2C applications:
361361

362362
* Grant the application the required permissions in the tenant.
363-
* For now, you need to use ADAL (not MSAL) to get access tokens. (You can also send protocol messages directly, without using a library.)
364363
* When you call the Graph API, use `api-version=1.6`.
365364
* When you create and update consumer users, a few properties are required, as described above.

articles/active-directory-b2c/b2clogin.md

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Set redirect URLs to b2clogin.com - Azure Active Directory B2C
2+
title: Migrate applications and APIs to b2clogin.com - Azure AD B2C
33
description: Learn about using b2clogin.com in your redirect URLs for Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 08/17/2019
11+
ms.date: 12/04/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -17,6 +17,16 @@ ms.subservice: B2C
1717

1818
When you set up an identity provider for sign-up and sign-in in your Azure Active Directory B2C (Azure AD B2C) application, you need to specify a redirect URL. You should no longer reference *login.microsoftonline.com* in your applications and APIs. Instead, use *b2clogin.com* for all new applications, and migrate existing applications from *login.microsoftonline.com* to *b2clogin.com*.
1919

20+
## Deprecation of login.microsoftonline.com
21+
22+
On 04 December 2019, we announced the scheduled retirement of login.microsoftonline.com support in Azure AD B2C on **04 December 2020**:
23+
24+
[Azure Active Directory B2C is deprecating login.microsoftonline.com](https://azure.microsoft.com/updates/b2c-deprecate-msol/)
25+
26+
The deprecation of login.microsoftonline.com goes into effect for all Azure AD B2C tenants on 04 December 2020, providing existing tenants one (1) year to migrate to b2clogin.com. New tenants created after 04 December 2019 will not accept requests from login.microsoftonline.com. All functionality remains the same on the b2clogin.com endpoint.
27+
28+
The deprecation of login.microsoftonline.com does not impact Azure Active Directory tenants. Only Azure Active Directory B2C tenants are affected by this change.
29+
2030
## Benefits of b2clogin.com
2131

2232
When you use *b2clogin.com* as your redirect URL:
@@ -68,6 +78,10 @@ For example, the authority endpoint for Contoso's sign-up/sign-in policy would n
6878
https://contosob2c.b2clogin.com/00000000-0000-0000-0000-000000000000/B2C_1_signupsignin1
6979
```
7080

81+
For information about migrating OWIN-based web applications to b2clogin.com, see [Migrate an OWIN-based web API to b2clogin.com](multiple-token-endpoints.md).
82+
83+
For migrating Azure API Management APIs protected by Azure AD B2C, see the [Migrate to b2clogin.com](secure-api-management.md#migrate-to-b2clogincom) section of [Secure an Azure API Management API with Azure AD B2C](secure-api-management.md).
84+
7185
## Microsoft Authentication Library (MSAL)
7286

7387
### ValidateAuthority property
@@ -92,6 +106,12 @@ this.clientApplication = new UserAgentApplication(
92106
);
93107
```
94108

109+
## Next steps
110+
111+
For information about migrating OWIN-based web applications to b2clogin.com, see [Migrate an OWIN-based web API to b2clogin.com](multiple-token-endpoints.md).
112+
113+
For migrating Azure API Management APIs protected by Azure AD B2C, see the [Migrate to b2clogin.com](secure-api-management.md#migrate-to-b2clogincom) section of [Secure an Azure API Management API with Azure AD B2C](secure-api-management.md).
114+
95115
<!-- LINKS - External -->
96116
[msal-dotnet]: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet
97117
[msal-dotnet-b2c]: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/AAD-B2C-specifics

articles/active-directory/authentication/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,6 @@
4343
items:
4444
- name: How MFA works
4545
href: concept-mfa-howitworks.md
46-
- name: Enable MFA
47-
href: concept-mfa-get-started.md
4846
- name: License your users
4947
href: concept-mfa-licensing.md
5048
- name: Manage an Auth Provider

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,10 @@ User accounts in Azure Multi-Factor Authentication have the following three dist
4949

5050
A user's state reflects whether an admin has enrolled them in Azure MFA, and whether they completed the registration process.
5151

52-
All users start out *Disabled*. When you enroll users in Azure MFA, their state changes to *Enabled*. When enabled users sign in and complete the registration process, their state changes to *Enforced*.
52+
All users start out *Disabled*. When you enroll users in Azure MFA, their state changes to *Enabled*. When enabled users sign in and complete the registration process, their state changes to *Enforced*.
53+
54+
> [!NOTE]
55+
> If MFA is re-enabled on a user object that already has registration details, such as phone or email, then administrators need to have that user re-register MFA via Azure portal or PowerShell. If the user doesn't re-register, their MFA state doesn't transition from *Enabled* to *Enforced* in MFA management UI.
5356
5457
### View the status for a user
5558

@@ -176,6 +179,8 @@ Get-MsolUser -All | Set-MfaState -State Disabled
176179

177180
> [!NOTE]
178181
> We recently changed the behavior and PowerShell script above accordingly. Previously, the script saved off the MFA methods, disabled MFA, and restored the methods. This is no longer necessary now that the default behavior for disable doesn't clear the methods.
182+
>
183+
> If MFA is re-enabled on a user object that already has registration details, such as phone or email, then administrators need to have that user re-register MFA via Azure portal or PowerShell. If the user doesn't re-register, their MFA state doesn't transition from *Enabled* to *Enforced* in MFA management UI.
179184
180185
## Next steps
181186

articles/active-directory/cloud-provisioning/what-is-cloud-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ With Azure AD Connect cloud provisioning, provisioning from AD to Azure AD is or
2929

3030
The following table provides a comparison between Azure AD Connect and Azure AD Connect cloud provisioning:
3131

32-
| Feature | Azure Active Directory Connect synch| Azure Active Directory Connect cloud provisioning |
32+
| Feature | Azure Active Directory Connect sync| Azure Active Directory Connect cloud provisioning |
3333
|:--- |:---:|:---:|
3434
|Connect to single on-premises AD forest|||
3535
| Connect to multiple on-premises AD forests |||

articles/active-directory/conditional-access/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,6 @@
1717
items:
1818
- name: Common Conditional Access policies
1919
href: concept-conditional-access-policy-common.md
20-
- name: Security defaults
21-
href: concept-conditional-access-security-defaults.md
2220
- name: Conditional Access policy components
2321
href: concept-conditional-access-policies.md
2422
- name: Conditions

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Customize claims for an Azure AD tenant app (Public Preview)
2+
title: Customize claims for Azure AD tenant apps
33
titleSuffix: Microsoft identity platform
44
description: This page describes Azure Active Directory claims mapping.
55
services: active-directory

articles/active-directory/develop/active-directory-configurable-token-lifetimes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configurable token lifetimes in Azure Active Directory
2+
title: Configurable Azure AD token lifetimes
33
titleSuffix: Microsoft identity platform
44
description: Learn how to set lifetimes for tokens issued by Azure AD.
55
services: active-directory

articles/active-directory/develop/active-directory-enterprise-app-role-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure the role claim for enterprise applications in Azure AD
2+
title: Configure role claim for enterprise Azure AD apps | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn how to configure the role claim issued in the SAML token for enterprise applications in Azure Active Directory
55
services: active-directory

0 commit comments

Comments
 (0)