Skip to content

Commit e469a28

Browse files
committed
resolve conflict
2 parents 032f1f8 + 0c7f967 commit e469a28

File tree

170 files changed

+2742
-1120
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

170 files changed

+2742
-1120
lines changed

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/13/2020
12+
ms.date: 03/05/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -24,8 +24,8 @@ Azure Active Directory B2C (Azure AD B2C) provides support for the Azure Active
2424

2525
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly `Web.TPEngine.Providers.AzureActiveDirectoryProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null`.
2626

27-
All Azure AD technical profiles include the **AAD-Common** technical profile. The following technical profiles don't specify the protocol because the protocol is configured in the **AAD-Common** technical profile:
28-
27+
Following [custom policy starter pack](custom-policy-get-started.md#custom-policy-starter-pack) Azure AD technical profiles include the **AAD-Common** technical profile. The Azure AD technical profiles don't specify the protocol because the protocol is configured in the **AAD-Common** technical profile:
28+
2929
- **AAD-UserReadUsingAlternativeSecurityId** and **AAD-UserReadUsingAlternativeSecurityId-NoError** - Look up a social account in the directory.
3030
- **AAD-UserWriteUsingAlternativeSecurityId** - Create a new social account.
3131
- **AAD-UserReadUsingEmailAddress** - Look up a local account in the directory.

articles/active-directory-b2c/claimsschema.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 02/24/2020
11+
ms.date: 03/05/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -52,9 +52,12 @@ The **ClaimType** element contains the following elements:
5252
| Mask | 0:1 | An optional string of masking characters that can be applied when displaying the claim. For example, the phone number 324-232-4343 can be masked as XXX-XXX-4343. |
5353
| UserHelpText | 0:1 | A description of the claim type that can be helpful for users to understand its purpose. The value can be [localized](localization.md). |
5454
| UserInputType | 0:1 | The type of input control that should be available to the user when manually entering the claim data for the claim type. See the user input types defined later in this page. |
55+
| AdminHelpText | 0:1 | A description of the claim type that can be helpful for administrators to understand its purpose. |
5556
| Restriction | 0:1 | The value restrictions for this claim, such as a regular expression (Regex) or a list of acceptable values. The value can be [localized](localization.md). |
5657
PredicateValidationReference| 0:1 | A reference to a **PredicateValidationsInput** element. The **PredicateValidationReference** elements enable you to perform a validation process to ensure that only properly formed data is entered. For more information, see [Predicates](predicates.md). |
5758

59+
60+
5861
### DataType
5962

6063
The **DataType** element supports the following values:

articles/active-directory-b2c/code-samples.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,5 +42,4 @@ The following tables provide links to samples for applications including iOS, An
4242

4343
| Sample | Description |
4444
|--------| ----------- |
45-
| [javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp) | A single page application (SPA) calling a Web API. Authentication is done with Azure AD B2C by leveraging MSAL.js. |
46-
| [javascript-hellojs-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-hellojs-singlepageapp) | A single page app, implemented with an ASP.NET Web API backend, that signs up & signs in users using Azure AD B2C and calls the web API using OAuth 2.0 access tokens. |
45+
| [javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp) | A single page application (SPA) calling a Web API. Authentication is done with Azure AD B2C by using MSAL.js. |

articles/active-directory-b2c/implicit-flow-single-page-application.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -239,12 +239,12 @@ GET https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/
239239
240240
## Next steps
241241

242-
### Code sample: hello.js with Azure AD B2C
242+
### Code sample: Azure AD B2C with Microsoft Authentication Library for JavaScript
243243

244-
[Single-page application built on hello.js with Azure AD B2C][github-hello-js-example] (GitHub)
244+
[Single-page application built with msal.js for Azure AD B2C][github-msal-js-example] (GitHub)
245245

246-
This sample on GitHub is intended to help get you started with Azure AD B2C in a simple web application built on [hello.js][github-hello-js] and using pop-up-style authentication.
246+
This sample on GitHub is intended to help get you started to Azure AD B2C in a simple web application built with [msal.js][github-msal-js] and using pop-up-style authentication.
247247

248248
<!-- Links - EXTERNAL -->
249-
[github-hello-js-example]: https://github.com/Azure-Samples/active-directory-b2c-javascript-hellojs-singlepageapp
250-
[github-hello-js]: https://github.com/MrSwitch/hello.js
249+
[github-msal-js-example]: https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp
250+
[github-msal-js]: https://github.com/AzureAD/microsoft-authentication-library-for-js

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/13/2020
12+
ms.date: 03/05/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -73,9 +73,11 @@ The technical profile also returns claims that aren't returned by the identity p
7373
| Attribute | Required | Description |
7474
| --------- | -------- | ----------- |
7575
| client_id | Yes | The application identifier of the identity provider. |
76-
| IdTokenAudience | No | The audience of the id_token. If specified, Azure AD B2C checks whether the token is in a claim returned by the identity provider and is equal to the one specified. |
77-
| METADATA | Yes | A URL that points to a JSON configuration document formatted according to the OpenID Connect Discovery specification, which is also known as a well-known openid configuration endpoint. |
78-
| ProviderName | No | The name of the identity provider. |
76+
| IdTokenAudience | No | The audience of the id_token. If specified, Azure AD B2C checks whether the `aud` claim in a token returned by the identity provider is equal to the one specified in the IdTokenAudience metadata. |
77+
| METADATA | Yes | A URL that points to an OpenID Connect identity provider configuration document, which is also known as OpenID well-known configuration endpoint. The URL can contain the `{tenant}` expression, which is replaced with the tenant name. |
78+
| authorization_endpoint | No | A URL that points to an OpenID Connect identity provider configuration authorization endpoint. The value of authorization_endpoint metadata takes precedence over the `authorization_endpoint` specified in the OpenID well-known configuration endpoint. The URL can contain the `{tenant}` expression, which is replaced with the tenant name. |
79+
| issuer | No | The unique identifier of an OpenID Connect identity provider. The value of issuer metadata takes precedence over the `issuer` specified in the OpenID well-known configuration endpoint. If specified, Azure AD B2C checks whether the `iss` claim in a token returned by the identity provider is equal to the one specified in the issuer metadata. |
80+
| ProviderName | No | The name of the identity provider. |
7981
| response_types | No | The response type according to the OpenID Connect Core 1.0 specification. Possible values: `id_token`, `code`, or `token`. |
8082
| response_mode | No | The method that the identity provider uses to send the result back to Azure AD B2C. Possible values: `query`, `form_post` (default), or `fragment`. |
8183
| scope | No | The scope of the request that is defined according to the OpenID Connect Core 1.0 specification. Such as `openid`, `profile`, and `email`. |

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/17/2020
12+
ms.date: 03/05/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -97,7 +97,7 @@ The **TechnicalProfile** contains the following elements:
9797
| SubjectNamingInfo | 0:1 | Controls the production of the subject name in tokens where the subject name is specified separately from claims. For example, OAuth or SAML. |
9898
| IncludeInSso | 0:1 | Whether usage of this technical profile should apply single sign-on (SSO) behavior for the session, or instead require explicit interaction. This element is valid only in SelfAsserted profiles used within a Validation technical profile. Possible values: `true` (default), or `false`. |
9999
| IncludeClaimsFromTechnicalProfile | 0:1 | An identifier of a technical profile from which you want all of the input and output claims to be added to this technical profile. The referenced technical profile must be defined in the same policy file. |
100-
| IncludeTechnicalProfile |0:1 | An identifier of a technical profile from which you want all data to be added to this technical profile. The referenced technical profile must exist in the same policy file. |
100+
| IncludeTechnicalProfile |0:1 | An identifier of a technical profile from which you want all data to be added to this technical profile. |
101101
| UseTechnicalProfileForSessionManagement | 0:1 | A different technical profile to be used for session management. |
102102
|EnabledForUserJourneys| 0:1 |Controls if the technical profile is executed in a user journey. |
103103

@@ -282,7 +282,7 @@ The **IncludeTechnicalProfile** element contains the following attribute:
282282

283283
| Attribute | Required | Description |
284284
| --------- | -------- | ----------- |
285-
| ReferenceId | Yes | An identifier of a technical profile already defined in the policy file or parent policy file. |
285+
| ReferenceId | Yes | An identifier of a technical profile already defined in the policy file, or parent policy file. |
286286

287287
## UseTechnicalProfileForSessionManagement
288288

articles/active-directory-domain-services/tutorial-configure-password-hash-sync.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,8 @@ With Azure AD Connect installed and configured to synchronize with Azure AD, now
7777
# Define the Azure AD Connect connector names and import the required PowerShell module
7878
$azureadConnector = "<CASE SENSITIVE AZURE AD CONNECTOR NAME>"
7979
$adConnector = "<CASE SENSITIVE AD DS CONNECTOR NAME>"
80+
81+
Import-Module "C:\Program Files\Microsoft Azure AD Sync\Bin\ADSync\ADSync.psd1"
8082
Import-Module "C:\Program Files\Microsoft Azure Active Directory Connect\AdSyncConfig\AdSyncConfig.psm1"
8183
8284
# Create a new ForceFullPasswordSync configuration parameter object then

articles/active-directory/azuread-dev/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -155,17 +155,17 @@
155155
href: active-directory-acs-migration.md
156156
- name: Reactivate disabled Access Control Service namespaces
157157
href: howto-reactivate-disabled-acs-namespaces.md
158-
- name: Use the Azure AD Graph API
159-
href: ../develop/active-directory-graph-api-quickstart.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
158+
- name: Use the Microsoft Graph API
159+
href: ../develop/microsoft-graph-intro.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
160160
- name: AD FS for developers
161161
href: https://docs.microsoft.com/windows-server/identity/ad-fs/overview/ad-fs-scenarios-for-developers
162162
- name: References
163163
items:
164164
- name: Authentication libraries
165165
displayName: ADAL
166166
href: active-directory-authentication-libraries.md
167-
- name: Azure AD Graph API
168-
href: ../develop/active-directory-graph-api.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
167+
- name: Microsoft Graph API
168+
href: ../develop/microsoft-graph-intro.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
169169
- name: Application manifest
170170
href: ../develop/reference-app-manifest.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
171171
- name: Authentication and authorization error codes

articles/active-directory/azuread-dev/active-directory-acs-migration.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -64,13 +64,13 @@ Follow the steps in this section to find out which of your apps will be impacted
6464
### Download and install ACS PowerShell
6565

6666
1. Go to the PowerShell Gallery and download [Acs.Namespaces](https://www.powershellgallery.com/packages/Acs.Namespaces/1.0.2).
67-
1. Install the module by running
67+
2. Install the module by running
6868

6969
```powershell
7070
Install-Module -Name Acs.Namespaces
7171
```
7272
73-
1. Get a list of all possible commands by running
73+
3. Get a list of all possible commands by running
7474
7575
```powershell
7676
Get-Command -Module Acs.Namespaces
@@ -90,17 +90,17 @@ Follow the steps in this section to find out which of your apps will be impacted
9090
9191
You may need to run `Set-ExecutionPolicy -ExecutionPolicy Bypass` before you can execute commands and be the admin of those subscriptions in order to execute the commands.
9292
93-
1. List your available Azure subscriptions using the **Get-AcsSubscription** cmdlet.
94-
1. List your ACS namespaces using the **Get-AcsNamespace** cmdlet.
93+
2. List your available Azure subscriptions using the **Get-AcsSubscription** cmdlet.
94+
3. List your ACS namespaces using the **Get-AcsNamespace** cmdlet.
9595
9696
### Check which applications will be impacted
9797
9898
1. Use the namespace from the previous step and go to `https://<namespace>.accesscontrol.windows.net`
9999
100100
For example, if one of the namespaces is contoso-test, go to `https://contoso-test.accesscontrol.windows.net`
101101
102-
1. Under **Trust relationships**, select **Relying party applications** to see the list of apps that will be impacted by ACS retirement.
103-
1. Repeat steps 1-2 for any other ACS namespace(s) that you have.
102+
2. Under **Trust relationships**, select **Relying party applications** to see the list of apps that will be impacted by ACS retirement.
103+
3. Repeat steps 1-2 for any other ACS namespace(s) that you have.
104104
105105
## Retirement schedule
106106
@@ -206,7 +206,7 @@ At a high level, *Azure Active Directory is probably the best choice for your mi
206206
| Upload custom token-signing certificates | Supported | Supported |
207207
| Customize claims in tokens |- Pass through input claims from identity providers<br />- Get access token from identity provider as a claim<br />- Issue output claims based on values of input claims<br />- Issue output claims with constant values |- Cannot pass through claims from federated identity providers<br />- Cannot get access token from identity provider as a claim<br />- Cannot issue output claims based on values of input claims<br />- Can issue output claims with constant values<br />- Can issue output claims based on properties of users synced to Azure AD |
208208
| **Automation** | | |
209-
| Automate configuration and management tasks | Supported via Access Control Management Service | Supported via Microsoft Graph and Azure AD Graph API |
209+
| Automate configuration and management tasks | Supported via Access Control Management Service | Supported using the Microsoft Graph API |
210210
211211
If you decide that Azure AD is the best migration path for your applications and services, you should be aware of two ways to integrate your app with Azure AD.
212212
@@ -257,7 +257,7 @@ The following table compares the features of Access Control that are relevant to
257257
| Upload custom token-signing certificates | Supported | Custom signing keys, not certificates, supported via custom policies |
258258
| Customize claims in tokens |- Pass through input claims from identity providers<br />- Get access token from identity provider as a claim<br />- Issue output claims based on values of input claims<br />- Issue output claims with constant values |- Can pass through claims from identity providers; custom policies required for some claims<br />- Cannot get access token from identity provider as a claim<br />- Can issue output claims based on values of input claims via custom policies<br />- Can issue output claims with constant values via custom policies |
259259
| **Automation** | | |
260-
| Automate configuration and management tasks | Supported via Access Control Management Service |- Creation of users allowed via Azure AD Graph API<br />- Cannot create B2C tenants, applications, or policies programmatically |
260+
| Automate configuration and management tasks | Supported via Access Control Management Service |- Creation of users allowed using the Microsoft Graph API<br />- Cannot create B2C tenants, applications, or policies programmatically |
261261
262262
If you decide that Azure AD B2C is the best migration path for your applications and services, begin with the following resources:
263263
@@ -321,7 +321,7 @@ You can also use Azure AD for server-to-server authentication by using the Azure
321321
| Client authentication methods |- Simple password<br />- Signed SWT<br />- SAML token from a federated identity provider |- Simple password<br />- Signed JWT |
322322
| Token formats |- JWT<br />- SAML 1.1<br />- SAML 2.0<br />- SWT<br /> | JWT only |
323323
| Token transformation |- Add custom claims<br />- Simple if-then claim issuance logic | Add custom claims |
324-
| Automate configuration and management tasks | Supported via Access Control Management Service | Supported via Microsoft Graph and Azure AD Graph API |
324+
| Automate configuration and management tasks | Supported via Access Control Management Service | Supported using the Microsoft Graph API |
325325
326326
For guidance about implementing server-to-server scenarios, see the following resources:
327327

articles/active-directory/azuread-dev/azure-ad-endpoint-comparison.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ When developing a new application, it's important to know the differences betwee
3030
* The Microsoft identity platform endpoint allows work and school accounts from Azure AD and personal Microsoft accounts (MSA), such as hotmail.com, outlook.com, and msn.com, to sign in.
3131
* Both endpoints also accept sign-ins of *[guest users](https://docs.microsoft.com/azure/active-directory/b2b/what-is-b2b)* of an Azure AD directory for applications configured as *[single-tenant](../develop/single-and-multi-tenant-apps.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json)* or for *multi-tenant* applications configured to point to the tenant-specific endpoint (`https://login.microsoftonline.com/{TenantId_or_Name}`).
3232

33-
The Microsoft identity platform endpoint allows you to write apps that accept sign-ins from personal Microsoft accounts, and work and school accounts. This gives you the ability to write your app completely account-agnostic. For example, if your app calls the [Microsoft Graph](https://graph.microsoft.io), some additional functionality and data will be available to work accounts, such as their SharePoint sites or directory data. But for many actions, such as [Reading a user's mail](https://developer.microsoft.com/graph/docs/api-reference/v1.0/api/user_list_messages), the same code can access the email for both personal and work and school accounts.
33+
The Microsoft identity platform endpoint allows you to write apps that accept sign-ins from personal Microsoft accounts, and work and school accounts. This gives you the ability to write your app completely account-agnostic. For example, if your app calls the [Microsoft Graph](https://graph.microsoft.io), some additional functionality and data will be available to work accounts, such as their SharePoint sites or directory data. But for many actions, such as [Reading a user's mail](https://docs.microsoft.com/graph/api/user-list-messages?view=graph-rest-1.0), the same code can access the email for both personal and work and school accounts.
3434

3535
For Microsoft identity platform endpoint, you can use the Microsoft Authentication Library (MSAL) to gain access to the consumer, educational, and enterprise worlds. The Azure AD v1.0 endpoint accepts sign-ins from work and school accounts only.
3636

@@ -66,7 +66,7 @@ For the v1.0 endpoint, an OAuth 2.0 authorize request to Azure AD might have loo
6666
```text
6767
GET https://login.microsoftonline.com/common/oauth2/authorize?
6868
client_id=2d4d11a2-f814-46a7-890a-274a72a7309e
69-
&resource=https://graph.windows.net/
69+
&resource=https://graph.microsoft.com/
7070
...
7171
```
7272

@@ -77,7 +77,7 @@ For applications using the Microsoft identity platform endpoint, the same OAuth
7777
```text
7878
GET https://login.microsoftonline.com/common/oauth2/v2.0/authorize?
7979
client_id=2d4d11a2-f814-46a7-890a-274a72a7309e
80-
&scope=https://graph.windows.net/directory.read%20https://graph.windows.net/directory.write
80+
&scope=https://graph.microsoft.com/directory.read%20https://graph.microsoft.com/directory.write
8181
...
8282
```
8383

0 commit comments

Comments
 (0)