Skip to content

Commit e6f32ae

Browse files
committed
Merge branch 'main' into release-rebrand-cdn-edgio
2 parents c2c78dd + db89c57 commit e6f32ae

File tree

325 files changed

+3260
-2521
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

325 files changed

+3260
-2521
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1091,6 +1091,7 @@
10911091
"articles/azure-video-indexer/.openpublishing.redirection.azure-video-indexer.json",
10921092
"articles/cloud-shell/.openpublishing.redirection.cloud-shell.json",
10931093
"articles/communication-services/.openpublishing.redirection.communication-services.json",
1094+
"articles/communications-gateway/.openpublishing.redirection.communications-gateway.json",
10941095
"articles/confidential-computing/.openpublishing.redirection.json",
10951096
"articles/container-apps/.openpublishing.redirection.container-apps.json",
10961097
"articles/cosmos-db/.openpublishing.redirection.cosmos-db.json",

.openpublishing.redirection.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23792,11 +23792,6 @@
2379223792
"redirect_url": "/azure/private-5g-core/monitor-private-5g-core-with-platform-metrics",
2379323793
"redirect_document_id": false
2379423794
},
23795-
{
23796-
"source_path": "articles/communications-gateway/rotate-secrets.md",
23797-
"redirect_URL": "/azure/communications-gateway/whats-new",
23798-
"redirect_document_id": false
23799-
},
2380023795
{
2380123796
"source_path": "articles/batch/high-availability-disaster-recovery.md",
2380223797
"redirect_URL": "/azure/reliability/reliability-batch",
@@ -24266,6 +24261,11 @@
2426624261
"source_path_from_root": "/articles/reliability/reliability-postgre-flexible.md",
2426724262
"redirect_url": "/azure/reliability/reliability-postgresql-flexible-server",
2426824263
"redirect_document_id": false
24264+
},
24265+
{
24266+
"source_path_from_root": "/articles/private-link/tutorial-private-endpoint-cosmosdb-portal.md",
24267+
"redirect_url": "/azure/cosmos-db/how-to-configure-private-endpoints",
24268+
"redirect_document_id": false
2426924269
}
2427024270
]
2427124271
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,11 @@
194194
"source_path_from_root": "/articles/virtual-desktop/app-attach-glossary.md",
195195
"redirect_url": "/azure/virtual-desktop/what-is-app-attach",
196196
"redirect_document_id": false
197+
},
198+
{
199+
"source_path_from_root": "/articles/virtual-desktop/windows-10-multisession-faq.yml",
200+
"redirect_url": "/azure/virtual-desktop/windows-multisession-faq",
201+
"redirect_document_id": true
197202
}
198203
]
199204
}

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/05/2023
9+
ms.date: 08/29/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -58,7 +58,7 @@ Install the Microsoft.Graph.Identity.Signins PowerShell module using the followi
5858

5959
```powershell
6060
Install-module Microsoft.Graph.Identity.Signins
61-
Connect-MgGraph -Scopes UserAuthenticationMethod.ReadWrite.All
61+
Connect-MgGraph -Scopes "User.Read.all","UserAuthenticationMethod.Read.All","UserAuthenticationMethod.ReadWrite.All"
6262
Select-MgProfile -Name beta
6363
```
6464

articles/active-directory/develop/authentication-national-cloud.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Including the global Azure cloud, Azure Active Directory (Azure AD) is deplo
2525
- Microsoft Azure operated by 21Vianet
2626
- Azure Germany ([Closed on October 29, 2021](https://www.microsoft.com/cloud-platform/germany-cloud-regions)). Learn more about [Azure Germany migration](#azure-germany-microsoft-cloud-deutschland).
2727

28-
The individual national clouds and the global Azure cloud are cloud _instances_. Each cloud instance is separate from the others and has its own environment and _endpoints_. Cloud-specific endpoints include OAuth 2.0 access token and OpenID Connect ID token request endpoints, and URLs for app management and deployment, like the Azure portal.
28+
The individual national clouds and the global Azure cloud are cloud _instances_. Each cloud instance is separate from the others and has its own environment and _endpoints_. Cloud-specific endpoints include OAuth 2.0 access token and OpenID Connect ID token request endpoints, and URLs for app management and deployment.
2929

3030
As you develop your apps, use the endpoints for the cloud instance where you'll deploy the application.
3131

@@ -43,13 +43,13 @@ The following table lists the base URLs for the Azure AD endpoints used to regis
4343

4444
## Application endpoints
4545

46-
You can find the authentication endpoints for your application in the Azure portal.
46+
You can find the authentication endpoints for your application.
4747

48-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
49-
1. Select **Azure Active Directory**.
50-
1. Under **Manage**, select **App registrations**, and then select **Endpoints** in the top menu.
48+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
49+
1. Browse to **Identity** > **Applications** > **Application registrations**.
50+
1. Select **Endpoints** in the top menu.
5151

52-
The **Endpoints** page is displayed showing the authentication endpoints for the application registered in your Azure AD tenant.
52+
The **Endpoints** page is displayed showing the authentication endpoints for the application.
5353

5454
Use the endpoint that matches the authentication protocol you're using in conjunction with the **Application (client) ID** to craft the authentication request specific to your application.
5555

articles/active-directory/develop/custom-extension-configure-saml-app.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Source claims from an external store (SAML app)
33
titleSuffix: Microsoft identity platform
44
description: Use a custom claims provider to augment tokens with claims from an external identity system. Configure a SAML app to receive tokens with external claims.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -40,9 +40,11 @@ The following steps are for registering a demo [XRayClaims](https://adfshelp.mic
4040

4141
Add a new, non-gallery SAML application in your tenant:
4242

43-
1. Sign in to the [Azure portal](https://portal.azure.com).
43+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
4444

45-
1. Go to **Azure Active Directory** and then **Enterprise applications**. Select **New application** and then **Create your own application**.
45+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
46+
47+
1. Select **New application** and then **Create your own application**.
4648

4749
1. Add a name for the app. For example, **AzureADClaimsXRay**. Select the **Integrate any other application you don't find in the gallery (Non-gallery)** option and select **Create**.
4850

articles/active-directory/develop/custom-extension-get-started.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Get started with custom claims providers (preview)
33
titleSuffix: Microsoft identity platform
44
description: Learn how to develop and register an Azure Active Directory custom authentication extensions REST API. The custom authentication extension allows you to source claims from a data store that is external to Azure Active Directory.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -157,14 +157,11 @@ The following screenshot demonstrates how to configure the Azure HTTP trigger fu
157157

158158
In this step, you configure a custom authentication extension, which will be used by Azure AD to call your Azure function. The custom authentication extension contains information about your REST API endpoint, the claims that it parses from your REST API, and how to authenticate to your REST API. Follow these steps to register a custom authentication extension:
159159

160-
# [Azure portal](#tab/azure-portal)
160+
# [Microsoft Entra admin center](#tab/entra-admin-center)
161161

162-
1. Sign in to the [Azure portal](https://portal.azure.com).
163-
1. Under **Azure services**, select **Azure Active Directory**.
164-
1. Ensure your user account has the Global Administrator or Application Administrator and Authentication Extensibility Administrator role. Otherwise, learn how to [assign a role](../roles/manage-roles-portal.md).
165-
1. From the menu, select **Enterprise applications**.
166-
1. Under **Manage**, select the **Custom authentication extensions**.
167-
1. Select **Create a custom authentication extension**.
162+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-developer) and [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
163+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
164+
1. Select **Custom authentication extensions**, and then select **Create a custom authentication extension**.
168165
1. In **Basics**, select the **tokenIssuanceStart** event and select **Next**.
169166
1. In **Endpoint Configuration**, fill in the following properties:
170167

@@ -361,8 +358,9 @@ Follow these steps to register the **jwt.ms** web application:
361358

362359
### 3.1 Register a test web application
363360

364-
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Active Directory**.
365-
1. Select **App registrations**, and then select **New registration**.
361+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-developer).
362+
1. Browse to **Identity** > **Applications** > **Application registrations**.
363+
1. Select **New registration**.
366364
1. Enter a **Name** for the application. For example, **My Test application**.
367365
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
368366
1. In the **Select a platform** dropdown in **Redirect URI**, select **Web** and then enter `https://jwt.ms` in the URL text box.
@@ -414,12 +412,12 @@ For tokens to be issued with claims incoming from the custom authentication exte
414412

415413
Follow these steps to connect the *My Test application* with your custom authentication extension:
416414

417-
# [Azure portal](#tab/azure-portal)
415+
# [Microsoft Entra admin center](#tab/entra-admin-center)
418416

419417
First assign the custom authentication extension as a custom claims provider source:
420418

421-
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Active Directory**.
422-
1. Select **App registrations**, and find the *My Test application* registration you created.
419+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-administrator).
420+
1. Browse to **Identity** > **Applications** > **Application registrations**.
423421
1. In the **Overview** page, under **Managed application in local directory**, select **My Test application**.
424422
1. Under **Manage**, select **Single sign-on**.
425423
1. Under **Attributes & Claims**, select **Edit**.
@@ -630,7 +628,7 @@ If you configured the [Microsoft identity provider](#step-5-protect-your-azure-f
630628

631629
1. Under the **App registration**, enter the application ID (client ID) of the *Azure Functions authentication events API* app registration [you created previously](#step-2-register-a-custom-authentication-extension).
632630

633-
1. Go to your Azure AD tenant in which your custom authentication extension is registered, and select **Azure Active Directory** > **App registrations**.
631+
1. In the Microsoft Entra admin center:
634632
1. Select the *Azure Functions authentication events API* app registration [you created previously](#step-2-register-a-custom-authentication-extension).
635633
1. Select **Certificates & secrets** > **Client secrets** > **New client secret**.
636634
1. Add a description for your client secret.

articles/active-directory/develop/custom-extension-troubleshoot.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot a custom claims provider
33
titleSuffix: Microsoft identity platform
44
description: Troubleshoot and monitor your custom claims provider API. Learn how to use logging and Azure AD sign-in logs to find errors and issues in your custom claims provider API.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -44,9 +44,9 @@ Azure AD sign-in logs also integrate with [Azure Monitor](../../azure-monitor/in
4444

4545
To access the Azure AD sign-in logs:
4646

47-
1. Sign in to the [Azure portal](https://portal.azure.com).
48-
1. In the **Enterprise apps** experience for your given application, select on the **Sign-in** logs tab.
49-
1. Select the latest sign-in log.
47+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
48+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
49+
1. Select **Sign-in logs**, and then select the latest sign-in log.
5050
1. For more details, select the **Authentication Events** tab. Information related to the custom authentication extension REST API call is displayed, including any [error codes](#error-codes-reference).
5151

5252
:::image type="content" source="media/custom-extension-troubleshoot/authentication-events.png" alt-text="Screenshot that shows the authentication events information." :::
@@ -89,8 +89,8 @@ Use the following table to diagnose an error code.
8989

9090
Your REST API is protected by Azure AD access token. You can test your API by obtaining an access token with the [application registration](custom-extension-get-started.md#22-grant-admin-consent) associated with the custom authentiction extensions. After you acquire an access token, pass it the HTTP `Authorization` header. To obtain an access token, follow these steps:
9191

92-
1. Sign in to the [Azure portal](https://portal.azure.com) with your Azure administrator account.
93-
1. Select **Azure Active Directory** > **App registrations**.
92+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
93+
1. Browse to **Identity** > **Applications** > **Application registrations**.
9494
1. Select the *Azure Functions authentication events API* app registration [you created previously](custom-extension-get-started.md#step-2-register-a-custom-authentication-extension).
9595
1. Copy the [application ID](custom-extension-get-started.md#22-grant-admin-consent).
9696
1. If you haven't created an app secret, follow these steps:

articles/active-directory/develop/developer-support-help-options.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ If you need an answer to a question or help in solving a problem not covered in
2323
<img alt='Azure support' src='./media/common/logo_azure.svg'>
2424
</div>
2525

26-
Explore the range of [Azure support options and choose the plan](https://azure.microsoft.com/support/plans) that best fits you. There are two options to create and manage support requests in the Azure portal:
26+
Explore the range of [Azure support options and choose the plan](https://azure.microsoft.com/support/plans) that best fits you. There are two options to create and manage support requests in the Microsoft Entra admin center:
2727

28-
- If you already have an Azure Support Plan, [open a support request here](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest).
28+
- If you already have an Azure Support Plan, [open a support request here](https://entra.microsoft.com/#view/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical).
2929

30-
- If you're using Azure AD for customers (preview), the support request feature is currently unavailable in customer tenants. However, you can use the **Give Feedback** link on the **New support request** page to provide feedback. Or, you can switch to your Azure AD workforce tenant and [open a support request](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest).
30+
- If you're using Azure AD for customers (preview), the support request feature is currently unavailable in customer tenants. However, you can use the **Give Feedback** link on the **New support request** page to provide feedback. Or, you can switch to your Azure AD workforce tenant and [open a support request](https://entra.microsoft.com/#view/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical).
3131

3232
- If you're not an Azure customer, you can open a support request with [Microsoft Support for business](https://support.serviceshub.microsoft.com/supportforbusiness).
3333

articles/active-directory/develop/v2-oauth2-on-behalf-of-flow.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,8 @@ This access token is a v1.0-formatted token for Microsoft Graph. This is because
164164

165165
An error response is returned by the token endpoint when trying to acquire an access token for the downstream API, if the downstream API has a Conditional Access policy (such as [multifactor authentication](../authentication/concept-mfa-howitworks.md)) set on it. The middle-tier service should surface this error to the client application so that the client application can provide the user interaction to satisfy the Conditional Access policy.
166166

167+
To [surface this error back](https://datatracker.ietf.org/doc/html/rfc6750#section-3.1) to the client, the middle-tier service will reply with HTTP 401 Unauthorized and with a WWW-Authenticate HTTP header containing the error and the claim challenge. The client must parse this header and acquire a new token from the token issuer, by presenting the claims challenge if one exists. Clients should not retry to access the middle-tier service using a cached access token.
168+
167169
```json
168170
{
169171
"error":"interaction_required",

0 commit comments

Comments
 (0)