Skip to content

Commit e8af2c5

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into asc-melvyn-20200129
2 parents 449599b + 1294972 commit e8af2c5

File tree

479 files changed

+6648
-4372
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

479 files changed

+6648
-4372
lines changed

.openpublishing.redirection.json

Lines changed: 50 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1995,6 +1995,26 @@
19951995
"redirect_url": "/azure/cognitive-services/bing-video-search/quickstarts/client-libraries?pivots=programming-language-python",
19961996
"redirect_document_id": false
19971997
},
1998+
{
1999+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-c-sharp.md",
2000+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-csharp",
2001+
"redirect_document_id": false
2002+
},
2003+
{
2004+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-java.md",
2005+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-java",
2006+
"redirect_document_id": false
2007+
},
2008+
{
2009+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-node.md",
2010+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-javascript",
2011+
"redirect_document_id": false
2012+
},
2013+
{
2014+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-python.md",
2015+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-python",
2016+
"redirect_document_id": false
2017+
},
19982018
{
19992019
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
20002020
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",
@@ -2902,7 +2922,7 @@
29022922
},
29032923
{
29042924
"source_path": "articles/machine-learning/service/overview-more-machine-learning.md",
2905-
"redirect_url": "/azure/architecture/data-guide/technology-choices/data-science-and-machine-learning",
2925+
"redirect_url": "https://docs.microsoft.com/azure/architecture/data-guide/technology-choices/data-science-and-machine-learning",
29062926
"redirect_document_id": false
29072927
},
29082928
{
@@ -2982,7 +3002,7 @@
29823002
},
29833003
{
29843004
"source_path": "articles/machine-learning/service/support-for-aml-services.md",
2985-
"redirect_url": "https://aka.ms/aml-forum-service",
3005+
"redirect_url": "https://social.msdn.microsoft.com/Forums/home?forum=AzureMachineLearningService",
29863006
"redirect_document_id": false
29873007
},
29883008
{
@@ -3072,17 +3092,17 @@
30723092
},
30733093
{
30743094
"source_path": "articles/machine-learning/studio/live-chat.md",
3075-
"redirect_url": "https://social.msdn.microsoft.com/Forums/en-US/home?forum=MachineLearning",
3095+
"redirect_url": "https://social.msdn.microsoft.com/Forums/home?forum=MachineLearning",
30763096
"redirect_document_id": false
30773097
},
30783098
{
30793099
"source_path": "articles/machine-learning/studio/datamarket-deprecation.md",
3080-
"redirect_url": "https://microsoft.com/cognitive",
3100+
"redirect_url": "https://azure.microsoft.com/services/cognitive-services/",
30813101
"redirect_document_id": false
30823102
},
30833103
{
30843104
"source_path": "articles/machine-learning/r-developers-guide.md",
3085-
"redirect_url": "/azure/architecture/data-guide/technology-choices/r-developers-guide",
3105+
"redirect_url": "https://docs.microsoft.com/azure/architecture/data-guide/technology-choices/r-developers-guide",
30863106
"redirect_document_id": false
30873107
},
30883108
{
@@ -5110,6 +5130,11 @@
51105130
"redirect_url": "/azure/active-directory/develop/msal-overview",
51115131
"redirect_document_id": true
51125132
},
5133+
{
5134+
"source_path": "articles/active-directory/develop/shared-device-mode.md",
5135+
"redirect_url": "/azure/active-directory/develop/msal-android-shared-devices",
5136+
"redirect_document_id": true
5137+
},
51135138
{
51145139
"source_path": "articles/azure-resource-manager/resource-group-authenticate-service-principal.md",
51155140
"redirect_url": "/azure/active-directory/develop/howto-authenticate-service-principal-powershell",
@@ -15156,7 +15181,7 @@
1515615181
},
1515715182
{
1515815183
"source_path": "articles/machine-learning/service/how-to-create-portal-experiments.md",
15159-
"redirect_url": "/azure/machine-learning/how-to-create-portal-experiments",
15184+
"redirect_url": "/azure/machine-learning/tutorial-first-experiment-automated-ml",
1516015185
"redirect_document_id": false
1516115186
},
1516215187
{
@@ -47324,6 +47349,11 @@
4732447349
"redirect_url": "https://feedback.azure.com/forums/169401-azure-active-directory?category_id=160593",
4732547350
"redirect_document_id": false
4732647351
},
47352+
{
47353+
"source_path": "articles/active-directory-domain-services/compatible-software.md",
47354+
"redirect_url": "/azure/active-directory-domain-services/overview",
47355+
"redirect_document_id": false
47356+
},
4732747357
{
4732847358
"source_path": "articles/active-directory-domain-services/active-directory-ds-troubleshooting.md",
4732947359
"redirect_url": "/azure/active-directory-domain-services/troubleshoot",
@@ -50494,6 +50524,20 @@
5049450524
{
5049550525
"source_path": "articles/service-fabric/service-fabric-deploy-multiple-apps.md",
5049650526
"redirect_url": "/azure/service-fabric/service-fabric-deploy-existing-app"
50527+
},
50528+
{
50529+
"source_path": "articles/sql-database/sql-database-managed-instance-index.yml",
50530+
"redirect_url": "/azure/sql-database/sql-database-managed-instance"
50531+
},
50532+
{
50533+
"source_path": "articles/aks/integrate-azure.md",
50534+
"redirect_url": "/azure/aks/",
50535+
"redirect_document_id": false
50536+
},
50537+
{
50538+
"source_path": "articles/aks/use-cosmosdb-osba-mongo-app.md",
50539+
"redirect_url": "/azure/aks/",
50540+
"redirect_document_id": false
5049750541
}
5049850542
]
5049950543
}

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/16/2020
12+
ms.date: 04/01/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -132,7 +132,7 @@ The following claims transformation demonstrates how to check the value of a boo
132132
<InputParameter Id="valueToCompareTo" DataType="boolean" Value="true" />
133133
</InputParameters>
134134
<OutputClaims>
135-
<OutputClaim ClaimTypeReferenceId="accountEnabled" TransformationClaimType="compareResult"/>
135+
<OutputClaim ClaimTypeReferenceId="accountEnabled" TransformationClaimType="compareResult"/>
136136
</OutputClaims>
137137
</ClaimsTransformation>
138138
```
@@ -163,6 +163,7 @@ Use this claim transformation to perform logical negation on a claim.
163163
<ClaimsTransformation Id="CheckWhetherEmailBePresented" TransformationMethod="NotClaims">
164164
<InputClaims>
165165
<InputClaim ClaimTypeReferenceId="userExists" TransformationClaimType="inputClaim" />
166+
</InputClaims>
166167
<OutputClaims>
167168
<OutputClaim ClaimTypeReferenceId="userExists" TransformationClaimType="outputClaim" />
168169
</OutputClaims>
@@ -198,7 +199,6 @@ The following claims transformation demonstrates how to `Or` two boolean ClaimTy
198199
<OutputClaim ClaimTypeReferenceId="presentTOSSelfAsserted" TransformationClaimType="outputClaim" />
199200
</OutputClaims>
200201
</ClaimsTransformation>
201-
</ClaimsTransformation>
202202
```
203203

204204
### Example

articles/active-directory-b2c/claimstransformations.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,7 @@ For examples of claims transformations, see the following reference pages:
159159
- [Date](date-transformations.md)
160160
- [Integer](integer-transformations.md)
161161
- [JSON](json-transformations.md)
162+
- [Phone number](phone-number-claims-transformations.md)
162163
- [General](general-transformations.md)
163164
- [Social account](social-transformations.md)
164165
- [String](string-transformations.md)

articles/active-directory-b2c/custom-policy-localization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: B2C
1717

1818
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1919

20-
Language customization in Azure Active Directory B2C (Azure AD B2C) allows you to accommodate different languages to suit your customer' needs. Microsoft provides the translations for 36 languages, but you can also provide your own translations for any language. Even if your experience is provided for only a single language, you can customize any text on the pages.
20+
Language customization in Azure Active Directory B2C (Azure AD B2C) allows you to accommodate different languages to suit your customer' needs. Microsoft provides the translations for [36 languages](https://docs.microsoft.com/azure/active-directory-b2c/user-flow-language-customization#supported-languages), but you can also provide your own translations for any language. Even if your experience is provided for only a single language, you can customize any text on the pages.
2121

2222
This article shows you how to support multiple locales or languages in the policy for user journeys. Localization requires three steps: set-up the explicit list of supported languages, provide language-specific strings and collections, and edit the [content definition](contentdefinitions.md) for the page.
2323

articles/active-directory-b2c/ropc-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/27/2020
12+
ms.date: 04/01/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---

articles/active-directory-domain-services/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -145,8 +145,6 @@
145145
href: faqs.md
146146
- name: Service updates
147147
href: https://azure.microsoft.com/updates/?product=active-directory-ds
148-
- name: Compatible third-party software
149-
href: compatible-software.md
150148
- name: Pricing
151149
href: https://azure.microsoft.com/pricing/details/active-directory-ds/
152150
- name: Azure AD feedback forum

articles/active-directory-domain-services/compatible-software.md

Lines changed: 0 additions & 41 deletions
This file was deleted.

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Microsoft's passwordless authentication methods enable different scenarios. Cons
5656
| **Web app sign-in**: <br> from a mobile or non-windows device | **Yes** | **No** | **No** |
5757
| **Computer sign in**: <br> Non-Windows computer | **No** | **No** | **No** |
5858

59-
For information on selecting the best method for your organization, see [Deciding a passwordless method](https://docs.microsoft.com/azure/security/fundamentals/ad-passwordless#deciding-a-passwordless-method).
59+
For information on selecting the best method for your organization, see [Deciding a passwordless method](https://docs.microsoft.com/azure/active-directory/authentication/concept-authentication-passwordless#choose-a-passwordless-method).
6060

6161
## Prerequisites
6262

@@ -130,7 +130,7 @@ See [Best practices for a pilot](https://aka.ms/deploymentplans) on the deployme
130130

131131
The Microsoft Authenticator app is a free download from Google Play or the Apple App Store. [Learn more about downloading the Microsoft Authenticator app](https://www.microsoft.com/p/microsoft-authenticator/9nblgggzmcj6). Have users download the Microsoft Authenticator app. and follow the directions to enable phone sign in.
132132

133-
It turns any iOS or Android phone into a strong, passwordless credential. Users sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using biometrics or a PIN to confirm. [See details on how the Microsoft Authenticator app works](https://docs.microsoft.com/azure/security/fundamentals/ad-passwordless#user-using-microsoft-authenticator-for-passwordless-sign-in).
133+
It turns any iOS or Android phone into a strong, passwordless credential. Users sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using biometrics or a PIN to confirm. [See details on how the Microsoft Authenticator app works](https://docs.microsoft.com/azure/active-directory/authentication/concept-authentication-passwordless#microsoft-authenticator-app).
134134

135135
![sign in with the Authenticator app](./media/howto-authentication-passwordless-deployment/passwordless-dp-sign-in.png)
136136

articles/active-directory/develop/TOC.yml

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -223,8 +223,12 @@
223223
href: scenario-mobile-app-configuration.md
224224
- name: Mobile platforms specific config
225225
items:
226+
- name: Microsoft Enterprise SSO plug-in for Apple devices
227+
href: apple-sso-plugin.md
226228
- name: Shared device mode for Android devices
227-
href: shared-device-mode.md
229+
href: msal-android-shared-devices.md
230+
- name: Shared device mode for iOS devices
231+
href: msal-ios-shared-devices.md
228232
- name: Xamarin Android
229233
href: msal-net-xamarin-android-considerations.md
230234
- name: System browser on Android
@@ -312,6 +316,17 @@
312316
href: msal-handling-exceptions.md
313317
- name: Logging
314318
href: msal-logging.md
319+
- name: Shared devices
320+
items:
321+
- name: Overview - shared devices
322+
href: msal-shared-devices.md
323+
displayName: shared device mode, firstline worker, frontline worker
324+
- name: Shared device mode for iOS devices
325+
href: msal-ios-shared-devices.md
326+
displayName: firstline worker, frontline worker
327+
- name: Shared device mode for Android devices
328+
href: msal-android-shared-devices.md
329+
displayName: firstline worker, frontline worker
315330
- name: Single sign-on
316331
displayName: SSO
317332
items:
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
---
2+
title: Microsoft Enterprise SSO plug-in for Apple devices
3+
titleSuffix: Microsoft identity platform | Azure
4+
description: Learn about Microsoft's Azure Active Directory SSO plug-in for iOS and macOS devices.
5+
services: active-directory
6+
author: brandwe
7+
manager: CelesteDG
8+
9+
ms.service: active-directory
10+
ms.subservice: develop
11+
ms.topic: conceptual
12+
ms.workload: identity
13+
ms.date: 03/31/2020
14+
ms.author: brandwe
15+
ms.reviewer: brandwe
16+
ms.custom: aaddev
17+
---
18+
19+
# Microsoft Enterprise SSO plug-in for Apple devices (Preview)
20+
21+
> [!NOTE]
22+
> This feature is in public preview.
23+
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
24+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25+
26+
The *Microsoft Enterprise SSO plug-in for Apple devices* provides single sign-on (SSO) for Active Directory accounts across all applications that support Apple's [Enterprise Single Sign-On](https://developer.apple.com/documentation/authenticationservices) feature. Microsoft worked closely with Apple to develop this plug-in to increase your application's usability while providing the best protection that Apple and Microsoft can provide.
27+
28+
In this Public Preview release, the Enterprise SSO plug-in is available only for iOS devices and is distributed in certain Microsoft applications.
29+
30+
Our first use of the Enterprise SSO plug-in is with our new [shared device mode](msal-ios-shared-devices.md) feature.
31+
32+
## Features
33+
34+
The Microsoft Enterprise SSO plug-in for Apple devices offers the following benefits:
35+
36+
- Provides SSO for Active Directory accounts across all applications that support Apple's Enterprise Single Sign-On feature.
37+
- Delivered automatically in the Microsoft Authenticator and can be enabled by any mobile device management (MDM) solution.
38+
39+
## Requirements
40+
41+
To use Microsoft Enterprise SSO plug-in for Apple devices:
42+
43+
- iOS 13.0 or higher must be installed on the device.
44+
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. For Public Preview, these applications include the [Microsoft Authenticator app](../user-help/user-help-auth-app-overview.md).
45+
- Device must be MDM-enrolled (for example, with Microsoft Intune).
46+
- Configuration must be pushed to the device to enable the Microsoft Enterprise SSO plug-in for Apple devices on the device. This security constraint is required by Apple.
47+
48+
## Enable the SSO extension with mobile device management (MDM)
49+
50+
To enable the Microsoft Enterprise SSO plug-in for Apple devices, your devices need to be sent a signal through an MDM service. Since Microsoft includes the Enterprise SSO plug-in in the [Microsoft Authenticator app](..//user-help/user-help-auth-app-overview.md), use your MDM to configure the app to enable the Microsoft Enterprise SSO plug-in.
51+
52+
Use the following parameters to configure the Microsoft Enterprise SSO plug-in for Apple devices:
53+
54+
- **Type**: Redirect
55+
- **Extension ID**: `com.microsoft.azureauthenticator.ssoextension`
56+
- **Team ID**: `SGGM6D27TK`
57+
- **URLs**:
58+
- `https://login.microsoftonline.com`
59+
- `https://login.windows.net`
60+
- `https://login.microsoft.com`
61+
- `https://sts.windows.net`
62+
- `https://login.partner.microsoftonline.cn`
63+
- `https://login.chinacloudapi.cn`
64+
- `https://login.microsoftonline.de`
65+
- `https://login.microsoftonline.us`
66+
- `https://login.usgovcloudapi.net`
67+
- `https://login-us.microsoftonline.com`
68+
69+
You can use Microsoft Intune as your MDM service to ease configuration of the Microsoft Enterprise SSO plug-in. For more information, see the [Intune configuration documentation](https://docs.microsoft.com/intune/configuration/ios-device-features-settings).
70+
71+
## Using the SSO extension in your application
72+
73+
The [Microsoft Authentication Library (MSAL) for Apple devices](https://github.com/AzureAD/microsoft-authentication-library-for-objc) version 1.1.0 and higher supports the Microsoft Enterprise SSO plug-in for Apple devices.
74+
75+
If you'd like to support shared device mode provided by the Microsoft Enterprise SSO plug-in for Apple devices, ensure your applications use the specified minimum required version of MSAL.
76+
77+
## Next steps
78+
79+
For more information about shared device mode on iOS, see [Shared device mode for iOS devices](msal-ios-shared-devices.md).

0 commit comments

Comments
 (0)