Skip to content

Commit e9b6668

Browse files
authored
Merge pull request #223268 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 1/8
2 parents a506ee6 + 1e3f62f commit e9b6668

File tree

121 files changed

+1028
-646
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

121 files changed

+1028
-646
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27844,6 +27844,11 @@
2784427844
"redirect_url": "/azure/virtual-machines/workloads/sap/deployment-checklist",
2784527845
"redirect_document_id": false
2784627846
},
27847+
{
27848+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-get-started-classic.md",
27849+
"redirect_url": "/azure/virtual-machines/workloads/sap/get-started",
27850+
"redirect_document_id": false
27851+
},
2784727852
{
2784827853
"source_path_from_root": "/articles/migrate/how-to-scale-assessment.md",
2784927854
"redirect_url": "scale-hyper-v-assessment",

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom: has-adal-ref
1919

2020
# Certificate user IDs
2121

22-
Azure AD has a multivalued attribute named **certificateUserIds** on the user object that can be used in Username bindings. The attribute allows up to four values, and each value can be of 120-character length. It can store any value, and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
22+
Users in Azure AD can have a multivalued attribute named **certificateUserIds**. The attribute allows up to four values, and each value can be of 120-character length. It can store any value, and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
2323

2424
## Supported patterns for certificate user IDs
2525

articles/active-directory/azuread-dev/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ title: Azure Active Directory for developers
44
summary: |
55
Azure Active Directory (Azure AD) is a cloud identity service that allows developers to build apps that sign in users with a Microsoft work or school account. Azure AD supports building single-tenant line-of-business (LOB) apps as well as multi-tenant apps.
66
7-
IMPORTANT: This content is for the older Azure AD v1.0 endpoint, use the Microsoft identity platform for new projects.
7+
IMPORTANT: This content is for the older Azure AD v1.0 endpoint, use the Microsoft identity platform (https://aka.ms/identityplatform) for new projects.
88
99
metadata:
1010
ms.topic: landing-page
11-
ms.date: 01/27/2020
11+
ms.date: 01/06/2023
1212
author: CelesteDG
1313
ms.author: celested
1414
ms.service: active-directory

articles/active-directory/develop/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -814,8 +814,10 @@
814814
href: reply-url.md
815815
- name: Validation differences by supported account types
816816
href: supported-accounts-validation.md
817-
- name: Configured permissions limits troubleshooting
818-
href: troubleshoot-required-resource-access-limits.md
817+
- name: Claims mapping policy type
818+
href: reference-claims-mapping-policy-type.md
819+
- name: Configured permissions limits troubleshooting
820+
href: troubleshoot-required-resource-access-limits.md
819821
- name: Microsoft auth libraries by app type
820822
displayName: MSAL, auth client library, SDK, token validation
821823
href: reference-v2-libraries.md

articles/active-directory/develop/access-tokens.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,8 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 7/20/2022
12+
ms.date: 12/28/2022
1313
ms.author: davidmu
14-
ms.reviewer: marsma
1514
ms.custom: aaddev, identityplatformtop40, fasttrack-edit
1615
---
1716

@@ -319,7 +318,7 @@ A *non-password-based* login is one where the user didn't type in a password to
319318
- Voice
320319
- PIN
321320

322-
Check out [Primary Refresh Tokens](../devices/concept-primary-refresh-token.md) for more details on primary refresh tokens.
321+
For more information, see [Primary Refresh Tokens](../devices/concept-primary-refresh-token.md).
323322

324323
## Next steps
325324

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.subservice: develop
88
ms.custom: aaddev, ignite-2022, engagement-fy23
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 10/21/2022
11+
ms.date: 01/06/2023
1212
ms.author: davidmu
1313
ms.reviewer: ludwignick
1414
---
@@ -31,7 +31,7 @@ In this article, we walk through a few common scenarios that can help you unders
3131

3232
In the following examples, you create, update, link, and delete policies for service principals. Claims-mapping policies can only be assigned to service principal objects. If you're new to Azure Active Directory (Azure AD), we recommend that you [learn about how to get an Azure AD tenant](quickstart-create-new-tenant.md) before you proceed with these examples.
3333

34-
When creating a claims-mapping policy, you can also emit a claim from a directory extension attribute in tokens. Use _ExtensionID_ for the extension attribute instead of _ID_ in the `ClaimsSchema` element. For more info on extension attributes, see [Using directory extension attributes](active-directory-schema-extensions.md).
34+
When creating a claims-mapping policy, you can also emit a claim from a directory extension attribute in tokens. Use _ExtensionID_ for the extension attribute instead of _ID_ in the `ClaimsSchema` element. For more information about using extension attributes, see [Using directory extension attributes](active-directory-schema-extensions.md).
3535

3636
The [Azure AD PowerShell Module public preview release](https://www.powershellgallery.com/packages/AzureADPreview) is required to configure claims-mapping policies. The PowerShell module is in preview, while the claims mapping and token creation runtime in Azure is generally available. Updates to the preview PowerShell module could require you to update or change your configuration scripts.
3737

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,14 @@ title: Provide optional claims to Azure AD apps
33
description: How to add custom or additional claims to the SAML 2.0 and JSON Web Tokens (JWT) tokens issued by Microsoft identity platform.
44
author: davidmu1
55
manager: CelesteDG
6-
76
ms.service: active-directory
87
ms.subservice: develop
98
ms.topic: how-to
109
ms.workload: identity
11-
ms.date: 04/04/2022
10+
ms.date: 12/28/2022
1211
ms.author: davidmu
13-
ms.reviewer: paulgarn, ludwignick
1412
ms.custom: aaddev
13+
ms.reviewer: ludwignick
1514
---
1615

1716
# Provide optional claims to your app
@@ -366,7 +365,7 @@ This section covers the configuration options under optional claims for changing
366365
]
367366
}
368367
```
369-
3) Emit group names in the format of samAccountName for on-prem synced groups and display name for cloud groups in SAML and OIDC ID Tokens for the groups assigned to the application:
368+
3) Emit group names in the format of samAccountName for on-premises synced groups and display name for cloud groups in SAML and OIDC ID Tokens for the groups assigned to the application:
370369

371370
**Application manifest entry:**
372371

articles/active-directory/develop/active-directory-schema-extensions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.subservice: develop
99
ms.custom: aaddev
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 07/29/2020
12+
ms.date: 01/06/2023
1313
ms.author: davidmu
14-
ms.reviewer: paulgarn, ludwignick, jeedes, luleon
14+
ms.reviewer: ludwignick, luleon
1515
---
1616
# Using directory extension attributes in claims
1717

articles/active-directory/develop/authorization-basics.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,14 @@ description: Learn about the basics of authorization in the Microsoft identity p
44
services: active-directory
55
author: davidmu1
66
manager: CelesteDG
7-
87
ms.service: active-directory
98
ms.subservice: develop
109
ms.topic: conceptual
1110
ms.workload: identity
12-
ms.date: 06/16/2022
11+
ms.date: 01/06/2023
1312
ms.custom: template-concept
1413
ms.author: davidmu
15-
ms.reviewer: johngarland, mamarxen, ianbe, marsma
16-
14+
ms.reviewer: johngarland, mamarxen, ianbe
1715
#Customer intent: As an application developer, I want to understand the basic concepts of authorization in the Microsoft identity platform.
1816
---
1917

articles/active-directory/develop/custom-rbac-for-developers.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,21 +4,20 @@ description: Learn about what custom RBAC is and why it's important to implement
44
services: active-directory
55
author: davidmu1
66
manager: CelesteDG
7-
87
ms.service: active-directory
98
ms.subservice: develop
109
ms.topic: conceptual
1110
ms.workload: identity
12-
ms.date: 08/19/2022
11+
ms.date: 01/06/2023
1312
ms.custom: template-concept, ignite-2022
1413
ms.author: davidmu
15-
ms.reviewer: john.garland, maggie.marxen, ian.bennett, marsma
14+
ms.reviewer: john.garland, maggie.marxen, ian.bennett
1615
#Customer intent: As a developer, I want to learn about custom RBAC and why I need to use it in my application.
1716
---
1817

1918
# Role-based access control for application developers
2019

21-
Role-based access control (RBAC) allows certain users or groups to have specific permissions to access and manage resources. Application RBAC differs from [Azure role-based access control](../../role-based-access-control/overview.md) and [Azure AD role-based access control](../roles/custom-overview.md#understand-azure-ad-role-based-access-control). Azure custom roles and built-in roles are both part of Azure RBAC, which is used to help manage Azure resources. Azure AD RBAC is used to manage Azure AD resources. This article explains application-specific RBAC.
20+
Role-based access control (RBAC) allows certain users or groups to have specific permissions to access and manage resources. Application RBAC differs from [Azure role-based access control](../../role-based-access-control/overview.md) and [Azure AD role-based access control](../roles/custom-overview.md#understand-azure-ad-role-based-access-control). Azure custom roles and built-in roles are both part of Azure RBAC, which is used to help manage Azure resources. Azure AD RBAC is used to manage Azure AD resources. This article explains application-specific RBAC. For information about implementing application-specific RBAC, see [How to add app roles to your application and receive them in the token](./howto-add-app-roles-in-azure-ad-apps.md).
2221

2322
## Roles definitions
2423

@@ -80,5 +79,4 @@ Although either app roles or groups can be used for authorization, key differenc
8079

8180
## Next steps
8281

83-
- [How to add app roles to your application and receive them in the token](./howto-add-app-roles-in-azure-ad-apps.md)
8482
- [Azure Identity Management and access control security best practices](../../security/fundamentals/identity-management-best-practices.md)

0 commit comments

Comments
 (0)