Skip to content

Commit ec191e7

Browse files
authored
Merge branch 'MicrosoftDocs:main' into aiservice-powershell-0
2 parents a75013c + ebd46e4 commit ec191e7

File tree

281 files changed

+3640
-2790
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

281 files changed

+3640
-2790
lines changed

articles/active-directory/develop/developer-glossary.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Glossary of terms in the Microsoft identity platform
3-
description: Definitions of terms commonly found in Microsoft identity platform documentation, Azure portal, and authentication SDKs like the Microsoft Authentication Library (MSAL).
3+
description: Definitions of terms commonly found in Microsoft identity platform documentation, Microsoft Entra admin center, and authentication SDKs like the Microsoft Authentication Library (MSAL).
44
services: active-directory
55
author: rwike77
66
manager: CelesteDG
@@ -15,7 +15,7 @@ ms.reviewer:
1515

1616
# Glossary: Microsoft identity platform
1717

18-
You see these terms when you use our documentation, the Azure portal, our authentication libraries, and the Microsoft Graph API. Some terms are Microsoft-specific while others are related to protocols like OAuth or other technologies you use with the Microsoft identity platform.
18+
You see these terms when you use our documentation, the Microsoft Entra admin center, our authentication libraries, and the Microsoft Graph API. Some terms are Microsoft-specific while others are related to protocols like OAuth or other technologies you use with the Microsoft identity platform.
1919

2020
## Access token
2121

@@ -40,11 +40,11 @@ The application ID, or _[client ID](https://datatracker.ietf.org/doc/html/rfc674
4040

4141
## Application manifest
4242

43-
A feature provided by the [Azure portal], which produces a JSON representation of the application's identity configuration, used as a mechanism for updating its associated [Application][Graph-App-Resource] and [ServicePrincipal][Graph-Sp-Resource] entities. See [Understanding the Azure Active Directory application manifest][AAD-App-Manifest] for more details.
43+
An application manifest is a feature that produces a JSON representation of the application's identity configuration, used as a mechanism for updating its associated [Application][Graph-App-Resource] and [ServicePrincipal][Graph-Sp-Resource] entities. See [Understanding the Azure Active Directory application manifest][AAD-App-Manifest] for more details.
4444

4545
## Application object
4646

47-
When you register/update an application in the [Azure portal], the portal creates/updates both an application object and a corresponding [service principal object](#service-principal-object) for that tenant. The application object _defines_ the application's identity configuration globally (across all tenants where it has access), providing a template from which its corresponding service principal object(s) are _derived_ for use locally at run-time (in a specific tenant).
47+
When you register/update an application, both an application object and a corresponding [service principal object](#service-principal-object) are created/updated for that tenant. The application object _defines_ the application's identity configuration globally (across all tenants where it has access), providing a template from which its corresponding service principal object(s) are _derived_ for use locally at run-time (in a specific tenant).
4848

4949
For more information, see [Application and Service Principal Objects][AAD-App-SP-Objects].
5050

@@ -140,7 +140,7 @@ A [client application](#client-application) gains access to a [resource server](
140140

141141
They also surface during the [consent](#consent) process, giving the administrator or resource owner the opportunity to grant/deny the client access to resources in their tenant.
142142

143-
Permission requests are configured on the **API permissions** page for an application in the [Azure portal], by selecting the desired "Delegated Permissions" and "Application Permissions" (the latter requires membership in the Global Administrator role). Because a [public client](#client-application) can't securely maintain credentials, it can only request delegated permissions, while a [confidential client](#client-application) has the ability to request both delegated and application permissions. The client's [application object](#application-object) stores the declared permissions in its [requiredResourceAccess property][Graph-App-Resource].
143+
Permission requests are configured on the **API permissions** page for an application, by selecting the desired "Delegated Permissions" and "Application Permissions" (the latter requires membership in the Global Administrator role). Because a [public client](#client-application) can't securely maintain credentials, it can only request delegated permissions, while a [confidential client](#client-application) has the ability to request both delegated and application permissions. The client's [application object](#application-object) stores the declared permissions in its [requiredResourceAccess property][Graph-App-Resource].
144144

145145
## Refresh token
146146

@@ -170,15 +170,15 @@ Like [scopes](#scopes), app roles provide a way for a [resource server](#resourc
170170

171171
App roles can support two assignment types: "user" assignment implements role-based access control for users/groups that require access to the resource, while "application" assignment implements the same for [client applications](#client-application) that require access. An app role can be defined as user-assignable, app-assignabnle, or both.
172172

173-
Roles are resource-defined strings (for example "Expense approver", "Read-only", "Directory.ReadWrite.All"), managed in the [Azure portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [appRoles property][Graph-Sp-Resource]. The Azure portal is also used to assign users to "user" assignable roles, and configure client [application permissions](#permissions) to request "application" assignable roles.
173+
Roles are resource-defined strings (for example "Expense approver", "Read-only", "Directory.ReadWrite.All"), managed via the resource's [application manifest](#application-manifest), and stored in the resource's [appRoles property][Graph-Sp-Resource]. Users can be assigned to "user" assignable roles and client [application permissions](#permissions) can be configured to request "application" assignable roles.
174174

175-
For a detailed discussion of the application roles exposed by the Microsoft Graph API, see [Graph API Permission Scopes][Graph-Perm-Scopes]. For a step-by-step implementation example, see [Add or remove Azure role assignments using the Azure portal][AAD-RBAC].
175+
For a detailed discussion of the application roles exposed by the Microsoft Graph API, see [Graph API Permission Scopes][Graph-Perm-Scopes]. For a step-by-step implementation example, see [Add or remove Azure role assignments][AAD-RBAC].
176176

177177
## Scopes
178178

179179
Like [roles](#roles), scopes provide a way for a [resource server](#resource-server) to govern access to its protected resources. Scopes are used to implement [scope-based][OAuth2-Access-Token-Scopes] access control, for a [client application](#client-application) that has been given delegated access to the resource by its owner.
180180

181-
Scopes are resource-defined strings (for example "Mail.Read", "Directory.ReadWrite.All"), managed in the [Azure portal] via the resource's [application manifest](#application-manifest), and stored in the resource's [oauth2Permissions property][Graph-Sp-Resource]. The Azure portal is also used to configure client application [delegated permissions](#permissions) to access a scope.
181+
Scopes are resource-defined strings (for example "Mail.Read", "Directory.ReadWrite.All"), managed via the resource's [application manifest](#application-manifest), and stored in the resource's [oauth2Permissions property][Graph-Sp-Resource]. Client application [delegated permissions](#permissions) can be configured to access a scope.
182182

183183
A best practice naming convention, is to use a "resource.operation.constraint" format. For a detailed discussion of the scopes exposed by Microsoft Graph API, see [Graph API Permission Scopes][Graph-Perm-Scopes]. For scopes exposed by Microsoft 365 services, see [Microsoft 365 API permissions reference][O365-Perm-Ref].
184184

@@ -188,7 +188,7 @@ A signed document containing claims, such as an OAuth 2.0 token or SAML 2.0 asse
188188

189189
## Service principal object
190190

191-
When you register/update an application in the [Azure portal], the portal creates/updates both an [application object](#application-object) and a corresponding service principal object for that tenant. The application object _defines_ the application's identity configuration globally (across all tenants where the associated application has been granted access), and is the template from which its corresponding service principal object(s) are _derived_ for use locally at run-time (in a specific tenant).
191+
When you register/update an application, both an [application object](#application-object) and a corresponding service principal object are created/updated for that tenant. The application object _defines_ the application's identity configuration globally (across all tenants where the associated application has been granted access), and is the template from which its corresponding service principal object(s) are _derived_ for use locally at run-time (in a specific tenant).
192192

193193
For more information, see [Application and Service Principal Objects][AAD-App-SP-Objects].
194194

@@ -214,7 +214,7 @@ An instance of an Azure AD directory is referred to as an Azure AD tenant. It pr
214214
- authentication of user accounts and registered applications
215215
- REST endpoints required to support various protocols including OAuth 2.0 and SAML, including the [authorization endpoint](#authorization-endpoint), [token endpoint](#token-endpoint) and the "common" endpoint used by [multi-tenant applications](#multi-tenant-application).
216216

217-
Azure AD tenants are created/associated with Azure and Microsoft 365 subscriptions during sign-up, providing Identity & Access Management features for the subscription. Azure subscription administrators can also create additional Azure AD tenants via the Azure portal. See [How to get an Azure Active Directory tenant][AAD-How-To-Tenant] for details on the various ways you can get access to a tenant. See [Associate or add an Azure subscription to your Azure Active Directory tenant][AAD-How-Subscriptions-Assoc] for details on the relationship between subscriptions and an Azure AD tenant, and for instructions on how to associate or add a subscription to an Azure AD tenant.
217+
Azure AD tenants are created/associated with Azure and Microsoft 365 subscriptions during sign-up, providing Identity & Access Management features for the subscription. Azure subscription administrators can also create additional Azure AD tenants. See [How to get an Azure Active Directory tenant][AAD-How-To-Tenant] for details on the various ways you can get access to a tenant. See [Associate or add an Azure subscription to your Azure Active Directory tenant][AAD-How-Subscriptions-Assoc] for details on the relationship between subscriptions and an Azure AD tenant, and for instructions on how to associate or add a subscription to an Azure AD tenant.
218218

219219
## Token endpoint
220220

@@ -264,7 +264,6 @@ Many of the terms in this glossary are related to the OAuth 2.0 and OpenID Conne
264264
[AAD-Multi-Tenant-Overview]:howto-convert-app-to-be-multi-tenant.md
265265
[AAD-Security-Token-Claims]: ./authentication-vs-authorization.md#claims-in-azure-ad-security-tokens
266266
[AAD-Tokens-Claims]:access-tokens.md
267-
[Azure portal]: https://portal.azure.com
268267
[AAD-RBAC]: ../../role-based-access-control/role-assignments-portal.md
269268
[JWT]: https://tools.ietf.org/html/rfc7519
270269
[Microsoft-Graph]: https://developer.microsoft.com/graph

articles/active-directory/develop/howto-add-terms-of-service-privacy-statement.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -47,27 +47,25 @@ Examples: `https://myapp.com/terms-of-service` and `https://myapp.com/privacy-st
4747

4848
When the terms of service and privacy statement are ready, you can add links to these documents in your app using one of these methods:
4949

50-
* [Through the Azure portal](#azure-portal)
50+
* [Through the Microsoft Entra admin center](#entra-admin-center)
5151
* [Using the app object JSON](#app-object-json)
5252
* [Using the Microsoft Graph API](#msgraph-rest-api)
5353

54-
### <a name="azure-portal"></a>Using the Azure portal
54+
### <a name="entra-admin-center"></a>Using the Microsoft Entra admin center
5555

5656
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
5757

58-
Follow these steps in the Azure portal.
58+
Follow these steps to add links:
5959

60-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a> and select the correct Azure AD tenant(not B2C).
61-
2. Navigate to the **App registrations** section and select your app.
62-
3. Under **Manage**, select **Branding & properties**.
63-
4. Fill out the **Terms of service URL** and **Privacy statement URL** fields.
64-
5. Select **Save**.
65-
66-
![App properties contains terms of service and privacy statement URLs](./media/howto-add-terms-of-service-privacy-statement/azure-portal-terms-service-privacy-statement-urls.png)
60+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
61+
1. Browse to **Identity** > **User experiences** > **Company branding**.
62+
1. Select **Getting started**, and then select **Edit** for the **Default sign-in experience**.
63+
1. Select **Footer** and fill out the URL for **Terms of Use** and **Privacy & Cookies**.
64+
1. Select **Review + save**.
6765

6866
### <a name="app-object-json"></a>Using the app object JSON
6967

70-
If you prefer to modify the app object JSON directly, you can use the manifest editor in the Azure portal or Application Registration Portal to include links to your app's terms of service and privacy statement.
68+
If you prefer to modify the app object JSON directly, you can use the manifest editor to include links to your app's terms of service and privacy statement.
7169

7270
1. Navigate to the **App Registrations** section and select your app.
7371
2. Open the **Manifest** pane.

articles/active-directory/develop/howto-modify-supported-accounts.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.reviewer: aragra, sureshja
2020

2121
When you registered your application with the Microsoft identity platform, you specified who--which account types--can access it. For example, you might've specified accounts only in your organization, which is a *single-tenant* app. Or, you might've specified accounts in any organization (including yours), which is a *multi-tenant* app.
2222

23-
In the following sections, you learn how to modify your app's registration in the Azure portal to change who, or what types of accounts, can access the application.
23+
In the following sections, you learn how to modify your app's registration to change who, or what types of accounts, can access the application.
2424

2525
## Prerequisites
2626

@@ -32,10 +32,10 @@ In the following sections, you learn how to modify your app's registration in th
3232

3333
To specify a different setting for the account types supported by an existing app registration:
3434

35-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
36-
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which the app is registered.
37-
1. Search for and select **Azure Active Directory**.
38-
1. Under **Manage**, select **App registrations**, select your application, and then select **Manifest** to use the manifest editor.
35+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
36+
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant where the application is registered.
37+
1. Browse to **Identity** > **Applications** > **App registrations**.
38+
1. Select your application, and then select **Manifest** to use the manifest editor.
3939
1. Download the manifest JSON file locally.
4040
1. Now, specify who can use the application, sometimes referred to as the *sign-in audience*. Find the *signInAudience* property in the manifest JSON file and set it to one of the following property values:
4141

articles/active-directory/develop/jwt-claims-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.workload: identity
1010
ms.topic: how-to
1111
ms.date: 05/01/2023
1212
ms.author: davidmu
13-
ms.custom: aaddev, curation-claims
13+
ms.custom: aaddev, curation-claims, devx-track-dotnet
1414
ms.reviewer: rahulnagraj, alamaral
1515
---
1616

articles/active-directory/develop/quickstart-console-app-netcore-acquire-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.date: 03/13/2023
1212
ms.author: owenrichards
1313
ms.reviewer: jmprieur
14-
ms.custom: devx-track-csharp, aaddev, identityplatformtop40, "scenarios:getting-started", "languages:aspnet-core", mode-other
14+
ms.custom: devx-track-csharp, aaddev, identityplatformtop40, 'scenarios:getting-started', 'languages:aspnet-core', mode-other, devx-track-dotnet
1515
#Customer intent: As an application developer, I want to learn how my .NET Core app can get an access token and call an API that's protected by the Microsoft identity platform by using the client credentials flow.
1616
---
1717

articles/active-directory/develop/quickstart-console-app-nodejs-acquire-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ ms.subservice: develop
99
ms.topic: quickstart
1010
ms.date: 09/09/2022
1111
ms.author: cwerner
12+
ms.custom: mode-other, devx-track-js
1213
#Customer intent: As an application developer, I want to learn how my Node.js app can get an access token and call an API that is protected by a Microsoft identity platform endpoint using client credentials flow.
13-
ms.custom: mode-other
1414
---
1515

1616
# Quickstart: Acquire a token and call Microsoft Graph from a Node.js console app

articles/active-directory/develop/quickstart-daemon-app-java-acquire-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: quickstart
1010
ms.workload: identity
1111
ms.date: 01/10/2022
1212
ms.author: dmwendia
13-
ms.custom: aaddev, "scenarios:getting-started", "languages:Java", devx-track-java, mode-other
13+
ms.custom: aaddev, 'scenarios:getting-started', 'languages:Java', devx-track-java, mode-other, devx-track-extended-java
1414
#Customer intent: As an application developer, I want to learn how my Java app can get an access token and call an API that's protected by Microsoft identity platform endpoint using client credentials flow.
1515
---
1616

articles/active-directory/develop/quickstart-desktop-app-nodejs-electron-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.subservice: develop
99
ms.topic: quickstart
1010
ms.date: 01/14/2022
1111
ms.author: cwerner
12-
ms.custom: mode-api
12+
ms.custom: mode-api, devx-track-js
1313
#Customer intent: As an application developer, I want to learn how my Node.js Electron desktop application can get an access token and call an API that's protected by a Microsoft identity platform endpoint.
1414
---
1515

articles/active-directory/develop/quickstart-web-app-java-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: develop
1010
ms.topic: quickstart
1111
ms.date: 01/18/2023
1212
ms.author: cwerner
13-
ms.custom: aaddev, scenarios:getting-started, languages:Java, devx-track-java
13+
ms.custom: aaddev, 'scenarios:getting-started', 'languages:Java', devx-track-java, devx-track-extended-java
1414
---
1515

1616
# Quickstart: Sign in users and call the Microsoft Graph API from a Java web app

0 commit comments

Comments
 (0)