Skip to content

Commit f0e233c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into azuread-elm-configurationmyaccess
2 parents 30777f0 + c5b5bac commit f0e233c

File tree

143 files changed

+3034
-3033
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

143 files changed

+3034
-3033
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21223,11 +21223,6 @@
2122321223
"redirect_url": "/azure/machine-learning/tutorial-train-models-with-aml",
2122421224
"redirect_document_id": true
2122521225
},
21226-
{
21227-
"source_path_from_root": "/articles/machine-learning/service/reference-pipeline-yaml.md",
21228-
"redirect_url": "/azure/machine-learning/reference-yaml-job-pipeline",
21229-
"redirect_document_id": false
21230-
},
2123121226
{
2123221227
"source_path_from_root": "/articles/machine-learning/tutorial-pipeline-batch-scoring-classification.md",
2123321228
"redirect_url": "/azure/machine-learning/tutorial-pipeline-python-sdk",

articles/active-directory-b2c/identity-verification-proofing.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ Microsoft partners with the following ISV partners.
2727

2828
| ISV partner | Description and integration walkthroughs |
2929
|:-------------------------|:--------------|
30+
| ![Screenshot of a eid-me logo](./media/partner-gallery/eid-me-logo.png) | [eID-Me](./partner-eid-me.md) is an identity verification and decentralized digital identity solution for Canadian citizens. It enables organizations to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |
3031
|![Screenshot of an Experian logo.](./media/partner-gallery/experian-logo.png) | [Experian](./partner-experian.md) is an Identity verification and proofing provider that performs risk assessments based on user attributes to prevent fraud. |
3132
|![Screenshot of an IDology logo.](./media/partner-gallery/idology-logo.png) | [IDology](./partner-idology.md) is an Identity verification and proofing provider with ID verification solutions, fraud prevention solutions, compliance solutions, and others.|
3233
|![Screenshot of a Jumio logo.](./media/partner-gallery/jumio-logo.png) | [Jumio](./partner-jumio.md) is an ID verification service, which enables real-time automated ID verification, safeguarding customer data. |
@@ -41,4 +42,4 @@ Microsoft partners with the following ISV partners.
4142

4243
## Next steps
4344

44-
Select a partner in the tables mentioned to learn how to integrate their solution with Azure AD B2C.
45+
Select a partner in the tables mentioned to learn how to integrate their solution with Azure AD B2C.
133 Bytes
Loading

articles/active-directory/authentication/howto-password-ban-bad-on-premises-agent-versions.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,19 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Azure AD Password Protection agent version history
1919

20+
## 1.2.177.1
21+
22+
Release date: March 28, 2022
23+
24+
* Fixed software version being incorrect
25+
26+
## 1.2.177.0
27+
28+
Release date: March 14, 2022
29+
30+
* Minor bugfixes
31+
* Fixed issue with Azure AD Connect Agent Updater not being updated
32+
2033
## 1.2.176.0
2134

2235
Release date: June 4, 2021

articles/active-directory/develop/consent-framework.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Azure AD consent framework
2+
title: Microsoft identity platform consent framework
33
titleSuffix: Microsoft identity platform
4-
description: Learn about the consent framework in Azure Active Directory and how it makes it easy to develop multi-tenant web and native client applications.
4+
description: Learn about the consent framework in the Microsoft identity platform and how it applies to multi-tenant applications.
55
services: active-directory
66
author: rwike77
77
manager: CelesteDG
@@ -10,21 +10,17 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
1212
ms.workload: identity
13-
ms.date: 03/14/2022
13+
ms.date: 03/29/2022
1414
ms.author: ryanwi
1515
ms.reviewer: phsignor, jesakowi
1616
ms.custom:
1717
---
1818

19-
# Azure Active Directory consent framework
19+
# Microsoft identity platform consent framework
2020

21-
The Azure Active Directory (Azure AD) consent framework makes it easy to develop multi-tenant web and native client applications. These applications allow sign-in by user accounts from an Azure AD tenant that's different from the one where the application is registered. They may also need to access web APIs such as the Microsoft Graph API (to access Azure AD, Intune, and services in Microsoft 365) and other Microsoft services' APIs, in addition to your own web APIs.
21+
Multi-tenant applications allow sign-ins by user accounts from Azure AD tenants other than the tenant in which the app was initially registered. The Microsoft identity platform consent framework enables a tenant administrator or user in these other tenants to consent to (or deny) an application's request for permission to access their resources.
2222

23-
The framework is based on a user or an administrator giving consent to an application that asks to be registered in their directory, which may involve accessing directory data. For example, if a web client application needs to read calendar information about the user from Microsoft 365, that user is required to consent to the client application first. After consent is given, the client application will be able to call the Microsoft Graph API on behalf of the user, and use the calendar information as needed. The [Microsoft Graph API](https://developer.microsoft.com/graph) provides access to data in Microsoft 365 (like calendars and messages from Exchange, sites and lists from SharePoint, documents from OneDrive, notebooks from OneNote, tasks from Planner, and workbooks from Excel), as well as users and groups from Azure AD and other data objects from more Microsoft cloud services.
24-
25-
The consent framework is built on OAuth 2.0 and its various flows, such as authorization code grant and client credentials grant, using public or confidential clients. By using OAuth 2.0, Azure AD makes it possible to build many different types of client applications--such as on a phone, tablet, server, or a web application--and gain access to the required resources.
26-
27-
For more info about using the consent framework with OAuth2.0 authorization grants, see [Authorize access to web applications using OAuth 2.0 and Azure AD](v2-oauth2-auth-code-flow.md) and [Authentication scenarios for Azure AD](./authentication-vs-authorization.md). For info about getting authorized access to Microsoft 365 through Microsoft Graph, see [App authentication with Microsoft Graph](/graph/).
23+
For example, perhaps a web application requires read-only access to a user's calendar in Microsoft 365. It's the identity platform's consent framework that enables the prompt asking the user to consent to the app's request for permission to read their calendar. If the user consents, the application is able to call the Microsoft Graph API on their behalf and get their calendar data.
2824

2925
## Consent experience - an example
3026

@@ -60,4 +56,4 @@ The following steps show you how the consent experience works for both the appli
6056
6157
## Next steps
6258

63-
See [how to convert an app to be multi-tenant](howto-convert-app-to-be-multi-tenant.md)
59+
See [how to convert an app to multi-tenant](howto-convert-app-to-be-multi-tenant.md)

0 commit comments

Comments
 (0)