Skip to content

Commit f2d9d51

Browse files
authored
Merge pull request #90498 from MicrosoftDocs/master
10/03 AM Publish
2 parents 15e3bfb + 1a995ea commit f2d9d51

File tree

65 files changed

+949
-529
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

65 files changed

+949
-529
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17094,6 +17094,11 @@
1709417094
"redirect_url": "/azure/service-fabric/service-fabric-tutorial-deploy-app-to-party-cluster",
1709517095
"redirect_document_id": false
1709617096
},
17097+
{
17098+
"source_path": "articles/migrate/preserve-drive-letter-protected-virtual-machines-failed-migrated-azure.md",
17099+
"redirect_url": "prepare-for-migration",
17100+
"redirect_document_id": false
17101+
},
1709717102
{
1709817103
"source_path": "articles/migrate/how-to-prepare-linux-for-migration.md",
1709917104
"redirect_url": "tutorial-prepare-vmware",

articles/active-directory-b2c/active-directory-b2c-reference-sspr.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ By default, your directory doesn't have self-service password reset turned on. U
2626

2727
1. Sign in to the [Azure portal](https://portal.azure.com/) as the Subscription Administrator. This is the same work or school account or the same Microsoft account that you used to create your directory.
2828
2. Open **Azure Active Directory** (in the navigation bar on the left side).
29+
3. Scroll down on the options blade and select **Password reset**.
2930
4. Set **Self service password reset enabled** to **All**.
3031
5. Click **Save** at the top of the page. You're done!
3132

articles/active-directory-b2c/date-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ Checks that one date and time claim (string data type) is later than a second da
2525

2626
| Item | TransformationClaimType | Data Type | Notes |
2727
| ---- | ----------------------- | --------- | ----- |
28-
| inputClaim | leftOperand | string | First claim's type, which should be later than the second claim. |
29-
| inputClaim | rightOperand | string | Second claim's type, which should be earlier than the first claim. |
28+
| InputClaim | leftOperand | string | First claim's type, which should be later than the second claim. |
29+
| InputClaim | rightOperand | string | Second claim's type, which should be earlier than the first claim. |
3030
| InputParameter | AssertIfEqualTo | boolean | Specifies whether this assertion should pass if the left operand is equal to the right operand. |
3131
| InputParameter | AssertIfRightOperandIsNotPresent | boolean | Specifies whether this assertion should pass if the right operand is missing. |
3232
| InputParameter | TreatAsEqualIfWithinMillseconds | int | Specifies the number of milliseconds to allow between the two date times to consider the times equal (for example, to account for clock skew). |

articles/active-directory-b2c/string-transformations.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ Compare two claims, and throw an exception if they are not equal according to th
2525

2626
| Item | TransformationClaimType | Data Type | Notes |
2727
| ---- | ----------------------- | --------- | ----- |
28-
| inputClaim | inputClaim1 | string | First claim's type, which is to be compared. |
29-
| inputClaim | inputClaim2 | string | Second claim's type, which is to be compared. |
28+
| InputClaim | inputClaim1 | string | First claim's type, which is to be compared. |
29+
| InputClaim | inputClaim2 | string | Second claim's type, which is to be compared. |
3030
| InputParameter | stringComparison | string | string comparison, one of the values: Ordinal, OrdinalIgnoreCase. |
3131

3232
The **AssertStringClaimsAreEqual** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationStringsAreNotEqual** self-asserted technical profile metadata controls the error message that is presented to the user.
@@ -150,8 +150,8 @@ Determine whether one string claim is equal to another. The result is a new bool
150150

151151
| Item | TransformationClaimType | Data Type | Notes |
152152
| ---- | ----------------------- | --------- | ----- |
153-
| inputClaim | inputClaim1 | string | First claim type, which is to be compared. |
154-
| inputClaim | inputClaim2 | string | Second claim type, which is to be compared. |
153+
| InputClaim | inputClaim1 | string | First claim type, which is to be compared. |
154+
| InputClaim | inputClaim2 | string | Second claim type, which is to be compared. |
155155
| InputParameter | operator | string | Possible values: `EQUAL` or `NOT EQUAL`. |
156156
| InputParameter | ignoreCase | boolean | Specifies whether this comparison should ignore the case of the strings being compared. |
157157
| OutputClaim | outputClaim | boolean | The ClaimType that is produced after this claims transformation has been invoked. |
@@ -191,7 +191,7 @@ Determines whether a claim value is equal to the input parameter value.
191191

192192
| Item | TransformationClaimType | Data Type | Notes |
193193
| ---- | ----------------------- | --------- | ----- |
194-
| inputClaim | inputClaim1 | string | The claim's type, which is to be compared. |
194+
| InputClaim | inputClaim1 | string | The claim's type, which is to be compared. |
195195
| InputParameter | operator | string | Possible values: `EQUAL` or `NOT EQUAL`. |
196196
| InputParameter | compareTo | string | string comparison, one of the values: Ordinal, OrdinalIgnoreCase. |
197197
| InputParameter | ignoreCase | boolean | Specifies whether this comparison should ignore the case of the strings being compared. |
@@ -500,7 +500,7 @@ Checks that a string claim and `matchTo` input parameter are equal, and sets the
500500

501501
| Item | TransformationClaimType | Data Type | Notes |
502502
| ---- | ----------------------- | --------- | ----- |
503-
| inputClaim | inputClaim | string | The claim type, which is to be compared. |
503+
| InputClaim | inputClaim | string | The claim type, which is to be compared. |
504504
| InputParameter | matchTo | string | The string to be compared with `inputClaim`. |
505505
| InputParameter | stringComparison | string | Possible values: `Ordinal` or `OrdinalIgnoreCase`. |
506506
| InputParameter | stringMatchMsg | string | First value to be set if strings are equal. |
@@ -549,7 +549,7 @@ Checks that a string claim and `matchTo` input parameter are equal, and sets the
549549

550550
| Item | TransformationClaimType | Data Type | Notes |
551551
| ---- | ----------------------- | --------- | ----- |
552-
| inputClaim | claimToMatch | string | The claim type, which is to be compared. |
552+
| InputClaim | claimToMatch | string | The claim type, which is to be compared. |
553553
| InputParameter | matchTo | string | The string to be compared with inputClaim. |
554554
| InputParameter | stringComparison | string | Possible values: `Ordinal` or `OrdinalIgnoreCase`. |
555555
| InputParameter | outputClaimIfMatched | string | The value to be set if strings are equal. |

articles/active-directory/develop/active-directory-saml-claims-customization.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,6 @@ From the **Choose name identifier format** dropdown, you can select one of the f
6161
| **Persistent** | Azure AD will use Persistent as the NameID format. |
6262
| **EmailAddress** | Azure AD will use EmailAddress as the NameID format. |
6363
| **Unspecified** | Azure AD will use Unspecified as the NameID format. |
64-
| **Transient** | Azure AD will use Transient as the NameID format. |
6564

6665
To learn more about the NameIDPolicy attribute, see [Single Sign-On SAML protocol](single-sign-on-saml-protocol.md).
6766

articles/active-directory/develop/registration-config-multi-tenant-application-add-to-gallery-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Azure Active Directory (Azure AD) is a cloud-based identity service. The [Azure
3030
## If your application supports SAML or OpenIDConnect
3131
If you have a multitenant application that you want listed in the Azure AD application gallery, you must first make sure that your application supports one of the following single sign-on technologies:
3232

33-
- **OpenID Connect**: To have your app listed, create the multitenant application in Azure AD and implement the [Azure AD consent framework](https://docs.microsoft.com/azure/active-directory/develop/active-directory-integrating-applications) for your application. Send the login request to a common endpoint so that any customer can provide consent to the application. You can control a user's access based on the tenant ID and the user's UPN received in the token. Submit the application by using the process outlined in [Listing your application in the Azure Active Directory application gallery](https://docs.microsoft.com/azure/active-directory/develop/active-directory-app-gallery-listing).
33+
- **OpenID Connect**: To have your app listed, create the multitenant application in Azure AD and implement the [Azure AD consent framework](https://docs.microsoft.com/azure/active-directory/develop/consent-framework) for your application. Send the login request to a common endpoint so that any customer can provide consent to the application. You can control a user's access based on the tenant ID and the user's UPN received in the token. Submit the application by using the process outlined in [Listing your application in the Azure Active Directory application gallery](https://docs.microsoft.com/azure/active-directory/develop/active-directory-app-gallery-listing).
3434

3535
- **SAML**: If your application supports SAML 2.0, the app can be listed in the gallery. Follow the instructions in [Listing your application in the Azure Active Directory application gallery](https://docs.microsoft.com/azure/active-directory/develop/active-directory-app-gallery-listing).
3636

articles/active-directory/develop/scenario-web-api-call-api-app-configuration.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -107,40 +107,40 @@ In practice, the OBO flow is often used to acquire a token for a downstream API
107107
```CSharp
108108
private void AddAccountToCacheFromJwt(IEnumerable<string> scopes, JwtSecurityToken jwtToken, ClaimsPrincipal principal, HttpContext httpContext)
109109
{
110-
try
111-
{
112-
UserAssertion userAssertion;
113-
IEnumerable<string> requestedScopes;
114-
if (jwtToken != null)
115-
{
116-
userAssertion = new UserAssertion(jwtToken.RawData, "urn:ietf:params:oauth:grant-type:jwt-bearer");
117-
requestedScopes = scopes ?? jwtToken.Audiences.Select(a => $"{a}/.default");
118-
}
119-
else
120-
{
121-
throw new ArgumentOutOfRangeException("tokenValidationContext.SecurityToken should be a JWT Token");
122-
}
123-
124-
// Create the application
125-
var application = BuildConfidentialClientApplication(httpContext, principal);
126-
127-
// .Result to make sure that the cache is filled-in before the controller tries to get access tokens
128-
var result = application.AcquireTokenOnBehalfOf(requestedScopes.Except(scopesRequestedByMsalNet),
129-
userAssertion)
130-
.ExecuteAsync()
131-
.GetAwaiter().GetResult();
132-
}
133-
catch (MsalException ex)
134-
{
135-
Debug.WriteLine(ex.Message);
136-
throw;
137-
}
110+
try
111+
{
112+
UserAssertion userAssertion;
113+
IEnumerable<string> requestedScopes;
114+
if (jwtToken != null)
115+
{
116+
userAssertion = new UserAssertion(jwtToken.RawData, "urn:ietf:params:oauth:grant-type:jwt-bearer");
117+
requestedScopes = scopes ?? jwtToken.Audiences.Select(a => $"{a}/.default");
118+
}
119+
else
120+
{
121+
throw new ArgumentOutOfRangeException("tokenValidationContext.SecurityToken should be a JWT Token");
122+
}
123+
124+
// Create the application
125+
var application = BuildConfidentialClientApplication(httpContext, principal);
126+
127+
// .Result to make sure that the cache is filled-in before the controller tries to get access tokens
128+
var result = application.AcquireTokenOnBehalfOf(requestedScopes.Except(scopesRequestedByMsalNet),
129+
userAssertion)
130+
.ExecuteAsync()
131+
.GetAwaiter().GetResult();
132+
}
133+
catch (MsalException ex)
134+
{
135+
Debug.WriteLine(ex.Message);
136+
throw;
137+
}
138138
}
139139
```
140140

141141
## Protocol
142142

143-
For more information about the on-behalf-of protocol, see [Microsoft identity platform and OAuth 2.0 On-Behalf-Of flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow)
143+
For more information about the on-behalf-of protocol, see [Microsoft identity platform and OAuth 2.0 On-Behalf-Of flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow).
144144

145145
## Next steps
146146

articles/active-directory/manage-apps/application-proxy-integrate-with-power-bi.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -117,6 +117,8 @@ Before the Power BI mobile app can connect and access Report Services, you must
117117
When configuring the app for Power BI Mobile **Android**, add the following Redirect URIs of type Public Client (Mobile & Desktop):
118118
- `urn:ietf:wg:oauth:2.0:oob`
119119
- `mspbi-adal://com.microsoft.powerbimobile`
120+
- `msauth://com.microsoft.powerbim/g79ekQEgXBL5foHfTlO2TPawrbI%3D`
121+
- `msauth://com.microsoft.powerbim/izba1HXNWrSmQ7ZvMXgqeZPtNEU%3D`
120122

121123
> [!IMPORTANT]
122124
> The Redirect URIs must be added for the application to work correctly. If you are configuring the app for both Power BI Mobile iOS and Android, add the following Redirect URI of type Public Client (Mobile & Desktop) to the list of Redirect URIs configured for iOS: `urn:ietf:wg:oauth:2.0:oob`.

articles/application-gateway/create-custom-waf-rules.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ $condition1 = New-AzApplicationGatewayFirewallCondition `
140140
141141
$rule = New-AzApplicationGatewayFirewallCustomRule `
142142
-Name myrule1 `
143-
-Priority 100 `
143+
-Priority 10 `
144144
-RuleType MatchRule `
145145
-MatchCondition $condition1 `
146146
-Action Block
@@ -154,7 +154,7 @@ Here's the corresponding JSON:
154154
{
155155
"name": "myrule1",
156156
"ruleType": "MatchRule",
157-
"priority": 100,
157+
"priority": 10,
158158
"action": "Block",
159159
"matchConditions": [
160160
{
@@ -202,7 +202,7 @@ $condition2 = New-AzApplicationGatewayFirewallCondition `
202202
203203
$rule = New-AzApplicationGatewayFirewallCustomRule `
204204
-Name myrule `
205-
-Priority 100 `
205+
-Priority 10 `
206206
-RuleType MatchRule `
207207
-MatchCondition $condition1, $condition2 `
208208
-Action Block
@@ -217,7 +217,7 @@ Here's the corresponding JSON:
217217
{
218218
"name": "myrule",
219219
"ruleType": "MatchRule",
220-
"priority": 100,
220+
"priority": 10,
221221
"action": "block",
222222
"matchConditions": [
223223
{
@@ -274,14 +274,14 @@ $condition2 = New-AzApplicationGatewayFirewallCondition `
274274
275275
$rule1 = New-AzApplicationGatewayFirewallCustomRule `
276276
-Name myrule1 `
277-
-Priority 100 `
277+
-Priority 10 `
278278
-RuleType MatchRule `
279279
-MatchCondition $condition1 `
280280
-Action Block
281281
282282
$rule2 = New-AzApplicationGatewayFirewallCustomRule `
283283
-Name myrule2 `
284-
-Priority 200 `
284+
-Priority 20 `
285285
-RuleType MatchRule `
286286
-MatchCondition $condition2 `
287287
-Action Block
@@ -295,7 +295,7 @@ And the corresponding JSON:
295295
{
296296
"name": "myrule1",
297297
"ruleType": "MatchRule",
298-
"priority": 100,
298+
"priority": 10,
299299
"action": "block",
300300
"matchConditions": [
301301
{
@@ -311,7 +311,7 @@ And the corresponding JSON:
311311
{
312312
"name": "myrule2",
313313
"ruleType": "MatchRule",
314-
"priority": 200,
314+
"priority": 20,
315315
"action": "block",
316316
"matchConditions": [
317317
{
@@ -394,7 +394,7 @@ $condition1 = New-AzApplicationGatewayFirewallCondition `
394394
395395
$rule1 = New-AzApplicationGatewayFirewallCustomRule `
396396
-Name myrule1 `
397-
-Priority 100 `
397+
-Priority 10 `
398398
-RuleType MatchRule `
399399
-MatchCondition $condition1 `
400400
-Action Block
@@ -410,7 +410,7 @@ $condition2 = New-AzApplicationGatewayFirewallCondition `
410410
411411
$rule2 = New-AzApplicationGatewayFirewallCustomRule `
412412
-Name myrule2 `
413-
-Priority 200 `
413+
-Priority 20 `
414414
-RuleType MatchRule `
415415
-MatchCondition $condition2 `
416416
-Action Block
@@ -426,7 +426,7 @@ $condition3 = New-AzApplicationGatewayFirewallCondition `
426426
427427
$rule3 = New-AzApplicationGatewayFirewallCustomRule `
428428
-Name myrule3 `
429-
-Priority 300 `
429+
-Priority 30 `
430430
-RuleType MatchRule `
431431
-MatchCondition $condition3 `
432432
-Action Block
@@ -440,7 +440,7 @@ Corresponding JSON:
440440
{
441441
"name": "myrule1",
442442
"ruleType": "MatchRule",
443-
"priority": 100,
443+
"priority": 10,
444444
"action": "block",
445445
"matchConditions": [
446446
{
@@ -455,7 +455,7 @@ Corresponding JSON:
455455
{
456456
"name": "myrule2",
457457
"ruleType": "MatchRule",
458-
"priority": 100,
458+
"priority": 20,
459459
"action": "block",
460460
"matchConditions": [
461461
{
@@ -473,7 +473,7 @@ Corresponding JSON:
473473
{
474474
"name": "myrule3",
475475
"ruleType": "MatchRule",
476-
"priority": 100,
476+
"priority": 30,
477477
"action": "block",
478478
"matchConditions": [
479479
{

articles/application-gateway/custom-waf-rules-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,8 +91,8 @@ This is the name of the rule. This name appears in the logs.
9191

9292
### Priority [required]
9393

94-
- Determines the order that rules are evaluated in. The lower the value, the earlier the evaluation of the rule.
95-
-Must be unique amongst all custom rules. A rule with priority 100 will be evaluated before a rule with priority 200.
94+
- Determines the order that rules are evaluated in. The lower the value, the earlier the evaluation of the rule. The allowable range is from 1-100.
95+
- Must be unique amongst all custom rules. A rule with priority 40 will be evaluated before a rule with priority 80.
9696

9797
### Rule type [required]
9898

0 commit comments

Comments
 (0)