Skip to content

Commit f3f0fcf

Browse files
authored
Merge pull request #99019 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 5c6c92a + 6baaa05 commit f3f0fcf

14 files changed

+53
-46
lines changed

articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ Once you've added app roles in your application, you can assign users and groups
121121

122122
- [Authorization in a web app using Azure AD application roles & role claims (Sample)](https://github.com/Azure-Samples/active-directory-dotnet-webapp-roleclaims)
123123
- [Using Security Groups and Application Roles in your apps (Video)](https://www.youtube.com/watch?v=V8VUPixLSiM)
124-
- [Azure Active Directory, now with Group Claims and Application Roles](https://cloudblogs.microsoft.com/enterprisemobility/2014/12/18/azure-active-directory-now-with-group-claims-and-application-roles)
124+
- [Azure Active Directory, now with Group Claims and Application Roles](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-Active-Directory-now-with-Group-Claims-and-Application/ba-p/243862)
125125
- [Azure Active Directory app manifest](https://docs.microsoft.com/azure/active-directory/develop/reference-app-manifest)
126126
- [AAD Access tokens](access-tokens.md)
127127
- [AAD `id_tokens`](id-tokens.md)

articles/active-directory/develop/msal-net-xamarin-android-considerations.md

Lines changed: 19 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Xamarin Android considerations (MSAL.NET) | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn about specific considerations when using Xamarin Android with the Microsoft Authentication Library for .NET (MSAL.NET).
55
services: active-directory
6-
author: TylerMSFT
6+
author: jmprieur
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -80,6 +80,23 @@ The `AndroidManifest.xml` should contain the following values:
8080
</activity>
8181
```
8282

83+
Or, you can [create the activity in code](https://docs.microsoft.com/xamarin/android/platform/android-manifest#the-basics) and not manually edit `AndroidManifest.xml`. For that, you must create a class that has the `Activity` and `IntentFilter` attribute. A class that represents the same values of the above xml would be:
84+
85+
```csharp
86+
[Activity]
87+
[IntentFilter(new[] { Intent.ActionView },
88+
Categories = new[] { Intent.CategoryBrowsable, Intent.CategoryDefault },
89+
DataHost = "auth",
90+
DataScheme = "msal{client_id}")]
91+
public class MsalActivity : BrowserTabActivity
92+
{
93+
}
94+
```
95+
96+
### XamarinForms 4.3.X manifest
97+
98+
The code generated by XamarinForms 4.3.x sets the `package` attribute to `com.companyname.{appName}` in the `AndroidManifest.xml`. You might want to change the value to be same as the `MainActivity.cs` namespace, if you use the `DataScheme` as `msal{client_id}`.
99+
83100
## Use the embedded web view (optional)
84101

85102
By default MSAL.NET uses the system web browser, which enables you to get SSO with Web applications and other apps. In some rare cases, you might want to specify that you want to use the embedded web view. For more information, see [MSAL.NET uses a Web browser](msal-net-web-browsers.md) and [Android system browser](msal-net-system-browser-android-considerations.md).
@@ -124,4 +141,4 @@ More details and samples are provided in the [Android Specific Considerations](h
124141
125142
| Sample | Platform | Description |
126143
| ------ | -------- | ----------- |
127-
|[https://github.com/Azure-Samples/active-directory-xamarin-native-v2](https://github.com/azure-samples/active-directory-xamarin-native-v2) | Xamarin iOS, Android, UWP | A simple Xamarin Forms app showcasing how to use MSAL to authenticate MSA and Azure AD via the AADD v2.0 endpoint, and access the Microsoft Graph with the resulting token. <br>![Topology](media/msal-net-xamarin-android-considerations/topology.png) |
144+
|[https://github.com/Azure-Samples/active-directory-xamarin-native-v2](https://github.com/azure-samples/active-directory-xamarin-native-v2) | Xamarin iOS, Android, UWP | A simple Xamarin Forms app showcasing how to use MSAL to authenticate MSA and Azure AD via the AADD v2.0 endpoint, and access the Microsoft Graph with the resulting token. <br>![Topology](media/msal-net-xamarin-android-considerations/topology.png) |

articles/active-directory/develop/msal-net-xamarin-ios-considerations.md

Lines changed: 13 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Xamarin iOS considerations (MSAL.NET) | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn about specific considerations when using Xamarin iOS with the Microsoft Authentication Library for .NET (MSAL.NET).
55
services: active-directory
6-
author: TylerMSFT
6+
author: jmprieur
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -27,13 +27,6 @@ On Xamarin iOS, there are several considerations that you must take into account
2727
- [Enable token cache sharing](#enable-token-cache-sharing-across-ios-applications)
2828
- [Enable Keychain access](#enable-keychain-access)
2929

30-
## Known issues with iOS 12 and authentication
31-
Microsoft has released a [security advisory](https://github.com/aspnet/AspNetCore/issues/4647) to provide information about an incompatibility between iOS12 and some types of authentication. The incompatibility breaks social, WSFed, and OIDC logins. This advisory also provides guidance on what developers can do to remove current security restrictions added by ASP.NET to their applications to become compatible with iOS12.
32-
33-
When developing MSAL.NET applications on Xamarin iOS, you may see an infinite loop when trying to sign in to websites from iOS 12 (similar to this [ADAL issue](https://github.com/AzureAD/azure-activedirectory-library-for-dotnet/issues/1329).
34-
35-
You might also see a break in ASP.NET Core OIDC authentication with iOS 12 Safari as described in this [WebKit issue](https://bugs.webkit.org/show_bug.cgi?id=188165).
36-
3730
## Implement OpenUrl
3831

3932
First you need to override the `OpenUrl` method of the `FormsApplicationDelegate` derived class and call `AuthenticationContinuationHelper.SetAuthenticationContinuationEventArgs`.
@@ -53,40 +46,28 @@ You'll also need to define a URL scheme, require permissions for your app to cal
5346
To enable keychain access, your application must have a keychain access group.
5447
You can set your keychain access group by using the `WithIosKeychainSecurityGroup()` api when creating your application as shown below:
5548

56-
To enable single sign-on, you need to set the `PublicClientApplication.iOSKeychainSecurityGroup` property to the same value in all of the applications.
49+
To benefit from the cache and single sign-on, you need to set the keychain access group to the same value in all of your applications.
5750

58-
An example of this using MSAL v3.x would be:
51+
An example of this using MSAL v4.x would be:
5952
```csharp
6053
var builder = PublicClientApplicationBuilder
6154
.Create(ClientId)
62-
.WithIosKeychainSecurityGroup("com.microsoft.msalrocks")
55+
.WithIosKeychainSecurityGroup("com.microsoft.adalcache")
6356
.Build();
6457
```
6558

66-
The entitlements.plist should be updated to look like the following XML fragment:
67-
6859
This change is *in addition* to enabling keychain access in the `Entitlements.plist` file, using either the below access group or your own:
6960

7061
```xml
71-
<?xml version="1.0" encoding="UTF-8" ?>
72-
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
73-
<plist version="1.0">
7462
<dict>
7563
<key>keychain-access-groups</key>
7664
<array>
77-
<string>$(AppIdentifierPrefix)com.microsoft.msalrocks</string>
65+
<string>$(AppIdentifierPrefix)com.microsoft.adalcache</string>
7866
</array>
7967
</dict>
80-
</plist>
8168
```
8269

83-
An example of this using MSAL v4.x would be:
84-
85-
```csharp
86-
PublicClientApplication.iOSKeychainSecurityGroup = "com.microsoft.msalrocks";
87-
```
88-
89-
When using the `WithIosKeychainSecurityGroup()` api, MSAL will automatically append your security group to the end of the application's "team ID" (AppIdentifierPrefix) because when you build your application using xcode, it will do the same. [See iOS entitlements documentation for more details](https://developer.apple.com/documentation/security/keychain_services/keychain_items/sharing_access_to_keychain_items_among_a_collection_of_apps). That's why you need to update the entitlements to include $(AppIdentifierPrefix) before the keychain access group in the entitlements.plist.
70+
When you use the `WithIosKeychainSecurityGroup()` api, MSAL automatically appends your security group to the end of the application's *team ID* (AppIdentifierPrefix) because when you build your application using xcode, it will do the same. For more information, see [iOS entitlements documentation](https://developer.apple.com/documentation/security/keychain_services/keychain_items/sharing_access_to_keychain_items_among_a_collection_of_apps). That's why the entitlements need to include `$(AppIdentifierPrefix)` before the keychain access group in the `Entitlements.plist`.
9071

9172
### Enable token cache sharing across iOS applications
9273

@@ -125,3 +106,10 @@ Sample | Platform | Description
125106
[https://github.com/Azure-Samples/active-directory-xamarin-native-v2](https://github.com/azure-samples/active-directory-xamarin-native-v2) | Xamarin iOS, Android, UWP | A simple Xamarin Forms app showcasing how to use MSAL to authenticate MSA and Azure AD via the Azure AD V2.0 endpoint, and access the Microsoft Graph with the resulting token.
126107

127108
<!--- https://github.com/Azure-Samples/active-directory-xamarin-native-v2/blob/master/ReadmeFiles/Topology.png -->
109+
110+
## Known issues with iOS 12 and authentication
111+
Microsoft has released a [security advisory](https://github.com/aspnet/AspNetCore/issues/4647) to provide information about an incompatibility between iOS12 and some types of authentication. The incompatibility breaks social, WSFed, and OIDC logins. This advisory also provides guidance on what developers can do to remove current security restrictions added by ASP.NET to their applications to become compatible with iOS12.
112+
113+
When developing MSAL.NET applications on Xamarin iOS, you might see an infinite loop when trying to sign in to websites from iOS 12 (similar to this [ADAL issue](https://github.com/AzureAD/azure-activedirectory-library-for-dotnet/issues/1329)).
114+
115+
You might also see a break in ASP.NET Core OIDC authentication with iOS 12 Safari as described in this [WebKit issue](https://bugs.webkit.org/show_bug.cgi?id=188165).

articles/asc-for-iot/how-to-deploy-linux-cs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To deploy the security agent, use the following steps:
4848

4949
1. Add running permissions to the **InstallSecurityAgent script** by running `chmod +x InstallSecurityAgent.sh`
5050

51-
1. Next, run:
51+
1. Next, run the following command with **root privileges**:
5252

5353
```
5454
./InstallSecurityAgent.sh -i -aui <authentication identity> -aum <authentication method> -f <file path> -hn <host name> -di <device id> -cl <certificate location kind>
@@ -122,4 +122,4 @@ To uninstall the agent, run the script with the –u parameter: `./InstallSecuri
122122
- Learn more about Azure Security Center for IoT [Architecture](architecture.md)
123123
- Enable the [service](quickstart-onboard-iot-hub.md)
124124
- Read the [FAQ](resources-frequently-asked-questions.md)
125-
- Understand [alerts](concept-security-alerts.md)
125+
- Understand [alerts](concept-security-alerts.md)

articles/azure-monitor/app/azure-vm-vmss-apps.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ There are two ways to enable application monitoring for Azure virtual machines a
4646
## Manage Application Insights Agent for .NET applications on Azure virtual machines using PowerShell
4747

4848
> [!NOTE]
49-
> Before installing the Application Insights Agent, you'll need an instrumentation key. [Create a new Application Insights Resource](https://docs.microsoft.com/azure/azure-monitor/app/create-new-resource) or copy the instrumentation key from an existing application insights resource.
49+
> Before installing the Application Insights Agent, you'll need a connection string. [Create a new Application Insights Resource](https://docs.microsoft.com/azure/azure-monitor/app/create-new-resource) or copy the connection string from an existing application insights resource.
5050
5151
> [!NOTE]
5252
> New to powershell? Check out the [Get Started Guide](https://docs.microsoft.com/powershell/azure/get-started-azureps?view=azps-2.5.0).
@@ -61,8 +61,9 @@ $publicCfgJsonString = '
6161
{
6262
"appFilter": ".*",
6363
"machineFilter": ".*",
64+
"virtualPathFilter": ".*",
6465
"instrumentationSettings" : {
65-
"instrumentationKey": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
66+
"connectionString": "InstrumentationKey=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
6667
}
6768
}
6869
]
@@ -101,7 +102,7 @@ Get-AzResource -ResourceId "/subscriptions/<mySubscriptionId>/resourceGroups/<my
101102
You may also view installed extensions in the [Azure virtual machine blade](https://docs.microsoft.com/azure/virtual-machines/extensions/overview) in the Portal.
102103

103104
> [!NOTE]
104-
> Verify installation by clicking on Live Metrics Stream within the Application Insights Resource associated with the instrumentation key you used to deploy the Application Insights Agent Extension. If you are sending data from multiple Virtual Machines, select the target Azure virtual machines under Server Name. It may take up to a minute for data to begin flowing.
105+
> Verify installation by clicking on Live Metrics Stream within the Application Insights Resource associated with the connection string you used to deploy the Application Insights Agent Extension. If you are sending data from multiple Virtual Machines, select the target Azure virtual machines under Server Name. It may take up to a minute for data to begin flowing.
105106
106107
## Manage Application Insights Agent for .NET applications on Azure virtual machine scale sets using powershell
107108

@@ -115,8 +116,9 @@ $publicCfgHashtable =
115116
@{
116117
"appFilter"= ".*";
117118
"machineFilter"= ".*";
118-
"instrumentationSettings"= @{
119-
"instrumentationKey"= "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"; # Application Insights Instrumentation Key, create new Application Insights resource if you don't have one. https://ms.portal.azure.com/#blade/HubsExtension/BrowseResourceBlade/resourceType/microsoft.insights%2Fcomponents
119+
"virtualPathFilter": ".*",
120+
"instrumentationSettings" : {
121+
"connectionString": "InstrumentationKey=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" # Application Insights connection string, create new Application Insights resource if you don't have one. https://ms.portal.azure.com/#blade/HubsExtension/BrowseResourceBlade/resourceType/microsoft.insights%2Fcomponents
120122
}
121123
}
122124
)

articles/azure-monitor/app/opencensus-go.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ First you have to create an Application Insights resource which will generate an
3939
4040
A configuration box appears; use the following table to fill out the input fields.
4141

42-
| Settings | Value | Description |
42+
| Settings | Value | Description |
4343
| ------------- |:-------------|:-----|
4444
| **Name** | Globally Unique Value | Name that identifies the app you are monitoring |
4545
| **Resource Group** | myResourceGroup | Name for the new resource group to host App Insights data |

articles/billing/billing-avoid-charges-free-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Let's look at some of the reasons you can incur charges on your Azure free accou
2020

2121
## Your credit runs out or is expired
2222

23-
Your subscription and services are disabled when your credit runs out or expires at the end of 30 days. To continue using Azure services, you must upgrade your account. For more information, see [Upgrade your Azure free account](billing-upgrade-azure-subscription.md). After you upgrade, you still have access to free services for 12 month and you get charged only for usage beyond the free services and quantities.
23+
Your subscription and services are disabled when your credit runs out or expires at the end of 30 days. To continue using Azure services, you must upgrade your account. For more information, see [Upgrade your Azure free account](billing-upgrade-azure-subscription.md). After you upgrade, you still have access to free services for 12 months and you get charged only for usage beyond the free services and quantities.
2424

2525

2626
## Usage exceeds the limits of free services

articles/cosmos-db/online-backup-and-restore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Cnline backup and on-demand data restore in Azure Cosmos DB
2+
title: Online backup and on-demand data restore in Azure Cosmos DB
33
description: This article describes how automatic, online backup and on-demand data restore works in Azure Cosmos DB.
44
author: kanshiG
55
ms.service: cosmos-db

articles/iot-accelerators/howto-opc-vault-secure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Now it depends on the OPC UA device how to apply the new key pair. Typically, th
9494

9595
Now it depends on the OPC UA device how to apply the new certificate. Typically, the CA cert and CRL are copied to a `trusted` folder, while the application certificate is applied to an `own` folder in the certificate store. Some devices might already support server push for certificate updates. Refer to the documentation of your OPC UA device.
9696

97-
### Step 4: Device secured
97+
### Step 3: Device secured
9898

9999
The OPC UA device is now ready to communicate with other OPC UA devices secured by CA signed certificates, without further configuration.
100100

@@ -103,4 +103,4 @@ The OPC UA device is now ready to communicate with other OPC UA devices secured
103103
Now that you have learned how to secure OPC UA devices, you can:
104104

105105
> [!div class="nextstepaction"]
106-
> [Run a secure certificate management service](howto-opc-vault-secure-ca.md)
106+
> [Run a secure certificate management service](howto-opc-vault-secure-ca.md)

articles/iot-central/preview/tutorial-define-edge-device-type.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -395,4 +395,4 @@ In this tutorial, you learned how to:
395395
Now that you've created a device template in your Azure IoT Central application, you can do this next:
396396

397397
> [!div class="nextstepaction"]
398-
> [Connect device](./tutorial-connect-pnp-device.md)
398+
> [Connect edge device](./tutorial-add-edge-as-leaf-device.md)

0 commit comments

Comments
 (0)