Skip to content

Commit f57297a

Browse files
authored
Merge pull request #114167 from MicrosoftDocs/master
5/06 PM Publish
2 parents 602e6db + 07e745c commit f57297a

File tree

111 files changed

+1994
-1245
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

111 files changed

+1994
-1245
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,11 @@
233233
"url": "https://github.com/Azure-Samples/azure-iot-samples-node",
234234
"branch": "master"
235235
},
236+
{
237+
"path_to_root": "azure-iot-sdk-node",
238+
"url": "https://github.com/Azure/azure-iot-sdk-node",
239+
"branch": "master"
240+
},
236241
{
237242
"path_to_root": "iot-samples-c",
238243
"url": "https://github.com/Azure/azure-iot-sdk-c",

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17800,6 +17800,11 @@
1780017800
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-load-with-data-factory",
1780117801
"redirect_document_id": false
1780217802
},
17803+
{
17804+
"source_path": "articles/synapse-analytics/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi.md",
17805+
"redirect_url": "/power-bi/service-azure-sql-data-warehouse-with-direct-connect",
17806+
"redirect_document_id": false
17807+
},
1780317808
{
1780417809
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-load-from-azure-blob-storage-with-data-factory.md",
1780517810
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-load-with-data-factory",
@@ -17937,7 +17942,7 @@
1793717942
},
1793817943
{
1793917944
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi.md",
17940-
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi",
17945+
"redirect_url": "/power-bi/service-azure-sql-data-warehouse-with-direct-connect",
1794117946
"redirect_document_id": true
1794217947
},
1794317948
{
@@ -28435,6 +28440,11 @@
2843528440
"redirect_url": "/azure/storage/files/storage-how-to-use-files-linux",
2843628441
"redirect_document_id": true
2843728442
},
28443+
{
28444+
"source_path": "articles/storage/files/storage-how-to-recover-deleted-account.md",
28445+
"redirect_url": "/azure/storage/common/storage-account-create",
28446+
"redirect_document_id": false
28447+
},
2843828448
{
2843928449
"source_path": "articles/storage/storage-https-custom-domain-cdn.md",
2844028450
"redirect_url": "/azure/storage/blobs/storage-https-custom-domain-cdn",

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 04/13/2020
9+
ms.date: 04/24/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -36,9 +36,9 @@ To complete this article, you need the following resources and privileges:
3636
* An Azure Active Directory tenant associated with your subscription.
3737
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3838
* You need *global administrator* privileges in your Azure AD tenant to enable SMS-based authentication.
39-
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
39+
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD, Office 365, or Microsoft 365 licenses:
4040
* [Azure AD Premium P1 or P2][azuread-licensing]
41-
* [Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing]
41+
* [Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing] or [Office 365 F1][o365-f1] or [F3][o365-f3]
4242
* [Enterprise Mobility + Security (EMS) E3 or E5][ems-licensing] or [Microsoft 365 (M365) E3 or E5][m365-licensing]
4343

4444
## Limitations
@@ -162,3 +162,5 @@ For additional ways to sign in to Azure AD without a password, such as the Micro
162162
[azuread-licensing]: https://azure.microsoft.com/pricing/details/active-directory/
163163
[ems-licensing]: https://www.microsoft.com/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing
164164
[m365-licensing]: https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans
165+
[o365-f1]: https://www.microsoft.com/microsoft-365/business/office-365-f1?market=af
166+
[o365-f3]: https://www.microsoft.com/microsoft-365/business/office-365-f3?activetab=pivot%3aoverviewtab

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -479,7 +479,7 @@ In this example, you create a policy that adds the EmployeeID and TenantCountry
479479
1. To create the policy, run the following command:
480480
481481
``` powershell
482-
New-AzureADPolicy -Definition @('{"ClaimsMappingPolicy":{"Version":1,"IncludeBasicClaimSet":"true", "ClaimsSchema": [{"Source":"user","ID":"employeeid","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name","JwtClaimType":"name"},{"Source":"company","ID":"tenantcountry","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/country","JwtClaimType":"country"}]}}') -DisplayName "ExtraClaimsExample" -Type "ClaimsMappingPolicy"
482+
New-AzureADPolicy -Definition @('{"ClaimsMappingPolicy":{"Version":1,"IncludeBasicClaimSet":"true", "ClaimsSchema": [{"Source":"user","ID":"employeeid","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/employeeid","JwtClaimType":"name"},{"Source":"company","ID":"tenantcountry","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/country","JwtClaimType":"country"}]}}') -DisplayName "ExtraClaimsExample" -Type "ClaimsMappingPolicy"
483483
```
484484
485485
2. To see your new policy, and to get the policy ObjectId, run the following command:

articles/active-directory/develop/quickstart-v2-javascript-auth-code.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ In this quickstart, you use a code sample to learn how a JavaScript single-page
109109
110110
> [!div renderon="portal" class="sxs-lookup"]
111111
> > [!NOTE]
112-
> > `Enter_the_Supported_Account_Info_Here`
112+
> > :::no-loc text="Enter_the_Supported_Account_Info_Here":::
113113
114114
> [!div renderon="docs"]
115115
>
@@ -175,15 +175,16 @@ Run the project with a web server by using [Node.js](https://nodejs.org/en/downl
175175
The MSAL.js library signs in users and requests the tokens that are used to access an API that's protected by Microsoft identity platform. The sample's *index.html* file contains a reference to the library:
176176
177177
```html
178-
<script type="text/javascript" src="https://alcdn.msftauth.net/lib/1.2.1/js/msal.js" integrity="sha384-9TV1245fz+BaI+VvCjMYL0YDMElLBwNS84v3mY57pXNOt6xcUYch2QLImaTahcOP" crossorigin="anonymous"></script>
178+
<script type="text/javascript" src="https://alcdn.msauth.net/browser/2.0.0-beta.0/js/msal-browser.js" integrity=
179+
"sha384-r7Qxfs6PYHyfoBR6zG62DGzptfLBxnREThAlcJyEfzJ4dq5rqExc1Xj3TPFE/9TH" crossorigin="anonymous"></script>
179180
```
180181
> [!TIP]
181182
> You can replace the preceding version with the latest released version under [MSAL.js releases](https://github.com/AzureAD/microsoft-authentication-library-for-js/releases).
182183
183184
Alternatively, if you have Node.js installed, you can download the latest version by using the Node.js Package Manager (npm):
184185
185186
```batch
186-
npm install msal
187+
npm install @azure/msal-browser
187188
```
188189
189190
## Next steps

articles/active-directory/develop/reference-breaking-changes.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 3/13/2020
12+
ms.date: 5/4/2020
1313
ms.author: ryanwi
1414
ms.reviewer: hirsin
1515
ms.custom: aaddev
@@ -33,13 +33,31 @@ The authentication system alters and adds features on an ongoing basis to improv
3333

3434
None scheduled at this time. Please see below for the changes that are in or are coming to production.
3535

36+
## May 2020
37+
38+
### Azure Government endpoints are changing
39+
40+
**Effective date**: May 5th (Finishing June 2020)
41+
42+
**Endpoints impacted**: All
43+
44+
**Protocol impacted**: All flows
45+
46+
On 1 June 2018, the official Azure Active Directory (AAD) Authority for Azure Government changed from `https://login-us.microsoftonline.com` to `https://login.microsoftonline.us`. This change also applied to Microsoft 365 GCC High and DoD, which Azure Government AAD also services. If you own an application within a US Government tenant, you must update your application to sign users in on the `.us` endpoint.
47+
48+
Starting May 5th, Azure AD will begin enforcing the endpoint change, blocking government users from signing into apps hosted in US Government tenants using the public endpoint (`microsoftonline.com`). Impacted apps will begin seeing an error `AADSTS900439` - `USGClientNotSupportedOnPublicEndpoint`. This error indicates that the app is attempting to sign in a US Government user on the public cloud endpoint. If your app is in a public cloud tenant and intended to support US Government users, you will need to [update your app to support them explicitly](https://docs.microsoft.com/azure/active-directory/develop/authentication-national-cloud). This may require creating a new app registration in the US Government cloud.
49+
50+
Enforcement of this change will be done using a gradual rollout based on how frequently users from the US Government cloud sign in to the application - apps signing in US Government users infrequently will see enforcement first, and apps frequently used by US Government users will be last to have enforcement applied. We expect enforcement to be complete across all apps in June 2020.
51+
52+
For more details, please see the [Azure Government blog post on this migration](https://devblogs.microsoft.com/azuregov/azure-government-aad-authority-endpoint-update/).
53+
3654
## March 2020
3755

3856
### User passwords will be restricted to 256 characters.
3957

4058
**Effective date**: March 13, 2020
4159

42-
**Endpoints impacted**: Both v1.0 and v2.0
60+
**Endpoints impacted**: All
4361

4462
**Protocol impacted**: All user flows.
4563

articles/active-directory/saas-apps/profitco-saml-app-tutorial.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Profit.co SAML App | Microsoft Docs'
3-
description: Learn how to configure single sign-on between Azure Active Directory and Profit.co SAML App.
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Profit.co | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Profit.co.
44
services: active-directory
55
documentationCenter: na
66
author: jeevansd
@@ -13,18 +13,18 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 03/27/2020
16+
ms.date: 04/30/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
2020
---
2121

22-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Profit.co SAML App
22+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Profit.co
2323

24-
In this tutorial, you'll learn how to integrate Profit.co SAML App with Azure Active Directory (Azure AD). When you integrate Profit.co SAML App with Azure AD, you can:
24+
In this tutorial, you'll learn how to integrate Profit.co with Azure Active Directory (Azure AD). When you integrate Profit.co with Azure AD, you can:
2525

26-
* Control in Azure AD who has access to Profit.co SAML App.
27-
* Enable your users to be automatically signed in to Profit.co SAML App with their Azure AD accounts.
26+
* Control in Azure AD who has access to Profit.co.
27+
* Enable your users to be automatically signed in to Profit.co with their Azure AD accounts.
2828
* Manage your accounts in one central location, the Azure portal.
2929

3030
To learn more about software as a service (SaaS) app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
@@ -34,45 +34,45 @@ To learn more about software as a service (SaaS) app integration with Azure AD,
3434
To get started, you need the following items:
3535

3636
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37-
* Profit.co SAML App single sign-on (SSO) enabled subscription.
37+
* Profit.co single sign-on (SSO) enabled subscription.
3838

3939
## Scenario description
4040

4141
In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

43-
* Profit.co SAML App supports IDP initiated SSO.
43+
* Profit.co supports IDP initiated SSO.
4444

45-
* After you configure Profit.co SAML App, you can enforce session control. This protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from conditional access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
45+
* After you configure Profit.co, you can enforce session control. This protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from conditional access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
4646

47-
## Add Profit.co SAML App from the gallery
47+
## Add Profit.co from the gallery
4848

49-
To configure the integration of Profit.co SAML App into Azure AD, you need to add Profit.co SAML App from the gallery to your list of managed SaaS apps.
49+
To configure the integration of Profit.co into Azure AD, you need to add Profit.co from the gallery to your list of managed SaaS apps.
5050

5151
1. Sign in to the [Azure portal](https://portal.azure.com) by using either a work or school account, or a personal Microsoft account.
5252
1. On the left navigation pane, select the **Azure Active Directory** service.
5353
1. Go to **Enterprise Applications**, and then select **All Applications**.
5454
1. To add a new application, select **New application**.
55-
1. In the **Add from the gallery** section, type **Profit.co SAML App** in the search box.
56-
1. Select **Profit.co SAML App** from the results panel, and then add the app. Wait a few seconds while the app is added to your tenant.
55+
1. In the **Add from the gallery** section, type **Profit.co** in the search box.
56+
1. Select **Profit.co** from the results panel, and then add the app. Wait a few seconds while the app is added to your tenant.
5757

58-
## Configure and test Azure AD single sign-on for Profit.co SAML App
58+
## Configure and test Azure AD single sign-on for Profit.co
5959

60-
Configure and test Azure AD SSO with Profit.co SAML App by using a test user called **B.Simon**. For SSO to work, establish a linked relationship between an Azure AD user and the related user in Profit.co SAML App.
60+
Configure and test Azure AD SSO with Profit.co by using a test user called **B.Simon**. For SSO to work, establish a linked relationship between an Azure AD user and the related user in Profit.co.
6161

62-
Here are the general steps to configure and test Azure AD SSO with Profit.co SAML App:
62+
Here are the general steps to configure and test Azure AD SSO with Profit.co:
6363

6464
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
6565
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B.Simon.
6666
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B.Simon to use Azure AD single sign-on.
67-
1. **[Configure Profit.co SAML App SSO](#configure-profitco-saml-app-sso)** to configure the single sign-on settings on the application side.
68-
1. **[Create Profit.co SAML App test user](#create-a-profitco-saml-app-test-user)** to have a counterpart of B.Simon in Profit.co SAML App. This counterpart is linked to the Azure AD representation of the user.
67+
1. **[Configure Profit.co SSO](#configure-profitco-sso)** to configure the single sign-on settings on the application side.
68+
1. **[Create Profit.co test user](#create-a-profitco-test-user)** to have a counterpart of B.Simon in Profit.co. This counterpart is linked to the Azure AD representation of the user.
6969
1. **[Test SSO](#test-sso)** to verify whether the configuration works.
7070

7171
## Configure Azure AD SSO
7272

7373
Follow these steps to enable Azure AD SSO in the Azure portal.
7474

75-
1. In the [Azure portal](https://portal.azure.com/), on the **Profit.co SAML App** application integration page, find the **Manage** section. Select **single sign-on**.
75+
1. In the [Azure portal](https://portal.azure.com/), on the **Profit.co** application integration page, find the **Manage** section. Select **single sign-on**.
7676
1. On the **Select a single sign-on method** page, select **SAML**.
7777
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
7878

@@ -98,10 +98,10 @@ In this section, you create a test user in the Azure portal called B.Simon.
9898

9999
### Assign the Azure AD test user
100100

101-
In this section, you enable B.Simon to use Azure single sign-on by granting access to Profit.co SAML App.
101+
In this section, you enable B.Simon to use Azure single sign-on by granting access to Profit.co.
102102

103103
1. In the Azure portal, select **Enterprise Applications** > **All applications**.
104-
1. In the applications list, select **Profit.co SAML App**.
104+
1. In the applications list, select **Profit.co**.
105105
1. In the app's overview page, find the **Manage** section, and select **Users and groups**.
106106

107107
![Screenshot of the Manage section, with Users and groups highlighted](common/users-groups-blade.png)
@@ -114,19 +114,19 @@ In this section, you enable B.Simon to use Azure single sign-on by granting acce
114114
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog box, select the appropriate role for the user from the list. Then choose the **Select** button at the bottom of the screen.
115115
1. In the **Add Assignment** dialog box, select **Assign**.
116116

117-
## Configure Profit.co SAML App SSO
117+
## Configure Profit.co SSO
118118

119-
To configure single sign-on on the Profit.co SAML App side, you need to send the App Federation Metadata URL to the [Profit.co SAML App support team](mailto:[email protected]). They configure this setting to have the SAML SSO connection set properly on both sides.
119+
To configure single sign-on on the Profit.co side, you need to send the App Federation Metadata URL to the [Profit.co support team](mailto:[email protected]). They configure this setting to have the SAML SSO connection set properly on both sides.
120120

121-
### Create a Profit.co SAML App test user
121+
### Create a Profit.co test user
122122

123-
In this section, you create a user called B.Simon in Profit.co SAML App. Work with the [Profit.co SAML App support team](mailto:[email protected]) to add the users in the Profit.co SAML App platform. You can't use single sign-on until you create and activate users.
123+
In this section, you create a user called B.Simon in Profit.co. Work with the [Profit.co support team](mailto:[email protected]) to add the users in the Profit.co platform. You can't use single sign-on until you create and activate users.
124124

125125
## Test SSO
126126

127127
In this section, you test your Azure AD single sign-on configuration by using Access Panel.
128128

129-
When you select the Profit.co SAML App tile in Access Panel, you should be automatically signed in to the Profit.co SAML App for which you set up SSO. For more information, see [Introduction to Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
129+
When you select the Profit.co tile in Access Panel, you should be automatically signed in to the Profit.co for which you set up SSO. For more information, see [Introduction to Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
130130

131131
## Additional resources
132132

@@ -136,8 +136,8 @@ When you select the Profit.co SAML App tile in Access Panel, you should be autom
136136

137137
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
138138

139-
- [Try Profit.co SAML App with Azure AD](https://aad.portal.azure.com/)
139+
- [Try Profit.co with Azure AD](https://aad.portal.azure.com/)
140140

141141
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
142142

143-
- [How to protect Profit.co SAML App with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
143+
- [How to protect Profit.co with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

0 commit comments

Comments
 (0)