Skip to content

Commit f7d0573

Browse files
authored
Merge pull request #112564 from MicrosoftDocs/master
4/23 PM Publish
2 parents 354a302 + db84e3e commit f7d0573

File tree

218 files changed

+4258
-2065
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

218 files changed

+4258
-2065
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -499,6 +499,11 @@
499499
"path_to_root": "azure-cosmosdb-java-v4-getting-started",
500500
"url": "https://github.com/Azure-Samples/azure-cosmos-java-getting-started",
501501
"branch": "master"
502+
},
503+
{
504+
"path_to_root": "azure-storage-snippets",
505+
"url": "https://github.com/azure-samples/AzureStorageSnippets",
506+
"branch": "master"
502507
}
503508
],
504509
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2682,6 +2682,16 @@
26822682
"redirect_url": "/azure/cosmos-db/sql-api-get-started",
26832683
"redirect_document_id": false
26842684
},
2685+
{
2686+
"source_path": "articles/search/search-example-adventureworks-modeling.md",
2687+
"redirect_url": "/azure/search/search-what-is-data-import",
2688+
"redirect_document_id": true
2689+
},
2690+
{
2691+
"source_path": "articles/search/search-example-adventureworks-multilevel-faceting.md",
2692+
"redirect_url": "/azure/search/search-filters-facets",
2693+
"redirect_document_id": true
2694+
},
26852695
{
26862696
"source_path": "articles/search/preview-api-resetskills.md",
26872697
"redirect_url": "/rest/api/searchservice/2019-05-06-preview/reset-skills",
@@ -7556,6 +7566,16 @@
75567566
"redirect_url": "/azure/application-gateway/resource-manager-template-samples",
75577567
"redirect_document_id": false
75587568
},
7569+
{
7570+
"source_path": "articles/application-gateway/application-gateway-create-gateway-cli-nodejs.md",
7571+
"redirect_url": "/azure/application-gateway/quick-create-cli",
7572+
"redirect_document_id": false
7573+
},
7574+
{
7575+
"source_path": "articles/application-gateway/tutorial-create-vmss-cli.md",
7576+
"redirect_url": "/azure/application-gateway/tutorial-url-redirect-cli",
7577+
"redirect_document_id": false
7578+
},
75597579
{
75607580
"source_path": "articles/application-insights/app-insights-azure-diagnostics.md",
75617581
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-to-application-insights",

articles/active-directory/app-provisioning/workday-attribute-reference.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.author: chmutali
1818
# Workday attribute reference
1919
This section provides a list of attributes that you can fetch from Workday using XPATH queries. Based on the Workday Web Services API version, you plan to use, refer to the appropriate section.
2020

21-
## XPATH values for Workday Web Services version 21.1
21+
## XPATH values for Workday Web Services (WWS) API v21.1
2222

2323

2424
The table below captures the list of Workday attributes and corresponding XPATH expressions that are shipped out of the box with the Workday inbound provisioning app connector.
@@ -106,7 +106,9 @@ The table below captures the list of Workday attributes and corresponding XPATH
106106
| 79 | WorkerType | wd:Worker/wd:Worker\_Data/wd:Employment\_Data/wd:Position\_Data/wd:Worker\_Type\_Reference/@wd:Descriptor |
107107
| 80 | WorkSpaceReference | wd:Worker/wd:Worker\_Data/wd:Employment\_Data/wd:Position\_Data/wd:Work\_Space\_\_Reference/@wd:Descriptor |
108108

109-
## XPATH values for Workday Web Services version 30+
109+
## XPATH values for Workday Web Services (WWS) API v30+
110+
111+
If you are using a WWS API v30.0 and above, before turning on the provisioning job, please update the **XPATH API expressions** under **Attribute Mapping -> Advanced Options -> Edit attribute list for Workday** to use the values listed below. To configure additional XPATHs, refer to the section [Tutorial: Managing your configuration](../saas-apps/workday-inbound-tutorial.md#managing-your-configuration).
110112

111113

112114
| \# | Name | Workday XPATH API expression |

articles/active-directory/authentication/howto-mfa-nps-extension-vpn.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -363,7 +363,7 @@ The script performs the following actions:
363363

364364
If you want to use your own certificates, you must associate the public key of your certificate with the service principal on Azure AD, and so on.
365365

366-
To use the script, provide the extension with your Azure Active Directory administrative credentials and the Azure Active Directory tenant ID that you copied earlier. Run the script on each NPS server where you install the NPS extension.
366+
To use the script, provide the extension with your Azure Active Directory administrative credentials and the Azure Active Directory tenant ID that you copied earlier. The account must be in the same Azure AD tenant as you wish to enable the extension for. Run the script on each NPS server where you install the NPS extension.
367367

368368
1. Run Windows PowerShell as an administrator.
369369

@@ -373,6 +373,8 @@ To use the script, provide the extension with your Azure Active Directory admini
373373

374374
![Running the AzureMfsNpsExtnConfigSetup.ps1 configuration script](./media/howto-mfa-nps-extension-vpn/image38.png)
375375

376+
If you get a security error due to TLS, enable TLS 1.2 using the `[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12` command from your PowerShell prompt.
377+
376378
After the script verifies the installation of the PowerShell module, it displays the Azure Active Directory PowerShell module sign-in window.
377379

378380
4. Enter your Azure AD administrator credentials and password, and then select **Sign in**.

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,13 +126,13 @@ First, ensure that you have the [MSOnline V1 PowerShell module](https://docs.mic
126126
Identify users who have registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD.
127127

128128
```powershell
129-
Get-MsolUser -All | Where-Object {$._StrongAuthenticationMethods -ne $null -and $._BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
129+
Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods -ne $null -and $_.BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
130130
```
131131

132132
Identify users who have not registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD.
133133

134134
```powershell
135-
Get-MsolUser -All | Where-Object {$._StrongAuthenticationMethods.Count -eq 0 -and $._BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
135+
Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods.Count -eq 0 -and $_.BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
136136
```
137137

138138
Identify users and output methods registered.

articles/active-directory/develop/quickstart-v2-aspnet-core-webapp.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -152,6 +152,19 @@ The line containing `.AddAzureAd` adds the Microsoft identity platform authentic
152152
> [!NOTE]
153153
> Setting `ValidateIssuer = false` is a simplification for this quickstart. In real applications you need to validate the issuer.
154154
> See the samples to understand how to do that.
155+
>
156+
> Also note the `Configure` method which contains two important methods: `app.UserCookiePolicy()` and `app.UseAuthentication()`
157+
158+
```csharp
159+
// This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
160+
public void Configure(IApplicationBuilder app, IHostingEnvironment env)
161+
{
162+
// more core
163+
app.UseCookiePolicy();
164+
app.UseAuthentication();
165+
// more core
166+
}
167+
```
155168

156169
### Protect a controller or a controller's method
157170

articles/active-directory/develop/quickstart-v2-windows-desktop.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ In this quickstart, you'll learn how to write a Windows desktop .NET (WPF) appli
3838
>
3939
> 1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
4040
> 1. If your account gives you access to more than one tenant, select your account in the top right corner, and set your portal session to the desired Azure AD tenant.
41-
> 1. Navigate to the Microsoft identity platform for developers [App registrations](https://aka.ms/MobileAppReg) page.
41+
> 1. Go to the [App registrations](https://aka.ms/MobileAppReg) blade for Azure Active Directory in the Azure portal.
4242
> 1. Select **New registration**.
4343
> - In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `Win-App-calling-MsGraph`.
4444
> - In the **Supported account types** section, select **Accounts in any organizational directory and personal Microsoft accounts (for example, Skype, Xbox, Outlook.com)**.

articles/active-directory/develop/scenario-web-app-sign-user-production.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,15 @@ Now that you know how to get a token to call web APIs, learn how to move it to p
2323

2424
## Next steps
2525

26+
### Troubleshooting
27+
28+
> [!NOTE]
29+
> When users sign-in to the web application for the first time, they will need to consent. However, in some organizations, users can see a message like the following:
30+
>
31+
> *AppName needs permissions to access resources in your organization that only an admin can grant. Please ask an admin to grant permission to this app before you can use it.*
32+
>
33+
> This is because your tenant administrator has **disabled** the ability for users to consent. In that case, you need to contact your tenant administrators so that they do an admin-consent for the scopes required by the application.
34+
2635
### Same site
2736

2837
Make sure you understand possible issues with new versions of the Chrome browser

articles/active-directory/fundamentals/concept-fundamentals-continuous-access-evaluation.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,9 @@ ms.collection: M365-identity-device-management
1919

2020
Microsoft services, like Azure Active Directory (Azure AD) and Office 365, use open standards and protocols to maximize interoperability. One of the most critical ones is Open ID Connect (OIDC). When a client application like Outlook connects to a service like Exchange Online, the API requests are authorized using OAuth 2.0 access tokens. By default, those access tokens are valid for one hour. When they expire, the client is redirected back to Azure AD to refresh them. That also provides an opportunity to reevaluate policies for user access – we might choose not to refresh the token because of a Conditional Access policy, or because the user has been disabled in the directory.
2121

22-
We have heard the overwhelming feedback from our customers: a one-hour lag due to access token lifetime for reapplying Conditional Access policies and changes in user state (for example: disabled due to furlough) is not good enough.
22+
Token expiration and refresh is a standard mechanism in the industry. That said, customers have expressed concerns about the lag between when risk conditions change for the user (for example: moving from the corporate office to the local coffee shop, or user credentials discovered on the black market) and when policies can be enforced related to that change. We have experimented with the “blunt object” approach of reduced token lifetimes but found they can degrade user experiences and reliability without eliminating risks.
23+
24+
Timely response to policy violations or security issues really requires a “conversation” between the token issuer, like Azure AD, and the relying party, like Exchange Online. This two-way conversation gives us two important capabilities. The relying party can notice when things have changed, like a client coming from a new location, and tell the token issuer. It also gives the token issuer a way to tell the relying party to stop respecting tokens for a given user due to account compromise, disablement, or other concerns. The mechanism for this conversation is Continuous Access Evaluation (CAE).
2325

2426
Microsoft has been an early participant in the Continuous Access Evaluation Protocol (CAEP) initiative as part of the [Shared Signals and Events](https://openid.net/wg/sse/) working group at the OpenID Foundation. Identity providers and relying parties will be able to leverage the security events and signals defined by the working group to reauthorize or terminate access. It is exciting work and will improve security across many platforms and applications.
2527

articles/active-directory/hybrid/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -153,6 +153,8 @@
153153
href: plan-migrate-adfs-pass-through-authentication.md
154154
- name: Move groups from one forest to another
155155
href: how-to-connect-migrate-groups.md
156+
- name: Migrate to cloud authentication using staged rollout
157+
href: how-to-connect-staged-rollout.md
156158
- name: Hybrid Identity Design Considerations
157159
items:
158160
- name: Hybrid Identity Design Considerations Overview

0 commit comments

Comments
 (0)