Skip to content

Commit f804554

Browse files
authored
Merge pull request #171748 from MicrosoftDocs/master
9/08 AM Publish
2 parents f1cc55a + a0c8707 commit f804554

File tree

65 files changed

+580
-439
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

65 files changed

+580
-439
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -357,6 +357,12 @@
357357
"branch": "main",
358358
"branch_mapping": {}
359359
},
360+
{
361+
"path_to_root": "media-services-v3-dotnet-core-functions-integration",
362+
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-core-functions-integration",
363+
"branch": "main",
364+
"branch_mapping": {}
365+
},
360366
{
361367
"path_to_root": "samples-javascript",
362368
"url": "https://github.com/Microsoft/tsiclient",

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,9 @@ The following core requirements apply:
9393
|`https://login.microsoftonline.com`|Authentication requests|
9494
|`https://enterpriseregistration.windows.net`|Azure AD Password Protection functionality|
9595

96+
> [!NOTE]
97+
> Some endpoints, such as the CRL endpoint, are not addressed in this article. For a list of all supported endpoints, see [Microsoft 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide#microsoft-365-common-and-office-online).
98+
9699
### Azure AD Password Protection DC agent
97100

98101
The following requirements apply to the Azure AD Password Protection DC agent:

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,9 @@ Filters for devices (preview) condition in Conditional Access evaluates policy b
140140
| Include/exclude mode with negative operators (NotEquals, NotStartsWith, NotEndsWith, NotContains, NotIn) and use of any attributes including extensionAttributes1-15 | Registered device managed by Intune | Yes, if criteria are met |
141141
| Include/exclude mode with negative operators (NotEquals, NotStartsWith, NotEndsWith, NotContains, NotIn) and use of any attributes including extensionAttributes1-15 | Registered device not managed by Intune | Yes, if criteria are met and if device is compliant or Hybrid Azure AD joined |
142142

143+
> [!IMPORTANT]
144+
> For unregistered devices, the only device information passed is the Operating System, Operating System Version, and the Browser. This means for unregistered devices and Conditional Access policies using negative operators for filters for device, any value outside of these will be evaluated with an blank value. For example, if an unregistered device was being evaluated with the following: **device.displayName -notContains *Example***. Since the unregistered device will pass a blank display name, which is not the value of *Example*, the resulting condition will be true.
145+
143146
## Next steps
144147

145148
- [Conditional Access: Conditions](concept-conditional-access-conditions.md)

articles/active-directory/develop/msal-net-instantiate-public-client-config-options.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,25 @@ Before initializing an application, you first need to [register](quickstart-regi
2828
- The tenant ID if you are writing a line of business application solely for your organization (also named single-tenant application).
2929
- For web apps, and sometimes for public client apps (in particular when your app needs to use a broker), you'll have also set the redirectUri where the identity provider will contact back your application with the security tokens.
3030

31+
## Default Reply Uri
32+
33+
In MSAL.NET 4.1+ the default redirect URI (Reply URI) can now be set with the `public PublicClientApplicationBuilder WithDefaultRedirectUri()` method. This method will set the redirect uri property of public client application to the recommended default.
34+
35+
This method's behavior is dependent upon the platform that you are using at the time. Here is a table that describes what redirect uri is set on certain platforms:
36+
37+
Platform | Redirect URI
38+
--------- | --------------
39+
Desktop app (.NET FW) | `https://login.microsoftonline.com/common/oauth2/nativeclient`
40+
UWP | value of `WebAuthenticationBroker.GetCurrentApplicationCallbackUri()`
41+
.NET Core | `http://localhost`
42+
43+
For the UWP platform, is enhanced the experience by enabling SSO with the browser by setting the value to the result of `WebAuthenticationBroker.GetCurrentApplicationCallbackUri()`.
44+
45+
For .NET Core, MSAL.Net is setting the value to the local host to enable the user to use the system browser for interactive authentication.
46+
47+
> [!NOTE]
48+
> For embedded browsers in desktop scenarios the redirect uri used is intercepted by MSAL to detect that a response is returned from the identity provider that an auth code has been returned. This uri can therefore be used in any cloud without seeing an actual redirect to that uri. This means you can and should use `https://login.microsoftonline.com/common/oauth2/nativeclient` in any cloud. If you prefer you can also use any other uri as long as you configure the redirect uri correctly with MSAL and in the app registration. Specifying the default Uri in the application registration means there is the least amount of setup in MSAL.
49+
3150

3251
A .NET Core console application could have the following *appsettings.json* configuration file:
3352

0 commit comments

Comments
 (0)