Skip to content

Commit fa5ce89

Browse files
authored
Merge pull request #94236 from MicrosoftDocs/master
Merge Master to Live, 3 AM
2 parents 98ce558 + 8e8d97b commit fa5ce89

File tree

86 files changed

+1049
-3807
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

86 files changed

+1049
-3807
lines changed

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -522,7 +522,7 @@
522522
items:
523523
- name: Android
524524
href: quickstart-v1-android.md
525-
- name: iOS and MacOS
525+
- name: iOS
526526
href: quickstart-v1-ios.md
527527
- name: Windows Desktop .NET
528528
href: quickstart-v1-dotnet.md

articles/active-directory/develop/authentication-flows-app-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.tgt_pltfrm: na
1616
ms.workload: identity
1717
ms.date: 09/27/2019
1818
ms.author: jmprieur
19-
ms.custom: aaddev, identityplatformtop40
19+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started
2020
#Customer intent: As an app developer, I want to learn about authentication flows and application scenarios so I can create applications protected by the Microsoft identity platform.
2121
ms.collection: M365-identity-device-management
2222
---

articles/active-directory/develop/authentication-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.workload: identity
1717
ms.date: 10/15/2019
1818
ms.author: ryanwi
1919
ms.reviewer: jmprieur, saeeda, sureshja, hirsin
20-
ms.custom: aaddev, identityplatformtop40
20+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started
2121
#Customer intent: As an application developer, I want to understand the basic concepts of authentication in the Microsoft identity platform
2222
ms.collection: M365-identity-device-management
2323
---

articles/active-directory/develop/azure-ad-endpoint-comparison.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ These scopes allow you to code your app in a minimal-disclosure fashion so you c
113113
The Microsoft identity platform endpoint issues a smaller set of claims in its tokens by default to keep payloads small. If you have apps and services that have a dependency on a particular claim in a v1.0 token that is no longer provided by default in a Microsoft identity platform token, consider using the [optional claims](active-directory-optional-claims.md) feature to include that claim.
114114

115115
> [!IMPORTANT]
116-
> v1.0 and v2.0 tokens can be issued by both the v1.0 and v2.0 endpoints! id_tokens *always* match the endpoint they're requested from, and access tokens *always* match the format expected by the Web API your client will call using that token. So if your app uses the v2.0 endpoiont to get a token to call Microsoft Graph, which expects v1.0 format access tokens, your app will recieve a token in the v1.0 format.
116+
> v1.0 and v2.0 tokens can be issued by both the v1.0 and v2.0 endpoints! id_tokens *always* match the endpoint they're requested from, and access tokens *always* match the format expected by the Web API your client will call using that token. So if your app uses the v2.0 endpoint to get a token to call Microsoft Graph, which expects v1.0 format access tokens, your app will recieve a token in the v1.0 format.
117117
118118
## Limitations
119119

articles/active-directory/develop/identity-platform-integration-checklist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.workload: identity
1616
ms.date: 09/11/2019
1717
ms.author: ryanwi
1818
ms.reviewer: lenalepa, sureshja, jesakowi
19-
ms.custom: aaddev, identityplatformtop40
19+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started
2020
#Customer intent: As an application developer, I want to learn about best practices so I can integrate my application with the Microsoft identity platform.
2121
---
2222

articles/active-directory/develop/quickstart-v2-dotnet-native-aspnet.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Call an ASP.NET Web API protected by Azure AD- Microsoft identity
2+
title: Call an ASP.NET Web API protected by Azure AD - Microsoft identity
33
description: In this quickstart, learn how to call an ASP.NET web API protected by Azure Active Directory from a Windows Desktop (WPF) application. The WPF client authenticates a user, requests an access token, and calls the web API.
44
services: active-directory
55
documentationcenter: dev-center-name
@@ -45,7 +45,7 @@ You can clone this sample from your shell or command line:
4545

4646
Or, you can [download the sample as a ZIP file](https://github.com/AzureADQuickStarts/AppModelv2-NativeClient-DotNet/archive/complete.zip).
4747

48-
## Register your Web API - *TodoListService* in the *Application registration portal*
48+
## Register your Web API in the application registration portal
4949

5050
### Choose the Azure AD tenant where you want to create your applications
5151

@@ -78,7 +78,7 @@ If you want to register your apps manually, as a first step you'll need to:
7878
- Keep **State** as **Enabled**
7979
- Select **Add scope**
8080

81-
### Configure your *TodoListService* and *TodoListClient* projects to match the Web API you just registered
81+
### Configure the service and client projects to match the registered Web API
8282

8383
1. Open the solution in Visual Studio and then open the **Web.config** file under the root of **TodoListService** project.
8484
1. Replace the value of `ida:ClientId` parameter with the **Client ID (Application ID)** from the application you just registered in the Application Registration Portal.
@@ -137,7 +137,7 @@ One of the ways to allow users from other directories to access your Web API is
137137
1. In the *Authorized scopes* section, select the scope for this Web API `api://<Application ID>/access_as_user`.
138138
1. Press the **Add application** button at the bottom of the page.
139139

140-
## Run your project
140+
## Run your project
141141

142142
1. Press `<F5>` to run your project. Your *TodoListClient* should open.
143143
1. Select **Sign in** at the top right (or Clear Cache/Sign-in) and then sign-in either using a personal Microsoft account (live.com or hotmail.com) or work or school account.

articles/active-directory/develop/quickstart-v2-java-webapp.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,8 @@ To run this sample you will need:
6161
> - Leave **Redirect URI** blank for now, and select **Register**.
6262
> 1. On the **Overview** page, find the **Application (client) ID** and the **Directory (tenant) ID** values of the application. Copy these values for later.
6363
> 1. Select the **Authentication** from the menu, and then add the following information:
64-
> - In **Redirect URIs**, add `http://localhost:8080/msal4jsamples/secure/aad` and `https://localhost:8080/msal4jsamples/graph/me`.
64+
> - In **Redirect URIs**, add `http://localhost:8080/msal4jsamples/secure/aad` and `http://localhost:8080/msal4jsamples/graph/me`.
65+
> - In **Advanced settings**, add `https://localhost:8080/msal4jsample/sign-out` to **Logout URL**.
6566
> - Select **Save**.
6667
> 1. Select the **Certificates & secrets** from the menu and in the **Client secrets** section, click on **New client secret**:
6768
>
@@ -75,10 +76,10 @@ To run this sample you will need:
7576
>
7677
> For the code sample for this quickstart to work, you need to:
7778
>
78-
> 1. Add reply URLs as `http://localhost:8080/msal4jsamples/secure/aad` and `https://localhost:8080/msal4jsamples/graph/me`.
79+
> 1. Add reply URLs as `http://localhost:8080/msal4jsamples/secure/aad` and `http://localhost:8080/msal4jsamples/graph/me`.
7980
> 1. Create a Client Secret.
8081
> > [!div renderon="portal" id="makechanges" class="nextstepaction"]
81-
> > [Make this change for me]()
82+
> > [Make these changes for me]()
8283
>
8384
> > [!div id="appconfigured" class="alert alert-info"]
8485
> > ![Already configured](media/quickstart-v2-aspnet-webapp/green-check.png) Your application is configured with these attributes.
@@ -96,7 +97,7 @@ To run this sample you will need:
9697

9798
```file
9899
aad.clientId=Enter_the_Application_Id_here
99-
aad.authority=https://login.microsoftonline.com/Enter_the_Tenant_Name_Here/
100+
aad.authority=https://login.microsoftonline.com/Enter_the_Tenant_Info_Here/
100101
aad.secretKey=Enter_the_Client_Secret_Here
101102
aad.redirectUriSignin=http://localhost:8080/msal4jsample/secure/aad
102103
aad.redirectUriGraph=http://localhost:8080/msal4jsample/graph/me
@@ -107,7 +108,7 @@ To run this sample you will need:
107108
>
108109
> - `Enter_the_Application_Id_here` - is the Application Id for the application you registered.
109110
> - `Enter_the_Client_Secret_Here` - is the **Client Secret** you created in **Certificates & Secrets** for the application you registered.
110-
> - `Enter_the_Tenant_Name_Here` - is the **Directory (tenant) ID** value of the application you registered.
111+
> - `Enter_the_Tenant_Info_Here` - is the **Directory (tenant) ID** value of the application you registered.
111112
112113
#### Step 4: Run the code sample
113114
@@ -145,7 +146,7 @@ Add MSAL4J to your application by using Maven or Gradle to manage your dependenc
145146
```
146147

147148
```$xslt
148-
compile group: 'com.microsoft.azure', name: 'msal4j', version: '0.5.0-preview'
149+
compile group: 'com.microsoft.azure', name: 'msal4j', version: '0.6.0-preview'
149150
```
150151

151152
### MSAL initialization

articles/active-directory/develop/reference-v2-libraries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Use client authentication libraries to acquire a token for calling a protected w
5757
![Angular](media/sample-v2-code/logo_angular.png) | MSAL Angular (Preview) | [NPM](https://www.npmjs.com/package/@azure/msal-angular) |[GitHub](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-angular/README.md) | | | |
5858
| ![.NET Framework](media/sample-v2-code/logo_NET.png) ![UWP](media/sample-v2-code/logo_windows.png) ![Xamarin](media/sample-v2-code/logo_xamarin.png) | MSAL.NET |[NuGet](https://www.nuget.org/packages/Microsoft.Identity.Client) |[GitHub](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) | [Desktop app](guidedsetups/active-directory-mobileanddesktopapp-windowsdesktop-intro.md) | [MSAL.NET](https://docs.microsoft.com/dotnet/api/microsoft.identity.client?view=azure-dotnet-preview) |[Conceptual docs](msal-overview.md) | [Roadmap](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki#roadmap)
5959
| ![Python](media/sample-v2-code/logo_python.png) | MSAL Python (Preview) | [PyPI](https://pypi.org/project/msal) | [GitHub](https://github.com/AzureAD/microsoft-authentication-library-for-python) | [Samples](https://github.com/AzureAD/microsoft-authentication-library-for-python/tree/dev/sample) | [ReadTheDocs](https://msal-python.rtfd.io/) | [Wiki](https://github.com/AzureAD/microsoft-authentication-library-for-python/wiki) | [Roadmap](https://github.com/AzureAD/microsoft-authentication-library-for-python/wiki/Roadmap)
60-
| ![Java](media/sample-v2-code/logo_java.png) | MSAL Java (Preview) | [Maven](https://mvnrepository.com/artifact/com.microsoft.azure/msal4j) | [GitHub](https://github.com/AzureAD/microsoft-authentication-library-for-java) | [Samples](https://github.com/AzureAD/microsoft-authentication-library-for-java/tree/dev/src/samples) | | [Wiki](https://github.com/AzureAD/microsoft-authentication-library-for-java/wiki) | [Roadmap](https://github.com/AzureAD/microsoft-authentication-library-for-java/wiki)
60+
| ![Java](media/sample-v2-code/logo_java.png) | MSAL Java (Preview) | [Maven](https://mvnrepository.com/artifact/com.microsoft.azure/msal4j) | [GitHub](https://github.com/AzureAD/microsoft-authentication-library-for-java) | [Samples](https://github.com/AzureAD/microsoft-authentication-library-for-java/tree/dev/src/samples) | [Reference](https://javadoc.io/doc/com.microsoft.azure/msal4j/0.6.0-preview/index.html) | [Wiki](https://github.com/AzureAD/microsoft-authentication-library-for-java/wiki) | [Roadmap](https://github.com/AzureAD/microsoft-authentication-library-for-java/wiki)
6161
| iOS & macOS | MSAL iOS and macOS | [GitHub](https://github.com/AzureAD/microsoft-authentication-library-for-objc) |[GitHub](https://github.com/AzureAD/microsoft-authentication-library-for-objc) | [iOS app](https://github.com/Azure-Samples/ms-identity-mobile-apple-swift-objc), [macOS app](https://github.com/Azure-Samples/ms-identity-macOS-swift-objc) | [Reference](https://azuread.github.io/microsoft-authentication-library-for-objc/index.html) | [Conceptual docs](msal-overview.md) | |
6262
|![Android / Java](media/sample-v2-code/logo_Android.png) | MSAL Android | [Central repository](https://repo1.maven.org/maven2/com/microsoft/identity/client/msal/) |[GitHub](https://github.com/AzureAD/microsoft-authentication-library-for-android) | [Android app](quickstart-v2-android.md) | [JavaDocs](https://javadoc.io/doc/com.microsoft.identity.client/msal) | [Conceptual docs](msal-overview.md) |[Roadmap](https://github.com/AzureAD/microsoft-authentication-library-for-android/wiki/Roadmap)
6363

articles/active-directory/devices/concept-azure-managed-workstation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ This guidance references several security profiles and roles that can help you c
9191

9292
* **Enhanced Security** – This entry-level, protected solution is good for home users, small business users, and general developers.
9393

94-
The enhanced workstation is a policy-based way to increase the security of the low security profile. It provides a secure means to work with customer data while also using productivity tools like email and web browsing. You can use audit policies and Intune to monitor an enhanced workstation for user behavior and profile usage. You deploy the enhanced workstation profile with the Windows10 (1809) script, and it takes advantage of advanced malware protection using [Advanced Threat Protection (ATP)](https://docs.microsoft.com/office365/securitycompliance/office-365-atp).
94+
The enhanced workstation is a policy-based way to increase the security of the low security profile. It provides a secure means to work with customer data while also using productivity tools like email and web browsing. You can use audit policies and Intune to monitor an enhanced workstation for user behavior and profile usage. You deploy the enhanced workstation profile with the Windows10 (1809) script, and it takes advantage of advanced malware protection using [Advanced Threat Protection (ATP)](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection).
9595

9696
* **High Security** – The most effective means to reduce the attack surface of a workstation is to remove the ability to self-administer the workstation. Removing local administrative rights is a step that improves security, but it can impact productivity if implemented incorrectly. The high security profile builds on the enhanced security profile with one considerable change: the removal of the local admin. This profile is designed for high profile users: executives, payroll and sensitive data users, approvers for services and processes.
9797

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,7 @@ To enable / disable a device, you have two options:
136136

137137
- You need to be a global administrator or cloud device administrator in Azure AD to enable / disable a device.
138138
- Disabling a device prevents a device from successfully authenticating with Azure AD, thereby preventing the device from accessing your Azure AD resources that are guarded by device CA or using your WH4B credentials.
139+
- Disabling the device will revoke both the Primary Refresh Token (PRT) and any Refresh Tokens (RT) on the device.
139140

140141
### Delete an Azure AD device
141142

0 commit comments

Comments
 (0)