Skip to content

Commit fc830f5

Browse files
committed
Merge branch 'main' into release-preview-mswb
2 parents e31e5f9 + efe6e25 commit fc830f5

File tree

287 files changed

+3943
-2171
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

287 files changed

+3943
-2171
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1018,7 +1018,7 @@
10181018
},
10191019
{
10201020
"path_to_root": "microsoft-graph",
1021-
"url": "https://github.com/MicrosoftGraph/microsoft-graph-docs",
1021+
"url": "https://github.com/MicrosoftGraph/microsoft-graph-docs-contrib",
10221022
"branch": "main",
10231023
"branch_mapping": {}
10241024
},

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,11 @@
105105
"redirect_url": "/azure/active-directory/saas-apps/gainsight-tutorial",
106106
"redirect_document_id": false
107107
},
108+
{
109+
"source_path_from_root": "/articles/active-directory/saas-apps/postman-provisioning-tutorialy.md",
110+
"redirect_url": "/azure/active-directory/saas-apps/postman-provisioning-tutorial",
111+
"redirect_document_id": false
112+
},
108113
{
109114
"source_path_from_root": "/articles/active-directory/saas-apps/iauditor-tutorial.md",
110115
"redirect_url": "/azure/active-directory/saas-apps/safety-culture-tutorial",

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/06/2023
12+
ms.date: 09/06/2023
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -133,9 +133,11 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
133133

134134
|Feature |User flow |Custom policy |Notes |
135135
|---------|:---------:|:---------:|---------|
136-
|[API connectors](api-connectors-overview.md) | Preview | GA | |
137-
|[Secure with basic authentication](secure-rest-api.md#http-basic-authentication) | Preview | GA | |
138-
|[Secure with client certificate authentication](secure-rest-api.md#https-client-certificate-authentication) | Preview | GA | |
136+
|[After federating with an identity provider during sign-up](api-connectors-overview.md?pivots=b2c-user-flow#after-federating-with-an-identity-provider-during-sign-up) | GA | GA | |
137+
|[Before creating the user](api-connectors-overview.md?pivots=b2c-user-flow#before-creating-the-user) | GA | GA | |
138+
|[Before including application claims in token](api-connectors-overview.md?pivots=b2c-user-flow#before-sending-the-token-preview)| Preview | GA | |
139+
|[Secure with basic authentication](secure-rest-api.md#http-basic-authentication) | GA | GA | |
140+
|[Secure with client certificate authentication](secure-rest-api.md#https-client-certificate-authentication) | GA | GA | |
139141
|[Secure with OAuth2 bearer authentication](secure-rest-api.md#oauth2-bearer-authentication) | NA | GA | |
140142
|[Secure API key authentication](secure-rest-api.md#api-key-authentication) | NA | GA | |
141143

articles/active-directory-domain-services/powershell-scoped-synchronization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 01/29/2023
12+
ms.date: 09/06/2023
1313
ms.author: justinha
1414
ms.custom: has-azure-ad-ps-ref
1515
---
@@ -86,7 +86,7 @@ foreach ($groupName in $groupsToAdd)
8686
Write-Output "****************************************************************************`n"
8787
Write-Output "`n****************************************************************************"
8888
89-
$currentAssignments = Get-AzureADServiceAppRoleAssignment -ObjectId $sp.ObjectId
89+
$currentAssignments = Get-AzureADServiceAppRoleAssignment -ObjectId $sp.ObjectId -All $true
9090
Write-Output "Total current group-assignments: $($currentAssignments.Count), SP-ObjectId: $($sp.ObjectId)"
9191
9292
$currAssignedObjectIds = New-Object 'System.Collections.Generic.HashSet[string]'

articles/active-directory/conditional-access/concept-continuous-access-evaluation-workload.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,17 +15,17 @@ ms.reviewer: joroja
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Continuous access evaluation for workload identities (preview)
18+
# Continuous access evaluation for workload identities
1919

2020
Continuous access evaluation (CAE) for [workload identities](../workload-identities/workload-identities-overview.md) provides security benefits to your organization. It enables real-time enforcement of Conditional Access location and risk policies along with instant enforcement of token revocation events for workload identities.
2121

2222
Continuous access evaluation doesn't currently support managed identities.
2323

2424
## Scope of preview
2525

26-
The continuous access evaluation for workload identities public preview scope includes support for Microsoft Graph as a resource provider.
26+
The continuous access evaluation for workload identities is supported only on access requests sent to Microsoft Graph as a resource provider. More resource providers will be added over time.
2727

28-
The preview targets service principals for line of business (LOB) applications.
28+
Service principals for line of business (LOB) applications are supported
2929

3030
We support the following revocation events:
3131

articles/active-directory/develop/identity-platform-integration-checklist.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,12 @@ ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, has-adal-re
2020

2121
This article highlights best practices, recommendations, and common oversights when integrating with the Microsoft identity platform. This checklist will guide you to a high-quality and secure integration. Review this list on a regular basis to make sure you maintain the quality and security of your app’s integration with the identity platform. The checklist isn't intended to review your entire application. The contents of the checklist are subject to change as we make improvements to the platform.
2222

23-
If youre just getting started, check out the [Microsoft identity platform documentation](index.yml) to learn about authentication basics, application scenarios in the Microsoft identity platform, and more.
23+
If you're just getting started, check out the [Microsoft identity platform documentation](index.yml) to learn about authentication basics, application scenarios in the Microsoft identity platform, and more.
2424

2525
Use the following checklist to ensure that your application is effectively integrated with the [Microsoft identity platform](./index.yml).
2626

2727
> [!TIP]
28-
> The *Integration assistant* in the Azure portal can help you apply many of these best practices and recommendations. Select any of your [app registrations](https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade) in the Azure portal, and then select the **Integration assistant** menu item to get started with the assistant.
28+
> The *Integration assistant* can help you apply many of these best practices and recommendations. Select any of your app registrations, and then select the **Integration assistant** menu item to get started with the assistant.
2929
3030
## Basics
3131

@@ -39,7 +39,7 @@ Use the following checklist to ensure that your application is effectively integ
3939

4040
![checkbox](./media/integration-checklist/checkbox-two.svg) Adhere to the [Branding guidelines for applications](/azure/active-directory/develop/howto-add-branding-in-apps).
4141

42-
![checkbox](./media/integration-checklist/checkbox-two.svg) Provide a meaningful name and logo for your application. This information appears on your [applications consent prompt](application-consent-experience.md). Make sure your name and logo are representative of your company/product so that users can make informed decisions. Ensure that you're not violating any trademarks.
42+
![checkbox](./media/integration-checklist/checkbox-two.svg) Provide a meaningful name and logo for your application. This information appears on your [application's consent prompt](application-consent-experience.md). Make sure your name and logo are representative of your company/product so that users can make informed decisions. Ensure that you're not violating any trademarks.
4343

4444
## Privacy
4545

@@ -53,7 +53,7 @@ Use the following checklist to ensure that your application is effectively integ
5353

5454
![checkbox](./media/integration-checklist/checkbox-two.svg) Don't enable support for the [OAuth2 implicit grant flow](v2-oauth2-implicit-grant-flow.md) unless explicitly required. Learn about the valid scenario [here](v2-oauth2-implicit-grant-flow.md#suitable-scenarios-for-the-oauth2-implicit-grant).
5555

56-
![checkbox](./media/integration-checklist/checkbox-two.svg) Move beyond username/password. Don't use [resource owner password credential flow (ROPC)](v2-oauth-ropc.md), which directly handles users passwords. This flow requires a high degree of trust and user exposure and should only be used when other, more secure, flows can't be used. This flow is still needed in some scenarios (like DevOps), but beware that using it will impose constraints on your application. For more modern approaches, read [Authentication flows and application scenarios](authentication-flows-app-scenarios.md).
56+
![checkbox](./media/integration-checklist/checkbox-two.svg) Move beyond username/password. Don't use [resource owner password credential flow (ROPC)](v2-oauth-ropc.md), which directly handles users' passwords. This flow requires a high degree of trust and user exposure and should only be used when other, more secure, flows can't be used. This flow is still needed in some scenarios (like DevOps), but beware that using it will impose constraints on your application. For more modern approaches, read [Authentication flows and application scenarios](authentication-flows-app-scenarios.md).
5757

5858
![checkbox](./media/integration-checklist/checkbox-two.svg) Protect and manage your confidential app credentials for web apps, web APIs and daemon apps. Use [certificate credentials](./certificate-credentials.md), not password credentials (client secrets). If you must use a password credential, don't set it manually. Don't store credentials in code or config, and never allow them to be handled by humans. If possible, use [managed identities for Azure resources](../managed-identities-azure-resources/overview.md) or [Azure Key Vault](../../key-vault/general/basic-concepts.md) to store and regularly rotate your credentials.
5959

@@ -67,9 +67,9 @@ Use the following checklist to ensure that your application is effectively integ
6767

6868
![checkbox](./media/integration-checklist/checkbox-two.svg) Don't program directly against protocols such as OAuth 2.0 and Open ID. Instead, leverage the [Microsoft Authentication Library (MSAL)](msal-overview.md). The MSAL libraries securely wrap security protocols in an easy-to-use library, and you get built-in support for [Conditional Access](../conditional-access/overview.md) scenarios, device-wide [single sign-on (SSO)](../manage-apps/what-is-single-sign-on.md), and built-in token caching support. For more info, see the list of Microsoft-supported [client libraries](reference-v2-libraries.md). If you must hand-code for the authentication protocols, you should follow the [Microsoft SDL](https://www.microsoft.com/sdl/default.aspx) or similar development methodology. Pay close attention to the security considerations in the standards specifications for each protocol.
6969

70-
![checkbox](./media/integration-checklist/checkbox-two.svg) Migrate existing apps from Azure Active Directory Authentication Library (ADAL) to the [Microsoft Authentication Library](/entra/msal). MSAL is Microsofts latest identity platform solution and is available on .NET, JavaScript, Android, iOS, macOS, Python, and Java. Read more about migrating [ADAL.NET](msal-net-migration.md), [ADAL.js](msal-compare-msal-js-and-adal-js.md), and [ADAL.NET and iOS broker](msal-net-migration-ios-broker.md) apps.
70+
![checkbox](./media/integration-checklist/checkbox-two.svg) Migrate existing apps from Azure Active Directory Authentication Library (ADAL) to the [Microsoft Authentication Library](/entra/msal). MSAL is Microsoft's latest identity platform solution and is available on .NET, JavaScript, Android, iOS, macOS, Python, and Java. Read more about migrating [ADAL.NET](msal-net-migration.md), [ADAL.js](msal-compare-msal-js-and-adal-js.md), and [ADAL.NET and iOS broker](msal-net-migration-ios-broker.md) apps.
7171

72-
![checkbox](./media/integration-checklist/checkbox-two.svg) For mobile apps, configure each platform using the application registration experience. In order for your application to take advantage of the Microsoft Authenticator or Microsoft Company Portal for single sign-in, your app needs a broker redirect URI configured. This allows Microsoft to return control to your application after authentication. When configuring each platform, the app registration experience will guide you through the process. Use the quickstart to download a working example. On iOS, use brokers and system webview whenever possible.
72+
![checkbox](./media/integration-checklist/checkbox-two.svg) For mobile apps, configure each platform using the application registration experience. In order for your application to take advantage of the Microsoft Authenticator or Microsoft Company Portal for single sign-in, your app needs a "broker redirect URI" configured. This allows Microsoft to return control to your application after authentication. When configuring each platform, the app registration experience will guide you through the process. Use the quickstart to download a working example. On iOS, use brokers and system webview whenever possible.
7373

7474
![checkbox](./media/integration-checklist/checkbox-two.svg) In web apps or web APIs, keep one token cache per account. For web apps, the token cache should be keyed by the account ID. For web APIs, the account should be keyed by the hash of the token used to call the API. MSAL.NET provides custom token cache serialization in the .NET Framework and .NET Core subplatforms. For security and performance reasons, our recommendation is to serialize one cache per user. For more information, read about [token cache serialization](msal-net-token-cache-serialization.md).
7575

@@ -83,17 +83,17 @@ Use the following checklist to ensure that your application is effectively integ
8383

8484
![checkbox](./media/integration-checklist/checkbox-two.svg) Minimize the number of times a user needs to enter login credentials while using your app by attempting silent authentication (silent token acquisition) before interactive flows.
8585

86-
![checkbox](./media/integration-checklist/checkbox-two.svg) Don't use prompt=consent for every sign-in. Only use prompt=consent if youve determined that you need to ask for consent for additional permissions (for example, if youve changed your apps required permissions).
86+
![checkbox](./media/integration-checklist/checkbox-two.svg) Don't use "prompt=consent" for every sign-in. Only use prompt=consent if you've determined that you need to ask for consent for additional permissions (for example, if you've changed your app's required permissions).
8787

8888
![checkbox](./media/integration-checklist/checkbox-two.svg) Where applicable, enrich your application with user data. Using the [Microsoft Graph API](https://developer.microsoft.com/graph) is an easy way to do this. The [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) tool that can help you get started.
8989

9090
![checkbox](./media/integration-checklist/checkbox-two.svg) Register the full set of permissions that your app requires so admins can grant consent easily to their tenant. Use [incremental consent](./permissions-consent-overview.md#consent) at run time to help users understand why your app is requesting permissions that may concern or confuse users when requested on first start.
9191

92-
![checkbox](./media/integration-checklist/checkbox-two.svg) Implement a [clean single sign-out experience](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/1-WebApp-OIDC/1-6-SignOut). Its a privacy and a security requirement, and makes for a good user experience.
92+
![checkbox](./media/integration-checklist/checkbox-two.svg) Implement a [clean single sign-out experience](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/1-WebApp-OIDC/1-6-SignOut). It's a privacy and a security requirement, and makes for a good user experience.
9393

9494
## Testing
9595

96-
![checkbox](./media/integration-checklist/checkbox-two.svg) Test for [Conditional Access policies](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/1-WebApp-OIDC/1-6-SignOut) that may affect your users ability to use your application.
96+
![checkbox](./media/integration-checklist/checkbox-two.svg) Test for [Conditional Access policies](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/1-WebApp-OIDC/1-6-SignOut) that may affect your users' ability to use your application.
9797

9898
![checkbox](./media/integration-checklist/checkbox-two.svg) Test your application with all possible accounts that you plan to support (for example, work or school accounts, personal Microsoft accounts, child accounts, and sovereign accounts).
9999

articles/active-directory/develop/jwt-claims-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.workload: identity
1010
ms.topic: how-to
1111
ms.date: 05/01/2023
1212
ms.author: davidmu
13-
ms.custom: aaddev, curation-claims
13+
ms.custom: aaddev, curation-claims, devx-track-dotnet
1414
ms.reviewer: rahulnagraj, alamaral
1515
---
1616

articles/active-directory/develop/quickstart-console-app-netcore-acquire-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.date: 03/13/2023
1212
ms.author: owenrichards
1313
ms.reviewer: jmprieur
14-
ms.custom: devx-track-csharp, aaddev, identityplatformtop40, "scenarios:getting-started", "languages:aspnet-core", mode-other
14+
ms.custom: devx-track-csharp, aaddev, identityplatformtop40, 'scenarios:getting-started', 'languages:aspnet-core', mode-other, devx-track-dotnet
1515
#Customer intent: As an application developer, I want to learn how my .NET Core app can get an access token and call an API that's protected by the Microsoft identity platform by using the client credentials flow.
1616
---
1717

articles/active-directory/develop/quickstart-console-app-nodejs-acquire-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ ms.subservice: develop
99
ms.topic: quickstart
1010
ms.date: 09/09/2022
1111
ms.author: cwerner
12+
ms.custom: mode-other, devx-track-js
1213
#Customer intent: As an application developer, I want to learn how my Node.js app can get an access token and call an API that is protected by a Microsoft identity platform endpoint using client credentials flow.
13-
ms.custom: mode-other
1414
---
1515

1616
# Quickstart: Acquire a token and call Microsoft Graph from a Node.js console app

articles/active-directory/develop/quickstart-daemon-app-java-acquire-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: quickstart
1010
ms.workload: identity
1111
ms.date: 01/10/2022
1212
ms.author: dmwendia
13-
ms.custom: aaddev, "scenarios:getting-started", "languages:Java", devx-track-java, mode-other
13+
ms.custom: aaddev, 'scenarios:getting-started', 'languages:Java', devx-track-java, mode-other, devx-track-extended-java
1414
#Customer intent: As an application developer, I want to learn how my Java app can get an access token and call an API that's protected by Microsoft identity platform endpoint using client credentials flow.
1515
---
1616

0 commit comments

Comments
 (0)