Skip to content

Commit ff6bcf8

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into erpubpeering
2 parents 877d3a7 + cc5b7f6 commit ff6bcf8

26 files changed

+1022
-682
lines changed

.openpublishing.redirection.healthcare-apis.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -590,7 +590,11 @@
590590
"redirect_document_id": false
591591
},
592592
{ "source_path_from_root": "/articles/healthcare-apis/iot/data-flow.md",
593-
"redirect_url": "/azure/healthcare-apis/iot/understand-service",
593+
"redirect_url": "/azure/healthcare-apis/iot/overview-of-device-message-processing-stages",
594+
"redirect_document_id": false
595+
},
596+
{ "source_path_from_root": "/articles/healthcare-apis/iot/understand-service.md",
597+
"redirect_url": "/azure/healthcare-apis/iot/overview-of-device-message-processing-stages",
594598
"redirect_document_id": false
595599
},
596600
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-use-device-mappings.md",

articles/active-directory/develop/tutorial-v2-android.md

Lines changed: 791 additions & 482 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/tutorial-v2-shared-device-mode.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Refer to the [configuration documentation](./msal-configuration.md) for more inf
5959

6060
Set `"shared_device_mode_supported"` to `true` in your MSAL configuration file.
6161

62-
You may not be planning to support multiple-account mode. That could be if you're not using a shared device, and the user can sign into the app with more than one account at the same time. If so, set `"account_mode"` to `"SINGLE"`. This guarantees that your app will always get `ISingleAccountPublicClientApplication`, and significantly simplifies your MSAL integration. The default value of `"account_mode"` is `"MULTIPLE"`, so it is important to change this value in the config file if you're using `"single account"` mode.
62+
You may not be planning to support multiple-account mode. That could be if you're not using a shared device, and the user can sign into the app with more than one account at the same time. If so, set `"account_mode"` to `"SINGLE"`. This guarantees that your app will always get `ISingleAccountPublicClientApplication`, and significantly simplifies your MSAL integration. The default value of `"account_mode"` is `"MULTIPLE"`, so it's important to change this value in the config file if you're using `"single account"` mode.
6363

6464
Here's an example of the auth_config.json file included in the **app**>**main**>**res**>**raw** directory of the sample app:
6565

@@ -85,7 +85,7 @@ Here's an example of the auth_config.json file included in the **app**>**main**>
8585

8686
### Detect shared-device mode
8787

88-
Shared-device mode allows you to configure Android devices to be shared by multiple employees, while providing Microsoft Identity backed management of the device. Employees can sign in to their devices and access customer information quickly. When they are finished with their shift or task, they will be able to sign-out of all apps on the shared device with a single click and the device will be immediately ready for the next employee to use.
88+
Shared-device mode allows you to configure Android devices to be shared by multiple employees, while providing Microsoft Identity backed management of the device. Employees can sign in to their devices and access customer information quickly. When they're finished with their shift or task, they'll be able to sign-out of all apps on the shared device with a single click and the device will be immediately ready for the next employee to use.
8989

9090
Use `isSharedDevice()` to determine if an app is running on a device that is in shared-device mode. Your app could use this flag to determine if it should modify UX accordingly.
9191

@@ -122,7 +122,7 @@ PublicClientApplication.create(this.getApplicationCOntext(),
122122

123123
If you're writing an app that will only be used for first-line workers on a shared device, we recommend you write your app to only support single-account mode. This includes most applications that are task focused such as medical records apps, invoice apps, and most line-of-business apps. This will simplify your development as many features of the SDK won't need to be accommodated.
124124

125-
If your app supports multiple accounts as well as shared device mode, you must perform a type check and cast to the appropriate interface as shown below.
125+
If your app supports multiple accounts and shared device mode, you must perform a type check and cast to the appropriate interface as shown below.
126126

127127
```java
128128
private IPublicClientApplication mApplication;
@@ -207,9 +207,9 @@ private void onSignOutClicked()
207207

208208
### Receive broadcast to detect global sign out initiated from other applications
209209

210-
To receive the account change broadcast, you'll need to register a broadcast receiver.  It’s recommended to register your broadcast receiver via the [Context-registered receivers](https://developer.android.com/guide/components/broadcasts#context-registered-receivers).
210+
To receive the account change broadcast, you need to register a broadcast receiver.It’s recommended to register your broadcast receiver via the [Context-registered receivers](https://developer.android.com/guide/components/broadcasts#context-registered-receivers).
211211

212-
When an account change broadcast is received, immediately [get the signed in user and determine if a user has changed on the device](#get-the-signed-in-user-and-determine-if-a-user-has-changed-on-the-device). If a change is detected, initiate data cleanup for previously signed-in account. It is recommended to properly stop any operations and do data cleanup.
212+
When an account change broadcast is received, immediately [get the signed in user and determine if a user has changed on the device](#get-the-signed-in-user-and-determine-if-a-user-has-changed-on-the-device). If a change is detected, initiate data cleanup for previously signed-in account. It's recommended to properly stop any operations and do data cleanup.
213213
214214
The following code snippet shows how you could register a broadcast receiver.
215215
@@ -238,14 +238,14 @@ The following steps describe setting up your application in the Azure portal and
238238
239239
First, register your application within your organizational tenant. Then provide these values below in auth_config.json in order for your application to run correctly.
240240
241-
For information on how to do this, refer to [Register your application](./tutorial-v2-android.md#register-your-application).
241+
For information on how to do this, refer to [Register your application](./tutorial-v2-android.md#register-your-application-with-azure-ad).
242242
243243
> [!NOTE]
244244
> When you register your app, please use the quickstart guide on the left-hand side and then select **Android**. This will lead you to a page where you'll be asked to provide the **Package Name** and **Signature Hash** for your app. These are very important to ensure your app configuration will work. You'll then receive a configuration object that you can use for your app that you'll cut and paste into your auth_config.json file.
245245

246246
:::image type="content" source="media/tutorial-v2-shared-device-mode/register-app.png" alt-text="Configure your Android app page in Azure portal quickstart":::
247247

248-
You should select **Make this change for me** and then provide the values the quickstart asks for in the Azure portal. When that's done, we will generate all the configuration files you need.
248+
You should select **Make this change for me** and then provide the values the quickstart asks for in the Azure portal. When that's done, we'll generate all the configuration files you need.
249249

250250
:::image type="content" source="media/tutorial-v2-shared-device-mode/config-info.png" alt-text="Configure your project page in Azure portal quickstart":::
251251

@@ -257,7 +257,7 @@ For testing purposes, set up the following in your tenant: at least two employee
257257

258258
### Download the Authenticator App
259259

260-
Download the Microsoft Authenticator App from the Google Play store. If you already have the app downloaded, ensure that it is the latest version.
260+
Download the Microsoft Authenticator App from the Google Play store. If you already have the app downloaded, ensure that it's the latest version.
261261
262262
### Authenticator app settings & registering the device in the cloud
263263
@@ -293,7 +293,7 @@ Once you've put a device in shared-mode, it becomes known to your organization a
293293
294294
## Running the sample app
295295
296-
The Sample Application is a simple app that will call the Graph API of your organization. On first run you'll be prompted to consent as the application is new to your employee account.
296+
The Sample Application is a simple app that will call the Graph API of your organization. On first run, you'll be prompted to consent as the application is new to your employee account.
297297

298298
:::image type="content" source="media/tutorial-v2-shared-device-mode/run-app-permissions-requested.png" alt-text="Application configuration info screen":::
299299

articles/active-directory/governance/lifecycle-workflow-extensibility.md

Lines changed: 19 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -21,40 +21,49 @@ Lifecycle Workflows allow you to create workflows that can be triggered based on
2121

2222
## Prerequisite Logic App roles required for integration with the custom task extension
2323

24-
When linking your Azure Logic App with the custom task extension task, there are certain permissions that must be completed before the link can be established.
24+
When you link your Azure Logic App with the custom task extension task, there are certain prerequisites that must be completed before the link can be established.
2525

26-
The roles on the Azure Logic App, which allows it to be compatible with the custom task extension, are as follows:
26+
To create a Logic App, you must have:
27+
28+
- A valid Azure subscription
29+
- A compatible resource group where the Logic App is located
30+
31+
> [!NOTE]
32+
> The resource group needs permissions to create, update, and read the Logic App while the custom extension is being created.
33+
34+
The roles on the Azure Logic App required with the custom task extension, are as follows:
2735

2836
- **Logic App contributor**
2937
- **Contributor**
3038
- **Owner**
3139

3240
> [!NOTE]
33-
> The **Logic App Operator** role alone will not make an Azure Logic App compatible with the custom task extension. For more information on the required **Logic App contributor** role, see: [Logic App Contributor](../../role-based-access-control/built-in-roles.md#logic-app-contributor).
41+
> The **Logic App Operator** role alone will not work with the custom task extension. For more information on the required **Logic App contributor** role, see: [Logic App Contributor](../../role-based-access-control/built-in-roles.md#logic-app-contributor).
3442
3543
## Custom task extension deployment scenarios
3644

3745
When creating custom task extensions, the scenarios for how it interacts with Lifecycle Workflows can be one of two ways:
3846

3947
:::image type="content" source="media/lifecycle-workflow-extensibility/task-extension-deployment-scenarios.png" alt-text="Screenshot of custom task deployment scenarios.":::
4048

41-
- **Launch and continue** - The Azure Logic App is started, and the following task execution immediately continues with no response expected from the Azure Logic App. This scenario is best suited if the Lifecycle workflow doesn't require any feedback (including status) from the Azure Logic App. With this scenario, as long as the workflow is started successfully, the workflow is viewed as a success.
49+
- **Launch and continue** - The Azure Logic App is started, and the following task execution immediately continues with no response expected from the Azure Logic App. This scenario is best suited if the Lifecycle workflow doesn't require any feedback (including status) from the Azure Logic App. If the Logic App is started successfully, the Lifecycle Workflow task is considered a success.
4250
- **Launch and wait** - The Azure Logic App is started, and the following task's execution waits on the response from the Logic App. You enter a time duration for how long the custom task extension should wait for a response from the Azure Logic App. If no response is received within a customer defined duration window, the task is considered failed.
4351
:::image type="content" source="media/lifecycle-workflow-extensibility/custom-task-launch-wait.png" alt-text="Screenshot of custom task launch and wait task choice." lightbox="media/lifecycle-workflow-extensibility/custom-task-launch-wait.png":::
4452

53+
> [!NOTE]
54+
> You can also deploy a custom task that calls to a third party system. To learn more about this call, see: [taskProcessingResult: resume](/graph/api/identitygovernance-taskprocessingresult-resume).
55+
4556
## Response authorization
4657

47-
When creating a custom task extension that waits for a response from the Logic App, you're able to define which applications can send a response
58+
When you create a custom task extension that waits for a response from the Logic App, you're able to define which applications can send a response
4859

4960
:::image type="content" source="media/lifecycle-workflow-extensibility/launch-wait-options.png" alt-text="Screenshot of custom task extension launch and wait options.":::
5061

5162
Response authorization can be utilized in one of the following ways:
5263

53-
- **System-assigned managed identity (Default)** - Enables and utilizes the Logic Apps system-assigned managed identity. For more information on this, see: [Authenticate access to Azure resources with managed identities in Azure Logic Apps](/azure/logic-apps/create-managed-service-identity)
54-
- **No authorization** - Grants no authorization to the Logic App. You're responsible for assigning an application permission, or role assignment.
55-
- **Existing application** - You can choose an existing application to respond.
56-
57-
64+
- **System-assigned managed identity (Default)** - With this choice you Enable and utilize the Logic Apps system-assigned managed identity. For more information, see: [Authenticate access to Azure resources with managed identities in Azure Logic Apps](/azure/logic-apps/create-managed-service-identity)
65+
- **No authorization** - With this choice you assign a Logic App or third party application an application permission (LifecycleWorkflows.ReadWrite.All), or role assignment (Lifecycle Workflows Administrator). This choice doesn't follow least privilege access as outlined in Azure Active Directory best practices. For more information on best practices for roles, see: [Best Practices for Azure AD roles](/azure/active-directory/roles/best-practices).
66+
- **Existing application** - With this choice you're able to choose an existing application to respond. You are able to choose applications that are user-assigned or regular applications. For more information on managed identity types, see: [Managed identity types](../managed-identities-azure-resources/overview.md#managed-identity-types).
5867

5968
## Custom task extension integration with Azure Logic Apps high-level steps
6069

@@ -69,19 +78,6 @@ The high-level steps for the Azure Logic Apps integration are as follows:
6978
- **Create a lifecycle workflow customTaskExtension which holds necessary information about the Azure Logic App**: Creating a custom task extension that references the configured Azure Logic App.
7079
- **Update or create a Lifecycle workflow with the “Run a custom task extension” task, referencing your created customTaskExtension**: Adding the newly created custom task extension to a new workflow, or updating the information to an existing workflow.
7180

72-
## Logic App parameters used by the custom task
73-
74-
When creating a custom task extension from the Azure portal, you're able to create a Logic App, or link it to an existing one.
75-
:::image type="content" source="media/lifecycle-workflow-extensibility/custom-task-logic-app.png" alt-text="Screenshot of a custom task create logic app selection screen.":::
76-
77-
The following information is supplied to the custom task from the Logic App:
78-
79-
- Subscription
80-
- Resource group
81-
- Logic App name
82-
83-
84-
For a guide on supplying this information to a custom task extension via Microsoft Graph, see: [Configure a Logic App for Lifecycle Workflow use](configure-logic-app-lifecycle-workflows.md).
8581

8682
## Next steps
8783

156 KB
Loading
222 KB
Loading
14.6 KB
Loading

0 commit comments

Comments
 (0)