Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
…cs-pr (branch live)
  • Loading branch information
Banani-Rath committed Jun 17, 2020
2 parents 9805879 + 34eb5e4 commit 1ed3dc8
Show file tree
Hide file tree
Showing 144 changed files with 2,395 additions and 613 deletions.
7 changes: 6 additions & 1 deletion .openpublishing.redirection.json
Original file line number Diff line number Diff line change
Expand Up @@ -9918,7 +9918,12 @@
},
{
"source_path": "articles/app-service-web/web-sites-php-configure.md",
"redirect_url": "/azure/app-service/web-sites-php-configure",
"redirect_url": "/azure/app-service/configure-language-php",
"redirect_document_id": false
},
{
"source_path": "articles/app-service/web-sites-php-configure.md",
"redirect_url": "/azure/app-service/configure-language-php",
"redirect_document_id": false
},
{
Expand Down
6 changes: 3 additions & 3 deletions articles/active-directory/b2b/api-connectors-overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,8 @@ ms.collection: M365-identity-device-management
## Overview
As a developer or IT administrator, you can use API connectors to integrate your [self-service sign-up user flows](self-service-sign-up-overview.md) with external systems by leveraging web APIs. For example, you can use API connectors to:

- [**Integrate with a custom approval workflows**](self-service-sign-up-add-approvals.md). Connect to a custom approval system for managing account creation.
- [**Perform identity proofing**](code-samples-self-service-sign-up.md#identity-proofing). Use an identity proofing and verification service to add an extra level of security to account creation decisions.
- [**Integrate with a custom approval workflow**](self-service-sign-up-add-approvals.md). Connect to a custom approval system for managing account creation.
- [**Perform identity verification**](code-samples-self-service-sign-up.md#identity-verification). Use an identity verification service to add an extra level of security to account creation decisions.
- **Validate user input data**. Validate against malformed or invalid user data. For example, you can validate user-provided data against existing data in an external data store or list of permitted values. If invalid, you can ask a user to provide valid data or block the user from continuing the sign-up flow.
- **Overwrite user attributes**. Reformat or assign a value to an attribute collected from the user. For example, if a user enters the first name in all lowercase or all uppercase letters, you can format the name with only the first letter capitalized.
<!-- - **Enrich user data**. Integrate with your external cloud systems that store user information to integrate them with the sign-up flow. For example, your API can receive the user's email address, query a CRM system, and return the user's loyalty number. Returned claims can be used to pre-fill form fields or return additional data in the application token. -->
Expand Down Expand Up @@ -50,7 +50,7 @@ An API connector at this step in the sign-up process is invoked after the attrib

- Validate user input data and ask a user to resubmit data.
- Block a user sign-up based on data entered by the user.
- Perform identity proofing.
- Perform identity verification.
- Query external systems for existing data about the user to return it in the application token or store it in Azure AD.

<!-- > [!IMPORTANT]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,9 +22,9 @@ The following tables provide links to code samples for leveraging web APIs in yo

| Sample | Description |
| ------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------- |
| [.NET Core](https://github.com/Azure-Samples/active-directory-dotnet-external-identities-api-connector-azure-function-validate) | This .NET Core Azure Function sample demonstrates how to limit sign-ups to a specific domain (e.g. @fabrikam.com) and validate user-provided information. |
| [Node.js](https://github.com/Azure-Samples/active-directory-nodejs-external-identities-api-connector-azure-function-validate) | This Node.js Azure Function sample demonstrates how to limit sign-ups to a specific domain (e.g. @fabrikam.com) and validate user-provided information. |
| [Python](https://github.com/Azure-Samples/active-directory-python-external-identities-api-connector-azure-function-validate) | This Python Azure Function sample demonstrates how to limit sign-ups to a specific domain (e.g. @fabrikam.com) and validate user-provided information. |
| [.NET Core](https://github.com/Azure-Samples/active-directory-dotnet-external-identities-api-connector-azure-function-validate) | This .NET Core Azure Function sample demonstrates how to limit sign-ups to specific tenant domains and validate user-provided information. |
| [Node.js](https://github.com/Azure-Samples/active-directory-nodejs-external-identities-api-connector-azure-function-validate) | This Node.js Azure Function sample demonstrates how to limit sign-ups to specific tenant domains and validate user-provided information. |
| [Python](https://github.com/Azure-Samples/active-directory-python-external-identities-api-connector-azure-function-validate) | This Python Azure Function sample demonstrates how to limit sign-ups to specific tenant domains and validate user-provided information. |

<!-- \| [Java](../../azure-docs-pr/articles/active-directory/b2b/invite-internal-users.md#use-the-invitation-api-to-send-a-b2b-invitation) | The sample below illustrates how to call the invitation API to invite an internal user as a B2B user. | -->

Expand All @@ -34,10 +34,10 @@ The following tables provide links to code samples for leveraging web APIs in yo
|--------| ----------- |
| [Manual approval workflow](https://github.com/Azure-Samples/active-directory-dotnet-external-identities-api-connectors-approvals) | This sample demonstrates an end-to-end approval workflow to manage guest user account creation in self-service sign-up |

## Identity proofing
## Identity verification

| Sample | Description |
| ----------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------ |
| [IDology](https://github.com/Azure-Samples/active-directory-dotnet-external-identities-idology-identity-proofing) | This sample shows how to add ID proofing to your self-service sign-up user flow by using an API connector to integrate with IDology. |
| [IDology](https://github.com/Azure-Samples/active-directory-dotnet-external-identities-idology-identity-verification) | This sample shows how to verify a user identity as part of your self-service sign-up by using an API connector to integrate with IDology. |

<!-- | [Experian](https://github.com/Azure-Samples/) | This sample shows how add identity verification to your self-service sign-up user flow by using an API connector to integrate with Experian. | -->
Original file line number Diff line number Diff line change
Expand Up @@ -202,7 +202,7 @@ You can use an HTTP trigger in Azure Functions as a simple way create an API to

## Next steps

- Learn [where you can enable an API connector](api-connectors-overview.md#where-you-can-enable-an-api-connector-in-a-user-flow)
<!-- - Learn [where you can enable an API connector](api-connectors-overview.md#where-you-can-enable-an-api-connector-in-a-user-flow) -->
- Learn how to [add a custom approval workflow to self-service sign-up](self-service-sign-up-add-approvals.md)
- Get started with our [Azure Function quickstart samples](code-samples-self-service-sign-up.md#api-connector-azure-function-quickstarts).
<!-- - Learn how to [use API connectors for identity proofing](code-samples-self-service-sign-up.md#identity-proofing) -->
<!-- - Learn how to [use API connectors to verify a user identity](code-samples-self-service-sign-up.md#identity-verification) -->
2 changes: 1 addition & 1 deletion articles/active-directory/b2b/what-is-b2b.md
Original file line number Diff line number Diff line change
Expand Up @@ -97,7 +97,7 @@ Azure AD supports external identity providers like Facebook, Microsoft accounts,

With a self-service sign-up user flow, you can create a sign-up experience for external users who want to access your apps. As part of the sign-up flow, you can provide options for different social or enterprise identity providers, and collect information about the user. Learn about [self-service sign-up and how to set it up](self-service-sign-up-overview.md).

You can also use [API connectors](api-connectors-overview.md) to integrate your self-service sign-up user flows with external cloud systems. You can connect with custom approval workflows, perform identity proofing, validate user-provided information, and more.
You can also use [API connectors](api-connectors-overview.md) to integrate your self-service sign-up user flows with external cloud systems. You can connect with custom approval workflows, perform identity verification, validate user-provided information, and more.

![Screenshot showing the user flows page](media/what-is-b2b/self-service-sign-up-user-flow-overview.png)
<!--TODO: Add screenshot with API connectors -->
Expand Down
10 changes: 6 additions & 4 deletions articles/active-directory/develop/access-tokens.md
Original file line number Diff line number Diff line change
Expand Up @@ -226,11 +226,13 @@ Your application's business logic will dictate this step, some common authorizat

## User and application tokens

Your application may receive tokens on behalf of a user (the usual flow) or directly from an application (through the client credential flow ([v1.0](../azuread-dev/v1-oauth2-client-creds-grant-flow.md), [v2.0](v2-oauth2-client-creds-grant-flow.md)). These app-only tokens indicate that this call is coming from an application and does not have a user backing it. These tokens are handled largely the same, with some differences:
Your application may receive tokens for user (the flow usually discussed) or directly from an application (through the [client credentials flow](v1-oauth2-client-creds-grant-flow.md)). These app-only tokens indicate that this call is coming from an application and does not have a user backing it. These tokens are handled largely the same:

* Use `roles` to see permissions that have been granted to the subject of the token (the service principal, rather than a user in this case).
* Use `oid` or `sub` to validate that the calling service principal is the expected one.

If your app needs to distinguish between app-only access tokens and access tokens for users, use the `idtyp` [optional claim](active-directory-optional-claims.md). By adding the `idtyp` claim to the `accessToken` field, and checking for the value `app`, you can detect app-only access tokens. ID tokens and access tokens for users will not have the `idtyp` claim included.

* App-only tokens will not have a `scp` claim, and may instead have a `roles` claim. This is where application permission (as opposed to delegated permissions) will be recorded. For more information about delegated and application permissions, see permission and consent ([v1.0](../azuread-dev/v1-permissions-consent.md), [v2.0](v2-permissions-and-consent.md)).
* Many human-specific claims will be missing, such as `name` or `upn`.
* The `sub` and `oid` claims will be the same.

## Token revocation

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ ms.service: active-directory
ms.subservice: develop
ms.topic: conceptual
ms.workload: identity
ms.date: 04/22/2020
ms.date: 06/11/2020
ms.author: ryanwi
ms.reviewer: paulgarn, hirsin, keyam
ms.custom: aaddev
Expand Down Expand Up @@ -65,8 +65,9 @@ The set of optional claims available by default for applications to use are list
| `ztdid` | Zero-touch Deployment ID | JWT | | The device identity used for [Windows AutoPilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot) |
| `email` | The addressable email for this user, if the user has one. | JWT, SAML | MSA, Azure AD | This value is included by default if the user is a guest in the tenant. For managed users (the users inside the tenant), it must be requested through this optional claim or, on v2.0 only, with the OpenID scope. For managed users, the email address must be set in the [Office admin portal](https://portal.office.com/adminportal/home#/users).|
| `groups`| Optional formatting for group claims |JWT, SAML| |Used in conjunction with the GroupMembershipClaims setting in the [application manifest](reference-app-manifest.md), which must be set as well. For details see [Group claims](#configuring-groups-optional-claims) below. For more information about group claims, see [How to configure group claims](../hybrid/how-to-connect-fed-group-claims.md)
| `acct` | Users account status in tenant. | JWT, SAML | | If the user is a member of the tenant, the value is `0`. If they are a guest, the value is `1`. |
| `upn` | UserPrincipalName claim. | JWT, SAML | | Although this claim is automatically included, you can specify it as an optional claim to attach additional properties to modify its behavior in the guest user case. |
| `acct` | Users account status in tenant | JWT, SAML | | If the user is a member of the tenant, the value is `0`. If they are a guest, the value is `1`. |
| `upn` | UserPrincipalName | JWT, SAML | | Although this claim is automatically included, you can specify it as an optional claim to attach additional properties to modify its behavior in the guest user case. |
| `idtyp` | Token type | JWT access tokens | Special: only in app-only access tokens | Value is `app` when the token is an app-only token. This is the most accurate way for an API to determine if a token is an app token or an app+user token.|

## v2.0-specific optional claims set

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ ms.service: active-directory
ms.subservice: develop
ms.topic: conceptual
ms.workload: identity
ms.date: 07/23/2019
ms.date: 06/16/2020
ms.author: jmprieur
ms.custom: aaddev
#Customer intent: As an application developer, I want to know how to write a mobile app that calls web APIs using the Microsoft identity platform for developers.
Expand Down Expand Up @@ -360,7 +360,7 @@ Here's an example of how to add `LSApplicationQueriesSchemes`:

### Brokered authentication for Xamarin.Android

MSAL.NET doesn't support brokers for Android.
For information about enabling a broker on Android, see [Brokered authentication on Xamarin.Android](msal-net-use-brokers-with-xamarin-apps.md#brokered-authentication-for-android).

## Next steps

Expand Down
4 changes: 2 additions & 2 deletions articles/active-directory/develop/tutorial-v2-ios.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ ms.service: active-directory
ms.subservice: develop
ms.topic: tutorial
ms.workload: identity
ms.date: 08/30/2019
ms.date: 06/16/2020
ms.author: jmprieur
ms.reviewer: oldalton
ms.custom: aaddev, identityplatformtop40
Expand Down Expand Up @@ -44,7 +44,7 @@ This tutorial is applicable to both iOS and macOS apps. Note that some steps are

## Prerequisites

- XCode version 11.x or greater is required to build the app in this guide. You can download XCode from the [iTunes website](https://geo.itunes.apple.com/us/app/xcode/id497799835?mt=12 "XCode Download URL").
- XCode version 11.x or greater is required to build the app in this guide. You can download XCode from the [Mac App Store](https://geo.itunes.apple.com/us/app/xcode/id497799835?mt=12 "XCode Download URL").
- Microsoft Authentication Library ([MSAL.framework](https://github.com/AzureAD/microsoft-authentication-library-for-objc)). You can use a dependency manager or add the library manually. The instructions below show you how.

This tutorial will create a new project. If you want to download the completed tutorial instead, download the code:
Expand Down
2 changes: 1 addition & 1 deletion articles/active-directory/devices/azureadjoin-plan.md
Original file line number Diff line number Diff line change
Expand Up @@ -102,7 +102,7 @@ Azure AD join:

- Is only applicable to Windows 10 devices.
- Is not applicable to previous versions of Windows or other operating systems. If you have Windows 7/8.1 devices, you must upgrade to Windows 10 to deploy Azure AD join.
- Is not supported on devices with TPM in FIPS mode.
- Is supported for FIPS-compliant TPM 2.0 but not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support.

**Recommendation:** Always use the latest Windows 10 release to take advantage of updated features.

Expand Down
Loading

0 comments on commit 1ed3dc8

Please sign in to comment.