Skip to content

Commit 3ccc700

Browse files
authored
Merge pull request MicrosoftDocs#84754 from MicrosoftDocs/master
8/8 PM Publish
2 parents 9973887 + 776d0f1 commit 3ccc700

File tree

147 files changed

+984
-1143
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

147 files changed

+984
-1143
lines changed

articles/active-directory/develop/authentication-flows-app-scenarios.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ For more information, read [Mobile app that calls web APIs](scenario-mobile-over
140140

141141
### Protected Web API
142142

143-
You can use the Microsoft identity platform endpoint to secure web services, such as your app's RESTful Web API. A protected Web API is called with an access token to secure its data and to authenticate incoming requests. The caller of a Web API appends an access token in the authorization header of an HTTP request. If you want to protect you ASP.NET or ASP.NET Core Web API, you will need to validate the access token. For this, you'll use the ASP.NET JWT middleware. Under the hood, the validation is done by the [IdentityModel extensions for .NET](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/wiki) library, not MSAL.NET
143+
You can use the Microsoft identity platform endpoint to secure web services, such as your app's RESTful Web API. A protected Web API is called with an access token to secure its data and to authenticate incoming requests. The caller of a Web API appends an access token in the authorization header of an HTTP request. If you want to protect your ASP.NET or ASP.NET Core Web API, you will need to validate the access token. For this, you'll use the ASP.NET JWT middleware. Under the hood, the validation is done by the [IdentityModel extensions for .NET](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/wiki) library, not MSAL.NET
144144

145145
For more information, read [Protected Web API](scenario-protected-web-api-overview.md).
146146

articles/active-directory/devices/hybrid-azuread-join-federated-domains.md

+2
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,8 @@ If you don't use WPAD and want to configure proxy settings on your computer, you
9292
9393
If your organization requires access to the internet via an authenticated outbound proxy, you must make sure that your Windows 10 computers can successfully authenticate to the outbound proxy. Because Windows 10 computers run device registration by using machine context, you must configure outbound proxy authentication by using machine context. Follow up with your outbound proxy provider on the configuration requirements.
9494

95+
To verify if the device is able to access the above Microsoft resources under the system account, you can use [Test Device Registration Connectivity](https://gallery.technet.microsoft.com/Test-Device-Registration-3dc944c0) script.
96+
9597
## Configure hybrid Azure AD join
9698

9799
To configure a hybrid Azure AD join by using Azure AD Connect, you need:

articles/active-directory/devices/hybrid-azuread-join-manual.md

+2
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,8 @@ For Windows 10 devices on version 1703 or earlier, if your organization requires
7171

7272
Beginning with Windows 10 1803, even if a hybrid Azure AD join attempt by a device in a federated domain through AD FS fails, and if Azure AD Connect is configured to sync the computer/device objects to Azure AD, the device will try to complete the hybrid Azure AD join by using the synced computer/device.
7373

74+
To verify if the device is able to access the above Microsoft resources under the system account, you can use [Test Device Registration Connectivity](https://gallery.technet.microsoft.com/Test-Device-Registration-3dc944c0) script.
75+
7476
## Verify configuration steps
7577

7678
You can configure hybrid Azure AD joined devices for various types of Windows device platforms. This topic includes the required steps for all typical configuration scenarios.

articles/active-directory/manage-apps/application-provisioning-config-problem-no-users-provisioned.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121
# No users are being provisioned to an Azure AD Gallery application
2222
After automatic provisioning has been configured for an application (including verifying that the app credentials provided to Azure AD to connect to the app are valid), then users and/or groups are provisioned to the app. Provisioning is determined by the following things:
2323

24-
- Which users and groups have been **assigned** to the application. For more information on assignment, see [Assign a user or group to an enterprise app in Azure Active Directory](assign-user-or-group-access-portal.md).
24+
- Which users and groups have been **assigned** to the application. Note that provisioning nested groups or Office 365 groups is not supported. For more information on assignment, see [Assign a user or group to an enterprise app in Azure Active Directory](assign-user-or-group-access-portal.md).
2525
- Whether or not **attribute mappings** are enabled, and configured to sync valid attributes from Azure AD to the app. For more information on attribute mappings, see [Customizing User Provisioning Attribute Mappings for SaaS Applications in Azure Active Directory](customize-application-attributes.md).
2626
- Whether or not there is a **scoping filter** present that is filtering users based on specific attribute values. For more information on scoping filters, see [Attribute-based application provisioning with scoping filters](define-conditional-rules-for-provisioning-user-accounts.md).
2727

0 commit comments

Comments
 (0)