Skip to content

Commit 9e3c8ca

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 81f5cf8 + 4c2b9bc commit 9e3c8ca

File tree

55 files changed

+378
-1047
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+378
-1047
lines changed

.openpublishing.redirection.json

Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,86 @@
9090
"redirect_url": "https://docs.microsoft.com/previous-versions/azure/batch-ai/scripts/batch-ai-cli-sample-create-cluster-low-priority",
9191
"redirect_document_id": true
9292
},
93+
{
94+
"source_path": "articles/china/china-get-started-developer-guide.md",
95+
"redirect_url": "https://docs.microsoft.com/azure/china/resources-developer-guide",
96+
"redirect_document_id": true
97+
},
98+
{
99+
"source_path": "articles/china/china-get-started-plan.md",
100+
"redirect_url": "https://docs.microsoft.com/azure/china",
101+
"redirect_document_id": false
102+
},
103+
{
104+
"source_path": "articles/china/china-get-started-service-cdn.md",
105+
"redirect_url": "https://docs.microsoft.com/azure/china",
106+
"redirect_document_id": false
107+
},
108+
{
109+
"source_path": "articles/china/china-get-started-service-manage-and-connect.md",
110+
"redirect_url": "https://docs.microsoft.com/azure/china",
111+
"redirect_document_id": false
112+
},
113+
{
114+
"source_path": "articles/china/china-how-to-manage-performance.md",
115+
"redirect_url": "https://docs.microsoft.com/azure/china",
116+
"redirect_document_id": false
117+
},
118+
{
119+
"source_path": "articles/china/china-how-to-refactor.md",
120+
"redirect_url": "https://docs.microsoft.com/azure/china",
121+
"redirect_document_id": false
122+
},
123+
{
124+
"source_path": "articles/china/china-how-to-rehost.md",
125+
"redirect_url": "https://docs.microsoft.com/azure/china",
126+
"redirect_document_id": false
127+
},
128+
{
129+
"source_path": "articles/china/china-overview-faq.md",
130+
"redirect_url": "https://docs.microsoft.com/azure/china",
131+
"redirect_document_id": false
132+
},
133+
{
134+
"source_path": "articles/china/china-overview-operations.md",
135+
"redirect_url": "https://docs.microsoft.com/azure/china",
136+
"redirect_document_id": false
137+
},
138+
{
139+
"source_path": "articles/china/china-overview-policies.md",
140+
"redirect_url": "https://docs.microsoft.com/azure/china",
141+
"redirect_document_id": false
142+
},
143+
{
144+
"source_path": "articles/china/china-overview-service-hosting.md",
145+
"redirect_url": "https://docs.microsoft.com/azure/china",
146+
"redirect_document_id": false
147+
},
148+
{
149+
"source_path": "articles/china/china-overview-trust-cloud.md",
150+
"redirect_url": "https://docs.microsoft.com/azure/china",
151+
"redirect_document_id": false
152+
},
153+
{
154+
"source_path": "articles/china/china-resources-partners.md",
155+
"redirect_url": "https://docs.microsoft.com/azure/china",
156+
"redirect_document_id": false
157+
},
158+
{
159+
"source_path": "articles/china/china-resources-support.md",
160+
"redirect_url": "https://docs.microsoft.com/azure/china",
161+
"redirect_document_id": false
162+
},
163+
{
164+
"source_path": "articles/china/china-welcome.md",
165+
"redirect_url": "https://docs.microsoft.com/azure/china",
166+
"redirect_document_id": false
167+
},
168+
{
169+
"source_path": "articles/china/index.md",
170+
"redirect_url": "https://docs.microsoft.com/azure/china",
171+
"redirect_document_id": false
172+
},
93173
{
94174
"source_path": "articles/site-recovery/vmware-physical-mobility-service-install-manual.md",
95175
"redirect_url": "/azure/site-recovery/vmware-physical-mobility-service-overview#install-mobility-agent-through-ui",

articles/active-directory/develop/TOC.yml

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -239,20 +239,30 @@
239239
href: msal-net-provide-httpclient.md
240240
- name: Integrate with Azure AD B2C
241241
href: msal-b2c-overview.md
242-
- name: Platform-specific considerations (.NET)
242+
- name: Considerations and known issues
243243
items:
244-
- name: Web browsers
245-
href: msal-net-web-browsers.md
246-
- name: Xamarin Android
247-
href: msal-net-xamarin-android-considerations.md
248-
- name: System browser on Android
249-
href: msal-net-system-browser-android-considerations.md
250-
- name: Xamarin iOS
251-
href: msal-net-xamarin-ios-considerations.md
252-
- name: Universal Windows Platform
253-
href: msal-net-uwp-considerations.md
254-
- name: Apply an AAD B2C policy
255-
href: msal-net-aad-b2c-considerations.md
244+
- name: MSAL.NET
245+
items:
246+
- name: Web browsers
247+
href: msal-net-web-browsers.md
248+
- name: Xamarin Android
249+
href: msal-net-xamarin-android-considerations.md
250+
- name: System browser on Android
251+
href: msal-net-system-browser-android-considerations.md
252+
- name: Xamarin iOS
253+
href: msal-net-xamarin-ios-considerations.md
254+
- name: Universal Windows Platform
255+
href: msal-net-uwp-considerations.md
256+
- name: Apply an AAD B2C policy
257+
href: msal-net-aad-b2c-considerations.md
258+
- name: MSAL.js
259+
items:
260+
- name: Considerations using IE
261+
href: msal-js-use-ie-browser.md
262+
- name: Known issues- IE and Microsoft Edge
263+
href: msal-js-known-issues-ie-edge-browsers.md
264+
- name: Known issues- Safari
265+
href: msal-js-known-issues-safari-browser.md
256266
- name: Authentication
257267
items:
258268
- name: Authentication basics
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
---
2+
title: Known issues on browsers (Microsoft Authentication Library for JavaScript) | Azure
3+
description: Learn about know issues when using the Microsoft Authentication Library for JavaScript (MSAL.js) with Internet Explorer and Microsoft Edge browsers.
4+
services: active-directory
5+
documentationcenter: dev-center-name
6+
author: navyasric
7+
manager: CelesteDG
8+
editor: ''
9+
10+
ms.service: active-directory
11+
ms.subservice: develop
12+
ms.devlang: na
13+
ms.topic: troubleshooting
14+
ms.tgt_pltfrm: na
15+
ms.workload: identity
16+
ms.date: 05/16/2019
17+
ms.author: nacanuma
18+
ms.reviewer: saeeda
19+
ms.custom: aaddev
20+
#Customer intent: As an application developer, I want to learn about issues with MSAL.js library so I can decide if this platform meets my application development needs and requirements.
21+
ms.collection: M365-identity-device-management
22+
---
23+
24+
# Known issues on Internet Explorer and Microsoft Edge browsers with MSAL.js
25+
26+
## Issues due to security zones
27+
We had multiple reports of issues with authentication in IE and Microsoft Edge (since the update of the *Microsoft Edge browser version to 40.15063.0.0*). We are tracking these and have informed the Microsoft Edge team. While Microsoft Edge works on a resolution, here is a description of the frequently occurring issues and the possible workarounds that can be implemented.
28+
29+
### Cause
30+
The cause for most of these issues is as follows. The session storage and local storage are partitioned by security zones in the Microsoft Edge browser. In this particular version of Microsoft Edge, when the application is redirected across zones, the session storage and local storage are cleared. Specifically, the session storage is cleared in the regular browser navigation, and both the session and local storage are cleared in the InPrivate mode of the browser. MSAL.js saves certain state in the session storage and relies on checking this state during the authentication flows. When the session storage is cleared, this state is lost and hence results in broken experiences.
31+
32+
### Issues
33+
34+
- **Infinite redirect loops and page reloads during authentication**. When users sign in to the application on Microsoft Edge, they are redirected back from the AAD login page and are stuck in an infinite redirect loop resulting in repeated page reloads. This is usually accompanied by an `invalid_state` error in the session storage.
35+
36+
- **Infinite acquire token loops and AADSTS50058 error**. When an application running on Microsoft Edge tries to acquire a token for a resource, the application may get stuck in an infinite loop of the acquire token call along with the following error from AAD in your network trace:
37+
38+
`Error :login_required; Error description:AADSTS50058: A silent sign-in request was sent but no user is signed in. The cookies used to represent the user's session were not sent in the request to Azure AD. This can happen if the user is using Internet Explorer or Edge, and the web app sending the silent sign-in request is in different IE security zone than the Azure AD endpoint (login.microsoftonline.com)`
39+
40+
- **Popup window doesn't close or is stuck when using login through Popup to authenticate**. When authenticating through popup window in Microsoft Edge or IE(InPrivate), after entering credentials and signing in, if multiple domains across security zones are involved in the navigation, the popup window doesn't close because MSAL.js loses the handle to the popup window.
41+
42+
Here are links to these issues in the Microsoft Edge issue tracker:
43+
- [Bug 13861050](https://developer.microsoft.com/en-us/microsoft-edge/platform/issues/13861050/)
44+
- [Bug 13861663](https://developer.microsoft.com/en-us/microsoft-edge/platform/issues/13861663/)
45+
46+
### Update: Fix available in MSAL.js 0.2.3
47+
Fixes for the authentication redirect loop issues have been released in [MSAL.js 0.2.3](https://github.com/AzureAD/microsoft-authentication-library-for-js/releases). Enable the flag `storeAuthStateInCookie` in the MSAL.js config to take advantage of this fix. By default this flag is set to false.
48+
49+
When the `storeAuthStateInCookie` flag is enabled, MSAL.js will use the browser cookies to store the request state required for validation of the auth flows.
50+
51+
> [!NOTE]
52+
> This fix is not yet available for the msal-angular and msal-angularjs wrappers. This fix does not address the issue with Popup windows.
53+
54+
Use workarounds below.
55+
56+
#### Other workarounds
57+
Make sure to test that your issue is occurring only on the specific version of Microsoft Edge browser and works on the other browsers before adopting these workarounds.
58+
1. As a first step to get around these issues, ensure that the application domain, , and any other sites involved in the redirects of the authentication flow are added as trusted sites in the security settings of the browser, so that they belong to the same security zone.
59+
To do so, follow these steps:
60+
- Open **Internet Explorer** and click on the **settings** (gear icon) in the top-right corner
61+
- Select **Internet Options**
62+
- Select the **Security** tab
63+
- Under the **Trusted Sites** option, click on the **sites** button and add the URLs in the dialog box that opens.
64+
65+
2. As mentioned before, since only the session storage is cleared during the regular navigation, you may configure MSAL.js to use the local storage instead. This can be set as the `cacheLocation` config parameter while initializing MSAL.
66+
67+
Note, this will not solve the issue for InPrivate browsing since both session and local storage are cleared.
68+
69+
## Issues due to popup blockers
70+
71+
There are cases when popups are blocked in IE or Microsoft Edge, for example when a second popup occurs during multi-factor authentication. You will get an alert in the browser to allow for the popup once or always. If you choose to allow, the browser opens the popup window automatically and returns a `null` handle for it. As a result, the library does not have a handle for the window and there is no way to close the popup window. The same issue does not happen in Chrome when it prompts you to allow popups because it does not automatically open a popup window.
72+
73+
As a **workaround**, developers will need to allow popups in IE and Microsoft Edge before they start using their app to avoid this issue.
74+
75+
## Next steps
76+
Learn more about [Using MSAL.js in Internet Explorer](msal-js-use-ie-browser.md).
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: Known issues on browsers (Microsoft Authentication Library for JavaScript) | Azure
3+
description: Learn about know issues when using the Microsoft Authentication Library for JavaScript (MSAL.js) with Safari browser.
4+
services: active-directory
5+
documentationcenter: dev-center-name
6+
author: navyasric
7+
manager: CelesteDG
8+
editor: ''
9+
10+
ms.service: active-directory
11+
ms.subservice: develop
12+
ms.devlang: na
13+
ms.topic: troubleshooting
14+
ms.tgt_pltfrm: na
15+
ms.workload: identity
16+
ms.date: 05/16/2019
17+
ms.author: nacanuma
18+
ms.reviewer: saeeda
19+
ms.custom: aaddev
20+
#Customer intent: As an application developer, I want to learn about issues with MSAL.js library so I can decide if this platform meets my application development needs and requirements.
21+
ms.collection: M365-identity-device-management
22+
---
23+
24+
# Known issues on Safari browser with MSAL.js
25+
26+
## Silent token renewal on Safari 12 and ITP 2.0
27+
28+
Apple iOS 12 and MacOS 10.14 operating systems included a release of the [Safari 12 browser](https://developer.apple.com/safari/whats-new/). For purposes of security and privacy, Safari 12 includes the [Intelligent Tracking Prevention 2.0](https://webkit.org/blog/8311/intelligent-tracking-prevention-2-0/). This essentially causes the browser to drop third-party cookies being set. ITP 2.0 also treats the cookies set by identity providers as third-party cookies.
29+
30+
### Impact on MSAL.js
31+
32+
MSAL.js uses a hidden Iframe to perform silent token acquisition and renewal as part of the `acquireTokenSilent` calls. The silent token requests rely on the Iframe having access to the authenticated user session represented by the cookies set by Azure AD. With ITP 2.0 preventing access to these cookies, MSAL.js fails to silently acquire and renew tokens and this results in `acquireTokenSilent` failures.
33+
34+
There is no solution for this issue at this point and we are evaluating options with the standards community.
35+
36+
### Work around
37+
38+
By default the ITP setting is enabled on Safari browser. You can disable this setting by navigating to
39+
**Preferences** -> **Privacy** and unchecking the **Prevent cross-site tracking** option.
40+
41+
![safari setting](./media/msal-js-known-issue-safari-browser/safari.png)
42+
43+
You will need to handle the `acquireTokenSilent` failures with an interactive acquire token call, which prompts the user to sign in.
44+
To avoid repeated sign-ins, an approach you can implement is to handle the `acquireTokenSilent` failure and provide the user an option to disable the ITP setting in Safari before proceeding with the interactive call. Once the setting is disabled, subsequent silent token renewals should succeed.
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
---
2+
title: Use Internet Explorer (Microsoft Authentication Library for JavaScript) | Azure
3+
description: Learn about using the Microsoft Authentication Library for JavaScript (MSAL.js) with Internet Explorer browser.
4+
services: active-directory
5+
documentationcenter: dev-center-name
6+
author: navyasric
7+
manager: CelesteDG
8+
editor: ''
9+
10+
ms.service: active-directory
11+
ms.subservice: develop
12+
ms.devlang: na
13+
ms.topic: conceptual
14+
ms.tgt_pltfrm: na
15+
ms.workload: identity
16+
ms.date: 05/16/2019
17+
ms.author: nacanuma
18+
ms.reviewer: saeeda
19+
ms.custom: aaddev
20+
#Customer intent: As an application developer, I want to learn about issues with MSAL.js library so I can decide if this platform meets my application development needs and requirements.
21+
ms.collection: M365-identity-device-management
22+
---
23+
24+
# Known issues on Internet Explorer and Microsoft Edge browsers with MSAL.js
25+
26+
Microsoft Authentication Library for JavaScript (MSAL.js) is generated for [JavaScript ES5](https://fr.wikipedia.org/wiki/ECMAScript#ECMAScript_Edition_5_.28ES5.29) so that it can run in Internet Explorer. There are, however, a few things to know.
27+
28+
## Run an app in Internet Explorer
29+
If you intend to use MSAL.js in applications that can run in Internet Explorer, you will need to add a reference to a promise polyfill before referencing the MSAL.js script.
30+
31+
```html
32+
<script src="https://cdnjs.cloudflare.com/ajax/libs/bluebird/3.3.4/bluebird.min.js" class="pre"></script>
33+
```
34+
35+
This is because Internet Explorer does not support JavaScript promises natively.
36+
37+
## Debugging an application running in Internet Explorer
38+
39+
### Running in production
40+
Deploying your application to production (for instance in Azure Web apps) normally works fine, provided the end user has accepted popups. We tested it with Internet Explorer 11.
41+
42+
### Running locally
43+
If you want to run and debug locally your application running in Internet Explorer, you need to be aware of the following considerations (assume that you want to run your application as *http://localhost:1234*):
44+
45+
- Internet Explorer has a security mechanism named "protected mode", which prevents MSAL.js from working correctly. Among the symptoms, after you sign in, the page can be redirected to http://localhost:1234/null.
46+
47+
- To run and debug your application locally, you'll need to disable this "protected mode". For this:
48+
49+
1. Click Internet Explorer **Tools** (the gear icon).
50+
1. Select **Internet Options** and then the **Security** tab.
51+
1. Click on the **Internet** zone, and uncheck **Enable Protected Mode (requires restarting Internet Explorer)**. Internet Explorer warns that your computer is no longer protected. Click **OK**.
52+
1. Restart Internet Explorer.
53+
1. Run and debug your application.
54+
55+
When you are done, restore the Internet Explorer security settings. Select **Settings** -> **Internet Options** -> **Security** -> **Reset all zones to default level**.
56+
57+
## Next steps
58+
Learn more about [Known issues when using MSAL.js in Internet Explorer](msal-js-use-ie-browser.md).

articles/cdn/cdn-china-delivery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ To learn more about Azure CDN China, see:
6060

6161
- [Use the Azure Content Delivery Network](https://docs.azure.cn/en-us/cdn/cdn-how-to-use)
6262

63-
- [Azure service availability in China](https://docs.microsoft.com/azure/china/china-get-started-service-availability)
63+
- [Azure service availability in China](https://docs.microsoft.com/azure/china/concepts-service-availability)
6464

6565

6666

0 commit comments

Comments
 (0)