Skip to content

Commit 4c864c6

Browse files
Merge pull request #10512 from MicrosoftDocs/revert-10477-learn-build-service-prodbot/docutune-autopr-20260108-225327-7516938-ignore-build
Revert "AB#9109: [BULK] [Bundle-Security] - Scheduled execution to fix known issues (part 5)"
2 parents 69340f0 + c072893 commit 4c864c6

9 files changed

Lines changed: 22 additions & 22 deletions

support/dynamics/gp/version-numbers-build-numbers-of-dexterity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,4 +50,4 @@ Alternatively, you can take the following actions:
5050
5151
## References
5252

53-
For more information about index files and Great Plains Dexterity source code control functionality, see [How to use an index file and the Microsoft Dynamics GP Dexterity source code control functionality to make sure that the resources that you create maintain the same resource ID in different builds and versions of your code](https://support.microsoft.com/topic/how-to-use-an-index-file-and-the-microsoft-dynamics-gp-dexterity-source-code-control-functionality-to-make-sure-that-the-resources-that-you-create-maintain-the-same-resource-id-in-different-builds-and-versions-of-your-code-a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1).
53+
For more information about index files and Great Plains Dexterity source code control functionality, see [How to use an index file and the Microsoft Dynamics GP Dexterity source code control functionality to make sure that the resources that you create maintain the same resource ID in different builds and versions of your code](https://support.microsoft.com/topic/how-to-use-an-index-file-and-the-microsoft-dynamics-gp-dexterity-source-code-control-functionality-to-make-sure-that-the-resources-that-you-create-maintain-the-same-resource-id-in-different-builds-and-versions-of-your-code-02402cc4-d884-afcf-d910-1d47722c18cc).

support/entra/entra-id/app-integration/bundle-consent-application-registrations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Your authentication request must use the `.default` scope for Microsoft Graph. F
4040
```HTTP
4141
https://login.microsoftonline.com/common/oauth2/v2.0/authorize
4242
?response_type=code
43-
&Client_id=00001111-aaaa-2222-bbbb-3333cccc4444
43+
&Client_id=72333f42-5078-4212-abb2-e4f9521ec76a
4444
&redirect_uri=https://localhost
4545
&scope=openid profile offline_access app_uri_id1/.default
4646
&prompt=consent
@@ -54,7 +54,7 @@ https://login.microsoftonline.com/common/oauth2/v2.0/authorize
5454
```http
5555
GET https://login.microsoftonline.com/common/oauth2/v2.0/authorize
5656
?response_type=code
57-
&client_id=00001111-aaaa-2222-bbbb-3333cccc4444
57+
&client_id=72333f42-5078-4212-abb2-e4f9521ec76a
5858
&redirect_uri=https://localhost
5959
&scope=openid profile offline_access User.Read https://graph.microsoft.com/.default
6060
&prompt=consent
@@ -63,7 +63,7 @@ GET https://login.microsoftonline.com/common/oauth2/v2.0/authorize
6363
#### Implementation by using MSAL.NET
6464

6565
```csharp
66-
String[] consentScope = { "api://aaaabbbb-0000-cccc-1111-dddd2222eeee/.default" };
66+
String[] consentScope = { "api://ae5a0bbe-d6b3-4a20-867b-c8d9fd442160/.default" };
6767
var loginResult = await clientApp.AcquireTokenInteractive(consentScope)
6868
.WithAccount(account)
6969
.WithPrompt(Prompt.Consent)
@@ -208,9 +208,9 @@ The following is an end-to-end code sample that demonstrates a smooth user exper
208208

209209
```csharp
210210
string[] msGraphScopes = { "User.Read", "Mail.Send", "Calendar.Read" }
211-
String[] apiScopes = { "api://aaaabbbb-0000-cccc-1111-dddd2222eeee/access_as_user" };
211+
String[] apiScopes = { "api://ae5a0bbe-d6b3-4a20-867b-c8d9fd442160/access_as_user" };
212212
String[] msGraphDefaultScope = { "https://graph.microsoft.com/.default" };
213-
String[] apiDefaultScope = { "api://aaaabbbb-0000-cccc-1111-dddd2222eeee/.default" };
213+
String[] apiDefaultScope = { "api://ae5a0bbe-d6b3-4a20-867b-c8d9fd442160/.default" };
214214

215215
var accounts = await clientApp.GetAccountsAsync();
216216
IAccount account = accounts.FirstOrDefault();

support/entra/entra-id/app-integration/error-code-AADSTS650056-misconfigured-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ For example:
8787
```HTTP
8888
https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize
8989
?response\_type=code
90-
&client\_id=00001111-aaaa-2222-bbbb-3333cccc4444
90+
&client\_id=044abcc4-914c-4444-9c3f-48cc3140b6b4
9191
&resource=https://vault.azure.net/
9292
&scope=openid
9393
&prompt=consent
@@ -109,7 +109,7 @@ For example:
109109
```HTTP
110110
https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/v2.0/authorize
111111
?response_type=code
112-
&client_id=00001111-aaaa-2222-bbbb-3333cccc4444
112+
&client_id=044abcc4-914c-4444-9c3f-48cc3140b6b4
113113
&scope=openid+https://vault.azure.net/user_impersonation
114114
&prompt=consent
115115
```

support/entra/entra-id/app-integration/idx10501-token-signature-validation-error.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ For SAML, Microsoft Entra ID uses the app-specific certificate to sign tokens. T
4848
3. If your app uses custom signing keys that use a [claims-mapping policy](/entra/identity-platform/saml-claims-customization), you must append an `appid` query parameter that contains the app client ID. This step is necessary to retrieve a `jwks_uri` that points to the app’s specific signing key information. For example:
4949
5050
```http
51-
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration?appid=00001111-aaaa-2222-bbbb-3333cccc4444
51+
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration?appid=6731de76-14a6-49ae-97bc-6eba6914391e
5252
```
5353
5454
### Middleware configuration examples

support/entra/entra-id/app-integration/send-notification-details.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,9 @@ See the following descriptions for more details about the notifications.
5555
- **UPN** – the user who performed the operation
5656
- Example – **tperkins\@f128.info**
5757
- **Tenant ID** – the unique ID of the tenant that the user who performed the operation was a member of
58-
- Example – **aaaabbbb-0000-cccc-1111-dddd2222eeee**
58+
- Example – **7918d4b5-0442-4a97-be2d-36f9f9962ece**
5959
- **User object ID** – the unique ID of the user who performed the operation
60-
- Example – **cccccccc-2222-3333-4444-dddddddddddd**
60+
- Example – **17f84be4-51f8-483a-b533-383791227a99**
6161

6262
### Detailed Notification Items
6363

@@ -71,6 +71,6 @@ See the following descriptions for more details about the notifications.
7171
- Example – **Internal url `https://bing.com/` is invalid since it is already in use**
7272
- **Copy error** – Select the **copy icon** to the right of the **Copy error** textbox to copy all the notification details to share with a support or product group engineer
7373
- Example
74-
```{"errorCode":"InternalUrl\_Duplicate","localizedErrorDetails":{"errorDetail":"Internal url 'https://google.com/' is invalid since it is already in use"},"operationResults":\[{"objectId":null,"displayName":null,"status":0,"details":"Internal url 'https://bing.com/' is invalid since it is already in use"}\],"timeStampUtc":"2017-03-23T19:50:26.465743Z","clientRequestId":"aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb","internalTransactionId":"bbbbbbbb-1111-2222-3333-cccccccccccc","upn":"[email protected]","tenantId":"aaaabbbb-0000-cccc-1111-dddd2222eeee","userObjectId":"cccccccc-2222-3333-4444-dddddddddddd"}```
74+
```{"errorCode":"InternalUrl\_Duplicate","localizedErrorDetails":{"errorDetail":"Internal url 'https://google.com/' is invalid since it is already in use"},"operationResults":\[{"objectId":null,"displayName":null,"status":0,"details":"Internal url 'https://bing.com/' is invalid since it is already in use"}\],"timeStampUtc":"2017-03-23T19:50:26.465743Z","clientRequestId":"302fd775-3329-4670-a9f3-bea37004f0bb","internalTransactionId":"ea5b5475-03b9-4f08-8e95-bbb11289ab65","upn":"[email protected]","tenantId":"7918d4b5-0442-4a97-be2d-36f9f9962ece","userObjectId":"17f84be4-51f8-483a-b533-383791227a99"}```
7575

7676
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

support/entra/entra-id/app-integration/troubleshoot-consent-issues.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ The following table provides an example of the parameters used in a sign-in requ
7272
|---|---|---|
7373
|Aad-Instance| `<Aad-Instance>`| login.microsoftonline.com|
7474
|Tenant-ID| `<Tenant-ID>` portion of the sign-in request| common|
75-
|App-ID| `<App-ID>` portion of the sign-in request| 00001111-aaaa-2222-bbbb-3333cccc4444|
75+
|App-ID| `<App-ID>` portion of the sign-in request| 1f92960d-1442-4cd2-8c76-d13c5dcb30bf|
7676
|Scope| `<Scope>` portion of the sign-in request| Openid+User.Read+Directory.Read.All|
7777
|App-URI-ID| V1 endpoint: `<App-URI-ID>` portion of the sign-in request</br> </br>V2 endpoint: For resources other than Microsoft Graph, this will be the portion before the scope name. For example, for `https://analysis.windows.net/powerbi/api/App.Read.All`, `App.Read.All` is the scope name, so the `App-URI-ID` is `https://analysis.windows.net/powerbi/api`.| https://graph.microsoft.com|
7878
|Prompt| `<Prompt>` portion of the sign-in request ||
@@ -164,11 +164,11 @@ Sometimes, signing in to the application requires passing the `prompt` parameter
164164

165165
Your sign-in request might look like this:
166166

167-
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All&prompt=consent`
167+
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=1f92960d-1442-4cd2-8c76-d13c5dcb30bf&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All&prompt=consent`
168168

169169
So, to resolve consent issues, remove the `prompt` parameter as follows:
170170

171-
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All`
171+
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=1f92960d-1442-4cd2-8c76-d13c5dcb30bf&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All`
172172

173173
## Perform admin consent
174174

@@ -184,11 +184,11 @@ To resolve consent issues, perform admin consent by following these steps:
184184
185185
3. If the administrator doesn't get the consent screen, grab the sign-in address, add `&prompt=consent` to the end, and then use this request to perform admin consent.
186186

187-
Here's an example: `https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile&tresource=https://graph.microsoft.com&prompt=consent`
187+
Here's an example: `https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=1f92960d-1442-4cd2-8c76-d13c5dcb30bf&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile&tresource=https://graph.microsoft.com&prompt=consent`
188188

189189
If the requested permissions aren't listed in the application registration, use the Microsoft identity platform (V2) endpoint to force admin consent. V2 endpoint requires each permission scope to be passed in the `scope` parameter as follows:
190190

191-
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/v2.0/authorize?client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All&prompt=consent`
191+
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/v2.0/authorize?client_id=1f92960d-1442-4cd2-8c76-d13c5dcb30bf&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All&prompt=consent`
192192

193193
> [!NOTE]
194194
> - Permission scopes used by the application must be provided by the application owner.
@@ -237,4 +237,4 @@ You can use the Microsoft Entra activity logs to get more details. To do so, fol
237237

238238
In certain scenarios, you're required to perform admin consent even though you might allow users to consent and the permission normally doesn't require an admin to consent. For example, when the status reason shows "Microsoft.Online.Security.UserConsentBlockedForRiskyAppsException." For more information, see [Unexpected error when performing consent to an application](/entra/identity/enterprise-apps/application-sign-in-unexpected-user-consent-error#requesting-not-authorized-permissions-error) and [Unexpected consent prompt when signing in to an application](/entra/identity/enterprise-apps/application-sign-in-unexpected-user-consent-prompt).
239239

240-
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
240+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

support/entra/entra-id/app-integration/troubleshoot-cross-origin-resource-sharing-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ function MSALInstanceFactory(): IPublicClientApplication {
194194
return new PublicClientApplication({
195195
auth: {
196196
authority: 'https://contoso.b2clogin.com/tfp/655e51e9-be5e-xxxx-xxxx-38aa6558xxxx/b2c_1_susi/v2.0/',
197-
clientId: '00001111-aaaa-2222-bbbb-3333cccc4444',
197+
clientId: 'fb2ad7b7-2032-4a66-8723-e993eb4b9004',
198198
redirectUri: 'http://localhost:4200',
199199
knownAuthorities: ['contoso.b2clogin.com'],
200200
protocolMode: ProtocolMode.OIDC

support/entra/entra-id/app-integration/troubleshoot-error-idx10501-aspnet-b2c.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ Example of `Appsettings.json`
8888
{
8989
"AzureADB2C": {
9090
"Instance": "https://markstestorganization1.b2clogin.com",
91-
"ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444",
91+
"ClientId": "09717d12-ca7f-4388-8393-dafe42c0c3a5",
9292
"CallbackPath": "/signin-oidc",
9393
"SignedOutCallbackPath": "/signout/B2C_1_signupsignin1",
9494
"Domain": "markstestorganization1.onmicrosoft.com",
@@ -98,7 +98,7 @@ Example of `Appsettings.json`
9898
},
9999
"AzureADB2CEditEmail": {
100100
"Instance": "https://markstestorganization1.b2clogin.com",
101-
"ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444",
101+
"ClientId": "09717d12-ca7f-4388-8393-dafe42c0c3a5",
102102
"CallbackPath": "/signin-oidc-editemail",
103103
"SignedOutCallbackPath": "/signout/B2C_1_signupsignin1",
104104
"Domain": "markstestorganization1.onmicrosoft.com",

support/entra/entra-id/dir-dmns-obj/troubleshoot-user-creation-deletion-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ DELETE https://graph.microsoft.com/v1.0/users/[email protected]
142142
To delete a user in Azure PowerShell, run the [Remove-MgUser](/powershell/module/microsoft.graph.users/remove-mguser?view=graph-powershell-1.0&preserve-view=true) cmdlet. To run this command, you must connect to Microsoft Graph with at least the `User.DeleteRestore.All` permission.
143143

144144
```powershell
145-
Remove-MgUser -UserId '00aa00aa-bb11-cc22-dd33-44ee44ee44ee'
145+
Remove-MgUser -UserId '5c442efb-5e66-484a-936a-91b6810bed14'
146146
```
147147

148148
## [Azure CLI](#tab/azure-cli)

0 commit comments

Comments
 (0)