Skip to content

Commit a2e2d3a

Browse files
Merge pull request #10649 from MicrosoftDocs/learn-build-service-prodbot/docutune-autopr-20260201-234916-8768968-ignore-build
AB#9643: [BULK] [Bundle-Security] - Scheduled execution to fix known issues (part 5)
2 parents 48b7c03 + 863ad76 commit a2e2d3a

9 files changed

Lines changed: 31 additions & 31 deletions

support/entra/entra-id/app-integration/error-code-AADSTS650056-misconfigured-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ For example:
8989
```HTTP
9090
https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize
9191
?response\_type=code
92-
&client\_id=044abcc4-914c-4444-9c3f-48cc3140b6b4
92+
&client\_id=00001111-aaaa-2222-bbbb-3333cccc4444
9393
&resource=https://vault.azure.net/
9494
&scope=openid
9595
&prompt=consent
@@ -111,7 +111,7 @@ For example:
111111
```HTTP
112112
https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/v2.0/authorize
113113
?response_type=code
114-
&client_id=044abcc4-914c-4444-9c3f-48cc3140b6b4
114+
&client_id=00001111-aaaa-2222-bbbb-3333cccc4444
115115
&scope=openid+https://vault.azure.net/user_impersonation
116116
&prompt=consent
117117
```

support/entra/entra-id/app-integration/idx10501-token-signature-validation-error.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ For SAML, Microsoft Entra ID uses the app-specific certificate to sign tokens. T
5050
3. If your app uses custom signing keys that use a [claims-mapping policy](/entra/identity-platform/saml-claims-customization), you must append an `appid` query parameter that contains the app client ID. This step is necessary to retrieve a `jwks_uri` that points to the app’s specific signing key information. For example:
5151
5252
```http
53-
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration?appid=6731de76-14a6-49ae-97bc-6eba6914391e
53+
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration?appid=00001111-aaaa-2222-bbbb-3333cccc4444
5454
```
5555
5656
### Middleware configuration examples

support/entra/entra-id/app-integration/send-notification-details.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,9 +59,9 @@ See the following descriptions for more details about the notifications.
5959
- **UPN** – the user who performed the operation
6060
- Example – **tperkins\@f128.info**
6161
- **Tenant ID** – the unique ID of the tenant that the user who performed the operation was a member of
62-
- Example – **7918d4b5-0442-4a97-be2d-36f9f9962ece**
62+
- Example – **aaaabbbb-0000-cccc-1111-dddd2222eeee**
6363
- **User object ID** – the unique ID of the user who performed the operation
64-
- Example – **17f84be4-51f8-483a-b533-383791227a99**
64+
- Example – **cccccccc-2222-3333-4444-dddddddddddd**
6565

6666
### Detailed Notification Items
6767

@@ -75,6 +75,6 @@ See the following descriptions for more details about the notifications.
7575
- Example – **Internal url `https://bing.com/` is invalid since it is already in use**
7676
- **Copy error** – Select the **copy icon** to the right of the **Copy error** textbox to copy all the notification details to share with a support or product group engineer
7777
- Example
78-
```{"errorCode":"InternalUrl\_Duplicate","localizedErrorDetails":{"errorDetail":"Internal url 'https://google.com/' is invalid since it is already in use"},"operationResults":\[{"objectId":null,"displayName":null,"status":0,"details":"Internal url 'https://bing.com/' is invalid since it is already in use"}\],"timeStampUtc":"2017-03-23T19:50:26.465743Z","clientRequestId":"302fd775-3329-4670-a9f3-bea37004f0bb","internalTransactionId":"ea5b5475-03b9-4f08-8e95-bbb11289ab65","upn":"[email protected]","tenantId":"7918d4b5-0442-4a97-be2d-36f9f9962ece","userObjectId":"17f84be4-51f8-483a-b533-383791227a99"}```
78+
```{"errorCode":"InternalUrl\_Duplicate","localizedErrorDetails":{"errorDetail":"Internal url 'https://google.com/' is invalid since it is already in use"},"operationResults":\[{"objectId":null,"displayName":null,"status":0,"details":"Internal url 'https://bing.com/' is invalid since it is already in use"}\],"timeStampUtc":"2017-03-23T19:50:26.465743Z","clientRequestId":"aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb","internalTransactionId":"bbbbbbbb-1111-2222-3333-cccccccccccc","upn":"[email protected]","tenantId":"aaaabbbb-0000-cccc-1111-dddd2222eeee","userObjectId":"cccccccc-2222-3333-4444-dddddddddddd"}```
7979

8080

support/entra/entra-id/app-integration/troubleshoot-consent-issues.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ The following table provides an example of the parameters used in a sign-in requ
7474
|---|---|---|
7575
|Aad-Instance| `<Aad-Instance>`| login.microsoftonline.com|
7676
|Tenant-ID| `<Tenant-ID>` portion of the sign-in request| common|
77-
|App-ID| `<App-ID>` portion of the sign-in request| 1f92960d-1442-4cd2-8c76-d13c5dcb30bf|
77+
|App-ID| `<App-ID>` portion of the sign-in request| 00001111-aaaa-2222-bbbb-3333cccc4444|
7878
|Scope| `<Scope>` portion of the sign-in request| Openid+User.Read+Directory.Read.All|
7979
|App-URI-ID| V1 endpoint: `<App-URI-ID>` portion of the sign-in request</br> </br>V2 endpoint: For resources other than Microsoft Graph, this will be the portion before the scope name. For example, for `https://analysis.windows.net/powerbi/api/App.Read.All`, `App.Read.All` is the scope name, so the `App-URI-ID` is `https://analysis.windows.net/powerbi/api`.| https://graph.microsoft.com|
8080
|Prompt| `<Prompt>` portion of the sign-in request ||
@@ -166,11 +166,11 @@ Sometimes, signing in to the application requires passing the `prompt` parameter
166166

167167
Your sign-in request might look like this:
168168

169-
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=1f92960d-1442-4cd2-8c76-d13c5dcb30bf&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All&prompt=consent`
169+
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All&prompt=consent`
170170

171171
So, to resolve consent issues, remove the `prompt` parameter as follows:
172172

173-
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=1f92960d-1442-4cd2-8c76-d13c5dcb30bf&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All`
173+
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All`
174174

175175
## Perform admin consent
176176

@@ -186,11 +186,11 @@ To resolve consent issues, perform admin consent by following these steps:
186186
187187
3. If the administrator doesn't get the consent screen, grab the sign-in address, add `&prompt=consent` to the end, and then use this request to perform admin consent.
188188

189-
Here's an example: `https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=1f92960d-1442-4cd2-8c76-d13c5dcb30bf&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile&tresource=https://graph.microsoft.com&prompt=consent`
189+
Here's an example: `https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize?client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile&tresource=https://graph.microsoft.com&prompt=consent`
190190

191191
If the requested permissions aren't listed in the application registration, use the Microsoft identity platform (V2) endpoint to force admin consent. V2 endpoint requires each permission scope to be passed in the `scope` parameter as follows:
192192

193-
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/v2.0/authorize?client_id=1f92960d-1442-4cd2-8c76-d13c5dcb30bf&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All&prompt=consent`
193+
`https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/v2.0/authorize?client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=code&redirect_uri=https://www.contoso.com&scope=openid+profile+User.Read+Directory.Read.All&prompt=consent`
194194

195195
> [!NOTE]
196196
> - Permission scopes used by the application must be provided by the application owner.
@@ -239,4 +239,4 @@ You can use the Microsoft Entra activity logs to get more details. To do so, fol
239239

240240
In certain scenarios, you're required to perform admin consent even though you might allow users to consent and the permission normally doesn't require an admin to consent. For example, when the status reason shows "Microsoft.Online.Security.UserConsentBlockedForRiskyAppsException." For more information, see [Unexpected error when performing consent to an application](/entra/identity/enterprise-apps/application-sign-in-unexpected-user-consent-error#requesting-not-authorized-permissions-error) and [Unexpected consent prompt when signing in to an application](/entra/identity/enterprise-apps/application-sign-in-unexpected-user-consent-prompt).
241241

242-
242+

support/entra/entra-id/app-integration/troubleshoot-cross-origin-resource-sharing-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ function MSALInstanceFactory(): IPublicClientApplication {
196196
return new PublicClientApplication({
197197
auth: {
198198
authority: 'https://contoso.b2clogin.com/tfp/655e51e9-be5e-xxxx-xxxx-38aa6558xxxx/b2c_1_susi/v2.0/',
199-
clientId: 'fb2ad7b7-2032-4a66-8723-e993eb4b9004',
199+
clientId: '00001111-aaaa-2222-bbbb-3333cccc4444',
200200
redirectUri: 'http://localhost:4200',
201201
knownAuthorities: ['contoso.b2clogin.com'],
202202
protocolMode: ProtocolMode.OIDC

support/entra/entra-id/app-integration/troubleshoot-error-idx10501-aspnet-b2c.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Example of `Appsettings.json`
9191
{
9292
"AzureADB2C": {
9393
"Instance": "https://markstestorganization1.b2clogin.com",
94-
"ClientId": "09717d12-ca7f-4388-8393-dafe42c0c3a5",
94+
"ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444",
9595
"CallbackPath": "/signin-oidc",
9696
"SignedOutCallbackPath": "/signout/B2C_1_signupsignin1",
9797
"Domain": "markstestorganization1.onmicrosoft.com",
@@ -101,7 +101,7 @@ Example of `Appsettings.json`
101101
},
102102
"AzureADB2CEditEmail": {
103103
"Instance": "https://markstestorganization1.b2clogin.com",
104-
"ClientId": "09717d12-ca7f-4388-8393-dafe42c0c3a5",
104+
"ClientId": "00001111-aaaa-2222-bbbb-3333cccc4444",
105105
"CallbackPath": "/signin-oidc-editemail",
106106
"SignedOutCallbackPath": "/signout/B2C_1_signupsignin1",
107107
"Domain": "markstestorganization1.onmicrosoft.com",

support/entra/entra-id/dir-dmns-obj/troubleshoot-user-creation-deletion-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ DELETE https://graph.microsoft.com/v1.0/users/[email protected]
142142
To delete a user in Azure PowerShell, run the [Remove-MgUser](/powershell/module/microsoft.graph.users/remove-mguser?view=graph-powershell-1.0&preserve-view=true) cmdlet. To run this command, you must connect to Microsoft Graph with at least the `User.DeleteRestore.All` permission.
143143

144144
```powershell
145-
Remove-MgUser -UserId '5c442efb-5e66-484a-936a-91b6810bed14'
145+
Remove-MgUser -UserId '00aa00aa-bb11-cc22-dd33-44ee44ee44ee'
146146
```
147147

148148
## [Azure CLI](#tab/azure-cli)

0 commit comments

Comments
 (0)