Skip to content

Commit d1bce19

Browse files
committed
updating
1 parent dac94f7 commit d1bce19

9 files changed

+199
-102
lines changed

azureadps-2.0-preview/AzureAD/New-AzureADApplicationProxyApplication.md

Lines changed: 28 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,28 @@
11
---
22
external help file: Microsoft.Open.MS.GraphBeta.PowerShell.Custom.dll-Help.xml
3-
Module Name: AzureADPreview
3+
Module Name:
44
online version:
55
schema: 2.0.0
66
---
77

88
# New-AzureADApplicationProxyApplication
99

1010
## SYNOPSIS
11-
The New-AzureADApplicationProxyApplication cmdlet creates a new application configured for Application Proxy in Azure Active Directory.
11+
The New-AzureADApplicationProxyApplication cmdlet creates a new application configured for Application Proxy in Azure Active Directory.
1212

1313
## SYNTAX
1414

1515
```
16-
New-AzureADApplicationProxyApplication -DisplayName <String> -ExternalUrl <String> -InternalUrl <String>
17-
[-ExternalAuthenticationType <ExternalAuthenticationTypeEnum>] [-IsTranslateHostHeaderEnabled <Boolean>]
18-
[-IsTranslateLinksInBodyEnabled <Boolean>] [-ApplicationServerTimeout <ApplicationServerTimeoutEnum>]
19-
[-ConnectorGroupId <String>] [<CommonParameters>]
16+
New-AzureADApplicationProxyApplication [-ApplicationServerTimeout <ApplicationServerTimeoutEnum>]
17+
[-ConnectorGroupId <String>] -DisplayName <String>
18+
[-ExternalAuthenticationType <ExternalAuthenticationTypeEnum>] -ExternalUrl <String> -InternalUrl <String>
19+
[-IsTranslateHostHeaderEnabled <Boolean>] [-IsTranslateLinksInBodyEnabled <Boolean>] [<CommonParameters>]
2020
```
2121

2222
## DESCRIPTION
23-
The New-AzureADApplicationProxyApplication cmdlet creates a new application configured for Application Proxy in Azure Active Directory. To ensure this application is usable, please also make sure you assign users and configure SSO if needed. Note that without specifying a ConnectorGroupId, this application by default will use the �Default� connector group in your tenant.
23+
The New-AzureADApplicationProxyApplication cmdlet creates a new application configured for Application Proxy in Azure Active Directory.
24+
To ensure this application is usable, please also make sure you assign users and configure SSO if needed.
25+
Note that without specifying a ConnectorGroupId, this application by default will use the �Default� connector group in your tenant.
2426

2527
## EXAMPLES
2628

@@ -74,7 +76,7 @@ Example 2: Creating a new application that uses a custom domain and sets several
7476
## PARAMETERS
7577

7678
### -ApplicationServerTimeout
77-
Set this value to Long only if your application is slow to authenticate and connect.
79+
Set this value to Long only if your application is slow to authenticate and connect.
7880

7981
```yaml
8082
Type: ApplicationServerTimeoutEnum
@@ -90,8 +92,10 @@ Accept wildcard characters: False
9092
```
9193
9294
### -ConnectorGroupId
93-
Provide the Id of the Connector group you would like assigned to this application. You can find this value by using the Get-AzureADApplicationProxyConnectorGroup command.
94-
Connectors process the remote access to your application, and connector groups help you organize connectors and apps by region, network, or purpose. If you don't have any connector groups created yet, your app is assigned to Default.
95+
Provide the Id of the Connector group you would like assigned to this application.
96+
You can find this value by using the Get-AzureADApplicationProxyConnectorGroup command.
97+
Connectors process the remote access to your application, and connector groups help you organize connectors and apps by region, network, or purpose.
98+
If you don't have any connector groups created yet, your app is assigned to Default.
9599
96100
```yaml
97101
Type: String
@@ -122,8 +126,10 @@ Accept wildcard characters: False
122126
123127
### -ExternalAuthenticationType
124128
How Application Proxy verifies users before giving them access to your application.
125-
AadPreAuthentication: Application Proxy redirects users to sign in with Azure AD, which authenticates their permissions for the directory and application. We recommend keeping this option as the default, so that you can take advantage of Azure AD security features like conditional access and Multi-Factor Authentication.
126-
Passthru: Users don't have to authenticate against Azure Active Directory to access the application. You can still set up authentication requirements on the backend.
129+
AadPreAuthentication: Application Proxy redirects users to sign in with Azure AD, which authenticates their permissions for the directory and application.
130+
We recommend keeping this option as the default, so that you can take advantage of Azure AD security features like conditional access and Multi-Factor Authentication.
131+
Passthru: Users don't have to authenticate against Azure Active Directory to access the application.
132+
You can still set up authentication requirements on the backend.
127133
128134
```yaml
129135
Type: ExternalAuthenticationTypeEnum
@@ -139,7 +145,7 @@ Accept wildcard characters: False
139145
```
140146
141147
### -ExternalUrl
142-
The address your users will go to in order to access the app from outside your network.
148+
The address your users will go to in order to access the app from outside your network.
143149
144150
```yaml
145151
Type: String
@@ -154,7 +160,10 @@ Accept wildcard characters: False
154160
```
155161
156162
### -InternalUrl
157-
The URL that you use to access the application from inside your private network. You can provide a specific path on the backend server to publish, while the rest of the server is unpublished. In this way, you can publish different sites on the same server as different apps, and give each one its own name and access rules. If you publish a path, make sure that it includes all the necessary images, scripts, and style sheets for your application.
163+
The URL that you use to access the application from inside your private network.
164+
You can provide a specific path on the backend server to publish, while the rest of the server is unpublished.
165+
In this way, you can publish different sites on the same server as different apps, and give each one its own name and access rules.
166+
If you publish a path, make sure that it includes all the necessary images, scripts, and style sheets for your application.
158167
159168
```yaml
160169
Type: String
@@ -169,7 +178,8 @@ Accept wildcard characters: False
169178
```
170179
171180
### -IsTranslateHostHeaderEnabled
172-
If set to true, translates urls in headers. Keep this value true unless your application required the original host header in the authentication request.
181+
If set to true, translates urls in headers.
182+
Keep this value true unless your application required the original host header in the authentication request.
173183
174184
```yaml
175185
Type: Boolean
@@ -184,7 +194,8 @@ Accept wildcard characters: False
184194
```
185195
186196
### -IsTranslateLinksInBodyEnabled
187-
If set to true, translates urls in body. Keep this value as No unless you have hardcoded HTML links to other on-premises applications, and don't use custom domains.
197+
If set to true, translates urls in body.
198+
Keep this value as No unless you have hardcoded HTML links to other on-premises applications, and don't use custom domains.
188199
189200
```yaml
190201
Type: Boolean
@@ -204,14 +215,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
204215
## INPUTS
205216
206217
### System.String
207-
System.Nullable`1[[Microsoft.Open.MSGraph.Model.ApplicationProxyApplicationObject+ExternalAuthenticationTypeEnum, Microsoft.Open.MS.GraphBeta.Client, Version=2.0.0.0, Culture=neutral, PublicKeyToken=null]]
208-
System.Nullable`1[[System.Boolean, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]]
209-
System.Nullable`1[[Microsoft.Open.MSGraph.Model.ApplicationProxyApplicationObject+ApplicationServerTimeoutEnum, Microsoft.Open.MS.GraphBeta.Client, Version=2.0.0.0, Culture=neutral, PublicKeyToken=null]]
218+
System.Nullable\`1\[\[Microsoft.Open.MSGraph.Model.ApplicationProxyApplicationObject+ExternalAuthenticationTypeEnum, Microsoft.Open.MS.GraphBeta.Client, Version=2.0.0.0, Culture=neutral, PublicKeyToken=null\]\] System.Nullable\`1\[\[System.Boolean, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089\]\] System.Nullable\`1\[\[Microsoft.Open.MSGraph.Model.ApplicationProxyApplicationObject+ApplicationServerTimeoutEnum, Microsoft.Open.MS.GraphBeta.Client, Version=2.0.0.0, Culture=neutral, PublicKeyToken=null\]\]
210219
211220
## OUTPUTS
212221
213222
### System.Object
214-
215223
## NOTES
216224
217225
## RELATED LINKS

azureadps-2.0-preview/AzureAD/New-AzureADMSTrustFrameworkPolicy.md

Lines changed: 47 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,47 +1,80 @@
11
---
22
external help file: Microsoft.Open.MS.GraphBeta.PowerShell.Custom.dll-Help.xml
3-
Module Name: AzureADPreview
3+
Module Name:
44
online version:
55
schema: 2.0.0
66
---
77

88
# New-AzureADMSTrustFrameworkPolicy
99

1010
## SYNOPSIS
11-
{{ Fill in the Synopsis }}
11+
This cmdlet is used to create a trust framework policy (custom policy) in the directory.
1212

1313
## SYNTAX
1414

15-
### Content (Default)
15+
### UNNAMED_PARAMETER_SET_1
1616
```
17-
New-AzureADMSTrustFrameworkPolicy [-OutputFilePath <String>] -Content <String> [<CommonParameters>]
17+
New-AzureADMSTrustFrameworkPolicy -Content <String> [-OutputFilePath <String>] [<CommonParameters>]
1818
```
1919

20-
### File
20+
### UNNAMED_PARAMETER_SET_2
2121
```
2222
New-AzureADMSTrustFrameworkPolicy -InputFilePath <String> [-OutputFilePath <String>] [<CommonParameters>]
2323
```
2424

2525
## DESCRIPTION
26-
{{ Fill in the Description }}
26+
This cmdlet is used to create a trust framework policy in the directory.
27+
28+
The contents of the trust framework policy to be created can be provided using a file or a command line variable.
29+
30+
The contents of the created trust framework policy can be written to an output file or to the screen.
2731

2832
## EXAMPLES
2933

3034
### Example 1
31-
```powershell
32-
PS C:\> {{ Add example code here }}
35+
```
36+
PS C:\> New-AzureADMSTrustFrameworkPolicy -Content $policyContent
37+
```
38+
39+
The example creates a trust framework policy from the content specified.
40+
41+
The contents of newly created trust framework policy are displayed on screen.
42+
43+
### Example 2
44+
```
45+
PS C:\> New-AzureADMSTrustFrameworkPolicy -Content $policyContent -OutputFilePath C:\CreatedPolicy.xml
46+
```
47+
48+
The example creates a trust framework policy from the content specified.
49+
50+
The contents of newly created trust framework policy are written to file mentioned in output file path.
51+
52+
### Example 3
53+
```
54+
PS C:\> New-AzureADMSTrustFrameworkPolicy -InputFilePath C:\InputPolicy.xml -OutputFilePath C:\CreatedPolicy.xml
55+
```
56+
57+
The example creates a trust framework policy from the file mentioned in InputFilePath.
58+
59+
The contents of newly created trust framework policy are written to file mentioned in output file path.
60+
61+
### Example 4
62+
```
63+
PS C:\> New-AzureADMSTrustFrameworkPolicy -InputFilePath C:\InputPolicy.xml
3364
```
3465

35-
{{ Add example description here }}
66+
The example creates a trust framework policy from the file mentioned in InputFilePath.
67+
68+
The contents of newly created trust framework policy are displayed on screen.
3669

3770
## PARAMETERS
3871

3972
### -Content
40-
{{ Fill Content Description }}
73+
The content of the trust framework policy to be created.
4174

4275
```yaml
4376
Type: String
44-
Parameter Sets: Content
77+
Parameter Sets: UNNAMED_PARAMETER_SET_1
4578
Aliases:
4679

4780
Required: True
@@ -52,11 +85,11 @@ Accept wildcard characters: False
5285
```
5386
5487
### -InputFilePath
55-
{{ Fill InputFilePath Description }}
88+
Path to the file used for reading the contents of trust framework policy to be created.
5689
5790
```yaml
5891
Type: String
59-
Parameter Sets: File
92+
Parameter Sets: UNNAMED_PARAMETER_SET_2
6093
Aliases:
6194

6295
Required: True
@@ -67,7 +100,7 @@ Accept wildcard characters: False
67100
```
68101
69102
### -OutputFilePath
70-
{{ Fill OutputFilePath Description }}
103+
Path to the file used for writing the contents of newly created trust framework policy.
71104
72105
```yaml
73106
Type: String
@@ -87,7 +120,6 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
87120
## INPUTS
88121
89122
### System.String
90-
91123
## OUTPUTS
92124
93125
### System.Object

azureadps-2.0-preview/AzureAD/Remove-AzureADApplicationProxyApplication.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
external help file: Microsoft.Open.MS.GraphBeta.PowerShell.Custom.dll-Help.xml
3-
Module Name: AzureADPreview
3+
Module Name:
44
online version:
55
schema: 2.0.0
66
---
@@ -39,7 +39,9 @@ Example 2: Remove a Proxy Application, and remove it from Azure AD completely
3939
## PARAMETERS
4040

4141
### -ObjectId
42-
The unique application Id of the application. This can be found using the Get-AzureADApplication command. You can also find this in the Azure Portal by navigating to AAD, Enterprise Applications, All Applications, Select your application, go to the properties tab, and use the ObjectId on that page.
42+
The unique application Id of the application.
43+
This can be found using the Get-AzureADApplication command.
44+
You can also find this in the Azure Portal by navigating to AAD, Enterprise Applications, All Applications, Select your application, go to the properties tab, and use the ObjectId on that page.
4345

4446
```yaml
4547
Type: String
@@ -54,7 +56,9 @@ Accept wildcard characters: False
5456
```
5557
5658
### -RemoveADApplication
57-
This allows you to delete application completely. When this is false (default), Application Proxy properties are removed from the application but the application still exists. If this is true, the application is completely removed from Azure AD.
59+
This allows you to delete application completely.
60+
When this is false (default), Application Proxy properties are removed from the application but the application still exists.
61+
If this is true, the application is completely removed from Azure AD.
5862
5963
```yaml
6064
Type: Boolean

azureadps-2.0-preview/AzureAD/Set-AzureADApplicationProxyApplication.md

Lines changed: 24 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
external help file: Microsoft.Open.MS.GraphBeta.PowerShell.Custom.dll-Help.xml
3-
Module Name: AzureADPreview
3+
Module Name:
44
online version:
55
schema: 2.0.0
66
---
77

88
# Set-AzureADApplicationProxyApplication
99

1010
## SYNOPSIS
11-
The Set-AzureADApplicationProxyApplication allows you to modify and set configurations for an application in Azure Active Directory configured to use ApplicationProxy.
11+
The Set-AzureADApplicationProxyApplication allows you to modify and set configurations for an application in Azure Active Directory configured to use ApplicationProxy.
1212

1313
## SYNTAX
1414

@@ -20,7 +20,7 @@ Set-AzureADApplicationProxyApplication -ObjectId <String> [-ExternalUrl <String>
2020
```
2121

2222
## DESCRIPTION
23-
The Set-AzureADApplicationProxyApplication allows you to modify and set additional settings for an application in Azure Active Directory configured to use ApplicationProxy.
23+
The Set-AzureADApplicationProxyApplication allows you to modify and set additional settings for an application in Azure Active Directory configured to use ApplicationProxy.
2424

2525
## EXAMPLES
2626

@@ -47,7 +47,8 @@ Example 1: Add the link translation feature to an application
4747
## PARAMETERS
4848

4949
### -ObjectId
50-
Specifies a unique application ID of an application in Azure Active Directory. This can be found using the Get-AzureADApplication command.
50+
Specifies a unique application ID of an application in Azure Active Directory.
51+
This can be found using the Get-AzureADApplication command.
5152

5253
```yaml
5354
Type: String
@@ -62,7 +63,7 @@ Accept wildcard characters: False
6263
```
6364
6465
### -ExternalUrl
65-
The address your users will go to in order to access the app from outside your network.
66+
The address your users will go to in order to access the app from outside your network.
6667
6768
```yaml
6869
Type: String
@@ -77,7 +78,10 @@ Accept wildcard characters: False
7778
```
7879
7980
### -InternalUrl
80-
The URL that you use to access the application from inside your private network. You can provide a specific path on the backend server to publish, while the rest of the server is unpublished. In this way, you can publish different sites on the same server as different apps, and give each one its own name and access rules. If you publish a path, make sure that it includes all the necessary images, scripts, and style sheets for your application.
81+
The URL that you use to access the application from inside your private network.
82+
You can provide a specific path on the backend server to publish, while the rest of the server is unpublished.
83+
In this way, you can publish different sites on the same server as different apps, and give each one its own name and access rules.
84+
If you publish a path, make sure that it includes all the necessary images, scripts, and style sheets for your application.
8185
8286
```yaml
8387
Type: String
@@ -93,8 +97,10 @@ Accept wildcard characters: False
9397
9498
### -ExternalAuthenticationType
9599
How Application Proxy verifies users before giving them access to your application.
96-
AadPreAuth: Application Proxy redirects users to sign in with Azure AD, which authenticates their permissions for the directory and application. We recommend keeping this option as the default, so that you can take advantage of Azure AD security features like conditional access and Multi-Factor Authentication.
97-
Passthru: Users don't have to authenticate against Azure Active Directory to access the application. You can still set up authentication requirements on the backend.
100+
AadPreAuth: Application Proxy redirects users to sign in with Azure AD, which authenticates their permissions for the directory and application.
101+
We recommend keeping this option as the default, so that you can take advantage of Azure AD security features like conditional access and Multi-Factor Authentication.
102+
Passthru: Users don't have to authenticate against Azure Active Directory to access the application.
103+
You can still set up authentication requirements on the backend.
98104
99105
```yaml
100106
Type: ExternalAuthenticationTypeEnum
@@ -109,7 +115,8 @@ Accept wildcard characters: False
109115
```
110116
111117
### -IsTranslateHostHeaderEnabled
112-
If set to true, translates urls in headers. Keep this value true unless your application required the original host header in the authentication request.
118+
If set to true, translates urls in headers.
119+
Keep this value true unless your application required the original host header in the authentication request.
113120
114121
```yaml
115122
Type: Boolean
@@ -124,7 +131,8 @@ Accept wildcard characters: False
124131
```
125132
126133
### -IsTranslateLinksInBodyEnabled
127-
If set to true, translates urls in body. Keep this value as No unless you have hardcoded HTML links to other on-premises applications, and don't use custom domains.
134+
If set to true, translates urls in body.
135+
Keep this value as No unless you have hardcoded HTML links to other on-premises applications, and don't use custom domains.
128136
129137
```yaml
130138
Type: Boolean
@@ -139,7 +147,8 @@ Accept wildcard characters: False
139147
```
140148
141149
### -ApplicationServerTimeout
142-
Specifies the backend server timeout type. Set this value to Long only if your application is slow to authenticate and connect.
150+
Specifies the backend server timeout type.
151+
Set this value to Long only if your application is slow to authenticate and connect.
143152
144153
```yaml
145154
Type: ApplicationServerTimeoutEnum
@@ -154,8 +163,10 @@ Accept wildcard characters: False
154163
```
155164
156165
### -ConnectorGroupId
157-
Provide the Id of the Connector group you would like assigned to this application. You can find this value by using the Get-AzureADApplicationProxyConnectorGroup command.
158-
Connectors process the remote access to your application, and connector groups help you organize connectors and apps by region, network, or purpose. If you don't have any connector groups created yet, your app is assigned to Default.
166+
Provide the Id of the Connector group you would like assigned to this application.
167+
You can find this value by using the Get-AzureADApplicationProxyConnectorGroup command.
168+
Connectors process the remote access to your application, and connector groups help you organize connectors and apps by region, network, or purpose.
169+
If you don't have any connector groups created yet, your app is assigned to Default.
159170
160171
```yaml
161172
Type: String

0 commit comments

Comments
 (0)