Skip to content

Commit 00ec7ed

Browse files
authored
Merge branch 'master' into patch-37
2 parents 6fcf966 + da0517b commit 00ec7ed

File tree

1,306 files changed

+15855
-8612
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,306 files changed

+15855
-8612
lines changed

.openpublishing.publish.config.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -247,6 +247,36 @@
247247
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-python",
248248
"branch": "master",
249249
"branch_mapping": {}
250+
},
251+
{
252+
"path_to_root": "cognitive-services-dotnet-sdk-samples",
253+
"url": "https://github.com/Azure-Samples/cognitive-services-dotnet-sdk-samples",
254+
"branch": "master",
255+
"branch_mapping": {}
256+
},
257+
{
258+
"path_to_root": "cognitive-services-java-sdk-samples",
259+
"url": "https://github.com/Azure-Samples/cognitive-services-java-sdk-samples",
260+
"branch": "master",
261+
"branch_mapping": {}
262+
},
263+
{
264+
"path_to_root": "aml-sdk-samples",
265+
"url": "https://github.com/Azure/MachineLearningNotebooks",
266+
"branch": "sdk-codetest",
267+
"branch_mapping": {}
268+
},
269+
{
270+
"path_to_root": "cognitive-services-vision-csharp-sdk-quickstarts",
271+
"url": "https://github.com/Azure-Samples/cognitive-services-vision-csharp-sdk-quickstarts",
272+
"branch": "master",
273+
"branch_mapping": {}
274+
},
275+
{
276+
"path_to_root": "cognitive-face-csharp-sample",
277+
"url": "https://github.com/Azure-Samples/Cognitive-Face-CSharp-sample",
278+
"branch": "master",
279+
"branch_mapping": {}
250280
}
251281
],
252282
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27052,11 +27052,6 @@
2705227052
"redirect_url": "/azure/cloud-shell/overview",
2705327053
"redirect_document_id": false
2705427054
},
27055-
{
27056-
"source_path": "articles/dms/index.md",
27057-
"redirect_url": "/azure/dms/dms-overview",
27058-
"redirect_document_id": false
27059-
},
2706027055
{
2706127056
"source_path": "articles/guides/developer/index.md",
2706227057
"redirect_url": "/azure/guides/developer/azure-developer-guide",
@@ -30515,6 +30510,17 @@
3051530510
"source_path": "articles/iot-central/howto-create-application.md",
3051630511
"redirect_url": "/azure/iot-central/quick-deploy-iot-central",
3051730512
"redirect_document_id" : false
30513+
},
30514+
{
30515+
"source_path": "articles/media-services/latest/create-account-cli-quickstart.md",
30516+
"redirect_url": "/azure/media-services/latest/create-account-cli-how-to",
30517+
"redirect_document_id" : false
30518+
},
30519+
{
30520+
"source_path": "articles/backup/backup-mabs-upgrade-to-v2.md",
30521+
"redirect_url": "/azure/backup/backup-mabs-whats-new-mabs",
30522+
"redirect_document_id" : false
3051830523
}
30524+
3051930525
]
3052030526
}

articles/active-directory-b2c/active-directory-b2c-configure-signup-self-asserted-custom.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -273,8 +273,8 @@ Verified email is enabled by default in the `<TechnicalProfile Id="LocalAccountS
273273

274274
## Next steps
275275

276-
Add the new claim to the flows for social account logins by changing the TechnicalProfiles listed below. These are used by social/federated account logins to write and read the user data using the alternativeSecurityId as the locator.
277-
```xml
278-
<TechnicalProfile Id="AAD-UserWriteUsingAlternativeSecurityId">
279-
<TechnicalProfile Id="AAD-UserReadUsingAlternativeSecurityId">
280-
```
276+
If your policy supports social accounts, add the new claim to the flows for social account logins by changing the technical profiles listed below. These claims are used by social account logins to collect and write data from the user.
277+
278+
1. Locate the technical profile **SelfAsserted-Social** and add the output claim. The order of the claims in **OutputClaims** controls the order that Azure AD B2C renders the claims on the screen. For example, `<OutputClaim ClaimTypeReferenceId="city" />`.
279+
2. Locate the technical profile **AAD-UserWriteUsingAlternativeSecurityId** and add the persist claim. For example, `<PersistedClaim ClaimTypeReferenceId="city" />`.
280+
3. Locate the technical profile **AAD-UserReadUsingAlternativeSecurityId** and add the output claim. For example, `<OutputClaim ClaimTypeReferenceId="city" />`.

articles/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/05/2018
11+
ms.date: 11/07/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -22,19 +22,19 @@ This article shows you how to enable sign-in for an ADFS user account by using [
2222
## Prerequisites
2323

2424
- Complete the steps in [Get started with custom policies in Azure Active Directory B2C](active-directory-b2c-get-started-custom.md).
25-
- Make sure that you have access to the certificate .pfx file with the private key that was issued by ADFS.
25+
- Make sure that you have access to a certificate .pfx file with a private key. You can generate your own signed certificate and upload it to Azure AD B2C. Azure AD B2C uses this certificate to sign the SAML request sent to your SAML identity provider.
2626

2727
## Create a policy key
2828

29-
You need to store your ADFS certificate in your Azure AD B2C tenant.
29+
You need to store your certificate in your Azure AD B2C tenant.
3030

3131
1. Sign in to the [Azure portal](https://portal.azure.com/).
3232
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
3333
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
3434
4. On the Overview page, select **Identity Experience Framework - PREVIEW**.
3535
5. Select **Policy Keys** and then select **Add**.
3636
6. For **Options**, choose `Upload`.
37-
7. Enter a **Name** for the policy key. For example, `ADFSSamlCert`. The prefix `B2C_1A_` is added automatically to the name of your key.
37+
7. Enter a **Name** for the policy key. For example, `SamlCert`. The prefix `B2C_1A_` is added automatically to the name of your key.
3838
8. Browse to and select your certificate .pfx file with the private key.
3939
9. Click **Create**.
4040

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,8 @@ You now have an application that has permission to create, read and update users
6262
>
6363
>
6464
65-
## Configure delete permissions for your application
66-
Currently, the *Read and write directory data* permission does **NOT** include the ability to do any deletions such as deleting users. If you want to give your application the ability to delete users, you'll need to do these extra steps that involve PowerShell, otherwise, you can skip to the next section.
65+
## Configure delete or update password permissions for your application
66+
Currently, the *Read and write directory data* permission does **NOT** include the ability to delete users or update user passwords. If you want to give your application the ability to delete users or update passwords, you'll need to do these extra steps that involve PowerShell, otherwise, you can skip to the next section.
6767

6868
First, if you don't already have it installed, install the [Azure AD PowerShell v1 module (MSOnline)](https://docs.microsoft.com/powershell/azure/active-directory/install-msonlinev1?view=azureadps-1.0):
6969

@@ -80,15 +80,15 @@ After you install the PowerShell module connect to your Azure AD B2C tenant.
8080
Connect-MsolService
8181
```
8282

83-
Now we'll use the **Application ID** in the script below to assign the application the user account administrator role which will allow it to delete users. These roles have well-known identifiers, so all you need to do is input your **Application ID** in the script below.
83+
Now we'll use the **Application ID** in the script below to assign the application the user account administrator role. These roles have well-known identifiers, so all you need to do is input your **Application ID** in the script below.
8484

8585
```powershell
8686
$applicationId = "<YOUR_APPLICATION_ID>"
8787
$sp = Get-MsolServicePrincipal -AppPrincipalId $applicationId
8888
Add-MsolRoleMember -RoleObjectId fe930be7-5e62-47db-91af-98c3a49a38b1 -RoleMemberObjectId $sp.ObjectId -RoleMemberType servicePrincipal
8989
```
9090

91-
Your application now also has permissions to delete users from your B2C tenant.
91+
Your application now also has permissions to delete users or update passwords from your B2C tenant.
9292

9393
## Download, configure, and build the sample code
9494
First, download the sample code and get it running. Then we will take a closer look at it. You can [download the sample code as a .zip file](https://github.com/AzureADQuickStarts/B2C-GraphAPI-DotNet/archive/master.zip). You can also clone it into a directory of your choice:

articles/active-directory-b2c/active-directory-b2c-reference-oauth-code.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,6 @@ ms.component: B2C
1717
You can use the OAuth 2.0 authorization code grant in apps installed on a device to gain access to protected resources, such as web APIs. By using the Azure Active Directory B2C (Azure AD B2C) implementation of OAuth 2.0, you can add sign-up, sign-in,
1818
and other identity management tasks to your mobile and desktop apps. This article is language-independent. In the article, we describe how to send and receive HTTP messages without using any open-source libraries.
1919

20-
<!-- TODO: Need link to libraries -->
21-
2220
The OAuth 2.0 authorization code flow is described in [section 4.1 of the OAuth 2.0 specification](http://tools.ietf.org/html/rfc6749). You can use it for authentication and authorization in most [application types](active-directory-b2c-apps.md), including web applications and natively installed applications. You can use the OAuth 2.0 authorization code flow to securely acquire access tokens and refresh tokens for your applications, which can be used to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). The refresh token allows the client to acquire new access (and refresh) tokens once the access token expires, typically after one hour.
2321

2422
This article focuses on the **public clients** OAuth 2.0 authorization code flow. A public client is any client application that cannot be trusted to securely maintain the integrity of a secret password. This includes mobile apps, desktop applications, and essentially any application that runs on a device and needs to get access tokens.
@@ -77,7 +75,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
7775
| redirect_uri |Required |The redirect URI of your app, where authentication responses are sent and received by your app. It must exactly match one of the redirect URIs that you registered in the portal, except that it must be URL-encoded. |
7876
| scope |Required |A space-separated list of scopes. A single scope value indicates to Azure Active Directory (Azure AD) both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app needs a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
7977
| response_mode |Recommended |The method that you use to send the resulting authorization code back to your app. It can be `query`, `form_post`, or `fragment`. |
80-
| state |Recommended |A value included in the request that is returned in the token response. It can be a string of any content that you want to use. Usually, a randomly generated unique value is used, to prevent cross-site request forgery attacks. The state also is used to encode information about the user's state in the app before the authentication request occurred. For example, the page the user was on, or the policy that was being executed. |
78+
| state |Recommended |A value included in the request that can be a string of any content that you want to use. Usually, a randomly generated unique value is used, to prevent cross-site request forgery attacks. The state also is used to encode information about the user's state in the app before the authentication request occurred. For example, the page the user was on, or the policy that was being executed. |
8179
| p |Required |The policy that is executed. It's the name of a policy that is created in your Azure AD B2C directory. The policy name value should begin with **b2c\_1\_**. To learn more about policies, see [Azure AD B2C built-in policies](active-directory-b2c-reference-policies.md). |
8280
| prompt |Optional |The type of user interaction that is required. Currently, the only valid value is `login`, which forces the user to enter their credentials on that request. Single sign-on will not take effect. |
8381

articles/active-directory-b2c/claimsschema.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ The **Mask** element contains the following attributes:
105105
| Type | Yes | The type of the claim mask. Possible values: `Simple` or `Regex`. The `Simple` value indicates that a simple text mask is applied to the leading portion of a string claim. The `Regex` value indicates that a regular expression is applied to the string claim as whole. If the `Regex` value is specified, an optional attribute must also be defined with the regular expression to use. |
106106
| Regex | No | If **Type** is set to `Regex`, specify the regular expression to use.
107107

108-
The follwing example configures a **PhoneNumber** claim with the `Simple` mask:
108+
The following example configures a **PhoneNumber** claim with the `Simple` mask:
109109

110110
```XML
111111
<ClaimType Id="PhoneNumber">
@@ -120,7 +120,7 @@ The Identity Experience Framework renders the phone number while hiding the firs
120120

121121
![Using claim type with mask](./media/claimsschema/mask.png)
122122

123-
The follwing example configures a **AlternateEmail** claim with the `Regex` mask:
123+
The following example configures a **AlternateEmail** claim with the `Regex` mask:
124124

125125
```XML
126126
<ClaimType Id="AlternateEmail">

articles/active-directory-b2c/oauth2-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The **InputClaims** and **InputClaimsTransformations** elements are not required
4242

4343
## Output claims
4444

45-
The **OutputClaims** element contains a list of claims returned by the OAuth2 identity provider. You may need to map the name of the claim defined in your policy to the name defined in the identity provider. You can also include claims that aren't returned by the identity provider as long as the you set the `DefaultValue` attribute.
45+
The **OutputClaims** element contains a list of claims returned by the OAuth2 identity provider. You may need to map the name of the claim defined in your policy to the name defined in the identity provider. You can also include claims that aren't returned by the identity provider as long as you set the `DefaultValue` attribute.
4646

4747
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
4848

articles/active-directory-b2c/technical-profiles-overview.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,7 @@ A technical profile enables these types of scenarios:
3434
- [SAML2](saml-technical-profile.md) - Federation with any SAML protocol identity provider.
3535
- [Self-Asserted](self-asserted-technical-profile.md) - Interact with the user. For example, collect the user's credential to sign in, render the sign-up page, or password reset.
3636
- **WsFed** - Federation with any WsFed protocol identity provider.
37-
- **Session management** - Handle different types of sessions.
38-
- **User journey context provider**
37+
- [Session management](active-directory-b2c-reference-sso-custom.md) - Handle different types of sessions.
3938
- **Application insights**
4039

4140
## Technical profile flow
@@ -52,7 +51,7 @@ All types of technical profiles share the same concept. You send input claims, r
5251
- Create or update the user account.
5352
- Sends and verifies the MFA text message.
5453
4. **ValidationTechnicalProfiles** - For a [self asserted technical profile](self-asserted-technical-profile.md), you can call an input [validation technical profile](validation-technical-profile.md). The validation technical profile validates the data profiled by the user and returns an error message or Ok, with or without output claims. For example, before Azure AD B2C creates a new account, it checks whether the user already exists in the directory services. You can call a REST API technical profile to add your own business logic.<p>The scope of the output claims of a validation technical profile is limited to the technical profile that invokes the validation technical profile and other validation technical profiles under same technical profile. If you want to use the output claims in the next orchestration step, you need to add the output claims to the technical profile that invokes the validation technical profile.
55-
5. **OutputClaims** - Claims are retuned back to the claims bag. You can use those claims in the next orchestrations step, or output claims transformations.
54+
5. **OutputClaims** - Claims are returned back to the claims bag. You can use those claims in the next orchestrations step, or output claims transformations.
5655
6. **OutputClaimsTransformations** - Input claims of every output [claims transformation](claimstransformations.md) are picked up from the claims bag. The output claims of the technical profile from the previous steps can be input claims of an output claims transformation. After execution, the output claims are put back in the claims bag. The output claims of an output claims transformation can also be input claims of a subsequent output claims transformation.
5756
7. **Single sign-on (SSO) session management** - [SSO session management](active-directory-b2c-reference-sso-custom.md) controls interaction with a user after the user has already authenticated. For example, the administrator can control whether the selection of identity providers is displayed, or whether local account details need to be entered again.
5857

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ The **UseTechnicalProfileForSessionManagement** element contains the following a
268268
| ReferenceId | Yes | An identifier of a technical profile already defined in the policy file or parent policy file. |
269269

270270
### EnabledForUserJourneys
271-
The **ClaimsProviderSelections** in a user journey defines the list of claims provider selection options and their order. With the **EnabledForUserJourneys** element you filter, which claims provider is avaible to the user. The **EnabledForUserJourneys** element contains one of the following values:
271+
The **ClaimsProviderSelections** in a user journey defines the list of claims provider selection options and their order. With the **EnabledForUserJourneys** element you filter, which claims provider is available to the user. The **EnabledForUserJourneys** element contains one of the following values:
272272

273273
- **Always**, execute the technical profile.
274274
- **Never**, skip the technical profile.

0 commit comments

Comments
 (0)