Skip to content

Commit 02ea57a

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into swa/byo-afd
2 parents ab95e1e + 62acd11 commit 02ea57a

File tree

1,028 files changed

+18220
-13289
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,028 files changed

+18220
-13289
lines changed

.github/workflows/stale.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ jobs:
1818
stale-pr-label: inactive
1919
close-pr-label: auto-close
2020
exempt-pr-labels: keep-open
21-
operations-per-run: 1200
21+
operations-per-run: 1300
2222
ascending: false
2323
# start-date: '2021-03-19'
2424
stale-pr-message: >

.openpublishing.redirection.json

Lines changed: 101 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/virtual-machines/linux/login-using-aad.md",
5+
"redirect_url": "/previous-versions/azure/virtual-machines/linux/login-using-aad",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/machine-learning/classic/ai-gallery-control-personal-data-dsr.md",
510
"redirect_url": "/previous-versions/azure/machine-learning/classic/ai-gallery-control-personal-data-dsr",
@@ -2458,6 +2463,16 @@
24582463
"redirect_url": "/azure/machine-learning/reference-yaml-overview.md",
24592464
"redirect_document_id": false
24602465
},
2466+
{
2467+
"source_path_from_root": "/articles/machine-learning/tutorial-train-models-with-aml.md",
2468+
"redirect_url": "/azure/machine-learning/tutorial-train-deploy-notebook",
2469+
"redirect_document_id": true
2470+
},
2471+
{
2472+
"source_path_from_root": "/articles/machine-learning/tutorial-deploy-models-with-aml.md",
2473+
"redirect_url": "/azure/machine-learning/tutorial-train-deploy-notebook",
2474+
"redirect_document_id": false
2475+
},
24612476
{
24622477
"source_path_from_root": "/articles/machine-learning/how-to-create-labeling-projects.md",
24632478
"redirect_url": "/azure/machine-learning/how-to-create-image-labeling-projects",
@@ -34393,6 +34408,11 @@
3439334408
"redirect_url": "https://azure.microsoft.com/blog/dear-documentdb-customers-welcome-to-azure-cosmos-db/",
3439434409
"redirect_document_id": false
3439534410
},
34411+
{
34412+
"source_path_from_root": "/articles/documentdb/sql-query-operators.md",
34413+
"redirect_url": "sql-query-logical-operators",
34414+
"redirect_document_id": false
34415+
},
3439634416
{
3439734417
"source_path_from_root": "/articles/search/search-case-studies.md",
3439834418
"redirect_url": "https://azure.microsoft.com/case-studies",
@@ -41748,6 +41768,86 @@
4174841768
"redirect_url": "/azure/cognitive-services/Content-Moderator/encrypt-data-at-rest",
4174941769
"redirect_document_id": false
4175041770
},
41771+
{
41772+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/ecommerce-retail-catalog-moderation.md",
41773+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41774+
"redirect_document_id": false
41775+
},
41776+
{
41777+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/facebook-post-moderation.md",
41778+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41779+
"redirect_document_id": false
41780+
},
41781+
{
41782+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/moderation-jobs-quickstart-dotnet.md",
41783+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41784+
"redirect_document_id": false
41785+
},
41786+
{
41787+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/quick-start.md",
41788+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41789+
"redirect_document_id": false
41790+
},
41791+
{
41792+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/review-api.md",
41793+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41794+
"redirect_document_id": false
41795+
},
41796+
{
41797+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/try-review-api-job.md",
41798+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41799+
"redirect_document_id": false
41800+
},
41801+
{
41802+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/try-review-api-workflow.md",
41803+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41804+
"redirect_document_id": false
41805+
},
41806+
{
41807+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/video-moderation-human-review.md",
41808+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41809+
"redirect_document_id": false
41810+
},
41811+
{
41812+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/video-reviews-quickstart-dotnet.md",
41813+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41814+
"redirect_document_id": false
41815+
},
41816+
{
41817+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/video-transcript-reviews-quickstart-dotnet.md",
41818+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41819+
"redirect_document_id": false
41820+
},
41821+
{
41822+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Configure.md",
41823+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41824+
"redirect_document_id": false
41825+
},
41826+
{
41827+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/human-in-the-loop.md",
41828+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41829+
"redirect_document_id": false
41830+
},
41831+
{
41832+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Review-Moderated-Images.md",
41833+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41834+
"redirect_document_id": false
41835+
},
41836+
{
41837+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Workflows.md",
41838+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41839+
"redirect_document_id": false
41840+
},
41841+
{
41842+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/try-review-api-review.md",
41843+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41844+
"redirect_document_id": false
41845+
},
41846+
{
41847+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/whats-new.md",
41848+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41849+
"redirect_document_id": false
41850+
},
4175141851
{
4175241852
"source_path_from_root": "/articles/cognitive-services/Custom-Vision-Service/custom-vision-encryption-of-data-at-rest.md",
4175341853
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/encrypt-data-at-rest",
@@ -45049,4 +45149,4 @@
4504945149
"redirect_document_id": false
4505045150
}
4505145151
]
45052-
}
45152+
}

articles/active-directory-b2c/access-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,11 +60,11 @@ If the **response_type** parameter in an `/authorize` request includes `token`,
6060

6161
## Request a token
6262

63-
To request an access token, you need an authorization code. Below is an example of a request to the `/authorize` endpoint for an authorization code. Custom domains are not supported for use with access tokens. Use your tenant-name.onmicrosoft.com domain in the request URL.
63+
To request an access token, you need an authorization code. Below is an example of a request to the `/authorize` endpoint for an authorization code.
6464

6565
In the following example, you replace these values in the query string:
6666

67-
- `<tenant-name>` - The name of your Azure AD B2C tenant.
67+
- `<tenant-name>` - The name of your [Azure AD B2C tenant](tenant-management.md#get-your-tenant-name). If you're using a custom domain, replace `tenant-name.b2clogin.com` with your domain, such as `contoso.com`.
6868
- `<policy-name>` - The name of your custom policy or user flow.
6969
- `<application-ID>` - The application identifier of the web application that you registered to support the user flow.
7070
- `<application-ID-URI>` - The application identifier URI that you set under **Expose an API** blade of the client application.

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 25 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/12/2021
12+
ms.date: 1/11/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -133,8 +133,30 @@ The following table lists the [OAuth2 identity provider](oauth2-technical-profil
133133

134134
| Claim | Description | Example |
135135
| ----- | ----------------------- | --------|
136-
| {oauth2:access_token} | The access token. | N/A |
137-
| {oauth2:refresh_token} | The refresh token. | N/A |
136+
| {oauth2:access_token} | The OAuth2 identity provider access token. The `access_token` attribute. | `eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1Ni...` |
137+
| {oauth2:token_type} | The type of the access token. The `token_type` attribute. | Bearer |
138+
| {oauth2:expires_in} | The length of time that the access token is valid in seconds. The `expires_in` attribute. The output claim [DataType](claimsschema.md#datatype) must be `int` or `long`. | 960000 |
139+
| {oauth2:refresh_token} | The OAuth2 identity provider refresh token. The `refresh_token` attribute. | `eyJraWQiOiJacW9pQlp2TW5pYVc2MUY...` |
140+
141+
To use the OAuth2 identity provider claim resolvers, set the output claim's `PartnerClaimType` attribute to the claim resolver. The following example demonstrates how the get the external identity provider claims:
142+
143+
```xml
144+
<ClaimsProvider>
145+
<DisplayName>Contoso</DisplayName>
146+
<TechnicalProfiles>
147+
<TechnicalProfile Id="Contoso-OAUTH">
148+
<OutputClaims>
149+
<OutputClaim ClaimTypeReferenceId="identityProviderAccessToken" PartnerClaimType="{oauth2:access_token}" />
150+
<OutputClaim ClaimTypeReferenceId="identityProviderAccessTokenType" PartnerClaimType="{oauth2:token_type}" />
151+
<OutputClaim ClaimTypeReferenceId="identityProviderAccessTokenExpiresIn" PartnerClaimType="{oauth2:expires_in}" />
152+
<OutputClaim ClaimTypeReferenceId="identityProviderRefreshToken" PartnerClaimType="{oauth2:refresh_token}" />
153+
</OutputClaims>
154+
...
155+
</TechnicalProfile>
156+
</TechnicalProfiles>
157+
</ClaimsProvider>
158+
```
159+
138160

139161
## Using claim resolvers
140162

articles/active-directory-b2c/manage-user-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -135,11 +135,11 @@ When you develop your application, you ordinarily capture users' acceptance of t
135135

136136
The following steps describe how you can manage terms of use:
137137

138-
1. Record the acceptance of the terms of use and the date of acceptance by using the Graph API and extended attributes. You can do so by using both built-in and custom user flows. We recommend that you create and use the **extension_termsOfUseConsentDateTime** and **extension_termsOfUseConsentVersion** attributes.
138+
1. Record the acceptance of the terms of use and the date of acceptance by using the Graph API and extended attributes. You can do so by using both built-in user flows and custom policies. We recommend that you create and use the **extension_termsOfUseConsentDateTime** and **extension_termsOfUseConsentVersion** attributes.
139139

140-
2. Create a required check box labeled "Accept Terms of Use," and record the result during sign-up. You can do so by using both built-in and custom user flows.
140+
2. Create a required check box labeled "Accept Terms of Use," and record the result during sign-up. You can do so by using both built-in user flows and custom policies.
141141

142-
3. Azure AD B2C stores the terms of use agreement and the user's acceptance. You can use the Graph API to query for the status of any user by reading the extension attribute that's used to record the response (for example, read **termsOfUseTestUpdateDateTime**). You can do so by using both built-in and custom user flows.
142+
3. Azure AD B2C stores the terms of use agreement and the user's acceptance. You can use the Graph API to query for the status of any user by reading the extension attribute that's used to record the response (for example, read **termsOfUseTestUpdateDateTime**). You can do so by using both built-in user flows and custom policies.
143143

144144
4. Require acceptance of updated terms of use by comparing the date of acceptance to the date of the latest version of the terms of use. You can compare the dates only by using a custom user flow. Use the extended attribute **extension_termsOfUseConsentDateTime**, and compare the value to the claim of **termsOfUseTextUpdateDateTime**. If the acceptance is old, force a new acceptance by displaying a self-asserted screen. Otherwise, block access by using policy logic.
145145

articles/active-directory-b2c/saml-identity-provider-technical-profile.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 09/20/2021
12+
ms.date: 01/11/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -166,6 +166,7 @@ The **OutputClaimsTransformations** element may contain a collection of **Output
166166
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
167167
|SingleLogoutEnabled| No| Indicates whether during sign-in the technical profile attempts to sign out from federated identity providers. For more information, see [Azure AD B2C session sign-out](session-behavior.md#sign-out). Possible values: `true` (default), or `false`.|
168168
|ForceAuthN| No| Passes the ForceAuthN value in the SAML authentication request to determine if the external SAML IDP will be forced to prompt the user for authentication. By default, Azure AD B2C sets the ForceAuthN value to false on initial login. If the session is then reset (for example by using the `prompt=login` in OIDC) then the ForceAuthN value will be set to `true`. Setting the metadata item as shown below will force the value for all requests to the external IDP. Possible values: `true` or `false`.|
169+
|ProviderName| No| Passes the ProviderName value in the SAML authentication request.|
169170

170171

171172
## Cryptographic keys

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ You learn how to register an application in the next tutorial.
5252

5353
![Directories + subscriptions with Switch button](media/tutorial-create-tenant/switch-directory.png)
5454

55-
1. Add **Microsoft.AzureActiveDirectory** as a resource provider for the Azure subscription your're using ([learn more](../azure-resource-manager/management/resource-providers-and-types.md?WT.mc_id=Portal-Microsoft_Azure_Support#register-resource-provider-1)):
55+
1. Add **Microsoft.AzureActiveDirectory** as a resource provider for the Azure subscription you're using ([learn more](../azure-resource-manager/management/resource-providers-and-types.md?WT.mc_id=Portal-Microsoft_Azure_Support#register-resource-provider-1)):
5656

5757
1. On the Azure portal, search for and select **Subscriptions**.
5858
2. Select your subscription, and then in the left menu, select **Resource providers**. If you don't see the left menu, select the **Show the menu for < name of your subscription >** icon at the top left part of the page to expand it.

articles/active-directory-b2c/user-profile-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ In user migration scenarios, if the accounts you want to migrate have weaker pas
166166

167167
## MFA phone number attribute
168168

169-
When using a phone for multi-factor authentication (MFA), the mobile phone is used to verify the user identity. To [add](/graph/api/authentication-post-phonemethods) a new phone number programatically, [update](/graph/api/b2cauthenticationmethodspolicy-update), [get](/graph/api/b2cauthenticationmethodspolicy-get), or [delete](/graph/api/phoneauthenticationmethod-delete) the phone number, use MS Graph API [phone authentication method](/graph/api/resources/phoneauthenticationmethod).
169+
When using a phone for multi-factor authentication (MFA), the mobile phone is used to verify the user identity. To [add](/graph/api/authentication-post-phonemethods) a new phone number programmatically, [update](/graph/api/b2cauthenticationmethodspolicy-update), [get](/graph/api/b2cauthenticationmethodspolicy-get), or [delete](/graph/api/phoneauthenticationmethod-delete) the phone number, use MS Graph API [phone authentication method](/graph/api/resources/phoneauthenticationmethod).
170170

171171
In Azure AD B2C [custom policies](custom-policy-overview.md), the phone number is available through `strongAuthenticationPhoneNumber` claim type.
172172

articles/active-directory-domain-services/network-considerations.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 08/12/2021
12+
ms.date: 01/06/2022
1313
ms.author: justinha
1414

1515
---
@@ -85,7 +85,9 @@ You can enable name resolution using conditional DNS forwarders on the DNS serve
8585

8686
## Network resources used by Azure AD DS
8787

88-
A managed domain creates some networking resources during deployment. These resources are needed for successful operation and management of the managed domain, and shouldn't be manually configured.
88+
A managed domain creates some networking resources during deployment. These resources are needed for successful operation and management of the managed domain, and shouldn't be manually configured.
89+
90+
Don't lock the networking resources used by Azure AD DS. If networking resources get locked, they can't be deleted. When domain controllers need to be rebuilt in that case, new networking resources with different IP addresses need to be created.
8991

9092
| Azure resource | Description |
9193
|:----------------------------------------|:---|

0 commit comments

Comments
 (0)