Skip to content

Commit 05b6ee6

Browse files
committed
Merge branch 'patch-29' of https://github.com/batamig/azure-docs-pr; branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into patch-29
2 parents 19e596b + 54263db commit 05b6ee6

File tree

1,027 files changed

+18808
-9127
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,027 files changed

+18808
-9127
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -639,6 +639,12 @@
639639
"branch": "master",
640640
"branch_mapping": {}
641641
},
642+
{
643+
"path_to_root": "sample-active-directory-aspnetcore-webapp-openidconnect-v2",
644+
"url": "https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2",
645+
"branch": "aspnetcore3-1",
646+
"branch_mapping": {}
647+
},
642648
{
643649
"path_to_root": "cognitive-services-content-moderator-samples",
644650
"url": "https://github.com/Azure-Samples/cognitive-services-content-moderator-samples",

.openpublishing.redirection.json

Lines changed: 165 additions & 291 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.security-benchmark.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -386,11 +386,6 @@
386386
"redirect_url": "/security/benchmark/azure/baselines/batch-security-baseline",
387387
"redirect_document_id": false
388388
},
389-
{
390-
"source_path_from_root": "/articles/cloud-services/security-baseline.md",
391-
"redirect_url": "/security/benchmark/azure/baselines/cloud-services-security-baseline",
392-
"redirect_document_id": false
393-
},
394389
{
395390
"source_path_from_root": "/articles/cloud-shell/security-baseline.md",
396391
"redirect_url": "/security/benchmark/azure/baselines/cloud-shell-security-baseline",

CODEOWNERS

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ articles/synapse-analytics/sql-data-warehouse/ @anumjs @ronortloff @julieMSFT
4545
articles/synapse-analytics/synapse-link/ @Rodrigossz @SnehaGunda @jovanpop-msft
4646

4747
# Cognitive Services
48-
articles/cognitive-services/ @erhopf @aahill @trevorbye @patrickfarley @nitinme @mrbullwinkle @laujan
48+
articles/cognitive-services/ @aahill @patrickfarley @nitinme @mrbullwinkle @laujan
4949

5050
# DevOps
5151
articles/ansible/ @TomArcherMsft
@@ -58,7 +58,7 @@ articles/virtual-machines/ @cynthn @mimckitt
5858
articles/virtual-machine-scale-sets/ @ju-shim @mimckitt
5959
articles/cloud-services/ @mimckitt
6060
articles/cloud-services-extended-support/ @mimckitt
61-
articles/service-fabric/ @erikadoyle @mimckitt
61+
articles/service-fabric/ @sukanyamsft @mimckitt
6262
articles/container-instances/ @macolso @mimckitt
6363
articles/container-registry/ @dlepow @mimckitt
6464

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 25 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 05/24/2021
12+
ms.date: 07/01/2021
1313
ms.custom: project-no-code
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -20,27 +20,39 @@ zone_pivot_groups: b2c-policy-type
2020

2121
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2222

23-
## Password reset flow
23+
## Overview
2424

25-
The [sign-up and sign-in journey](add-sign-up-and-sign-in-policy.md) allows users to reset their own password using the **Forgot your password?** link. The password reset flow involves the following steps:
25+
Within a [sign-up and sign-in journey](add-sign-up-and-sign-in-policy.md), users can reset their own passwords using the **Forgot your password?** link. This self-service password reset flow applies to local accounts in Azure AD B2C that use an [email address](sign-in-options.md#email-sign-in) or [username](sign-in-options.md#username-sign-in) with a password for sign-in.
2626

27-
1. From the sign-up and sign-in page, the user clicks the **Forgot your password?** link. Azure AD B2C initiates the password reset flow.
28-
2. The user provides their email address and selects **Send verification code**. Azure AD B2C will then send the user a verification code.
27+
The password reset flow involves the following steps:
2928

30-
* The user needs to open the mail box and copy the verification code. The user then enters the verification code in Azure AD B2C password reset page, and selects **Verify code**.
29+
![Password reset flow](./media/add-password-reset-policy/password-reset-flow.png)
3130

32-
> [!NOTE]
33-
> After the email is verified, the user can still select **Change e-mail**, type the other email, and repeat the email verification from the beginning.
34-
3. The user can then enter a new password.
31+
**1.** From the sign-up and sign-in page, the user clicks the **Forgot your password?** link. Azure AD B2C initiates the password reset flow.
3532

36-
![Password reset flow](./media/add-password-reset-policy/password-reset-flow.png)
33+
**2.** The user provides their email address and selects **Send verification code**. Azure AD B2C sends the verification code to the user's inbox. The user copies the verification code from the email, enters the code in the Azure AD B2C password reset page, and selects **Verify code**.
3734

38-
The password reset flow applies to local accounts in Azure AD B2C that use an [email address](sign-in-options.md#email-sign-in) or [username](sign-in-options.md#username-sign-in) with a password for sign-in.
35+
**3.** The user can then enter a new password. (After the email is verified, the user can still select the **Change e-mail** button; see [Hiding the change email button](#hiding-the-change-email-button) below.)
3936

4037
> [!TIP]
41-
> The self-service password reset flow allows users to change their password when the user forgets their password and wants to reset it. Consider configuring a [password change flow](add-password-change-policy.md) to support cases where a user knows their password and wants to change it.
38+
> The self-service password reset flow allows users to change their password when the user forgets their password and wants to reset it.
39+
> - For cases where a user knows their password and wants to change it, use a [password change flow](add-password-change-policy.md).
40+
> - For cases where you want to to force users to reset their passwords (for example, when they sign in for the first time, when their passwords have been reset by an admin, or after they've been migrated to Azure AD B2C with random passwords) use a [force password reset](force-password-reset.md) flow.
41+
42+
### Hiding the change email button
43+
44+
After the email is verified, the user can still select **Change email**, type the another email, and repeat the email verification from the beginning. If you'd prefer to hide the **Change email** button, you can modify the CSS to hide the associated HTML element(s) on the page. For example, you can add the CSS entry below to the selfAsserted.HTML and [customize the user interface with HTML templates](customize-ui-with-html.md).
45+
46+
```html
47+
<style type="text/css">
48+
.changeClaims
49+
{
50+
visibility: hidden;
51+
}
52+
</style>
53+
```
4254

43-
A common practice after migrating users to Azure AD B2C with random passwords is to have the users verify their email addresses and reset their passwords during their first sign-in. It's also common to force the user to reset their password after an administrator changes their password; see [force password reset](force-password-reset.md) to enable this feature.
55+
Note that the default name of the **Change email** button in the selfasserted.html page is `changeclaims`. You can find the button name by inspecting the page source of the sign-up page using a browser tool (such as Inspect).
4456

4557
## Prerequisites
4658

articles/active-directory-b2c/azure-monitor.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -258,33 +258,32 @@ The workbook will display reports in the form of a dashboard.
258258
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events are created, absence of an event, or a number of events are created within a particular time window. For example, alerts can be used to notify you when average number of sign-in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-log.md).
259259

260260

261-
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md#configure-notifications) whenever there is a 25% drop in the **Total Requests** compare to previous period. Alert will run every 5 minutes and look for the drop within last 24 hours windows. The alerts are created using Kusto query language.
261+
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md#configure-notifications) whenever there is a 25% drop in the **Total Requests** compare to previous period. Alert will run every 5 minutes and look for the drop in the last hour compared to the hour before that. The alerts are created using Kusto query language.
262262

263263

264264
1. From **Log Analytics workspace**, select **Logs**.
265265
1. Create a new **Kusto query** by using the query below.
266266

267267
```kusto
268-
let start = ago(24h);
268+
let start = ago(2h);
269269
let end = now();
270270
let threshold = -25; //25% decrease in total requests.
271271
AuditLogs
272272
| serialize TimeGenerated, CorrelationId, Result
273-
| make-series TotalRequests=dcount(CorrelationId) on TimeGenerated in range(start, end, 1h)
273+
| make-series TotalRequests=dcount(CorrelationId) on TimeGenerated from start to end step 1h
274274
| mvexpand TimeGenerated, TotalRequests
275-
| where TotalRequests > 0
276-
| serialize TotalRequests, TimeGenerated, TimeGeneratedFormatted=format_datetime(todatetime(TimeGenerated), 'yyyy-M-dd [hh:mm:ss tt]')
275+
| serialize TotalRequests, TimeGenerated, TimeGeneratedFormatted=format_datetime(todatetime(TimeGenerated), 'yyyy-MM-dd [HH:mm:ss]')
277276
| project TimeGeneratedFormatted, TotalRequests, PercentageChange= ((toreal(TotalRequests) - toreal(prev(TotalRequests,1)))/toreal(prev(TotalRequests,1)))*100
278-
| order by TimeGeneratedFormatted
277+
| order by TimeGeneratedFormatted desc
279278
| where PercentageChange <= threshold //Trigger's alert rule if matched.
280279
```
281280
282-
1. Select **Run**, to test the query. You should see the results if there is a drop of 25% or more in the total requests within the past 24 hours.
281+
1. Select **Run**, to test the query. You should see the results if there is a drop of 25% or more in the total requests within the past hour.
283282
1. To create an alert rule based on the query above, use the **+ New alert rule** option available in the toolbar.
284283
1. On the **Create an alert rule** page, select **Condition name**
285284
1. On the **Configure signal logic** page, set following values and then use **Done** button to save the changes.
286285
* Alert logic: Set **Number of results** **Greater than** **0**.
287-
* Evaluation based on: Select **1440** for Period (in minutes) and **5** for Frequency (in minutes)
286+
* Evaluation based on: Select **120** for Period (in minutes) and **5** for Frequency (in minutes)
288287
289288
![Create a alert rule condition](./media/azure-monitor/alert-create-rule-condition.png)
290289

articles/active-directory-b2c/b2clogin.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,14 +18,6 @@ ms.subservice: B2C
1818

1919
When you set up an identity provider for sign-up and sign-in in your Azure Active Directory B2C (Azure AD B2C) application, you need to specify a redirect URL. You should no longer reference *login.microsoftonline.com* in your applications and APIs for authenticating users with Azure AD B2C. Instead, use *b2clogin.com* for all new applications, and migrate existing applications from *login.microsoftonline.com* to *b2clogin.com*.
2020

21-
## Deprecation of login.microsoftonline.com
22-
23-
**October 2020 update:** We're extending a grace period for tenants who are unable to meet the originally announced deprecation date of 04 December 2020. Retirement of login.microsoftonline.com will now occur no earlier than **14 January 2021.**
24-
25-
**Background**: On 04 December 2019, we originally [announced](https://azure.microsoft.com/updates/b2c-deprecate-msol/) the scheduled retirement of login.microsoftonline.com support in Azure AD B2C on 04 December 2020. This provided existing tenants one (1) year to migrate to b2clogin.com. New tenants created after 04 December 2019 will not accept requests from login.microsoftonline.com. All functionality remains the same on the b2clogin.com endpoint.
26-
27-
The deprecation of login.microsoftonline.com does not impact Azure Active Directory tenants. Only Azure Active Directory B2C tenants are affected by this change.
28-
2921
## What endpoints does this apply to
3022
The transition to b2clogin.com only applies to authentication endpoints that use Azure AD B2C policies (user flows or custom policies) to authenticate users. These endpoints have a `<policy-name>` parameter which specifies the policy Azure AD B2C should use. [Learn more about Azure AD B2C policies](technical-overview.md#identity-experiences-user-flows-or-custom-policies).
3123

-36.5 KB
Loading

articles/active-directory-b2c/partner-trusona.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -142,17 +142,19 @@ You should now see Trusona as a **new OpenID Connect Identity Provider** listed
142142

143143
1. Select **OK**.
144144

145-
### Test the Policy
145+
### Test the policy
146146

147-
1. Select your newly created policy.
147+
1. Select the policy you created.
148148

149-
2. Select **Run user flow**.
149+
1. Select **Run user flow**, and then select the settings:
150150

151-
3. In the form, enter the Replying URL.
151+
1. **Application**: Select the registered app.
152+
153+
1. **Reply URL**: Select the redirect URL.
154+
155+
1. Select **Run user flow**. You should be redirected to the Trusona OIDC gateway. On the Trusona gateway, scan the displayed Secure QR code with the Trusona app or with a custom app using the Trusona mobile SDK.
152156

153-
4. Select **Run user flow**. You should be redirected to the Trusona OIDC gateway. On the Trusona gateway, scan the displayed Secure QR code with the Trusona app or with a custom app using the Trusona mobile SDK.
154-
155-
5. After scanning the Secure QR code, you should be redirected to the Reply URL you defined in step 3.
157+
1. After you scan the Secure QR code, you should be redirected to the Reply URL you defined.
156158

157159
## Next steps
158160

articles/active-directory/app-provisioning/functions-for-customizing-application-data.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 05/11/2021
11+
ms.date: 07/02/2021
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -728,6 +728,8 @@ ToLower(source, culture)
728728
**Description:**
729729
Takes a *source* string value and converts it to lower case using the culture rules that are specified. If there is no *culture* info specified, then it will use Invariant culture.
730730

731+
If you would like to set existing values in the target system to lower case, [update the schema for your target application](./customize-application-attributes.md#editing-the-list-of-supported-attributes) and set the property caseExact to 'true' for the attribute that you are interested in.
732+
731733
**Parameters:**
732734

733735
| Name | Required/ Repeating | Type | Notes |
@@ -755,6 +757,8 @@ ToUpper(source, culture)
755757
**Description:**
756758
Takes a *source* string value and converts it to upper case using the culture rules that are specified. If there is no *culture* info specified, then it will use Invariant culture.
757759

760+
If you would like to set existing values in the target system to upper case, please [update the schema for your target application](./customize-application-attributes.md#editing-the-list-of-supported-attributes) and set the property caseExact to 'true' for the attribute that you are interested in.
761+
758762
**Parameters:**
759763

760764
| Name | Required/ Repeating | Type | Notes |

0 commit comments

Comments
 (0)