Skip to content

Commit 09688a3

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into retry-go
2 parents 8c4252c + ffb6c0d commit 09688a3

File tree

535 files changed

+5202
-4182
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

535 files changed

+5202
-4182
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -640,6 +640,11 @@
640640
"redirect_url": "/azure/azure-maps/supported-languages",
641641
"redirect_document_id": true
642642
},
643+
{
644+
"source_path_from_root": "/articles/azure-maps/tutorial-geofence.md",
645+
"redirect_url": "/azure/azure-maps/",
646+
"redirect_document_id": true
647+
},
643648
{
644649
"source_path_from_root": "/articles/azure-maps/search-categories.md",
645650
"redirect_url": "/azure/azure-maps/supported-search-categories",

articles/active-directory-b2c/custom-policies-series-store-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 05/11/2024
13+
ms.date: 06/21/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: B2C
@@ -263,7 +263,7 @@ Follow the steps in [Test the custom policy](custom-policies-series-validate-use
263263

264264
After the policy finishes execution, and you receive your ID token, check that the user record has been created:
265265

266-
1. Sign in to the [Azure portal](https://portal.azure.com/) with Global Administrator or Privileged Role Administrator permissions.
266+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least Privileged Role Administrator.
267267

268268
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
269269

articles/active-directory-b2c/partner-asignio.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 06/21/2024
1010
ms.author: gasinh
1111
ms.reviewer: kengaderdus
1212
ms.subservice: B2C
@@ -103,7 +103,7 @@ Complete [Tutorial: Register a web application in Azure Active Directory B2C](tu
103103

104104
For the following instructions, use the Microsoft Entra tenant with the Azure subscription.
105105

106-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as the Global Administrator of the Azure AD B2C tenant.
106+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
107107
2. In the Azure portal toolbar, select **Directories + subscriptions**.
108108
3. On **Portal settings | Directories + subscriptions**, in the **Directory name** list, locate your Microsoft Entra directory.
109109
4. Select **Switch**.
@@ -130,7 +130,7 @@ For the following instructions, use the Microsoft Entra tenant with the Azure su
130130
25. For **Emai**l, use **email**.
131131
26. Select **Save**.
132132

133-
## SCreate a user flow policy
133+
## Create a user flow policy
134134

135135
1. In your Azure AD B2C tenant, under **Policies**, select **User flows**.
136136
2. Select **New user flow**.

articles/active-directory-b2c/partner-bindid.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: active-directory
99
ms.topic: how-to
10-
ms.date: 01/26/2024
10+
ms.date: 06/21/2024
1111
ms.author: gasinh
1212
ms.subservice: B2C
1313
zone_pivot_groups: b2c-policy-type
@@ -96,7 +96,7 @@ From the [Transmit Admin Portal](https://portal.transmitsecurity.io/), configure
9696

9797
To enable users to sign in with Transmit Security, configure Transmit Security as a new identity provider. In Azure AD B2C follow these steps:
9898

99-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as Global Administrator.
99+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator.
100100
1. In the portal toolbar, select **Directories + subscriptions**.
101101
1. On the **Portal settings | Directories + subscriptions** page, in the **Directory name** list, find the Azure AD B2C directory and then select **Switch**.
102102
1. Under **Azure services**, select **Azure AD B2C** (or select **More services** and use the **All services** search box to search for Azure AD B2C).

articles/active-directory-b2c/partner-biocatch.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@ manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: active-directory
99
ms.topic: how-to
10-
ms.date: 01/26/2024
10+
ms.date: 06/21/2024
11+
1112
ms.author: gasinh
1213
ms.subservice: B2C
1314

@@ -340,7 +341,7 @@ document.getElementById("clientSessionId").style.display = 'none';
340341

341342
Add the policy files to Azure AD B2C. For the following instructions, use the directory with the Azure AD B2C tenant.
342343

343-
1. Sign in to the [**Azure portal**](https://portal.azure.com/) as the Global Administrator of the Azure AD B2C tenant.
344+
1. Sign in to the [**Azure portal**](https://portal.azure.com/) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
344345
1. In the portal toolbar, select **Directories + subscriptions**.
345346
1. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, locate the Azure AD B2C directory.
346347
2. Select **Switch**.

articles/active-directory-b2c/partner-bloksec.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: active-directory
99
ms.topic: how-to
10-
ms.date: 01/26/2024
10+
ms.date: 06/21/2024
1111
ms.author: gasinh
1212
ms.subservice: B2C
1313
zone_pivot_groups: b2c-policy-type
@@ -97,7 +97,7 @@ Learn more: [Send a sign out request](./openid-connect.md#send-a-sign-out-reques
9797

9898
For the following instructions, use the directory that contains your Azure AD B2C tenant.
9999

100-
1. Sign in to the [Azure portal](https://portal.azure.com) as Global Administrator of your Azure AD B2C tenant.
100+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least B2C IEF Policy Administrator of your Azure AD B2C tenant.
101101
2. In the portal toolbar, select **Directories + subscriptions**.
102102
3. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, find your Azure AD B2C directory.
103103
4. Select **Switch**.

articles/active-directory-b2c/partner-eid-me.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 06/21/2024
10+
1011
ms.author: gasinh
1112
ms.subservice: B2C
1213
zone_pivot_groups: b2c-policy-type
@@ -104,7 +105,7 @@ To configure your tenant application as an eID-ME relying party in eID-Me, suppl
104105

105106
For the following instructions, use the directory with the Azure AD B2C tenant.
106107

107-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as Global Administrator of the Azure AD B2C tenant.
108+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
108109
2. In the top menu, select **Directory + subscription**.
109110
3. Select the directory with the tenant.
110111
4. In the top-left corner of the Azure portal, select **All services**.
@@ -249,7 +250,7 @@ You can add more identity claims that eID-Me supports.
249250
2. Find the `BuildingBlocks` element.
250251

251252
> [!NOTE]
252-
> Find supported eID-Me identity claims lists on [OID repository](http://www.oid-info.com/get/1.3.6.1.4.1.50715) with OIDC identifiers on [well-known/openid-configuration](https://eid-me.bluink.ca/.well-known/openid-configuration).
253+
> Find supported eID-Me identity claims lists on [OID repository](https://oid-rep.orange-labs.fr/get/1.3.6.1.4.1.50715) with OIDC identifiers on [well-known/openid-configuration](https://eid-me.bluink.ca/.well-known/openid-configuration).
253254
254255
```xml
255256
<BuildingBlocks>

articles/active-directory-b2c/partner-f5.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ ms.reviewer: kengaderdus
99
ms.service: active-directory
1010
ms.subservice: B2C
1111
ms.topic: how-to
12-
ms.date: 01/26/2024
12+
ms.date: 06/21/2024
13+
1314

1415
# Customer intent: As an IT admin responsible for securing applications, I want to integrate Azure Active Directory B2C with F5 BIG-IP Access Policy Manager. I want to expose legacy applications securely to the internet with preauthentication, Conditional Access, and single sign-on (SSO) capabilities.
1516
---
@@ -79,7 +80,7 @@ Obtain custom attributes from Azure AD B2C user objects, federated IdPs, API con
7980

8081
Legacy applications expect specific attributes, so include them in your user flow. You can replace them with attributes your application requires. Or if you're setting up a test app using the instructions, then user any headers.
8182

82-
1. Sign in to the [Azure portal](https://portal.azure.com/) as Global Administrator.
83+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least B2C IEF Policy Administrator.
8384
2. In the left-hand pane, select **User attributes**.
8485
3. Select **Add** to create two custom attributes.
8586
4. For Agent ID, select String **Data Type**.

articles/active-directory-b2c/partner-haventec.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@ manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: active-directory
99
ms.topic: how-to
10-
ms.date: 01/26/2024
10+
ms.date: 06/21/2024
11+
1112
ms.author: gasinh
1213
ms.subservice: B2C
1314

@@ -69,7 +70,7 @@ See, [Tutorial: Register a web application in Azure Active Directory B2C](tutori
6970

7071
For the following instructions, use the directory with the Azure AD B2C tenant.
7172

72-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as the Global Administrator of your Azure AD B2C tenant.
73+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator of your Azure AD B2C tenant.
7374
2. In the top menu, select **Directory + subscription**.
7475
3. Select the directory with the tenant.
7576
4. In the top-left corner of the Azure portal, select **All services**.

articles/active-directory-b2c/partner-keyless.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@ manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: active-directory
99
ms.topic: how-to
10-
ms.date: 01/26/2024
10+
ms.date: 06/21/2024
11+
1112
ms.author: gasinh
1213
ms.subservice: B2C
1314

@@ -61,7 +62,7 @@ Use the following sections to add an IdP, configure the IdP, and create a user f
6162

6263
To add a new Identity provider:
6364

64-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as Global Administrator of the Azure AD B2C tenant.
65+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
6566
2. Select **Directories + subscriptions**.
6667
3. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, find your Azure AD B2C directory.
6768
4. Select **Switch**.

0 commit comments

Comments
 (0)