Skip to content

Commit 0af0fcd

Browse files
Merge branch 'main' into 0621-Add_Snowflake_integration_doc
2 parents 09d5626 + ebb7dce commit 0af0fcd

File tree

1,484 files changed

+14790
-9518
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,484 files changed

+14790
-9518
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -640,6 +640,11 @@
640640
"redirect_url": "/azure/azure-maps/supported-languages",
641641
"redirect_document_id": true
642642
},
643+
{
644+
"source_path_from_root": "/articles/azure-maps/tutorial-geofence.md",
645+
"redirect_url": "/azure/azure-maps/",
646+
"redirect_document_id": true
647+
},
643648
{
644649
"source_path_from_root": "/articles/azure-maps/search-categories.md",
645650
"redirect_url": "/azure/azure-maps/supported-search-categories",

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -429,6 +429,11 @@
429429
"source_path_from_root": "/articles/virtual-desktop/host-pool-load-balancing.md",
430430
"redirect_url": "/azure/virtual-desktop/configure-host-pool-load-balancing",
431431
"redirect_document_id": false
432+
},
433+
{
434+
"source_path_from_root": "/articles/virtual-desktop/configure-rdp-shortpath-limit-ports-public-networks.md",
435+
"redirect_url": "/azure/virtual-desktop/configure-rdp-shortpath",
436+
"redirect_document_id": true
432437
}
433438
]
434439
}

articles/active-directory-b2c/configure-authentication-sample-python-web-app.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Configure authentication in a sample Python web application by using Azure Active Directory B2C
2+
title: Configure authentication in a sample Python web app by using Azure AD B2C
33
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Python web application.
44

55
author: kengaderdus
6-
manager: CelesteDG
6+
manager: mwongerapk
77
ms.service: active-directory
88

99
ms.topic: reference
10-
ms.date: 01/11/2024
10+
ms.date: 06/04/2024
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: b2c-support, devx-track-python
1414

1515

16-
#Customer intent: As a Python web app developer, I want to configure Azure AD B2C authentication in my web application, so that I can securely sign users in and add authentication and authorization support to my app.
16+
#Customer intent: As a Python web app developer, I want to configure Azure AD B2C authentication in a sample web app by using my own tenant, so that I can securely sign customer users.
1717

1818
---
1919

@@ -37,7 +37,7 @@ The sign-in flow involves the following steps:
3737

3838
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3939
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
40-
- [Python 3.7+](https://www.python.org/downloads/)
40+
- [Python 3.8+](https://www.python.org/downloads/)
4141

4242
## Step 1: Configure your user flow
4343

@@ -222,4 +222,4 @@ You can add and modify redirect URIs in your registered applications at any time
222222
* The redirect URL is case-sensitive. Its case must match the case of the URL path of your running application.
223223
224224
## Next steps
225-
* Learn how to [Configure authentication options in a Python web app by using Azure AD B2C](enable-authentication-python-web-app-options.md).
225+
* Learn how to [Configure authentication options in a Python web app by using Azure AD B2C](enable-authentication-python-web-app-options.md).

articles/active-directory-b2c/custom-policies-series-store-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 05/11/2024
13+
ms.date: 06/21/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: B2C
@@ -263,7 +263,7 @@ Follow the steps in [Test the custom policy](custom-policies-series-validate-use
263263

264264
After the policy finishes execution, and you receive your ID token, check that the user record has been created:
265265

266-
1. Sign in to the [Azure portal](https://portal.azure.com/) with Global Administrator or Privileged Role Administrator permissions.
266+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least Privileged Role Administrator.
267267

268268
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
269269

articles/active-directory-b2c/partner-asignio.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 06/21/2024
1010
ms.author: gasinh
1111
ms.reviewer: kengaderdus
1212
ms.subservice: B2C
@@ -103,7 +103,7 @@ Complete [Tutorial: Register a web application in Azure Active Directory B2C](tu
103103

104104
For the following instructions, use the Microsoft Entra tenant with the Azure subscription.
105105

106-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as the Global Administrator of the Azure AD B2C tenant.
106+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
107107
2. In the Azure portal toolbar, select **Directories + subscriptions**.
108108
3. On **Portal settings | Directories + subscriptions**, in the **Directory name** list, locate your Microsoft Entra directory.
109109
4. Select **Switch**.
@@ -130,7 +130,7 @@ For the following instructions, use the Microsoft Entra tenant with the Azure su
130130
25. For **Emai**l, use **email**.
131131
26. Select **Save**.
132132

133-
## SCreate a user flow policy
133+
## Create a user flow policy
134134

135135
1. In your Azure AD B2C tenant, under **Policies**, select **User flows**.
136136
2. Select **New user flow**.

articles/active-directory-b2c/partner-bindid.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: active-directory
99
ms.topic: how-to
10-
ms.date: 01/26/2024
10+
ms.date: 06/21/2024
1111
ms.author: gasinh
1212
ms.subservice: B2C
1313
zone_pivot_groups: b2c-policy-type
@@ -96,7 +96,7 @@ From the [Transmit Admin Portal](https://portal.transmitsecurity.io/), configure
9696

9797
To enable users to sign in with Transmit Security, configure Transmit Security as a new identity provider. In Azure AD B2C follow these steps:
9898

99-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as Global Administrator.
99+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator.
100100
1. In the portal toolbar, select **Directories + subscriptions**.
101101
1. On the **Portal settings | Directories + subscriptions** page, in the **Directory name** list, find the Azure AD B2C directory and then select **Switch**.
102102
1. Under **Azure services**, select **Azure AD B2C** (or select **More services** and use the **All services** search box to search for Azure AD B2C).

articles/active-directory-b2c/partner-biocatch.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@ manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: active-directory
99
ms.topic: how-to
10-
ms.date: 01/26/2024
10+
ms.date: 06/21/2024
11+
1112
ms.author: gasinh
1213
ms.subservice: B2C
1314

@@ -340,7 +341,7 @@ document.getElementById("clientSessionId").style.display = 'none';
340341

341342
Add the policy files to Azure AD B2C. For the following instructions, use the directory with the Azure AD B2C tenant.
342343

343-
1. Sign in to the [**Azure portal**](https://portal.azure.com/) as the Global Administrator of the Azure AD B2C tenant.
344+
1. Sign in to the [**Azure portal**](https://portal.azure.com/) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
344345
1. In the portal toolbar, select **Directories + subscriptions**.
345346
1. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, locate the Azure AD B2C directory.
346347
2. Select **Switch**.

articles/active-directory-b2c/partner-bloksec.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: active-directory
99
ms.topic: how-to
10-
ms.date: 01/26/2024
10+
ms.date: 06/21/2024
1111
ms.author: gasinh
1212
ms.subservice: B2C
1313
zone_pivot_groups: b2c-policy-type
@@ -97,7 +97,7 @@ Learn more: [Send a sign out request](./openid-connect.md#send-a-sign-out-reques
9797

9898
For the following instructions, use the directory that contains your Azure AD B2C tenant.
9999

100-
1. Sign in to the [Azure portal](https://portal.azure.com) as Global Administrator of your Azure AD B2C tenant.
100+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least B2C IEF Policy Administrator of your Azure AD B2C tenant.
101101
2. In the portal toolbar, select **Directories + subscriptions**.
102102
3. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, find your Azure AD B2C directory.
103103
4. Select **Switch**.

articles/active-directory-b2c/partner-eid-me.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 06/21/2024
10+
1011
ms.author: gasinh
1112
ms.subservice: B2C
1213
zone_pivot_groups: b2c-policy-type
@@ -104,7 +105,7 @@ To configure your tenant application as an eID-ME relying party in eID-Me, suppl
104105

105106
For the following instructions, use the directory with the Azure AD B2C tenant.
106107

107-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as Global Administrator of the Azure AD B2C tenant.
108+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
108109
2. In the top menu, select **Directory + subscription**.
109110
3. Select the directory with the tenant.
110111
4. In the top-left corner of the Azure portal, select **All services**.
@@ -249,7 +250,7 @@ You can add more identity claims that eID-Me supports.
249250
2. Find the `BuildingBlocks` element.
250251

251252
> [!NOTE]
252-
> Find supported eID-Me identity claims lists on [OID repository](http://www.oid-info.com/get/1.3.6.1.4.1.50715) with OIDC identifiers on [well-known/openid-configuration](https://eid-me.bluink.ca/.well-known/openid-configuration).
253+
> Find supported eID-Me identity claims lists on [OID repository](https://oid-rep.orange-labs.fr/get/1.3.6.1.4.1.50715) with OIDC identifiers on [well-known/openid-configuration](https://eid-me.bluink.ca/.well-known/openid-configuration).
253254
254255
```xml
255256
<BuildingBlocks>

articles/active-directory-b2c/partner-f5.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ ms.reviewer: kengaderdus
99
ms.service: active-directory
1010
ms.subservice: B2C
1111
ms.topic: how-to
12-
ms.date: 01/26/2024
12+
ms.date: 06/21/2024
13+
1314

1415
# Customer intent: As an IT admin responsible for securing applications, I want to integrate Azure Active Directory B2C with F5 BIG-IP Access Policy Manager. I want to expose legacy applications securely to the internet with preauthentication, Conditional Access, and single sign-on (SSO) capabilities.
1516
---
@@ -79,7 +80,7 @@ Obtain custom attributes from Azure AD B2C user objects, federated IdPs, API con
7980

8081
Legacy applications expect specific attributes, so include them in your user flow. You can replace them with attributes your application requires. Or if you're setting up a test app using the instructions, then user any headers.
8182

82-
1. Sign in to the [Azure portal](https://portal.azure.com/) as Global Administrator.
83+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least B2C IEF Policy Administrator.
8384
2. In the left-hand pane, select **User attributes**.
8485
3. Select **Add** to create two custom attributes.
8586
4. For Agent ID, select String **Data Type**.

0 commit comments

Comments
 (0)