Skip to content

Commit 0cef024

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1598718b
2 parents 30f90ef + af86f21 commit 0cef024

File tree

496 files changed

+4444
-3723
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

496 files changed

+4444
-3723
lines changed

.openpublishing.redirection.json

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11992,12 +11992,17 @@
1199211992
},
1199311993
{
1199411994
"source_path": "articles/blockchain-workbench/hyperledger-fabric-single-member-blockchain.md",
11995-
"redirect_url": "/azure/blockchain/templates/hyperledger-fabric-consortium-blockchain",
11995+
"redirect_url": "/azure/blockchain/templates/hyperledger-fabric-consortium-azure-kubernetes-service",
1199611996
"redirect_document_id": false
1199711997
},
1199811998
{
1199911999
"source_path": "articles/blockchain/templates/hyperledger-fabric-single-member-blockchain.md",
12000-
"redirect_url": "/azure/blockchain/templates/hyperledger-fabric-consortium-blockchain",
12000+
"redirect_url": "/azure/blockchain/templates/hyperledger-fabric-consortium-azure-kubernetes-service",
12001+
"redirect_document_id": false
12002+
},
12003+
{
12004+
"source_path": "articles/blockchain/templates/hyperledger-fabric-consortium-blockchain.md",
12005+
"redirect_url": "/azure/blockchain/templates/hyperledger-fabric-consortium-azure-kubernetes-service",
1200112006
"redirect_document_id": false
1200212007
},
1200312008
{
@@ -24510,6 +24515,11 @@
2451024515
"redirect_url": "/azure/virtual-machines/workloads/sap/high-availability-multi-sid",
2451124516
"redirect_document_id": false
2451224517
},
24518+
{
24519+
"source_path": "articles/virtual-machines/virtual-machines-azure-slave-plugin-for-hudson-classic.md",
24520+
"redirect_url": "/azure/virtual-machines/",
24521+
"redirect_document_id": false
24522+
},
2451324523
{
2451424524
"source_path": "articles/virtual-machines/virtual-machines-windows-sap-planning-guide.md",
2451524525
"redirect_url": "/azure/virtual-machines/workloads/sap/planning-guide",
@@ -41704,6 +41714,11 @@
4170441714
"source_path": "articles/virtual-machines/windows/classic/capture-image-classic.md",
4170541715
"redirect_url": "/previous-versions/azure/virtual-machines/windows/classic/capture-image-classic",
4170641716
"redirect_document_id": false
41717+
},
41718+
{
41719+
"source_path": "articles/virtual-machines/virtual-machines-availability-set-supportability.md",
41720+
"redirect_url": "/azure/virtual-machines/troubleshooting/virtual-machines-availability-set-supportability",
41721+
"redirect_document_id": false
4170741722
},
4170841723
{
4170941724
"source_path": "articles/virtual-machines/windows/classic/configure-availability-classic.md",
@@ -48020,14 +48035,21 @@
4802048035
"source_path": "articles/cognitive-services/Computer-vision/vs-computer-vision-connected-service.md",
4802148036
"redirect_url": "/azure/cognitive-services/computer-vision/",
4802248037
"redirect_document_id": false
48023-
}, {
48038+
},
48039+
{
4802448040
"source_path": "articles/cognitive-services/Face/vs-face-connected-service.md",
4802548041
"redirect_url": "/azure/cognitive-services/face/",
4802648042
"redirect_document_id": false
48027-
}, {
48043+
},
48044+
{
4802848045
"source_path": "articles/cognitive-services/text-analytics/vs-text-connected-service.md",
4802948046
"redirect_url": "/azure/cognitive-services/text-analytics/",
4803048047
"redirect_document_id": false
48048+
},
48049+
{
48050+
"source_path": "articles/media-services/previous/media-services-configure-fmle-live-encoder.md",
48051+
"redirect_url": "/azure/media-services/previous/media-services-configure-wirecast-live-encoder/",
48052+
"redirect_document_id": false
4803148053
}
4803248054
]
4803348055
}

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 10/12/2018
12+
ms.date: 02/11/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515

@@ -154,7 +154,7 @@ Add the profiles to the *TrustFrameworkExtensions.xml* file from the starter pac
154154
<InputClaims>
155155
<!-- Properties of an event are added through the syntax {property:NAME}, where NAME is property being added to the event. DefaultValue can be either a static value or a value that's resolved by one of the supported DefaultClaimResolvers. -->
156156
<InputClaim ClaimTypeReferenceId="PolicyId" PartnerClaimType="{property:Policy}" DefaultValue="{Policy:PolicyId}" />
157-
<InputClaim ClaimTypeReferenceId="CorrelationId" PartnerClaimType="{property:JourneyId}" />
157+
<InputClaim ClaimTypeReferenceId="CorrelationId" PartnerClaimType="{property:JourneyId}" DefaultValue="{Context:CorrelationId}" />
158158
<InputClaim ClaimTypeReferenceId="Culture" PartnerClaimType="{property:Culture}" DefaultValue="{Culture:RFC5646}" />
159159
</InputClaims>
160160
</TechnicalProfile>

articles/active-directory-b2c/azure-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ You authorize a user or group in your Azure AD B2C directory (the **Service Prov
4444

4545
This is the resource group containing the destination Azure storage account, event hub, or Log Analytics workspace to receive data from Azure Monitor. You specify the resource group name when you deploy the Azure Resource Manager template.
4646

47-
[Create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md#create-resource-groups) or choose an existing one the Azure Active Directory (Azure AD) tenant that contains your Azure subscription, *not* the directory that contains your Azure AD B2C tenant.
47+
[Create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md#create-resource-groups) or choose an existing one in the Azure Active Directory (Azure AD) tenant that contains your Azure subscription, *not* the directory that contains your Azure AD B2C tenant.
4848

4949
This example uses a resource group named *azure-ad-b2c-monitor* in the *Central US* region.
5050

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ The **ContentDefinition** element contains the following elements:
7373

7474
### DataUri
7575

76-
The **DataUri** element is used to specify the page identifier. Azure AD B2C uses the page identifier to load and initiate UI elements and client side JavaScript. The format of the value is `urn:com:microsoft:aad:b2c:elements:page-name:version`. The following table lists of the page identifiers you can use.
76+
The **DataUri** element is used to specify the page identifier. Azure AD B2C uses the page identifier to load and initiate UI elements and client side JavaScript. The format of the value is `urn:com:microsoft:aad:b2c:elements:page-name:version`. The following table lists the values and descriptions of the page identifiers you can use.
7777

7878
| Value | Description |
7979
| ----- | ----------- |

articles/active-directory-b2c/display-controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Certain display claims are required for certain types of display control. For ex
8686

8787
The **output claims** of a display control are not sent to the next orchestration step. They are saved temporarily only for the current display control session. These temporary claims can be shared between the different actions of the same display control.
8888

89-
To bubble up the output the claims to the next orchestration step, use the **OutputClaims** of the actual self-asserted technical profile which references this display control.
89+
To bubble up the output claims to the next orchestration step, use the **OutputClaims** of the actual self-asserted technical profile which references this display control.
9090

9191
### Display control Actions
9292

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant-custom.md

Lines changed: 22 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 09/13/2019
12+
ms.date: 02/11/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -46,6 +46,19 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
4646
1. Select **Certificates & secrets**, and then select **New client secret**.
4747
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
4848
49+
## Configuring optional claims
50+
51+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
52+
53+
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
54+
1. From the **Manage** section, select **App registrations**.
55+
1. Select the application you want to configure optional claims for in the list.
56+
1. From the **Manage** section, select **Token configuration (preview)**.
57+
1. Select **Add optional claim**.
58+
1. Select the token type you want to configure.
59+
1. Select the optional claims to add.
60+
1. Click **Add**.
61+
4962
## Create a policy key
5063
5164
You need to store the application key that you created in your Azure AD B2C tenant.
@@ -69,23 +82,20 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
6982
1. Open the *TrustFrameworkExtensions.xml* file.
7083
2. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
7184
3. Add a new **ClaimsProvider** as follows:
72-
73-
```XML
85+
```xml
7486
<ClaimsProvider>
7587
<Domain>Contoso</Domain>
7688
<DisplayName>Login using Contoso</DisplayName>
7789
<TechnicalProfiles>
78-
<TechnicalProfile Id="ContosoProfile">
90+
<TechnicalProfile Id="OIDC-Contoso">
7991
<DisplayName>Contoso Employee</DisplayName>
8092
<Description>Login with your Contoso account</Description>
8193
<Protocol Name="OpenIdConnect"/>
8294
<Metadata>
83-
<Item Key="METADATA">https://login.windows.net/your-AD-tenant-name.onmicrosoft.com/.well-known/openid-configuration</Item>
84-
<Item Key="ProviderName">https://sts.windows.net/00000000-0000-0000-0000-000000000000/</Item>
85-
<!-- Update the Client ID below to the Application ID -->
95+
<Item Key="METADATA">https://login.microsoftonline.com/tenant-name.onmicrosoft.com/v2.0/.well-known/openid-configuration</Item>
8696
<Item Key="client_id">00000000-0000-0000-0000-000000000000</Item>
8797
<Item Key="response_types">code</Item>
88-
<Item Key="scope">openid</Item>
98+
<Item Key="scope">openid profile</Item>
8999
<Item Key="response_mode">form_post</Item>
90100
<Item Key="HttpBinding">POST</Item>
91101
<Item Key="UsePolicyInRedirectUri">false</Item>
@@ -121,12 +131,11 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
121131
122132
To get a token from the Azure AD endpoint, you need to define the protocols that Azure AD B2C should use to communicate with Azure AD. This is done inside the **TechnicalProfile** element of **ClaimsProvider**.
123133
124-
1. Update the ID of the **TechnicalProfile** element. This ID is used to refer to this technical profile from other parts of the policy.
134+
1. Update the ID of the **TechnicalProfile** element. This ID is used to refer to this technical profile from other parts of the policy, for example `OIDC-Contoso`.
125135
1. Update the value for **DisplayName**. This value will be displayed on the sign-in button on your sign-in screen.
126136
1. Update the value for **Description**.
127137
1. Azure AD uses the OpenID Connect protocol, so make sure that the value for **Protocol** is `OpenIdConnect`.
128-
1. Set value of the **METADATA** to `https://login.windows.net/your-AD-tenant-name.onmicrosoft.com/.well-known/openid-configuration`, where `your-AD-tenant-name` is your Azure AD tenant name. For example, `https://login.windows.net/fabrikam.onmicrosoft.com/.well-known/openid-configuration`
129-
1. Open your browser and go to the **METADATA** URL that you just updated, look for the **issuer** object, and then copy and paste the value into the value for **ProviderName** in the XML file.
138+
1. Set value of the **METADATA** to `https://login.microsoftonline.com/tenant-name.onmicrosoft.com/v2.0/.well-known/openid-configuration`, where `tenant-name` is your Azure AD tenant name. For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`
130139
1. Set **client_id** to the application ID from the application registration.
131140
1. Under **CryptographicKeys**, update the value of **StorageReferenceId** to the name of the policy key that you created earlier. For example, `B2C_1A_ContosoAppSecret`.
132141
@@ -167,10 +176,10 @@ Now that you have a button in place, you need to link it to an action. The actio
167176
1. Add the following **ClaimsExchange** element making sure that you use the same value for **Id** that you used for **TargetClaimsExchangeId**:
168177
169178
```XML
170-
<ClaimsExchange Id="ContosoExchange" TechnicalProfileReferenceId="ContosoProfile" />
179+
<ClaimsExchange Id="ContosoExchange" TechnicalProfileReferenceId="OIDC-Contoso" />
171180
```
172181
173-
Update the value of **TechnicalProfileReferenceId** to the **Id** of the technical profile you created earlier. For example, `ContosoProfile`.
182+
Update the value of **TechnicalProfileReferenceId** to the **Id** of the technical profile you created earlier. For example, `OIDC-Contoso`.
174183
175184
1. Save the *TrustFrameworkExtensions.xml* file and upload it again for verification.
176185
4.54 KB
Loading

0 commit comments

Comments
 (0)