Skip to content

Commit 0da9489

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into yelevin/atomic-incidents
2 parents cf780d9 + ac62fa8 commit 0da9489

File tree

1,148 files changed

+9735
-12413
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,148 files changed

+9735
-12413
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -999,6 +999,7 @@
999999
"articles/iot-dps/.openpublishing.redirection.iot-dps.json",
10001000
"articles/cloud-shell/.openpublishing.redirection.cloud-shell.json",
10011001
".openpublishing.redirection.azure-vmware.json",
1002-
".openpublishing.redirection.openshift.json"
1002+
".openpublishing.redirection.openshift.json",
1003+
".openpublishing.redirection.dev-box.json"
10031004
]
10041005
}

.openpublishing.redirection.active-directory.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11058,12 +11058,12 @@
1105811058
},
1105911059
{
1106011060
"source_path_from_root": "/articles/active-directory/privileged-identity-management/concept-privileged-access-versus-role-assignable.md",
11061-
"redirect_url": "azure/active-directory/privileged-identity-management/concept-pim-for-groups",
11061+
"redirect_url": "/azure/active-directory/privileged-identity-management/concept-pim-for-groups",
1106211062
"redirect_document_id": false
1106311063
},
1106411064
{
1106511065
"source_path_from_root": "/articles/active-directory/privileged-identity-management/groups-features.md",
11066-
"redirect_url": "azure/active-directory/privileged-identity-management/concept-pim-for-groups",
11066+
"redirect_url": "/azure/active-directory/privileged-identity-management/concept-pim-for-groups",
1106711067
"redirect_document_id": false
1106811068
},
1106911069
{

.openpublishing.redirection.azure-productivity.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,6 @@
3030
"redirect_url": "/azure/devtest-labs/samples-powershell",
3131
"redirect_document_id": false
3232
},
33-
{
34-
"source_path": "articles/dev-box/tutorial-connect-to-dev-box-with-remote-desktop-app.md",
35-
"redirect_url": "/azure/dev-box/quickstart-connect-to-dev-box-with-remote-desktop-app",
36-
"redirect_document_id": false
37-
},
3833
{
3934
"source_path": "articles/lab-services/how-to-create-schedules-within-teams.md",
4035
"redirect_url": "/azure/lab-services/how-to-manage-labs-within-teams",
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path": "articles/dev-box/tutorial-connect-to-dev-box-with-remote-desktop-app.md",
5+
"redirect_url": "/azure/dev-box/quickstart-connect-to-dev-box-with-remote-desktop-app",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/dev-box/quickstart-configure-dev-box-project.md",
10+
"redirect_url": "/azure/dev-box/quickstart-configure-dev-box-service",
11+
"redirect_document_id": false
12+
}
13+
]
14+
}

.openpublishing.redirection.json

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27981,9 +27981,14 @@
2798127981
"redirect_document_id": false
2798227982
},
2798327983
{
27984-
"source_path": "articles/load-balancer/protect-load-balancer-with-ddos-standard.md",
27985-
"redirect_URL": "/azure/load-balancer/tutorial-protect-load-balancer",
27986-
"redirect_document_id": false
27987-
}
27984+
"source_path": "articles/communication-services/quickstarts/voice-video-calling/get-started-android-webview.md",
27985+
"redirect_URL": "/azure/communication-services/quickstarts/voice-video-calling/get-started-webview?pivots=platform-android",
27986+
"redirect_document_id": false
27987+
},
27988+
{
27989+
"source_path": "articles/load-balancer/protect-load-balancer-with-ddos-standard.md",
27990+
"redirect_URL": "/azure/load-balancer/tutorial-protect-load-balancer",
27991+
"redirect_document_id": false
27992+
}
2798827993
]
2798927994
}

articles/active-directory-b2c/azure-ad-b2c-global-identity-solutions.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -122,13 +122,15 @@ The approach you choose will be based on the number of applications you host and
122122

123123
The performance advantage of using multiple tenants, in either the regional or funnel-based configuration, will be an improvement over using a single Azure AD B2C tenant for globally operating businesses.
124124

125-
When using the funnel-based approach, although the funnel tenant will be located in one region, but serve users globally, performance improvements will be maintained.
125+
When using the funnel-based approach, the funnel tenant will be located in one specific region and serve users globally. Since the funnel tenants operation utilizes a global component of the Azure AD B2C service, it will maintain a consistant level of performance regardless of where users login from.
126126

127127
![Screenshot shows the Azure AD B2C architecture.](./media/azure-ad-b2c-global-identity-solutions/azure-ad-b2c-architecture.png)
128128

129-
As shown in the diagram, the Azure AD B2C tenant in the funnel-based approach will only utilize the Policy Engine to perform the redirection to regional Azure AD B2C tenants. The Azure AD B2C Policy Engine component is globally distributed. Therefore, the funnel isn't constrained from a performance perspective, regardless of where the Azure AD B2C funnel tenant is provisioned. A performance loss is encountered due to the extra redirect between funnel and regional tenants in the funnel-based approach.
129+
As shown in the diagram above, the Azure AD B2C tenant in the funnel-based approach will only utilize the Policy Engine to perform the redirection to regional Azure AD B2C tenants. The Azure AD B2C Policy Engine component is globally distributed. Therefore, the funnel isn't constrained from a performance perspective, regardless of where the Azure AD B2C funnel tenant is provisioned. A performance loss is encountered due to the extra redirect between funnel and regional tenants in the funnel-based approach.
130130

131-
The regional tenants will perform directory calls into the Directory Store, which is the regionalized component.
131+
In the regional-based approach, since each user is directed to their most local Azure AD B2C, performance is consistant for all users logging in.
132+
133+
The regional tenants will perform directory calls into the Directory Store, which is the only regionalized component in both the funnel-based and regional-based architectures.
132134

133135
Additional latency is only encountered when the user has performed an authentication in a different region from which they had signed-up in. This is because, calls will be made across regions to reach the Directory Store where their profile lives to complete their authentication.
134136

articles/active-directory-b2c/enable-authentication-react-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ The sample code is made up of the following components. Add these components fro
7777
> [!IMPORTANT]
7878
> If the App component file name is `App.js`, change it to `App.jsx`.
7979
80-
- [src/pages/Hello.jsx](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/pages/Hello.jsx) - Demonstrate how to call a protected resource with OAuth2 bearer token.
80+
- [src/pages/Hello.jsx](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/6-AdvancedScenarios/1-call-api-obo/SPA/src/pages/Hello.jsx) - Demonstrate how to call a protected resource with OAuth2 bearer token.
8181
- It uses the [useMsal](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-react/docs/hooks.md) hook that returns the PublicClientApplication instance.
8282
- With PublicClientApplication instance, it acquires an access token to call the REST API.
8383
- Invokes the [callApiWithToken](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/fetch.js) function to fetch the data from the REST API and renders the result using the **DataDisplay** component.

articles/active-directory-b2c/partner-gallery.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
4545
|:-------------------------|:--------------|
4646
| ![Screenshot of a asignio logo](./media/partner-gallery/asignio-logo.png) | [Asignio](./partner-asignio.md) is a passwordless, soft biometric, and MFA solution. Asignio uses a combination of the patented Asignio Signature and live facial verification for user authentication. The changeable biometric signature eliminates passwords, fraud, phishing, and credential reuse through omni-channel authentication. |
4747
| ![Screenshot of a bloksec logo](./media/partner-gallery/bloksec-logo.png) | [BlokSec](./partner-bloksec.md) is a passwordless authentication and tokenless MFA solution, which provides real-time consent-based services and protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks. |
48+
| ![Screenshot of a grit biometric authentication logo.](./media/partner-gallery/grit-logo.png) | [Grit biometric authentication](./partner-grit-authentication.md) provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0) for enhanced security.
4849
| ![Screenshot of a haventec logo](./media/partner-gallery/haventec-logo.png) | [Haventec](./partner-haventec.md) is a passwordless authentication provider, which provides decentralized identity platform that eliminates passwords, shared secrets, and friction. |
4950
| ![Screenshot of a hypr logo](./media/partner-gallery/hypr-logo.png) | [Hypr](./partner-hypr.md) is a passwordless authentication provider, which replaces passwords with public key encryptions eliminating fraud, phishing, and credential reuse. |
5051
| ![Screenshot of a idemia logo](./media/partner-gallery/idemia-logo.png) | [IDEMIA](./partner-idemia.md) is a passwordless authentication provider, which provides real-time consent-based services with biometric authentication like faceID and fingerprinting eliminating fraud and credential reuse. |
@@ -111,7 +112,7 @@ Microsoft partners with the following ISVs for tools that can help with implemen
111112
| ISV partner | Description and integration walkthroughs |
112113
|:-------------------------|:--------------|
113114
| ![Screenshot of a grit ief editor logo.](./media/partner-gallery/grit-logo.png) | [Grit Visual Identity Experience Framework Editor](./partner-grit-editor.md) provides a low code/no code experience for developers to create sophisticated authentication user journeys. The tool comes with integrated debugger and templates for the most used scenarios.|
114-
| ![Screenshot of a grit biometric authentication logo.](./media/partner-gallery/grit-logo.png) | [Grit biometric authentication](./partner-grit-authentication.md) provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0) for enhanced security.
115+
115116

116117
## Additional information
117118

articles/active-directory-b2c/partner-nevis.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To get started, you'll need:
2929
- An [Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
3030

3131
>[!NOTE]
32-
>To integrate Nevis into your sign-up policy flow, configure the Azure AD B2C environment to use custom policies. </br>See, [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](/tutorial-create-user-flows.md?pivots=b2c-custom-policy).
32+
>To integrate Nevis into your sign-up policy flow, configure the Azure AD B2C environment to use custom policies. </br>See, [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](/azure/active-directory-b2c/tutorial-create-user-flows).
3333
3434
## Scenario description
3535

@@ -104,9 +104,9 @@ The diagram shows the implementation.
104104
2. In [/samples/Nevis/policy/nevis.html](https://github.com/azure-ad-b2c/partner-integrations/blob/master/samples/Nevis/policy/nevis.html) open the nevis.html file.
105105
3. Replace the **authentication_cloud_url** with the Nevis Admin console URL `https://<instance_id>.mauth.nevis.cloud`.
106106
4. Select **Save**.
107-
5. [Create an Azure Blob storage account](/customize-ui-with-html.md#2-create-an-azure-blob-storage-account).
107+
5. [Create an Azure Blob storage account](./customize-ui-with-html.md#2-create-an-azure-blob-storage-account).
108108
6. Upload the nevis.html file to your Azure blob storage.
109-
7. [Configure CORS](/customize-ui-with-html.md#3-configure-cors).
109+
7. [Configure CORS](./customize-ui-with-html.md#3-configure-cors).
110110
8. Enable cross-origin resource sharing (CORS) for the file.
111111
9. In the list, select the **nevis.html** file.
112112
10. In the **Overview** tab, next to the **URL**, select the **copy link** icon.

articles/active-directory-b2c/userjourneys.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 08/31/2021
11+
ms.date: 01/27/2023
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -232,7 +232,7 @@ Preconditions can check multiple preconditions. The following example checks whe
232232

233233
## Claims provider selection
234234

235-
Identity provider selection lets users select an action from a list of options. The identity provider selection consists of a pair of two orchestration steps:
235+
Claims provider selection lets users select an action from a list of options. The identity provider selection consists of a pair of two orchestration steps:
236236

237237
1. **Buttons** - It starts with type of `ClaimsProviderSelection`, or `CombinedSignInAndSignUp` that contains a list of options a user can choose from. The order of the options inside the `ClaimsProviderSelections` element controls the order of the buttons presented to the user.
238238
2. **Actions** - Followed by type of `ClaimsExchange`. The ClaimsExchange contains list of actions. The action is a reference to a technical profile, such as [OAuth2](oauth2-technical-profile.md), [OpenID Connect](openid-connect-technical-profile.md), [claims transformation](claims-transformation-technical-profile.md), or [self-asserted](self-asserted-technical-profile.md). When a user clicks on one of the buttons, the corresponding action is executed.

0 commit comments

Comments
 (0)