Skip to content

Commit 0e8f44e

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into WI-200568-episode-forty-three
2 parents 68c6947 + 02b3e07 commit 0e8f44e

File tree

420 files changed

+5963
-3721
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

420 files changed

+5963
-3721
lines changed

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: reference
12-
ms.date: 01/11/2024
12+
ms.date: 01/17/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

1616

17-
#Customer intent: As a developer using Azure Active Directory B2C custom policies, I want to understand how to use claim resolvers in my technical profiles, so that I can provide context information about authorization requests and populate claims with dynamic values.
17+
#Customer intent: As a developer using Azure AD B2C custom policies, I want to understand how to use claim resolvers in my technical profiles, so that I can provide context information about authorization requests and populate claims with dynamic values.
1818

1919
---
2020

@@ -122,6 +122,17 @@ Any parameter name included as part of an OIDC or OAuth2 request can be mapped t
122122
| {OAUTH-KV:loyalty_number} | A query string parameter. | 1234 |
123123
| {OAUTH-KV:any custom query string} | A query string parameter. | N/A |
124124

125+
## SAML key-value parameters
126+
127+
In a SAML authentication request, any parameter name that's included in the request, but isn’t specific to the protocol (such as SAMLRequest) can be mapped to a claim in the user journey. For example, the request may include a custom parameter such as `username`. This applies to both SP-Initiated and IDP-Initiated SAML requests.
128+
129+
| Claim | Description | Example |
130+
| ----- | ----------------------- | --------|
131+
| {SAML-KV:username} | A query string or POST body parameter. | [email protected] |
132+
| {SAML-KV:loyalty_number} | A query string or POST body parameter. | 1234 |
133+
| {SAML-KV:any custom query string} | A query string or POST body parameter. | N/A |
134+
135+
125136
## SAML
126137

127138
The following table lists the claim resolvers with information about the SAML authorization request:

articles/active-directory-b2c/configure-authentication-sample-python-web-app.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -86,24 +86,21 @@ Extract the sample file to a folder where the total length of the path is 260 or
8686

8787
In the project's root directory, follow these steps:
8888

89-
1. Rename the *app_config.py* file to *app_config.py.OLD*.
90-
1. Rename the *app_config_b2c.py* file to *app_config.py*. This file contains information about your Azure AD B2C identity provider.
91-
92-
1. Create an `.env` file in the root folder of the project using `.env.sample.b2c` as a guide.
89+
1. Create an `.env` file in the root folder of the project using `.env.sample` as a guide.
9390

9491
```shell
9592
FLASK_DEBUG=True
96-
TENANT_NAME=<tenant name>
93+
B2C_TENANT_NAME=<tenant name>
9794
CLIENT_ID=<client id>
9895
CLIENT_SECRET=<client secret>
99-
SIGNUPSIGNIN_USER_FLOW=B2C_1_profile_editing
100-
EDITPROFILE_USER_FLOW=B2C_1_reset_password
101-
RESETPASSWORD_USER_FLOW=B2C_1_signupsignin1
96+
SIGNUPSIGNIN_USER_FLOW=B2C_1_signupsignin1
97+
EDITPROFILE_USER_FLOW=B2C_1_profile_editing
98+
RESETPASSWORD_USER_FLOW=B2C_1_reset_password
10299
```
103100

104101
|Key |Value |
105102
|---------|---------|
106-
|`TENANT_NAME`| The first part of your Azure AD B2C [tenant name](tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `contoso`). |
103+
|`B2C_TENANT_NAME`| The first part of your Azure AD B2C [tenant name](tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `contoso`). |
107104
|`CLIENT_ID`| The web API application ID from [step 2.1](#step-21-register-the-app).|
108105
|`CLIENT_SECRET`| The client secret value you created in [step 2.2](#step-22-create-a-web-app-client-secret). |
109106
|`*_USER_FLOW`|The user flows you created in [step 1](#step-1-configure-your-user-flow).|

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
177177
| ------- | :--: | ----- |
178178
| Azure portal | GA | |
179179
| [Application Insights user journey logs](troubleshoot-with-application-insights.md) | Preview | Used for troubleshooting during development. |
180-
| [Application Insights event logs](analytics-with-application-insights.md) | Preview | Used to monitor user flows in production. |
180+
| [Application Insights event logs](analytics-with-application-insights.md) | Preview | Used to monitor user flows and custom policies in production. |
181181

182182
## Other features
183183

articles/active-directory-b2c/openid-connect.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Error responses can also be sent to the `redirect_uri` parameter so that the app
9494
```http
9595
GET https://jwt.ms/#
9696
error=access_denied
97-
&error_description=the+user+canceled+the+authentication
97+
&error_description=AADB2C90091%3a+The+user+has+cancelled+entering+self-asserted+information.%0d%0aCorrelation+ID%3a+xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx%0d%0aTimestamp%3a+xxxx-xx-xx+xx%3a23%3a27Z%0d%0a
9898
&state=arbitrary_data_you_can_receive_in_the_response
9999
```
100100

@@ -202,8 +202,8 @@ Error responses look like:
202202

203203
```json
204204
{
205-
"error": "access_denied",
206-
"error_description": "The user revoked access to the app."
205+
"error": "invalid_grant",
206+
"error_description": "AADB2C90080: The provided grant has expired. Please re-authenticate and try again. Current time: xxxxxxxxxx, Grant issued time: xxxxxxxxxx, Grant expiration time: xxxxxxxxxx\r\nCorrelation ID: xxxxxxxx-xxxx-xxxX-xxxx-xxxxxxxxxxxx\r\nTimestamp: xxxx-xx-16 xx:10:52Z\r\n"
207207
}
208208
```
209209

@@ -279,8 +279,8 @@ Error responses look like:
279279

280280
```json
281281
{
282-
"error": "access_denied",
283-
"error_description": "The user revoked access to the app.",
282+
"error": "invalid_grant",
283+
"error_description": "AADB2C90129: The provided grant has been revoked. Please reauthenticate and try again.\r\nCorrelation ID: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\r\nTimestamp: xxxx-xx-xx xx:xx:xxZ\r\n",
284284
}
285285
```
286286

@@ -318,4 +318,4 @@ To set the required ID Token in logout requests, see [Configure session behavior
318318

319319
## Next steps
320320

321-
- Learn more about [Azure AD B2C session](session-behavior.md).
321+
- Learn more about [Azure AD B2C session](session-behavior.md).

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -276,13 +276,13 @@ The following example shows a C# class that returns an error message:
276276
```csharp
277277
public class ResponseContent
278278
{
279-
public string version { get; set; }
280-
public int status { get; set; }
281-
public string code { get; set; }
282-
public string userMessage { get; set; }
283-
public string developerMessage { get; set; }
284-
public string requestId { get; set; }
285-
public string moreInfo { get; set; }
279+
public string Version { get; set; }
280+
public int Status { get; set; }
281+
public string Code { get; set; }
282+
public string UserMessage { get; set; }
283+
public string DeveloperMessage { get; set; }
284+
public string RequestId { get; set; }
285+
public string MoreInfo { get; set; }
286286
}
287287
```
288288

articles/active-directory-b2c/userinfo-endpoint.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ ms.service: active-directory
99

1010
ms.topic: reference
1111
ms.date: 01/11/2024
12+
1213
ms.author: kengaderdus
1314
ms.subservice: B2C
1415
zone_pivot_groups: b2c-policy-type

articles/active-directory-b2c/userjourneys.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,12 @@ manager: CelesteDG
88
ms.service: active-directory
99

1010
ms.topic: reference
11-
ms.date: 01/11/2024
11+
ms.date: 01/17/2024
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414

1515

16-
#Customer intent: As a developer integrating Azure AD B2C into an application, I want to understand how user journeys, authorization technical profiles, orchestration steps, preconditions, claims provider selection, claims exchanges, and journey lists work, so that I can configure the policy file correctly and ensure a successful user flow.
17-
16+
#Customer intent: As a developer integrating Azure AD B2C into an application, I want to understand how custom policy user journeys work so that I can design the steps that a users goes through for the relying party application to obtain the desired claims for a user.
1817
---
1918

2019
# UserJourneys
@@ -92,7 +91,7 @@ A user journey is represented as an orchestration sequence that must be followed
9291

9392
Orchestration steps can be conditionally executed based on preconditions defined in the orchestration step element. For example, you can check to perform an orchestration step only if a specific claim exists, or if a claim is equal or not to the specified value.
9493

95-
To specify the ordered list of orchestration steps, an **OrchestrationSteps** element is added as part of the policy. This element is required.
94+
To specify the ordered list of orchestration steps, an **OrchestrationSteps** element is added as part of the policy. This element is required.
9695

9796
```xml
9897
<UserJourney Id="SignUpOrSignIn">
@@ -111,7 +110,7 @@ The **OrchestrationStep** element contains the following attributes:
111110

112111
| Attribute | Required | Description |
113112
| --------- | -------- | ----------- |
114-
| `Order` | Yes | The order of the orchestration steps. |
113+
| `Order` | Yes | The order of the orchestration steps. The value of the `Order` attribute starts at `1` through `N`. So, if you've 10 steps and you delete the second step, you need to renumber the steps three to 10 to become two to nine. |
115114
| `Type` | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**GetClaims** - Specifies that the orchestration step should process claim data sent to Azure AD B2C from the relying party via its `InputClaims` configuration.</li><li>**InvokeSubJourney** - Indicates that the orchestration step exchanges claims with a [sub journey](subjourneys.md).</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
116115
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples - if the type of the orchestration step is one of following: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`, Azure AD B2C needs to display the identity provider selection without having a technical profile. |
117116
| CpimIssuerTechnicalProfileReferenceId | No | The type of the orchestration step is `SendClaims`. This property defines the technical profile identifier of the claims provider that issues the token for the relying party. If absent, no relying party token is created. |

articles/ai-services/document-intelligence/containers/install-run.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-ai-document-intelligence
88
ms.custom:
99
- ignite-2023
1010
ms.topic: how-to
11-
ms.date: 12/13/2023
11+
ms.date: 01/17/2024
1212
ms.author: lajanuar
1313
---
1414

@@ -676,10 +676,6 @@ The Document Intelligence containers send billing information to Azure by using
676676

677677
Queries to the container are billed at the pricing tier of the Azure resource used for the API `Key`. You're billed for each container instance used to process your documents and images.
678678

679-
> [!NOTE]
680-
> Currently, Document Intelligence v3 containers only support pay as you go pricing. Support for commitment tiers and disconnected mode will be added in March 2023.
681-
Azure AI containers aren't licensed to run without being connected to the metering / billing endpoint. Containers must be enabled to always communicate billing information with the billing endpoint. Azure AI containers don't send customer data, such as the image or text that's being analyzed, to Microsoft.
682-
683679
### Connect to Azure
684680

685681
The container needs the billing argument values to run. These values allow the container to connect to the billing endpoint. The container reports usage about every 10 to 15 minutes. If the container doesn't connect to Azure within the allowed time window, the container continues to run, but doesn't serve queries until the billing endpoint is restored. The connection is attempted 10 times at the same time interval of 10 to 15 minutes. If it can't connect to the billing endpoint within the 10 tries, the container stops serving requests. See the [Azure AI container FAQ](../../../ai-services/containers/container-faq.yml#how-does-billing-work) for an example of the information sent to Microsoft for billing.

articles/ai-services/document-intelligence/quickstarts/includes/csharp-sdk.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -641,7 +641,7 @@ DocumentIntelligenceClient client = new DocumentIntelligenceClient(new Uri(endpo
641641
642642
Uri invoiceUri = new Uri ("https://raw.githubusercontent.com/Azure-Samples/cognitive-services-REST-api-samples/master/curl/form-recognizer/sample-invoice.pdf");
643643

644-
AnalyzeDocumentOperation operation = await client.AnalyzeDocumentFromUriAsync(WaitUntil.Completed, "prebuilt-invoice", invoiceUri);
644+
Operation operation = await client.AnalyzeDocumentAsync(WaitUntil.Completed, "prebuilt-invoice", invoiceUri);
645645

646646
AnalyzeResult result = operation.Value;
647647

@@ -744,7 +744,7 @@ DocumentAnalysisClient client = new DocumentAnalysisClient(new Uri(endpoint), cr
744744
745745
Uri invoiceUri = new Uri ("https://raw.githubusercontent.com/Azure-Samples/cognitive-services-REST-api-samples/master/curl/form-recognizer/sample-invoice.pdf");
746746

747-
AnalyzeDocumentOperation operation = await client.AnalyzeDocumentFromUriAsync(WaitUntil.Completed, "prebuilt-invoice", invoiceUri);
747+
Operation operation = await client.AnalyzeDocumentAsync(WaitUntil.Completed, "prebuilt-invoice", invoiceUri);
748748

749749
AnalyzeResult result = operation.Value;
750750

articles/ai-services/language-service/summarization/includes/regional-availability.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ ms.custom:
1313
---
1414

1515
> [!IMPORTANT]
16-
> Our preview region, Sweden Central, showcases our latest and continually evolving LLM fine tuning techniques based on GPT models. You are welcome to try them out with a Langauge resource in the Sweden Central region.
16+
> Our preview region, Sweden Central, showcases our latest and continually evolving LLM fine tuning techniques based on GPT models. You are welcome to try them out with a Language resource in the Sweden Central region.
1717
>
1818
> Conversation summarization is only available using:
1919
> - REST API
2020
> - Python
21-
> - C#
21+
> - C#

0 commit comments

Comments
 (0)