Skip to content

Commit 107efcf

Browse files
committed
updated
2 parents 8afedcb + 4492bef commit 107efcf

File tree

378 files changed

+3751
-2344
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

378 files changed

+3751
-2344
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16689,6 +16689,11 @@
1668916689
"redirect_url": "https://docs.microsoft.com/rest/api/searchservice/add-scoring-profiles-to-a-search-index",
1669016690
"redirect_document_id": false
1669116691
},
16692+
{
16693+
"source_path": "articles/service-bus/index.md",
16694+
"redirect_url": "/azure/service-bus-messaging/index",
16695+
"redirect_document_id": false
16696+
},
1669216697
{
1669316698
"source_path": "articles/service-bus-messaging/service-bus-role-based-access-control.md",
1669416699
"redirect_url": "/azure/service-bus-messaging/service-bus-managed-service-identity",
@@ -41799,6 +41804,16 @@
4179941804
"redirect_url": "/azure/azure-monitor/log-query/query-optimization",
4180041805
"redirect_document_id": false
4180141806
},
41807+
{
41808+
"source_path": "articles/azure-monitor/insights/vminsights-known-issues.md",
41809+
"redirect_url": "/azure/azure-monitor/insights/vminsights-overview",
41810+
"redirect_document_id": false
41811+
},
41812+
{
41813+
"source_path": "articles/azure-monitor/log-query/vminsights-health.md",
41814+
"redirect_url": "/azure/azure-monitor/log-query/vminsights-overview",
41815+
"redirect_document_id": false
41816+
},
4180241817
{
4180341818
"source_path": "articles/machine-learning/service/how-to-automated-ml.md",
4180441819
"redirect_url": "/azure/machine-learning/service/concept-automated-ml",
@@ -49348,6 +49363,16 @@
4934849363
"source_path": "articles/media-services/latest/access-api-cli-how-to.md",
4934949364
"redirect_url": "/azure/media-services/latest/access-api-howto",
4935049365
"redirect_document_id": false
49366+
},
49367+
{
49368+
"source_path": "articles/media-services/latest/create-account-portal.md",
49369+
"redirect_url": "/azure/media-services/latest/create-account-howto",
49370+
"redirect_document_id": false
49371+
},
49372+
{
49373+
"source_path": "articles/media-services/latest/create-account-cli-how-to.md",
49374+
"redirect_url": "/azure/media-services/latest/create-account-howto",
49375+
"redirect_document_id": false
4935149376
}
4935249377
]
4935349378
}

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,8 @@
7474
href: custom-policy-overview.md
7575
- name: User accounts
7676
href: user-overview.md
77+
- name: User profile attributes
78+
href: user-profile-attributes.md
7779
- name: How-to guides
7880
items:
7981
- name: App integration

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/09/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -111,6 +111,7 @@ The name of the claim is the name of the Azure AD attribute unless the **Partner
111111
## Requirements of an operation
112112

113113
- There must be exactly one **InputClaim** element in the claims bag for all Azure AD technical profiles.
114+
- The [user profile attributes article](user-profile-attributes.md) describes the supported Azure AD B2C user profile attributes you can use in the input claims, output claims, and persisted claims.
114115
- If the operation is `Write` or `DeleteClaims`, then it must also appear in a **PersistedClaims** element.
115116
- The value of the **userPrincipalName** claim must be in the format of `[email protected]`.
116117
- The **displayName** claim is required and cannot be an empty string.
@@ -250,7 +251,7 @@ The following technical profile deletes a social user account using **alternativ
250251
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md) |
251252
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
252253

253-
### Error messages
254+
## Error messages
254255

255256
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
256257

articles/active-directory-b2c/custom-policy-rest-api-claims-validation.md

Lines changed: 207 additions & 77 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/custom-policy-ui-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/13/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---

articles/active-directory-b2c/manage-user-accounts-graph-api.md

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/14/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -60,6 +60,28 @@ In the Microsoft Graph API, both local and federated identities are stored in th
6060
|issuer|string|Specifies the issuer of the identity. For local accounts (where **signInType** is not `federated`), this property is the local B2C tenant default domain name, for example `contoso.onmicrosoft.com`. For social identity (where **signInType** is `federated`) the value is the name of the issuer, for example `facebook.com`|
6161
|issuerAssignedId|string|Specifies the unique identifier assigned to the user by the issuer. The combination of **issuer** and **issuerAssignedId** must be unique within your tenant. For local account, when **signInType** is set to `emailAddress` or `userName`, it represents the sign-in name for the user.<br>When **signInType** is set to: <ul><li>`emailAddress` (or starts with `emailAddress` like `emailAddress1`) **issuerAssignedId** must be a valid email address</li><li>`userName` (or any other value), **issuerAssignedId** must be a valid [local part of an email address](https://tools.ietf.org/html/rfc3696#section-3)</li><li>`federated`, **issuerAssignedId** represents the federated account unique identifier</li></ul>|
6262

63+
The following **Identities** property, with a local account identity with a sign-in name, an email address as sign-in, and with a social identity.
64+
65+
```JSON
66+
"identities": [
67+
{
68+
"signInType": "userName",
69+
"issuer": "contoso.onmicrosoft.com",
70+
"issuerAssignedId": "johnsmith"
71+
},
72+
{
73+
"signInType": "emailAddress",
74+
"issuer": "contoso.onmicrosoft.com",
75+
"issuerAssignedId": "[email protected]"
76+
},
77+
{
78+
"signInType": "federated",
79+
"issuer": "facebook.com",
80+
"issuerAssignedId": "5eecb0cd"
81+
}
82+
]
83+
```
84+
6385
For federated identities, depending on the identity provider, the **issuerAssignedId** is a unique value for a given user per application or development account. Configure the Azure AD B2C policy with the same application ID that was previously assigned by the social provider or another application within the same development account.
6486

6587
### Password profile property
@@ -116,9 +138,9 @@ After you've obtained the code sample, configure it for your environment and the
116138
```
117139
1. Run the application with the `dotnet` command:
118140

119-
```console
120-
dotnet bin/Debug/netcoreapp3.0/b2c-ms-graph.dll
121-
```
141+
```console
142+
dotnet bin/Debug/netcoreapp3.0/b2c-ms-graph.dll
143+
```
122144

123145
The application displays a list of commands you can execute. For example, get all users, get a single user, delete a user, update a user's password, and bulk import.
124146

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/03/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -215,19 +215,7 @@ If the type of authentication is set to `Bearer`, the **CryptographicKeys** elem
215215

216216
## Returning error message
217217

218-
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. If an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
219-
220-
| Attribute | Required | Description |
221-
| --------- | -------- | ----------- |
222-
| version | Yes | 1.0.0 |
223-
| status | Yes | 409 |
224-
| code | No | An error code from the RESTful endpoint provider, which is displayed when `DebugMode` is enabled. |
225-
| requestId | No | A request identifier from the RESTful endpoint provider, which is displayed when `DebugMode` is enabled. |
226-
| userMessage | Yes | An error message that is shown to the user. |
227-
| developerMessage | No | The verbose description of the problem and how to fix it, which is displayed when `DebugMode` is enabled. |
228-
| moreInfo | No | A URI that points to additional information, which is displayed when `DebugMode` is enabled. |
229-
230-
The following example shows a REST API that returns an error message formatted in JSON:
218+
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. If an error occurs, the REST API should return an HTTP 4xx error message, such as, 400 (bad request), or 409 (conflict) response status code. The response body contains error message formatted in JSON:
231219

232220
```JSON
233221
{
@@ -241,6 +229,17 @@ The following example shows a REST API that returns an error message formatted i
241229
}
242230
```
243231

232+
| Attribute | Required | Description |
233+
| --------- | -------- | ----------- |
234+
| version | Yes | Your REST API version. For example: 1.0.1 |
235+
| status | Yes | Must be 409 |
236+
| code | No | An error code from the RESTful endpoint provider, which is displayed when `DebugMode` is enabled. |
237+
| requestId | No | A request identifier from the RESTful endpoint provider, which is displayed when `DebugMode` is enabled. |
238+
| userMessage | Yes | An error message that is shown to the user. |
239+
| developerMessage | No | The verbose description of the problem and how to fix it, which is displayed when `DebugMode` is enabled. |
240+
| moreInfo | No | A URI that points to additional information, which is displayed when `DebugMode` is enabled. |
241+
242+
244243
The following example shows a C# class that returns an error message:
245244

246245
```csharp

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/17/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -64,8 +64,8 @@ In the display claims collection, you can include a reference to a [DisplayContr
6464

6565
The following example `TechnicalProfile` illustrates the use of display claims with display controls.
6666

67-
* The first display claim makes a reference to the `emailVerificationControl` display control which collects and verifies the email address.
68-
* The fifth display claim makes a reference to the `phoneVerificationControl` display control which collects and verifies a phone number.
67+
* The first display claim makes a reference to the `emailVerificationControl` display control, which collects and verifies the email address.
68+
* The fifth display claim makes a reference to the `phoneVerificationControl` display control, which collects and verifies a phone number.
6969
* The other display claims are ClaimTypes to be collected from the user.
7070

7171
```XML
@@ -117,6 +117,8 @@ The `age` claim in the base policy is no longer presented on the screen to the u
117117

118118
The **OutputClaims** element contains a list of claims to be returned to the next orchestration step. The **DefaultValue** attribute takes effect only if the claim has never been set. If it was set in a previous orchestration step, the default value does not take effect even if the user leaves the value empty. To force the use of a default value, set the **AlwaysUseDefaultValue** attribute to `true`.
119119

120+
For security reasons, a password claim value (`UserInputType` set to `Password`) is available only to the self-asserted technical profile's validation technical profiles. You cannot use password claim in the next orchestration steps.
121+
120122
> [!NOTE]
121123
> In previous versions of the Identity Experience Framework (IEF), output claims were used to collect data from the user. To collect data from the user, use a **DisplayClaims** collection instead.
122124
@@ -126,7 +128,7 @@ The **OutputClaimsTransformations** element may contain a collection of **Output
126128

127129
In a self-asserted technical profile, the output claims collection returns the claims to the next orchestration step.
128130

129-
You should use output claims when:
131+
Use output claims when:
130132

131133
- **Claims are output by output claims transformation**.
132134
- **Setting a default value in an output claim** without collecting data from the user or returning the data from the validation technical profile. The `LocalAccountSignUpWithLogonEmail` self-asserted technical profile sets the **executed-SelfAsserted-Input** claim to `true`.
@@ -190,7 +192,7 @@ You can also call a REST API technical profile with your business logic, overwri
190192
| AllowGenerationOfClaimsWithNullValues| No| Allow to generate a claim with null value. For example, in a case user doesn't select a checkbox.|
191193
| ContentDefinitionReferenceId | Yes | The identifier of the [content definition](contentdefinitions.md) associated with this technical profile. |
192194
| EnforceEmailVerification | No | For sign-up or profile edit, enforces email verification. Possible values: `true` (default), or `false`. |
193-
| setting.retryLimit | No | Controls the number of times a user can try to provide the data that is checked against a validation technical profile . For example, a user tries to sign-up with an account that already exists and keeps trying until the limit reached.
195+
| setting.retryLimit | No | Controls the number of times a user can try to provide the data that is checked against a validation technical profile. For example, a user tries to sign-up with an account that already exists and keeps trying until the limit reached.
194196
| SignUpTarget <sup>1</sup>| No | The signup target exchange identifier. When the user clicks the sign-up button, Azure AD B2C executes the specified exchange identifier. |
195197
| setting.showCancelButton | No | Displays the cancel button. Possible values: `true` (default), or `false` |
196198
| setting.showContinueButton | No | Displays the continue button. Possible values: `true` (default), or `false` |

0 commit comments

Comments
 (0)