Skip to content

Commit 13ae58d

Browse files
authored
Merge pull request #190147 from MicrosoftDocs/main
3/01 AM Publish
2 parents c949d6d + d78aad4 commit 13ae58d

File tree

102 files changed

+1402
-435
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

102 files changed

+1402
-435
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2385,9 +2385,14 @@
23852385
},
23862386
{
23872387
"source_path_from_root": "/articles/aks/aks-ssh.md",
2388-
"redirect_url": "/azure/aks/ssh",
2388+
"redirect_url": "/azure/aks/node-access",
23892389
"redirect_document_id": true
23902390
},
2391+
{
2392+
"source_path_from_root": "/articles/aks/ssh.md",
2393+
"redirect_url": "/azure/aks/node-access",
2394+
"redirect_document_id": false
2395+
},
23912396
{
23922397
"source_path_from_root": "/articles/aks/windows-node-limitations.md",
23932398
"redirect_url": "/azure/aks/windows-faq",

articles/active-directory-b2c/configure-authentication-in-sample-node-web-app-with-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -151,10 +151,10 @@ Open your web app in a code editor such as Visual Studio Code. Under the `call-p
151151
|---------|---------|
152152
|`APP_CLIENT_ID`|The **Application (client) ID** for the web app you registered in [step 2.3](#step-23-register-the-web-app). |
153153
|`APP_CLIENT_SECRET`|The client secret for the web app you created in [step 2.4](#step-24-create-a-client-secret) |
154-
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority for the user flow you created in [step 1](#step-1-configure-your-user-flow) such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi_node_app`. Learn how to [Get your tenant name](tenant-management.md#get-your-tenant-name). |
154+
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority for the user flow you created in [step 1](#step-1-configure-your-user-flow) such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`. Learn how to [Get your tenant name](tenant-management.md#get-your-tenant-name). |
155155
|`AUTHORITY_DOMAIN`| The Azure AD B2C authority domain such as `https://<your-tenant-name>.b2clogin.com`. Replace `<your-tenant-name>` with the name of your tenant.|
156156
|`APP_REDIRECT_URI`| The application redirect URI where Azure AD B2C will return authentication responses (tokens). It matches the **Redirect URI** you set while registering your app in Azure portal. This URL need to be publicly accessible. Leave the value as is.|
157-
|`LOGOUT_ENDPOINT`| The Azure AD B2C sign out endpoint such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>/oauth2/v2.0/logout?post_logout_redirect_uri=http://localhost:3000`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi_node_app`.|
157+
|`LOGOUT_ENDPOINT`| The Azure AD B2C sign out endpoint such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>/oauth2/v2.0/logout?post_logout_redirect_uri=http://localhost:3000`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`.|
158158

159159
After the update, your final configuration file should look similar to the following sample:
160160

@@ -186,7 +186,7 @@ To get the web API sample code, do one of the following:
186186
187187
- For `clientID`, use the **Application (Client) ID** for the web API you created in [step 2.1](#step-21-register-the-web-api-application).
188188
189-
- For `policyName`, use the name of the **Sing in and sign up** user flow you created in [step 1](#step-1-configure-your-user-flow) such as `B2C_1_susi_node_app`.
189+
- For `policyName`, use the name of the **Sing in and sign up** user flow you created in [step 1](#step-1-configure-your-user-flow) such as `B2C_1_susi`.
190190
191191
After the update, your code should look similar to the following sample:
192192

articles/active-directory-b2c/partner-experian.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The Experian integration includes the following components:
4747

4848
- Experian – The Experian service takes inputs provided by the user and verifies the user's identity
4949

50-
- Custom Rest API – This API implements the integration between Azure AD B2C and the Experian service.
50+
- Custom REST API – This API implements the integration between Azure AD B2C and the Experian service.
5151

5252
The following architecture diagram shows the implementation.
5353

@@ -87,7 +87,7 @@ The Experian API call is protected by a client certificate. This client certific
8787

8888
### Part 3 - Configure the API
8989

90-
Application settings can be [configured in the App service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the Rest API:
90+
Application settings can be [configured in the App service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the REST API:
9191

9292
| Application settings | Source | Notes |
9393
| :-------- | :------------| :-----------|

articles/active-directory-b2c/partner-hypr.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To get started, you'll need:
2727

2828
- A HYPR cloud tenant, get a free [trial account](https://get.hypr.com/free-trial).
2929

30-
- A user's mobile device registered using the HYPR Rest APIs or the HYPR Device Manager in your HYPR tenant. For example, you can use the [HYPR Java SDK](https://docs.hypr.com/integratinghypr/docs/hypr-java-web-sdk) to accomplish this task.
30+
- A user's mobile device registered using the HYPR REST APIs or the HYPR Device Manager in your HYPR tenant. For example, you can use the [HYPR Java SDK](https://docs.hypr.com/integratinghypr/docs/hypr-java-web-sdk) to accomplish this task.
3131

3232
## Scenario description
3333

@@ -39,7 +39,7 @@ The HYRP integration includes the following components:
3939

4040
- The HYPR mobile app - The HYPR mobile app can be used to execute this sample if prefer not to use the mobile SDKs in your own mobile applications.
4141

42-
- HYPR Rest APIs - You can use the HYPR APIs to do both user device registration and authentication. These APIs can be found [here](https://apidocs.hypr.com).
42+
- HYPR REST APIs - You can use the HYPR APIs to do both user device registration and authentication. These APIs can be found [here](https://apidocs.hypr.com).
4343

4444
The following architecture diagram shows the implementation.
4545

articles/active-directory-b2c/partner-idology.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The IDology integration includes the following components:
3131

3232
- Azure AD B2C – The authorization server responsible for verifying the user’s credentials. It's also known as the identity provider.
3333
- IDology – The IDology service takes input provided by the user and verifies the user’s identity.
34-
- Custom Rest API – This API implements the integration between Azure AD and the IDology service.
34+
- Custom REST API – This API implements the integration between Azure AD and the IDology service.
3535

3636
The following architecture diagram shows the implementation.
3737

@@ -69,7 +69,7 @@ You'll need the URL of the deployed service to configure Azure AD with the requi
6969

7070
### Part 2 - Configure the API
7171

72-
Application settings can be [configured in App Service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the Rest API:
72+
Application settings can be [configured in App Service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the REST API:
7373

7474
| Application settings | Source | Notes |
7575
| :-------- | :------------| :-----------|

articles/active-directory-b2c/partner-jumio.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The Jumio integration includes the following components:
3434

3535
- Jumio: The service that takes the ID details provided by the user and verifies them.
3636

37-
- Intermediate Rest API: The API that implements the integration between Azure AD B2C and the Jumio service.
37+
- Intermediate REST API: The API that implements the integration between Azure AD B2C and the Jumio service.
3838

3939
- Azure Blob storage: The service that supplies custom UI files to the Azure AD B2C policies.
4040

@@ -98,7 +98,7 @@ Use the following PowerShell script to create the string:
9898

9999
### Configure the API
100100

101-
You can [configure application settings in Azure App Service](../app-service/configure-common.md#configure-app-settings). With this method, you can securely configure settings without checking them into a repository. You'll need to provide the following settings to the Rest API:
101+
You can [configure application settings in Azure App Service](../app-service/configure-common.md#configure-app-settings). With this method, you can securely configure settings without checking them into a repository. You'll need to provide the following settings to the REST API:
102102

103103
| Application settings | Source | Notes |
104104
| :-------- | :------------| :-----------|

articles/active-directory-b2c/partner-lexisnexis.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The ThreatMetrix integration includes the following components:
3838

3939
- ThreatMetrix – The ThreatMetrix service takes inputs provided by the user and combines it with profiling information gathered from the user's machine to verify the security of the user interaction.
4040

41-
- Custom Rest API – This API implements the integration between Azure AD B2C and the ThreatMetrix service.
41+
- Custom REST API – This API implements the integration between Azure AD B2C and the ThreatMetrix service.
4242

4343
The following architecture diagram shows the implementation.
4444

@@ -75,7 +75,7 @@ Deploy the provided [API code](https://github.com/azure-ad-b2c/partner-integrati
7575
7676
### Part 2 - Configure the API
7777

78-
Application settings can be [configured in the App service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the Rest API:
78+
Application settings can be [configured in the App service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the REST API:
7979

8080
| Application settings | Source | Notes |
8181
| :-------- | :------------| :-----------|

articles/active-directory-b2c/partner-onfido.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The Onfido integration includes the following components:
3737

3838
- Onfido client – A configurable JavaScript client document collection utility deployed within other webpages. Collects the documents and does preliminary checks like document size and quality.
3939

40-
- Intermediate Rest API – Provides endpoints for the Azure AD B2C tenant to communicate with the Onfido API service, handling data processing and adhering to the security requirements of both.
40+
- Intermediate REST API – Provides endpoints for the Azure AD B2C tenant to communicate with the Onfido API service, handling data processing and adhering to the security requirements of both.
4141

4242
- Onfido API service – The backend service provided by Onfido, which saves and verifies the documents provided by the user.
4343

@@ -77,7 +77,7 @@ For more information about Onfido, see [Onfido API documentation](https://docume
7777
7878
#### Adding sensitive configuration settings
7979

80-
Application settings can be configured in the [App service in Azure](../app-service/configure-common.md#configure-app-settings). The App service allows for settings to be securely configured without checking them into a repository. The Rest API needs the following settings:
80+
Application settings can be configured in the [App service in Azure](../app-service/configure-common.md#configure-app-settings). The App service allows for settings to be securely configured without checking them into a repository. The REST API needs the following settings:
8181

8282
| Application setting name | Source | Notes |
8383
|:-------------------------|:-------|:-------|

articles/active-directory-b2c/phone-authentication-user-flows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Here's an example showing how to add phone sign-up to a new user flow.
7979
1. Under **Social identity providers**, select any other identity providers you want to allow for this user flow.
8080

8181
> [!NOTE]
82-
> Multi-factor authentication (MFA) is disabled by default for sign-up user flows. You can enable MFA for a phone sign-up user flow, but because a phone number is used as the primary identifier, email one-time passcode is the only option available for the second authentication factor.
82+
> [Multi-factor authentication (MFA)](multi-factor-authentication.md) is disabled by default for sign-up user flows. You can enable MFA for a phone sign-up user flow, but because a phone number is used as the primary identifier, email one-time passcode and Authenticator app - TOTP (preview) are the only options available for the second authentication factor.
8383
8484
1. In the **User attributes and token claims** section, choose the claims and attributes that you want to collect and send from the user during sign-up. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
8585

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/18/2021
11+
ms.date: 03/01/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
zone_pivot_groups: b2c-policy-type
@@ -274,7 +274,7 @@ Add the application IDs to the extensions file *TrustFrameworkExtensions.xml*.
274274

275275
## Add Facebook as an identity provider
276276

277-
The **SocialAndLocalAccounts** starter pack includes Facebook social sign in. Facebook is *not* required for using custom policies, but we use it here to demonstrate how you can enable federated social login in a custom policy.
277+
The **SocialAndLocalAccounts** starter pack includes Facebook social sign in. Facebook is *not* required for using custom policies, but we use it here to demonstrate how you can enable federated social login in a custom policy. If you don't need to enable federated social login, use the **LocalAccounts** starter pack instead, and skip [Add Facebook as an identity provider](tutorial-create-user-flows.md?pivots=b2c-custom-policy#add-facebook-as-an-identity-provider) section.
278278

279279
### Create Facebook application
280280

0 commit comments

Comments
 (0)