Skip to content

Commit 151bfb1

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into more-laa
2 parents e50226e + e98f46f commit 151bfb1

File tree

752 files changed

+18274
-9935
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

752 files changed

+18274
-9935
lines changed

.openpublishing.redirection.json

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,12 @@
55
"redirect_url": "/previous-versions/azure/application-gateway/powershell-samples",
66
"redirect_document_id": false
77
},
8+
{
9+
"source_path": "articles/update-manager/troubleshooter-known-issues.md",
10+
"redirect_url": "/azure/update-manager/troubleshoot",
11+
12+
"redirect_document_id": false
13+
},
814
{
915
"source_path": "articles/storage/blobs/storage-blob-scalable-app-create-vm.md",
1016
"redirect_url": "/previous-versions/azure/storage/blobs/storage-blob-scalable-app-create-vm",
@@ -2701,6 +2707,11 @@
27012707
"redirect_url": "/azure/migrate/whats-new#update-april-2024",
27022708
"redirect_document_id": false
27032709
},
2710+
{
2711+
"source_path": "articles/migrate/migrate-v1.md",
2712+
"redirect_url": "/azure/migrate/migrate-services-overview",
2713+
"redirect_document_id": false
2714+
},
27042715
{
27052716
"source_path_from_root": "/articles/mobile-apps/concepts/analytics.md",
27062717
"redirect_url": "/azure/developer/mobile-apps/analytics",
@@ -4758,7 +4769,7 @@
47584769
},
47594770
{
47604771
"source_path_from_root": "/articles/third-party-notices.md",
4761-
"redirect_url": "/azure-docs/ThirdPartyNotices.md",
4772+
"redirect_url": "https://github.com/MicrosoftDocs/azure-docs/blob/main/ThirdPartyNotices.md",
47624773
"redirect_document_id": false
47634774
}
47644775
]

articles/active-directory-b2c/partner-asignio.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 06/21/2024
9+
ms.date: 10/03/2024
1010
ms.author: gasinh
1111
ms.reviewer: kengaderdus
1212
ms.subservice: B2C
@@ -65,7 +65,7 @@ The following diagram illustrates the implementation.
6565

6666
1. User opens Azure AD B2C sign in page on their mobile or web application, and then signs in or signs up.
6767
2. Azure AD B2C redirects the user to Asignio using an OpenID Connect (OIDC) request.
68-
3. The user is redirected to the Asignio web application for biometric sign in. If the user hasn't registered their Asignio Signature, they can use an SMS One-Time-Password (OTP) to authenticate. After authentication, user receives a registration link to create their Asignio Signature.
68+
3. The user is redirected to the Asignio web application for biometric sign in. If the user didn't register their Asignio Signature, they can use an SMS One-Time-Password (OTP) to authenticate. After authentication, user receives a registration link to create their Asignio Signature.
6969
4. The user authenticates with Asignio Signature and facial verification, or voice and facial verification.
7070
5. The challenge response goes to Asignio.
7171
6. Asignio returns the OIDC response to Azure AD B2C sign in.
@@ -76,11 +76,11 @@ The following diagram illustrates the implementation.
7676

7777
Configurating an application with Asignio is with the Asignio Partner Administration site.
7878

79-
1. Go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page to request access for your organization.
79+
1. To request access for your organization, go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page.
8080
2. With credentials, sign into Asignio Partner Administration.
8181
3. Create a record for the Azure AD B2C application using your Azure AD B2C tenant. When you use Azure AD B2C with Asignio, Azure AD B2C manages connected applications. Asignio apps represent apps in the Azure portal.
8282
4. In the Asignio Partner Administration site, generate a Client ID and Client Secret.
83-
5. Note and store Client ID and Client Secret. You'll use them later. Asignio doesn't store Client Secrets.
83+
5. Note and store Client ID and Client Secret. You use them later. Asignio doesn't store Client Secrets.
8484
6. Enter the redirect URI in your site the user is returned to after authentication. Use the following URI pattern.
8585

8686
`[https://<your-b2c-domain>.b2clogin.com/<your-b2c-domain>.onmicrosoft.com/oauth2/authresp]`.
@@ -99,6 +99,9 @@ For this tutorial, you're registering `https://jwt.ms`, a Microsoft web applica
9999

100100
Complete [Tutorial: Register a web application in Azure Active Directory B2C](tutorial-register-applications.md?tabs=app-reg-ga)
101101

102+
>[!NOTE]
103+
>Enable implicit flow only for testing purposes. Don’t enable implicit flow in production.
104+
102105
## Configure Asignio as an identity provider in Azure AD B2C
103106

104107
For the following instructions, use the Microsoft Entra tenant with the Azure subscription.

articles/active-directory-b2c/partner-trusona.md

Lines changed: 22 additions & 19 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/partner-xid.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 10/03/2024
1010
ms.author: gasinh
1111
ms.subservice: B2C
1212

@@ -40,7 +40,7 @@ The following diagram shows the architecture.
4040

4141
![Diagram of the xID architecture.](./media/partner-xid/partner-xid-architecture-diagram.png)
4242

43-
1. At the Azure AD B2C sign-in page user signs in or signs up.
43+
1. At the Azure AD B2C sign-in page, the user signs in or signs up.
4444
2. Azure AD B2C redirects the user to xID authorize API endpoint using an OpenID Connect (OIDC) request. An OIDC endpoint has endpoint information. xID identity provider (IdP) redirects the user to the xID authorization sign in page. User enters email address.
4545
3. xID IdP sends push notification to user mobile device.
4646
4. User opens the xID app, checks the request, enters a PIN, or uses biometrics. xID app activates the private key and creates an electronic signature.
@@ -56,7 +56,7 @@ The following diagram shows the architecture.
5656

5757
## Install xID
5858

59-
1. To request API documents, fill out the request form. Go to [Contact Us](https://xid.inc/contact-us).
59+
1. To request API documents, fill out the request form. Go to [Contact Us](https://xid.inc/contact-us).
6060
2. In the message, indicate you're using Azure AD B2C.
6161
3. An xID sales representative contacts you.
6262
4. Follow the instructions in the xID API document.
@@ -78,6 +78,9 @@ For testing, you register `https://jwt.ms`, a Microsoft web application with dec
7878

7979
Complete [Tutorial: Register a web application in Azure AD B2C](tutorial-register-applications.md?tabs=app-reg-ga)
8080

81+
>[!NOTE]
82+
>Enable implicit flow only for testing purposes. Don’t enable implicit flow in production.
83+
8184
<a name='create-a-xid-policy-key'></a>
8285

8386
## Create an xID policy key
@@ -407,7 +410,7 @@ There are identity claims xID supports referenced as part of the policy. Claims
407410

408411
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/main/LocalAccounts/SignUpOrSignin.xml), specifies the user journey the Azure AD B2C executes.
409412

410-
1. In the relying party,locate the **DefaultUserJourney** element.
413+
1. In the relying party, locate the **DefaultUserJourney** element.
411414
2. Update the **ReferenceId** to match the user journey ID you added to the identity provider.
412415

413416
In the following example, for the xID user journey, the **ReferenceId** is set to `CombinedSignInAndSignUp`.

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 09/11/2024
4+
ms.date: 10/01/2024
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: whats-new
@@ -19,6 +19,12 @@ manager: CelesteDG
1919

2020
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
2121

22+
## September 2024
23+
24+
### Updated articles
25+
26+
- [Developer notes for Azure Active Directory B2C](custom-policy-developer-notes.md) - Updated feature availability for China cloud
27+
2228
## August 2024
2329

2430
This month, we changed Twitter to X in numerous articles and code samples.
@@ -33,10 +39,3 @@ This month, we changed Twitter to X in numerous articles and code samples.
3339

3440
- [Developer notes for Azure Active Directory B2C](custom-policy-developer-notes.md) - Updated Twitter to X
3541
- [Custom email verification with SendGrid](custom-email-sendgrid.md) - Updated the localization script
36-
37-
## June 2024
38-
39-
### Updated articles
40-
41-
- [Define an OAuth2 custom error technical profile in an Azure Active Directory B2C custom policy](oauth2-error-technical-profile.md) - Error code updates
42-
- [Configure authentication in a sample Python web app by using Azure AD B2C](configure-authentication-sample-python-web-app.md) - Python version updates
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/api-center/use-vscode-extension.md",
5+
"redirect_url": "/azure/api-center/build-register-apis-vscode-extension",
6+
"redirect_document_id": false
7+
}
8+
9+
]
10+
}

articles/api-center/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,8 @@
3838
href: manage-apis-azure-cli.md
3939
- name: Import APIs from API Management
4040
href: import-api-management-apis.md
41-
- name: Register APIs - VS Code extension
42-
href: use-vscode-extension.md
41+
- name: Build and register APIs - VS Code extension
42+
href: build-register-apis-vscode-extension.md
4343
- name: Register APIs - GitHub Actions
4444
href: register-apis-github-actions.md
4545
- name: API governance
@@ -56,6 +56,8 @@
5656
href: find-nonproduction-api-requests-dev-proxy.md
5757
- name: API discovery and consumption
5858
items:
59+
- name: Enable platform API catalog - VS Code extension
60+
href: enable-platform-api-catalog-vscode-extension.md
5961
- name: Self-host Azure API Center portal
6062
href: enable-api-center-portal.md
6163
- name: Check API calls use minimal permissions with Dev Proxy

0 commit comments

Comments
 (0)