Skip to content

Commit 17ff089

Browse files
Merge branch 'master' into usql-extract-script
2 parents bf0cf5e + fc9b011 commit 17ff089

File tree

3,438 files changed

+32884
-41456
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,438 files changed

+32884
-41456
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155,6 +155,12 @@
155155
"branch": "GuidedSetup",
156156
"branch_mapping": {}
157157
},
158+
{
159+
"path_to_root": "iot-samples-node",
160+
"url": "https://github.com/Azure-Samples/azure-iot-samples-node",
161+
"branch": "master",
162+
"branch_mapping": {}
163+
},
158164
{
159165
"path_to_root": "samples-cognitive-services-speech-sdk",
160166
"url": "https://github.com/Azure-Samples/cognitive-services-speech-sdk",

.openpublishing.redirection.json

Lines changed: 327 additions & 32 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/TOC.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -58,10 +58,10 @@
5858
href: https://github.com/Azure-Samples/active-directory-b2c-android-native-msal
5959
- name: Android using App Auth
6060
href: active-directory-b2c-devquickstarts-android.md
61-
- name: .NET
62-
href: https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop
63-
- name: Xamarin
64-
href: https://github.com/Azure-Samples/active-directory-b2c-xamarin-native
61+
- name: .NET
62+
href: https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop
63+
- name: Xamarin
64+
href: https://github.com/Azure-Samples/active-directory-b2c-xamarin-native
6565
- name: Resource owner password credentials
6666
href: configure-ropc.md
6767
- name: Web apps
@@ -268,7 +268,7 @@
268268
- name: Service updates
269269
href: https://azure.microsoft.com/updates/?product=active-directory-b2c
270270
- name: Stack Overflow
271-
href: https://stackoverflow.com/questions/tagged/azure-ad-b2c
271+
href: https://stackoverflow.com/questions/tagged/azure-ad-b2c+identity-experience-framework
272272
- name: Support
273273
href: active-directory-b2c-support.md
274274
- name: Videos

articles/active-directory-b2c/active-directory-b2c-access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ When requesting an access token, the client application needs to specify the des
7676
> Currently, custom domains are not supported along with access tokens. You must use your tenantName.onmicrosoft.com domain in the request URL.
7777
7878
```
79-
https://login.microsoftonline.com/<tenantName>.onmicrosoft.com/oauth2/v2.0/authorize?p=<yourPolicyId>&client_id=<appID_of_your_client_application>&nonce=anyRandomValue&redirect_uri=<redirect_uri_of_your_client_application>&scope=https%3A%2F%2Fcontoso.onmicrosoft.com%2Fnotes%2Fread&response_type=code
79+
https://login.microsoftonline.com/<tenantName>.onmicrosoft.com/<yourPolicyId>/oauth2/v2.0/authorize?client_id=<appID_of_your_client_application>&nonce=anyRandomValue&redirect_uri=<redirect_uri_of_your_client_application>&scope=https%3A%2F%2Fcontoso.onmicrosoft.com%2Fnotes%2Fread&response_type=code
8080
```
8181

8282
To acquire multiple permissions in the same request, you can add multiple entries in the single **scope** parameter, separated by spaces. For example:

articles/active-directory-b2c/active-directory-b2c-reference-custom-attr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.author: davidmu
1818
Your Azure Active Directory (Azure AD) B2C directory comes with a built-in set of information (attributes): Given Name, Surname, City, Postal Code, and other attributes. However, every consumer-facing application has unique requirements on what attributes to gather from consumers. With Azure AD B2C, you can extend the set of attributes stored on each consumer account. You can create custom attributes on the [Azure portal](https://portal.azure.com/) and use it in your sign-up policies, as shown below. You can also read and write these attributes by using the [Azure AD Graph API](active-directory-b2c-devquickstarts-graph-dotnet.md).
1919

2020
> [!NOTE]
21-
> Custom attributes use [Azure AD Graph API Directory Schema Extensions](https://msdn.microsoft.com/library/azure/dn720459.aspx).
21+
> Custom attributes use [Azure AD Graph API Directory Schema Extensions](https://msdn.microsoft.com/library/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
2222
>
2323
>
2424

articles/active-directory-b2c/active-directory-b2c-setup-li-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ To use LinkedIn as an identity provider in Azure Active Directory (Azure AD) B2C
3232
> **Client Secret** is an important security credential.
3333
>
3434
>
35-
6. Enter `https://login.microsoftonline.com/te/{tenant}/oauth2/authresp` in the **Authorized Redirect URLs** field (under **OAuth 2.0**). Replace **{tenant}** with your tenant's name (for example, contoso.onmicrosoft.com). Click **Add**, and then click **Update**. The **{tenant}** value is case-sensitive.
35+
6. Enter `https://login.microsoftonline.com/te/{tenant}/oauth2/authresp` in the **Authorized Redirect URLs** field (under **OAuth 2.0**). Replace **{tenant}** with your tenant's name (for example, contoso.onmicrosoft.com). Click **Add**, and then click **Update**. The **{tenant}** value should be lowercase.
3636

3737
![LinkedIn - Setup app](./media/active-directory-b2c-setup-li-app/linkedin-setup.png)
3838

articles/active-directory-b2c/active-directory-b2c-setup-twitter-app.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,10 @@ To use Twitter as an identity provider in Azure Active Directory (Azure AD) B2C,
2525
3. In the form, provide a value for the **Name**, **Description**, and **Website**.
2626
4. For the **Callback URL**, enter `https://login.microsoftonline.com/te/{tenant}/oauth2/authresp`. Make sure to replace **{tenant}** with your tenant's name (for example, contosob2c.onmicrosoft.com).
2727
5. Check the box to agree to the **Developer Agreement** and click **Create your Twitter application**.
28-
6. After the app is created, click **Keys and Access Tokens**.
29-
7. Copy the value of **Consumer Key** and **Consumer Secret**. You will need both of them to configure Twitter as an identity provider in your tenant.
28+
6. After the app is created, select it in the list, and then select the **Settings** tab.
29+
7. Clear the **Enable Callback Locking** box, and then click **Update settings**.
30+
8. Select the **Keys and Access Tokens** tab.
31+
9. Copy the value of **Consumer Key** and **Consumer Secret**. You will need both of them to configure Twitter as an identity provider in your tenant.
3032

3133
## Configure Twitter as an identity provider in your tenant
3234
1. Log in to the [Azure portal](https://portal.azure.com/) as the Global Administrator of the Azure AD B2C tenant.

articles/active-directory-b2c/active-directory-b2c-tutorials-spa-webapi.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -152,21 +152,23 @@ To allow your single page app to call the ASP.NET Core web API, you need to enab
152152
builder.WithOrigins("http://localhost:6420").AllowAnyHeader().AllowAnyMethod());
153153
```
154154

155+
3. Open the **launchSettings.json** file under **Properties**, locate the *applicationURL* setting, and record the value for use in the next section.
156+
155157
### Configure the single page app
156158

157159
The single page app uses Azure AD B2C for user sign-up, sign-in, and calls the protected ASP.NET Core web API. You need to update the single page app call the .NET Core web api.
158160
To change the app settings:
159161

160162
1. Open the `index.html` file in the Node.js single page app sample.
161-
2. Configure the sample with the Azure AD B2C tenant registration information. Change the **b2cScopes** and **webApi** values in following lines of code:
163+
2. Configure the sample with the Azure AD B2C tenant registration information. In the following code, add your tenant name to **b2cScopes** and change the **webApi** value to the *applicationURL* value that you previously recorded:
162164

163165
```javascript
164166
// The current application coordinates were pre-registered in a B2C tenant.
165167
var applicationConfig = {
166168
clientID: '<Application ID for your SPA obtained from portal app registration>',
167169
authority: "https://login.microsoftonline.com/tfp/<your-tenant-name>.onmicrosoft.com/B2C_1_SiUpIn",
168170
b2cScopes: ["https://<Your tenant name>.onmicrosoft.com/HelloCoreAPI/demo.read"],
169-
webApi: 'http://localhost:58553/api/values',
171+
webApi: 'http://localhost:64791/api/values',
170172
};
171173
```
172174

articles/active-directory-domain-services/active-directory-ds-faqs.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 03/08/2018
16+
ms.date: 05/23/2018
1717
ms.author: maheshu
1818

1919
---
@@ -79,6 +79,9 @@ Yes. Members of the 'AAD DC Administrators' group are granted 'DNS Administrator
7979
### What is the password lifetime policy on a managed domain?
8080
The default password lifetime on an Azure AD Domain Services managed domain is 90 days. This password lifetime is not synchronized with the password lifetime configured in Azure AD. Therefore, you may have a situation where users' passwords expire in your managed domain, but are still valid in Azure AD. In such scenarios, users need to change their password in Azure AD and the new password will synchronize to your managed domain. Additionally, the 'password-does-not-expire' and 'user-must-change-password-at-next-logon' attributes for user accounts are not synchronized to your managed domain.
8181

82+
### Does Azure AD Domain Services provide AD account lockout protection?
83+
Yes. 4 invalid password attempts within 2 minutes on the managed domain cause a user account to be locked out for 30 minutes. After 30 minutes, the user account is automatically unlocked. Invalid password attempts on the managed domain do not lock out the user account in Azure AD. The user account is locked out only within your Azure AD Domain Services managed domain.
84+
8285
## Billing and availability
8386
### Is Azure AD Domain Services a paid service?
8487
Yes. For more information, see the [pricing page](https://azure.microsoft.com/pricing/details/active-directory-ds/).

articles/active-directory-domain-services/active-directory-ds-features.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 03/06/2017
16+
ms.date: 05/23/2018
1717
ms.author: maheshu
1818

1919
---
@@ -35,4 +35,5 @@ The following features are available in Azure AD Domain Services managed domains
3535
* **Create custom Organizational Units (OUs):** Members of the 'AAD DC Administrators' group can create custom OUs in the managed domain. These users are granted full administrative privileges over custom OUs, so they can add/remove service accounts, computers, groups etc. within these custom OUs.
3636
* **Available in multiple Azure regions:** See the [Azure services by region](https://azure.microsoft.com/regions/#services/) page to know the Azure regions in which Azure AD Domain Services is available.
3737
* **High availability:** Azure AD Domain Services offers high availability for your domain. This feature offers the guarantee of higher service uptime and resilience to failures. Built-in health monitoring offers automated remediation from failures by spinning up new instances to replace failed instances and to provide continued service for your domain.
38+
* **AD Account lockout protection:** Users accounts are locked out for 30 minutes if 4 invalid password attempts are encountered within 2 minutes. Accounts are automatically unlocked after 30 minutes.
3839
* **Use familiar management tools:** You can use familiar Windows Server Active Directory management tools such as the Active Directory Administrative Center or Active Directory PowerShell to administer managed domains.

0 commit comments

Comments
 (0)