Skip to content

Commit 1a03bc4

Browse files
authored
Merge branch 'master' into enable-virtual-network
2 parents d9abef3 + e9176d4 commit 1a03bc4

File tree

1,680 files changed

+14341
-16692
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,680 files changed

+14341
-16692
lines changed

.openpublishing.publish.config.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -179,6 +179,11 @@
179179
"url": "https://github.com/Azure/azure-iot-sdk-c",
180180
"branch": "master"
181181
},
182+
{
183+
"path_to_root": "samples-cognitive-services-python-sdk",
184+
"url": "https://github.com/Azure-Samples/cognitive-services-python-sdk-samples",
185+
"branch": "master"
186+
},
182187
{
183188
"path_to_root": "samples-cognitive-services-speech-sdk",
184189
"url": "https://github.com/Azure-Samples/cognitive-services-speech-sdk",
@@ -300,6 +305,11 @@
300305
"url": "https://github.com/Azure-Samples/cosmos-dotnet-core-todo-app",
301306
"branch": "master"
302307
},
308+
{
309+
"path_to_root": "samples-cosmosdb-xamarin",
310+
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-xamarin-getting-started",
311+
"branch": "master"
312+
},
303313
{
304314
"path_to_root": "cosmosdb-nodejs-get-started",
305315
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-api-nodejs-getting-started",

.openpublishing.redirection.json

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,20 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/azure-government/documentation-government-get-started-connect-with-vs.md",
5+
"redirect_url": "/azure/azure-government/documentation-government-welcome",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/security/develop/security-code-analysis-install.md",
510
"redirect_url": "/azure/security/develop/security-code-analysis-onboard",
611
"redirect_document_id": true
712
},
13+
{
14+
"source_path": "articles/machine-learning/service/setup-create-workspace.md",
15+
"redirect_url": "/azure/machine-learning/service/how-to-manage-workspace",
16+
"redirect_document_id": true
17+
},
818
{
919
"source_path": "articles/machine-learning/service/quickstart-run-local-notebook.md",
1020
"redirect_url": "/azure/machine-learning/service/how-to-configure-environment#local",
@@ -14015,6 +14025,11 @@
1401514025
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-restore",
1401614026
"redirect_document_id": false
1401714027
},
14028+
{
14029+
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-restore.md",
14030+
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-restore-points",
14031+
"redirect_document_id": false
14032+
},
1401814033
{
1401914034
"source_path": "articles/sql-database/sql-database-auditing-get-started.md",
1402014035
"redirect_url": "/azure/sql-database/sql-database-auditing",
@@ -25129,6 +25144,11 @@
2512925144
"redirect_url": "/azure/data-factory/v1/data-factory-amazon-redshift-connector",
2513025145
"redirect_document_id": true
2513125146
},
25147+
{
25148+
"source_path": "articles/data-factory/connector-azure-sql-database-managed-insance.md",
25149+
"redirect_url": "/azure/data-factory/connector-azure-sql-database-managed-instance",
25150+
"redirect_document_id": false
25151+
},
2513225152
{
2513325153
"source_path": "articles/data-factory/data-factory-amazon-simple-storage-service-connector.md",
2513425154
"redirect_url": "/azure/data-factory/v1/data-factory-amazon-simple-storage-service-connector",
@@ -27724,6 +27744,11 @@
2772427744
"redirect_url": "/azure/security/fundamentals/choose-ad-authn",
2772527745
"redirect_document_id": true
2772627746
},
27747+
{
27748+
"source_path": "articles/active-directory/authentication/howto-authentication-phone-sign-in.md",
27749+
"redirect_url": "/azure/active-directory/authentication/howto-authentication-passwordless-phone",
27750+
"redirect_document_id": true
27751+
},
2772727752
{
2772827753
"source_path": "articles/security/azure-ad-passwordless.md",
2772927754
"redirect_url": "/azure/security/fundamentals/ad-passwordless",
@@ -32284,6 +32309,16 @@
3228432309
"redirect_url": "/azure/cognitive-services/bing-web-search/use-display-requirements",
3228532310
"redirect_document_id": false
3228632311
},
32312+
{
32313+
"source_path": "articles/cognitive-services/bing-custom-search/hit-highlighting.md",
32314+
"redirect_url": "/azure/cognitive-services/bing-web-search/hit-highlighting",
32315+
"redirect_document_id": false
32316+
},
32317+
{
32318+
"source_path": "articles/cognitive-services/bing-news-search/hit-highlighting.md",
32319+
"redirect_url": "/azure/cognitive-services/bing-web-search/hit-highlighting",
32320+
"redirect_document_id": false
32321+
},
3228732322
{
3228832323
"source_path": "articles/cognitive-services/Bing-Entities-Search/use-display-requirements.md",
3228932324
"redirect_url": "/azure/cognitive-services/bing-web-search/use-display-requirements",
@@ -40454,6 +40489,21 @@
4045440489
"redirect_url": "/azure/hdinsight/hdinsight-plan-virtual-network-deployment",
4045540490
"redirect_document_id": true
4045640491
},
40492+
{
40493+
"source_path": "articles/hdinsight/spark/apache-spark-troubleshoot-outofmemory-native-thread.md",
40494+
"redirect_url": "/azure/hdinsight/spark/apache-spark-troubleshoot-outofmemory",
40495+
"redirect_document_id": false
40496+
},
40497+
{
40498+
"source_path": "articles/hdinsight/spark/apache-spark-troubleshoot-outofmemory-heap.md",
40499+
"redirect_url": "/azure/hdinsight/spark/apache-spark-troubleshoot-outofmemory",
40500+
"redirect_document_id": false
40501+
},
40502+
{
40503+
"source_path": "articles/hdinsight/spark/apache-spark-troubleshoot-outofmemory-heap-space.md",
40504+
"redirect_url": "/azure/hdinsight/spark/apache-spark-troubleshoot-outofmemory",
40505+
"redirect_document_id": false
40506+
},
4045740507
{
4045840508
"source_path": "articles/active-directory-domain-services/active-directory-ds-troubleshoot-service-principals.md",
4045940509
"redirect_url": "/azure/active-directory-domain-services/alert-service-principal",
@@ -40929,6 +40979,11 @@
4092940979
"source_path": "articles/dev-spaces/quickstart-cli-dockerfile.md",
4093040980
"redirect_url": "/azure/dev-spaces/quickstart-cli",
4093140981
"redirect_document_id": false
40982+
},
40983+
{
40984+
"source_path": "articles/lab-services/devtest-lab-integrate-ci-cd-vsts.md",
40985+
"redirect_url": "/azure/lab-services/devtest-lab-integrate-ci-cd",
40986+
"redirect_document_id": true
4093240987
}
4093340988
]
4093440989
}

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Azure AD B2C extends the standard OpenID Connect protocol to do more than simple
2828

2929
When your web application needs to authenticate the user and run a user flow, it can direct the user to the `/authorize` endpoint. The user takes action depending on the user flow.
3030

31-
In this request, the client indicates the permissions that it needs to acquire from the user in the `scope` parameter and the user flow to run in the `p` parameter. Three examples are provided in the following sections (with line breaks for readability), each using a different user flow. To get a feel for how each request works, try pasting the request into a browser and running it. You can replace `fabrikamb2c` with the name of your tenant if you have one and have created a user flow.
31+
In this request, the client indicates the permissions that it needs to acquire from the user in the `scope` parameter and the user flow to run in the `p` parameter. Three examples are provided in the following sections (with line breaks for readability), each using a different user flow. To get a feel for how each request works, try pasting the request into a browser and running it. You can replace `fabrikamb2c` with the name of your tenant if you have one and have created a user flow. You will also need to replace `90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6`. Replace this client ID with the app ID of the application registration you had created. Also change the policy name `b2c_1_sign_in` to the policy name that you have in your tenant.
3232

3333
#### Use a sign-in user flow
3434
```
@@ -72,14 +72,14 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
7272
| Parameter | Required | Description |
7373
| --------- | -------- | ----------- |
7474
| client_id | Yes | The application ID that the [Azure portal](https://portal.azure.com/) assigned to your application. |
75+
| nonce | Yes | A value included in the request (generated by the application) that is included in the resulting ID token as a claim. The application can then verify this value to mitigate token replay attacks. The value is typically a randomized unique string that can be used to identify the origin of the request. |
76+
| p | Yes | The user flow that is run. It is the name of a user flow that's created in your Azure AD B2C tenant. The name of the user flow should begin with `b2c\_1\_`. |
7577
| response_type | Yes | Must include an ID token for OpenID Connect. If your web application also needs tokens for calling a web API, you can use `code+id_token`. |
76-
| redirect_uri | No | The `redirect_uri` parameter of your application, where authentication responses can be sent and received by your application. It must exactly match one of the `redirect_uri` parameters that you registered in the Azure portal, except that it must be URL encoded. |
7778
| scope | Yes | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. The `offline_access` scope is optional for web applications. It indicates that your application will need a *refresh token* for extended access to resources. |
79+
| prompt | No | The type of user interaction that's required. The only valid value at this time is `login`, which forces the user to enter their credentials on that request. |
80+
| redirect_uri | No | The `redirect_uri` parameter of your application, where authentication responses can be sent and received by your application. It must exactly match one of the `redirect_uri` parameters that you registered in the Azure portal, except that it must be URL encoded. |
7881
| response_mode | No | The method that is used to send the resulting authorization code back to your application. It can be either `query`, `form_post`, or `fragment`. The `form_post` response mode is recommended for best security. |
7982
| state | No | A value included in the request that's also returned in the token response. It can be a string of any content that you want. A randomly generated unique value is typically used for preventing cross-site request forgery attacks. The state is also used to encode information about the user's state in the application before the authentication request occurred, such as the page they were on. |
80-
| nonce | Yes | A value included in the request (generated by the application) that is included in the resulting ID token as a claim. The application can then verify this value to mitigate token replay attacks. The value is typically a randomized unique string that can be used to identify the origin of the request. |
81-
| p | Yes | The user flow that is run. It is the name of a user flow that's created in your Azure AD B2C tenant. The name of the user flow should begin with `b2c\_1\_`. |
82-
| prompt | No | The type of user interaction that's required. The only valid value at this time is `login`, which forces the user to enter their credentials on that request. |
8383

8484
At this point, the user is asked to complete the workflow. The user might have to enter their username and password, sign in with a social identity, or sign up for the directory. There could be any other number of steps depending on how the user flow is defined.
8585

@@ -165,13 +165,13 @@ grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&sco
165165

166166
| Parameter | Required | Description |
167167
| --------- | -------- | ----------- |
168-
| p | Yes | The user flow that was used to acquire the authorization code. You can't use a different user flow in this request. Add this parameter to the query string, not to the POST body. |
169168
| client_id | Yes | The application ID that the [Azure portal](https://portal.azure.com/) assigned to your application. |
170-
| grant_type | Yes | The type of grant, which must be `authorization_code` for the authorization code flow. |
171-
| scope | No | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of id_token parameters. It can be used to get tokens to your application's own back-end web API, which is represented by the same application ID as the client. The `offline_access` scope indicates that your application needs a refresh token for extended access to resources. |
169+
| client_secret | Yes | The application secret that was generated in the [Azure portal](https://portal.azure.com/). This application secret is an important security artifact. You should store it securely on your server. Change this client secret on a periodic basis. |
172170
| code | Yes | The authorization code that you acquired in the beginning of the user flow. |
171+
| grant_type | Yes | The type of grant, which must be `authorization_code` for the authorization code flow. |
172+
| p | Yes | The user flow that was used to acquire the authorization code. You can't use a different user flow in this request. Add this parameter to the query string, not to the POST body. |
173173
| redirect_uri | Yes | The `redirect_uri` parameter of the application where you received the authorization code. |
174-
| client_secret | Yes | The application secret that was generated in the [Azure portal](https://portal.azure.com/). This application secret is an important security artifact. You should store it securely on your server. Change this client secret on a periodic basis. |
174+
| scope | No | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of id_token parameters. It can be used to get tokens to your application's own back-end web API, which is represented by the same application ID as the client. The `offline_access` scope indicates that your application needs a refresh token for extended access to resources. |
175175

176176
A successful token response looks like:
177177

@@ -232,13 +232,13 @@ grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=op
232232

233233
| Parameter | Required | Description |
234234
| --------- | -------- | ----------- |
235-
| p | Yes | The user flow that was used to acquire the original refresh token. You can't use a different user flow in this request. Add this parameter to the query string, not to the POST body. |
236235
| client_id | Yes | The application ID that the [Azure portal](https://portal.azure.com/) assigned to your application. |
236+
| client_secret | Yes | The application secret that was generated in the [Azure portal](https://portal.azure.com/). This application secret is an important security artifact. You should store it securely on your server. Change this client secret on a periodic basis. |
237237
| grant_type | Yes | The type of grant, which must be a refresh token for this part of the authorization code flow. |
238-
| scope | No | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. It can be used to send tokens to your application's own back-end web API, which is represented by the same application ID as the client. The `offline_access` scope indicates that your application needs a refresh token for extended access to resources. |
239-
| redirect_uri | No | The `redirect_uri` parameter of the application where you received the authorization code. |
240238
| refresh_token | Yes | The original refresh token that was acquired in the second part of the flow. The `offline_access` scope must be used in both the authorization and token requests in order to receive a refresh token. |
241-
| client_secret | Yes | The application secret that was generated in the [Azure portal](https://portal.azure.com/). This application secret is an important security artifact. You should store it securely on your server. Change this client secret on a periodic basis. |
239+
| p | Yes | The user flow that was used to acquire the original refresh token. You can't use a different user flow in this request. Add this parameter to the query string, not to the POST body. |
240+
| redirect_uri | No | The `redirect_uri` parameter of the application where you received the authorization code. |
241+
| scope | No | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. It can be used to send tokens to your application's own back-end web API, which is represented by the same application ID as the client. The `offline_access` scope indicates that your application needs a refresh token for extended access to resources. |
242242

243243
A successful token response looks like:
244244

0 commit comments

Comments
 (0)