Skip to content

Commit 1a17fb1

Browse files
authored
Merge branch 'main' into 22Jun-webapp
2 parents 9d970e8 + f4977ec commit 1a17fb1

File tree

1,779 files changed

+22773
-13279
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,779 files changed

+22773
-13279
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -437,7 +437,7 @@
437437
{
438438
"path_to_root": "media-services-video-indexer",
439439
"url": "https://github.com/Azure-Samples/media-services-video-indexer",
440-
"branch": "main",
440+
"branch": "master",
441441
"branch_mapping": {}
442442
},
443443
{

.openpublishing.redirection.active-directory.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8792,8 +8792,8 @@
87928792
},
87938793
{
87948794
"source_path_from_root": "/articles/active-directory/active-directory-saas-linkedin-learning-provisioning-tutorial.md",
8795-
"redirect_url": "/azure/active-directory/saas-apps/linkedin-learning-provisioning-tutorial",
8796-
"redirect_document_id": true
8795+
"redirect_url": "/azure",
8796+
"redirect_document_id": false
87978797
},
87988798
{
87998799
"source_path_from_root": "/articles/active-directory/active-directory-saas-linkedinlearning-tutorial.md",

.openpublishing.redirection.azure-monitor.json

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -141,11 +141,46 @@
141141
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/troubleshoot-portal-connectivity",
142142
"redirect_document_id": false
143143
},
144+
{
145+
"source_path_from_root": "/articles/azure-monitor/app/java-2x-troubleshoot.md",
146+
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/java-2x-troubleshoot",
147+
"redirect_document_id": false
148+
},
149+
{
150+
"source_path_from_root": "/articles/azure-monitor/app/status-monitor-v2-troubleshoot.md",
151+
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/status-monitor-v2-troubleshoot",
152+
"redirect_document_id": false
153+
},
154+
{
155+
"source_path_from_root": "/articles/azure-monitor/app/asp-net-troubleshoot-no-data.md",
156+
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/asp-net-troubleshoot-no-data",
157+
"redirect_document_id": false
158+
},
159+
{
160+
"source_path_from_root": "/articles/azure-monitor/app/java-standalone-troubleshoot.md",
161+
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/java-standalone-troubleshoot",
162+
"redirect_document_id": false
163+
},
164+
{
165+
"source_path_from_root": "/articles/azure-monitor/app/troubleshoot-availability.md",
166+
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/troubleshoot-availability",
167+
"redirect_document_id": false
168+
},
144169
{
145170
"source_path_from_root": "/articles/azure-monitor/app/auto-instrumentation-troubleshoot.md",
146171
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/auto-instrumentation-troubleshoot",
147172
"redirect_document_id": false
148173
},
174+
{
175+
"source_path_from_root": "/articles/azure-monitor/app/usage-troubleshoot.md",
176+
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/usage-troubleshoot",
177+
"redirect_document_id": false
178+
},
179+
{
180+
"source_path_from_root": "/articles/azure-monitor/app/java-on-premises.md",
181+
"redirect_url": "/azure/azure-monitor/app/java-in-process-agent",
182+
"redirect_document_id": false
183+
},
149184
{
150185
"source_path_from_root": "/articles/azure-monitor/app/change-analysis-troubleshoot.md",
151186
"redirect_url": "/azure/azure-monitor/change/change-analysis-troubleshoot",
@@ -181,6 +216,16 @@
181216
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
182217
"redirect_document_id": false
183218
},
219+
{
220+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-add-text.md",
221+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-add-workbook-elements",
222+
"redirect_document_id": false
223+
},
224+
{
225+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-combine-data.md",
226+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-data-sources",
227+
"redirect_document_id": false
228+
},
184229
{
185230
"source_path_from_root": "/articles/azure-monitor/alerts/itsmc-service-manager-script.md",
186231
"redirect_url": "/azure/azure-monitor/alerts/itsmc-connections",

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -585,6 +585,16 @@
585585
"redirect_url": "/azure/defender-for-cloud/quickstart-onboard-aws",
586586
"redirect_document_id": true
587587
},
588+
{
589+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-sql-enable-azure-sql-protections.md",
590+
"redirect_url": "/azure/defender-for-cloud/quickstart-enable-database-protections",
591+
"redirect_document_id": true
592+
},
593+
{
594+
"source_path_from_root": "/articles/defender-for-cloud/quickstart-enable-defender-for-cosmos.md",
595+
"redirect_url": "/azure/defender-for-cloud/defender-for-databases-enable-cosmos-protections",
596+
"redirect_document_id": true
597+
},
588598
{
589599
"source_path_from_root": "/articles/security-center/auto-deploy-vulnerability-assessment.md",
590600
"redirect_url": "/azure/defender-for-cloud/auto-deploy-vulnerability-assessment",

.openpublishing.redirection.json

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11116,6 +11116,17 @@
1111611116
"redirect_url": "/azure/azure-resource-manager/management/move-resources-overview",
1111711117
"redirect_document_id": false
1111811118
},
11119+
{
11120+
"source_path_from_root": "/articles/azure-resource-manager/management/create-private-link-access-rest.md",
11121+
"redirect_url": "/azure/azure-resource-manager/management/create-private-link-access-commands",
11122+
"redirect_document_id": false
11123+
},
11124+
{
11125+
"source_path_from_root": "/articles/azure-resource-manager/management/manage-private-link-access-rest.md",
11126+
"redirect_url": "/azure/azure-resource-manager/management/manage-private-link-access-commands",
11127+
"redirect_document_id": false
11128+
},
11129+
1111911130
{
1112011131
"source_path_from_root": "/articles/azure-resource-manager/resource-group-move-resources.md",
1112111132
"redirect_url": "/azure/azure-resource-manager/management/move-resource-group-and-subscription",

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@
183183
href: enable-authentication-web-api.md
184184
- name: Secure API Management API
185185
href: secure-api-management.md
186-
displayName: apim, api management, migrate, b2clogin.com
186+
displayName: api, api management, migrate, b2clogin.com
187187
- name: Microsoft Power Apps
188188
href: /powerapps/maker/portals/configure/configure-azure-ad-b2c-provider
189189
- name: SAML application

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,8 @@ Declare your claims in the [claims schema](claimsschema.md). Open the extensions
130130
</BuildingBlocks> -->
131131
```
132132

133-
A claims transformation technical profile initiates the **isForgotPassword** claim. The technical profile is referenced later. When invoked, it sets the value of the **isForgotPassword** claim to `true`. Find the **ClaimsProviders** element. If the element doesn't exist, add it. Then add the following claims provider:
133+
### Add the technical profiles
134+
A claims transformation technical profile accesses the `isForgotPassword` claim. The technical profile is referenced later. When it's invoked, it sets the value of the `isForgotPassword` claim to `true`. Find the **ClaimsProviders** element (if the element doesn't exist, create it), and then add the following claims provider:
134135

135136
```xml
136137
<!--
@@ -151,6 +152,9 @@ A claims transformation technical profile initiates the **isForgotPassword** cla
151152
<Item Key="setting.forgotPasswordLinkOverride">ForgotPasswordExchange</Item>
152153
</Metadata>
153154
</TechnicalProfile>
155+
<TechnicalProfile Id="LocalAccountWritePasswordUsingObjectId">
156+
<UseTechnicalProfileForSessionManagement ReferenceId="SM-AAD" />
157+
</TechnicalProfile>
154158
</TechnicalProfiles>
155159
</ClaimsProvider>
156160
<!--
@@ -159,6 +163,8 @@ A claims transformation technical profile initiates the **isForgotPassword** cla
159163

160164
The **SelfAsserted-LocalAccountSignin-Email** technical profile **setting.forgotPasswordLinkOverride** defines the password reset claims exchange that executes in your user journey.
161165

166+
The **LocalAccountWritePasswordUsingObjectId** technical profile **UseTechnicalProfileForSessionManagement** `SM-AAD` session manager is required for the user to preform subsequent logins successfully under [SSO](./custom-policy-reference-sso.md) conditions.
167+
162168
### Add the password reset sub journey
163169

164170
The user can now sign in, sign up, and perform password reset in your user journey. To better organize the user journey, you can use a [sub journey](subjourneys.md) to handle the password reset flow.

articles/active-directory-b2c/application-types.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ In a web application, each execution of a [policy](user-flow-overview.md) takes
6767

6868
Validation of the `id_token` by using a public signing key that is received from Azure AD is sufficient to verify the identity of the user. This process also sets a session cookie that can be used to identify the user on subsequent page requests.
6969

70-
To see this scenario in action, try one of the web application sign in code samples in our [Getting started section](overview.md).
70+
To see this scenario in action, try one of the web application sign-in code samples in our [Getting started section](overview.md).
7171

7272
In addition to facilitating simple sign in, a web server application might also need to access a back-end web service. In this case, the web application can perform a slightly different [OpenID Connect flow](openid-connect.md) and acquire tokens by using authorization codes and refresh tokens. This scenario is depicted in the following [Web APIs section](#web-apis).
7373

@@ -134,7 +134,7 @@ In this flow, the application executes [policies](user-flow-overview.md) and rec
134134

135135
Applications that contain long-running processes or that operate without the presence of a user also need a way to access secured resources such as web APIs. These applications can authenticate and get tokens by using their identities (rather than a user's delegated identity) and by using the OAuth 2.0 client credentials flow. Client credential flow isn't the same as on-behalf-flow and on-behalf-flow shouldn't be used for server-to-server authentication.
136136

137-
The [OAuth 2.0 client credentials flow](./client-credentials-grant-flow.md) is currently in public preview. You can also set up client credential flow using Azure AD and the Microsoft identity platform /token endpoint (`https://login.microsoftonline.com/your-tenant-name.onmicrosoft.com/oauth2/v2.0/token`) for a [Microsoft Graph application](microsoft-graph-get-started.md) or your own application. For more information, check out the [Azure AD token reference](../active-directory/develop/id-tokens.md) article.
137+
For Azure AD B2C, the [OAuth 2.0 client credentials flow](./client-credentials-grant-flow.md) is currently in public preview. However, you can set up client credential flow using Azure AD and the Microsoft identity platform `/token` endpoint (`https://login.microsoftonline.com/your-tenant-name.onmicrosoft.com/oauth2/v2.0/token`) for a [Microsoft Graph application](microsoft-graph-get-started.md) or your own application. For more information, check out the [Azure AD token reference](../active-directory/develop/id-tokens.md) article.
138138

139139
## Unsupported application types
140140

articles/active-directory-b2c/client-credentials-grant-flow.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/15/2022
12+
ms.date: 06/21/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -24,6 +24,8 @@ The OAuth 2.0 client credentials grant flow permits an app (confidential client)
2424

2525
In the client credentials flow, permissions are granted directly to the application itself by an administrator. When the app presents a token to a resource, the resource enforces that the app itself has authorization to perform an action since there's no user involved in the authentication. This article covers the steps needed to authorize an application to call an API, and how to get the tokens needed to call that API.
2626

27+
**This feature is in public preview.**
28+
2729
## App registration overview
2830

2931
To enable your app to sign in with client credentials and call a web API, you register two applications in the Azure AD B2C directory.
@@ -82,7 +84,17 @@ can't contain spaces. The following example demonstrates two app roles, read and
8284

8385
## Step 2. Register an application
8486

85-
To enable your app to sign in with Azure AD B2C using client credentials flow, register your applications (**App 1**). To create the web API app registration, follow these steps:
87+
To enable your app to sign in with Azure AD B2C using client credentials flow, you can use an existing application or register a new one (**App 1**).
88+
89+
If you're using an existing app, make sure the app's `accessTokenAcceptedVersion` is set to `2`:
90+
91+
1. In the Azure portal, search for and select **Azure AD B2C**.
92+
1. Select **App registrations**, and then select the your existing app from the list.
93+
1. In the left menu, under **Manage**, select **Manifest** to open the manifest editor.
94+
1. Locate the `accessTokenAcceptedVersion` element, and set its value to `2`.
95+
1. At the top of the page, select **Save** to save the changes.
96+
97+
To create a new web app registration, follow these steps:
8698

8799
1. In the Azure portal, search for and select **Azure AD B2C**
88100
1. Select **App registrations**, and then select **New registration**.
@@ -178,7 +190,7 @@ $appId = "<client ID>"
178190
$secret = "<client secret>"
179191
$endpoint = "https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/<policy>/oauth2/v2.0/token"
180192
$scope = "<Your API id uri>/.default"
181-
$body = "granttype=client_credentials&scope=" + $scope + "&client_id=" + $appId + "&client_secret=" + $secret
193+
$body = "grant_type=client_credentials&scope=" + $scope + "&client_id=" + $appId + "&client_secret=" + $secret
182194
183195
$token = Invoke-RestMethod -Method Post -Uri $endpoint -Body $body
184196
```

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -270,11 +270,7 @@ The following template can be used to create a Conditional Access policy with di
270270

271271
## Template 3: Block locations with Conditional Access
272272

273-
With the location condition in Conditional Access, you can control access to your cloud apps based on the network location of a user. More information about the location condition in Conditional Access can be found in the article,
274-
[Using the location condition in a Conditional Access policy](../active-directory/conditional-access/location-condition.md
275-
276-
Configure Conditional Access through Azure portal or Microsoft Graph APIs to enable a Conditional Access policy blocking access to specific locations.
277-
For more information about the location condition in Conditional Access can be found in the article, [Using the location condition in a Conditional Access policy](../active-directory/conditional-access/location-condition.md)
273+
With the location condition in Conditional Access, you can control access to your cloud apps based on the network location of a user. Configure Conditional Access via the Azure portal or Microsoft Graph APIs to enable a Conditional Access policy blocking access to specific locations. For more information, see [Using the location condition in a Conditional Access policy](../active-directory/conditional-access/location-condition.md)
278274

279275
### Define locations
280276

0 commit comments

Comments
 (0)