Skip to content

Commit 1aed68a

Browse files
authored
Merge pull request #18 from MicrosoftDocs/master
update fork
2 parents dd0d270 + 28e8c26 commit 1aed68a

File tree

1,353 files changed

+15417
-5203
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,353 files changed

+15417
-5203
lines changed

.openpublishing.redirection.json

Lines changed: 46 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4547,7 +4547,7 @@
45474547
},
45484548
{
45494549
"source_path": "articles/active-directory-ds/active-directory-ds-admin-guide-administer-dns.md",
4550-
"redirect_url": "/azure/active-directory-domain-services/active-directory-ds-admin-guide-administer-dns",
4550+
"redirect_url": "/azure/active-directory-domain-services/tutorial-create-instance#update-dns-settings-for-the-azure-virtual-network",
45514551
"redirect_document_id": false
45524552
},
45534553
{
@@ -36168,6 +36168,46 @@
3616836168
"redirect_url": "/azure/key-vault/vs-key-vault-add-connected-service",
3616936169
"redirect_document_id": false
3617036170
},
36171+
{
36172+
"source_path": "articles/iot-central/core/howto-create-event-rules-pnp.md",
36173+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36174+
"redirect_document_id": false
36175+
},
36176+
{
36177+
"source_path": "articles/iot-central/core/howto-create-telemetry-rules-pnp.md",
36178+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36179+
"redirect_document_id": false
36180+
},
36181+
{
36182+
"source_path": "articles/iot-central/core/tutorial-configure-rules-pnp.md",
36183+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36184+
"redirect_document_id": false
36185+
},
36186+
{
36187+
"source_path": "articles/iot-central/core/tutorial-monitor-devices-pnp.md",
36188+
"redirect_url": "/azure/iot-central/core/quick-monitor-devices-pnp",
36189+
"redirect_document_id": false
36190+
},
36191+
{
36192+
"source_path": "articles/iot-central/tutorial-add-device-pnp.md",
36193+
"redirect_url": "/azure/iot-central/quick-create-pnp-device-pnp",
36194+
"redirect_document_id": false
36195+
},
36196+
{
36197+
"source_path": "articles/iot-central/tutorial-define-device-type-pnp.md",
36198+
"redirect_url": "/azure/iot-central/quick-create-pnp-device-pnp",
36199+
"redirect_document_id": false
36200+
},
36201+
{
36202+
"source_path": "articles/iot-central/howto-export-data-blob-storage-pnp.md",
36203+
"redirect_url": "/azure/iot-central/howto-export-data-pnp",
36204+
"redirect_document_id": false
36205+
},
36206+
{
36207+
"source_path": "articles/iot-central/howto-export-data-event-hubs-service-bus-pnp.md",
36208+
"redirect_url": "/azure/iot-central/howto-export-data-pnp",
36209+
"redirect_document_id": false
36210+
},
3617136211
{
3617236212
"source_path": "articles/iot-central/howto-generate-connection-string.md",
3617336213
"redirect_url": "/azure/iot-central",
@@ -42073,6 +42113,11 @@
4207342113
"redirect_url": "/azure/active-directory-domain-services/tutorial-configure-password-hash-sync",
4207442114
"redirect_document_id": true
4207542115
},
42116+
{
42117+
"source_path": "articles/active-directory-domain-services/active-directory-ds-admin-guide-administer-dns.md",
42118+
"redirect_url": "/azure/active-directory-domain-services/tutorial-create-instance#update-dns-settings-for-the-azure-virtual-network",
42119+
"redirect_document_id": false
42120+
},
4207642121
{
4207742122
"source_path": "articles/media-services/previous/media-services-fmp4-live-ingest-overview.md",
4207842123
"redirect_url": "/azure/media-services/media-services-fmp4-live-ingest-overview",

articles/active-directory-b2c/active-directory-b2c-how-to-enable-billing.md

Lines changed: 85 additions & 45 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&sco
145145
| {tenant} | Yes | Name of your Azure AD B2C tenant |
146146
| {policy} | Yes | The user flow that was used to acquire the authorization code. You can't use a different user flow in this request. Add this parameter to the query string, not to the POST body. |
147147
| client_id | Yes | The application ID that the [Azure portal](https://portal.azure.com/) assigned to your application. |
148-
| client_secret | Yes | The application secret that was generated in the [Azure portal](https://portal.azure.com/). This application secret is an important security artifact. You should store it securely on your server. Change this client secret on a periodic basis. |
148+
| client_secret | Yes, in Web Apps | The application secret that was generated in the [Azure portal](https://portal.azure.com/). Client secrets are used in this flow for Web App scenarios, where the client can securely store a client secret. For Native App (public client) scenarios, client secrets cannot be securely stored, threfore not used on this flow. If using a client secret, please change it on a periodic basis. |
149149
| code | Yes | The authorization code that you acquired in the beginning of the user flow. |
150150
| grant_type | Yes | The type of grant, which must be `authorization_code` for the authorization code flow. |
151151
| redirect_uri | Yes | The `redirect_uri` parameter of the application where you received the authorization code. |
@@ -214,7 +214,7 @@ grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=op
214214
| {tenant} | Yes | Name of your Azure AD B2C tenant |
215215
| {policy} | Yes | The user flow that was used to acquire the original refresh token. You can't use a different user flow in this request. Add this parameter to the query string, not to the POST body. |
216216
| client_id | Yes | The application ID that the [Azure portal](https://portal.azure.com/) assigned to your application. |
217-
| client_secret | Yes | The application secret that was generated in the [Azure portal](https://portal.azure.com/). This application secret is an important security artifact. You should store it securely on your server. Change this client secret on a periodic basis. |
217+
| client_secret | Yes, in Web Apps | The application secret that was generated in the [Azure portal](https://portal.azure.com/). Client secrets are used in this flow for Web App scenarios, where the client can securely store a client secret. For Native App (public client) scenarios, client secrets cannot be securely stored, threfore not used on this call. If using a client secret, please change it on a periodic basis. |
218218
| grant_type | Yes | The type of grant, which must be a refresh token for this part of the authorization code flow. |
219219
| refresh_token | Yes | The original refresh token that was acquired in the second part of the flow. The `offline_access` scope must be used in both the authorization and token requests in order to receive a refresh token. |
220220
| redirect_uri | No | The `redirect_uri` parameter of the application where you received the authorization code. |

articles/active-directory-b2c/active-directory-b2c-tutorials-spa.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,9 @@ The sample supports sign-up, sign-in, profile editing, and password reset. This
111111
112112
### Sign up using an email address
113113
114+
> [!WARNING]
115+
> After sign-up or sign-in, you might see an [insufficient permissions error](#error-insufficient-permissions). Due to the code sample's current implementation, this error is expected. This issue will be resolved in a future version of the code sample, at which time this warning will be removed.
116+
114117
1. Select **Login** to initiate the *B2C_1_signupsignin1* user flow you specified in an earlier step.
115118
1. Azure AD B2C presents a sign-in page with a sign-up link. Since you don't yet have an account, select the **Sign up now** link.
116119
1. The sign-up workflow presents a page to collect and verify the user's identity using an email address. The sign-up workflow also collects the user's password and the requested attributes defined in the user flow.
@@ -127,15 +130,15 @@ You can now use your email address and password to sign in to the application.
127130
128131
### Error: insufficient permissions
129132
130-
After you sign in, the app displays an insufficient permissions error - this is **expected**:
133+
After you sign in, the application may return an insufficient permissions error:
131134
132135
```Output
133136
ServerError: AADB2C90205: This application does not have sufficient permissions against this web resource to perform the operation.
134137
Correlation ID: ce15bbcc-0000-0000-0000-494a52e95cd7
135138
Timestamp: 2019-07-20 22:17:27Z
136139
```
137140
138-
You receive this error because the web application is attempting to access a web API protected by the demo directory, *fabrikamb2c*. Because your access token is valid only for your Azure AD directory, the API call is therefore unauthorized.
141+
You receive this error because the web application is attempting to access a web API protected by the demo directory, *fabrikamb2c*. Because your access token is valid only for your Azure AD directory, the API call is unauthorized.
139142
140143
To fix this error, continue on to the next tutorial in the series (see [Next steps](#next-steps)) to create a protected web API for your directory.
141144
Loading
49.3 KB
Loading
Loading

0 commit comments

Comments
 (0)