Skip to content

Commit 1b41411

Browse files
authored
Merge pull request #2 from MicrosoftDocs/master
syncing with master.
2 parents ed3facb + 2278a7f commit 1b41411

File tree

4,476 files changed

+51645
-27487
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,476 files changed

+51645
-27487
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -329,6 +329,11 @@
329329
"url": "https://github.com/Azure/MachineLearningNotebooks",
330330
"branch": "sdk-codetest"
331331
},
332+
{
333+
"path_to_root": "azureml-examples-main",
334+
"url": "https://github.com/azure/azureml-examples",
335+
"branch": "main"
336+
},
332337
{
333338
"path_to_root": "samples-qnamaker-nodejs",
334339
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-nodejs",

.openpublishing.redirection.json

Lines changed: 388 additions & 22 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.media-services.json

Lines changed: 130 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -179,6 +179,136 @@
179179
"source_path_from_root": "/articles/media-services/latest/job-state-events-cli-how-to.md",
180180
"redirect_url": "monitoring/job-state-events-cli-how-to",
181181
"redirect_document_id": false
182+
},
183+
{
184+
"source_path_from_root": "/articles/media-services/latest/media-services-account-concept.md",
185+
"redirect_url": "account-create-how-to",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path_from_root": "/articles/media-services/latest/analyze-videos-tutorial-with-api.md",
190+
"redirect_url": "analyze-videos-tutorial",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path_from_root": "/articles/media-services/latest/analyzing-video-audio-files-concept.md",
195+
"redirect_url": "analyze-video-audio-files-concept",
196+
"redirect_document_id": false
197+
},
198+
{
199+
"source_path_from_root": "/articles/media-services/latest/architectures-concept.md",
200+
"redirect_url": "architecture-concept",
201+
"redirect_document_id": false
202+
},
203+
{
204+
"source_path_from_root": "/articles/media-services/latest/design-multi-drm-system-with-access-control.md",
205+
"redirect_url": "architecture-design-multi-drm-system",
206+
"redirect_document_id": false
207+
},
208+
{
209+
"source_path_from_root": "/articles/media-services/latest/media-services-high-availability-encoding.md",
210+
"redirect_url": "architecture-high-availability-encoding-concept",
211+
"redirect_document_id": false
212+
},
213+
{
214+
"source_path_from_root": "/articles/media-services/latest/cli-publish-asset.md",
215+
"redirect_url": "asset-publish-cli-how-to",
216+
"redirect_document_id": false
217+
},
218+
{
219+
"source_path_from_root": "/articles/media-services/latest/how-to-create-asset.md",
220+
"redirect_url": "asset-create-asset-how-to",
221+
"redirect_document_id": false
222+
},
223+
{
224+
"source_path_from_root": "/articles/media-services/latest/how-to-upload-media.md",
225+
"redirect_url": "asset-create-asset-upload-portal-quickstart",
226+
"redirect_document_id": false
227+
},
228+
{
229+
"source_path_from_root": "/articles/media-services/latest/manage-assets-quickstart.md",
230+
"redirect_url": "asset-upload-media-how-to",
231+
"redirect_document_id": false
232+
},
233+
{
234+
"source_path_from_root": "/articles/media-services/latest/azure-ad-content-protection.md",
235+
"redirect_url": "architecture-azure-ad-content-protection",
236+
"redirect_document_id": false
237+
},
238+
{
239+
"source_path_from_root": "/articles/media-services/latest/create-account-howto.md",
240+
"redirect_url": "account-create-how-to",
241+
"redirect_document_id": false
242+
},
243+
{
244+
"source_path_from_root": "/articles/media-services/cli-reset-account-credentials.md",
245+
"redirect_url": "asset-reset-account-credentials",
246+
"redirect_document_id": false
247+
},
248+
{
249+
"source_path_from_root": "/articles/media-services/latest/concept-compliance.md",
250+
"redirect_url": "compliance-concept",
251+
"redirect_document_id": false
252+
},
253+
{
254+
"source_path_from_root": "/articles/media-services/latest/content-key-policy-concept.md",
255+
"redirect_url": "drm-content-key-policy-concept",
256+
"redirect_document_id": false
257+
},
258+
{
259+
"source_path_from_root": "/articles/media-services/latest/content-protection-overview.md",
260+
"redirect_url": "drm-content-protection-concept",
261+
"redirect_document_id": false
262+
},
263+
{
264+
"source_path_from_root": "/articles/media-services/latest/encrypt-content-quickstart.md",
265+
"redirect_url": "drm-encrypt-content-how-to",
266+
"redirect_document_id": false
267+
},
268+
{
269+
"source_path_from_root": "/articles/media-services/latest/fairplay-license-overview.md",
270+
"redirect_url": "drm-fairplay-license-overview",
271+
"redirect_document_id": false
272+
},
273+
{
274+
"source_path_from_root": "/articles/media-services/latest/get-content-key-policy-dotnet-howto.md",
275+
"redirect_url": "drm-get-content-key-policy-dotnet-how-to",
276+
"redirect_document_id": false
277+
},
278+
{
279+
"source_path_from_root": "/articles/media-services/latest/offline-fairplay-for-ios.md",
280+
"redirect_url": "drm-offline-fairplay-for-ios-concept",
281+
"redirect_document_id": false
282+
},
283+
{
284+
"source_path_from_root": "/articles/media-services/latest/offline-plaready-streaming-for-windows-10.md",
285+
"redirect_url": "drm-offline-playready-streaming-for-windows-10",
286+
"redirect_document_id": false
287+
},
288+
{
289+
"source_path_from_root": "/articles/media-services/latest/offline-widevine-for-android.md",
290+
"redirect_url": "drm-offline-widevine-for-android",
291+
"redirect_document_id": false
292+
},
293+
{
294+
"source_path_from_root": "/articles/media-services/latest/playready-license-template-overview.md",
295+
"redirect_url": "drm-playready-license-template-concept",
296+
"redirect_document_id": false
297+
},
298+
{
299+
"source_path_from_root": "/articles/media-services/latest/protect-with-aes128.md",
300+
"redirect_url": "drm-protect-with-aes128-tutorial",
301+
"redirect_document_id": false
302+
},
303+
{
304+
"source_path_from_root": "/articles/media-services/latest/protect-with-drm.md",
305+
"redirect_url": "drm-protect-with-drm-tutorial",
306+
"redirect_document_id": false
307+
},
308+
{
309+
"source_path_from_root": "/articles/media-services/latest/widevine-license-template-overview.md",
310+
"redirect_url": "drm-widevine-license-template-concept",
311+
"redirect_document_id": false
182312
}
183313
]
184314
}

articles/active-directory-b2c/TOC.yml

Lines changed: 50 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -179,6 +179,8 @@
179179
href: identity-provider-google.md
180180
- name: ID.me
181181
href: identity-provider-id-me.md
182+
- name: itsme
183+
href: partner-itsme.md
182184
- name: LinkedIn
183185
href: identity-provider-linkedin.md
184186
- name: Microsoft Account
@@ -220,8 +222,25 @@
220222
- name: Disable email verification
221223
href: disable-email-verification.md
222224
- name: Enable MFA
223-
href: multi-factor-authentication.md
224-
displayName: multi-factor auth
225+
items:
226+
- name: Multi-factor authentication
227+
href: multi-factor-authentication.md
228+
- name: Partner integration
229+
items:
230+
- name: HYPR
231+
href: partner-hypr.md
232+
- name: Keyless
233+
href: partner-keyless.md
234+
- name: Nevis
235+
href: partner-nevis.md
236+
- name: Trusona
237+
href: partner-trusona.md
238+
- name: Twilio
239+
href: partner-twilio.md
240+
- name: TypingDNA
241+
href: partner-typingdna.md
242+
- name: WhoIAM
243+
href: partner-whoiam.md
225244
- name: Set up direct sign-in
226245
href: direct-signin.md
227246
- name: Tokens and session management
@@ -383,46 +402,39 @@
383402
items:
384403
- name: Azure AD B2C partner gallery
385404
href: partner-gallery.md
386-
- name: Arkose Labs
387-
href: partner-arkose-labs.md
405+
- name: Identity verification and proofing
406+
items:
407+
- name: Identity verification and proofing partners
408+
href: identity-verification-proofing.md
409+
displayName: id verify, id verification, azure ad b2c proofing, id proofing
388410
- name: Experian
389411
href: partner-experian.md
390-
- name: HYPR
391-
href: partner-hypr.md
392412
- name: IDology
393413
href: partner-idology.md
394-
- name: itsme
395-
href: partner-itsme.md
396414
- name: Jumio
397415
href: partner-jumio.md
398-
- name: Keyless
399-
href: partner-keyless.md
400416
- name: LexisNexis
401417
href: partner-lexisnexis.md
402-
- name: Microsoft Dynamics 365 Fraud Protection
403-
href: partner-dynamics-365-fraud-protection.md
404-
- name: N8 Identity
405-
href: partner-n8identity.md
406-
- name: Nevis
407-
href: partner-nevis.md
408418
- name: Onfido
409419
href: partner-onfido.md
420+
- name: Fraud protection
421+
items:
422+
- name: Microsoft Dynamics 365 Fraud Protection
423+
href: partner-dynamics-365-fraud-protection.md
424+
displayName: m365 dynamics, dynamics fraud protection, fraud, 365 protection
425+
- name: Arkose Labs
426+
href: partner-arkose-labs.md
427+
displayName: fraud protection, fraud, Azure AD b2c, protection, B2Cprotection
428+
- name: Secure legacy and on-premises apps
429+
items:
410430
- name: Ping Identity
411431
href: partner-ping-identity.md
412-
- name: Saviynt
413-
href: partner-saviynt.md
414432
- name: Strata
415433
href: partner-strata.md
416-
- name: Trusona
417-
href: partner-trusona.md
418-
- name: Twilio
419-
href: partner-twilio.md
420-
- name: TypingDNA
421-
href: partner-typingdna.md
422-
- name: WhoIAM
423-
href: partner-whoiam.md
434+
displayName: AAD b2c access, legacy app, onpremises apps
424435
- name: Zscaler
425436
href: partner-zscaler.md
437+
displayName: zscaler b2c, vpn, sdp b2c
426438
- name: Domain name
427439
items:
428440
- name: b2clogin.com overview
@@ -443,9 +455,17 @@
443455
- name: Manage policies with PowerShell
444456
href: manage-custom-policies-powershell.md
445457
displayName: scripting, scripts, psh, custom policy
446-
- name: Manage users - Azure portal
447-
href: manage-users-portal.md
448-
displayName: create users, add users, delete users
458+
- name: Manage users
459+
items:
460+
- name: Azure portal
461+
href: manage-users-portal.md
462+
displayName: create users, add users, delete users
463+
- name: Partner integration
464+
items:
465+
- name: N8identity
466+
href: partner-n8identity.md
467+
- name: Saviynt
468+
href: partner-saviynt.md
449469
- name: Secure API Management API
450470
href: secure-api-management.md
451471
displayName: apim, api management, migrate, b2clogin.com
@@ -496,6 +516,7 @@
496516
href: custom-policy-developer-notes.md
497517
- name: Page layout versions
498518
href: page-layout.md
519+
displayName: Page version
499520
- name: Region availability & data residency
500521
href: data-residency.md
501522
- name: Build for resilience

articles/active-directory-b2c/add-api-connector.md

Lines changed: 16 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory-b2c
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: how-to
8-
ms.date: 10/15/2020
8+
ms.date: 03/24/2021
99

1010
ms.author: mimart
1111
author: msmimart
@@ -47,14 +47,24 @@ HTTP basic authentication is defined in [RFC 2617](https://tools.ietf.org/html/r
4747
> [!IMPORTANT]
4848
> This functionality is in preview and is provided without a service-level agreement. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
4949
50-
Client certificate authentication is a mutual certificate-based authentication, where the client provides a client certificate to the server to prove its identity. In this case, Azure AD B2C will use the certificate that you upload as part of the API connector configuration. This happens as a part of the SSL handshake. Only services that have proper certificates can access your REST API service. The client certificate is an X.509 digital certificate. In production environments, it should be signed by a certificate authority.
50+
Client certificate authentication is a mutual certificate-based authentication method where the client provides a client certificate to the server to prove its identity. In this case, Azure AD B2C will use the certificate that you upload as part of the API connector configuration. This happens as a part of the SSL handshake. Your API service can then limit access to only services that have proper certificates. The client certificate is an PKCS12 (PFX) X.509 digital certificate. In production environments, it should be signed by a certificate authority.
5151

52+
To create a certificate, you can use [Azure Key Vault](../key-vault/certificates/create-certificate.md), which has options for self-signed certificates and integrations with certificate issuer providers for signed certificates. Recommended settings include:
53+
- **Subject**: `CN=<yourapiname>.<tenantname>.onmicrosoft.com`
54+
- **Content Type**: `PKCS #12`
55+
- **Lifetime Acton Type**: `Email all contacts at a given percentage lifetime` or `Email all contacts a given number of days before expiry`
56+
- **Key Type**: `RSA`
57+
- **Key Size**: `2048`
58+
- **Exportable Private Key**: `Yes` (in order to be able to export pfx file)
5259

53-
To create a certificate, you can use [Azure Key Vault](../key-vault/certificates/create-certificate.md), which has options for self-signed certificates and integrations with certificate issuer providers for signed certificates. You can then [export the certificate](../key-vault/certificates/how-to-export-certificate.md) and upload it for use in the API connectors configuration. Note that password is only required for certificate files protected by a password. You can also use PowerShell's [New-SelfSignedCertificate cmdlet](./secure-rest-api.md#prepare-a-self-signed-certificate-optional) to generate a self-signed certificate.
60+
You can then [export the certificate](../key-vault/certificates/how-to-export-certificate.md). You can alternatively use PowerShell's [New-SelfSignedCertificate cmdlet](../active-directory-b2c/secure-rest-api.md#prepare-a-self-signed-certificate-optional) to generate a self-signed certificate.
5461

55-
For Azure App Service and Azure Functions, see [configure TLS mutual authentication](../app-service/app-service-web-configure-tls-mutual-auth.md) to learn how to enable and validate the certificate from your API endpoint.
62+
After you have a certificate, you can then upload it as part of the API connector configuration. Note that password is only required for certificate files protected by a password.
5663

57-
It's recommended you set reminder alerts for when your certificate will expire. To upload a new certificate to an existing API connector, select the API connector under **API connectors (preview)** and click on **Upload new certificate**. The most recently uploaded certificate which is not expired and is past the start date will be used automatically by Azure AD B2C.
64+
Your API must implement the authorization based on sent client certificates in order to protect the API endpoints. For Azure App Service and Azure Functions, see [configure TLS mutual authentication](../app-service/app-service-web-configure-tls-mutual-auth.md) to learn how to enable and *validate the certificate from your API code*. You can also use Azure API Management to [check client certificate properties](
65+
../api-management/api-management-howto-mutual-certificates-for-clients.md) against desired values using policy expressions.
66+
67+
It's recommended you set reminder alerts for when your certificate will expire. You will need to generate a new certificate and repeat the steps above. Your API service can temporarily continue to accept old and new certificates while the new certificate is deployed. To upload a new certificate to an existing API connector, select the API connector under **API connectors** and click on **Upload new certificate**. The most recently uploaded certificate which is not expired and is past the start date will automatically be used by Azure Active Directory.
5868

5969
### API Key
6070
Some services use an "API key" mechanism to obfuscate access to your HTTP endpoints during development. For [Azure Functions](../azure-functions/functions-bindings-http-webhook-trigger.md#authorization-keys), you can accomplish this by including the `code` as a query parameter in the **Endpoint URL**. For example, `https://contoso.azurewebsites.net/api/endpoint`<b>`?code=0123456789`</b>).
@@ -298,7 +308,7 @@ Content-type: application/json
298308
| ----------- | ------- | -------- | -------------------------------------------------------------------------- |
299309
| version | String | Yes | The version of your API. |
300310
| action | String | Yes | Value must be `ValidationError`. |
301-
| status | Integer | Yes | Must be value `400` for a ValidationError response. |
311+
| status | Integer / String | Yes | Must be value `400`, or `"400"` for a ValidationError response. |
302312
| userMessage | String | Yes | Message to display to the user. |
303313

304314
> [!NOTE]

articles/active-directory-b2c/add-password-change-policy.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/17/2020
12+
ms.date: 03/22/2021
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -19,22 +19,23 @@ zone_pivot_groups: b2c-policy-type
1919

2020
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2121

22-
::: zone pivot="b2c-user-flow"
22+
In Azure Active Directory B2C (Azure AD B2C), you can enable users who are signed in with a local account to change their password without having to prove their identity through email verification. The password change flow involves following steps:
2323

24-
[!INCLUDE [active-directory-b2c-limited-to-custom-policy](../../includes/active-directory-b2c-limited-to-custom-policy.md)]
24+
1. The user signs in to their local account. If the session is still active, Azure AD B2C authorizes the user and skips to the next step.
25+
1. The user verifies the **Old password**, and then creates and confirms the **New password**.
2526

26-
::: zone-end
27+
![Password change flow](./media/add-password-change-policy/password-change-flow.png)
2728

28-
::: zone pivot="b2c-custom-policy"
29+
> [!TIP]
30+
> The password change flow allows users to change their password only when the user knows their password and wants to change it. We recommend you to also enable [self-service password reset](add-password-reset-policy.md) to support cases where the user forgets their password.
2931
30-
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
32+
::: zone pivot="b2c-user-flow"
3133

32-
In Azure Active Directory B2C (Azure AD B2C), you can enable users who are signed in with a local account to change their password without having to prove their authenticity by email verification. The password change flow involves following steps:
34+
[!INCLUDE [active-directory-b2c-limited-to-custom-policy](../../includes/active-directory-b2c-limited-to-custom-policy.md)]
3335

34-
1. Sign-in with a local account. If the session is still active, Azure AD B2C authorizes the user, and skips to the next step.
35-
1. Users must verify the **old password**, create, and confirm the **new password**.
36+
::: zone-end
3637

37-
![Password change flow](./media/add-password-change-policy/password-change-flow.png)
38+
::: zone pivot="b2c-custom-policy"
3839

3940
## Prerequisites
4041

0 commit comments

Comments
 (0)