Skip to content

Commit 1c4cb1e

Browse files
committed
Merge branch 'release-accelerators-edge-rm' of https://github.com/Microsoft/azure-docs-pr into release-accelerators-edge-rm
2 parents 3c00fe3 + a0023aa commit 1c4cb1e

File tree

10,011 files changed

+112816
-80318
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

10,011 files changed

+112816
-80318
lines changed

.github/CODEOWNERS

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,19 @@
66
# articles/application-insights/ @SergeyKanzhelev
77
# articles/cosmos-db/ @mimig1
88

9+
# All Articles
910
articles/ @apex-docs-pr-reviewers
11+
12+
# Cognitive Services
1013
articles/cognitive-services/ @nitinme @tchristiani @cjgronlund
14+
articles/cognitive-services/LUIS/ @cjgronlund @nitinme @diberry
15+
articles/cognitive-services/Speaker-recognition/ @cjgronlund @nitinme @erhopf
16+
articles/cognitive-services/Speech-Service/ @cjgronlund @nitinme @erhopf
17+
articles/cognitive-services/Translator/ @cjgronlund @nitinme @erhopf
18+
articles/cognitive-services/QnAMaker/ @cjgronlund @nitinme @diberry
19+
20+
# DevOps
21+
1122
articles/ansible/ @TomArcher
1223
articles/chef/ @TomArcher
1324
articles/jenkins/ @TomArcher

.github/CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ This guide covers some general topics around contribution and refers out to our
77
## Code of Conduct
88

99
This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
10-
For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [[email protected]](mailto:[email protected]) with any additional questions or comments.
10+
For more information, see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/), or contact [[email protected]](mailto:[email protected]) with any additional questions or comments.
1111

1212
## How can I contribute?
1313

.openpublishing.publish.config.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -212,11 +212,41 @@
212212
"branch": "master",
213213
"branch_mapping": {}
214214
},
215+
{
216+
"path_to_root": "remote-monitoring-webui",
217+
"url": "https://github.com/Azure/pcs-remote-monitoring-webui.git",
218+
"branch": "master",
219+
"branch_mapping": {}
220+
},
215221
{
216222
"path_to_root": "samples-qnamaker-nodejs",
217223
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-nodejs",
218224
"branch": "master",
219225
"branch_mapping": {}
226+
},
227+
{
228+
"path_to_root": "samples-qnamaker-go",
229+
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-go",
230+
"branch": "master",
231+
"branch_mapping": {}
232+
},
233+
{
234+
"path_to_root": "samples-qnamaker-csharp",
235+
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-csharp",
236+
"branch": "master",
237+
"branch_mapping": {}
238+
},
239+
{
240+
"path_to_root": "samples-qnamaker-java",
241+
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-java",
242+
"branch": "master",
243+
"branch_mapping": {}
244+
},
245+
{
246+
"path_to_root": "samples-qnamaker-python",
247+
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-python",
248+
"branch": "master",
249+
"branch_mapping": {}
220250
}
221251
],
222252
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 975 additions & 218 deletions
Large diffs are not rendered by default.

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ Contributing to open source is more than just providing updates, it's also letti
88

99
### Prerequisites
1010

11-
You've decided to provide a contribution, that's great! There are a few tools which are needed to contribute to the documentation.
11+
You've decided to contribute, that's great! To contribute to the documentation, you need a few tools.
1212

13-
Contributing to the documentation requires a GitHub account, if you don't have an account, follow the instructions for [GitHub account setup](https://docs.microsoft.com/contribute/get-started-setup-github) from our contributor guide.
13+
Contributing to the documentation requires a GitHub account. If you don't have an account, follow the instructions for [GitHub account setup](https://docs.microsoft.com/contribute/get-started-setup-github) from our contributor guide.
1414

1515
#### Download
1616

@@ -31,4 +31,4 @@ Please refer to [LICENSE](.github/LICENSE), [LICENSE-CODE](.github/LICENSE-CODE)
3131
## Code of Conduct
3232

3333
This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
34-
For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [[email protected]](mailto:[email protected]) with any additional questions or comments.
34+
For more information, see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [[email protected]](mailto:[email protected]) with any additional questions or comments.

articles/active-directory-b2c/TOC.yml

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@
3434
href: active-directory-b2c-tutorials-desktop-app-webapi.md
3535
- name: Single page
3636
href: active-directory-b2c-tutorials-spa-webapi.md
37+
- name: Customize the UI
38+
href: tutorial-customize-ui.md
3739
- name: Samples
3840
href: code-samples.md
3941
- name: Concepts
@@ -62,6 +64,8 @@
6264
href: active-directory-b2c-reference-tokens.md
6365
- name: User accounts
6466
href: user-overview.md
67+
- name: User interface customization
68+
href: customize-ui-overview.md
6569
- name: How-to guides
6670
items:
6771
- name: Access audit logs
@@ -72,11 +76,6 @@
7276
href: active-directory-b2c-reference-language-customization.md
7377
- name: Customize password
7478
href: active-directory-b2c-reference-password-complexity.md
75-
- name: Customize user interface
76-
href: active-directory-b2c-reference-ui-customization.md
77-
items:
78-
- name: Helper tool for customization
79-
href: active-directory-b2c-reference-ui-customization-helper-tool.md
8079
- name: Define custom attributes
8180
href: active-directory-b2c-reference-custom-attr.md
8281
- name: Disable email verification
@@ -103,6 +102,8 @@
103102
href: active-directory-b2c-custom-rest-api-netfw-secure-cert.md
104103
- name: OIDC/OAUTH providers
105104
items:
105+
- name: Amazon
106+
href: setup-amazon-custom.md
106107
- name: Azure AD (Single-Tenant)
107108
href: active-directory-b2c-setup-aad-custom.md
108109
- name: Azure AD (Multi-Tenant)
@@ -141,6 +142,8 @@
141142
href: active-directory-b2c-reference-kmsi-custom.md
142143
- name: Reference
143144
items:
145+
- name: Claim resolvers
146+
href: claim-resolver-overview.md
144147
- name: Identity Experience Framework schema
145148
items:
146149
- name: TrustFrameworkPolicy

articles/active-directory-b2c/active-directory-b2c-access-tokens.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.component: B2C
1515
---
1616
# Azure AD B2C: Requesting access tokens
1717

18-
An access token (denoted as **access\_token** in the responses from Azure AD B2C) is a form of security token that a client can use to access resources that are secured by an [authorization server](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-reference-protocols#the-basics), such as a web API. Access tokens are represented as [JWTs](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-reference-tokens#types-of-tokens) and contain information about the intended resource server and the granted permissions to the server. When calling the resource server, the access token must be present in the HTTP request.
18+
An access token (denoted as **access\_token** in the responses from Azure AD B2C) is a form of security token that a client can use to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md), such as a web API. Access tokens are represented as [JWTs](active-directory-b2c-reference-tokens.md) and contain information about the intended resource server and the granted permissions to the server. When calling the resource server, the access token must be present in the HTTP request.
1919

2020
This article discusses how to configure a client application and web API in order to obtain an **access\_token**.
2121

@@ -33,22 +33,22 @@ Before requesting an access token, you first need to register a web API and publ
3333
### Register a web API
3434

3535
1. On the Azure AD B2C features menu on the Azure portal, click **Applications**.
36-
1. Click **+Add** at the top of the menu.
37-
1. Enter a **Name** for the application that will describe your application to consumers. For example, you could enter "Contoso API".
38-
1. Toggle the **Include web app / web API** switch to **Yes**.
39-
1. Enter an arbitrary value for the **Reply URLs**. For example, enter `https://localhost:44316/`. The value does not matter since an API should not be receiving the token directly from Azure AD B2C.
40-
1. Enter an **App ID URI**. This is the identifier used for your web API. For example, enter 'notes' in the box. The **App ID URI** would then be `https://{tenantName}.onmicrosoft.com/notes`.
41-
1. Click **Create** to register your application.
42-
1. Click the application that you just created and copy down the globally unique **Application Client ID** that you'll use later in your code.
36+
2. Click **+Add** at the top of the menu.
37+
3. Enter a **Name** for the application that will describe your application to consumers. For example, you could enter "Contoso API".
38+
4. Toggle the **Include web app / web API** switch to **Yes**.
39+
5. Enter an arbitrary value for the **Reply URLs**. For example, enter `https://localhost:44316/`. The value does not matter since an API should not be receiving the token directly from Azure AD B2C.
40+
6. Enter an **App ID URI**. This is the identifier used for your web API. For example, enter 'notes' in the box. The **App ID URI** would then be `https://{tenantName}.onmicrosoft.com/notes`.
41+
7. Click **Create** to register your application.
42+
8. Click the application that you just created and copy down the globally unique **Application Client ID** that you'll use later in your code.
4343

4444
### Publishing permissions
4545

4646
Scopes, which are analogous to permissions, are necessary when your app is calling an API. Some examples of scopes are "read" or "write". Suppose you want your web or native app to "read" from an API. Your app would call Azure AD B2C and request an access token that gives access to the scope "read". In order for Azure AD B2C to emit such an access token, the app needs to be granted permission to "read" from the specific API. To do this, your API first needs to publish the "read" scope.
4747

4848
1. Within the Azure AD B2C **Applications** menu, open the web API application ("Contoso API").
49-
1. Click on **Published scopes**. This is where you define the permissions (scopes) that can be granted to other applications.
50-
1. Add **Scope Values** as necessary (for example, "read"). By default, the "user_impersonation" scope will be defined. You can ignore this if you wish. Enter a description of the scope in the **Scope Name** column.
51-
1. Click **Save**.
49+
2. Click on **Published scopes**. This is where you define the permissions (scopes) that can be granted to other applications.
50+
3. Add **Scope Values** as necessary (for example, "read"). By default, the "user_impersonation" scope will be defined. You can ignore this if you wish. Enter a description of the scope in the **Scope Name** column.
51+
4. Click **Save**.
5252

5353
> [!IMPORTANT]
5454
> The **Scope Name** is the description of the **Scope Value**. When using the scope, make sure to use the **Scope Value**.
@@ -58,11 +58,11 @@ Scopes, which are analogous to permissions, are necessary when your app is calli
5858
Once an API is configured to publish scopes, the client application needs to be granted those scopes via the Azure portal.
5959

6060
1. Navigate to the **Applications** menu in the Azure AD B2C features menu.
61-
1. Register a client application ([web app](active-directory-b2c-app-registration.md#register-a-web-app) or [native client](active-directory-b2c-app-registration.md#register-a-mobile-or-native-app)) if you don’t have one already. If you are following this guide as your starting point, you'll need to register a client application.
62-
1. Click on **API access**.
63-
1. Click on **Add**.
64-
1. Select your web API and the scopes (permissions) you would like to grant.
65-
1. Click **OK**.
61+
2. Register a client application ([web app](active-directory-b2c-app-registration.md) or [native client](active-directory-b2c-app-registration.md)) if you don’t have one already. If you are following this guide as your starting point, you'll need to register a client application.
62+
3. Click on **API access**.
63+
4. Click on **Add**.
64+
5. Select your web API and the scopes (permissions) you would like to grant.
65+
6. Click **OK**.
6666

6767
> [!NOTE]
6868
> Azure AD B2C does not ask your client application users for their consent. Instead, all consent is provided by the admin, based on the permissions configured between the applications described above. If a permission grant for an application is revoked, all users who were previously able to acquire that permission will no longer be able to do so.

0 commit comments

Comments
 (0)