Skip to content

Commit 1cf45cb

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into sdk
2 parents 6c3dcd0 + 09ccbc0 commit 1cf45cb

File tree

354 files changed

+5692
-2347
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

354 files changed

+5692
-2347
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2385,9 +2385,14 @@
23852385
},
23862386
{
23872387
"source_path_from_root": "/articles/aks/aks-ssh.md",
2388-
"redirect_url": "/azure/aks/ssh",
2388+
"redirect_url": "/azure/aks/node-access",
23892389
"redirect_document_id": true
23902390
},
2391+
{
2392+
"source_path_from_root": "/articles/aks/ssh.md",
2393+
"redirect_url": "/azure/aks/node-access",
2394+
"redirect_document_id": false
2395+
},
23912396
{
23922397
"source_path_from_root": "/articles/aks/windows-node-limitations.md",
23932398
"redirect_url": "/azure/aks/windows-faq",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -331,6 +331,8 @@
331331
displayName: TOTP, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
332332
- name: Partner integration
333333
items:
334+
- name: Transmit Security
335+
href: partner-bindid.md
334336
- name: BlokSec
335337
href: partner-bloksec.md
336338
- name: Haventec

articles/active-directory-b2c/configure-authentication-in-sample-node-web-app-with-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -151,10 +151,10 @@ Open your web app in a code editor such as Visual Studio Code. Under the `call-p
151151
|---------|---------|
152152
|`APP_CLIENT_ID`|The **Application (client) ID** for the web app you registered in [step 2.3](#step-23-register-the-web-app). |
153153
|`APP_CLIENT_SECRET`|The client secret for the web app you created in [step 2.4](#step-24-create-a-client-secret) |
154-
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority for the user flow you created in [step 1](#step-1-configure-your-user-flow) such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi_node_app`. Learn how to [Get your tenant name](tenant-management.md#get-your-tenant-name). |
154+
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority for the user flow you created in [step 1](#step-1-configure-your-user-flow) such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`. Learn how to [Get your tenant name](tenant-management.md#get-your-tenant-name). |
155155
|`AUTHORITY_DOMAIN`| The Azure AD B2C authority domain such as `https://<your-tenant-name>.b2clogin.com`. Replace `<your-tenant-name>` with the name of your tenant.|
156156
|`APP_REDIRECT_URI`| The application redirect URI where Azure AD B2C will return authentication responses (tokens). It matches the **Redirect URI** you set while registering your app in Azure portal. This URL need to be publicly accessible. Leave the value as is.|
157-
|`LOGOUT_ENDPOINT`| The Azure AD B2C sign out endpoint such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>/oauth2/v2.0/logout?post_logout_redirect_uri=http://localhost:3000`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi_node_app`.|
157+
|`LOGOUT_ENDPOINT`| The Azure AD B2C sign out endpoint such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>/oauth2/v2.0/logout?post_logout_redirect_uri=http://localhost:3000`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`.|
158158

159159
After the update, your final configuration file should look similar to the following sample:
160160

@@ -186,7 +186,7 @@ To get the web API sample code, do one of the following:
186186
187187
- For `clientID`, use the **Application (Client) ID** for the web API you created in [step 2.1](#step-21-register-the-web-api-application).
188188
189-
- For `policyName`, use the name of the **Sing in and sign up** user flow you created in [step 1](#step-1-configure-your-user-flow) such as `B2C_1_susi_node_app`.
189+
- For `policyName`, use the name of the **Sing in and sign up** user flow you created in [step 1](#step-1-configure-your-user-flow) such as `B2C_1_susi`.
190190
191191
After the update, your code should look similar to the following sample:
192192
76.7 KB
Loading
5.14 KB
Loading

articles/active-directory-b2c/partner-bindid.md

Lines changed: 342 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/partner-experian.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The Experian integration includes the following components:
4747

4848
- Experian – The Experian service takes inputs provided by the user and verifies the user's identity
4949

50-
- Custom Rest API – This API implements the integration between Azure AD B2C and the Experian service.
50+
- Custom REST API – This API implements the integration between Azure AD B2C and the Experian service.
5151

5252
The following architecture diagram shows the implementation.
5353

@@ -87,7 +87,7 @@ The Experian API call is protected by a client certificate. This client certific
8787

8888
### Part 3 - Configure the API
8989

90-
Application settings can be [configured in the App service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the Rest API:
90+
Application settings can be [configured in the App service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the REST API:
9191

9292
| Application settings | Source | Notes |
9393
| :-------- | :------------| :-----------|

articles/active-directory-b2c/partner-gallery.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
4141

4242
| ISV partner | Description and integration walkthroughs |
4343
|:-------------------------|:--------------|
44+
|![Screenshot of a bindid logo](./media/partner-gallery/bindid-logo.png) | [Transmit Security's](./partner-bindid.md) solution BindID is a passwordless authentication service that uses strong FIDO2 biometric authentication for a reliable omni-channel authentication experience, which ensures a smooth login experience for customers across every device and channel eliminating fraud, phishing, and credential reuse. |
4445
| ![Screenshot of a bloksec logo](./media/partner-gallery/bloksec-logo.png) | [BlokSec](./partner-bloksec.md) is a passwordless authentication and tokenless MFA solution, which provides real-time consent-based services and protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks. |
4546
| ![Screenshot of a haventec logo](./media/partner-gallery/haventec-logo.png) | [Haventec](./partner-haventec.md) is a passwordless authentication provider, which provides decentralized identity platform that eliminates passwords, shared secrets, and friction. |
4647
| ![Screenshot of a hypr logo](./media/partner-gallery/hypr-logo.png) | [Hypr](./partner-hypr.md) is a passwordless authentication provider, which replaces passwords with public key encryptions eliminating fraud, phishing, and credential reuse. |

articles/active-directory-b2c/partner-hypr.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To get started, you'll need:
2727

2828
- A HYPR cloud tenant, get a free [trial account](https://get.hypr.com/free-trial).
2929

30-
- A user's mobile device registered using the HYPR Rest APIs or the HYPR Device Manager in your HYPR tenant. For example, you can use the [HYPR Java SDK](https://docs.hypr.com/integratinghypr/docs/hypr-java-web-sdk) to accomplish this task.
30+
- A user's mobile device registered using the HYPR REST APIs or the HYPR Device Manager in your HYPR tenant. For example, you can use the [HYPR Java SDK](https://docs.hypr.com/integratinghypr/docs/hypr-java-web-sdk) to accomplish this task.
3131

3232
## Scenario description
3333

@@ -39,7 +39,7 @@ The HYRP integration includes the following components:
3939

4040
- The HYPR mobile app - The HYPR mobile app can be used to execute this sample if prefer not to use the mobile SDKs in your own mobile applications.
4141

42-
- HYPR Rest APIs - You can use the HYPR APIs to do both user device registration and authentication. These APIs can be found [here](https://apidocs.hypr.com).
42+
- HYPR REST APIs - You can use the HYPR APIs to do both user device registration and authentication. These APIs can be found [here](https://apidocs.hypr.com).
4343

4444
The following architecture diagram shows the implementation.
4545

articles/active-directory-b2c/partner-idology.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The IDology integration includes the following components:
3131

3232
- Azure AD B2C – The authorization server responsible for verifying the user’s credentials. It's also known as the identity provider.
3333
- IDology – The IDology service takes input provided by the user and verifies the user’s identity.
34-
- Custom Rest API – This API implements the integration between Azure AD and the IDology service.
34+
- Custom REST API – This API implements the integration between Azure AD and the IDology service.
3535

3636
The following architecture diagram shows the implementation.
3737

@@ -69,7 +69,7 @@ You'll need the URL of the deployed service to configure Azure AD with the requi
6969

7070
### Part 2 - Configure the API
7171

72-
Application settings can be [configured in App Service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the Rest API:
72+
Application settings can be [configured in App Service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the REST API:
7373

7474
| Application settings | Source | Notes |
7575
| :-------- | :------------| :-----------|

0 commit comments

Comments
 (0)