Skip to content

Commit 201be94

Browse files
authored
Merge branch 'master' into adfupdate1211
2 parents d32b1fe + e4d9053 commit 201be94

File tree

1,561 files changed

+16750
-10325
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,561 files changed

+16750
-10325
lines changed

.openpublishing.redirection.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1610,6 +1610,11 @@
16101610
"redirect_url": "/azure/cosmos-db/create-sql-api-dotnet",
16111611
"redirect_document_id": false
16121612
},
1613+
{
1614+
"source_path": "articles/cosmos-db/spark-api-introduction.md",
1615+
"redirect_url": "/azure/cosmos-db/analytics-usecases",
1616+
"redirect_document_id": false
1617+
},
16131618
{
16141619
"source_path": "articles/cosmos-db/sql-api-python-application.md",
16151620
"redirect_url": "/azure/cosmos-db/create-sql-api-python",
@@ -23069,6 +23074,16 @@
2306923074
"redirect_url": "/azure/storage/common/storage-quickstart-create-account",
2307023075
"redirect_document_id": true
2307123076
},
23077+
{
23078+
"source_path": "articles/storage/common/storage-quickstart-create-account.md",
23079+
"redirect_url": "/azure/storage/common/storage-account-create",
23080+
"redirect_document_id": true
23081+
},
23082+
{
23083+
"source_path": "articles/storage/common/storage-account-manage.md",
23084+
"redirect_url": "/azure/storage/common/storage-account-keys-manage",
23085+
"redirect_document_id": true
23086+
},
2307223087
{
2307323088
"source_path": "articles/storage/common/storage-account-options.md",
2307423089
"redirect_url": "/azure/storage/common/storage-account-overview",
@@ -24649,6 +24664,11 @@
2464924664
"redirect_url": "/azure/storage/common/storage-security-guide",
2465024665
"redirect_document_id": true
2465124666
},
24667+
{
24668+
"source_path": "articles/storage/common/storage-security-guide.md",
24669+
"redirect_url": "/azure/storage/blobs/security-recommendations",
24670+
"redirect_document_id": true
24671+
},
2465224672
{
2465324673
"source_path": "articles/storage/storage-service-encryption-customer-managed-keys.md",
2465424674
"redirect_url": "/azure/storage/common/storage-service-encryption-customer-managed-keys",
@@ -39798,6 +39818,11 @@
3979839818
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/home",
3979939819
"redirect_document_id": false
3980039820
},
39821+
{
39822+
"source_path": "articles/cognitive-services/Custom-Vision-Service/move-your-project-to-azure.md",
39823+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/home",
39824+
"redirect_document_id": false
39825+
},
3980139826
{
3980239827
"source_path": "articles/data-catalog/data-catalog-prerequisites.md",
3980339828
"redirect_url": "/azure/data-catalog/data-catalog-get-started",
@@ -43972,6 +43997,16 @@
4397243997
"source_path": "articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-storage.md",
4397343998
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/overview",
4397443999
"redirect_document_id": false
44000+
},
44001+
{
44002+
"source_path": "articles/virtual-desktop/bandwidth-recommendations.md",
44003+
"redirect_url": "https://docs.microsoft.com/windows-server/remote/remote-desktop-services/network-guidance",
44004+
"redirect_document_id": false
44005+
},
44006+
{
44007+
"source_path": "articles/troubleshoot-client-connection.md",
44008+
"redirect_url": "/azure/virtual-desktop/troubleshoot-client",
44009+
"redirect_document_id": false
4397544010
}
4397644011
]
4397744012
}

articles/active-directory-b2c/TOC.yml

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,8 +76,11 @@
7676
items:
7777
- name: App integration
7878
items:
79-
- name: Register an application
79+
- name: Register an OIDC application
8080
href: tutorial-register-applications.md
81+
- name: Register a SAML service provider
82+
href: connect-with-saml-service-providers.md
83+
displayName: SP, RP, service provider, connect
8184
- name: Add a web API application
8285
href: add-web-application.md
8386
- name: Add a native client application
@@ -168,6 +171,9 @@
168171
href: active-directory-b2c-ui-customization-custom.md
169172
- name: Customize the UI dynamically
170173
href: active-directory-b2c-ui-customization-custom-dynamic.md
174+
- name: Custom email
175+
href: custom-email.md
176+
displayName: verification
171177
- name: Page layout
172178
href: page-layout.md
173179
- name: Enable JavaScript
@@ -196,8 +202,10 @@
196202
items:
197203
- name: ADFS
198204
href: active-directory-b2c-custom-setup-adfs2016-idp.md
205+
displayName: SAML
199206
- name: Salesforce
200207
href: active-directory-b2c-setup-sf-app-custom.md
208+
displayName: SAML
201209
- name: Tokens and session management
202210
items:
203211
- name: Customize tokens
@@ -289,6 +297,9 @@
289297
href: oauth1-technical-profile.md
290298
- name: OAuth2
291299
href: oauth2-technical-profile.md
300+
- name: One-time password
301+
href: one-time-password-technical-profile.md
302+
displayName: otp
292303
- name: OpenID Connect
293304
href: openid-connect-technical-profile.md
294305
- name: REST
@@ -301,6 +312,11 @@
301312
href: active-directory-b2c-reference-sso-custom.md
302313
- name: Validation
303314
href: validation-technical-profile.md
315+
- name: DisplayControls
316+
href: display-controls.md
317+
items:
318+
- name: Verification
319+
href: display-control-verification.md
304320
- name: UserJourneys
305321
href: userjourneys.md
306322
- name: RelyingParty

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,9 @@ The *Read and write directory data* permission that you granted earlier does **N
5959

6060
If you want to give your application the ability to delete users or update passwords, you need to grant it the *User administrator* role.
6161

62-
1. Sign in to the [Azure portal](https://portal.azure.com) and switch to the directory that contains your Azure AD B2C tenant.
63-
1. Select **Azure AD B2C** in the left menu. Or, select **All services** and then search for and select **Azure AD B2C**.
62+
1. Sign in to the [Azure portal](https://portal.azure.com).
63+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
64+
1. In the Azure portal, search for and select **Azure AD B2C**.
6465
1. Under **Manage**, select **Roles and administrators**.
6566
1. Select the **User administrator** role.
6667
1. Select **Add assignment**.

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,10 @@ ms.subservice: B2C
2727

2828
## Add signing and encryption keys
2929

30-
1. Sign in to the [Azure portal](https://portal.azure.com)
31-
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
32-
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
33-
1. On the Overview page, select **Identity Experience Framework** from the **Policies** pane.
30+
1. Sign in to the [Azure portal](https://portal.azure.com).
31+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
32+
1. In the Azure portal, search for and select **Azure AD B2C**.
33+
1. On the overview page, under **Policies**, select **Identity Experience Framework**.
3434

3535
### Create the signing key
3636

@@ -73,10 +73,9 @@ To register an application in your Azure AD B2C tenant, you can use the current
7373

7474
#### [Applications](#tab/applications/)
7575

76-
1. Select **All services** in the top-left corner of the Azure portal.
77-
1. In the search box, enter `Azure Active Directory`.
78-
1. Select **Azure Active Directory** in the search results.
79-
1. Under **Manage** in the left-hand menu, select **App registrations (Legacy)**.
76+
1. Sign in to the [Azure portal](https://portal.azure.com).
77+
1. In the Azure portal, search for and select **Azure Active Directory**.
78+
1. In the **Azure Active Directory** overview menu, under **Manage**, select **App registrations (Legacy)**.
8079
1. Select **New application registration**.
8180
1. For **Name**, enter `IdentityExperienceFramework`.
8281
1. For **Application type**, choose **Web app/API**.

articles/active-directory-b2c/active-directory-b2c-reference-password-complexity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,9 @@ If you are using custom policies, you can ([configure password complexity in a c
3434
## Configure password complexity
3535

3636
1. Sign in to the [Azure portal](https://portal.azure.com).
37-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
38-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
39-
4. Select **User flows**.
37+
2. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
38+
3. In the Azure portal, search for and select **Azure AD B2C**.
39+
4. Select **User flows (policies)**.
4040
2. Select a user flow, and click **Properties**.
4141
3. Under **Password complexity**, change the password complexity for this user flow to **Simple**, **Strong**, or **Custom**.
4242

articles/active-directory-b2c/active-directory-b2c-setup-qq-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,9 +43,9 @@ To use a QQ account as an identity provider in Azure Active Directory B2C (Azure
4343

4444
## Configure QQ as an identity provider
4545

46-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
47-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
48-
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
46+
1. Sign in to the [Azure portal](https://portal.azure.com/).
47+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
48+
1. In the Azure portal, search for and select **Azure AD B2C**.
4949
1. Select **Identity providers**, then select **QQ (Preview)**.
5050
1. Enter a **Name**. For example, *QQ*.
5151
1. For the **Client ID**, enter the APP ID of the QQ application that you created earlier.

articles/active-directory-b2c/b2clogin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ For migrating Azure API Management APIs protected by Azure AD B2C, see the [Migr
8989

9090
If you're using [MSAL.NET][msal-dotnet] v2 or earlier, set the **ValidateAuthority** property to `false` on client instantiation to allow redirects to *b2clogin.com*. This setting is not required for MSAL.NET v3 and above.
9191

92-
```CSharp
92+
```csharp
9393
ConfidentialClientApplication client = new ConfidentialClientApplication(...); // Can also be PublicClientApplication
9494
client.ValidateAuthority = false; // MSAL.NET v2 and earlier **ONLY**
9595
```

articles/active-directory-b2c/buildingblocks.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: BuildingBlocks - Azure Active Directory B2C | Microsoft Docs
2+
title: BuildingBlocks
3+
titleSuffix: Azure AD B2C
34
description: Specify the BuildingBlocks element of a custom policy in Azure Active Directory B2C.
45
services: active-directory-b2c
56
author: mmacy
@@ -8,7 +9,7 @@ manager: celestedg
89
ms.service: active-directory
910
ms.workload: identity
1011
ms.topic: reference
11-
ms.date: 09/10/2018
12+
ms.date: 12/10/2019
1213
ms.author: marsma
1314
ms.subservice: B2C
1415
---
@@ -48,26 +49,29 @@ The **BuildingBlocks** element is added inside the [TrustFrameworkPolicy](trustf
4849
<Localization>
4950
...
5051
</Localization>
52+
<DisplayControls>
53+
...
54+
</DisplayControls>
5155
</BuildingBlocks>
5256
```
5357

5458
The **BuildingBlocks** element contains the following elements that must be specified in the order defined:
5559

56-
- [ClaimsSchema](claimsschema.md) - Defines the claim types that can be referenced as part of the policy. The claims schema is the place where you declare your claim types. A claim type is similar to a variable in many programmatic languages. You can use the claim type to collect data from the user of your application, receive claims from social identity providers, send and receive data from a custom REST API, or store any internal data used by your custom policy.
60+
- [ClaimsSchema](claimsschema.md) - Defines the claim types that can be referenced as part of the policy. The claims schema is the place where you declare your claim types. A claim type is similar to a variable in many programmatic languages. You can use the claim type to collect data from the user of your application, receive claims from social identity providers, send and receive data from a custom REST API, or store any internal data used by your custom policy.
5761

5862
- [Predicates and PredicateValidationsInput](predicates.md) - Enables you to perform a validation process to ensure that only properly formed data is entered into a claim.
59-
60-
- [ClaimsTransformations](claimstransformations.md) - Contains a list of claims transformations that can be used in your policy. A claims transformation converts one claim into another. In the claims transformation, you specify a transform method, such as:
61-
- Changing the case of a string claim to the one specified. For example, changing a string from lowercase to uppercase.
62-
- Comparing two claims and returning a claim with true indicating that the claims match, otherwise false.
63-
- Creating a string claim from the provided parameter in the policy.
64-
- Creating a random string using the random number generator.
65-
- Formatting a claim according to the provided format string. This transformation uses the C# `String.Format` method.
66-
63+
64+
- [ClaimsTransformations](claimstransformations.md) - Contains a list of claims transformations that can be used in your policy. A claims transformation converts one claim into another. In the claims transformation, you specify a transform method, such as:
65+
- Changing the case of a string claim to the one specified. For example, changing a string from lowercase to uppercase.
66+
- Comparing two claims and returning a claim with true indicating that the claims match, otherwise false.
67+
- Creating a string claim from the provided parameter in the policy.
68+
- Creating a random string using the random number generator.
69+
- Formatting a claim according to the provided format string. This transformation uses the C# `String.Format` method.
70+
6771
- InputValidation - This element allows you to perform boolean aggregations that are similar to *and* and *or*.
6872

6973
- [ContentDefinitions](contentdefinitions.md) - Contains URLs for HTML5 templates to use in your user journey. In a custom policy, a content definition defines the HTML5 page URI that's used for a specified step in the user journey. For example, the sign-in or sign-up, password reset, or error pages. You can modify the look and feel by overriding the LoadUri for the HTML5 file. Or you can create new content definitions according to your needs. This element may contain a localized resources reference using a localization ID.
7074

7175
- [Localization](localization.md) - Allows you to support multiple languages. The localization support in policies allows you set up the list of supported languages in a policy and pick a default language. Language-specific strings and collections are also supported.
7276

73-
77+
- [DisplayControls](display-controls.md) - Defines the controls to be displayed on a page. Display controls have special functionality and interact with back-end validation technical profiles. Display controls are currently in **preview**.

0 commit comments

Comments
 (0)