Skip to content

Commit 202d9a6

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into postgres-app
2 parents 22f7249 + c1856f4 commit 202d9a6

File tree

307 files changed

+4110
-1816
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

307 files changed

+4110
-1816
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44002,6 +44002,11 @@
4400244002
"source_path": "articles/virtual-desktop/bandwidth-recommendations.md",
4400344003
"redirect_url": "https://docs.microsoft.com/windows-server/remote/remote-desktop-services/network-guidance",
4400444004
"redirect_document_id": false
44005+
},
44006+
{
44007+
"source_path": "articles/troubleshoot-client-connection.md",
44008+
"redirect_url": "/azure/virtual-desktop/troubleshoot-client",
44009+
"redirect_document_id": false
4400544010
}
4400644011
]
4400744012
}

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,9 @@ The *Read and write directory data* permission that you granted earlier does **N
5959

6060
If you want to give your application the ability to delete users or update passwords, you need to grant it the *User administrator* role.
6161

62-
1. Sign in to the [Azure portal](https://portal.azure.com) and switch to the directory that contains your Azure AD B2C tenant.
63-
1. Select **Azure AD B2C** in the left menu. Or, select **All services** and then search for and select **Azure AD B2C**.
62+
1. Sign in to the [Azure portal](https://portal.azure.com).
63+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
64+
1. In the Azure portal, search for and select **Azure AD B2C**.
6465
1. Under **Manage**, select **Roles and administrators**.
6566
1. Select the **User administrator** role.
6667
1. Select **Add assignment**.

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,10 @@ ms.subservice: B2C
2727

2828
## Add signing and encryption keys
2929

30-
1. Sign in to the [Azure portal](https://portal.azure.com)
31-
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
32-
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
33-
1. On the Overview page, select **Identity Experience Framework** from the **Policies** pane.
30+
1. Sign in to the [Azure portal](https://portal.azure.com).
31+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
32+
1. In the Azure portal, search for and select **Azure AD B2C**.
33+
1. On the overview page, under **Policies**, select **Identity Experience Framework**.
3434

3535
### Create the signing key
3636

@@ -73,10 +73,9 @@ To register an application in your Azure AD B2C tenant, you can use the current
7373

7474
#### [Applications](#tab/applications/)
7575

76-
1. Select **All services** in the top-left corner of the Azure portal.
77-
1. In the search box, enter `Azure Active Directory`.
78-
1. Select **Azure Active Directory** in the search results.
79-
1. Under **Manage** in the left-hand menu, select **App registrations (Legacy)**.
76+
1. Sign in to the [Azure portal](https://portal.azure.com).
77+
1. In the Azure portal, search for and select **Azure Active Directory**.
78+
1. In the **Azure Active Directory** overview menu, under **Manage**, select **App registrations (Legacy)**.
8079
1. Select **New application registration**.
8180
1. For **Name**, enter `IdentityExperienceFramework`.
8281
1. For **Application type**, choose **Web app/API**.

articles/active-directory-b2c/active-directory-b2c-reference-password-complexity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,9 @@ If you are using custom policies, you can ([configure password complexity in a c
3434
## Configure password complexity
3535

3636
1. Sign in to the [Azure portal](https://portal.azure.com).
37-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
38-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
39-
4. Select **User flows**.
37+
2. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
38+
3. In the Azure portal, search for and select **Azure AD B2C**.
39+
4. Select **User flows (policies)**.
4040
2. Select a user flow, and click **Properties**.
4141
3. Under **Password complexity**, change the password complexity for this user flow to **Simple**, **Strong**, or **Custom**.
4242

articles/active-directory-b2c/active-directory-b2c-setup-qq-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,9 +43,9 @@ To use a QQ account as an identity provider in Azure Active Directory B2C (Azure
4343

4444
## Configure QQ as an identity provider
4545

46-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
47-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
48-
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
46+
1. Sign in to the [Azure portal](https://portal.azure.com/).
47+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
48+
1. In the Azure portal, search for and select **Azure AD B2C**.
4949
1. Select **Identity providers**, then select **QQ (Preview)**.
5050
1. Enter a **Name**. For example, *QQ*.
5151
1. For the **Client ID**, enter the APP ID of the QQ application that you created earlier.

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ If you don't yet have a SAML service provider and an associated metadata endpoin
6161
To build a trust relationship between your service provider and Azure AD B2C, you need to provide X509 certificates and their private keys.
6262

6363
* **Service provider certificates**
64-
* Certificate with a private key stored in your Web App. This certificate is used to by your service provider to sign the SAML request sent to Azure AD B2C. Azure AD B2C reads the public key from the service provider metadata to validate the signature.
64+
* Certificate with a private key stored in your Web App. This certificate is used by your service provider to sign the SAML request sent to Azure AD B2C. Azure AD B2C reads the public key from the service provider metadata to validate the signature.
6565
* (Optional) Certificate with a private key stored in your Web App. Azure AD B2C reads the public key from the service provider metadata to encrypt the SAML assertion. The service provider then uses the private key to decrypt the assertion.
6666
* **Azure AD B2C certificates**
6767
* Certificate with a private key in Azure AD B2C. This certificate is used by Azure AD B2C to sign the SAML response sent to your service provider. Your service provider reads the Azure AD B2C metadata public key to validate the signature of the SAML response.
@@ -96,7 +96,7 @@ If you don't already have a certificate, you can use a self-signed certificate f
9696
Next, upload the SAML assertion and response signing certificate to Azure AD B2C.
9797
9898
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to your Azure AD B2C tenant.
99-
1. Select **Settings** > **Identity Experience Framework** > **Policy Keys**.
99+
1. Under **Policies**, select **Identity Experience Framework** and then **Policy keys**.
100100
1. Select **Add**, and then select **Options** > **Upload**.
101101
1. Enter a **Name**, for example *SamlIdpCert*. The prefix *B2C_1A_* is automatically added to the name of your key.
102102
1. Upload your certificate using the upload file control.
@@ -318,7 +318,7 @@ For this tutorial, in which you use the SAML test application, set the `url` pro
318318

319319
#### LogoutUrl (Optional)
320320

321-
This optional property represents the `Logout` URL (`SingleLogoutService` URL in the relying party metadata), and the `BindingType` for this is assumed to be `HttpDirect`.
321+
This optional property represents the `Logout` URL (`SingleLogoutService` URL in the relying party metadata), and the `BindingType` for this is assumed to be `Http-Redirect`.
322322

323323
For this tutorial which uses the SAML test application, leave `logoutUrl` set to `https://samltestapp2.azurewebsites.net/logout`:
324324

@@ -374,4 +374,4 @@ The following SAML relying party (RP) scenarios are supported via your own metad
374374
You can find more information about the [SAML protocol on the OASIS website](https://www.oasis-open.org/).
375375

376376
<!-- LINKS - External -->
377-
[samltest]: https://aka.ms/samltestapp
377+
[samltest]: https://aka.ms/samltestapp

articles/active-directory-b2c/custom-email.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,8 @@ The `GenerateOtp` technical profile generates a code for the email address. The
256256
<InputClaim ClaimTypeReferenceId="verificationCode" PartnerClaimType="otpToVerify" />
257257
</InputClaims>
258258
</TechnicalProfile>
259-
</ClaimsProviders>
259+
</TechnicalProfiles>
260+
</ClaimsProviders>
260261
```
261262

262263
## Add a REST API technical profile
130 KB
Loading
70 KB
Loading

0 commit comments

Comments
 (0)