Skip to content

Commit 20f8bf2

Browse files
authored
Merge pull request #153879 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents b28e9f4 + 61bd475 commit 20f8bf2

File tree

155 files changed

+1202
-972
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

155 files changed

+1202
-972
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -740,6 +740,11 @@
740740
"redirect_url": "/azure/active-directory-b2c/authorization-code-flow",
741741
"redirect_document_id": true
742742
},
743+
{
744+
"source_path_from_root": "/articles/active-directory-b2c/custom-policy-get-started.md",
745+
"redirect_url": "/azure/active-directory-b2c/tutorial-create-user-flows?pivots=b2c-custom-policy",
746+
"redirect_document_id": true
747+
},
743748
{
744749
"source_path_from_root": "/articles/active-directory-b2c/active-directory-b2c-how-to-enable-billing.md",
745750
"redirect_url": "/azure/active-directory-b2c/billing",
@@ -11149,6 +11154,11 @@
1114911154
"redirect_url": "/azure/azure-sql/database/connect-query-r",
1115011155
"redirect_document_id": true
1115111156
},
11157+
{
11158+
"source_path_from_root": "/articles/azure-sql/database/connect-query-r.md",
11159+
"redirect_url": "/sql/machine-learning/tutorials/quickstart-r-create-script?context=/azure/azure-sql/managed-instance/context/ml-context&view=azuresqldb-mi-current",
11160+
"redirect_document_id": false
11161+
},
1115211162
{
1115311163
"source_path_from_root": "/articles/sql-database/sql-database-connect-query-ruby.md",
1115411164
"redirect_url": "/azure/azure-sql/database/connect-query-ruby",
@@ -19264,6 +19274,11 @@
1926419274
"redirect_url": "/azure/devtest-labs/use-paas-services",
1926519275
"redirect_document_id": true
1926619276
},
19277+
{
19278+
"source_path_from_root": "/articles/digital-twins/how-to-interpret-event-data.md",
19279+
"redirect_url": "/azure/digital-twins/concepts-notifications",
19280+
"redirect_document_id": false
19281+
},
1926719282
{
1926819283
"source_path_from_root": "/articles/digital-twins/how-to-integrate-models.md",
1926919284
"redirect_url": "/azure/digital-twins/concepts-ontologies-convert",

articles/active-directory-b2c/TOC.yml

Lines changed: 112 additions & 115 deletions
Original file line numberDiff line numberDiff line change
@@ -121,6 +121,9 @@
121121
href: signin-appauth-ios.md
122122
- name: Android using App Auth
123123
href: signin-appauth-android.md
124+
- name: Secure API Management API
125+
href: secure-api-management.md
126+
displayName: apim, api management, migrate, b2clogin.com
124127
- name: Create a flow
125128
items:
126129
- name: Sign-up or sign-in policy
@@ -222,6 +225,15 @@
222225
href: password-complexity.md
223226
- name: Disable email verification
224227
href: disable-email-verification.md
228+
- name: Custom email verification
229+
items:
230+
- name: Mailjet
231+
href: custom-email-mailjet.md
232+
displayName: Custom email, Custom verification email, Verification email
233+
- name: SendGrid
234+
href: custom-email-sendgrid.md
235+
displayName: Custom email, Custom verification email, Verification email
236+
displayName: verification
225237
- name: Enable MFA
226238
items:
227239
- name: Multi-factor authentication
@@ -269,17 +281,6 @@
269281
href: add-api-connector.md
270282
- name: Custom policy
271283
items:
272-
- name: Get started with custom policies
273-
href: custom-policy-get-started.md
274-
- name: Custom email verification
275-
items:
276-
- name: Mailjet
277-
href: custom-email-mailjet.md
278-
displayName: Custom email, Custom verification email, Verification email
279-
- name: SendGrid
280-
href: custom-email-sendgrid.md
281-
displayName: Custom email, Custom verification email, Verification email
282-
displayName: verification
283284
- name: Add your own business logic
284285
items:
285286
- name: Integrate REST API
@@ -299,101 +300,6 @@
299300
displayName: troubleshooting, app insights
300301
- name: Troubleshooting custom policies
301302
href: troubleshoot-custom-policies.md
302-
- name: Reference
303-
items:
304-
- name: TrustFrameworkPolicy
305-
href: trustframeworkpolicy.md
306-
- name: BuildingBlocks
307-
href: buildingblocks.md
308-
items:
309-
- name: ClaimsSchema
310-
href: claimsschema.md
311-
- name: ClaimsTransformations
312-
href: claimstransformations.md
313-
items:
314-
- name: Boolean
315-
href: boolean-transformations.md
316-
- name: Date
317-
href: date-transformations.md
318-
- name: General
319-
href: general-transformations.md
320-
- name: Integer
321-
href: integer-transformations.md
322-
- name: JSON
323-
href: json-transformations.md
324-
- name: Phone number
325-
href: phone-number-claims-transformations.md
326-
- name: External accounts
327-
href: social-transformations.md
328-
- name: StringCollection
329-
href: stringcollection-transformations.md
330-
- name: String
331-
href: string-transformations.md
332-
- name: Predicates
333-
href: predicates.md
334-
- name: ContentDefinitions
335-
href: contentdefinitions.md
336-
- name: Localization
337-
href: localization.md
338-
items:
339-
- name: Localization string IDs
340-
href: localization-string-ids.md
341-
- name: DisplayControls
342-
href: display-controls.md
343-
items:
344-
- name: Verification
345-
href: display-control-verification.md
346-
- name: ClaimsProviders
347-
href: claimsproviders.md
348-
items:
349-
- name: Technical Profiles
350-
href: technicalprofiles.md
351-
items:
352-
- name: About validation technical profiles
353-
href: validation-technical-profile.md
354-
- name: Azure Active Directory
355-
href: active-directory-technical-profile.md
356-
- name: Azure AD Multi-Factor Authentication
357-
href: multi-factor-auth-technical-profile.md
358-
displayName: mfa
359-
- name: Azure AD SSPR
360-
href: aad-sspr-technical-profile.md
361-
- name: Claims transformation
362-
href: claims-transformation-technical-profile.md
363-
- name: ID token hint
364-
href: id-token-hint.md
365-
- name: JWT token issuer
366-
href: jwt-issuer-technical-profile.md
367-
- name: OAuth1
368-
href: oauth1-technical-profile.md
369-
- name: OAuth2
370-
href: oauth2-technical-profile.md
371-
- name: One-time password
372-
href: one-time-password-technical-profile.md
373-
displayName: otp
374-
- name: OpenID Connect
375-
href: openid-connect-technical-profile.md
376-
- name: Phone factor
377-
href: phone-factor-technical-profile.md
378-
- name: REST
379-
href: restful-technical-profile.md
380-
- name: SAML identity provider
381-
href: saml-identity-provider-technical-profile.md
382-
- name: SAML token issuer
383-
href: saml-issuer-technical-profile.md
384-
- name: Self-asserted
385-
href: self-asserted-technical-profile.md
386-
- name: SSO session
387-
href: custom-policy-reference-sso.md
388-
displayName: single sign-on
389-
- name: UserJourneys
390-
href: userjourneys.md
391-
- name: SubJourneys
392-
href: subjourneys.md
393-
- name: RelyingParty
394-
href: relyingparty.md
395-
- name: Claim resolvers
396-
href: claim-resolver-overview.md
397303
- name: UserInfo endpoint
398304
href: userinfo-endpoint.md
399305
- name: Partner integration
@@ -458,15 +364,15 @@
458364
- name: Azure portal
459365
href: manage-users-portal.md
460366
displayName: create users, add users, delete users
367+
- name: Migrate users
368+
href: user-migration.md
369+
displayName: bulk import
461370
- name: Partner integration
462371
items:
463372
- name: N8identity
464373
href: partner-n8identity.md
465374
- name: Saviynt
466375
href: partner-saviynt.md
467-
- name: Secure API Management API
468-
href: secure-api-management.md
469-
displayName: apim, api management, migrate, b2clogin.com
470376
- name: Logs and monitoring
471377
items:
472378
- name: Audit logs
@@ -489,12 +395,105 @@
489395
- name: User data
490396
href: manage-user-data.md
491397
displayName: GDPR
492-
- name: Migration
493-
items:
494-
- name: Migrate users
495-
href: user-migration.md
496398
- name: Reference
497399
items:
400+
- name: Custom policy schema
401+
items:
402+
- name: TrustFrameworkPolicy
403+
href: trustframeworkpolicy.md
404+
- name: BuildingBlocks
405+
href: buildingblocks.md
406+
items:
407+
- name: ClaimsSchema
408+
href: claimsschema.md
409+
- name: ClaimsTransformations
410+
href: claimstransformations.md
411+
items:
412+
- name: Boolean
413+
href: boolean-transformations.md
414+
- name: Date
415+
href: date-transformations.md
416+
- name: General
417+
href: general-transformations.md
418+
- name: Integer
419+
href: integer-transformations.md
420+
- name: JSON
421+
href: json-transformations.md
422+
- name: Phone number
423+
href: phone-number-claims-transformations.md
424+
- name: External accounts
425+
href: social-transformations.md
426+
- name: StringCollection
427+
href: stringcollection-transformations.md
428+
- name: String
429+
href: string-transformations.md
430+
- name: Predicates
431+
href: predicates.md
432+
- name: ContentDefinitions
433+
href: contentdefinitions.md
434+
- name: Localization
435+
href: localization.md
436+
items:
437+
- name: Localization string IDs
438+
href: localization-string-ids.md
439+
- name: DisplayControls
440+
href: display-controls.md
441+
items:
442+
- name: Verification
443+
href: display-control-verification.md
444+
- name: ClaimsProviders
445+
href: claimsproviders.md
446+
items:
447+
- name: Technical Profiles
448+
href: technicalprofiles.md
449+
items:
450+
- name: About validation technical profiles
451+
href: validation-technical-profile.md
452+
- name: Azure Active Directory
453+
href: active-directory-technical-profile.md
454+
- name: Azure AD Multi-Factor Authentication
455+
href: multi-factor-auth-technical-profile.md
456+
displayName: mfa
457+
- name: Azure AD SSPR
458+
href: aad-sspr-technical-profile.md
459+
- name: Claims transformation
460+
href: claims-transformation-technical-profile.md
461+
- name: ID token hint
462+
href: id-token-hint.md
463+
- name: JWT token issuer
464+
href: jwt-issuer-technical-profile.md
465+
- name: OAuth1
466+
href: oauth1-technical-profile.md
467+
- name: OAuth2
468+
href: oauth2-technical-profile.md
469+
- name: One-time password
470+
href: one-time-password-technical-profile.md
471+
displayName: otp
472+
- name: OpenID Connect
473+
href: openid-connect-technical-profile.md
474+
- name: Phone factor
475+
href: phone-factor-technical-profile.md
476+
- name: REST
477+
href: restful-technical-profile.md
478+
- name: SAML identity provider
479+
href: saml-identity-provider-technical-profile.md
480+
- name: SAML token issuer
481+
href: saml-issuer-technical-profile.md
482+
- name: Self-asserted
483+
href: self-asserted-technical-profile.md
484+
- name: SSO session
485+
href: custom-policy-reference-sso.md
486+
displayName: single sign-on
487+
- name: UserJourneys
488+
href: userjourneys.md
489+
- name: SubJourneys
490+
href: subjourneys.md
491+
- name: RelyingParty
492+
href: relyingparty.md
493+
- name: Claim resolvers
494+
href: claim-resolver-overview.md
495+
- name: Custom policy release notes
496+
href: custom-policy-developer-notes.md
498497
- name: Service limits and restrictions
499498
href: service-limits.md
500499
- name: App registrations
@@ -510,8 +509,6 @@
510509
href: error-codes.md
511510
- name: Extensions app
512511
href: extensions-app.md
513-
- name: Custom policy (IEF) release notes
514-
href: custom-policy-developer-notes.md
515512
- name: Page layout versions
516513
href: page-layout.md
517514
displayName: Page version

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Azure Active Directory B2C (Azure AD B2C) provides support for the Azure Active
2424

2525
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly `Web.TPEngine.Providers.AzureActiveDirectoryProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null`.
2626

27-
Following [custom policy starter pack](custom-policy-get-started.md#custom-policy-starter-pack) Azure AD technical profiles include the **AAD-Common** technical profile. The Azure AD technical profiles don't specify the protocol because the protocol is configured in the **AAD-Common** technical profile:
27+
Following [custom policy starter pack](tutorial-create-user-flows.md?pivots=b2c-custom-policy#custom-policy-starter-pack) Azure AD technical profiles include the **AAD-Common** technical profile. The Azure AD technical profiles don't specify the protocol because the protocol is configured in the **AAD-Common** technical profile:
2828

2929
- **AAD-UserReadUsingAlternativeSecurityId** and **AAD-UserReadUsingAlternativeSecurityId-NoError** - Look up a social account in the directory.
3030
- **AAD-UserWriteUsingAlternativeSecurityId** - Create a new social account.

articles/active-directory-b2c/add-identity-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ On the sign-up or sign-in page, Azure AD B2C presents a list of external identit
2323

2424
![Mobile sign-in example with a social account (Facebook)](media/add-identity-provider/external-idp.png)
2525

26-
You can add identity providers that are supported by Azure Active Directory B2C (Azure AD B2C) to your [user flows](user-flow-overview.md) using the Azure portal. You can also add identity providers to your [custom policies](custom-policy-get-started.md).
26+
You can add identity providers that are supported by Azure Active Directory B2C (Azure AD B2C) to your [user flows](user-flow-overview.md) using the Azure portal. You can also add identity providers to your [custom policies](user-flow-overview.md).
2727

2828
## Select an identity provider
2929

articles/active-directory-b2c/add-password-change-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ In Azure Active Directory B2C (Azure AD B2C), you can enable users who are signe
3939

4040
## Prerequisites
4141

42-
* Complete the steps in [Get started with custom policies in Active Directory B2C](custom-policy-get-started.md).
42+
* Complete the steps in [Get started with custom policies in Active Directory B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy).
4343
* If you haven't already done so, [register a web application in Azure Active Directory B2C](tutorial-register-applications.md).
4444

4545
## Add the elements

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ To enable self-service password reset for the sign-up or sign-in user flow:
6767

6868
::: zone pivot="b2c-custom-policy"
6969

70-
The following sections describe how to add a self-service password experience to a custom policy. The sample is based on the policy files included in the [custom policy starter pack](./custom-policy-get-started.md).
70+
The following sections describe how to add a self-service password experience to a custom policy. The sample is based on the policy files included in the [custom policy starter pack](./tutorial-create-user-flows.md?pivots=b2c-custom-policy#custom-policy-starter-pack).
7171

7272
> [!TIP]
7373
> You can find a complete sample of the "sign-up or sign-in with password reset" policy on [GitHub](https://github.com/azure-ad-b2c/samples/tree/master/policies/embedded-password-reset).
@@ -312,7 +312,7 @@ To let users of your application reset their password, you create a password res
312312

313313
### Create a password reset policy
314314

315-
Custom policies are a set of XML files you upload to your Azure AD B2C tenant to define user journeys. We provide starter packs with several pre-built policies including: sign-up and sign-in, password reset, and profile editing policy. For more information, see [Get started with custom policies in Azure AD B2C](custom-policy-get-started.md).
315+
Custom policies are a set of XML files you upload to your Azure AD B2C tenant to define user journeys. We provide starter packs with several pre-built policies including: sign-up and sign-in, password reset, and profile editing policy. For more information, see [Get started with custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy).
316316

317317
::: zone-end
318318

articles/active-directory-b2c/add-profile-editing-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ If you want to enable users to edit their profile in your application, you use a
6161

6262
## Create a profile editing policy
6363

64-
Custom policies are a set of XML files you upload to your Azure AD B2C tenant to define user journeys. We provide starter packs with several pre-built policies including: sign-up and sign-in, password reset, and profile editing policy. For more information, see [Get started with custom policies in Azure AD B2C](custom-policy-get-started.md).
64+
Custom policies are a set of XML files you upload to your Azure AD B2C tenant to define user journeys. We provide starter packs with several pre-built policies including: sign-up and sign-in, password reset, and profile editing policy. For more information, see [Get started with custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy).
6565

6666
::: zone-end
6767

articles/active-directory-b2c/add-sign-up-and-sign-in-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ The sign-up and sign-in user flow handles both sign-up and sign-in experiences w
8787

8888
## Create a sign-up and sign-in policy
8989

90-
Custom policies are a set of XML files you upload to your Azure AD B2C tenant to define user journeys. We provide starter packs with several pre-built policies including: sign-up and sign-in, password reset, and profile editing policy. For more information, see [Get started with custom policies in Azure AD B2C](custom-policy-get-started.md).
90+
Custom policies are a set of XML files you upload to your Azure AD B2C tenant to define user journeys. We provide starter packs with several pre-built policies including: sign-up and sign-in, password reset, and profile editing policy. For more information, see [Get started with custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy).
9191

9292
::: zone-end
9393

0 commit comments

Comments
 (0)