Skip to content

Commit 2459c21

Browse files
authored
Merge branch 'main' into cm-linkfix-20230207-0
2 parents 96fdacb + 0ea7fd4 commit 2459c21

File tree

1,355 files changed

+10757
-10219
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,355 files changed

+10757
-10219
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,7 @@
994994
"articles/object-anchors/.openpublishing.redirection.object-anchors.json",
995995
"articles/postgresql/.openpublishing.redirection.postgresql.json",
996996
"articles/purview/.openpublishing.redirection.purview.json",
997+
"articles/sap/.openpublishing.redirection.sap.json",
997998
"articles/service-bus-messaging/.openpublishing.redirection.service-bus-messaging.json",
998999
"articles/spatial-anchors/.openpublishing.redirection.spatial-anchors.json",
9991000
"articles/spring-apps/.openpublishing.redirection.spring-apps.json",

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4391,6 +4391,11 @@
43914391
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",
43924392
"redirect_document_id": false
43934393
},
4394+
{
4395+
"source_path_from_root": "/articles/active-directory/reports-monitoring/recommendations-integrate-third-party-apps.md",
4396+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-recommendations",
4397+
"redirect_document_id": false
4398+
},
43944399
{
43954400
"source_path_from_root": "/articles/active-directory/reports-monitoring/workbook-legacy authentication.md",
43964401
"redirect_url": "/azure/active-directory/reports-monitoring/workbook-legacy-authentication",
@@ -4411,6 +4416,11 @@
44114416
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
44124417
"redirect_document_id": false
44134418
},
4419+
{
4420+
"source_path_from_root": "/articles/active-directory/reports-monitoring/recommendation-integrate-third-party-apps.md",
4421+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-recommendations",
4422+
"redirect_document_id": false
4423+
},
44144424
{
44154425
"source_path_from_root": "/articles/active-directory/reports-monitoring/concept-reporting-api.md",
44164426
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",

articles/active-directory-b2c/add-identity-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77

88
ms.author: godonnell
9-
ms.date: 01/19/2022
9+
ms.date: 02/08/2023
1010
ms.custom: mvc
1111
ms.topic: how-to
1212
ms.service: active-directory
@@ -19,7 +19,7 @@ You can configure Azure AD B2C to allow users to sign in to your application wit
1919

2020
With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.
2121

22-
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once they select one of the external identity providers, they're taken (redirected) to the selected provider's website to complete the sign-in process. After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.
22+
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once a user selects an external identity provider, they're redirected to the selected provider's website to complete their sign-in. After they successfully sign in, they're returned to Azure AD B2C for authentication with your application.
2323

2424
![Diagram showing mobile sign-in example with a social account (Facebook).](media/add-identity-provider/external-idp.png)
2525

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/11/2022
12+
ms.date: 02/07/2023
1313
ms.author: godonnell
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit, project-no-code
@@ -67,26 +67,6 @@ To enable sign-in for users with an Azure AD account from a specific Azure AD or
6767
1. Select **Certificates & secrets**, and then select **New client secret**.
6868
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
6969
70-
### Configuring optional claims
71-
72-
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
73-
74-
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
75-
1. Select the **Directories + subscriptions** icon in the portal toolbar.
76-
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
77-
1. In the Azure portal, search for and select **Azure Active Directory**.
78-
1. In the left menu, under **Manage**, select **App registrations**.
79-
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
80-
1. From the **Manage** section, select **Token configuration**.
81-
1. Select **Add optional claim**.
82-
1. For the **Token type**, select **ID**.
83-
1. Select the optional claims to add, `family_name` and `given_name`.
84-
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
85-
86-
## [Optional] Verify your app authenticity
87-
88-
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
89-
9070
::: zone pivot="b2c-user-flow"
9171
9272
## Configure Azure AD as an identity provider
@@ -254,6 +234,26 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
254234

255235
::: zone-end
256236

237+
### [Optional] Configuring optional claims
238+
239+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
240+
241+
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
242+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
243+
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
244+
1. In the Azure portal, search for and select **Azure Active Directory**.
245+
1. In the left menu, under **Manage**, select **App registrations**.
246+
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
247+
1. From the **Manage** section, select **Token configuration**.
248+
1. Select **Add optional claim**.
249+
1. For the **Token type**, select **ID**.
250+
1. Select the optional claims to add, `family_name` and `given_name`.
251+
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
252+
253+
## [Optional] Verify your app authenticity
254+
255+
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
256+
257257
## Next steps
258258

259259
Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).

articles/active-directory-b2c/identity-provider-generic-saml.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -139,10 +139,10 @@ The **OutputClaims** element contains a list of claims returned by the SAML iden
139139

140140
In the example above, *Contoso-SAML2* includes the claims returned by a SAML identity provider:
141141

142-
* The **issuerUserId** claim is mapped to the **assertionSubjectName** claim.
142+
* The **assertionSubjectName** claim is mapped to the **issuerUserId** claim.
143143
* The **first_name** claim is mapped to the **givenName** claim.
144144
* The **last_name** claim is mapped to the **surname** claim.
145-
* The **displayName** claim is mapped to the `http://schemas.microsoft.com/identity/claims/displayname` claim.
145+
* The `http://schemas.microsoft.com/identity/claims/displayname` claim is mapped to the **displayName** claim.
146146
* The **email** claim without name mapping.
147147

148148
The technical profile also returns claims that aren't returned by the identity provider:
@@ -237,4 +237,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
237237

238238
- [Configure SAML identity provider options with Azure Active Directory B2C](identity-provider-generic-saml-options.md)
239239

240-
::: zone-end
240+
::: zone-end

articles/active-directory-b2c/page-layout.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,35 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
5959

6060
## Self-asserted page (selfasserted)
6161

62+
**2.1.20**
63+
- Fixed an XSS issue on input from textbox
64+
65+
**2.1.19**
66+
- Fixed accessibility bugs
67+
- Handle Undefined Error message for existing user sign up
68+
- Move Password Mismatch Error to Inline instead of Page Level
69+
- Accessibility changes related to High Contrast button display and anchor focus improvements
70+
71+
**2.1.18**
72+
- Add asterisk for required fields
73+
- TOTP Store Icons position fixes for Classic Template
74+
- Activate input items only when verification code is verified
75+
- Add Alt Text for Background Image
76+
- Added customization for server errors by TOTP verification
77+
78+
**2.1.17**
79+
- Add descriptive error message and fixed forgotPassword link
80+
- Make checkbox as group
81+
- Enforce Validation Error Update on control change and enable continue on email verified
82+
- Added additional field to error code to validation failure response
83+
84+
**2.1.16**
85+
- Fixed "Claims for verification control have not been verified" bug while verifying code.
86+
- Hide error message on validation succeeds and send code to verify
87+
88+
**2.1.15**
89+
- Fixed QR code generation bug due to QR text length
90+
6291
**2.1.14**
6392
- Fixed WCAG 2.1 accessibility bug for the TOTP multifactor authentication screens.
6493

@@ -158,6 +187,12 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
158187
> [!TIP]
159188
> If you localize your page to support multiple locales, or languages in a user flow. The [localization IDs](localization-string-ids.md) article provides the list of localization IDs that you can use for the page version you select.
160189
190+
**2.1.9**
191+
- Fix accessibility bugs
192+
- Accessibility changes related to High Contrast button display and anchor focus improvements
193+
194+
**2.1.8**
195+
- Add descriptive error message and fixed forgotPassword link!
161196

162197
**2.1.7**
163198

articles/active-directory-b2c/sign-in-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 01/18/2022
12+
ms.date: 02/08/2023
1313
ms.author: godonnell
1414
ms.subservice: B2C
1515

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -162,4 +162,6 @@
162162
href: faqs.md
163163
- name: Glossary
164164
href: multi-cloud-glossary.md
165+
- name: Microsoft Entra Permissions Management partners
166+
href: partner-list.md
165167

40.1 KB
Loading
12.6 KB
Loading

0 commit comments

Comments
 (0)