Skip to content

Commit 2c87f29

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into three-load-balancer-articles
2 parents 188300d + 008bb26 commit 2c87f29

File tree

1,191 files changed

+14108
-12500
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,191 files changed

+14108
-12500
lines changed

.openpublishing.redirection.json

Lines changed: 11 additions & 111 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/devtest-labs/devtest-lab-integrate-ci-cd.md",
5+
"redirect_url": "/previous-versions/azure/devtest-labs/devtest-lab-integrate-ci-cd",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/devtest-labs/integrate-environments-devops-pipeline.md",
10+
"redirect_url": "/previous-versions/azure/devtest-labs/integrate-environments-devops-pipeline",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "articles/confidential-computing/virtual-machine-solutions.md",
515
"redirect_url": "/azure/virtual-machines/",
@@ -2010,21 +2020,6 @@
20102020
"redirect_url": "/azure/migrate/migrate-services-overview",
20112021
"redirect_document_id": false
20122022
},
2013-
{
2014-
"source_path_from_root": "/articles/monitoring/management-overview-monitoring.md",
2015-
"redirect_url": "/azure/monitoring/",
2016-
"redirect_document_id": false
2017-
},
2018-
{
2019-
"source_path_from_root": "/articles/monitoring/monitoring-container-health.md",
2020-
"redirect_url": "/azure/monitoring/monitoring-container-insights-overview",
2021-
"redirect_document_id": false
2022-
},
2023-
{
2024-
"source_path_from_root": "/articles/monitoring/monitoring-walkthrough-servicemap.md",
2025-
"redirect_url": "/azure/monitoring/monitoring-service-map",
2026-
"redirect_document_id": false
2027-
},
20282023
{
20292024
"source_path_from_root": "/articles/multi-factor-authentication/end-user/index.md",
20302025
"redirect_url": "/azure/multi-factor-authentication/end-user/multi-factor-authentication-end-user",
@@ -2210,101 +2205,6 @@
22102205
"redirect_url": "/azure/openshift/delete-cluster",
22112206
"redirect_document_id": false
22122207
},
2213-
{
2214-
"source_path_from_root": "/articles/operations-management-suite/index.md",
2215-
"redirect_url": "/azure/monitoring",
2216-
"redirect_document_id": false
2217-
},
2218-
{
2219-
"source_path_from_root": "/articles/operations-management-suite/oms-solution-agenthealth.md",
2220-
"redirect_url": "/azure/monitoring/monitoring-solution-agenthealth",
2221-
"redirect_document_id": false
2222-
},
2223-
{
2224-
"source_path_from_root": "/articles/operations-management-suite/oms-solution-office-365.md",
2225-
"redirect_url": "/azure/monitoring/monitoring-solution-office-365",
2226-
"redirect_document_id": false
2227-
},
2228-
{
2229-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-architecture.md",
2230-
"redirect_url": "/azure/monitoring",
2231-
"redirect_document_id": false
2232-
},
2233-
{
2234-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-integration.md",
2235-
"redirect_url": "/azure/monitoring",
2236-
"redirect_document_id": false
2237-
},
2238-
{
2239-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-overview.md",
2240-
"redirect_url": "/azure/monitoring",
2241-
"redirect_document_id": false
2242-
},
2243-
{
2244-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-runbook-datacollect.md",
2245-
"redirect_url": "/azure/monitoring/monitoring-runbook-datacollect",
2246-
"redirect_document_id": false
2247-
},
2248-
{
2249-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-sdk.md",
2250-
"redirect_url": "/azure/monitoring",
2251-
"redirect_document_id": false
2252-
},
2253-
{
2254-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-service-map-scom.md",
2255-
"redirect_url": "/azure/monitoring/monitoring-service-map-scom",
2256-
"redirect_document_id": false
2257-
},
2258-
{
2259-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-service-map.md",
2260-
"redirect_url": "/azure/monitoring/monitoring-service-map",
2261-
"redirect_document_id": false
2262-
},
2263-
{
2264-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solution-targeting.md",
2265-
"redirect_url": "/azure/monitoring/monitoring-solution-targeting",
2266-
"redirect_document_id": false
2267-
},
2268-
{
2269-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-best-practices.md",
2270-
"redirect_url": "/azure/monitoring/monitoring-solutions-best-practices",
2271-
"redirect_document_id": false
2272-
},
2273-
{
2274-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-creating.md",
2275-
"redirect_url": "/azure/monitoring/monitoring-solutions-creating",
2276-
"redirect_document_id": false
2277-
},
2278-
{
2279-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-resources-automation.md",
2280-
"redirect_url": "/azure/monitoring/monitoring-solutions-resources-automation",
2281-
"redirect_document_id": false
2282-
},
2283-
{
2284-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-resources-searches-alerts.md",
2285-
"redirect_url": "/azure/monitoring/monitoring-solutions-resources-searches-alerts",
2286-
"redirect_document_id": false
2287-
},
2288-
{
2289-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-resources-views.md",
2290-
"redirect_url": "/azure/monitoring/monitoring-solutions-resources-views",
2291-
"redirect_document_id": false
2292-
},
2293-
{
2294-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-solution-file.md",
2295-
"redirect_url": "/azure/monitoring/monitoring-solutions-solution-file",
2296-
"redirect_document_id": false
2297-
},
2298-
{
2299-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions.md",
2300-
"redirect_url": "/azure/monitoring/monitoring-solutions",
2301-
"redirect_document_id": false
2302-
},
2303-
{
2304-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-walkthrough-servicemap.md",
2305-
"redirect_url": "/azure/monitoring/monitoring-service-map",
2306-
"redirect_document_id": false
2307-
},
23082208
{
23092209
"source_path_from_root": "/articles/operator-service-manager/overview.md",
23102210
"redirect_url": "azure/operator-service-manager/azure-operator-service-manager-overview",
@@ -3701,4 +3601,4 @@
37013601
"redirect_document_id": false
37023602
}
37033603
]
3704-
}
3604+
}

articles/active-directory-b2c/identity-provider-mobile-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ To enable sign-in for users with Mobile ID in Azure AD B2C, you need to create a
4646

4747
|Key |Note |
4848
|---------|---------|
49-
| Client ID | The Mobile ID client ID. For example, 11111111-2222-3333-4444-555555555555. |
49+
| Client ID | The Mobile ID client ID. For example, 00001111-aaaa-2222-bbbb-3333cccc4444. |
5050
| Client Secret| The Mobile ID client secret.|
5151

5252

articles/active-directory-b2c/identity-provider-ping-one.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ zone_pivot_groups: b2c-policy-type
2525

2626
## Create a PingOne application
2727

28-
To enable sign-in for users with a PingOne (Ping Identity) account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in the Ping Identity Administrator Console. For more information, see [Adding or updating an OIDC application](https://docs.pingidentity.com/access/sources/dita/topic?resourceid=p14e_add_update_oidc_application) in the Ping Identity documentation. If you don't already have a PingOne account, you can sign up at [`https://admin.pingone.com/web-portal/register`](https://admin.pingone.com/web-portal/register).
28+
To enable sign-in for users with a PingOne (Ping Identity) account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in the Ping Identity Administrator Console. If you don't already have a PingOne account, you can sign up at [`https://admin.pingone.com/web-portal/register`](https://admin.pingone.com/web-portal/register).
2929

3030
1. Sign in to the Ping Identity Administrator Console with your PingOne account credentials.
3131
1. In the left menu of the page, select **Connections**, then next to **Applications**, select **+**.

articles/active-directory-b2c/identity-provider-swissid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To enable sign-in for users with a SwissID account in Azure AD B2C, you need to
4848
|Key |Note |
4949
|---------|---------|
5050
| Environment| The SwissID OpenId well-known configuration endpoint. For example, `https://login.sandbox.pre.swissid.ch/idp/oauth2/.well-known/openid-configuration`. |
51-
| Client ID | The SwissID client ID. For example, `11111111-2222-3333-4444-555555555555`. |
51+
| Client ID | The SwissID client ID. For example, `00001111-aaaa-2222-bbbb-3333cccc4444`. |
5252
| Password| The SwissID client secret.|
5353

5454

articles/active-directory-b2c/implicit-flow-single-page-application.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -47,13 +47,13 @@ In this request, the client indicates the permissions that it needs to acquire f
4747

4848
- `{tenant}` with the name of your Azure AD B2C tenant.
4949

50-
- `90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6` with the app ID of the application you've registered in your tenant.
50+
- `00001111-aaaa-2222-bbbb-3333cccc4444` with the app ID of the application you've registered in your tenant.
5151

5252
- `{policy}` with the name of a policy you've created in your tenant, for example `b2c_1_sign_in`.
5353

5454
```http
5555
GET https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/authorize?
56-
client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
56+
client_id=00001111-aaaa-2222-bbbb-3333cccc4444
5757
&response_type=id_token+token
5858
&redirect_uri=https%3A%2F%2Faadb2cplayground.azurewebsites.net%2F
5959
&response_mode=fragment
@@ -88,7 +88,7 @@ GET https://aadb2cplayground.azurewebsites.net/#
8888
access_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6Ik5HVEZ2ZEstZnl0aEV1Q...
8989
&token_type=Bearer
9090
&expires_in=3599
91-
&scope="90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access",
91+
&scope="00001111-aaaa-2222-bbbb-3333cccc4444 offline_access",
9292
&id_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6Ik5HVEZ2ZEstZnl0aEV1Q...
9393
&state=arbitrary_data_you_sent_earlier
9494
```
@@ -175,7 +175,7 @@ In a typical web app flow, you would make a request to the `/token` endpoint. Ho
175175

176176
```http
177177
https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/authorize?
178-
client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
178+
client_id=00001111-aaaa-2222-bbbb-3333cccc4444
179179
&response_type=token
180180
&redirect_uri=https%3A%2F%2Faadb2cplayground.azurewebsites.net%2F
181181
&scope=https%3A%2F%2Fapi.contoso.com%2Ftasks.read
@@ -265,4 +265,4 @@ GET https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/
265265

266266
## Next steps
267267

268-
See the code sample: [Sign-in with Azure AD B2C in a JavaScript SPA](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-browser-samples/VanillaJSTestApp2.0/app/b2c).
268+
See the code sample: [Sign-in with Azure AD B2C in a JavaScript SPA](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-browser-samples/VanillaJSTestApp2.0/app/b2c).

articles/active-directory-b2c/json-transformations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ The following claims transformation outputs a JSON string claim that will be the
231231

232232
- Input claims:
233233
- **email**, transformation claim type **customerEntity.email**: "[email protected]"
234-
- **objectId**, transformation claim type **customerEntity.userObjectId** "01234567-89ab-cdef-0123-456789abcdef"
234+
- **objectId**, transformation claim type **customerEntity.userObjectId** "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb"
235235
- **givenName**, transformation claim type **customerEntity.firstName** "John"
236236
- **surname**, transformation claim type **customerEntity.lastName** "Smith"
237237
- Input parameter:
@@ -244,7 +244,7 @@ The following claims transformation outputs a JSON string claim that will be the
244244
{
245245
"customerEntity":{
246246
"email":"[email protected]",
247-
"userObjectId":"01234567-89ab-cdef-0123-456789abcdef",
247+
"userObjectId":"aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",
248248
"firstName":"John",
249249
"lastName":"Smith",
250250
"role":{
@@ -264,7 +264,7 @@ The **GenerateJson** claims transformation accepts plain strings. If an input cl
264264
{
265265
"customerEntity":{
266266
"email":"[\"[email protected]\"]",
267-
"userObjectId":"01234567-89ab-cdef-0123-456789abcdef",
267+
"userObjectId":"aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",
268268
"firstName":"John",
269269
"lastName":"Smith",
270270
"role":{

articles/active-directory-b2c/jwt-issuer-technical-profile.md

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The **InputClaims**, **OutputClaims**, and **PersistClaims** elements are empty
6363
| refresh_token_lifetime_secs | No | Refresh token lifetimes. The maximum time period before which a refresh token can be used to acquire a new access token, if your application had been granted the offline_access scope. The default is 120,9600 seconds (14 days). The minimum (inclusive) is 86,400 seconds (24 hours). The maximum (inclusive) is 7,776,000 seconds (90 days). |
6464
| rolling_refresh_token_lifetime_secs | No | Refresh token sliding window lifetime. After this time period elapses the user is forced to reauthenticate, irrespective of the validity period of the most recent refresh token acquired by the application. If you don't want to enforce a sliding window lifetime, set the value of allow_infinite_rolling_refresh_token to `true`. The default is 7,776,000 seconds (90 days). The minimum (inclusive) is 86,400 seconds (24 hours). The maximum (inclusive) is 31,536,000 seconds (365 days). |
6565
| allow_infinite_rolling_refresh_token | No | If set to `true`, the refresh token sliding window lifetime never expires. |
66-
| IssuanceClaimPattern | No | Controls the Issuer (iss) claim. One of the values:<ul><li>AuthorityAndTenantGuid - The iss claim includes your domain name, such as `login.microsoftonline` or `tenant-name.b2clogin.com`, and your tenant identifier https:\//login.microsoftonline.com/00000000-0000-0000-0000-000000000000/v2.0/</li><li>AuthorityWithTfp - The iss claim includes your domain name, such as `login.microsoftonline` or `tenant-name.b2clogin.com`, your tenant identifier and your relying party policy name. https:\//login.microsoftonline.com/tfp/00000000-0000-0000-0000-000000000000/b2c_1a_tp_sign-up-or-sign-in/v2.0/</li></ul> Default value: AuthorityAndTenantGuid |
66+
| IssuanceClaimPattern | No | Controls the Issuer (iss) claim. One of the values:<ul><li>AuthorityAndTenantGuid - The iss claim includes your domain name, such as `login.microsoftonline` or `tenant-name.b2clogin.com`, and your tenant identifier https:\//login.microsoftonline.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/</li><li>AuthorityWithTfp - The iss claim includes your domain name, such as `login.microsoftonline` or `tenant-name.b2clogin.com`, your tenant identifier and your relying party policy name. https:\//login.microsoftonline.com/tfp/aaaabbbb-0000-cccc-1111-dddd2222eeee/b2c_1a_tp_sign-up-or-sign-in/v2.0/</li></ul> Default value: AuthorityAndTenantGuid |
6767
| AuthenticationContextReferenceClaimPattern | No | Controls the `acr` claim value.<ul><li>None - Azure AD B2C doesn't issue the acr claim</li><li>PolicyId - the `acr` claim contains the policy name</li></ul>The options for setting this value are TFP (trust framework policy) and ACR (authentication context reference). It is recommended setting this value to TFP, to set the value, ensure the `<Item>` with the `Key="AuthenticationContextReferenceClaimPattern"` exists and the value is `None`. In your relying party policy, add `<OutputClaims>` item, add this element `<OutputClaim ClaimTypeReferenceId="trustFrameworkPolicy" Required="true" DefaultValue="{policy}" PartnerClaimType="tfp"/>`. Also make sure your policy contains the claim type `<ClaimType Id="trustFrameworkPolicy"> <DisplayName>trustFrameworkPolicy</DisplayName> <DataType>string</DataType> </ClaimType>` |
6868
|RefreshTokenUserJourneyId| No | The identifier of a user journey that should be executed during the [refresh an access token](authorization-code-flow.md#4-refresh-the-token) POST request to the `/token` endpoint. |
6969

@@ -79,17 +79,3 @@ The CryptographicKeys element contains the following attributes:
7979
## Session management
8080

8181
To configure the Azure AD B2C sessions between Azure AD B2C and a relying party application, in the attribute of the `UseTechnicalProfileForSessionManagement` element, add a reference to [OAuthSSOSessionProvider](custom-policy-reference-sso.md#oauthssosessionprovider) SSO session.
82-
83-
84-
85-
86-
87-
88-
89-
90-
91-
92-
93-
94-
95-

articles/active-directory-b2c/language-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -436,7 +436,7 @@ In the following example, English (en) and Spanish (es) custom strings are added
436436
1. Switch your browser default language to Spanish. Or you can add the query string parameter, `ui_locales` to the authorization request. For example:
437437

438438
```http
439-
https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/B2C_1A_signup_signin/oauth2/v2.0/authorize&client_id=0239a9cc-309c-4d41-12f1-31299feb2e82&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login&ui_locales=es
439+
https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/B2C_1A_signup_signin/oauth2/v2.0/authorize&client_id=00001111-aaaa-2222-bbbb-3333cccc4444&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login&ui_locales=es
440440
```
441441

442442
::: zone-end
74 Bytes
Loading
-2.18 KB
Loading

0 commit comments

Comments
 (0)