Skip to content

Commit 3134e2c

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into mm-b2b-gov
2 parents 3cf77fd + 75ff5c7 commit 3134e2c

File tree

544 files changed

+5525
-3800
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

544 files changed

+5525
-3800
lines changed

.openpublishing.redirection.json

Lines changed: 31 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11992,12 +11992,17 @@
1199211992
},
1199311993
{
1199411994
"source_path": "articles/blockchain-workbench/hyperledger-fabric-single-member-blockchain.md",
11995-
"redirect_url": "/azure/blockchain/templates/hyperledger-fabric-consortium-blockchain",
11995+
"redirect_url": "/azure/blockchain/templates/hyperledger-fabric-consortium-azure-kubernetes-service",
1199611996
"redirect_document_id": false
1199711997
},
1199811998
{
1199911999
"source_path": "articles/blockchain/templates/hyperledger-fabric-single-member-blockchain.md",
12000-
"redirect_url": "/azure/blockchain/templates/hyperledger-fabric-consortium-blockchain",
12000+
"redirect_url": "/azure/blockchain/templates/hyperledger-fabric-consortium-azure-kubernetes-service",
12001+
"redirect_document_id": false
12002+
},
12003+
{
12004+
"source_path": "articles/blockchain/templates/hyperledger-fabric-consortium-blockchain.md",
12005+
"redirect_url": "/azure/blockchain/templates/hyperledger-fabric-consortium-azure-kubernetes-service",
1200112006
"redirect_document_id": false
1200212007
},
1200312008
{
@@ -24510,6 +24515,11 @@
2451024515
"redirect_url": "/azure/virtual-machines/workloads/sap/high-availability-multi-sid",
2451124516
"redirect_document_id": false
2451224517
},
24518+
{
24519+
"source_path": "articles/virtual-machines/virtual-machines-azure-slave-plugin-for-hudson-classic.md",
24520+
"redirect_url": "/azure/virtual-machines/",
24521+
"redirect_document_id": false
24522+
},
2451324523
{
2451424524
"source_path": "articles/virtual-machines/virtual-machines-windows-sap-planning-guide.md",
2451524525
"redirect_url": "/azure/virtual-machines/workloads/sap/planning-guide",
@@ -41704,6 +41714,11 @@
4170441714
"source_path": "articles/virtual-machines/windows/classic/capture-image-classic.md",
4170541715
"redirect_url": "/previous-versions/azure/virtual-machines/windows/classic/capture-image-classic",
4170641716
"redirect_document_id": false
41717+
},
41718+
{
41719+
"source_path": "articles/virtual-machines/virtual-machines-availability-set-supportability.md",
41720+
"redirect_url": "/azure/virtual-machines/troubleshooting/virtual-machines-availability-set-supportability",
41721+
"redirect_document_id": false
4170741722
},
4170841723
{
4170941724
"source_path": "articles/virtual-machines/windows/classic/configure-availability-classic.md",
@@ -47891,6 +47906,11 @@
4789147906
"redirect_url": "/azure/mysql/concepts-azure-ad-authentication",
4789247907
"redirect_document_id": false
4789347908
},
47909+
{
47910+
"source_path": "articles/active-directory/authentication/tutorial-mfa-applications.md",
47911+
"redirect_url": "/azure/active-directory/authentication/tutorial-enable-azure-mfa",
47912+
"redirect_document_id": true
47913+
},
4789447914
{
4789547915
"source_path": "articles/load-balancer/quickstart-create-basic-load-balancer-portal.md",
4789647916
"redirect_url": "/azure/load-balancer/quickstart-load-balancer-standard-public-portal",
@@ -48020,14 +48040,21 @@
4802048040
"source_path": "articles/cognitive-services/Computer-vision/vs-computer-vision-connected-service.md",
4802148041
"redirect_url": "/azure/cognitive-services/computer-vision/",
4802248042
"redirect_document_id": false
48023-
}, {
48043+
},
48044+
{
4802448045
"source_path": "articles/cognitive-services/Face/vs-face-connected-service.md",
4802548046
"redirect_url": "/azure/cognitive-services/face/",
4802648047
"redirect_document_id": false
48027-
}, {
48048+
},
48049+
{
4802848050
"source_path": "articles/cognitive-services/text-analytics/vs-text-connected-service.md",
4802948051
"redirect_url": "/azure/cognitive-services/text-analytics/",
4803048052
"redirect_document_id": false
48053+
},
48054+
{
48055+
"source_path": "articles/media-services/previous/media-services-configure-fmle-live-encoder.md",
48056+
"redirect_url": "/azure/media-services/previous/media-services-configure-wirecast-live-encoder/",
48057+
"redirect_document_id": false
4803148058
}
4803248059
]
4803348060
}

articles/active-directory-b2c/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -182,8 +182,6 @@
182182
- name: Custom email
183183
href: custom-email.md
184184
displayName: verification
185-
- name: Page layout
186-
href: page-layout.md
187185
- name: Enable JavaScript
188186
href: javascript-samples.md
189187
- name: Password complexity
@@ -383,6 +381,8 @@
383381
href: custom-policy-developer-notes.md
384382
- name: Code samples
385383
href: https://azure.microsoft.com/resources/samples/?service=active-directory-b2c
384+
- name: Page layout versions
385+
href: page-layout.md
386386
- name: Cookie definitions
387387
href: cookie-definitions.md
388388
displayName: cookies, SameSite
@@ -421,4 +421,4 @@
421421
href: support-options.md
422422
displayName: technical
423423
- name: Videos
424-
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory-b2c
424+
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory-b2c

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 10/12/2018
12+
ms.date: 02/11/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515

@@ -154,7 +154,7 @@ Add the profiles to the *TrustFrameworkExtensions.xml* file from the starter pac
154154
<InputClaims>
155155
<!-- Properties of an event are added through the syntax {property:NAME}, where NAME is property being added to the event. DefaultValue can be either a static value or a value that's resolved by one of the supported DefaultClaimResolvers. -->
156156
<InputClaim ClaimTypeReferenceId="PolicyId" PartnerClaimType="{property:Policy}" DefaultValue="{Policy:PolicyId}" />
157-
<InputClaim ClaimTypeReferenceId="CorrelationId" PartnerClaimType="{property:JourneyId}" />
157+
<InputClaim ClaimTypeReferenceId="CorrelationId" PartnerClaimType="{property:JourneyId}" DefaultValue="{Context:CorrelationId}" />
158158
<InputClaim ClaimTypeReferenceId="Culture" PartnerClaimType="{property:Culture}" DefaultValue="{Culture:RFC5646}" />
159159
</InputClaims>
160160
</TechnicalProfile>

articles/active-directory-b2c/azure-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ You authorize a user or group in your Azure AD B2C directory (the **Service Prov
4444

4545
This is the resource group containing the destination Azure storage account, event hub, or Log Analytics workspace to receive data from Azure Monitor. You specify the resource group name when you deploy the Azure Resource Manager template.
4646

47-
[Create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md#create-resource-groups) or choose an existing one the Azure Active Directory (Azure AD) tenant that contains your Azure subscription, *not* the directory that contains your Azure AD B2C tenant.
47+
[Create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md#create-resource-groups) or choose an existing one in the Azure Active Directory (Azure AD) tenant that contains your Azure subscription, *not* the directory that contains your Azure AD B2C tenant.
4848

4949
This example uses a resource group named *azure-ad-b2c-monitor* in the *Central US* region.
5050

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 54 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: ContentDefinitions - Azure Active Directory B2C | Microsoft Docs
2+
title: ContentDefinitions
3+
titleSuffix: Azure AD B2C
34
description: Specify the ContentDefinitions element of a custom policy in Azure Active Directory B2C.
45
services: active-directory-b2c
56
author: mmacy
@@ -8,7 +9,7 @@ manager: celestedg
89
ms.service: active-directory
910
ms.workload: identity
1011
ms.topic: reference
11-
ms.date: 09/10/2018
12+
ms.date: 02/10/2020
1213
ms.author: marsma
1314
ms.subservice: B2C
1415
---
@@ -52,7 +53,6 @@ The metadata of the **LocalAccountSignUpWithLogonEmail** self-asserted technical
5253
...
5354
```
5455

55-
5656
## ContentDefinition
5757

5858
The **ContentDefinition** element contains the following attribute:
@@ -68,22 +68,59 @@ The **ContentDefinition** element contains the following elements:
6868
| LoadUri | 1:1 | A string that contains the URL of the HTML5 page for the content definition. |
6969
| RecoveryUri | 0:1 | A string that contains the URL of the HTML page for displaying an error relating to the content definition. |
7070
| DataUri | 1:1 | A string that contains the relative URL of an HTML file that provides the user experience to invoke for the step. |
71-
| Metadata | 1:1 | A collection of key/value pairs that contains the metadata utilized by the content definition. |
71+
| Metadata | 0:1 | A collection of key/value pairs that contains the metadata utilized by the content definition. |
7272
| LocalizedResourcesReferences | 0:1 | A collection of localized resources references. Use this element to customize the localization of a user interface and claims attribute. |
7373

7474
### DataUri
7575

76-
The **DataUri** element is used to specify the page identifier. Azure AD B2C uses the page identifier to load and initiate UI elements and client side JavaScript. The format of the value is `urn:com:microsoft:aad:b2c:elements:page-name:version`. The following table lists of the page identifiers you can use.
76+
The **DataUri** element is used to specify the page identifier. Azure AD B2C uses the page identifier to load and initiate UI elements and client side JavaScript. The format of the value is `urn:com:microsoft:aad:b2c:elements:page-name:version`. The following table lists the page identifiers you can use.
7777

78-
| Value | Description |
78+
| Page identifier | Description |
7979
| ----- | ----------- |
80-
| `urn:com:microsoft:aad:b2c:elements:globalexception:1.1.0` | Displays an error page when an exception or an error is encountered. |
81-
| `urn:com:microsoft:aad:b2c:elements:idpselection:1.0.0` | Lists the identity providers that users can choose from during sign-in. |
82-
| `urn:com:microsoft:aad:b2c:elements:unifiedssp:1.0.0` | Displays a form for signing in with a local account that's based on an email address or a user name. This value also provides the “keep me sign-in functionality” and “Forgot your password?” link. |
83-
| `urn:com:microsoft:aad:b2c:elements:unifiedssd:1.0.0` | Displays a form for signing in with a local account that's based on an email address or a user name. |
84-
| `urn:com:microsoft:aad:b2c:elements:multifactor:1.1.0` | Verifies phone numbers by using text or voice during sign-up or sign-in. |
85-
| `urn:com:microsoft:aad:b2c:elements:selfasserted:1.1.0` | Displays a form that enables users to create or update their profile. |
80+
| `globalexception` | Displays an error page when an exception or an error is encountered. |
81+
| `providerselection` | Lists the identity providers that users can choose from during sign-in. |
82+
| `unifiedssp` | Displays a form for signing in with a local account that's based on an email address or a user name. This value also provides the “keep me sign-in functionality” and “Forgot your password?” link. |
83+
| `unifiedssp` | Displays a form for signing in with a local account that's based on an email address or a user name. |
84+
| `multifactor` | Verifies phone numbers by using text or voice during sign-up or sign-in. |
85+
| `selfasserted` | Displays a form that enables users to create or update their profile. |
86+
87+
## Select a page layout
88+
89+
You can enable [JavaScript client-side code](javascript-samples.md) by inserting `contract` between `elements` and the page type. For example, `urn:com:microsoft:aad:b2c:elements:contract:page-name:version`.
90+
91+
[!INCLUDE [active-directory-b2c-public-preview](../../includes/active-directory-b2c-public-preview.md)]
8692

93+
The [version](page-layout.md) part of the `DataUri` specifies the package of content containing HTML, CSS, and JavaScript for the user interface elements in your policy. If you intend to enable JavaScript client-side code, the elements you base your JavaScript on must be immutable. If they're not immutable, any changes could cause unexpected behavior on your user pages. To prevent these issues, enforce the use of a page layout and specify a page layout version. Doing so ensures that all content definitions you’ve based your JavaScript on are immutable. Even if you don’t intend to enable JavaScript, you still need to specify the page layout version for your pages.
94+
95+
The following example shows the **DataUri** of `selfasserted` version `1.2.0`:
96+
97+
```xml
98+
<ContentDefinition Id="api.localaccountpasswordreset">
99+
<LoadUri>~/tenant/templates/AzureBlue/selfAsserted.cshtml</LoadUri>
100+
<RecoveryUri>~/common/default_page_error.html</RecoveryUri>
101+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:1.2.0</DataUri>
102+
<Metadata>
103+
<Item Key="DisplayName">Local account change password page</Item>
104+
</Metadata>
105+
</ContentDefinition>
106+
```
107+
108+
#### Migrating to page layout
109+
110+
The format of the value must contain the word `contract`: _urn:com:microsoft:aad:b2c:elements:**contract**:page-name:version_. To specify a page layout in your custom policies that use an old **DataUri** value, use following table to migrate to the new format.
111+
112+
| Old DataUri value | New DataUri value |
113+
| ----------------- | ----------------- |
114+
| `urn:com:microsoft:aad:b2c:elements:globalexception:1.0.0` | `urn:com:microsoft:aad:b2c:elements:contract:globalexception:1.2.0` |
115+
| `urn:com:microsoft:aad:b2c:elements:globalexception:1.1.0` | `urn:com:microsoft:aad:b2c:elements:contract:globalexception:1.2.0` |
116+
| `urn:com:microsoft:aad:b2c:elements:idpselection:1.0.0` | `urn:com:microsoft:aad:b2c:elements:contract:providerselection:1.2.0` |
117+
| `urn:com:microsoft:aad:b2c:elements:multifactor:1.0.0` | `urn:com:microsoft:aad:b2c:elements:contract:multifactor:1.2.0` |
118+
| `urn:com:microsoft:aad:b2c:elements:multifactor:1.1.0` | `urn:com:microsoft:aad:b2c:elements:contract:multifactor:1.2.0` |
119+
| `urn:com:microsoft:aad:b2c:elements:selfasserted:1.0.0` | `urn:com:microsoft:aad:b2c:elements:contract:selfasserted:1.2.0` |
120+
| `urn:com:microsoft:aad:b2c:elements:selfasserted:1.1.0` | `urn:com:microsoft:aad:b2c:elements:contract:selfasserted:1.2.0` |
121+
| `urn:com:microsoft:aad:b2c:elements:unifiedssd:1.0.0` | `urn:com:microsoft:aad:b2c:elements:contract:unifiedssd:1.2.0` |
122+
| `urn:com:microsoft:aad:b2c:elements:unifiedssp:1.0.0` | `urn:com:microsoft:aad:b2c:elements:contract:unifiedssp:1.2.0` |
123+
| `urn:com:microsoft:aad:b2c:elements:unifiedssp:1.1.0` | `urn:com:microsoft:aad:b2c:elements:contract:unifiedssp:1.2.0` |
87124

88125
### LocalizedResourcesReferences
89126

@@ -100,19 +137,6 @@ The **LocalizedResourcesReferences** element contains the following attributes:
100137
| Language | Yes | A string that contains a supported language for the policy per RFC 5646 - Tags for Identifying Languages. |
101138
| LocalizedResourcesReferenceId | Yes | The identifier of the **LocalizedResources** element. |
102139

103-
The following example shows a sign-up or sign-in content definition:
104-
105-
```XML
106-
<ContentDefinition Id="api.signuporsignin">
107-
<LoadUri>~/tenant/default/unified.cshtml</LoadUri>
108-
<RecoveryUri>~/common/default_page_error.html</RecoveryUri>
109-
<DataUri>urn:com:microsoft:aad:b2c:elements:unifiedssp:1.0.0</DataUri>
110-
<Metadata>
111-
<Item Key="DisplayName">Signin and Signup</Item>
112-
</Metadata>
113-
</ContentDefinition>
114-
```
115-
116140
The following example shows a sign-up or sign-in content definition with a reference to localization for English, French and Spanish:
117141

118142
```XML
@@ -150,3 +174,8 @@ The ID attribute of the **ContentDefinition** element specifies the type of page
150174
| **api.selfasserted.profileupdate** | [updateprofile.cshtml](https://login.microsoftonline.com/static/tenant/default/updateProfile.cshtml) | **Profile update page** - Displays a form that users can access to update their profile. This page is similar to the social account sign up page, except for the password entry fields. |
151175
| **api.signuporsignin** | [unified.cshtml](https://login.microsoftonline.com/static/tenant/default/unified.cshtml) | **Unified sign-up or sign-in page** - Handles the user sign-up and sign-in process. Users can use enterprise identity providers, social identity providers such as Facebook or Google+, or local accounts. |
152176

177+
## Next steps
178+
179+
For an example of customizing the user interface by using content definitions, see:
180+
181+
[Customize the user interface of your application using a custom policy](custom-policy-ui-customization.md)

articles/active-directory-b2c/display-controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Certain display claims are required for certain types of display control. For ex
8686

8787
The **output claims** of a display control are not sent to the next orchestration step. They are saved temporarily only for the current display control session. These temporary claims can be shared between the different actions of the same display control.
8888

89-
To bubble up the output the claims to the next orchestration step, use the **OutputClaims** of the actual self-asserted technical profile which references this display control.
89+
To bubble up the output claims to the next orchestration step, use the **OutputClaims** of the actual self-asserted technical profile which references this display control.
9090

9191
### Display control Actions
9292

0 commit comments

Comments
 (0)