Skip to content

Commit 33368ca

Browse files
authored
Merge pull request #134228 from MicrosoftDocs/master
10/16 AM Publish
2 parents 7dacbf3 + 9953a03 commit 33368ca

File tree

124 files changed

+1525
-1007
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

124 files changed

+1525
-1007
lines changed

.openpublishing.redirection.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43554,17 +43554,17 @@
4355443554
},
4355543555
{
4355643556
"source_path": "articles/azure-monitor/platform/resource-logs-stream-event-hubs.md",
43557-
"redirect_url": "/azure/azure-monitor/platform/resource-logs#collect-to-azure-event-hubs",
43557+
"redirect_url": "/azure/azure-monitor/platform/resource-logs#send-to-azure-event-hubs",
4355843558
"redirect_document_id": false
4355943559
},
4356043560
{
4356143561
"source_path": "articles/azure-monitor/platform/resource-logs-collect-storage.md",
43562-
"redirect_url": "/azure/azure-monitor/platform/resource-logs#collect-to-azure-storage",
43562+
"redirect_url": "/azure/azure-monitor/platform/resource-logs#send-to-azure-storage",
4356343563
"redirect_document_id": false
4356443564
},
4356543565
{
4356643566
"source_path": "articles/azure-monitor/platform/resource-logs-collect-workspace.md",
43567-
"redirect_url": "/azure/azure-monitor/platform/resource-logs#collect-to-log-analytics-workspace",
43567+
"redirect_url": "/azure/azure-monitor/platform/resource-logs#send-to-log-analytics-workspace",
4356843568
"redirect_document_id": false
4356943569
},
4357043570
{

articles/active-directory-b2c/custom-policy-localization.md

Lines changed: 161 additions & 158 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/custom-policy-password-change.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/13/2018
12+
ms.date: 10/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -34,7 +34,7 @@ Complete the steps in [Get started with custom policies in Active Directory B2C]
3434
<ClaimType Id="oldPassword">
3535
<DisplayName>Old Password</DisplayName>
3636
<DataType>string</DataType>
37-
<UserHelpText>Enter password</UserHelpText>
37+
<UserHelpText>Enter your old password</UserHelpText>
3838
<UserInputType>Password</UserInputType>
3939
</ClaimType>
4040
</ClaimsSchema>
@@ -175,7 +175,7 @@ When testing your applications in Azure AD B2C, it can be useful to have the Azu
175175

176176
1. Open the policy that you changed. For example, *B2C_1A_profile_edit_password_change*.
177177
2. For **Application**, select your application that you previously registered. To see the token, the **Reply URL** should show `https://jwt.ms`.
178-
3. Click **Run now**. Sign in with the acouunt that you previously created. You should now have the opportunity to change the password.
178+
3. Click **Run now**. Sign in with the account that you previously created. You should now have the opportunity to change the password.
179179

180180
## Next steps
181181

articles/active-directory-b2c/id-token-hint.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 09/15/2020
12+
ms.date: 10/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -83,13 +83,13 @@ The following metadata is relevant when using symmetric key.
8383
| issuer | Yes | Identifies the security token service (token issuer). This value must be identical to the `iss` claim within the JWT token claim. |
8484
| IdTokenAudience | Yes | Identifies the intended recipient of the token. Must be identical to the `aud` claim withing the JWT token claim. |
8585

86-
The following metadata is relevant when using a symmetric key.
86+
The following metadata is relevant when using an asymmetric key.
8787

8888
| Attribute | Required | Description |
8989
| --------- | -------- | ----------- |
9090
| METADATA| Yes | A URL that points to a token issuer configuration document, which is also known as an OpenID well-known configuration endpoint. |
9191
| issuer | No | Identifies the security token service (token issuer). This value can be used to overwrite the value configured in the metadata, and must be identical to the `iss` claim within the JWT token claim. |
92-
| IdTokenAudience | No | Identifies the intended recipient of the token. This value can be used to overwrite the value configured in the metadata, and must be identical to the `aud` claim within the JWT token claim. |
92+
| IdTokenAudience | No | Identifies the intended recipient of the token. Must be identical to the `aud` claim withing the JWT token claim. |
9393

9494
## Cryptographic keys
9595

@@ -215,7 +215,7 @@ The following technical profile validates the token and extracts the claims. Cha
215215
<Metadata>
216216
<!-- Replace with your endpoint location -->
217217
<Item Key="METADATA">https://your-app.azurewebsites.net/.well-known/openid-configuration</Item>
218-
<!-- <Item Key="IdTokenAudience">your_optional_audience_override</Item> -->
218+
<Item Key="IdTokenAudience">your_optional_audience</Item> -->
219219
<!-- <Item Key="issuer">your_optional_token_issuer_override</Item> -->
220220
</Metadata>
221221
<OutputClaims>

articles/active-directory-b2c/saml-identity-provider-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 10/14/2020
12+
ms.date: 10/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -144,7 +144,7 @@ The **OutputClaimsTransformations** element may contain a collection of **Output
144144
| --------- | -------- | ----------- |
145145
| PartnerEntity | Yes | URL of the metadata of the SAML identity provider. Copy the identity provider metadata and add it inside the CDATA element `<![CDATA[Your IDP metadata]]>` |
146146
| WantsSignedRequests | No | Indicates whether the technical profile requires all of the outgoing authentication requests to be signed. Possible values: `true` or `false`. The default value is `true`. When the value is set to `true`, the **SamlMessageSigning** cryptographic key needs to be specified and all of the outgoing authentication requests are signed. If the value is set to `false`, the **SigAlg** and **Signature** parameters (query string or post parameter) are omitted from the request. This metadata also controls the metadata **AuthnRequestsSigned** attribute, which is output in the metadata of the Azure AD B2C technical profile that is shared with the identity provider. Azure AD B2C doesn't sign the request if the value of **WantsSignedRequests** in the technical profile metadata is set to `false` and the identity provider metadata **WantAuthnRequestsSigned** is set to `false` or not specified. |
147-
| XmlSignatureAlgorithm | No | The method that Azure AD B2C uses to sign the SAML request. This metadata controls the value of the **SigAlg** parameter (query string or post parameter) in the SAML request. Possible values: `Sha256`, `Sha384`, `Sha512`, or `Sha1`. Make sure you configure the signature algorithm on both sides with same value. Use only the algorithm that your certificate supports. |
147+
| XmlSignatureAlgorithm | No | The method that Azure AD B2C uses to sign the SAML request. This metadata controls the value of the **SigAlg** parameter (query string or post parameter) in the SAML request. Possible values: `Sha256`, `Sha384`, `Sha512`, or `Sha1` (default). Make sure you configure the signature algorithm on both sides with same value. Use only the algorithm that your certificate supports. |
148148
| WantsSignedAssertions | No | Indicates whether the technical profile requires all incoming assertions to be signed. Possible values: `true` or `false`. The default value is `true`. If the value is set to `true`, all assertions section `saml:Assertion` sent by the identity provider to Azure AD B2C must be signed. If the value is set to `false`, the identity provider shouldn’t sign the assertions, but even if it does, Azure AD B2C won’t validate the signature. This metadata also controls the metadata flag **WantsAssertionsSigned**, which is output in the metadata of the Azure AD B2C technical profile that is shared with the identity provider. If you disable the assertions validation, you also may want to disable the response signature validation (for more information, see **ResponsesSigned**). |
149149
| ResponsesSigned | No | Possible values: `true` or `false`. The default value is `true`. If the value is set to `false`, the identity provider shouldn’t sign the SAML response, but even if it does, Azure AD B2C won’t validate the signature. If the value is set to `true`, the SAML response sent by the identity provider to Azure AD B2C is signed and must be validated. If you disable the SAML response validation, you also may want to disable the assertion signature validation (for more information, see **WantsSignedAssertions**). |
150150
| WantsEncryptedAssertions | No | Indicates whether the technical profile requires all incoming assertions to be encrypted. Possible values: `true` or `false`. The default value is `false`. If the value is set to `true`, assertions sent by the identity provider to Azure AD B2C must be signed and the **SamlAssertionDecryption** cryptographic key needs to be specified. If the value is set to `true`, the metadata of the Azure AD B2C technical profile includes the **encryption** section. The identity provider reads the metadata and encrypts the SAML response assertion with the public key that is provided in the metadata of the Azure AD B2C technical profile. If you enable the assertions encryption, you also may need to disable the response signature validation (for more information, see **ResponsesSigned**). |

articles/active-directory-b2c/troubleshoot-with-application-insights.md

Lines changed: 28 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: troubleshooting
12-
ms.date: 10/12/2020
12+
ms.date: 10/16/2020
1313
ms.custom: project-no-code
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -22,7 +22,7 @@ This article provides steps for collecting logs from Active Directory B2C (Azure
2222
The detailed activity logs described here should be enabled **ONLY** during the development of your custom policies.
2323

2424
> [!WARNING]
25-
> Do not enable development mode in production. Logs collect all claims sent to and from identity providers. You as the developer assume responsibility for any personal data collected in your Application Insights logs. These detailed logs are collected only when the policy is placed in **DEVELOPER MODE**.
25+
> Do not set the `DeploymentMode` to `Developer` in production environments. Logs collect all claims sent to and from identity providers. You as the developer assume responsibility for any personal data collected in your Application Insights logs. These detailed logs are collected only when the policy is placed in **DEVELOPER MODE**.
2626
2727
## Set up Application Insights
2828

@@ -54,7 +54,7 @@ If you don't already have one, create an instance of Application Insights in you
5454
<JourneyInsights TelemetryEngine="ApplicationInsights" InstrumentationKey="{Your Application Insights Key}" DeveloperMode="true" ClientEnabled="false" ServerEnabled="true" TelemetryVersion="1.0.0" />
5555
```
5656

57-
* `DeveloperMode="true"` tells ApplicationInsights to expedite the telemetry through the processing pipeline. Good for development, but constrained at high volumes.
57+
* `DeveloperMode="true"` tells ApplicationInsights to expedite the telemetry through the processing pipeline. Good for development, but constrained at high volumes. In production, set the `DeveloperMode` to `false`.
5858
* `ClientEnabled="true"` sends the ApplicationInsights client-side script for tracking page view and client-side errors. You can view these in the **browserTimings** table in the Application Insights portal. By setting `ClientEnabled= "true"`, you add Application Insights to your page script and you get timings of page loads and AJAX calls, counts, details of browser exceptions and AJAX failures, and user and session counts. This field is **optional**, and is set to `false` by default.
5959
* `ServerEnabled="true"` sends the existing UserJourneyRecorder JSON as a custom event to Application Insights.
6060

@@ -99,6 +99,31 @@ The entries may be long. Export to CSV for a closer look.
9999

100100
For more information about querying, see [Overview of log queries in Azure Monitor](../azure-monitor/log-query/log-query-overview.md).
101101

102+
## Configure Application Insights in Production
103+
104+
To improve your production environment performance and better user experience, it's important to configure your policy to ignore messages that are unimportant. Use the following configuration to send only critical error messages to your Application Insights.
105+
106+
1. Set the `DeploymentMode` attribute of the [TrustFrameworkPolicy](trustframeworkpolicy.md) to `Production`.
107+
108+
```xml
109+
<TrustFrameworkPolicy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns="http://schemas.microsoft.com/online/cpim/schemas/2013/06" PolicySchemaVersion="0.3.0.0"
110+
TenantId="yourtenant.onmicrosoft.com"
111+
PolicyId="B2C_1A_signup_signin"
112+
PublicPolicyUri="http://yourtenant.onmicrosoft.com/B2C_1A_signup_signin"
113+
DeploymentMode="Production"
114+
UserJourneyRecorderEndpoint="urn:journeyrecorder:applicationinsights">
115+
```
116+
117+
1. Set the `DeveloperMode` of the [JourneyInsights](relyingparty.md#journeyinsights) to `false`.
118+
119+
```xml
120+
<UserJourneyBehaviors>
121+
<JourneyInsights TelemetryEngine="ApplicationInsights" InstrumentationKey="{Your Application Insights Key}" DeveloperMode="false" ClientEnabled="false" ServerEnabled="true" TelemetryVersion="1.0.0" />
122+
</UserJourneyBehaviors>
123+
```
124+
125+
1. Upload and test your policy.
126+
102127
## Next steps
103128

104129
The community has developed a user journey viewer to help identity developers. It reads from your Application Insights instance and provides a well-structured view of the user journey events. You obtain the source code and deploy it in your own solution.

articles/active-directory/app-provisioning/application-provisioning-log-analytics.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -13,19 +13,19 @@ ms.author: kenwith
1313
ms.reviewer: arvinh,luleon
1414
---
1515

16-
# Understand how Provisioning integrates with Azure Monitor logs
16+
# Understand how provisioning integrates with Azure Monitor logs
1717

18-
Provisioning integrates with Azure Monitor logs and Log Analytics. With Azure Monitoring you can do things like create workbooks, also known as dashboards, store provisioning logs for 30+ days, and create custom queries and alerts. This article discusses how provisioning logs integrate with Azure Monitor logs. To learn more about how provisioning logs work in general, see [Provisioning logs](../reports-monitoring/concept-provisioning-logs.md).
18+
Provisioning integrates with Azure Monitor logs and Log Analytics. With Azure monitoring you can do things like create workbooks, also known as dashboards, store provisioning logs for 30+ days, and create custom queries and alerts. This article discusses how provisioning logs integrate with Azure Monitor logs. To learn more about how provisioning logs work in general, see [provisioning logs](../reports-monitoring/concept-provisioning-logs.md).
1919

20-
## Enabling Provisioning logs
20+
## Enabling provisioning logs
2121

22-
You should already be familiar with Azure Monitoring and Log Analytics. If not, jump over to learn about them and then come back to learn about Application Provisioning logs. To learn more about Azure Monitoring, see [Azure Monitor overview](../../azure-monitor/overview.md). To learn more about Azure Monitor logs and Log Analytics, see [Overview of log queries in Azure Monitor](../../azure-monitor/log-query/log-query-overview.md).
22+
You should already be familiar with Azure monitoring and Log Analytics. If not, jump over to learn about them and then come back to learn about application provisioning logs. To learn more about Azure monitoring, see [Azure Monitor overview](../../azure-monitor/overview.md). To learn more about Azure Monitor logs and Log Analytics, see [Overview of log queries in Azure Monitor](../../azure-monitor/log-query/log-query-overview.md).
2323

24-
Once you've configured on Azure Monitoring, you can enable logs for Application Provisioning. The option is located on the **Diagnostics settings** page.
24+
Once you've configured on Azure monitoring, you can enable logs for application provisioning. The option is located on the **Diagnostics settings** page.
2525

2626
:::image type="content" source="media/application-provisioning-log-analytics/diagnostic-settings.png" alt-text="Access diagnostic settings" lightbox="media/application-provisioning-log-analytics/diagnostic-settings.png":::
2727

28-
:::image type="content" source="media/application-provisioning-log-analytics/enable-log-analytics.png" alt-text="Enable Application Provisioning logs" lightbox="media/application-provisioning-log-analytics/enable-log-analytics.png":::
28+
:::image type="content" source="media/application-provisioning-log-analytics/enable-log-analytics.png" alt-text="Enable application provisioning logs" lightbox="media/application-provisioning-log-analytics/enable-log-analytics.png":::
2929

3030
> [!NOTE]
3131
> If you have just recently provisioned a workspace, it can take some time before you can send logs to it. If you receive an error that the subscription is not registered to use *microsoft.insights* then check back after a few minutes.
@@ -44,17 +44,17 @@ The underlying data stream that Provisioning sends log viewers is almost identic
4444

4545
Azure Monitor workbooks provide a flexible canvas for data analysis. They also provide for the creation of rich visual reports within the Azure portal. To learn more, see [Azure Monitor Workbooks overview](../../azure-monitor/platform/workbooks-overview.md).
4646

47-
Application Provisioning comes with a set of pre-built workbooks. You can find them on the Workbooks page. To view the data, you'll need to ensure that all the filters (timeRange, jobID, appName) are populated. You'll also need to make sure you've provisioned an app, otherwise there won't be any data in the logs.
47+
Application provisioning comes with a set of pre-built workbooks. You can find them on the Workbooks page. To view the data, you'll need to ensure that all the filters (timeRange, jobID, appName) are populated. You'll also need to make sure you've provisioned an app, otherwise there won't be any data in the logs.
4848

49-
:::image type="content" source="media/application-provisioning-log-analytics/workbooks.png" alt-text="Application Provisioning workbooks" lightbox="media/application-provisioning-log-analytics/workbooks.png":::
49+
:::image type="content" source="media/application-provisioning-log-analytics/workbooks.png" alt-text="Application provisioning workbooks" lightbox="media/application-provisioning-log-analytics/workbooks.png":::
5050

51-
:::image type="content" source="media/application-provisioning-log-analytics/report.png" alt-text="Application Provisioning dashboard" lightbox="media/application-provisioning-log-analytics/report.png":::
51+
:::image type="content" source="media/application-provisioning-log-analytics/report.png" alt-text="Application provisioning dashboard" lightbox="media/application-provisioning-log-analytics/report.png":::
5252

5353
## Custom queries
5454

5555
You can create custom queries and show the data on Azure dashboards. To learn how, see [Create and share dashboards of Log Analytics data](../../azure-monitor/log-query/get-started-queries.md). Also, be sure to check out [Overview of log queries in Azure Monitor](../../azure-monitor/log-query/log-query-overview.md).
5656

57-
Here are some samples to get started with Application Provisioning.
57+
Here are some samples to get started with application provisioning.
5858

5959
Query the logs for a user a based on their ID in the source system:
6060
```kusto
@@ -108,7 +108,7 @@ Alert when there's a spike in disables or deletes.
108108

109109
## Community contributions
110110

111-
We're taking an open source and community-based approach to Application Provisioning queries and dashboards. If you've built a query, alert, or workbook that you think others would find useful, be sure to publish it to the [AzureMonitorCommunity GitHub repo](https://github.com/microsoft/AzureMonitorCommunity). Then shoot us an email with a link. We'll review and publish it to the service so others can benefit too. You can contact us at [email protected].
111+
We're taking an open source and community-based approach to application provisioning queries and dashboards. If you've built a query, alert, or workbook that you think others would find useful, be sure to publish it to the [AzureMonitorCommunity GitHub repo](https://github.com/microsoft/AzureMonitorCommunity). Then shoot us an email with a link. We'll review and publish it to the service so others can benefit too. You can contact us at [email protected].
112112

113113
## Next steps
114114

articles/api-management/api-management-cross-domain-policies.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,7 @@ Use the `cross-domain` policy to make the API accessible from Adobe Flash and Mi
4040

4141
```xml
4242
<cross-domain>
43-
<cross-domain>
4443
<allow-http-request-headers-from domain='*' headers='*' />
45-
</cross-domain>
4644
</cross-domain>
4745
```
4846

0 commit comments

Comments
 (0)