Skip to content

Commit 33d804b

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into translator-zoned-pivots-test
2 parents 212b80d + a14ed3c commit 33d804b

File tree

2,889 files changed

+22767
-36821
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,889 files changed

+22767
-36821
lines changed

.openpublishing.publish.config.json

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -180,6 +180,11 @@
180180
"url": "https://github.com/Azure/azure-iot-sdk-c",
181181
"branch": "master"
182182
},
183+
{
184+
"path_to_root": "samples-cognitive-services-python-sdk",
185+
"url": "https://github.com/Azure-Samples/cognitive-services-python-sdk-samples",
186+
"branch": "master"
187+
},
183188
{
184189
"path_to_root": "samples-cognitive-services-speech-sdk",
185190
"url": "https://github.com/Azure-Samples/cognitive-services-speech-sdk",
@@ -301,6 +306,11 @@
301306
"url": "https://github.com/Azure-Samples/cosmos-dotnet-core-todo-app",
302307
"branch": "master"
303308
},
309+
{
310+
"path_to_root": "samples-cosmosdb-xamarin",
311+
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-xamarin-getting-started",
312+
"branch": "master"
313+
},
304314
{
305315
"path_to_root": "cosmosdb-nodejs-get-started",
306316
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-api-nodejs-getting-started",
@@ -345,6 +355,12 @@
345355
"path_to_root": "cognitive-services-quickstart-code",
346356
"url": "https://github.com/Azure-Samples/cognitive-services-quickstart-code",
347357
"branch": "master"
358+
},
359+
{
360+
"path_to_root": "ImmersiveReaderSdk",
361+
"url": "https://github.com/microsoft/immersive-reader-sdk",
362+
"branch": "master",
363+
"branch_mapping": {}
348364
}
349365
],
350366
"branch_target_mapping": {

articles/active-directory-b2c/active-directory-b2c-custom-setup-goog-idp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ You can define a Google account as a claims provider by adding it to the **Claim
7777
<Item Key="authorization_endpoint">https://accounts.google.com/o/oauth2/auth</Item>
7878
<Item Key="AccessTokenEndpoint">https://accounts.google.com/o/oauth2/token</Item>
7979
<Item Key="ClaimsEndpoint">https://www.googleapis.com/oauth2/v1/userinfo</Item>
80-
<Item Key="scope">email</Item>
80+
<Item Key="scope">email profile</Item>
8181
<Item Key="HttpBinding">POST</Item>
8282
<Item Key="UsePolicyInRedirectUri">0</Item>
8383
<Item Key="client_id">Your Google application ID</Item>

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Azure AD B2C extends the standard OpenID Connect protocol to do more than simple
2828

2929
When your web application needs to authenticate the user and run a user flow, it can direct the user to the `/authorize` endpoint. The user takes action depending on the user flow.
3030

31-
In this request, the client indicates the permissions that it needs to acquire from the user in the `scope` parameter and the user flow to run in the `p` parameter. Three examples are provided in the following sections (with line breaks for readability), each using a different user flow. To get a feel for how each request works, try pasting the request into a browser and running it. You can replace `fabrikamb2c` with the name of your tenant if you have one and have created a user flow.
31+
In this request, the client indicates the permissions that it needs to acquire from the user in the `scope` parameter and the user flow to run in the `p` parameter. Three examples are provided in the following sections (with line breaks for readability), each using a different user flow. To get a feel for how each request works, try pasting the request into a browser and running it. You can replace `fabrikamb2c` with the name of your tenant if you have one and have created a user flow. You will also need to replace `90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6`. Replace this client ID with the app ID of the application registration you had created. Also change the policy name `b2c_1_sign_in` to the policy name that you have in your tenant.
3232

3333
#### Use a sign-in user flow
3434
```
@@ -72,14 +72,14 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
7272
| Parameter | Required | Description |
7373
| --------- | -------- | ----------- |
7474
| client_id | Yes | The application ID that the [Azure portal](https://portal.azure.com/) assigned to your application. |
75+
| nonce | Yes | A value included in the request (generated by the application) that is included in the resulting ID token as a claim. The application can then verify this value to mitigate token replay attacks. The value is typically a randomized unique string that can be used to identify the origin of the request. |
76+
| p | Yes | The user flow that is run. It is the name of a user flow that's created in your Azure AD B2C tenant. The name of the user flow should begin with `b2c\_1\_`. |
7577
| response_type | Yes | Must include an ID token for OpenID Connect. If your web application also needs tokens for calling a web API, you can use `code+id_token`. |
76-
| redirect_uri | No | The `redirect_uri` parameter of your application, where authentication responses can be sent and received by your application. It must exactly match one of the `redirect_uri` parameters that you registered in the Azure portal, except that it must be URL encoded. |
7778
| scope | Yes | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. The `offline_access` scope is optional for web applications. It indicates that your application will need a *refresh token* for extended access to resources. |
79+
| prompt | No | The type of user interaction that's required. The only valid value at this time is `login`, which forces the user to enter their credentials on that request. |
80+
| redirect_uri | No | The `redirect_uri` parameter of your application, where authentication responses can be sent and received by your application. It must exactly match one of the `redirect_uri` parameters that you registered in the Azure portal, except that it must be URL encoded. |
7881
| response_mode | No | The method that is used to send the resulting authorization code back to your application. It can be either `query`, `form_post`, or `fragment`. The `form_post` response mode is recommended for best security. |
7982
| state | No | A value included in the request that's also returned in the token response. It can be a string of any content that you want. A randomly generated unique value is typically used for preventing cross-site request forgery attacks. The state is also used to encode information about the user's state in the application before the authentication request occurred, such as the page they were on. |
80-
| nonce | Yes | A value included in the request (generated by the application) that is included in the resulting ID token as a claim. The application can then verify this value to mitigate token replay attacks. The value is typically a randomized unique string that can be used to identify the origin of the request. |
81-
| p | Yes | The user flow that is run. It is the name of a user flow that's created in your Azure AD B2C tenant. The name of the user flow should begin with `b2c\_1\_`. |
82-
| prompt | No | The type of user interaction that's required. The only valid value at this time is `login`, which forces the user to enter their credentials on that request. |
8383

8484
At this point, the user is asked to complete the workflow. The user might have to enter their username and password, sign in with a social identity, or sign up for the directory. There could be any other number of steps depending on how the user flow is defined.
8585

@@ -165,13 +165,13 @@ grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&sco
165165

166166
| Parameter | Required | Description |
167167
| --------- | -------- | ----------- |
168-
| p | Yes | The user flow that was used to acquire the authorization code. You can't use a different user flow in this request. Add this parameter to the query string, not to the POST body. |
169168
| client_id | Yes | The application ID that the [Azure portal](https://portal.azure.com/) assigned to your application. |
170-
| grant_type | Yes | The type of grant, which must be `authorization_code` for the authorization code flow. |
171-
| scope | No | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of id_token parameters. It can be used to get tokens to your application's own back-end web API, which is represented by the same application ID as the client. The `offline_access` scope indicates that your application needs a refresh token for extended access to resources. |
169+
| client_secret | Yes | The application secret that was generated in the [Azure portal](https://portal.azure.com/). This application secret is an important security artifact. You should store it securely on your server. Change this client secret on a periodic basis. |
172170
| code | Yes | The authorization code that you acquired in the beginning of the user flow. |
171+
| grant_type | Yes | The type of grant, which must be `authorization_code` for the authorization code flow. |
172+
| p | Yes | The user flow that was used to acquire the authorization code. You can't use a different user flow in this request. Add this parameter to the query string, not to the POST body. |
173173
| redirect_uri | Yes | The `redirect_uri` parameter of the application where you received the authorization code. |
174-
| client_secret | Yes | The application secret that was generated in the [Azure portal](https://portal.azure.com/). This application secret is an important security artifact. You should store it securely on your server. Change this client secret on a periodic basis. |
174+
| scope | No | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of id_token parameters. It can be used to get tokens to your application's own back-end web API, which is represented by the same application ID as the client. The `offline_access` scope indicates that your application needs a refresh token for extended access to resources. |
175175

176176
A successful token response looks like:
177177

@@ -232,13 +232,13 @@ grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=op
232232

233233
| Parameter | Required | Description |
234234
| --------- | -------- | ----------- |
235-
| p | Yes | The user flow that was used to acquire the original refresh token. You can't use a different user flow in this request. Add this parameter to the query string, not to the POST body. |
236235
| client_id | Yes | The application ID that the [Azure portal](https://portal.azure.com/) assigned to your application. |
236+
| client_secret | Yes | The application secret that was generated in the [Azure portal](https://portal.azure.com/). This application secret is an important security artifact. You should store it securely on your server. Change this client secret on a periodic basis. |
237237
| grant_type | Yes | The type of grant, which must be a refresh token for this part of the authorization code flow. |
238-
| scope | No | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. It can be used to send tokens to your application's own back-end web API, which is represented by the same application ID as the client. The `offline_access` scope indicates that your application needs a refresh token for extended access to resources. |
239-
| redirect_uri | No | The `redirect_uri` parameter of the application where you received the authorization code. |
240238
| refresh_token | Yes | The original refresh token that was acquired in the second part of the flow. The `offline_access` scope must be used in both the authorization and token requests in order to receive a refresh token. |
241-
| client_secret | Yes | The application secret that was generated in the [Azure portal](https://portal.azure.com/). This application secret is an important security artifact. You should store it securely on your server. Change this client secret on a periodic basis. |
239+
| p | Yes | The user flow that was used to acquire the original refresh token. You can't use a different user flow in this request. Add this parameter to the query string, not to the POST body. |
240+
| redirect_uri | No | The `redirect_uri` parameter of the application where you received the authorization code. |
241+
| scope | No | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. It can be used to send tokens to your application's own back-end web API, which is represented by the same application ID as the client. The `offline_access` scope indicates that your application needs a refresh token for extended access to resources. |
242242

243243
A successful token response looks like:
244244

articles/active-directory-b2c/active-directory-b2c-setup-qq-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ To use a QQ account as an identity provider in Azure Active Directory (Azure AD)
2626
### Register for the QQ developer program
2727

2828
1. Sign in to the [QQ developer portal](http://open.qq.com) with your QQ account credentials.
29-
2. After signing in, go to [http://open.qq.com/reg](http://open.qq.com/reg) to register yourself as a developer.
29+
2. After signing in, go to [https://open.qq.com/reg](https://open.qq.com/reg) to register yourself as a developer.
3030
3. Select **个人** (individual developer).
3131
4. Enter the required information and select **下一步** (next step).
3232
5. Complete the email verification process. You will need to wait a few days to be approved after registering as a developer.

0 commit comments

Comments
 (0)