Skip to content

Commit 340cb9c

Browse files
committed
Merge branch 'main' into release-preview-energy-data-services
2 parents b5e87c9 + 59569d7 commit 340cb9c

File tree

347 files changed

+3190
-2190
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

347 files changed

+3190
-2190
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@
355355
items:
356356
- name: Multi-factor authentication
357357
href: multi-factor-authentication.md
358-
displayName: TOTP, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
358+
displayName: TOTP, multi-factor, multifactor, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
359359
- name: Partner integration
360360
items:
361361
- name: Asignio

articles/active-directory-b2c/json-transformations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ The following example generates a JSON string based on the claim value of "email
152152
<InputClaims>
153153
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.to.0.email" />
154154
<InputClaim ClaimTypeReferenceId="otp" TransformationClaimType="personalizations.0.dynamic_template_data.otp" />
155-
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
155+
<InputClaim ClaimTypeReferenceId="copiedEmail" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
156156
</InputClaims>
157157
<InputParameters>
158158
<InputParameter Id="template_id" DataType="string" Value="d-4c56ffb40fa648b1aa6822283df94f60"/>
@@ -169,6 +169,7 @@ The following claims transformation outputs a JSON string claim that will be the
169169

170170
- Input claims:
171171
- **email**, transformation claim type **personalizations.0.to.0.email**: "[email protected]"
172+
- **copiedEmail**, transformation claim type **personalizations.0.dynamic_template_data.verify-email**: "[email protected]"
172173
- **otp**, transformation claim type **personalizations.0.dynamic_template_data.otp** "346349"
173174
- Input parameter:
174175
- **template_id**: "d-4c56ffb40fa648b1aa6822283df94f60"

articles/active-directory-b2c/openid-connect.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/12/2022
11+
ms.date: 08/12/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -43,7 +43,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
4343
&response_type=code+id_token
4444
&redirect_uri=https%3A%2F%2Fjwt.ms%2F
4545
&response_mode=fragment
46-
&scope=&scope=openid%20offline_access%20{application-id-uri}/{scope-name}
46+
&scope=openid%20offline_access%20{application-id-uri}/{scope-name}
4747
&state=arbitrary_data_you_can_receive_in_the_response
4848
&nonce=12345
4949
```

articles/active-directory-b2c/user-flow-custom-attributes.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,12 @@ You can create these attributes by using the portal UI before or after you use t
143143

144144
|Name |Used in |
145145
|---------|---------|
146-
|`extension_loyaltyId` | Custom policy|
146+
|`extension_loyaltyId` | Custom policy|
147147
|`extension_<b2c-extensions-app-guid>_loyaltyId` | [Microsoft Graph API](microsoft-graph-operations.md#application-extension-directory-extension-properties)|
148148

149+
> [!NOTE]
150+
> When using a custom attribute in custom policies, you must prefix the claim type ID with `extension_` to allow the correct data mapping to take place within the Azure AD B2C directory.
151+
149152
The following example demonstrates the use of custom attributes in an Azure AD B2C custom policy claim definition.
150153

151154
```xml

articles/active-directory/develop/msal-net-token-cache-serialization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ Here are examples of possible distributed caches:
9898
services.Configure<MsalDistributedTokenCacheAdapterOptions>(options =>
9999
{
100100
// Optional: Disable the L1 cache in apps that don't use session affinity
101-
// by setting DisableL1Cache to 'false'.
101+
// by setting DisableL1Cache to 'true'.
102102
options.DisableL1Cache = false;
103103

104104
// Or limit the memory (by default, this is 500 MB)

articles/active-directory/hybrid/reference-connect-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ sections:
143143
- question: |
144144
Are single label domains (SLDs) supported?
145145
answer: |
146-
While we strongly recommend against this network configuration ([see article](https://support.microsoft.com/help/2269810/microsoft-support-for-single-label-domains)), using Azure AD Connect sync with a single label domain is supported, as long as the network configuration for the single level domain is functioning correctly.
146+
While we strongly recommend against this network configuration ([see article](https://support.microsoft.com/help/2269810/microsoft-support-for-single-label-domains)), using Azure AD Connect sync with a single label domain is supported, as long as the network configuration for the single level domain is functioning correctly. In SLD scenarios where the Active Directory NetBIOS domain name differs from the FQDN domain name, it's unsupported to install Azure AD Connect.
147147
148148
- question: |
149149
Are Forests with disjoint AD domains supported?

articles/active-directory/manage-apps/datawiza-azure-ad-sso-oracle-jde.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ To integrate Oracle JDE with Azure AD:
9898
|:-----|:-------|
9999
| Platform | Web |
100100
| App Name | Enter a unique application name.|
101-
| Public Domain | For example: https:/jde-external.example.com. <br>For testing, you can use localhost DNS. If you aren't deploying DAB behind a load balancer, use the **Public Domain** port. |
101+
| Public Domain | For example: `https://jde-external.example.com`. <br>For testing, you can use localhost DNS. If you aren't deploying DAB behind a load balancer, use the **Public Domain** port. |
102102
| Listen Port | The port that DAB listens on.|
103103
| Upstream Servers | The Oracle JDE implementation URL and port to be protected.|
104104

articles/active-directory/saas-apps/tickitlms-learn-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7373
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
7474

7575
In the **Sign-on URL** text box, type the URL:
76-
`https:/learn.tickitlms.com/sso/login`
76+
`https://learn.tickitlms.com/sso/login`
7777

7878
1. Click **Save**.
7979

articles/active-directory/verifiable-credentials/admin-api.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1048,17 +1048,17 @@ Don't supply a request body for this method.
10481048

10491049
example message:
10501050

1051-
```
1051+
```json
10521052
{
1053-
value:
1053+
"value":
10541054
[
10551055
{
10561056
"id": "ZjViZjJmYzYtNzEzNS00ZDk0LWE2ZmUtYzI2ZTQ1NDNiYzVhPHNjcmlwdD5hbGVydCgneWF5IScpOzwvc2NyaXB0Pg",
10571057
"name": "test1",
10581058
"authorityId": "ffea7eb3-0000-1111-2222-000000000000",
10591059
"status": "Enabled",
10601060
"issueNotificationEnabled": false,
1061-
"manifestUrl" : "https:/...",
1061+
"manifestUrl" : "https://...",
10621062
"rules": "<rules JSON>",
10631063
"displays": [{<display JSON}]
10641064
},
@@ -1068,7 +1068,7 @@ example message:
10681068
"authorityId": "cc55ba22-0000-1111-2222-000000000000",
10691069
"status": "Enabled",
10701070
"issueNotificationEnabled": false,
1071-
"manifestUrl" : "https:/...",
1071+
"manifestUrl" : "https://...",
10721072
"rules": "<rules JSON>",
10731073
"displays": [{<display JSON}]
10741074
}

articles/aks/certificate-rotation.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 5/10/2022
1111
Azure Kubernetes Service (AKS) uses certificates for authentication with many of its components. If you have a RBAC-enabled cluster built after March 2022 it is enabled with certificate auto-rotation. Periodically, you may need to rotate those certificates for security or policy reasons. For example, you may have a policy to rotate all your certificates every 90 days.
1212

1313
> [!NOTE]
14-
> Certificate auto-rotation will not be enabled by default for non-RBAC enabled AKS clusters.
14+
> Certificate auto-rotation will *only* be enabled by default for RBAC enabled AKS clusters.
1515
1616
This article shows you how certificate rotation works in your AKS cluster.
1717

@@ -55,10 +55,11 @@ az vmss run-command invoke -g MC_rg_myAKSCluster_region -n vmss-name --instance-
5555

5656
## Certificate Auto Rotation
5757

58-
For AKS to automatically rotate non-CA certificates, the cluster must have [TLS Bootstrapping](https://kubernetes.io/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/) which has been enabled by default in all Azure regions.
58+
For AKS to automatically rotate non-CA certificates, the cluster must have [TLS Bootstrapping](https://kubernetes.io/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/) which has been enabled by default in all Azure regions.
5959

6060
> [!Note]
6161
> If you have an existing cluster you have to upgrade that cluster to enable Certificate Auto-Rotation.
62+
> Do not disable bootstrap to keep your auto-rotation enabled.
6263
6364
For any AKS clusters created or upgraded after March 2022 Azure Kubernetes Service will automatically rotate non-CA certificates on both the control plane and agent nodes within 80% of the client certificate valid time, before they expire with no downtime for the cluster.
6465

@@ -82,7 +83,7 @@ az aks upgrade -g $RESOURCE_GROUP_NAME -n $CLUSTER_NAME
8283

8384
### Limitation
8485

85-
Auto certificate rotation won't be enabled on a non-RBAC cluster.
86+
Certificate auto-rotation will only be enabled by default for RBAC enabled AKS clusters.
8687

8788
## Manually rotate your cluster certificates
8889

0 commit comments

Comments
 (0)