Skip to content

Commit 386835a

Browse files
authored
Merge pull request #1 from MicrosoftDocs/master
update to june8
2 parents d60320c + 3809d9e commit 386835a

File tree

7,627 files changed

+169465
-107417
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

7,627 files changed

+169465
-107417
lines changed

.gitignore

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
# Operating System files
2-
.DS_Store
2+
.DS_Store
33
Thumbs.db
44

55
# Visual Studio and VS Code files

.openpublishing.publish.config.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -210,6 +210,12 @@
210210
"branch": "tutorial",
211211
"branch_mapping": {}
212212
},
213+
{
214+
"path_to_root": "samples-tsi",
215+
"url": "https://github.com/Azure-Samples/Azure-Time-Series-Insights",
216+
"branch": "master",
217+
"branch_mapping": {}
218+
},
213219
{
214220
"path_to_root": "media-services-v3-dotnet-core-tutorials",
215221
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-core-tutorials",
@@ -300,6 +306,12 @@
300306
"branch": "master",
301307
"branch_mapping": {}
302308
},
309+
{
310+
"path_to_root": "cosmosdb-nodejs-get-started",
311+
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-api-nodejs-getting-started",
312+
"branch": "master",
313+
"branch_mapping": {}
314+
},
303315
{
304316
"path_to_root": "cognitive-services-content-moderator-samples",
305317
"url": "https://github.com/Azure-Samples/cognitive-services-content-moderator-samples",

.openpublishing.redirection.json

Lines changed: 1120 additions & 30 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-access-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Request an access token - Azure Active Directory B2C | Microsoft Docs
33
description: Learn how to request an access token from Azure Active Directory B2C.
44
services: active-directory-b2c
5-
author: davidmu1
5+
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
1111
ms.date: 04/16/2019
12-
ms.author: davidmu
12+
ms.author: marsma
1313
ms.subservice: B2C
1414

1515
---

articles/active-directory-b2c/active-directory-b2c-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Applications types that can be used in Azure Active Directory B2C | Microsoft Docs
33
description: Learn about the types of applications you can use in the Azure Active Directory B2C.
44
services: active-directory-b2c
5-
author: davidmu1
5+
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
1111
ms.date: 01/11/2019
12-
ms.author: davidmu
12+
ms.author: marsma
1313
ms.subservice: B2C
1414

1515
---

articles/active-directory-b2c/active-directory-b2c-configure-signup-self-asserted-custom.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,34 +2,34 @@
22
title: Add claims and customize user input using custom policies - Azure Active Directory B2C | Microsoft Docs
33
description: Learn how to customize user input and add claims to the sign-up or sign-in journey in Azure Active Directory B2C.
44
services: active-directory-b2c
5-
author: davidmu1
5+
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
1111
ms.date: 02/07/2019
12-
ms.author: davidmu
12+
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515
# Add claims and customize user input using custom policies in Azure Active Directory B2C
1616

1717
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1818

19-
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown, and define whether it's required.
19+
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown and define whether it's required.
2020

2121
## Prerequisites
2222

2323
Complete the steps in the article [Getting Started with Custom Policies](active-directory-b2c-get-started-custom.md). Test the sign-up or sign-in user journey to sign up a new local account before proceeding.
2424

2525
## Add claims
2626

27-
Gathering initial data from your users is achieved using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its selfasserted provider.
27+
Gathering initial data from your users is achieved using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its self-asserted provider.
2828

2929

3030
### Define the claim
3131

32-
Lets ask the user for their city. Add the following element to the **ClaimsSchema** element in the TrustFrameworkBase policy file:
32+
Let's ask the user for their city. Add the following element to the **ClaimsSchema** element in the TrustFrameworkBase policy file:
3333

3434
```xml
3535
<ClaimType Id="city">

articles/active-directory-b2c/active-directory-b2c-create-custom-attributes-profile-edit-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Add your own attributes to custom policies in Azure Active Directory B2C | Microsoft Docs
33
description: A walkthrough on using extension properties and custom attributes and including them in the user interface.
44
services: active-directory-b2c
5-
author: davidmu1
5+
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
1111
ms.date: 08/04/2017
12-
ms.author: davidmu
12+
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515
# Azure Active Directory B2C: Use custom attributes in a custom profile edit policy

articles/active-directory-b2c/active-directory-b2c-custom-guide-eventlogger-appins.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Track user behavior by using events in Application Insights from Azure Active Directory B2C | Microsoft Docs
33
description: Learn how to enable event logs in Application Insights from Azure AD B2C user journeys by using custom policies (preview).
44
services: active-directory-b2c
5-
author: davidmu1
5+
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.date: 10/12/2018
12-
ms.author: davidmu
12+
ms.author: marsma
1313
ms.subservice: B2C
1414

1515
---

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-basic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Secure your RESTful services by using HTTP basic authentication in Azure Active Directory B2C | Microsoft Docs
33
description: Secure your custom REST API claims exchanges in your Azure AD B2C by using HTTP basic authentication.
44
services: active-directory-b2c
5-
author: davidmu1
5+
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
1111
ms.date: 09/25/2017
12-
ms.author: davidmu
12+
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515
# Secure your RESTful services by using HTTP basic authentication

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-cert.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Secure your RESTful service by using client certificates in Azure Active Directory B2C | Microsoft Docs
33
description: Secure your custom REST API claims exchanges in your Azure AD B2C by using client certificates
44
services: active-directory-b2c
5-
author: davidmu1
5+
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
1111
ms.date: 09/25/2017
12-
ms.author: davidmu
12+
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

0 commit comments

Comments
 (0)