Skip to content

Commit 393df44

Browse files
Merge branch 'master' into dt-meta
2 parents b5ae0e8 + 25fb827 commit 393df44

File tree

640 files changed

+11594
-4833
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

640 files changed

+11594
-4833
lines changed

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14630,6 +14630,31 @@
1463014630
"redirect_url": "/azure/cognitive-services/Bing-Custom-Search/language-support",
1463114631
"redirect_document_id": true
1463214632
},
14633+
{
14634+
"source_path": "articles/cognitive-services/Bing-Web-Search/paging-webpages.md",
14635+
"redirect_url": "/azure/cognitive-services/Bing-Web-Search/paging-search-results",
14636+
"redirect_document_id": true
14637+
},
14638+
{
14639+
"source_path": "articles/cognitive-services/Bing-Custom-Search/page-webpages.md",
14640+
"redirect_url": "/azure/cognitive-services/Bing-Web-Search/paging-search-results",
14641+
"redirect_document_id": false
14642+
},
14643+
{
14644+
"source_path": "articles/cognitive-services/Bing-News-Search/paging-news.md",
14645+
"redirect_url": "/azure/cognitive-services/Bing-Web-Search/paging-search-results",
14646+
"redirect_document_id": false
14647+
},
14648+
{
14649+
"source_path": "articles/cognitive-services/Bing-Video-Search/paging-videos.md",
14650+
"redirect_url": "/azure/cognitive-services/Bing-Web-Search/paging-search-results",
14651+
"redirect_document_id": false
14652+
},
14653+
{
14654+
"source_path": "articles/cognitive-services/Bing-Image-Search/paging-images.md",
14655+
"redirect_url": "/azure/cognitive-services/Bing-Web-Search/paging-search-results",
14656+
"redirect_document_id": false
14657+
},
1463314658
{
1463414659
"source_path": "articles/cognitive-services/Bing-Spell-Check/bing-spell-check-supported-languages.md",
1463514660
"redirect_url": "/azure/cognitive-services/bing-spell-check/language-support",
@@ -17094,6 +17119,11 @@
1709417119
"redirect_url": "/azure/service-fabric/service-fabric-tutorial-deploy-app-to-party-cluster",
1709517120
"redirect_document_id": false
1709617121
},
17122+
{
17123+
"source_path": "articles/migrate/preserve-drive-letter-protected-virtual-machines-failed-migrated-azure.md",
17124+
"redirect_url": "prepare-for-migration",
17125+
"redirect_document_id": false
17126+
},
1709717127
{
1709817128
"source_path": "articles/migrate/how-to-prepare-linux-for-migration.md",
1709917129
"redirect_url": "tutorial-prepare-vmware",

articles/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -184,6 +184,8 @@ Open a browser and navigate to the URL. Make sure you type the correct URL and t
184184
185185
## Create an Azure AD B2C application
186186
187+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
188+
187189
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
188190
189191
### Update and test the relying party file

articles/active-directory-b2c/active-directory-b2c-custom-setup-goog-idp.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155,6 +155,8 @@ Now that you have a button in place, you need to link it to an action. The actio
155155

156156
## Create an Azure AD B2C application
157157

158+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
159+
158160
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
159161

160162
## Update and test the relying party file

articles/active-directory-b2c/active-directory-b2c-custom-setup-li-idp.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -213,6 +213,8 @@ Now that you have a button in place, you need to link it to an action. The actio
213213

214214
## Create an Azure AD B2C application
215215

216+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
217+
216218
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
217219

218220
## Update and test the relying party file

articles/active-directory-b2c/active-directory-b2c-custom-setup-msa-idp.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,8 @@ Now that you have a button in place, you need to link it to an action. The actio
161161

162162
## Create an Azure AD B2C application
163163

164+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
165+
164166
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
165167

166168
## Update and test the relying party file

articles/active-directory-b2c/active-directory-b2c-custom-setup-twitter-idp.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -150,6 +150,8 @@ Now that you have a button in place, you need to link it to an action. The actio
150150

151151
## Create an Azure AD B2C application
152152

153+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
154+
153155
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
154156

155157
## Update and test the relying party file

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -49,10 +49,7 @@ To use the Azure AD Graph API with your B2C tenant, you need to register an appl
4949

5050
### Create client secret
5151

52-
1. Under **API ACCESS**, select **Keys**.
53-
1. Enter a description for the key in the **Key description** box. For example, *Management Key*.
54-
1. Select a validity **Duration** and then select **Save**.
55-
1. Record the key's **VALUE**. You use this value for configuration in a later step.
52+
[!INCLUDE [active-directory-b2c-client-secret](../../includes/active-directory-b2c-client-secret.md)]
5653

5754
You now have an application that has permission to *create*, *read*, and *update* users in your Azure AD B2C tenant. Continue to the next section to add user *delete* and *password update* permissions.
5855

articles/active-directory-b2c/active-directory-b2c-guide-troubleshooting-custom.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -52,13 +52,11 @@ Common validation errors include the following:
5252

5353
## Troubleshoot the runtime
5454

55-
* Use **Run now** and `https://jwt.ms` to test your policies independently of your web or mobile application. This website acts like a relying party application. It displays the contents of the JSON Web Token (JWT) that is generated by your Azure AD B2C policy. To create a test application, navigate to **Azure AD B2C** \> **Applications** in the Azure portal and add an application with the following values:
55+
* Use **Run now** and `https://jwt.ms` to test your policies independently of your web or mobile application. This website acts like a relying party application. It displays the contents of the JSON web token (JWT) that is generated by your Azure AD B2C policy.
5656

57-
* **Name**: TestApp
58-
* **Web App/Web API**: No
59-
* **Native client**: No
57+
To create a test application that can redirect to `https://jwt.ms` for token inspection:
6058

61-
Then, add `https://jwt.ms` as a **Reply URL**.
59+
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
6260

6361
* To trace the exchange of messages between your client browser and Azure AD B2C, use [Fiddler](https://www.telerik.com/fiddler). It can help you get an indication of where your user journey is failing in your orchestration steps.
6462

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -108,10 +108,7 @@ Follow these steps register an application, grant it the required Microsoft Grap
108108

109109
### Create client secret
110110

111-
1. Under **API ACCESS**, select **Keys**.
112-
1. Enter a description for the key in the **Key description** box. For example, *Audit Log Key*.
113-
1. Select a validity **Duration**, then select **Save**.
114-
1. Record the key's **VALUE**. You need this value for authentication in automation scripts like the example PowerShell script shown in a later section.
111+
[!INCLUDE [active-directory-b2c-client-secret](../../includes/active-directory-b2c-client-secret.md)]
115112

116113
You now have an application with the required API access, an application ID, and a key that you can use in your automation scripts. See the PowerShell script section later in this article for an example of how you can get activity events with a script.
117114

articles/active-directory-b2c/active-directory-b2c-reference-sspr.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ By default, your directory doesn't have self-service password reset turned on. U
2626

2727
1. Sign in to the [Azure portal](https://portal.azure.com/) as the Subscription Administrator. This is the same work or school account or the same Microsoft account that you used to create your directory.
2828
2. Open **Azure Active Directory** (in the navigation bar on the left side).
29+
3. Scroll down on the options blade and select **Password reset**.
2930
4. Set **Self service password reset enabled** to **All**.
3031
5. Click **Save** at the top of the page. You're done!
3132

0 commit comments

Comments
 (0)