Skip to content

Commit 3bbe6d8

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into FAQ-new
2 parents e5d3a55 + 222f69a commit 3bbe6d8

File tree

1,169 files changed

+10460
-3904
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,169 files changed

+10460
-3904
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1024,7 +1024,7 @@
10241024
"articles/static-web-apps/.openpublishing.redirection.static-web-apps.json",
10251025
".openpublishing.redirection.virtual-desktop.json",
10261026
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-services.json",
1027-
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-services-renamed.json",
1027+
"articles/applied-ai-services/.openpublishing.archived.json",
10281028
"articles/cognitive-services/.openpublishing.redirection.cognitive-services.json"
10291029
]
10301030
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4573,6 +4573,11 @@
45734573
"redirect_url": "/azure/security/benchmarks",
45744574
"redirect_document_id": false
45754575
},
4576+
{
4577+
"source_path_from_root": "/articles/azure-resource-manager/bicep/linter-rule-use-protectedsettings-for-commandtoexecute-secrets.md",
4578+
"redirect_url": "/azure/azure-resource-manager/bicep/linter-rule-protect-commandtoexecute-secrets",
4579+
"redirect_document_id": false
4580+
},
45764581
{
45774582
"source_path_from_root": "/articles/azure-resource-manager/templates/view-resources.md",
45784583
"redirect_url": "/azure/azure-resource-manager/templates/export-template-portal",

articles/active-directory-b2c/identity-provider-twitter.md

Lines changed: 33 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,32 @@ zone_pivot_groups: b2c-policy-type
3333

3434
To enable sign-in for users with a Twitter account in Azure AD B2C, you need to create a Twitter application. If you don't already have a Twitter account, you can sign up at [`https://twitter.com/signup`](https://twitter.com/signup). You also need to [Apply for a developer account](https://developer.twitter.com/). For more information, see [Apply for access](https://developer.twitter.com/en/apply-for-access).
3535

36+
::: zone pivot="b2c-custom-policy"
37+
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
38+
1. Select **+ Create Project** button.
39+
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
40+
1. Under **Use case** tab, select your preferred use case, and then select **Next**.
41+
1. Under **Project description** tab, enter your project description, and then select **Next** button.
42+
1. Under **App name** tab, enter a name for your app, such as *azureadb2c*, and the select **Next** button.
43+
1. Under **Keys & Tokens** tab, copy the value of **API Key** and **API Key Secret** for later. You use both of them to configure Twitter as an identity provider in your Azure AD B2C tenant.
44+
1. Select **App settings** to open the app settings.
45+
1. At the lower part of the page, under **User authentication settings**, select **Set up**.
46+
1. In the **User authentication settings** page, select **OAuth 2.0** option.
47+
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
48+
1. Under **GENERAL AUTHENTICATION SETTINGS**:
49+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy-id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
50+
- `your-tenant-name` with the name of your tenant name.
51+
- `your-domain-name` with your custom domain.
52+
- `your-policy-id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
53+
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
54+
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
55+
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
56+
1. Select **Save**.
57+
::: zone-end
58+
59+
60+
::: zone pivot="b2c-user-flow"
61+
3662
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
3763
1. Select **+ Create Project** button.
3864
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
@@ -45,15 +71,16 @@ To enable sign-in for users with a Twitter account in Azure AD B2C, you need to
4571
1. In the **User authentication settings** page, select **OAuth 2.0** option.
4672
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
4773
1. Under **GENERAL AUTHENTICATION SETTINGS**:
48-
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
74+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-name/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
4975
- `your-tenant-name` with the name of your tenant name.
5076
- `your-domain-name` with your custom domain.
51-
- `your-user-flow-Id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
52-
77+
- `your-user-flow-name` with the identifier of your user flow. For example, `b2c_1_signup_signin_twitter`.
5378
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
5479
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
5580
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
5681
1. Select **Save**.
82+
83+
::: zone-end
5784

5885
::: zone pivot="b2c-user-flow"
5986

@@ -83,8 +110,6 @@ At this point, the Twitter identity provider has been set up, but it's not yet a
83110
1. Select the **Run user flow** button.
84111
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
85112

86-
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
87-
88113
::: zone-end
89114

90115
::: zone pivot="b2c-custom-policy"
@@ -186,7 +211,9 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
186211
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
187212
1. Select the **Run now** button.
188213
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
214+
::: zone-end
189215

190216
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
191217

192-
::: zone-end
218+
> [!TIP]
219+
> If you're facing `unauthorized` error while testing this identity provider, make sure you use the correct Twitter API Key and API Key Secret, or try to apply for [elevated](https://developer.twitter.com/en/portal/products/elevated) access. Also, we recommend you've a look at [Twitter's projects structure](https://developer.twitter.com/en/docs/projects/overview), if you registered your app before the feature was available.

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -377,7 +377,7 @@ The following are the IDs for a [Verification display control](display-control-v
377377

378378
| ID | Default value |
379379
| --- | ------------- |
380-
|intro_msg <sup>*</sup>| Verification is necessary. Please click Send button.|
380+
|intro_msg<sup>1</sup>| Verification is necessary. Please click Send button.|
381381
|success_send_code_msg | Verification code has been sent. Please copy it to the input box below.|
382382
|failure_send_code_msg | We are having trouble verifying your email address. Please enter a valid email address and try again.|
383383
|success_verify_code_msg | E-mail address verified. You can now continue.|
@@ -386,13 +386,16 @@ The following are the IDs for a [Verification display control](display-control-v
386386
|but_verify_code | Verify code|
387387
|but_send_new_code | Send new code|
388388
|but_change_claims | Change e-mail|
389+
| UserMessageIfVerificationControlClaimsNotVerified<sup>2</sup>| The claims for verification control have not been verified. |
389390

390-
Note: The `intro_msg` element is hidden, and not shown on the self-asserted page. To make it visible, use the [HTML customization](customize-ui-with-html.md) with Cascading Style Sheets. For example:
391+
<sup>1</sup> The `intro_msg` element is hidden, and not shown on the self-asserted page. To make it visible, use the [HTML customization](customize-ui-with-html.md) with Cascading Style Sheets. For example:
391392

392393
```css
393394
.verificationInfoText div{display: block!important}
394395
```
395396

397+
<sup>2</sup> This error message is displayed to the user if they enter a verification code, but instead of completing the verification by selecting on the **Verify** button, they select the **Continue** button.
398+
396399
### Verification display control example
397400

398401
```xml
@@ -408,6 +411,7 @@ Note: The `intro_msg` element is hidden, and not shown on the self-asserted page
408411
<LocalizedString ElementType="DisplayControl" ElementId="emailVerificationControl" StringId="but_verify_code">Verify code</LocalizedString>
409412
<LocalizedString ElementType="DisplayControl" ElementId="emailVerificationControl" StringId="but_send_new_code">Send new code</LocalizedString>
410413
<LocalizedString ElementType="DisplayControl" ElementId="emailVerificationControl" StringId="but_change_claims">Change e-mail</LocalizedString>
414+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfVerificationControlClaimsNotVerified">The claims for verification control have not been verified.</LocalizedString>
411415
</LocalizedStrings>
412416
</LocalizedResources>
413417
```

articles/active-directory-b2c/page-layout.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,25 +28,32 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
2828

2929
|Element |Page layout version range |jQuery version |Handlebars Runtime version |Handlebars Compiler version |
3030
|---------|---------|------|--------|----------|
31-
|multifactor |>= 1.2.4 | 3.5.1 | 4.7.6 |4.7.7 |
31+
|multifactor |>= 1.2.8 | 3.5.1 | 4.7.7 |4.7.7 |
32+
| |>= 1.2.4 | 3.5.1 | 4.7.6 |4.7.7 |
3233
| |< 1.2.4 | 3.4.1 |4.0.12 |2.0.1 |
3334
| |< 1.2.0 | 1.12.4 |
34-
|selfasserted |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
35+
|selfasserted |>= 2.1.11 | 3.5.1 |4.7.7 |4.7.7 |
36+
| |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
3537
| |< 2.1.4 | 3.4.1 |4.0.12 |2.0.1 |
3638
| |< 1.2.0 | 1.12.4 |
37-
|unifiedssp |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
39+
|unifiedssp |>= 2.1.7 | 3.5.1 |4.7.7 |4.7.7 |
40+
| |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
3841
| |< 2.1.4 | 3.4.1 |4.0.12 |2.0.1 |
3942
| |< 1.2.0 | 1.12.4 |
40-
|globalexception |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
43+
|globalexception |>= 1.2.3 | 3.5.1 |4.7.7 |4.7.7 |
44+
| |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
4145
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
4246
| |< 1.2.0 | 1.12.4 |
43-
|providerselection |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
47+
|providerselection |>= 1.2.3 | 3.5.1 |4.7.7 |4.7.7 |
48+
| |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
4449
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
4550
| |< 1.2.0 | 1.12.4 |
46-
|claimsconsent |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
51+
|claimsconsent |>= 1.2.2 | 3.5.1 |4.7.7 |4.7.7 |
52+
| |>= 1.2.2 | 3.5.1 |4.7.7 |4.7.7 |
4753
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
4854
| |< 1.2.0 | 1.12.4 |
49-
|unifiedssd |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
55+
|unifiedssd |>= 1.2.3 | 3.5.1 |4.7.7 |4.7.7 |
56+
| |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
5057
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
5158
| |< 1.2.0 | 1.12.4 |
5259

articles/active-directory-b2c/string-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -864,7 +864,7 @@ Checks whether the provided phone number is valid, based on phone number regular
864864
</InputClaims>
865865
<InputParameters>
866866
<InputParameter Id="matchTo" DataType="string" Value="^[0-9]{4,16}$" />
867-
<InputParameter Id="outputClaimIfMatched" DataType="string" Value="Phone" />
867+
<InputParameter Id="outputClaimIfMatched" DataType="string" Value="iPhone" />
868868
</InputParameters>
869869
<OutputClaims>
870870
<OutputClaim ClaimTypeReferenceId="validationResult" TransformationClaimType="outputClaim" />

articles/active-directory/app-provisioning/accidental-deletions.md

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,6 @@ The Azure AD provisioning service includes a feature to help avoid accidental de
2020
The feature lets you specify a deletion threshold, above which an admin
2121
needs to explicitly choose to allow the deletions to be processed.
2222

23-
> [!NOTE]
24-
> Accidental deletions are not supported for our Workday / SuccessFactors integrations. It is also not supported for changes in scoping (e.g. changing a scoping filter or changing from "sync all users and groups" to "sync assigned users and groups"). Until the accidental deletions prevention feature is fully released, you'll need to access the Azure portal using this URL: https://aka.ms/AccidentalDeletionsPreview
25-
26-
2723
## Configure accidental deletion prevention
2824
To enable accidental deletion prevention:
2925
1. In the Azure portal, select **Azure Active Directory**.
@@ -35,11 +31,6 @@ threshold. Also, be sure the notification email address is completed. If the del
3531

3632
When the deletion threshold is met, the job will go into quarantine and a notification email will be sent. The quarantined job can then be allowed or rejected. To learn more about quarantine behavior, see [Application provisioning in quarantine status](application-provisioning-quarantine-status.md).
3733

38-
## Known limitations
39-
There are two key limitations to be aware of and are actively working to address:
40-
- HR-driven provisioning from Workday and SuccessFactors don't support the accidental deletions feature.
41-
- Changes to your provisioning configuration (e.g. changing scoping) isn't supported by the accidental deletions feature.
42-
4334
## Recovering from an accidental deletion
4435
If you encounter an accidental deletion you'll see it on the provisioning status page. It will say **Provisioning has been quarantined. See quarantine details for more information.**.
4536

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ This article describes how to onboard a Google Cloud Platform (GCP) project on P
3636

3737
> [!NOTE]
3838
> 1. To confirm that the app was created, open **App registrations** in Azure and, on the **All applications** tab, locate your app.
39-
> 1. Select the app name to open the **Expose an API** page. The **Application ID URI** displayed in the **Overview** page is the *audience value* used while making an OIDC connection with your AWS account.
39+
> 1. Select the app name to open the **Expose an API** page. The **Application ID URI** displayed in the **Overview** page is the *audience value* used while making an OIDC connection with your GCP account.
4040
4141
1. Return to Permissions Management, and in the **Permissions Management Onboarding - Azure AD OIDC App Creation**, select **Next**.
4242

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Continuous access evaluation is implemented by enabling services, like Exchange
5252
This process enables the scenario where users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event.
5353

5454
> [!NOTE]
55-
> Teams and SharePoint Online do not support user risk events.
55+
> SharePoint Online doesn't support user risk events.
5656
5757
### Conditional Access policy evaluation
5858

0 commit comments

Comments
 (0)