Skip to content

Commit 3ed9078

Browse files
Merge branch 'master' into dt-refresh
2 parents 90e4a99 + 05fb3d4 commit 3ed9078

File tree

245 files changed

+3626
-2543
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

245 files changed

+3626
-2543
lines changed

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14630,6 +14630,31 @@
1463014630
"redirect_url": "/azure/cognitive-services/Bing-Custom-Search/language-support",
1463114631
"redirect_document_id": true
1463214632
},
14633+
{
14634+
"source_path": "articles/cognitive-services/Bing-Web-Search/paging-webpages.md",
14635+
"redirect_url": "/azure/cognitive-services/Bing-Web-Search/paging-search-results",
14636+
"redirect_document_id": true
14637+
},
14638+
{
14639+
"source_path": "articles/cognitive-services/Bing-Custom-Search/page-webpages.md",
14640+
"redirect_url": "/azure/cognitive-services/Bing-Web-Search/paging-search-results",
14641+
"redirect_document_id": false
14642+
},
14643+
{
14644+
"source_path": "articles/cognitive-services/Bing-News-Search/paging-news.md",
14645+
"redirect_url": "/azure/cognitive-services/Bing-Web-Search/paging-search-results",
14646+
"redirect_document_id": false
14647+
},
14648+
{
14649+
"source_path": "articles/cognitive-services/Bing-Video-Search/paging-videos.md",
14650+
"redirect_url": "/azure/cognitive-services/Bing-Web-Search/paging-search-results",
14651+
"redirect_document_id": false
14652+
},
14653+
{
14654+
"source_path": "articles/cognitive-services/Bing-Image-Search/paging-images.md",
14655+
"redirect_url": "/azure/cognitive-services/Bing-Web-Search/paging-search-results",
14656+
"redirect_document_id": false
14657+
},
1463314658
{
1463414659
"source_path": "articles/cognitive-services/Bing-Spell-Check/bing-spell-check-supported-languages.md",
1463514660
"redirect_url": "/azure/cognitive-services/bing-spell-check/language-support",
@@ -17094,6 +17119,11 @@
1709417119
"redirect_url": "/azure/service-fabric/service-fabric-tutorial-deploy-app-to-party-cluster",
1709517120
"redirect_document_id": false
1709617121
},
17122+
{
17123+
"source_path": "articles/migrate/preserve-drive-letter-protected-virtual-machines-failed-migrated-azure.md",
17124+
"redirect_url": "prepare-for-migration",
17125+
"redirect_document_id": false
17126+
},
1709717127
{
1709817128
"source_path": "articles/migrate/how-to-prepare-linux-for-migration.md",
1709917129
"redirect_url": "tutorial-prepare-vmware",

articles/active-directory-b2c/active-directory-b2c-reference-sspr.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ By default, your directory doesn't have self-service password reset turned on. U
2626

2727
1. Sign in to the [Azure portal](https://portal.azure.com/) as the Subscription Administrator. This is the same work or school account or the same Microsoft account that you used to create your directory.
2828
2. Open **Azure Active Directory** (in the navigation bar on the left side).
29+
3. Scroll down on the options blade and select **Password reset**.
2930
4. Set **Self service password reset enabled** to **All**.
3031
5. Click **Save** at the top of the page. You're done!
3132

articles/active-directory-b2c/date-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ Checks that one date and time claim (string data type) is later than a second da
2525

2626
| Item | TransformationClaimType | Data Type | Notes |
2727
| ---- | ----------------------- | --------- | ----- |
28-
| inputClaim | leftOperand | string | First claim's type, which should be later than the second claim. |
29-
| inputClaim | rightOperand | string | Second claim's type, which should be earlier than the first claim. |
28+
| InputClaim | leftOperand | string | First claim's type, which should be later than the second claim. |
29+
| InputClaim | rightOperand | string | Second claim's type, which should be earlier than the first claim. |
3030
| InputParameter | AssertIfEqualTo | boolean | Specifies whether this assertion should pass if the left operand is equal to the right operand. |
3131
| InputParameter | AssertIfRightOperandIsNotPresent | boolean | Specifies whether this assertion should pass if the right operand is missing. |
3232
| InputParameter | TreatAsEqualIfWithinMillseconds | int | Specifies the number of milliseconds to allow between the two date times to consider the times equal (for example, to account for clock skew). |

articles/active-directory-b2c/string-transformations.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ Compare two claims, and throw an exception if they are not equal according to th
2525

2626
| Item | TransformationClaimType | Data Type | Notes |
2727
| ---- | ----------------------- | --------- | ----- |
28-
| inputClaim | inputClaim1 | string | First claim's type, which is to be compared. |
29-
| inputClaim | inputClaim2 | string | Second claim's type, which is to be compared. |
28+
| InputClaim | inputClaim1 | string | First claim's type, which is to be compared. |
29+
| InputClaim | inputClaim2 | string | Second claim's type, which is to be compared. |
3030
| InputParameter | stringComparison | string | string comparison, one of the values: Ordinal, OrdinalIgnoreCase. |
3131

3232
The **AssertStringClaimsAreEqual** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationStringsAreNotEqual** self-asserted technical profile metadata controls the error message that is presented to the user.
@@ -150,8 +150,8 @@ Determine whether one string claim is equal to another. The result is a new bool
150150

151151
| Item | TransformationClaimType | Data Type | Notes |
152152
| ---- | ----------------------- | --------- | ----- |
153-
| inputClaim | inputClaim1 | string | First claim type, which is to be compared. |
154-
| inputClaim | inputClaim2 | string | Second claim type, which is to be compared. |
153+
| InputClaim | inputClaim1 | string | First claim type, which is to be compared. |
154+
| InputClaim | inputClaim2 | string | Second claim type, which is to be compared. |
155155
| InputParameter | operator | string | Possible values: `EQUAL` or `NOT EQUAL`. |
156156
| InputParameter | ignoreCase | boolean | Specifies whether this comparison should ignore the case of the strings being compared. |
157157
| OutputClaim | outputClaim | boolean | The ClaimType that is produced after this claims transformation has been invoked. |
@@ -191,7 +191,7 @@ Determines whether a claim value is equal to the input parameter value.
191191

192192
| Item | TransformationClaimType | Data Type | Notes |
193193
| ---- | ----------------------- | --------- | ----- |
194-
| inputClaim | inputClaim1 | string | The claim's type, which is to be compared. |
194+
| InputClaim | inputClaim1 | string | The claim's type, which is to be compared. |
195195
| InputParameter | operator | string | Possible values: `EQUAL` or `NOT EQUAL`. |
196196
| InputParameter | compareTo | string | string comparison, one of the values: Ordinal, OrdinalIgnoreCase. |
197197
| InputParameter | ignoreCase | boolean | Specifies whether this comparison should ignore the case of the strings being compared. |
@@ -500,7 +500,7 @@ Checks that a string claim and `matchTo` input parameter are equal, and sets the
500500

501501
| Item | TransformationClaimType | Data Type | Notes |
502502
| ---- | ----------------------- | --------- | ----- |
503-
| inputClaim | inputClaim | string | The claim type, which is to be compared. |
503+
| InputClaim | inputClaim | string | The claim type, which is to be compared. |
504504
| InputParameter | matchTo | string | The string to be compared with `inputClaim`. |
505505
| InputParameter | stringComparison | string | Possible values: `Ordinal` or `OrdinalIgnoreCase`. |
506506
| InputParameter | stringMatchMsg | string | First value to be set if strings are equal. |
@@ -549,7 +549,7 @@ Checks that a string claim and `matchTo` input parameter are equal, and sets the
549549

550550
| Item | TransformationClaimType | Data Type | Notes |
551551
| ---- | ----------------------- | --------- | ----- |
552-
| inputClaim | claimToMatch | string | The claim type, which is to be compared. |
552+
| InputClaim | claimToMatch | string | The claim type, which is to be compared. |
553553
| InputParameter | matchTo | string | The string to be compared with inputClaim. |
554554
| InputParameter | stringComparison | string | Possible values: `Ordinal` or `OrdinalIgnoreCase`. |
555555
| InputParameter | outputClaimIfMatched | string | The value to be set if strings are equal. |

articles/active-directory/develop/active-directory-saml-claims-customization.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: conceptual
17-
ms.date: 04/03/2019
17+
ms.date: 10/01/2019
1818
ms.author: ryanwi
1919
ms.reviewer: luleon, paulgarn, jeedes
2020
ms.custom: aaddev
@@ -61,7 +61,6 @@ From the **Choose name identifier format** dropdown, you can select one of the f
6161
| **Persistent** | Azure AD will use Persistent as the NameID format. |
6262
| **EmailAddress** | Azure AD will use EmailAddress as the NameID format. |
6363
| **Unspecified** | Azure AD will use Unspecified as the NameID format. |
64-
| **Transient** | Azure AD will use Transient as the NameID format. |
6564

6665
To learn more about the NameIDPolicy attribute, see [Single Sign-On SAML protocol](single-sign-on-saml-protocol.md).
6766

@@ -81,6 +80,20 @@ Select the desired source for the `NameIdentifier` (or NameID) claim. You can se
8180

8281
For more info, see [Table 3: Valid ID values per source](active-directory-claims-mapping.md#table-3-valid-id-values-per-source).
8382

83+
You can also assign any constant (static) value to any claims which you define in Azure AD. Please follow the below steps to assign a constant value:
84+
85+
1. In the [Azure portal](https://portal.azure.com/), on the **User Attributes & Claims** section, click on the **Edit** icon to edit the claims.
86+
87+
1. Click on the required claim which you want to modify.
88+
89+
1. Enter the constant value in the **Source attribute** as per your organization and click **Save**.
90+
91+
![Open the User Attributes & Claims section in the Azure portal](./media/active-directory-saml-claims-customization/organization-attribute.png)
92+
93+
1. The constant value will be displayed as below.
94+
95+
![Open the User Attributes & Claims section in the Azure portal](./media/active-directory-saml-claims-customization/edit-attributes-claims.png)
96+
8497
### Special claims - Transformations
8598

8699
You can also use the claims transformations functions.
13.2 KB
Loading
17.7 KB
Loading
45 Bytes
Loading
Loading

articles/active-directory/develop/registration-config-multi-tenant-application-add-to-gallery-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Azure Active Directory (Azure AD) is a cloud-based identity service. The [Azure
3030
## If your application supports SAML or OpenIDConnect
3131
If you have a multitenant application that you want listed in the Azure AD application gallery, you must first make sure that your application supports one of the following single sign-on technologies:
3232

33-
- **OpenID Connect**: To have your app listed, create the multitenant application in Azure AD and implement the [Azure AD consent framework](https://docs.microsoft.com/azure/active-directory/develop/active-directory-integrating-applications) for your application. Send the login request to a common endpoint so that any customer can provide consent to the application. You can control a user's access based on the tenant ID and the user's UPN received in the token. Submit the application by using the process outlined in [Listing your application in the Azure Active Directory application gallery](https://docs.microsoft.com/azure/active-directory/develop/active-directory-app-gallery-listing).
33+
- **OpenID Connect**: To have your app listed, create the multitenant application in Azure AD and implement the [Azure AD consent framework](https://docs.microsoft.com/azure/active-directory/develop/consent-framework) for your application. Send the login request to a common endpoint so that any customer can provide consent to the application. You can control a user's access based on the tenant ID and the user's UPN received in the token. Submit the application by using the process outlined in [Listing your application in the Azure Active Directory application gallery](https://docs.microsoft.com/azure/active-directory/develop/active-directory-app-gallery-listing).
3434

3535
- **SAML**: If your application supports SAML 2.0, the app can be listed in the gallery. Follow the instructions in [Listing your application in the Azure Active Directory application gallery](https://docs.microsoft.com/azure/active-directory/develop/active-directory-app-gallery-listing).
3636

0 commit comments

Comments
 (0)