Skip to content

Commit 3effa52

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ehubsfuncsynapse0429
2 parents 6c515d9 + 9f8f9d2 commit 3effa52

File tree

973 files changed

+17253
-6279
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

973 files changed

+17253
-6279
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/manage-apps/my-apps-deployment-plan.md",
5+
"redirect_url": "/azure/active-directory/manage-apps/myapps-overview",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/active-directory/authentication/cloud-native-certificate-based-authentication-faq.yml",
510
"redirect_url": "/azure/active-directory/authentication/certificate-based-authentication-faq",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6313,6 +6313,16 @@
63136313
"redirect_url": "/azure/azure-app-configuration/quickstart-azure-functions-csharp",
63146314
"redirect_document_id": false
63156315
},
6316+
{
6317+
"source_path_from_root": "/articles/azure-arc/data/deploy-byok-active-directory-connector.md",
6318+
"redirect_url": "/azure/azure-arc/data/deploy-customer-managed-keytab-active-directory-connector",
6319+
"redirect_document_id": false
6320+
},
6321+
{
6322+
"source_path_from_root": "/articles/azure-arc/data/reference/reference-az-sql-mi-arc-dag.md",
6323+
"redirect_url": "/azure/azure-arc/data/reference/reference-az-sql-instance-failover-group-arc",
6324+
"redirect_document_id":true
6325+
},
63166326
{
63176327
"source_path_from_root": "/articles/azure-arc/data/retrieve-the-username-password-for-data-controller.md",
63186328
"redirect_url": "/azure/azure-arc/data/update-service-principal-credentials",

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Please use the Feedback tool at the bottom of any article to submit bugs and sug
2222

2323
### Editing in GitHub
2424

25-
Follow the guidance for [Quick edits to existing documents](https://docs.microsoft.com/contribute/#quick-edits-to-existing-documents) in our contributor guide.
25+
Follow the guidance for [Quick edits to existing documents](https://docs.microsoft.com/contribute/#quick-edits-to-documentation) in our contributor guide.
2626

2727
### Pull requests
2828

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -671,7 +671,7 @@
671671
- name: Resources
672672
items:
673673
- name: Azure Roadmap
674-
href: https://azure.microsoft.com/roadmap/?category=security-identity
674+
href: https://azure.microsoft.com/updates/?status=nowavailable,inpreview,indevelopment&category=identity,security&query=b2c
675675
- name: Frequently asked questions
676676
href: ./faq.yml
677677
displayName: FAQ

articles/active-directory-b2c/configure-authentication-sample-angular-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ export const b2cPolicies = {
145145
export const msalConfig: Configuration = {
146146
auth: {
147147
clientId: '<your-MyApp-application-ID>',
148-
authority: b2cPolicies.authorities.signUpSignIn,
148+
authority: b2cPolicies.authorities.signUpSignIn.authority,
149149
knownAuthorities: [b2cPolicies.authorityDomain],
150150
redirectUri: '/',
151151
},

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,7 @@ Your REST API may need to return an error message, such as 'The user was not fou
259259
| Attribute | Required | Description |
260260
| --------- | -------- | ----------- |
261261
| version | Yes | Your REST API version. For example: 1.0.1 |
262-
| status | Yes | Must be 409 |
262+
| status | Yes | An HTTP response status codes-like number, and must be 409 |
263263
| code | No | An error code from the RESTful endpoint provider, which is displayed when `DebugMode` is enabled. |
264264
| requestId | No | A request identifier from the RESTful endpoint provider, which is displayed when `DebugMode` is enabled. |
265265
| userMessage | Yes | An error message that is shown to the user. |

articles/active-directory-b2c/string-transformations.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1178,6 +1178,9 @@ Returns a string array that contains the substrings in this instance that are de
11781178
| InputParameter | delimiter | string | The string to use as a separator, such as comma `,`. |
11791179
| OutputClaim | outputClaim | stringCollection | A string collection whose elements contain the substrings in this string that are delimited by the `delimiter` input parameter. |
11801180

1181+
> [!NOTE]
1182+
> Any existing elements in the `OutputClaim` stringCollection will be removed.
1183+
11811184
### Example of StringSplit
11821185

11831186
The following example takes a comma delimiter string of user roles, and converts it to a string collection.

articles/active-directory-b2c/technical-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Read the [User flows and custom policies overview](user-flow-overview.md) articl
118118

119119
## User interface
120120

121-
In Azure AD B2C, you can craft your users' identity experiences so that the pages that are shown blend seamlessly with the look and feel of your brand. You get nearly full control of the HTML and CSS content presented to your users when they proceed through your application's identity journeys. With this flexibility, you can maintain brand and visual consistency between your application and Azure AD B2C.
121+
In Azure AD B2C, you can craft your users' identity experiences so that the pages that are shown blend seamlessly with the look and feel of your brand. You get nearly full control of the HTML and CSS content presented to your users when they proceed through your application's identity journeys. (Customizing the pages rendered by third parties when using social accounts is limited to the options provided by the identity provider, and these are outside the control of Azure AD B2C.) With this flexibility, you can maintain brand and visual consistency between your application and Azure AD B2C.
122122

123123

124124

@@ -200,7 +200,7 @@ The following diagram shows how Azure AD B2C can communicate using various proto
200200

201201
## Application integration
202202

203-
When a user wants to sign in to your application, the application initiates an authorization request to a user flow- or custom policy-provided endpoint. The user flow or custom policy defines and controls the user's experience. When they complete a user flow, for example the *sign-up or sign-in* flow, Azure AD B2C generates a token, then redirects the user back to your application.
203+
When a user wants to sign in to your application, the application initiates an authorization request to a user-flow or custom policy-provided endpoint. The user flow or custom policy defines and controls the user's experience. When they complete a user flow, for example the *sign up or sign in* flow, Azure AD B2C generates a token, then redirects the user back to your application. This token is specific to Azure AD B2C and is not to be confused with the token issued by third-party identity providers when using social accounts. For information about how to use third-party tokens, see [Pass an identity provider access token to your application in Azure Active Directory B2C](idp-pass-through-user-flow.md).
204204

205205
:::image type="content" source="media/technical-overview/app-integration.png" alt-text="Mobile app with arrows showing flow between Azure AD B2C sign-in page.":::
206206

@@ -226,7 +226,7 @@ Azure AD B2C evaluates each sign-in event and ensures that all policy requiremen
226226

227227
## Password complexity
228228

229-
During sign up or password reset, your users must supply a password that meets complexity rules. By default, Azure AD B2C enforces a strong password policy. Azure AD B2C also provides configuration options for specifying the complexity requirements of the passwords your customers use.
229+
During sign up or password reset, your users must supply a password that meets complexity rules. By default, Azure AD B2C enforces a strong password policy. Azure AD B2C also provides configuration options for specifying the complexity requirements of the passwords your customers use when they use local accounts.
230230

231231
![Screenshot of password complexity user experience](media/technical-overview/password-complexity.png)
232232

@@ -259,7 +259,7 @@ Sessions are modeled as encrypted data, with the decryption key known only to th
259259

260260
### Access to user data
261261

262-
Azure AD B2C tenants share many characteristics with enterprise Azure Active Directory tenants used for employees and partners. Shared aspects include mechanisms for viewing administrative roles, assigning roles, and auditing activities.
262+
Azure AD B2C tenants share many characteristics with enterprise Azure Active Directory tenants used for employees and partners. Shared aspects include mechanisms for viewing administrative roles, assigning roles, and auditing activities.
263263

264264
You can assign roles to control who can perform certain administrative actions in Azure AD B2C, including:
265265

articles/active-directory-b2c/userjourneys.md

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,16 @@ User journeys specify explicit paths through which a policy allows a relying par
2121

2222
These user journeys can be considered as templates available to satisfy the core need of the various relying parties of the community of interest. User journeys facilitate the definition of the relying party part of a policy. A policy can define multiple user journeys. Each user journey is a sequence of orchestration steps.
2323

24-
To define the user journeys supported by the policy, a **UserJourneys** element is added under the top-level element of the policy file.
24+
To define the user journeys supported by the policy, a `UserJourneys` element is added under the top-level `TrustFrameworkPolicy` element of the policy file.
25+
26+
```xml
27+
<TrustFrameworkPolicy ...>
28+
...
29+
<UserJourneys>
30+
...
31+
</UserJourneys>
32+
</TrustFrameworkPolicy>
33+
```
2534

2635
The **UserJourneys** element contains the following element:
2736

@@ -51,13 +60,13 @@ The **AuthorizationTechnicalProfiles** element contains the following element:
5160

5261
| Element | Occurrences | Description |
5362
| ------- | ----------- | ----------- |
54-
| AuthorizationTechnicalProfile | 0:1 | List of authorization technical profiles. |
63+
| AuthorizationTechnicalProfile | 0:1 | The technical profile reference used to authorize the user. |
5564

5665
The **AuthorizationTechnicalProfile** element contains the following attribute:
5766

5867
| Attribute | Required | Description |
5968
| --------- | -------- | ----------- |
60-
| TechnicalProfileReferenceId | Yes | The identifier of the technical profile that is to be executed. |
69+
| ReferenceId | Yes | The identifier of the technical profile that is to be executed. |
6170

6271
The following example shows a user journey element with authorization technical profiles:
6372

@@ -81,6 +90,13 @@ Orchestration steps can be conditionally executed based on preconditions defined
8190

8291
To specify the ordered list of orchestration steps, an **OrchestrationSteps** element is added as part of the policy. This element is required.
8392

93+
```xml
94+
<UserJourney Id="SignUpOrSignIn">
95+
<OrchestrationSteps>
96+
<OrchestrationStep Order="1" Type="CombinedSignInAndSignUp" ContentDefinitionReferenceId="api.signuporsignin">
97+
...
98+
```
99+
84100
The **OrchestrationSteps** element contains the following element:
85101

86102
| Element | Occurrences | Description |
@@ -92,7 +108,7 @@ The **OrchestrationStep** element contains the following attributes:
92108
| Attribute | Required | Description |
93109
| --------- | -------- | ----------- |
94110
| `Order` | Yes | The order of the orchestration steps. |
95-
| `Type` | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**GetClaims** - Specifies that the orchestration step should process claim data sent to Azure AD B2C from the relying party via its `InputClaims` configuration.</li><li>**InvokeSubJourney** - Indicates that the orchestration step exchanges claims with a [sub journey](subjourneys.md) (in public preview).</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
111+
| `Type` | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**GetClaims** - Specifies that the orchestration step should process claim data sent to Azure AD B2C from the relying party via its `InputClaims` configuration.</li><li>**InvokeSubJourney** - Indicates that the orchestration step exchanges claims with a [sub journey](subjourneys.md).</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
96112
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples - if the type of the orchestration step is one of following: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`, Azure AD B2C needs to display the identity provider selection without having a technical profile. |
97113
| CpimIssuerTechnicalProfileReferenceId | No | The type of the orchestration step is `SendClaims`. This property defines the technical profile identifier of the claims provider that issues the token for the relying party. If absent, no relying party token is created. |
98114

@@ -124,7 +140,7 @@ The **Precondition** element contains the following attributes:
124140
| Attribute | Required | Description |
125141
| --------- | -------- | ----------- |
126142
| `Type` | Yes | The type of check or query to perform for this precondition. The value can be **ClaimsExist**, which specifies that the actions should be performed if the specified claims exist in the user's current claim set, or **ClaimEquals**, which specifies that the actions should be performed if the specified claim exists and its value is equal to the specified value. |
127-
| `ExecuteActionsIf` | Yes | Decides how the precondition is considered satisfied. Possible values: `true` (default), or `false`. If the value is set to `true`, it's considered satisfied when the claim matches the precondition. If the value is set to `false`, it's considered satisfied when the claim doesn't match the precondition. |
143+
| `ExecuteActionsIf` | Yes | Decides how the precondition is considered satisfied. Possible values: `true`, or `false`. If the value is set to `true`, it's considered satisfied when the claim matches the precondition. If the value is set to `false`, it's considered satisfied when the claim doesn't match the precondition. |
128144

129145
The **Precondition** elements contains the following elements:
130146

articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/10/2022
9+
ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -121,7 +121,7 @@ The EAS profile must contain the following information:
121121

122122
- The EAS endpoint (for example, outlook.office365.com)
123123

124-
An EAS profile can be configured and placed on the device through the utilization of Mobile device management (MDM) such as Intune or by manually placing the certificate in the EAS profile on the device.
124+
An EAS profile can be configured and placed on the device through the utilization of Mobile device management (MDM) such as Microsoft Endpoint Manager or by manually placing the certificate in the EAS profile on the device.
125125

126126
### Testing EAS client applications on Android
127127

0 commit comments

Comments
 (0)