Skip to content

Commit 47ef4f7

Browse files
committed
fix conflict
2 parents 6741c27 + a3be55d commit 47ef4f7

File tree

73 files changed

+713
-477
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+713
-477
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,11 @@
5555
"redirect_url": "/azure/active-directory/saas-apps/safety-culture-tutorial",
5656
"redirect_document_id": false
5757
},
58+
{
59+
"source_path_from_root": "/articles/active-directory/saas-apps/firstbird-tutorial.md",
60+
"redirect_url": "/azure/active-directory/saas-apps/radancys-employee-referrals-tutorial",
61+
"redirect_document_id": false
62+
},
5863
{
5964
"source_path_from_root": "/articles/active-directory/saas-apps/icertisicm-tutorial.md",
6065
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@
3535
# - name: 4 - Create custom policies
3636
# Create this file (tutorial-create-custom-policies.md), and content into it. You also need to update the index.yml's card, Customize, to reflect the new file name
3737
# What keywords users are searching in TOC: https://review.docs.microsoft.com/en-us/help/contribute/kusto/samples/discoverability-toc-filter?branch=main
38-
# href: tutorial-create-user-flows.md
38+
# href:tutorial-create-user-flows.md
3939
- name: 4 - Manage your tenant
4040
href: tenant-management.md
4141
displayName: break glass account, emergence account
@@ -106,6 +106,7 @@
106106
href: user-flow-overview.md
107107
- name: Custom policy overview
108108
href: custom-policy-overview.md
109+
displayName: extend, extensibility
109110
- name: API Connectors
110111
href: api-connectors-overview.md
111112
displayName: REST API, web API, API connectors, Dynamic data retrieval, external data sources, external identity data source, outbound webhooks, third-party integration
@@ -461,7 +462,8 @@
461462
- name: Integrate with our technology partners
462463
items:
463464
- name: Azure AD B2C partner gallery
464-
href: partner-gallery.md
465+
href: partner-gallery.md
466+
displayName: marketplace, integration, extensibility, extend, customization, customisation
465467
# Secure
466468
- name: Secure
467469
items:

articles/active-directory/authentication/howto-mfa-nps-extension-errors.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,8 @@ Sometimes, your users may get messages from Multi-Factor Authentication because
6969
| **OathCodeIncorrect** | Wrong code entered\OATH Code Incorrect | The user entered the wrong code. Have them try again by requesting a new code or signing in again. |
7070
| **SMSAuthFailedMaxAllowedCodeRetryReached** | Maximum allowed code retry reached | The user failed the verification challenge too many times. Depending on your settings, they may need to be unblocked by an admin now. |
7171
| **SMSAuthFailedWrongCodeEntered** | Wrong code entered/Text Message OTP Incorrect | The user entered the wrong code. Have them try again by requesting a new code or signing in again. |
72+
| **AuthenticationThrottled** | Too many attempts by user in a short period of time. Throttling. | Microsoft may limit repeated authentication attempts that are performed by the same user in a short period of time. This limitation does not apply to the Microsoft Authenticator or verification code. If you have hit these limits, you can use the Authenticator App, verification code or try to sign in again in a few minutes. |
73+
| **AuthenticationMethodLimitReached** | Authentication Method Limit Reached. Throttling. | Microsoft may limit repeated authentication attempts that are performed by the same user using the same authentication method type in a short period of time, specifically Voice call or SMS. This limitation does not apply to the Microsoft Authenticator or verification code. If you have hit these limits, you can use the Authenticator App, verification code or try to sign in again in a few minutes.|
7274

7375
## Errors that require support
7476

56.9 KB
Loading

articles/active-directory/develop/active-directory-enterprise-app-role-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Configure role claim for enterprise Azure AD apps
33
description: Learn how to configure the role claim issued in the SAML token for enterprise applications in Azure Active Directory
44
services: active-directory
5-
author: jeevansd
5+
author: davidmu1
66
manager: CelesteDG
77

88
ms.service: active-directory
@@ -11,7 +11,7 @@ ms.custom: aaddev
1111
ms.workload: identity
1212
ms.topic: how-to
1313
ms.date: 11/11/2021
14-
ms.author: jeedes
14+
ms.author: davidmu
1515
---
1616

1717
# Configure the role claim issued in the SAML token for enterprise applications

articles/active-directory/develop/claims-challenge.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Claims challenges, claims requests, and client capabilities
33
description: Explanation of claims challenges, claims requests, and client capabilities in the Microsoft identity platform.
44
services: active-directory
5-
author: knicholasa
6-
manager: martinco
5+
author: davidmu1
6+
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: reference
1111
ms.workload: identity
12-
ms.date: 05/11/2021
13-
ms.author: nichola
12+
ms.date: 01/19/2023
13+
ms.author: davidmu
1414
ms.reviewer: kkrishna, kylemar
1515
# Customer intent: As an application developer, I want to learn how to handle claims challenges returned from APIs protected by the Microsoft identity platform.
1616
---

articles/active-directory/develop/id-tokens.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Microsoft identity platform ID tokens
33
description: Learn how to use id_tokens emitted by the Azure AD v1.0 and Microsoft identity platform (v2.0) endpoints.
44
services: active-directory
5-
author: nickludwig
5+
author: davidmu1
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 01/25/2022
12-
ms.author: ludwignick
11+
ms.date: 01/19/2023
12+
ms.author: davidmu
1313
ms.reviewer: ludwignick
1414
ms.custom: aaddev, identityplatformtop40, fasttrack-edit
1515
---

articles/active-directory/develop/reference-saml-tokens.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
22
title: SAML 2.0 token claims reference
33
description: Claims reference with details on the claims included in SAML 2.0 tokens issued by the Microsoft identity platform, including their JWT equivalents.
4-
author: kenwith
4+
author: davidmu1
55
services: active-directory
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: reference
1111
ms.workload: identity
12-
ms.date: 03/29/2021
13-
ms.author: kenwith
12+
ms.date: 01/19/2023
13+
ms.author: davidmu
1414
ms.reviewer: paulgarn
1515
ms.custom: aaddev
1616
---

articles/active-directory/develop/request-custom-claims.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Request custom claims (MSAL iOS/macOS)
33
description: Learn how to request custom claims.
44
services: active-directory
5-
author: OwenRichards1
5+
author: davidmu1
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 08/26/2019
13-
ms.author: owenrichards
12+
ms.date: 01/19/2023
13+
ms.author: davidmu
1414
ms.custom: aaddev
1515
---
1616

articles/active-directory/develop/workload-identity-federation-create-trust-user-assigned-managed-identity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Create a trust relationship between a user-assigned managed identity and an external identity provider
33
description: Set up a trust relationship between a user-assigned managed identity in Azure AD and an external identity provider. This allows a software workload outside of Azure to access Azure AD protected resources without using secrets or certificates.
44
services: active-directory
5-
author: rwike77
5+
author: davidmu1
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 10/24/2022
13-
ms.author: ryanwi
12+
ms.date: 01/19/2023
13+
ms.author: davidmu
1414
ms.custom: aaddev
1515
ms.reviewer: shkhalide, udayh, vakarand
1616
zone_pivot_groups: identity-wif-mi-methods

0 commit comments

Comments
 (0)