Skip to content

Commit 4b971d9

Browse files
authored
Merge pull request #33 from MicrosoftDocs/master
refresh
2 parents 74f2fe7 + fa3ba21 commit 4b971d9

File tree

4,065 files changed

+45709
-41327
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,065 files changed

+45709
-41327
lines changed

.openpublishing.publish.config.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -398,6 +398,11 @@
398398
"url": "https://github.com/Azure/azure-sdk-for-python/",
399399
"branch": "master"
400400
},
401+
{
402+
"path_to_root": "spring-data-azure-cosmos-db-sql-tutorial",
403+
"url": "https://github.com/Azure-Samples/azure-spring-data-cosmos-java-sql-api-getting-started/",
404+
"branch": "main"
405+
},
401406
{
402407
"path_to_root": "cosmos-dotnet-getting-started",
403408
"url": "https://github.com/Azure-Samples/cosmos-dotnet-getting-started",
@@ -454,6 +459,11 @@
454459
"url": "https://github.com/Azure/azure-sdk-for-python/",
455460
"branch": "master"
456461
},
462+
{
463+
"path_to_root": "cosmosdb-cassandra-python-sample",
464+
"url": "https://github.com/Azure-Samples/azure-cosmos-db-cassandra-python-getting-started",
465+
"branch": "master"
466+
},
457467
{
458468
"path_to_root": "cosmosdb-nodejs-get-started",
459469
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-api-nodejs-getting-started",

.openpublishing.redirection.json

Lines changed: 689 additions & 139 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/configure-tokens-custom-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.subservice: B2C
1818

1919
This article provides information about how you can manage your token, session, and single sign-on (SSO) configurations using [custom policies](custom-policy-overview.md) in Azure Active Directory B2C (Azure AD B2C).
2020

21-
## JTW token lifetimes and claims configuration
21+
## JWT token lifetimes and claims configuration
2222

2323
To change the settings on your token lifetimes, you add a [ClaimsProviders](claimsproviders.md) element in the relying party file of the policy you want to impact. The **ClaimsProviders** element is a child of the [TrustFrameworkPolicy](trustframeworkpolicy.md) element.
2424

@@ -88,4 +88,4 @@ The following values are set in the previous example:
8888

8989
- Learn more about [Azure AD B2C session](session-overview.md).
9090
- Learn how to [configure session behavior in custom policies](session-behavior-custom-policy.md).
91-
- Reference: [JwtIssuer](jwt-issuer-technical-profile.md).
91+
- Reference: [JwtIssuer](jwt-issuer-technical-profile.md).

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -410,6 +410,10 @@ The following SAML relying party (RP) scenarios are supported via your own metad
410410
* Multiple logout URLs or POST binding for logout URL in application/service principal object.
411411
* Specify signing key to verify RP requests in application/service principal object.
412412
* Specify token encryption key in application/service principal object.
413+
* Identity Provider initiated sign on, where the Identity Provider is Azure AD B2C.
414+
415+
The following SAML relying party (RP) scenarios are unsupported currently:
416+
* Identity Provider initiated sign on, where the Identity Provider is an external Identity Provider, for example ADFS.
413417

414418
## Next steps
415419

articles/active-directory-b2c/custom-email-mailjet.md

Lines changed: 36 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/25/2020
12+
ms.date: 08/18/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -231,6 +231,9 @@ Below the claims transformations within `<BuildingBlocks>`, add the following [C
231231
<ContentDefinition Id="api.localaccountsignup">
232232
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.0.0</DataUri>
233233
</ContentDefinition>
234+
<ContentDefinition Id="api.localaccountpasswordreset">
235+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.0.0</DataUri>
236+
</ContentDefinition>
234237
</ContentDefinitions>
235238
```
236239

@@ -356,7 +359,7 @@ As with the OTP technical profiles, add the following technical profiles to the
356359

357360
## Make a reference to the DisplayControl
358361

359-
In the final step, add a reference to the DisplayControl you created. Replace your existing `LocalAccountSignUpWithLogonEmail` self-asserted technical profile with the following if you used an earlier version of Azure AD B2C policy. This technical profile uses `DisplayClaims` with a reference to the DisplayControl.
362+
In the final step, add a reference to the DisplayControl you created. Replace your existing `LocalAccountSignUpWithLogonEmail` and `LocalAccountDiscoveryUsingEmailAddress` self-asserted technical profiles with the following. If you used an earlier version of Azure AD B2C policy. These technical profiles use `DisplayClaims` with a reference to the DisplayControl..
360363

361364
For more information, see [Self-asserted technical profile](restful-technical-profile.md) and [DisplayControl](display-controls.md).
362365

@@ -365,22 +368,13 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
365368
<DisplayName>Local Account</DisplayName>
366369
<TechnicalProfiles>
367370
<TechnicalProfile Id="LocalAccountSignUpWithLogonEmail">
368-
<DisplayName>Email signup</DisplayName>
369-
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.SelfAssertedAttributeProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
370371
<Metadata>
371-
<Item Key="IpAddressClaimReferenceId">IpAddress</Item>
372-
<Item Key="ContentDefinitionReferenceId">api.localaccountsignup</Item>
373-
<Item Key="language.button_continue">Create</Item>
374-
375372
<!--OTP validation error messages-->
376373
<Item Key="UserMessageIfSessionDoesNotExist">You have exceed the maximum time allowed.</Item>
377374
<Item Key="UserMessageIfMaxRetryAttempted">You have exceed the number of retries allowed.</Item>
378375
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
379376
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
380377
</Metadata>
381-
<InputClaims>
382-
<InputClaim ClaimTypeReferenceId="email" />
383-
</InputClaims>
384378
<DisplayClaims>
385379
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
386380
<DisplayClaim ClaimTypeReferenceId="displayName" Required="true" />
@@ -389,17 +383,18 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
389383
<DisplayClaim ClaimTypeReferenceId="newPassword" Required="true" />
390384
<DisplayClaim ClaimTypeReferenceId="reenterPassword" Required="true" />
391385
</DisplayClaims>
392-
<OutputClaims>
393-
<OutputClaim ClaimTypeReferenceId="email" Required="true" />
394-
<OutputClaim ClaimTypeReferenceId="objectId" />
395-
<OutputClaim ClaimTypeReferenceId="executed-SelfAsserted-Input" DefaultValue="true" />
396-
<OutputClaim ClaimTypeReferenceId="authenticationSource" />
397-
<OutputClaim ClaimTypeReferenceId="newUser" />
398-
</OutputClaims>
399-
<ValidationTechnicalProfiles>
400-
<ValidationTechnicalProfile ReferenceId="AAD-UserWriteUsingLogonEmail" />
401-
</ValidationTechnicalProfiles>
402-
<UseTechnicalProfileForSessionManagement ReferenceId="SM-AAD" />
386+
</TechnicalProfile>
387+
<TechnicalProfile Id="LocalAccountDiscoveryUsingEmailAddress">
388+
<Metadata>
389+
<!--OTP validation error messages-->
390+
<Item Key="UserMessageIfSessionDoesNotExist">You have exceed the maximum time allowed.</Item>
391+
<Item Key="UserMessageIfMaxRetryAttempted">You have exceed the number of retries allowed.</Item>
392+
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
393+
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
394+
</Metadata>
395+
<DisplayClaims>
396+
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
397+
</DisplayClaims>
403398
</TechnicalProfile>
404399
</TechnicalProfiles>
405400
</ClaimsProvider>
@@ -455,7 +450,7 @@ To localize the email, you must send localized strings to Mailjet, or your email
455450
<SupportedLanguage>en</SupportedLanguage>
456451
<SupportedLanguage>es</SupportedLanguage>
457452
</SupportedLanguages>
458-
<LocalizedResources Id="api.localaccountsignup.en">
453+
<LocalizedResources Id="api.custom-email.en">
459454
<LocalizedStrings>
460455
<LocalizedString ElementType="GetLocalizedStringsTransformationClaimType" StringId="email_subject">Contoso account email verification code</LocalizedString>
461456
<LocalizedString ElementType="GetLocalizedStringsTransformationClaimType" StringId="email_message">Thanks for validating the account</LocalizedString>
@@ -464,7 +459,7 @@ To localize the email, you must send localized strings to Mailjet, or your email
464459
</LocalizedStrings>
465460
</LocalizedStrings>
466461
</LocalizedResources>
467-
<LocalizedResources Id="api.localaccountsignup.es">
462+
<LocalizedResources Id="api.custom-email.es">
468463
<LocalizedStrings>
469464
<LocalizedString ElementType="GetLocalizedStringsTransformationClaimType" StringId="email_subject">Código de verificación del correo electrónico de la cuenta de Contoso</LocalizedString>
470465
<LocalizedString ElementType="GetLocalizedStringsTransformationClaimType" StringId="email_message">Gracias por comprobar la cuenta de </LocalizedString>
@@ -478,16 +473,25 @@ To localize the email, you must send localized strings to Mailjet, or your email
478473
1. Add references to the LocalizedResources elements by updating the [ContentDefinitions](contentdefinitions.md) element.
479474

480475
```xml
481-
<ContentDefinition Id="api.localaccountsignup">
482-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.0.0</DataUri>
483-
<LocalizedResourcesReferences MergeBehavior="Prepend">
484-
<LocalizedResourcesReference Language="en" LocalizedResourcesReferenceId="api.localaccountsignup.en" />
485-
<LocalizedResourcesReference Language="es" LocalizedResourcesReferenceId="api.localaccountsignup.es" />
486-
</LocalizedResourcesReferences>
487-
</ContentDefinition>
476+
<ContentDefinitions>
477+
<ContentDefinition Id="api.localaccountsignup">
478+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.0.0</DataUri>
479+
<LocalizedResourcesReferences MergeBehavior="Prepend">
480+
<LocalizedResourcesReference Language="en" LocalizedResourcesReferenceId="api.custom-email.en" />
481+
<LocalizedResourcesReference Language="es" LocalizedResourcesReferenceId="api.custom-email.es" />
482+
</LocalizedResourcesReferences>
483+
</ContentDefinition>
484+
<ContentDefinition Id="api.localaccountpasswordreset">
485+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.0.0</DataUri>
486+
<LocalizedResourcesReferences MergeBehavior="Prepend">
487+
<LocalizedResourcesReference Language="en" LocalizedResourcesReferenceId="api.custom-email.en" />
488+
<LocalizedResourcesReference Language="es" LocalizedResourcesReferenceId="api.custom-email.es" />
489+
</LocalizedResourcesReferences>
490+
</ContentDefinition>
491+
</ContentDefinitions>
488492
```
489493

490-
1. Finally, add the following input claims transformation to the LocalAccountSignUpWithLogonEmail technical profile.
494+
1. Finally, add following input claims transformation to the `LocalAccountSignUpWithLogonEmail` and `LocalAccountDiscoveryUsingEmailAddress` technical profiles.
491495

492496
```xml
493497
<InputClaimsTransformations>

articles/active-directory-b2c/custom-email-sendgrid.md

Lines changed: 37 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/25/2020
12+
ms.date: 08/18/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -216,6 +216,9 @@ Below the claims transformations within `<BuildingBlocks>`, add the following [C
216216
<ContentDefinition Id="api.localaccountsignup">
217217
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.0.0</DataUri>
218218
</ContentDefinition>
219+
<ContentDefinition Id="api.localaccountpasswordreset">
220+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.0.0</DataUri>
221+
</ContentDefinition>
219222
</ContentDefinitions>
220223
```
221224

@@ -340,7 +343,7 @@ As with the OTP technical profiles, add the following technical profiles to the
340343

341344
## Make a reference to the DisplayControl
342345

343-
In the final step, add a reference to the DisplayControl you created. Replace your existing `LocalAccountSignUpWithLogonEmail` self-asserted technical profile with the following if you used an earlier version of Azure AD B2C policy. This technical profile uses `DisplayClaims` with a reference to the DisplayControl.
346+
In the final step, add a reference to the DisplayControl you created. Replace your existing `LocalAccountSignUpWithLogonEmail` and `LocalAccountDiscoveryUsingEmailAddress` self-asserted technical profiles with the following. If you used an earlier version of Azure AD B2C policy. These technical profiles use `DisplayClaims` with a reference to the DisplayControl.
344347

345348
For more information, see [Self-asserted technical profile](restful-technical-profile.md) and [DisplayControl](display-controls.md).
346349

@@ -349,22 +352,13 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
349352
<DisplayName>Local Account</DisplayName>
350353
<TechnicalProfiles>
351354
<TechnicalProfile Id="LocalAccountSignUpWithLogonEmail">
352-
<DisplayName>Email signup</DisplayName>
353-
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.SelfAssertedAttributeProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
354355
<Metadata>
355-
<Item Key="IpAddressClaimReferenceId">IpAddress</Item>
356-
<Item Key="ContentDefinitionReferenceId">api.localaccountsignup</Item>
357-
<Item Key="language.button_continue">Create</Item>
358-
359356
<!--OTP validation error messages-->
360357
<Item Key="UserMessageIfSessionDoesNotExist">You have exceed the maximum time allowed.</Item>
361358
<Item Key="UserMessageIfMaxRetryAttempted">You have exceed the number of retries allowed.</Item>
362359
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
363360
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
364361
</Metadata>
365-
<InputClaims>
366-
<InputClaim ClaimTypeReferenceId="email" />
367-
</InputClaims>
368362
<DisplayClaims>
369363
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
370364
<DisplayClaim ClaimTypeReferenceId="displayName" Required="true" />
@@ -373,17 +367,18 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
373367
<DisplayClaim ClaimTypeReferenceId="newPassword" Required="true" />
374368
<DisplayClaim ClaimTypeReferenceId="reenterPassword" Required="true" />
375369
</DisplayClaims>
376-
<OutputClaims>
377-
<OutputClaim ClaimTypeReferenceId="email" Required="true" />
378-
<OutputClaim ClaimTypeReferenceId="objectId" />
379-
<OutputClaim ClaimTypeReferenceId="executed-SelfAsserted-Input" DefaultValue="true" />
380-
<OutputClaim ClaimTypeReferenceId="authenticationSource" />
381-
<OutputClaim ClaimTypeReferenceId="newUser" />
382-
</OutputClaims>
383-
<ValidationTechnicalProfiles>
384-
<ValidationTechnicalProfile ReferenceId="AAD-UserWriteUsingLogonEmail" />
385-
</ValidationTechnicalProfiles>
386-
<UseTechnicalProfileForSessionManagement ReferenceId="SM-AAD" />
370+
</TechnicalProfile>
371+
<TechnicalProfile Id="LocalAccountDiscoveryUsingEmailAddress">
372+
<Metadata>
373+
<!--OTP validation error messages-->
374+
<Item Key="UserMessageIfSessionDoesNotExist">You have exceed the maximum time allowed.</Item>
375+
<Item Key="UserMessageIfMaxRetryAttempted">You have exceed the number of retries allowed.</Item>
376+
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
377+
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
378+
</Metadata>
379+
<DisplayClaims>
380+
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
381+
</DisplayClaims>
387382
</TechnicalProfile>
388383
</TechnicalProfiles>
389384
</ClaimsProvider>
@@ -435,7 +430,7 @@ To localize the email, you must send localized strings to SendGrid, or your emai
435430
<SupportedLanguage>en</SupportedLanguage>
436431
<SupportedLanguage>es</SupportedLanguage>
437432
</SupportedLanguages>
438-
<LocalizedResources Id="api.localaccountsignup.en">
433+
<LocalizedResources Id="api.custom-email.en">
439434
<LocalizedStrings>
440435
<!--Email template parameters-->
441436
<LocalizedString ElementType="GetLocalizedStringsTransformationClaimType" StringId="email_subject">Contoso account email verification code</LocalizedString>
@@ -444,7 +439,7 @@ To localize the email, you must send localized strings to SendGrid, or your emai
444439
<LocalizedString ElementType="GetLocalizedStringsTransformationClaimType" StringId="email_signature">Sincerely</LocalizedString>
445440
</LocalizedStrings>
446441
</LocalizedResources>
447-
<LocalizedResources Id="api.localaccountsignup.es">
442+
<LocalizedResources Id="api.custom-email.es">
448443
<LocalizedStrings>
449444
<!--Email template parameters-->
450445
<LocalizedString ElementType="GetLocalizedStringsTransformationClaimType" StringId="email_subject">Código de verificación del correo electrónico de la cuenta de Contoso</LocalizedString>
@@ -459,16 +454,25 @@ To localize the email, you must send localized strings to SendGrid, or your emai
459454
1. Add references to the LocalizedResources elements by updating the [ContentDefinitions](contentdefinitions.md) element.
460455

461456
```XML
462-
<ContentDefinition Id="api.localaccountsignup">
463-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.0.0</DataUri>
464-
<LocalizedResourcesReferences MergeBehavior="Prepend">
465-
<LocalizedResourcesReference Language="en" LocalizedResourcesReferenceId="api.localaccountsignup.en" />
466-
<LocalizedResourcesReference Language="es" LocalizedResourcesReferenceId="api.localaccountsignup.es" />
467-
</LocalizedResourcesReferences>
468-
</ContentDefinition>
457+
<ContentDefinitions>
458+
<ContentDefinition Id="api.localaccountsignup">
459+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.0.0</DataUri>
460+
<LocalizedResourcesReferences MergeBehavior="Prepend">
461+
<LocalizedResourcesReference Language="en" LocalizedResourcesReferenceId="api.custom-email.en" />
462+
<LocalizedResourcesReference Language="es" LocalizedResourcesReferenceId="api.custom-email.es" />
463+
</LocalizedResourcesReferences>
464+
</ContentDefinition>
465+
<ContentDefinition Id="api.localaccountpasswordreset">
466+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.0.0</DataUri>
467+
<LocalizedResourcesReferences MergeBehavior="Prepend">
468+
<LocalizedResourcesReference Language="en" LocalizedResourcesReferenceId="api.custom-email.en" />
469+
<LocalizedResourcesReference Language="es" LocalizedResourcesReferenceId="api.custom-email.es" />
470+
</LocalizedResourcesReferences>
471+
</ContentDefinition>
472+
</ContentDefinitions>
469473
```
470474

471-
1. Finally, add following input claims transformation to the LocalAccountSignUpWithLogonEmail technical profile.
475+
1. Finally, add following input claims transformation to the `LocalAccountSignUpWithLogonEmail` and `LocalAccountDiscoveryUsingEmailAddress` technical profiles.
472476

473477
```XML
474478
<InputClaimsTransformations>
@@ -481,4 +485,4 @@ To localize the email, you must send localized strings to SendGrid, or your emai
481485
You can find an example of a custom email verification policy on GitHub:
482486

483487
- [Custom email verification - DisplayControls](https://github.com/azure-ad-b2c/samples/tree/master/policies/custom-email-verifcation-displaycontrol)
484-
- For information about using a custom REST API or any HTTP-based SMTP email provider, see [Define a RESTful technical profile in an Azure AD B2C custom policy](restful-technical-profile.md).
488+
- For information about using a custom REST API or any HTTP-based SMTP email provider, see [Define a RESTful technical profile in an Azure AD B2C custom policy](restful-technical-profile.md).

0 commit comments

Comments
 (0)