Skip to content

Commit 4cdd4b6

Browse files
Merge pull request #78895 from MicrosoftDocs/master
Merge master to live 3:00 AM
2 parents 1aefdf8 + b1a1f79 commit 4cdd4b6

File tree

105 files changed

+2849
-1231
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+2849
-1231
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -306,6 +306,12 @@
306306
"branch": "master",
307307
"branch_mapping": {}
308308
},
309+
{
310+
"path_to_root": "cosmosdb-nodejs-get-started",
311+
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-api-nodejs-getting-started",
312+
"branch": "master",
313+
"branch_mapping": {}
314+
},
309315
{
310316
"path_to_root": "cognitive-services-content-moderator-samples",
311317
"url": "https://github.com/Azure-Samples/cognitive-services-content-moderator-samples",

articles/active-directory-b2c/active-directory-b2c-setup-fb-app.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 09/11/2018
11+
ms.date: 06/05/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -20,26 +20,26 @@ ms.subservice: B2C
2020
To use a Facebook account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory (Azure AD) B2C, you need to create an application in your tenant that represents it. If you don’t already have a Facebook account, you can get it at [https://www.facebook.com/](https://www.facebook.com/).
2121

2222
1. Sign in to [Facebook for developers](https://developers.facebook.com/) with your Facebook account credentials.
23-
2. If you have not already done so, you need to register as a Facebook developer. To do this, select **Register** on the upper-right corner of the page, accept Facebook's policies, and complete the registration steps.
24-
3. Select **My Apps** and then click **Add a New App**.
23+
2. If you have not already done so, you need to register as a Facebook developer. To do this, select **Get Started** on the upper-right corner of the page, accept Facebook's policies, and complete the registration steps.
24+
3. Select **My Apps** and then **Add New App**.
2525
4. Enter a **Display Name** and a valid **Contact Email**.
2626
5. Click **Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
2727
6. Select **Settings** > **Basic**.
2828
7. Choose a **Category**, for example `Business and Pages`. This value is required by Facebook, but not used for Azure AD B2C.
2929
8. At the bottom of the page, select **Add Platform**, and then select **Website**.
3030
9. In **Site URL**, enter `https://your-tenant-name.b2clogin.com/` replacing `your-tenant-name` with the name of your tenant. Enter a URL for the **Privacy Policy URL**, for example `http://www.contoso.com`. The policy URL is a page you maintain to provide privacy information for your application.
3131
10. Select **Save Changes**.
32-
11. At the top of the page, copy the value of **App ID**.
32+
11. At the top of the page, copy the value of **App ID**.
3333
12. Click **Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
34-
13. Select **Products**, and then select **Set up** under **Facebook Login**.
35-
14. Select **Settings** under **Facebook Login**.
34+
13. Select the plus sign next to **PRODUCTS**, and then select **Set up** under **Facebook Login**.
35+
14. Under **Facebook Login**, select **Settings**.
3636
15. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant. Click **Save Changes** at the bottom of the page.
3737
16. To make your Facebook application available to Azure AD B2C, click the Status selector at the top right of the page and turn it **On** to make the Application public, and then click **Confirm**. At this point the Status should change from **Development** to **Live**.
3838

3939
## Configure a Facebook account as an identity provider
4040

4141
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
42-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
42+
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
4343
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
4444
4. Select **Identity providers**, and then select **Add**.
4545
5. Enter a **Name**. For example, enter *Facebook*.

articles/active-directory-b2c/ropc-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ Complete the steps in [Get started with custom policies in Azure Active Director
136136
</TechnicalProfile>
137137
```
138138

139-
Replace the **DefaultValue** of **client_id** and **resource_id** with the Application ID of the ProxyIdentityExperienceFramework application that you created in the prerequisite tutorial.
139+
Replace the **DefaultValue** of **client_id** with the Application ID of the ProxyIdentityExperienceFramework application that you created in the prerequisite tutorial. Then replace **DefaultValue** of **resource_id** with the Application ID of the IdentityExperienceFramework application that you also created in the prerequisite tutorial.
140140

141141
5. Add following **ClaimsProvider** elements with their technical profiles to the **ClaimsProviders** element:
142142

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
3030
## Create an Azure AD B2C tenant
3131

3232
1. Sign in to the [Azure portal](https://portal.azure.com/).
33-
2. Make sure that you are using the directory that contains your subscription by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains it. This directory is different than the one that will contain your Azure AD B2C tenant.
33+
2. Make sure that you are using the directory that contains your subscription by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains it. This directory is different from the one that will contain your Azure AD B2C tenant.
3434

3535
![Switch to subscription directory](./media/tutorial-create-tenant/switch-directory-subscription.png)
3636

articles/active-directory/develop/authentication-scenarios.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -82,14 +82,11 @@ The following diagram shows a simplified Microsoft identity platform provisionin
8282

8383
In this provisioning flow:
8484

85-
| | |
86-
|---|---|
87-
| 1 | A user from tenant B attempts to sign in with the app |
88-
| 2 | The user credentials are acquired and verified |
89-
| 3 | The user is prompted to consent for the app to gain access to tenant B |
90-
| 4 | Microsoft identity platform uses the application object in A as a blueprint for creating a service principal in tenant B |
91-
| 5 | The user receives the requested token |
92-
| | |
85+
1. A user from tenant B attempts to sign in with the app, the authorization endpoint requests a token for the application.
86+
1. The user credentials are acquired and verified for authentication
87+
1. The user is prompted to provide consent for the app to gain access to tenant B
88+
1. Microsoft identity platform uses the application object in tenant A as a blueprint for creating a service principal in tenant B
89+
1. The user receives the requested token
9390

9491
You can repeat this process as many times as you want for other tenants (C, D, and so on). Tenant A retains the blueprint for the app (application object). Users and admins of all the other tenants where the app is given consent retain control over what the application is allowed to do through the corresponding service principal object in each tenant. For more information, see [Application and service principal objects in Microsoft identity platform](app-objects-and-service-principals.md).
9592

articles/active-directory/devices/hybrid-azuread-join-federated-domains.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Hybrid Azure AD join requires the devices to have access to the following Micros
7070

7171
Beginning with Windows 10 1803, if the instantaneous Hybrid Azure AD join for federated environment using AD FS fails, we rely on Azure AD Connect to sync the computer object in Azure AD that is subsequently used to complete the device registration for Hybrid Azure AD join. Verify that Azure AD Connect has synchronized the computer objects of the devices you want to be hybrid Azure AD joined to Azure AD. If the computer objects belong to specific organizational units (OU), then these OUs need to be configured for synchronization in Azure AD connect as well. To learn more on how to synchronize computer objects using Azure AD Connect, see the article on [Configure filtering using Azure AD Connect](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-sync-configure-filtering#organizational-unitbased-filtering).
7272

73-
If your organization requires access to the Internet via an outbound proxy, Microsoft recommends [implementing Web Proxy Auto-Discovery (WPAD)](https://docs.microsoft.com/previous-versions/tn-archive/cc995261(v%3dtechnet.10)) to enable Windows 10 computers to do device registration with Azure AD. If you are encountering issues with configuring and managing WPAD, go to [troubleshooting automatic detection](https://docs.microsoft.com/previous-versions/tn-archive/cc302643(v=technet.10).
73+
If your organization requires access to the Internet via an outbound proxy, Microsoft recommends [implementing Web Proxy Auto-Discovery (WPAD)](https://docs.microsoft.com/previous-versions/tn-archive/cc995261(v%3dtechnet.10)) to enable Windows 10 computers to do device registration with Azure AD. If you are encountering issues with configuring and managing WPAD, go to [troubleshooting automatic detection](https://docs.microsoft.com/previous-versions/tn-archive/cc302643(v=technet.10)).
7474

7575
If you are not using WPAD and need to configure proxy settings on your computer, you can do so starting with Windows 10 1709, by [configuring WinHTTP settings using a group policy object (GPO)](https://blogs.technet.microsoft.com/netgeeks/2018/06/19/winhttp-proxy-settings-deployed-by-gpo/).
7676

@@ -150,7 +150,7 @@ To successfully complete hybrid Azure AD join of your Windows down-level devices
150150

151151
Additionally, you need to enable **Allow updates to status bar via script** in the user’s local intranet zone.
152152

153-
### install Microsoft Workplace Join for Windows down-level computers
153+
### Install Microsoft Workplace Join for Windows down-level computers
154154

155155
To register Windows down-level devices, organizations must install [Microsoft Workplace Join for non-Windows 10 computers](https://www.microsoft.com/download/details.aspx?id=53554) available on the Microsoft Download Center.
156156

@@ -164,7 +164,7 @@ To verify the device registration state in your Azure tenant, you can use the **
164164

165165
When using the **Get-MSolDevice** cmdlet to check the service details:
166166

167-
- An object with the **device id** that matches the ID on the Windows client must exist.
167+
- An object with the **device ID** that matches the ID on the Windows client must exist.
168168
- The value for **DeviceTrustType** must be **Domain Joined**. This is equivalent to the **Hybrid Azure AD joined** state on the Devices page in the Azure AD portal.
169169
- The value for **Enabled** must be **True** and **DeviceTrustLevel** must be **Managed** for devices that are used in conditional access.
170170

articles/active-directory/devices/hybrid-azuread-join-managed-domains.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Hybrid Azure AD join requires the devices to have access to the following Micros
6464
- `https://device.login.microsoftonline.com`
6565
- `https://autologon.microsoftazuread-sso.com` (If you are using or planning to use Seamless SSO)
6666

67-
If your organization requires access to the Internet via an outbound proxy, Microsoft recommends [implementing Web Proxy Auto-Discovery (WPAD)](https://docs.microsoft.com/previous-versions/tn-archive/cc995261(v%3dtechnet.10)) to enable Windows 10 computers to do device registration with Azure AD. If you are encountering issues with configuring and managing WPAD, go to [troubleshooting automatic detection](https://docs.microsoft.com/previous-versions/tn-archive/cc302643(v=technet.10).
67+
If your organization requires access to the Internet via an outbound proxy, Microsoft recommends [implementing Web Proxy Auto-Discovery (WPAD)](https://docs.microsoft.com/previous-versions/tn-archive/cc995261(v%3dtechnet.10)) to enable Windows 10 computers to do device registration with Azure AD. If you are encountering issues with configuring and managing WPAD, go to [troubleshooting automatic detection](https://docs.microsoft.com/previous-versions/tn-archive/cc302643(v=technet.10)).
6868

6969
If you are not using WPAD and need to configure proxy settings on your computer, you can do so starting with Windows 10 1709, by [configuring WinHTTP settings using a group policy object (GPO)](https://blogs.technet.microsoft.com/netgeeks/2018/06/19/winhttp-proxy-settings-deployed-by-gpo/).
7070

@@ -143,7 +143,7 @@ Additionally, you need to enable **Allow updates to status bar via script** in t
143143

144144
To successfully complete hybrid Azure AD join of your Windows down-level devices in a managed domain that is using [Password Hash Sync (PHS)](https://docs.microsoft.com/azure/active-directory/hybrid/whatis-phs) or [Pass Through Authentication (PTA)](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-pta) as your Azure AD cloud authentication method, you must also [configure Seamless SSO](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-sso-quick-start#step-2-enable-the-feature).
145145

146-
### install Microsoft Workplace Join for Windows down-level computers
146+
### Install Microsoft Workplace Join for Windows down-level computers
147147

148148
To register Windows down-level devices, organizations must install [Microsoft Workplace Join for non-Windows 10 computers](https://www.microsoft.com/download/details.aspx?id=53554) available on the Microsoft Download Center.
149149

@@ -157,7 +157,7 @@ To verify the device registration state in your Azure tenant, you can use the **
157157

158158
When using the **Get-MSolDevice** cmdlet to check the service details:
159159

160-
- An object with the **device id** that matches the id on the Windows client must exist.
160+
- An object with the **device ID** that matches the ID on the Windows client must exist.
161161
- The value for **DeviceTrustType** must be **Domain Joined**. This is equivalent to the **Hybrid Azure AD joined** state on the Devices page in the Azure AD portal.
162162
- The value for **Enabled** must be **True** and **DeviceTrustLevel** must be **Managed** for devices that are used in conditional access.
163163

0 commit comments

Comments
 (0)