Skip to content

Commit 4e0bd65

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into solution-template-databricks-notebook
2 parents cb3c137 + 602cd57 commit 4e0bd65

File tree

428 files changed

+5338
-2467
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

428 files changed

+5338
-2467
lines changed

.openpublishing.publish.config.json

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@
157157
"url": "https://github.com/Azure-Samples/functions-python-pytorch-tutorial",
158158
"branch": "master",
159159
"branch_mapping": {}
160-
},
160+
},
161161
{
162162
"path_to_root": "functions-quickstart-templates",
163163
"url": "https://github.com/Azure/azure-functions-templates",
@@ -187,7 +187,8 @@
187187
"path_to_root": "functions-docs-powershell",
188188
"url": "https://github.com/Azure-Samples/functions-docs-powershell",
189189
"branch": "master"
190-
}, {
190+
},
191+
{
191192
"path_to_root": "samples-personalizer",
192193
"url": "https://github.com/Azure-Samples/cognitive-services-personalizer-samples",
193194
"branch": "master"
@@ -366,7 +367,7 @@
366367
"path_to_root": "azure-sdk-for-java-script-event-hubs",
367368
"url": "https://github.com/Azure/azure-sdk-for-js/",
368369
"branch": "master"
369-
},
370+
},
370371
{
371372
"path_to_root": "azure-sdk-for-net-event-hubs",
372373
"url": "https://github.com/Azure/azure-sdk-for-net/",
@@ -376,7 +377,7 @@
376377
"path_to_root": "azure-sdk-for-python-event-hubs",
377378
"url": "https://github.com/Azure/azure-sdk-for-python/",
378379
"branch": "master"
379-
},
380+
},
380381
{
381382
"path_to_root": "cosmos-dotnet-getting-started",
382383
"url": "https://github.com/Azure-Samples/cosmos-dotnet-getting-started",
@@ -510,5 +511,8 @@
510511
"Pdf": {
511512
"template_folder": "_themes.pdf"
512513
}
514+
},
515+
"docs_build_engine": {
516+
"name": "docfx_v3"
513517
}
514518
}

.openpublishing.redirection.json

Lines changed: 54 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1745,6 +1745,26 @@
17451745
"redirect_url": "/azure/cognitive-services/bing-entity-search/quickstarts/client-libraries?pivots=programming-language-python",
17461746
"redirect_document_id": false
17471747
},
1748+
{
1749+
"source_path": "articles/cognitive-services/Bing-News-Search/news-search-sdk-quickstart.md",
1750+
"redirect_url": "/azure/cognitive-services/bing-news-search/quickstarts/client-libraries?pivots=programming-language-csharp",
1751+
"redirect_document_id": false
1752+
},
1753+
{
1754+
"source_path": "articles/cognitive-services/Bing-News-Search/news-sdk-java-quickstart.md",
1755+
"redirect_url": "/azure/cognitive-services/bing-news-search/quickstarts/client-libraries?pivots=programming-language-java",
1756+
"redirect_document_id": false
1757+
},
1758+
{
1759+
"source_path": "articles/cognitive-services/Bing-News-Search/news-search-sdk-node-quickstart.md",
1760+
"redirect_url": "/azure/cognitive-services/bing-news-search/quickstarts/client-libraries?pivots=programming-language-javascript",
1761+
"redirect_document_id": false
1762+
},
1763+
{
1764+
"source_path": "articles/cognitive-services/Bing-News-Search/news-sdk-python-quickstart.md",
1765+
"redirect_url": "/azure/cognitive-services/bing-news-search/quickstarts/client-libraries?pivots=programming-language-python",
1766+
"redirect_document_id": false
1767+
},
17481768
{
17491769
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
17501770
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",
@@ -4483,7 +4503,7 @@
44834503
{
44844504
"source_path": "articles/azure-supportability/create-manage-support-requests-using-access-control.md",
44854505
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request#role-based-access-control",
4486-
"redirect_document_id": true
4506+
"redirect_document_id": false
44874507
},
44884508
{
44894509
"source_path": "articles/azure-supportability/how-to-create-azure-support-request.md",
@@ -15299,16 +15319,6 @@
1529915319
"redirect_url": "/azure/machine-learning/tutorial-train-models-with-aml",
1530015320
"redirect_document_id": true
1530115321
},
15302-
{
15303-
"source_path": "articles/machine-learning/algorithm-module-reference/pca-based-anomaly-detection.md",
15304-
"redirect_url": "/azure/machine-learning/algorithm-module-reference/module-reference",
15305-
"redirect_document_id": false
15306-
},
15307-
{
15308-
"source_path": "articles/machine-learning/algorithm-module-reference/train-anomaly-detection-model.md",
15309-
"redirect_url": "/azure/machine-learning/algorithm-module-reference/module-reference",
15310-
"redirect_document_id": false
15311-
},
1531215322
{
1531315323
"source_path": "articles/machine-learning/how-to-ui-sample-regression-predict-automobile-price-basic.md",
1531415324
"redirect_url": "/azure/machine-learning/how-to-designer-sample-regression-automobile-price-basic",
@@ -17034,6 +17044,31 @@
1703417044
"redirect_url": "/azure/sql-data-warehouse/maintenance-scheduling#change-a-maintenance-schedule",
1703517045
"redirect_document_id": false
1703617046
},
17047+
{
17048+
"source_path": "articles/sql-data-warehouse/backup-and-restore.md",
17049+
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/backup-and-restore",
17050+
"redirect_document_id": true
17051+
},
17052+
{
17053+
"source_path": "articles/sql-data-warehouse/cheat-sheet.md",
17054+
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/cheat-sheet",
17055+
"redirect_document_id": true
17056+
},
17057+
{
17058+
"source_path": "articles/sql-data-warehouse/column-level-security.md",
17059+
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/column-level-security",
17060+
"redirect_document_id": true
17061+
},
17062+
{
17063+
"source_path": "articles/sql-data-warehouse/create-data-warehouse-portal.md",
17064+
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/create-data-warehouse-portal",
17065+
"redirect_document_id": true
17066+
},
17067+
{
17068+
"source_path": "articles/sql-data-warehouse/create-data-warehouse-powershell.md",
17069+
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/create-data-warehouse-powershell",
17070+
"redirect_document_id": true
17071+
},
1703717072
{
1703817073
"source_path": "articles/sql-data-warehouse/viewing-maintenance-schedule.md",
1703917074
"redirect_url": "/azure/sql-data-warehouse/maintenance-scheduling#view-a-maintenance-schedule",
@@ -48184,11 +48219,6 @@
4818448219
"redirect_url": "/azure/app-service/containers/configure-language-java#use-service-bus-as-a-message-broker",
4818548220
"redirect_document_id": false
4818648221
},
48187-
{
48188-
"source_path": "articles/mysql/howto-redirection.md",
48189-
"redirect_url": "/azure/mysql/concepts-connectivity-architecture",
48190-
"redirect_document_id": false
48191-
},
4819248222
{
4819348223
"source_path": "articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-storage.md",
4819448224
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/overview",
@@ -49404,19 +49434,19 @@
4940449434
"redirect_url": "/azure/media-services/latest/create-account-howto",
4940549435
"redirect_document_id": false
4940649436
},
49407-
{
49408-
"source_path": "articles/mariadb/howto-tls-configurations.md",
49409-
"redirect_url": "/azure/mariadb/howto-configure-ssl",
49410-
"redirect_document_id": false
49437+
{
49438+
"source_path": "articles/mariadb/howto-tls-configurations.md",
49439+
"redirect_url": "/azure/mariadb/howto-configure-ssl",
49440+
"redirect_document_id": false
4941149441
},
4941249442
{
49413-
"source_path": "articles/mysql/howto-tls-configurations.md",
49414-
"redirect_url": "/azure/mysql/howto-configure-ssl",
49443+
"source_path": "articles/mysql/howto-tls-configurations.md",
49444+
"redirect_url": "/azure/mysql/howto-configure-ssl",
4941549445
"redirect_document_id": false
4941649446
},
4941749447
{
49418-
"source_path": "articles/postgresql/howto-tls-configurations.md",
49419-
"redirect_url": "/azure/postgresql/concepts-ssl-connection-security",
49448+
"source_path": "articles/postgresql/howto-tls-configurations.md",
49449+
"redirect_url": "/azure/postgresql/concepts-ssl-connection-security",
4942049450
"redirect_document_id": false
4942149451
}
4942249452
]

articles/active-directory-b2c/custom-policy-configure-user-input.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/10/2020
12+
ms.date: 03/17/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -19,9 +19,12 @@ ms.subservice: B2C
1919

2020
In this article, you collect a new attribute during your sign-up journey in Azure Active Directory B2C (Azure AD B2C). You'll obtain the users' city, configure it as a drop-down, and define whether it's required to be provided.
2121

22+
> [!NOTE]
23+
> This sample uses the built-in claim 'city'. Instead, you can choose one of the supported [Azure AD B2C built-in attributes](user-profile-attributes.md) or a custom attribute. To use a custom attribute, [enable custom attributes in your policy](custom-policy-custom-attributes.md). To use a different built-in or custom attribute, replace 'city' with the attribute of your choice, for example the built-in attribute *jobTitle* or a custom attribute like *extension_loyaltyId*.
24+
2225
You can gather initial data from your users by using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its [self-asserted technical profile](self-asserted-technical-profile.md). In this sample, you:
2326

24-
1. Define a "city" claim.
27+
1. Define a "city" claim.
2528
1. Ask the user for their city.
2629
1. Persist the city to the user profile in the Azure AD B2C directory.
2730
1. Read the city claim from the Azure AD B2C directory on each sign-in.

0 commit comments

Comments
 (0)