Skip to content

Commit 4f6a7a2

Browse files
authored
Merge pull request #103255 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents 307a9b3 + df0ad3e commit 4f6a7a2

File tree

133 files changed

+2471
-1996
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

133 files changed

+2471
-1996
lines changed

.openpublishing.redirection.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2300,6 +2300,11 @@
23002300
"redirect_url": "/azure/cosmos-db/sql-api-get-started",
23012301
"redirect_document_id": false
23022302
},
2303+
{
2304+
"source_path": "articles/search/preview-api-resetskills.md",
2305+
"redirect_url": "/rest/api/searchservice/2019-05-06-preview/reset-skills",
2306+
"redirect_document_id": false
2307+
},
23032308
{
23042309
"source_path": "articles/search/knowledge-store-howto.md",
23052310
"redirect_url": "/azure/search/knowledge-store-create-rest",
@@ -18376,17 +18381,12 @@
1837618381
"redirect_document_id": false
1837718382
},
1837818383
{
18379-
"source_path": "articles/cognitive-services/text-analytics/quickstarts/go-sdk.md",
18380-
"redirect_url": "/azure/cognitive-services/text-analytics/quickstarts/text-analytics-sdk",
18381-
"redirect_document_id": false
18382-
},
18383-
{
18384-
"source_path": "articles/cognitive-services/text-analytics/quickstarts/ruby-sdk.md",
18384+
"source_path": "articles/cognitive-services/text-analytics/quickstarts/nodejs-sdk.md",
1838518385
"redirect_url": "/azure/cognitive-services/text-analytics/quickstarts/text-analytics-sdk",
1838618386
"redirect_document_id": false
1838718387
},
1838818388
{
18389-
"source_path": "articles/cognitive-services/text-analytics/quickstarts/nodejs-sdk.md",
18389+
"source_path": "articles/cognitive-services/text-analytics/quickstarts/text-analytics-sdk-v2.md",
1839018390
"redirect_url": "/azure/cognitive-services/text-analytics/quickstarts/text-analytics-sdk",
1839118391
"redirect_document_id": false
1839218392
},

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/10/2019
12+
ms.date: 02/04/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -186,15 +186,16 @@ You can also call a REST API technical profile with your business logic, overwri
186186

187187
| Attribute | Required | Description |
188188
| --------- | -------- | ----------- |
189-
| setting.showContinueButton | No | Displays the continue button. Possible values: `true` (default), or `false` |
190-
| setting.showCancelButton | No | Displays the cancel button. Possible values: `true` (default), or `false` |
191189
| setting.operatingMode | No | For a sign-in page, this property controls the behavior of the username field, such as input validation and error messages. Expected values: `Username` or `Email`. |
190+
| AllowGenerationOfClaimsWithNullValues| No| Allow to generate a claim with null value. For example, in a case user doesn't select a checkbox.|
192191
| ContentDefinitionReferenceId | Yes | The identifier of the [content definition](contentdefinitions.md) associated with this technical profile. |
193192
| EnforceEmailVerification | No | For sign-up or profile edit, enforces email verification. Possible values: `true` (default), or `false`. |
194-
| setting.showSignupLink | No | Displays the sign-up button. Possible values: `true` (default), or `false` |
195193
| setting.retryLimit | No | Controls the number of times a user can try to provide the data that is checked against a validation technical profile . For example, a user tries to sign-up with an account that already exists and keeps trying until the limit reached.
196194
| SignUpTarget | No | The signup target exchange identifier. When the user clicks the sign-up button, Azure AD B2C executes the specified exchange identifier. |
197-
195+
| setting.showCancelButton | No | Displays the cancel button. Possible values: `true` (default), or `false` |
196+
| setting.showContinueButton | No | Displays the continue button. Possible values: `true` (default), or `false` |
197+
| setting.showSignupLink | No | Displays the sign-up button. Possible values: `true` (default), or `false` |
198+
| setting.forgotPasswordLinkLocation| No| Displays the forgot password link. Possible values: `AfterInput` (default) the link is displayed at the bottom of the page, or `None` removes the forgot password link.|
198199
## Cryptographic keys
199200

200201
The **CryptographicKeys** element is not used.

articles/active-directory-b2c/string-transformations.md

Lines changed: 112 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/03/2020
12+
ms.date: 02/04/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -495,6 +495,47 @@ Use this claims transformation to parse the domain name after the @ symbol of th
495495
- Output claims:
496496
- **domain**: outlook.com
497497

498+
## SetClaimsIfRegexMatch
499+
500+
Checks that a string claim `claimToMatch` and `matchTo` input parameter are equal, and sets the output claims with the value present in `outputClaimIfMatched` input parameter, along with compare result output claim, which is to be set as `true` or `false` based on the result of comparison.
501+
502+
| Item | TransformationClaimType | Data Type | Notes |
503+
| ---- | ----------------------- | --------- | ----- |
504+
| inputClaim | claimToMatch | string | The claim type, which is to be compared. |
505+
| InputParameter | matchTo | string | The regular expression to match. |
506+
| InputParameter | outputClaimIfMatched | string | The value to be set if strings are equal. |
507+
| OutputClaim | outputClaim | string | If regular expression is match, this output claim contains the value of `outputClaimIfMatched` input parameter. Or null, if no match. |
508+
| OutputClaim | regexCompareResultClaim | boolean | The regular expression match result output claim type, which is to be set as `true` or `false` based on the result of matching. |
509+
510+
For example, checks whether the provided phone number is valid, based on phone number regular expression pattern.
511+
512+
```XML
513+
<ClaimsTransformation Id="SetIsPhoneRegex" TransformationMethod="setClaimsIfRegexMatch">
514+
<InputClaims>
515+
<InputClaim ClaimTypeReferenceId="phone" TransformationClaimType="claimToMatch" />
516+
</InputClaims>
517+
<InputParameters>
518+
<InputParameter Id="matchTo" DataType="string" Value="^[0-9]{4,16}$" />
519+
<InputParameter Id="outputClaimIfMatched" DataType="string" Value="isPhone" />
520+
</InputParameters>
521+
<OutputClaims>
522+
<OutputClaim ClaimTypeReferenceId="validationResult" TransformationClaimType="outputClaim" />
523+
<OutputClaim ClaimTypeReferenceId="isPhoneBoolean" TransformationClaimType="regexCompareResultClaim" />
524+
</OutputClaims>
525+
</ClaimsTransformation>
526+
```
527+
528+
### Example
529+
530+
- Input claims:
531+
- **claimToMatch**: "64854114520"
532+
- Input parameters:
533+
- **matchTo**: "^[0-9]{4,16}$"
534+
- **outputClaimIfMatched**: "isPhone"
535+
- Output claims:
536+
- **outputClaim**: "isPhone"
537+
- **regexCompareResultClaim**: true
538+
498539
## SetClaimsIfStringsAreEqual
499540

500541
Checks that a string claim and `matchTo` input parameter are equal, and sets the output claims with the value present in `stringMatchMsg` and `stringMatchMsgCode` input parameters, along with compare result output claim, which is to be set as `true` or `false` based on the result of comparison.
@@ -703,3 +744,73 @@ For example, normalize a phone number, by removing the `-` characters
703744
- Output claims:
704745
- **outputClaim**: "+164411452054"
705746

747+
## StringJoin
748+
749+
Concatenates the elements of a specified string collection claim type, using the specified separator between each element or member.
750+
751+
| Item | TransformationClaimType | Data Type | Notes |
752+
| ---- | ----------------------- | --------- | ----- |
753+
| InputClaim | inputClaim | stringCollection | A collection that contains the strings to concatenate. |
754+
| InputParameter | delimiter | string | The string to use as a separator, such as comma `,`. |
755+
| OutputClaim | outputClaim | string | A string that consists of the members of the `inputClaim` string collection, delimited by the `delimiter` input parameter. |
756+
757+
The following example takes a string collection of user roles, and convert it to a comma delimiter string. You can user this method to store a string collection in Azure AD user account. Later, when you read the account from the directory, use the `StringSplit` to convert the comma delimiter string back to string collection.
758+
759+
```XML
760+
<ClaimsTransformation Id="ConvertRolesStringCollectionToCommaDelimiterString" TransformationMethod="StringJoin">
761+
<InputClaims>
762+
<InputClaim ClaimTypeReferenceId="roles" TransformationClaimType="inputClaim" />
763+
</InputClaims>
764+
<InputParameters>
765+
<InputParameter DataType="string" Id="delimiter" Value="," />
766+
</InputParameters>
767+
<OutputClaims>
768+
<OutputClaim ClaimTypeReferenceId="rolesCommaDelimiterConverted" TransformationClaimType="outputClaim" />
769+
</OutputClaims>
770+
</ClaimsTransformation>
771+
```
772+
773+
### Example
774+
775+
- Input claims:
776+
- **inputClaim**: [ "Admin", "Author", "Reader" ]
777+
- Input parameters:
778+
- **delimiter**: ","
779+
- Output claims:
780+
- **outputClaim**: "Admin,Author,Reader"
781+
782+
783+
## StringSplit
784+
785+
Returns a string array that contains the substrings in this instance that are delimited by elements of a specified string.
786+
787+
| Item | TransformationClaimType | Data Type | Notes |
788+
| ---- | ----------------------- | --------- | ----- |
789+
| InputClaim | inputClaim | string | A string claim type that contains the sub strings to split. |
790+
| InputParameter | delimiter | string | The string to use as a separator, such as comma `,`. |
791+
| OutputClaim | outputClaim | stringCollection | A string collection whose elements contain the substrings in this string that are delimited by the `delimiter` input parameter. |
792+
793+
The following example takes a comma delimiter string of user roles, and convert it to a string collection.
794+
795+
```XML
796+
<ClaimsTransformation Id="ConvertRolesToStringCollection" TransformationMethod="StringSplit">
797+
<InputClaims>
798+
<InputClaim ClaimTypeReferenceId="rolesCommaDelimiter" TransformationClaimType="inputClaim" />
799+
</InputClaims>
800+
<InputParameters>
801+
<InputParameter DataType="string" Id="delimiter" Value="," />
802+
</InputParameters>
803+
<OutputClaims>
804+
<OutputClaim ClaimTypeReferenceId="roles" TransformationClaimType="outputClaim" />
805+
</OutputClaims>
806+
</ClaimsTransformation>
807+
```
808+
809+
### Example
810+
811+
- Input claims:
812+
- **inputClaim**: "Admin,Author,Reader"
813+
- Input parameters:
814+
- **delimiter**: ","
815+
- Output claims:
816+
- **outputClaim**: [ "Admin", "Author", "Reader" ]

articles/active-directory-b2c/userjourneys.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 02/03/2020
11+
ms.date: 02/04/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -158,12 +158,18 @@ Preconditions can check multiple preconditions. The following example checks whe
158158

159159
An orchestration step of type `ClaimsProviderSelection` or `CombinedSignInAndSignUp` may contain a list of claims providers that a user can sign in with. The order of the elements inside the `ClaimsProviderSelections` elements controls the order of the identity providers presented to the user.
160160

161-
The **ClaimsProviderSelection** element contains the following element:
161+
The **ClaimsProviderSelections** element contains the following element:
162162

163163
| Element | Occurrences | Description |
164164
| ------- | ----------- | ----------- |
165165
| ClaimsProviderSelection | 1:n | Provides the list of claims providers that can be selected.|
166166

167+
The **ClaimsProviderSelections** element contains the following attributes:
168+
169+
| Attribute | Required | Description |
170+
| --------- | -------- | ----------- |
171+
| DisplayOption| No | Controls the behavior of a case where a single claims provider selection is available. Possible values: `DoNotShowSingleProvider` (default) , the user is redirected immediately to the federated identity provider. Or `ShowSingleProvider` Azure AD B2C presents the sign-in page with the single identity provider selection. To use this attribute, the [content definition version](page-layout.md) must be `urn:com:microsoft:aad:b2c:elements:contract:providerselection:1.0.0` and above.|
172+
167173
The **ClaimsProviderSelection** element contains the following attributes:
168174

169175
| Attribute | Required | Description |

0 commit comments

Comments
 (0)