Skip to content

Commit 4fd0070

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into nitinme-quick-update
2 parents 8ef21d1 + 306c55b commit 4fd0070

File tree

215 files changed

+2214
-965
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

215 files changed

+2214
-965
lines changed

.whatsnew/.active-directory-b2c.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"relativeLinkPrefix": "/azure/active-directory-b2c"
88
},
99
"inclusionCriteria": {
10-
"excludePullRequestTitles": true,
10+
"omitPullRequestTitles" : true,
1111
"minAdditionsToFile" : 10,
1212
"maxFilesChanged": 50,
1313
"labels": [
@@ -17,7 +17,7 @@
1717
},
1818
"areas": [
1919
{
20-
"name": ".",
20+
"names": [ "."],
2121
"heading": "Azure Active Directory business-to-customer (B2C)"
2222
}
2323
]

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 36 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 10/05/2021
4+
ms.date: 11/02/2021
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,39 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md).
1717

18+
19+
## October 2021
20+
21+
### New articles
22+
23+
- [Tutorial: Configure IDEMIA with Azure Active Directory B2C for relying party to consume IDEMIA or US State issued mobile identity credentials (Preview)](partner-idemia.md)
24+
- [Tutorial: Extend Azure Active Directory B2C to protect on-premises applications using F5 BIG-IP](partner-f5.md)
25+
- [Roles and resource access control](roles-resource-access-control.md)
26+
- [Supported Azure AD features](supported-azure-ad-features.md)
27+
28+
### Updated articles
29+
30+
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](tutorial-create-user-flows.md)
31+
- [Customize the user interface in Azure Active Directory B2C](customize-ui.md)
32+
- [Tutorial: Extend Azure Active Directory B2C to protect on-premises applications using F5 BIG-IP](partner-f5.md)
33+
- [Set up sign-up and sign-in with generic OpenID Connect using Azure Active Directory B2C](identity-provider-generic-openid-connect.md)
34+
- [RelyingParty](relyingparty.md)
35+
- [Customize the user interface with HTML templates in Azure Active Directory B2C](customize-ui-with-html.md)
36+
- [Collect Azure Active Directory B2C logs with Application Insights](troubleshoot-with-application-insights.md)
37+
- [Troubleshoot Azure AD B2C custom policies and user flows](troubleshoot.md)
38+
- [Define custom attributes in Azure Active Directory B2C](user-flow-custom-attributes.md)
39+
- [Tutorial: Configure security analytics for Azure Active Directory B2C data with Azure Sentinel](azure-sentinel.md)
40+
- [What is Azure Active Directory B2C?](overview.md)
41+
- [Quickstart: Set up sign in for a single-page app using Azure Active Directory B2C](quickstart-single-page-app.md)
42+
- [Quickstart: Set up sign in for an ASP.NET application using Azure Active Directory B2C](quickstart-web-app-dotnet.md)
43+
- [Solutions and Training for Azure Active Directory B2C](solution-articles.md)
44+
- [Technical and feature overview of Azure Active Directory B2C](technical-overview.md)
45+
- [Register a SAML application in Azure AD B2C](saml-service-provider.md)
46+
- [Configure session behavior in Azure Active Directory B2C](session-behavior.md)
47+
48+
49+
50+
1851
## September 2021
1952

2053
### Updated articles
@@ -183,7 +216,7 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
183216
- [Azure AD B2C custom policy overview](custom-policy-overview.md)
184217
- [User flows and custom policies overview](user-flow-overview.md)
185218
- [Set up phone sign-up and sign-in for user flows](phone-authentication-user-flows.md)
186-
- [Enable multi-factor authentication in Azure Active Directory B2C](multi-factor-authentication.md)
219+
- [Enable multifactor authentication in Azure Active Directory B2C](multi-factor-authentication.md)
187220
- [User flow versions in Azure Active Directory B2C](user-flow-versions.md)
188221

189222

@@ -212,7 +245,7 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
212245

213246
### New articles
214247

215-
- [Securing phone-based multi-factor authentication (MFA)](phone-based-mfa.md)
248+
- [Securing phone-based multifactor authentication (MFA)](phone-based-mfa.md)
216249

217250
### Updated articles
218251

articles/active-directory/app-provisioning/functions-for-customizing-application-data.md

Lines changed: 58 additions & 29 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-monitor.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,9 @@ PasswordSetErrors : 1
9898

9999
The scope of the cmdlet's reporting may be influenced using one of the –Forest, -Domain, or –DomainController parameters. Not specifying a parameter implies –Forest.
100100

101+
> [!NOTE]
102+
> If you only install the DC agent on one DC, the Get-AzureADPasswordProtectionSummaryReport will read events only from that DC. To get events from multiple DCs, you'll need the DC agent installed on each DC.
103+
101104
The `Get-AzureADPasswordProtectionSummaryReport` cmdlet works by querying the DC agent admin event log, and then counting the total number of events that correspond to each displayed outcome category. The following table contains the mappings between each outcome and its corresponding event ID:
102105

103106
|Get-AzureADPasswordProtectionSummaryReport property |Corresponding event ID|

articles/active-directory/cloud-sync/how-to-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ There are two different ways to resolve a quarantine. They are:
181181

182182
To clear the watermark and run a delta sync on the provisioning job once you have verified it, simply right-click on the status and select **clear quarantine**.
183183

184-
You should see an notice that the quarantine is clearing.
184+
You should see a notice that the quarantine is clearing.
185185

186186
![Screenshot that shows the notice that the quarantine is clearing.](media/how-to-troubleshoot/quarantine-5.png)
187187

articles/active-directory/cloud-sync/reference-expressions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
# Writing expressions for attribute mappings in Azure Active Directory
1818
When you configure cloud sync, one of the types of attribute mappings that you can specify is an expression mapping.
1919

20-
The expression mapping allows you to customize attributes using a script-like expression. This allows you to transform the on-premises data into an new or different value. For example, you may want to combine two attributes into a single attribute because this single attribute is used by one of your cloud applications.
20+
The expression mapping allows you to customize attributes using a script-like expression. This allows you to transform the on-premises data into a new or different value. For example, you may want to combine two attributes into a single attribute because this single attribute is used by one of your cloud applications.
2121

2222
The following document will cover the script-like expressions that are used to transform the data. This is only part of the process. Next you will need to use this expression and place it in a web request to your tenant. For more information on that see [Transformations](how-to-transformation.md)
2323

@@ -812,4 +812,4 @@ Based on the user's first name, middle name and last name, you need to generate
812812
## Next steps
813813

814814
- [What is provisioning?](what-is-provisioning.md)
815-
- [What is Azure AD Connect cloud sync?](what-is-cloud-sync.md)
815+
- [What is Azure AD Connect cloud sync?](what-is-cloud-sync.md)

articles/active-directory/develop/migrate-adal-msal-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.date: 11/04/2019
1515
ms.author: marsma
1616
ms.reviewer: nacanuma, twhitney
1717
ms.custom: aaddev, devx-track-java, has-adal-ref
18-
#Customer intent: As an Java application developer, I want to learn how to migrate my v1 ADAL app to v2 MSAL.
18+
#Customer intent: As a Java application developer, I want to learn how to migrate my v1 ADAL app to v2 MSAL.
1919
---
2020

2121
# ADAL to MSAL migration guide for Java

articles/active-directory/develop/quickstart-create-new-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.date: 02/15/2021
1414
ms.author: ryanwi
1515
ms.reviewer: jmprieur
1616
ms.custom: aaddev, identityplatformtop40, fasttrack-edit
17-
#Customer intent: As an application developer, I need to create an Microsoft identity environment so I can use it to register applications.
17+
#Customer intent: As an application developer, I need to create a Microsoft identity environment so I can use it to register applications.
1818
---
1919

2020
# Quickstart: Set up a tenant

articles/active-directory/develop/quickstart-v2-nodejs-console.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: develop
1111
ms.topic: quickstart
1212
ms.date: 02/17/2021
1313
ms.author: karenhoran
14-
#Customer intent: As an application developer, I want to learn how my Node.js app can get an access token and call an API that is protected by an Microsoft identity platform endpoint using client credentials flow.
14+
#Customer intent: As an application developer, I want to learn how my Node.js app can get an access token and call an API that is protected by a Microsoft identity platform endpoint using client credentials flow.
1515
---
1616

1717
# Quickstart: Acquire a token and call Microsoft Graph API from a Node.js console app using app's identity
@@ -206,4 +206,4 @@ const tokenResponse = await cca.acquireTokenByClientCredential(tokenRequest);
206206
To learn more about daemon/console app development with MSAL Node, see the tutorial:
207207

208208
> [!div class="nextstepaction"]
209-
> [Daemon application that calls web APIs](tutorial-v2-nodejs-console.md)
209+
> [Daemon application that calls web APIs](tutorial-v2-nodejs-console.md)

articles/active-directory/develop/scenario-desktop-acquire-token-wam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ Applications cannot remove accounts from Windows!
137137

138138
- WAM's interactive operations require being on the UI thread. MSAL throws a meaningful exception when not on UI thread. This does NOT apply to console apps.
139139
- `WithAccount` provides an accelerated authentication experience if the MSAL account was originally obtained via WAM, or, WAM can find a work and school account in Windows.
140-
- WAM is not able to pre-populate the username field with a login hint, unless an Work and School account with the same username is found in Windows.
140+
- WAM is not able to pre-populate the username field with a login hint, unless a Work and School account with the same username is found in Windows.
141141
- If WAM is unable to offer an accelerated authentication experience, it will show an account picker. Users can add new accounts.
142142

143143
!["WAM account picker"](media/scenario-desktop-acquire-token-wam/wam-account-picker.png)

0 commit comments

Comments
 (0)