Skip to content

Commit 5371dce

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into lb-nat-howto-portal
2 parents a115d18 + 632659e commit 5371dce

File tree

1,828 files changed

+14865
-8178
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,828 files changed

+14865
-8178
lines changed

.openpublishing.publish.config.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -830,6 +830,18 @@
830830
"url": "https://github.com/Azure-Samples/msdocs-nodejs-mongodb-azure-sample-app",
831831
"branch": "main",
832832
"branch_mapping": {}
833+
},
834+
{
835+
"path_to_root": "msdocs-django-postgresql-sample-app",
836+
"url": "https://github.com/Azure-Samples/msdocs-django-postgresql-sample-app",
837+
"branch": "main",
838+
"branch_mapping": {}
839+
},
840+
{
841+
"path_to_root": "msdocs-flask-postgresql-sample-app",
842+
"url": "https://github.com/Azure-Samples/msdocs-flask-postgresql-sample-app",
843+
"branch": "main",
844+
"branch_mapping": {}
833845
}
834846
],
835847
"branch_target_mapping": {

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@
6262
},
6363
{
6464
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds.md",
65-
"redirect_url": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
65+
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
6666
"redirect_document_id": false
6767
},
6868
{

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25208,6 +25208,11 @@
2520825208
"redirect_url": "/azure/azure-sql/managed-instance/scripts/create-configure-managed-instance-cli",
2520925209
"redirect_document_id": false
2521025210
},
25211+
{
25212+
"source_path_from_root": "/articles/azure-sql/managed-instance/azure-app-sync-network-configuration.md",
25213+
"redirect_url": "/azure/azure-sql/managed-instance/index.yml",
25214+
"redirect_document_id": false
25215+
},
2521125216
{
2521225217
"source_path_from_root": "/articles/sql-database/scripts/sql-database-copy-database-to-new-server-cli.md",
2521325218
"redirect_url": "/azure/azure-sql/database/scripts/copy-database-to-new-server-cli",

articles/active-directory-b2c/configure-authentication-sample-web-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 09/15/2021
10+
ms.date: 03/11/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -134,13 +134,13 @@ Your final configuration file should look like the following JSON:
134134
1. Go to `https://localhost:44316`.
135135
1. Select **Sign Up/In**.
136136

137-
![Screenshot of the "Sign Up/In" button on the project Welcome page.](./media/configure-authentication-sample-web-app/web-app-sign-in.png)
137+
:::image type="content" source="./media/configure-authentication-sample-web-app/web-app-sign-in.png" alt-text="Screenshot of the sign in and sign up button on the project Welcome page.":::
138138

139139
1. Complete the sign-up or sign-in process.
140140

141141
After successful authentication, you'll see your display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, select **Claims**.
142142

143-
![Screenshot of the web app token claims.](./media/configure-authentication-sample-web-app/web-app-token-claims.png)
143+
:::image type="content" source="./media/configure-authentication-sample-web-app/web-app-token-claims.png" alt-text="Screenshot of the web app token claims.":::
144144

145145
## Deploy your application
146146

50.2 KB
Loading
24.5 KB
Loading

articles/active-directory-b2c/partner-f5.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Tutorial to enable Secure Hybrid Access to applications with Azure AD B2C and F5 BIG-IP
33
titleSuffix: Azure AD B2C
44
description: Learn how to integrate Azure AD B2C authentication with F5 BIG-IP for secure hybrid access
5-
author: NishthaBabith-V
6-
ms.author: v-nisba
5+
author: KarenH444
6+
ms.author: celested
77
manager: CelesteDG
88
ms.reviewer: kengaderdus
99
ms.service: active-directory

articles/active-directory-b2c/predicates.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/30/2020
12+
ms.date: 03/13/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -67,7 +67,7 @@ The **Parameter** element contains the following attributes:
6767

6868
#### IsLengthRange
6969

70-
The IsLengthRange method checks whether the length of a string claim value is within the range of minimum and maximum parameters specified. The predicate element supports the following parameters:
70+
The IsLengthRange method checks whether the length of a string claim value is within the range of minimum and maximum parameters specified. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/predicates#islengthrange-method) of this predicate method. The predicate element supports the following parameters:
7171

7272
| Parameter | Required | Description |
7373
| ------- | ----------- | ----------- |
@@ -87,7 +87,7 @@ The following example shows a IsLengthRange method with the parameters `Minimum`
8787

8888
#### MatchesRegex
8989

90-
The MatchesRegex method checks whether a string claim value matches a regular expression. The predicate element supports the following parameters:
90+
The MatchesRegex method checks whether a string claim value matches a regular expression. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/predicates#matchesregex-method) of this predicate method. The predicate element supports the following parameters:
9191

9292
| Parameter | Required | Description |
9393
| ------- | ----------- | ----------- |
@@ -105,7 +105,7 @@ The following example shows a `MatchesRegex` method with the parameter `RegularE
105105

106106
#### IncludesCharacters
107107

108-
The IncludesCharacters method checks whether a string claim value contains a character set. The predicate element supports the following parameters:
108+
The IncludesCharacters method checks whether a string claim value contains a character set. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/predicates#includescharacters-method) of this predicate method. The predicate element supports the following parameters:
109109

110110
| Parameter | Required | Description |
111111
| ------- | ----------- | ----------- |
@@ -123,7 +123,7 @@ The following example shows a `IncludesCharacters` method with the parameter `Ch
123123

124124
#### IsDateRange
125125

126-
The IsDateRange method checks whether a date claim value is between a range of minimum and maximum parameters specified. The predicate element supports the following parameters:
126+
The IsDateRange method checks whether a date claim value is between a range of minimum and maximum parameters specified. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/predicates#isdaterange-method) of this predicate method. The predicate element supports the following parameters:
127127

128128
| Parameter | Required | Description |
129129
| ------- | ----------- | ----------- |

articles/active-directory-b2c/quickstart-web-app-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ In this quickstart, you use an ASP.NET application to sign in using a social ide
3131
git clone https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi.git
3232
```
3333
34-
There are two projects are in the sample solution:
34+
There are two projects in the sample solution:
3535
3636
- **TaskWebApp** - A web application that creates and edits a task list. The web application uses the **sign-up or sign-in** user flow to sign up or sign in users.
3737
- **TaskService** - A web API that supports the create, read, update, and delete task list functionality. The web API is protected by Azure AD B2C and called by the web application.

articles/active-directory-b2c/session-behavior.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/25/2022
11+
ms.date: 03/13/2022
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -147,7 +147,7 @@ To configure the session behavior in your custom policy, follow these steps:
147147

148148
## Enable Keep me signed in (KMSI)
149149

150-
You can enable the KMSI feature for users of your web and native applications who have local accounts in your Azure AD B2C directory. When you enable the feature, users can opt to stay signed in so the session remains active after they close the browser. The session is maintained by setting a [persistent cookie](cookie-definitions.md). Users who select KMSI, can reopen the browser without being prompted to reenter their username and password. This access (persistent cookie) is revoked when a user signs out.
150+
You can enable the KMSI feature for users of your web and native applications who have local accounts in your Azure AD B2C directory. When you enable the feature, users can opt to stay signed in so the session remains active after they close the browser. The session is maintained by setting a [persistent cookie](cookie-definitions.md). Users who select KMSI, can reopen the browser without being prompted to reenter their username and password. This access (persistent cookie) is revoked when a user signs out. For more information, check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/session#enable-keep-me-signed-in-kmsi).
151151

152152
![Example sign-up sign-in page showing a Keep me signed in checkbox](./media/session-behavior/keep-me-signed-in.png)
153153

@@ -401,7 +401,7 @@ To require an ID Token in logout requests:
401401

402402
::: zone pivot="b2c-custom-policy"
403403

404-
To require an ID Token in logout requests, add a **UserJourneyBehaviors** element inside of the [RelyingParty](relyingparty.md) element. Then set the **EnforceIdTokenHintOnLogout** of the **SingleSignOn** element to `true`. Your **UserJourneyBehaviors** element should look like this example:
404+
To require an ID Token in logout requests, add a **UserJourneyBehaviors** element inside of the [RelyingParty](relyingparty.md) element. Then set the **EnforceIdTokenHintOnLogout** of the **SingleSignOn** element to `true`. For more information, check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/session#enforce-id-token-hint-on-logout). Your **UserJourneyBehaviors** element should look like this example:
405405

406406
```xml
407407
<UserJourneyBehaviors>

0 commit comments

Comments
 (0)