Skip to content

Commit 565eec9

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into modeling-simulation-workbench-how-to-articles
2 parents 8f23121 + 5e2a26d commit 565eec9

File tree

3,888 files changed

+82241
-66253
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,888 files changed

+82241
-66253
lines changed

.openpublishing.publish.config.json

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -974,12 +974,90 @@
974974
"branch": "main",
975975
"branch_mapping": {}
976976
},
977+
{
978+
"path_to_root": "cosmos-db-nosql-javascript-samples",
979+
"url": "https://github.com/azure-samples/cosmos-db-nosql-javascript-samples",
980+
"branch": "main",
981+
"branch_mapping": {}
982+
},
977983
{
978984
"path_to_root": "cosmos-db-nosql-python-samples",
979985
"url": "https://github.com/azure-samples/cosmos-db-nosql-python-samples",
980986
"branch": "main",
981987
"branch_mapping": {}
982988
},
989+
{
990+
"path_to_root": "cosmos-db-mongodb-dotnet-samples",
991+
"url": "https://github.com/azure-samples/cosmos-db-mongodb-dotnet-samples",
992+
"branch": "main",
993+
"branch_mapping": {}
994+
},
995+
{
996+
"path_to_root": "cosmos-db-mongodb-javascript-samples",
997+
"url": "https://github.com/azure-samples/cosmos-db-mongodb-javascript-samples",
998+
"branch": "main",
999+
"branch_mapping": {}
1000+
},
1001+
{
1002+
"path_to_root": "cosmos-db-mongodb-python-samples",
1003+
"url": "https://github.com/azure-samples/cosmos-db-mongodb-python-samples",
1004+
"branch": "main",
1005+
"branch_mapping": {}
1006+
},
1007+
{
1008+
"path_to_root": "cosmos-db-apache-cassandra-dotnet-samples",
1009+
"url": "https://github.com/azure-samples/cosmos-db-apache-cassandra-dotnet-samples",
1010+
"branch": "main",
1011+
"branch_mapping": {}
1012+
},
1013+
{
1014+
"path_to_root": "cosmos-db-apache-cassandra-javascript-samples",
1015+
"url": "https://github.com/azure-samples/cosmos-db-apache-cassandra-javascript-samples",
1016+
"branch": "main",
1017+
"branch_mapping": {}
1018+
},
1019+
{
1020+
"path_to_root": "cosmos-db-apache-cassandra-python-samples",
1021+
"url": "https://github.com/azure-samples/cosmos-db-apache-cassandra-python-samples",
1022+
"branch": "main",
1023+
"branch_mapping": {}
1024+
},
1025+
{
1026+
"path_to_root": "cosmos-db-apache-gremlin-dotnet-samples",
1027+
"url": "https://github.com/azure-samples/cosmos-db-apache-gremlin-dotnet-samples",
1028+
"branch": "main",
1029+
"branch_mapping": {}
1030+
},
1031+
{
1032+
"path_to_root": "cosmos-db-apache-gremlin-javascript-samples",
1033+
"url": "https://github.com/azure-samples/cosmos-db-apache-gremlin-javascript-samples",
1034+
"branch": "main",
1035+
"branch_mapping": {}
1036+
},
1037+
{
1038+
"path_to_root": "cosmos-db-apache-gremlin-python-samples",
1039+
"url": "https://github.com/azure-samples/cosmos-db-apache-gremlin-python-samples",
1040+
"branch": "main",
1041+
"branch_mapping": {}
1042+
},
1043+
{
1044+
"path_to_root": "cosmos-db-table-dotnet-samples",
1045+
"url": "https://github.com/azure-samples/cosmos-db-table-dotnet-samples",
1046+
"branch": "main",
1047+
"branch_mapping": {}
1048+
},
1049+
{
1050+
"path_to_root": "cosmos-db-table-javascript-samples",
1051+
"url": "https://github.com/azure-samples/cosmos-db-table-javascript-samples",
1052+
"branch": "main",
1053+
"branch_mapping": {}
1054+
},
1055+
{
1056+
"path_to_root": "cosmos-db-table-python-samples",
1057+
"url": "https://github.com/azure-samples/cosmos-db-table-python-samples",
1058+
"branch": "main",
1059+
"branch_mapping": {}
1060+
},
9831061
{
9841062
"path_to_root": "azure-cosmos-db-table-dotnet-v12",
9851063
"url": "https://github.com/Azure-Samples/cosmos-db-table-api-dotnet-samples",

.openpublishing.redirection.json

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23602,6 +23602,11 @@
2360223602
"redirect_url": "/azure/devtest-labs/deliver-proof-of-concept",
2360323603
"redirect_document_id": false
2360423604
},
23605+
{
23606+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-orchestrate-implementation.md",
23607+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-scale",
23608+
"redirect_document_id": false
23609+
},
2360523610
{
2360623611
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-governance-cost-ownership.md",
2360723612
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-governance-resources",
@@ -24515,6 +24520,14 @@
2451524520
"source_path_from_root": "/articles/aks/command-invoke.md",
2451624521
"redirect_url": "/azure/aks/access-private-cluster",
2451724522
"redirect_document_id": false
24523+
},
24524+
{
24525+
"source_path_from_root": "/articles/orbital/space-partner-program-overview.md",
24526+
"redirect_url": "/azure/orbital/overview",
24527+
"redirect_document_id": false
2451824528
}
24529+
24530+
24531+
2451924532
]
2452024533
}

articles/active-directory-b2c/TOC.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@
6565
items:
6666
- name: Compare solutions for External Identities
6767
href: ../active-directory/external-identities/external-identities-overview.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
68-
- name: Supported Azure AD features
68+
- name: Supported Microsoft Entra features
6969
href: supported-azure-ad-features.md
7070
- name: Learn authentication basics
7171
items:
@@ -156,7 +156,7 @@
156156
href: microsoft-graph-get-started.md
157157
- name: Register a SAML application
158158
href: saml-service-provider.md?tabs=windows&pivots=b2c-custom-policy
159-
- name: Publish app in Azure AD app gallery
159+
- name: Publish app in Microsoft Entra app gallery
160160
href: publish-app-to-azure-ad-app-gallery.md
161161
- name: Create a user flow or custom policy
162162
items:
@@ -334,9 +334,9 @@
334334
href: identity-provider-amazon.md
335335
- name: Apple
336336
href: identity-provider-apple-id.md
337-
- name: Azure AD (single tenant)
337+
- name: Microsoft Entra ID (single tenant)
338338
href: identity-provider-azure-ad-single-tenant.md
339-
- name: Azure AD (multitenant)
339+
- name: Microsoft Entra ID (multitenant)
340340
href: identity-provider-azure-ad-multi-tenant.md
341341
- name: Azure AD B2C
342342
href: identity-provider-azure-ad-b2c.md
@@ -509,7 +509,7 @@
509509
displayName: azure ad b2c security best practices
510510
- name: Enable MFA
511511
items:
512-
- name: Multi-factor authentication
512+
- name: Multifactor authentication
513513
href: multi-factor-authentication.md
514514
displayName: TOTP, multi-factor, multifactor, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
515515
- name: Secure phone-based MFA
@@ -722,12 +722,12 @@
722722
items:
723723
- name: About validation technical profiles
724724
href: validation-technical-profile.md
725-
- name: Azure Active Directory
725+
- name: Microsoft Entra ID
726726
href: active-directory-technical-profile.md
727-
- name: Azure AD Multi-Factor Authentication
727+
- name: Microsoft Entra multifactor authentication
728728
href: multi-factor-auth-technical-profile.md
729729
displayName: mfa
730-
- name: Azure AD SSPR
730+
- name: Microsoft Entra SSPR
731731
href: aad-sspr-technical-profile.md
732732
- name: Claims transformation
733733
href: claims-transformation-technical-profile.md

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Azure AD SSPR technical profiles in custom policies
2+
title: Microsoft Entra SSPR technical profiles in custom policies
33
titleSuffix: Azure AD B2C
4-
description: Custom policy reference for Azure AD SSPR technical profiles in Azure AD B2C.
4+
description: Custom policy reference for Microsoft Entra SSPR technical profiles in Azure AD B2C.
55
services: active-directory-b2c
66
author: kengaderdus
77
manager: CelesteDG
@@ -15,16 +15,16 @@ ms.author: kengaderdus
1515
ms.subservice: B2C
1616
---
1717

18-
# Define an Azure AD SSPR technical profile in an Azure AD B2C custom policy
18+
# Define a Microsoft Entra SSPR technical profile in an Azure AD B2C custom policy
1919

2020
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2121

22-
Azure Active Directory B2C (Azure AD B2C) provides support for verifying an email address for self-service password reset (SSPR). Use the Azure AD SSPR technical profile to generate and send a code to an email address, and then verify the code. The Azure AD SSPR technical profile may also return an error message. The validation technical profile validates the user-provided data before the user journey continues. With the validation technical profile, an error message displays on a self-asserted page.
22+
Azure Active Directory B2C (Azure AD B2C) provides support for verifying an email address for self-service password reset (SSPR). Use the Microsoft Entra SSPR technical profile to generate and send a code to an email address, and then verify the code. The Microsoft Entra SSPR technical profile may also return an error message. The validation technical profile validates the user-provided data before the user journey continues. With the validation technical profile, an error message displays on a self-asserted page.
2323

2424
This technical profile:
2525

2626
- Doesn't provide an interface to interact with the user. Instead, the user interface is called from a [self-asserted](self-asserted-technical-profile.md) technical profile, or a [display control](display-controls.md) as a [validation technical profile](validation-technical-profile.md).
27-
- Uses the Azure AD SSPR service to generate and send a code to an email address, and then verifies the code.
27+
- Uses the Microsoft Entra SSPR service to generate and send a code to an email address, and then verifies the code.
2828
- Validates an email address via a verification code.
2929

3030
## Protocol
@@ -35,7 +35,7 @@ The **Name** attribute of the **Protocol** element needs to be set to `Proprieta
3535
Web.TPEngine.Providers.AadSsprProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
3636
```
3737

38-
The following example shows an Azure AD SSPR technical profile:
38+
The following example shows a Microsoft Entra SSPR technical profile:
3939

4040
```xml
4141
<TechnicalProfile Id="AadSspr-SendCode">
@@ -50,17 +50,17 @@ The first mode of this technical profile is to generate a code and send it. The
5050

5151
### Input claims
5252

53-
The **InputClaims** element contains a list of claims to send to Azure AD SSPR. You can also map the name of your claim to the name defined in the SSPR technical profile.
53+
The **InputClaims** element contains a list of claims to send to Microsoft Entra SSPR. You can also map the name of your claim to the name defined in the SSPR technical profile.
5454

5555
| ClaimReferenceId | Required | Description |
5656
| --------- | -------- | ----------- |
5757
| emailAddress | Yes | The identifier for the user who owns the email address. The `PartnerClaimType` property of the input claim must be set to `emailAddress`. |
5858

59-
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones before sending to the Azure AD SSPR service.
59+
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones before sending to the Microsoft Entra SSPR service.
6060

6161
### Output claims
6262

63-
The Azure AD SSPR protocol provider does not return any **OutputClaims**, thus there is no need to specify output claims. You can, however, include claims that aren't returned by the Azure AD SSPR protocol provider as long as you set the `DefaultValue` attribute.
63+
The Microsoft Entra SSPR protocol provider does not return any **OutputClaims**, thus there is no need to specify output claims. You can, however, include claims that aren't returned by the Microsoft Entra SSPR protocol provider as long as you set the `DefaultValue` attribute.
6464

6565
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
6666

@@ -81,7 +81,7 @@ The following metadata can be used to configure the error messages displayed upo
8181

8282
### Example: send an email
8383

84-
The following example shows an Azure AD SSPR technical profile that is used to send a code via email.
84+
The following example shows a Microsoft Entra SSPR technical profile that is used to send a code via email.
8585

8686
```xml
8787
<TechnicalProfile Id="AadSspr-SendCode">
@@ -102,18 +102,18 @@ The second mode of this technical profile is to verify a code. The following opt
102102

103103
### Input claims
104104

105-
The **InputClaims** element contains a list of claims to send to Azure AD SSPR. You can also map the name of your claim to the name defined in the SSPR technical profile.
105+
The **InputClaims** element contains a list of claims to send to Microsoft Entra SSPR. You can also map the name of your claim to the name defined in the SSPR technical profile.
106106

107107
| ClaimReferenceId | Required | Description |
108108
| --------- | -------- | ----------- | ----------- |
109109
| emailAddress| Yes | Same email address as previously used to send a code. It is also used to locate an email verification session. The `PartnerClaimType` property of the input claim must be set to `emailAddress`.|
110110
| verificationCode | Yes | The verification code provided by the user to be verified. The `PartnerClaimType` property of the input claim must be set to `verificationCode`. |
111111

112-
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones before calling the Azure AD SSPR service.
112+
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones before calling the Microsoft Entra SSPR service.
113113

114114
### Output claims
115115

116-
The Azure AD SSPR protocol provider does not return any **OutputClaims**, thus there is no need to specify output claims. You can, however, include claims that aren't returned by the Azure AD SSPR protocol provider as long as you set the `DefaultValue` attribute.
116+
The Microsoft Entra SSPR protocol provider does not return any **OutputClaims**, thus there is no need to specify output claims. You can, however, include claims that aren't returned by the Microsoft Entra SSPR protocol provider as long as you set the `DefaultValue` attribute.
117117

118118
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
119119

@@ -137,7 +137,7 @@ The following metadata can be used to configure the error messages displayed upo
137137

138138
### Example: verify a code
139139

140-
The following example shows an Azure AD SSPR technical profile used to verify the code.
140+
The following example shows a Microsoft Entra SSPR technical profile used to verify the code.
141141

142142
```xml
143143
<TechnicalProfile Id="AadSspr-VerifyCode">

articles/active-directory-b2c/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ An *access token* contains claims that you can use in Azure Active Directory B2C
2020
This article shows you how to request an access token for a web application and web API. For more information about tokens in Azure AD B2C, see the [overview of tokens in Azure Active Directory B2C](tokens-overview.md).
2121

2222
> [!NOTE]
23-
> **Web API chains (On-Behalf-Of) is not supported by Azure AD B2C** - Many architectures include a web API that needs to call another downstream web API, both secured by Azure AD B2C. This scenario is common in clients that have a web API back end, which in turn calls a another service. This chained web API scenario can be supported by using the OAuth 2.0 JWT Bearer Credential grant, otherwise known as the On-Behalf-Of flow. However, the On-Behalf-Of flow is not currently implemented in Azure AD B2C. Although On-Behalf-Of works for applications registered in Azure AD, it does not work for applications registered in Azure AD B2C, regardless of the tenant (Azure AD or Azure AD B2C) that is issuing the tokens.
23+
> **Web API chains (On-Behalf-Of) is not supported by Azure AD B2C** - Many architectures include a web API that needs to call another downstream web API, both secured by Azure AD B2C. This scenario is common in clients that have a web API back end, which in turn calls a another service. This chained web API scenario can be supported by using the OAuth 2.0 JWT Bearer Credential grant, otherwise known as the On-Behalf-Of flow. However, the On-Behalf-Of flow is not currently implemented in Azure AD B2C. Although On-Behalf-Of works for applications registered in Microsoft Entra ID, it does not work for applications registered in Azure AD B2C, regardless of the tenant (Microsoft Entra ID or Azure AD B2C) that is issuing the tokens.
2424
2525
## Prerequisites
2626

0 commit comments

Comments
 (0)