Skip to content

Commit 5802b8f

Browse files
author
David Curwin
committed
fix conflicts
2 parents 1feb108 + a400535 commit 5802b8f

File tree

2,626 files changed

+28535
-15832
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,626 files changed

+28535
-15832
lines changed

.gitattributes

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,9 @@
66
*.c text
77
*.h text
88

9+
# Include Markdown in the GitHub language breakdown statistics
10+
*.md linguist-detectable
11+
912
# Denote all files that are truly binary and should not be modified.
1013
*.gif binary
1114
*.ico binary

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -905,7 +905,7 @@
905905
{
906906
"path_to_root": "ms-identity-python-webapp-tutorial",
907907
"url": "https://github.com/Azure-Samples/ms-identity-python-webapp",
908-
"branch": "0.5.0",
908+
"branch": "0.6.0",
909909
"branch_mapping": {}
910910
},
911911
{

.openpublishing.redirection.active-directory.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12450,6 +12450,31 @@
1245012450
"source_path_from_root": "/articles/active-directory/hybrid/whatis-phs.md",
1245112451
"redirect_url": "/azure/active-directory/hybrid/connect/whatis-phs",
1245212452
"redirect_document_id": false
12453+
},
12454+
12455+
{
12456+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/azure-ad-pim-approval-workflow.md",
12457+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-approval-workflow",
12458+
"redirect_document_id": false
12459+
},
12460+
12461+
{
12462+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md",
12463+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-create-roles-and-resource-roles-review",
12464+
"redirect_document_id": false
12465+
},
12466+
12467+
{
12468+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md",
12469+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-perform-roles-and-resource-roles-review",
12470+
"redirect_document_id": false
12471+
},
12472+
12473+
{
12474+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/pim-complete-azure-ad-roles-and-resource-roles-review.md",
12475+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-complete-roles-and-resource-roles-review",
12476+
"redirect_document_id": false
1245312477
}
12478+
1245412479
]
1245512480
}

.openpublishing.redirection.app-service.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,30 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/app-service/scenario-secure-app-authentication-app-service-as-user.md",
5+
"redirect_url": "/azure/app-service/scenario-secure-app-authentication-app-service",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/app-service/deploy-resource-manager-template.md",
10+
"redirect_url": "/azure/app-service/quickstart-arm-template",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/app-service/deploy-complex-application-predictably.md",
15+
"redirect_url": "/azure/app-service/quickstart-arm-template",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/app-service/quickstart-html.md",
20+
"redirect_url": "/azure/static-web-apps/get-started-portal",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/app-service/quickstart-html-uiex.md",
25+
"redirect_url": "/azure/static-web-apps/get-started-portal",
26+
"redirect_document_id": false
27+
},
328
{
429
"source_path_from_root": "/articles/app-service-web/web-sites-restore.md",
530
"redirect_url": "/azure/app-service/manage-backup",

.openpublishing.redirection.json

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1593,6 +1593,12 @@
15931593
"redirect_url": "/azure/frontdoor/how-to-configure-origin",
15941594
"redirect_document_id": false
15951595
},
1596+
{
1597+
"source_path_from_root": "/articles/frontdoor/front-door-application-security.md",
1598+
"redirect_url": "/azure/frontdoor/web-application-firewall",
1599+
"redirect_document_id": false
1600+
},
1601+
15961602
{
15971603
"source_path_from_root": "/articles/aks/aks-resource-health.md",
15981604
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
@@ -7843,6 +7849,11 @@
78437849
"redirect_url": "/azure/azure-maps/how-to-creator-feature-stateset",
78447850
"redirect_document_id": false
78457851
},
7852+
{
7853+
"source_path_from_root": "/articles/azure-maps/how-to-request-elevation-data.md",
7854+
"redirect_url": "https://azure.microsoft.com/updates/azure-maps-elevation-apis-and-render-v2-dem-tiles-will-be-retired-on-5-may-2023",
7855+
"redirect_document_id": false
7856+
},
78467857
{
78477858
"source_path_from_root": "/articles/azure-portal/resource-group-portal-linked-resources.md",
78487859
"redirect_url": "/azure/azure-portal/azure-portal-dashboards",
@@ -17418,6 +17429,11 @@
1741817429
"redirect_url": "/azure/virtual-network/virtual-networks-using-network-configuration-file",
1741917430
"redirect_document_id": false
1742017431
},
17432+
{
17433+
"source_path_from_root": "/articles/virtual-network-manager/how-to-exclude-elements.md",
17434+
"redirect_url": "/azure/virtual-network-manager/how-to-define-network-group-membership-azure-policy",
17435+
"redirect_document_id": false
17436+
},
1742117437
{
1742217438
"source_path_from_root": "/articles/networking/virtual-network-test-latency.md",
1742317439
"redirect_url": "/azure/virtual-network/virtual-network-test-latency",
@@ -22722,6 +22738,11 @@
2272222738
"source_path_from_root": "/articles/synapse-analytics/synapse-link/troubleshoot/troubleshoot-sql-snapshot-primary-key-column-order.md",
2272322739
"redirect_url": "/azure/synapse-analytics/synapse-link/synapse-link-for-sql-known-issues",
2272422740
"redirect_document_id": false
22741+
},
22742+
{
22743+
"source_path_from_root": "/articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md",
22744+
"redirect_url": "/azure/active-directory/authentication/how-to-migrate-mfa-server-to-mfa-user-authentication",
22745+
"redirect_document_id": true
2272522746
}
2272622747

2272722748
]

.openpublishing.redirection.virtual-desktop.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,16 @@
174174
"source_path_from_root": "/articles/virtual-desktop/environment-setup.md",
175175
"redirect_url": "/azure/virtual-desktop/terminology",
176176
"redirect_document_id": false
177+
},
178+
{
179+
"source_path_from_root": "/articles/virtual-desktop/app-attach-image-prep.md",
180+
"redirect_url": "/azure/virtual-desktop/msix-app-attach-create-msix-image",
181+
"redirect_document_id": true
182+
},
183+
{
184+
"source_path_from_root": "/articles/virtual-desktop/app-attach-msixmgr.md",
185+
"redirect_url": "/azure/virtual-desktop/msix-app-attach-create-msix-image",
186+
"redirect_document_id": false
177187
}
178188
]
179189
}

articles/active-directory-b2c/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -500,6 +500,9 @@
500500
# Secure
501501
- name: Secure
502502
items:
503+
- name: Security overview
504+
href: security-architecture.md
505+
displayName: azure ad b2c security best practices
503506
- name: Enable MFA
504507
items:
505508
- name: Multi-factor authentication

articles/active-directory-b2c/configure-authentication-sample-python-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ To create the web app registration, follow these steps:
7171

7272
## Step 3: Get the web app sample
7373

74-
[Download the zip file](https://github.com/Azure-Samples/ms-identity-python-webapp/archive/master.zip), or clone the sample web application from GitHub.
74+
[Download the zip file](https://github.com/Azure-Samples/ms-identity-python-webapp/archive/main.zip), or clone the sample web application from GitHub.
7575

7676
```bash
7777
git clone https://github.com/Azure-Samples/ms-identity-python-webapp.git

articles/active-directory-b2c/identity-provider-microsoft-account.md

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 02/13/2023
12+
ms.date: 05/01/2023
1313
ms.custom: project-no-code
1414
ms.author: godonnell
1515
ms.subservice: B2C
@@ -30,14 +30,6 @@ zone_pivot_groups: b2c-policy-type
3030

3131
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
3232

33-
### Verify the application's publisher domain
34-
As of November 2020, new application registrations show up as unverified in the user consent prompt unless [the application's publisher domain is verified](../active-directory/develop/howto-configure-publisher-domain.md) ***and*** the company’s identity has been verified with the Microsoft Partner Network and associated with the application. ([Learn more](../active-directory/develop/publisher-verification-overview.md) about this change.) Note that for Azure AD B2C user flows, the publisher’s domain appears only when using a Microsoft account or other [Azure AD](../active-directory-b2c/identity-provider-azure-ad-single-tenant.md) tenant as the identity provider. To meet these new requirements, do the following:
35-
36-
1. [Verify your company identity using your Microsoft Partner Network (MPN) account](/partner-center/verification-responses). This process verifies information about your company and your company’s primary contact.
37-
1. Complete the publisher verification process to associate your MPN account with your app registration using one of the following options:
38-
- If the app registration for the Microsoft account identity provider is in an Azure AD tenant, [verify your app in the App Registration portal](../active-directory/develop/mark-app-as-publisher-verified.md).
39-
- If your app registration for the Microsoft account identity provider is in an Azure AD B2C tenant, [mark your app as publisher verified using Microsoft Graph APIs](../active-directory/develop/troubleshoot-publisher-verification.md#making-microsoft-graph-api-calls) (for example, using Graph Explorer). The UI for setting an app’s verified publisher is currently disabled for Azure AD B2C tenants.
40-
4133
## Create a Microsoft account application
4234

4335
To enable sign-in for users with a Microsoft account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in [Azure portal](https://portal.azure.com). For more information, see [Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md). If you don't already have a Microsoft account, you can get one at [https://www.live.com/](https://www.live.com/).
@@ -209,4 +201,4 @@ You've now configured your policy so that Azure AD B2C knows how to communicate
209201

210202
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
211203

212-
::: zone-end
204+
::: zone-end

articles/active-directory-b2c/integrate-with-app-code-samples.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure Active Directory B2C integrate with app samples
2+
title: Azure Active Directory B2C integrates with app samples
33
description: Code samples for integrating Azure AD B2C to mobile, desktop, web, and single-page applications.
44
services: active-directory-b2c
55
author: garrodonnell
@@ -26,7 +26,7 @@ The following tables provide links to samples for applications including iOS, An
2626
| [dotnetcore-webapp-msal-api](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/4-WebApp-your-API/4-2-B2C) | An ASP.NET Core web application that can sign in a user using Azure AD B2C, get an access token using MSAL.NET and call an API. |
2727
| [auth-code-flow-nodejs](https://github.com/Azure-Samples/active-directory-b2c-msal-node-sign-in-sign-out-webapp) | A Node.js app that shows how to enable authentication (sign in, sign out and profile edit) in a Node.js web application using Azure Active Directory B2C. The web app uses MSAL-node.|
2828
| [javascript-nodejs-webapi](https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi) | A small Node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using passport.js. |
29-
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/master/README_B2C.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
29+
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/main/README_B2C.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
3030

3131
## Single page apps
3232

0 commit comments

Comments
 (0)