Skip to content

Commit 5a71ec1

Browse files
authored
Merge pull request #105641 from MicrosoftDocs/master
2/26 AM Publish
2 parents 72a90cf + 1c62089 commit 5a71ec1

File tree

80 files changed

+1037
-499
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+1037
-499
lines changed

.openpublishing.redirection.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -831,6 +831,11 @@
831831
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
832832
"redirect_document_id": false
833833
},
834+
{
835+
"source_path": "articles/cognitive-services/personalizer/how-to-learning-policy.md",
836+
"redirect_url": "/azure/cognitive-services/personalizer/how-to-manage-model",
837+
"redirect_document_id": false
838+
},
834839
{
835840
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-bot-csharp-appinsights.md",
836841
"redirect_url": "/azure/cognitive-services/LUIS/luis-csharp-tutorial-bf-v4",
@@ -45118,7 +45123,7 @@
4511845123
},
4511945124
{
4512045125
"source_path": "articles/iot-central/howto-connect-nodejs.md",
45121-
"redirect_url": "/azure/iot-central/core/howto-connect-nodejs/",
45126+
"redirect_url": "/azure/iot-central/core/tutorial-connect-device/",
4512245127
"redirect_document_id": true
4512345128
},
4512445129
{
@@ -45598,7 +45603,7 @@
4559845603
},
4559945604
{
4560045605
"source_path": "articles/iot-central/core/howto-connect-nodejs.md",
45601-
"redirect_url": "/azure/iot-central/core/",
45606+
"redirect_url": "/azure/iot-central/core/tutorial-connect-device/",
4560245607
"redirect_document_id": false
4560345608
},
4560445609
{
@@ -48941,6 +48946,11 @@
4894148946
"source_path": "articles/storage/common/storage-java-jenkins-continuous-integration-solution.md",
4894248947
"redirect_url": "/azure/jenkins/storage-java-jenkins-continuous-integration-solution",
4894348948
"redirect_document_id": false
48949+
},
48950+
{
48951+
"source_path": "articles/aks/acs-aks-migration.md",
48952+
"redirect_url": "/azure/aks/aks-migration",
48953+
"redirect_document_id": false
4894448954
}
4894548955
]
4894648956
}

articles/active-directory-b2c/code-samples.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ The following tables provide links to samples for applications including iOS, An
3535
| [dotnet-webapp-and-webapi](https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi) | A combined sample for a .NET web application that calls a .NET Web API, both secured using Azure AD B2C. |
3636
| [dotnetcore-webapp](https://github.com/Azure-Samples/active-directory-b2c-dotnetcore-webapp) | An ASP.NET Core web application that can sign in a user using Azure AD B2C, get an access token using MSAL.NET and call an API. |
3737
| [openidconnect-nodejs](https://github.com/AzureADQuickStarts/B2C-WebApp-OpenIDConnect-NodeJS) | A Node.js app that provides a quick and easy way to set up a Web application with Express using OpenID Connect. |
38-
| [javascript-nodejs-webapp](https://github.com/AzureADQuickStarts/active-directory-b2c-javascript-nodejs-webapp) | A node.js server that provides a quick and easy way to set up a REST API service using the OAuth2 protocol. |
3938
| [javascript-nodejs-webapi](https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi) | A small node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using passport.js. |
4039
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/master/README_B2C.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
4140

articles/active-directory-b2c/page-layout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/10/2020
12+
ms.date: 02/26/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -29,7 +29,7 @@ Page layout packages are periodically updated to include fixes and improvements
2929

3030
- All pages
3131
- Accessibility fixes
32-
- You can now add the `data-preload="true"` attribute in your HTML tags to control the load order for CSS and JavaScript.
32+
- You can now add the `data-preload="true"` attribute [in your HTML tags](custom-policy-ui-customization.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
3333
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
3434
- Control the order in which your `script` tags are fetched and executed before the page load.
3535
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions

articles/active-directory-b2c/phone-number-claims-transformations.md

Lines changed: 35 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/14/2020
12+
ms.date: 02/26/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -22,9 +22,39 @@ This article provides reference and examples for using the phone number claims t
2222

2323
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
2424

25+
## ConvertPhoneNumberClaimToString
26+
27+
Converts a `phoneNumber` data type into a `string` data type.
28+
29+
| Item | TransformationClaimType | Data Type | Notes |
30+
| ---- | ----------------------- | --------- | ----- |
31+
| InputClaim | phoneNumber | phoneNumber | The ClaimType to convert to a string. |
32+
| OutputClaim | phoneNumberString | string | The ClaimType that is produced after this claims transformation has been invoked. |
33+
34+
In this example, the cellPhoneNumber claim with a value type of `phoneNumber` is converted to a cellPhone claim with a value type of `string`.
35+
36+
```XML
37+
<ClaimsTransformation Id="PhoneNumberToString" TransformationMethod="ConvertPhoneNumberClaimToString">
38+
<InputClaims>
39+
<InputClaim ClaimTypeReferenceId="cellPhoneNumber" TransformationClaimType="phoneNumber" />
40+
</InputClaims>
41+
<OutputClaims>
42+
<OutputClaim ClaimTypeReferenceId="cellPhone" TransformationClaimType="phoneNumberString" />
43+
</OutputClaims>
44+
</ClaimsTransformation>
45+
```
46+
47+
### Example
48+
49+
- Input claims:
50+
- **phoneNumber**: +11234567890 (phoneNumber)
51+
- Output claims:
52+
- **phoneNumberString**: +11234567890 (string)
53+
54+
2555
## ConvertStringToPhoneNumberClaim
2656

27-
This claim validates the format of the phone number. If it is in a valid format, change it to a standard format used by Azure AD B2C. If the provided phone number is not in a valid format, an error message is returned.
57+
This claim transformation validates the format of the phone number. If it is in a valid format, change it to a standard format used by Azure AD B2C. If the provided phone number is not in a valid format, an error message is returned.
2858

2959
| Item | TransformationClaimType | Data Type | Notes |
3060
| ---- | ----------------------- | --------- | ----- |
@@ -64,10 +94,10 @@ The self-asserted technical profile that calls the validation technical profile
6494
### Example 1
6595

6696
- Input claims:
67-
- **phoneNumberString**: 045 456-7890
97+
- **phoneNumberString**: 033 456-7890
6898
- **country**: DK
6999
- Output claims:
70-
- **outputClaim**: +450546148120
100+
- **outputClaim**: +450334567890
71101

72102
### Example 2
73103

@@ -76,6 +106,7 @@ The self-asserted technical profile that calls the validation technical profile
76106
- Output claims:
77107
- **outputClaim**: +11234567890
78108

109+
79110
## GetNationalNumberAndCountryCodeFromPhoneNumberString
80111

81112
This extracts the country code and the national number from the input claim, and optionally throws an exception if the supplied phone number is not valid.

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -968,6 +968,9 @@ To host the service within Internet Information Services, a developer would buil
968968

969969
Requests from Azure Active Directory include an OAuth 2.0 bearer token. Any service receiving the request should authenticate the issuer as being Azure Active Directory for the expected Azure Active Directory tenant, for access to the Microsoft Graph API service. In the token, the issuer is identified by an iss claim, like "iss":"https://sts.windows.net/cbb1a5ac-f33b-45fa-9bf5-f37db0fed422/". In this example, the base address of the claim value, https://sts.windows.net, identifies Azure Active Directory as the issuer, while the relative address segment, cbb1a5ac-f33b-45fa-9bf5-f37db0fed422, is a unique identifier of the Azure Active Directory tenant for which the token was issued. The audience for the token will be the application template ID for the app in the gallery. The application template ID for all custom apps is 8adf8e6e-67b2-4cf2-a259-e3dc5476c621. The application template ID for each app in the gallery varies. Please contact [email protected] for questions on the application template ID for a gallery application. Each of the applications registered in a single tenant may receive the same `iss` claim with SCIM requests.
970970

971+
> [!NOTE]
972+
> It's ***not*** recommended to leave this field blank and rely on a token generated by Azure AD. This option is primarily available for testing purposes.
973+
971974
Developers using the CLI libraries provided by Microsoft for building a SCIM service can authenticate requests from Azure Active Directory using the Microsoft.Owin.Security.ActiveDirectory package by following these steps:
972975

973976
First, in a provider, implement the Microsoft.SystemForCrossDomainIdentityManagement.IProvider.StartupBehavior property by having it return a method to be called whenever the service is started:
@@ -1452,6 +1455,8 @@ Follow the checklist below to ensure that your application is onboarded quicky a
14521455
> [!div class="checklist"]
14531456
> * Support a [SCIM 2.0 ](https://docs.microsoft.com/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups#step-2-understand-the-azure-ad-scim-implementation) user and group endpoint (Only one is required but both are recommended)
14541457
> * Support at least 25 requests per second per tenant (Required)
1458+
> * Establish engineering and support contacts to guide customers post gallery onboarding (Required)
1459+
> * 3 Non-expiring test credentials for your application (Required)
14551460
> * Support the OAuth authorization code grant or a long lived token as described below (Required)
14561461
> * Establish an engineering and support point of contact to support customers post gallery onboarding (Required)
14571462
> * Support updating multiple group memberships with a single PATCH (Recommended)

articles/active-directory/cloud-provisioning/how-to-configure.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ manager: daveba
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 12/05/2019
10+
ms.date: 02/26/2020
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

16-
# Azure AD Connect cloud provisioning new agent configuration
16+
# Create a new configuration for Azure AD Connect cloud-based provisioning
1717

1818
After you've installed the agent, you need to sign in to the Azure portal and configure Azure Active Directory (Azure AD) Connect cloud provisioning. Follow these steps to enable the agent.
1919

@@ -51,7 +51,8 @@ You can scope the agent to synchronize specific users and groups by using on-pre
5151

5252
![Selected security groups option](media/how-to-configure/scope3.png)
5353

54-
1. Or you can change the scope to include only specific organizational units. Select **Done** and **Save**.
54+
1. Or you can change the scope to include only specific organizational units. Select **Done** and **Save**.
55+
2. Once you have changed the scope, you should [restart provisioning](#restart-provisioning) to initiate an immediate synchronization of the changes.
5556

5657
![Selected organizational units option](media/how-to-configure/scope4.png)
5758

articles/active-directory/cloud-provisioning/how-to-install.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: daveba
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 12/02/2019
10+
ms.date: 02/26/2020
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -91,7 +91,7 @@ To verify that the agent is running, follow these steps.
9191
![Services screen](media/how-to-troubleshoot/troubleshoot1.png)
9292

9393
>[!IMPORTANT]
94-
>The agent has been installed but it must be configured and enabled before it will start synchronizing users. To configure a new agent, see [Azure AD Connect cloud provisioning new agent configuration](how-to-configure.md).
94+
>The agent has been installed but it must be configured and enabled before it will start synchronizing users. To configure a new agent, see [Create a new configuration for Azure AD Connect cloud-based provisioning](how-to-configure.md).
9595
9696

9797

articles/active-directory/cloud-provisioning/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
### YamlMime:Landing
22

33
title: Azure AD Connect cloud provisioning documentation
4-
summary: Cloud provisioning helps simplify and automate the management of on-premises users by keeping everything in the cloud.
4+
summary: Cloud provisioning helps simplify and automate the management of Azure AD users, through cloud-managed rules for synchronizing those users from existing AD forests.
55

66

77

articles/active-directory/cloud-provisioning/plan-cloud-provisioning-topologies.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: daveba
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 12/02/2019
10+
ms.date: 02/26/2020
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -29,12 +29,16 @@ The following is a list of information to keep in mind when selecting a solution
2929
- The source anchor for objects is chosen automatically. It uses ms-DS-ConsistencyGuid if present, otherwise ObjectGUID is used.
3030
- You cannot change the attribute that is used for source anchor.
3131

32+
## Single forest, single Azure AD tenant
33+
![Topology for a single forest and a single tenant](media/plan-cloud-provisioning-topologies/single-forest.png)
34+
35+
The simplest topology is a single on-premises forest, with one or multiple domains, and a single Azure AD tenant. For an example of this scenario see [Tutorial: A single forest with a single Azure AD tenant](tutorial-single-forest.md)
3236

3337

3438
## Multi-forest, single Azure AD tenant
3539
![Topology for a multi-forest and a single tenant](media/plan-cloud-provisioning-topologies/multi-forest.png)
3640

37-
The most common topology is a multiple AD forests, with one or multiple domains, and a single Azure AD tenant.
41+
A common topology is a multiple AD forests, with one or multiple domains, and a single Azure AD tenant.
3842

3943
## Existing forest with Azure AD Connect, new forest with cloud Provisioning
4044
![Topology for a single forest and a single tenant](media/plan-cloud-provisioning-topologies/existing-forest-new-forest.png)
@@ -47,10 +51,7 @@ The piloting scenario involves the existence of both Azure AD Connect and Azure
4751

4852
For an example of this scenario see [Tutorial: Pilot Azure AD Connect cloud provisioning in an existing synced AD forest](tutorial-pilot-aadc-aadccp.md)
4953

50-
## Single forest, single Azure AD tenant
51-
![Topology for a single forest and a single tenant](media/plan-cloud-provisioning-topologies/single-forest.png)
5254

53-
The simplest topology is a single on-premises forest, with one or multiple domains, and a single Azure AD tenant. For an example of this scenario see [Tutorial: A single forest with a single Azure AD tenant](tutorial-single-forest.md)
5455

5556
## Next steps
5657

articles/active-directory/develop/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ We provide libraries and code samples that show how to easily handle token valid
174174

175175
A JWT contains three segments, which are separated by the `.` character. The first segment is known as the **header**, the second as the **body**, and the third as the **signature**. The signature segment can be used to validate the authenticity of the token so that it can be trusted by your app.
176176

177-
Tokens issued by Azure AD are signed using industry standard asymmetric encryption algorithms, such as RSA 256. The header of the JWT contains information about the key and encryption method used to sign the token:
177+
Tokens issued by Azure AD are signed using industry standard asymmetric encryption algorithms, such as RS256. The header of the JWT contains information about the key and encryption method used to sign the token:
178178

179179
```json
180180
{

0 commit comments

Comments
 (0)