Skip to content

Commit 5dd8c30

Browse files
authored
Merge pull request #52989 from CarlRabeler/new-sqldb-branch
New sqldb branch
2 parents f489982 + 39fe3ed commit 5dd8c30

File tree

3,953 files changed

+77289
-46445
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,953 files changed

+77289
-46445
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,12 @@
161161
"branch": "master",
162162
"branch_mapping": {}
163163
},
164+
{
165+
"path_to_root": "iot-samples-c",
166+
"url": "https://github.com/Azure/azure-iot-sdk-c",
167+
"branch": "master",
168+
"branch_mapping": {}
169+
},
164170
{
165171
"path_to_root": "samples-cognitive-services-speech-sdk",
166172
"url": "https://github.com/Azure-Samples/cognitive-services-speech-sdk",

.openpublishing.redirection.json

Lines changed: 1204 additions & 390 deletions
Large diffs are not rendered by default.

.vscode/arduino.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
22
"board": "AZ3166:stm32f4:MXCHIP_AZ3166",
33
"configuration": "upload_method=OpenOCDMethod",
4-
"port": "COM6"
4+
"port": "COM3"
55
}

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Azure Active Directory (Azure AD) B2C tenants tend to be very large. This means
2323
For B2C tenants, there are two primary modes of communicating with the Graph API.
2424

2525
* For interactive, run-once tasks, you should act as an administrator account in the B2C tenant when you perform the tasks. This mode requires an administrator to sign in with credentials before that admin can perform any calls to the Graph API.
26-
* For automated, continuous tasks, you should use some type of service account that you provide with the necessary privileges to perform management tasks. In Azure AD, you can do this by registering an application and authenticating to Azure AD. This is done by using an **Application ID** that uses the [OAuth 2.0 client credentials grant](../active-directory/develop/authentication-scenarios.md#daemon-or-server-application-to-web-api). In this case, the application acts as itself, not as a user, to call the Graph API.
26+
* For automated, continuous tasks, you should use some type of service account that you provide with the necessary privileges to perform management tasks. In Azure AD, you can do this by registering an application and authenticating to Azure AD. This is done by using an **Application ID** that uses the [OAuth 2.0 client credentials grant](../active-directory/develop/service-to-service.md). In this case, the application acts as itself, not as a user, to call the Graph API.
2727

2828
In this article, you learn how to perform the automated-use case. You'll build a .NET 4.5 `B2CGraphClient` that performs user create, read, update, and delete (CRUD) operations. The client will have a Windows command-line interface (CLI) that allows you to invoke various methods. However, the code is written to behave in a noninteractive, automated fashion.
2929

articles/active-directory-b2c/active-directory-b2c-tutorials-desktop-app-webapi.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ In this tutorial, you learn how to:
3737

3838
Web API resources need to be registered in your tenant before they can accept and respond to [protected resource requests](../active-directory/develop/developer-glossary.md#resource-server) by [client applications](../active-directory/develop/developer-glossary.md#client-application) that present an [access token](../active-directory/develop/developer-glossary.md#access-token) from Azure Active Directory. Registration establishes the [application and service principal object](../active-directory/develop/developer-glossary.md#application-object) in your tenant.
3939

40-
Log in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
40+
Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
4141

4242
[!INCLUDE [active-directory-b2c-switch-b2c-tenant](../../includes/active-directory-b2c-switch-b2c-tenant.md)]
4343

@@ -106,7 +106,7 @@ To call a protected web API from an app, you need to grant your app permissions
106106

107107
5. Click **OK**.
108108

109-
Your **My Sample WPF App** is registered to call the protected **My sample Node.js web API**. A user [authenticates](../active-directory/develop/developer-glossary.md#authentication) with Azure AD B2C to use the WPF desktop app. The desktop app obtains an [authorization grant](../active-directory/develop/developer-glossary.md#authorization-grant) from Azure AD B2C to access the protected web API.
109+
Your **My Sample WPF App** is registered to call the protected **My sample Node.js web API**. A user [authenticates](../active-directory/develop/developer-glossary.md#authentication) with Azure AD B2C to use the WPF desktop application. The desktop application obtains an [authorization grant](../active-directory/develop/developer-glossary.md#authorization-grant) from Azure AD B2C to access the protected web API.
110110

111111
## Update web API code
112112

articles/active-directory-b2c/active-directory-b2c-tutorials-desktop-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In this tutorial, you learn how to:
3535

3636
Applications need to be [registered](../active-directory/develop/developer-glossary.md#application-registration) in your tenant before they can receive [access tokens](../active-directory/develop/developer-glossary.md#access-token) from Azure Active Directory. App registration creates an [application id](../active-directory/develop/developer-glossary.md#application-id-client-id) for the app in your tenant.
3737

38-
Log in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
38+
Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
3939

4040
[!INCLUDE [active-directory-b2c-switch-b2c-tenant](../../includes/active-directory-b2c-switch-b2c-tenant.md)]
4141

articles/active-directory-b2c/active-directory-b2c-tutorials-spa-webapi.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,13 +38,13 @@ In this tutorial, you learn how to:
3838

3939
Web API resources need to be registered in your tenant before they can accept and respond to [protected resource requests](../active-directory/develop/developer-glossary.md#resource-server) by [client applications](../active-directory/develop/developer-glossary.md#client-application) that present an [access token](../active-directory/develop/developer-glossary.md#access-token) from Azure Active Directory. Registration establishes the [application and service principal object](../active-directory/develop/developer-glossary.md#application-object) in your tenant.
4040

41-
Log in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
41+
Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
4242

4343
[!INCLUDE [active-directory-b2c-switch-b2c-tenant](../../includes/active-directory-b2c-switch-b2c-tenant.md)]
4444

45-
1. Select **Azure AD B2C** from the services list in the Azure portal.
45+
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**. You should now be using the tenant that you created in the previous tutorial.
4646

47-
2. In the B2C settings, click **Applications** and then click **Add**.
47+
2. Select **Applications** and then select **Add**.
4848

4949
To register the sample web API in your tenant, use the following settings.
5050

articles/active-directory-b2c/active-directory-b2c-tutorials-spa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ In this tutorial, you learn how to:
3737

3838
Applications need to be [registered](../active-directory/develop/developer-glossary.md#application-registration) in your directory before they can receive [access tokens](../active-directory/develop/developer-glossary.md#access-token) from Azure Active Directory. App registration creates an [application id](../active-directory/develop/developer-glossary.md#application-id-client-id) for the app in your directory.
3939

40-
Log in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C directory.
40+
Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C directory.
4141

4242
[!INCLUDE [active-directory-b2c-switch-b2c-tenant](../../includes/active-directory-b2c-switch-b2c-tenant.md)]
4343

articles/active-directory-b2c/active-directory-b2c-tutorials-web-api.md

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -36,19 +36,13 @@ In this tutorial, you learn how to:
3636

3737
Web API resources need to be registered in your tenant before they can accept and respond to [protected resource requests](../active-directory/develop/developer-glossary.md#resource-server) by [client applications](../active-directory/develop/developer-glossary.md#client-application) that present an [access token](../active-directory/develop/developer-glossary.md#access-token) from Azure Active Directory. Registration establishes the [application and service principal object](../active-directory/develop/developer-glossary.md#application-object) in your tenant.
3838

39-
1. Log in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
39+
Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
4040

41-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by switching to it in the top-right corner of the Azure portal. Select your subscription information, and then select **Switch Directory**.
41+
[!INCLUDE [active-directory-b2c-switch-b2c-tenant](../../includes/active-directory-b2c-switch-b2c-tenant.md)]
4242

43-
![Switch directories](./media/active-directory-b2c-tutorials-web-api/switch-directories.png)
43+
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**. You should now be using the tenant that you created in the previous tutorial.
4444

45-
3. Choose the directory that contains your tenant.
46-
47-
![Select directory](./media/active-directory-b2c-tutorials-web-api/select-directory.png)
48-
49-
4. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**. You should now be using the tenant that you created in the previous tutorial.
50-
51-
5. Select **Applications** and then select **Add**.
45+
2. Select **Applications** and then select **Add**.
5246

5347
To register the sample web API in your tenant, use the following settings.
5448

@@ -63,7 +57,7 @@ Web API resources need to be registered in your tenant before they can accept an
6357
| **App ID URI** | myAPISample | The URI uniquely identifies the API in the tenant. This allows you to register multiple APIs per tenant. [Scopes](../active-directory/develop/developer-glossary.md#scopes) govern access to the protected API resource and are defined per App ID URI. |
6458
| **Native client** | No | Since this is a web API and not a native client, select No. |
6559

66-
6. Click **Create** to register your API.
60+
3. Click **Create** to register your API.
6761

6862
Registered APIs are displayed in the applications list for the Azure AD B2C tenant. Select your web API from the list. The web API's property pane is displayed.
6963

@@ -164,7 +158,7 @@ Open the **B2C-WebAPI-DotNet** solution in Visual Studio.
164158
<add key="ida:ClientId" value="<The Application ID for your web API obtained from the Azure portal>"/>
165159
```
166160

167-
4. Update the policy setting with the name generated when you created your sign up and sign in policy.
161+
4. Update the policy setting with the name generated when you created your sign up and sign-in policy.
168162

169163
```C#
170164
<add key="ida:SignUpSignInPolicyId" value="B2C_1_SiUpIn" />
@@ -189,7 +183,7 @@ You need to run both the **TaskWebApp** and **TaskService** projects.
189183
`https://localhost:44316/` is the web app.
190184
`https://localhost:44332/` is the web API.
191185

192-
6. In the web app, click the sign up / sign in link in the menu banner to sign up for the web application. Use the account you created in the [web app tutorial](active-directory-b2c-tutorials-web-app.md).
186+
6. In the web app, click the sign-up / sign-in link in the menu banner to sign up for the web application. Use the account you created in the [web app tutorial](active-directory-b2c-tutorials-web-app.md).
193187
7. Once signed in, click the **To-do list** link and create a to-do list item.
194188

195189
When you create a to-do list item, the web app makes a request to the web API to generate the to-do list item. You're protected web app is calling the protected web API in your Azure AD B2C tenant.

articles/active-directory-b2c/active-directory-b2c-tutorials-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In this tutorial, you learn how to:
3535

3636
Applications need to be [registered](../active-directory/develop/developer-glossary.md#application-registration) in your tenant before they can receive [access tokens](../active-directory/develop/developer-glossary.md#access-token) from Azure Active Directory. App registration creates an [application id](../active-directory/develop/developer-glossary.md#application-id-client-id) for the app in your tenant.
3737

38-
Log in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
38+
Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
3939

4040
[!INCLUDE [active-directory-b2c-switch-b2c-tenant](../../includes/active-directory-b2c-switch-b2c-tenant.md)]
4141

0 commit comments

Comments
 (0)