Skip to content

Commit 5e8b817

Browse files
Merge branch 'MicrosoftDocs:main' into patch-2
2 parents 031b4b1 + 2d9f3dd commit 5e8b817

File tree

29 files changed

+289
-420
lines changed

29 files changed

+289
-420
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1810,6 +1810,11 @@
18101810
"redirect_url": "/azure/azure-app-configuration/howto-variant-feature-flags-aspnet-core",
18111811
"redirect_document_id": false
18121812
},
1813+
{
1814+
"source_path_from_root": "/articles/azure-app-configuration/use-feature-flags-dotnet-core.md",
1815+
"redirect_url": "/azure/azure-app-configuration/feature-management-dotnet-reference",
1816+
"redirect_document_id": false
1817+
},
18131818
{
18141819
"source_path_from_root": "/articles/public-multi-access-edge-compute-mec/considerations-for-deployment.md",
18151820
"redirect_url": "/previous-versions/azure/public-multi-access-edge-compute-mec/considerations-for-deployment",

articles/active-directory-b2c/add-captcha.md

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,21 @@ You need more claims to enable CAPTCHA in your custom policy:
118118
<DisplayName>Flag indicating that the captcha was successfully solved</DisplayName>
119119
<DataType>boolean</DataType>
120120
</ClaimType>
121+
122+
<ClaimType Id="mfaCaptchaEnabled">
123+
<DisplayName>flag used to control captcha enabled in MFA</DisplayName>
124+
<DataType>string</DataType>
125+
</ClaimType>
126+
127+
<ClaimType Id="signupCaptchaEnabled">
128+
<DisplayName>flag used to control captcha enabled during signup</DisplayName>
129+
<DataType>string</DataType>
130+
</ClaimType>
131+
132+
<ClaimType Id="signinCaptchaEnabled">
133+
<DisplayName>flag used to control captcha enabled during signin</DisplayName>
134+
<DataType>string</DataType>
135+
</ClaimType>
121136
...
122137
<!--<ClaimsSchema>-->
123138
```
@@ -314,6 +329,58 @@ To enable CAPTCHA in MFA flow, you need to make an update in two technical profi
314329
...
315330
</TechnicalProfile>
316331
```
332+
333+
### Enable CAPTCHA feature flag
334+
335+
To enforce CAPTCHA during sign-up, sign-in, or MFA, you need to add a technical profile that enables a feature flag for each scenario, then call the technical profile in the user journey.
336+
337+
1. In the *TrustFrameworkBase.XML* file, locate the `ClaimsProviders` element and add the claims provider by using the following code:
338+
339+
```xml
340+
<!--<ClaimsProvider>-->
341+
...
342+
<ClaimsProvider>
343+
344+
<DisplayName>Set Feature Flags</DisplayName>
345+
346+
<TechnicalProfiles>
347+
348+
<TechnicalProfile Id="SetFeatureDefaultValue">
349+
<DisplayName>Set Feature Flags</DisplayName>
350+
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.ClaimsTransformationProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
351+
<OutputClaims>
352+
<OutputClaim ClaimTypeReferenceId="signupCaptchaEnabled" DefaultValue="true" />
353+
<OutputClaim ClaimTypeReferenceId="signinCaptchaEnabled" DefaultValue="true" />
354+
<OutputClaim ClaimTypeReferenceId="mfaCaptchaEnabled" DefaultValue="true" />
355+
</OutputClaims>
356+
</TechnicalProfile>
357+
</TechnicalProfiles>
358+
</ClaimsProvider>
359+
...
360+
<!--<ClaimsProviders>-->
361+
```
362+
363+
2. Set `DefaultValue` to true or false depending on the CAPTCHA scenario
364+
365+
3. Add the feature flags technical profile to the user journey then update the order of the rest of the orchestration steps.
366+
367+
```xml
368+
<!--<UserJourneys>-->
369+
...
370+
<UserJourney Id="SignUpOrSignIn">
371+
<OrchestrationSteps>
372+
373+
<!--Add this orchestration step-->
374+
<OrchestrationStep Order="1" Type="ClaimsExchange">
375+
<ClaimsExchanges>
376+
<ClaimsExchange Id="SetFeatureDefaultValue" TechnicalProfileReferenceId="SetFeatureDefaultValue" />
377+
</ClaimsExchanges>
378+
</OrchestrationStep>
379+
...
380+
<!--<UserJourneys>-->
381+
```
382+
383+
317384
## Upload the custom policy files
318385

319386
Use the steps in [Upload the policies](tutorial-create-user-flows.md?pivots=b2c-custom-policy&branch=pr-en-us-260336#upload-the-policies) to upload your custom policy files.

articles/api-management/validate-client-certificate-policy.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: article
9-
ms.date: 07/23/2024
9+
ms.date: 01/30/2025
1010
ms.author: danlep
1111
---
1212

@@ -73,9 +73,9 @@ For more information about custom CA certificates and certificate authorities, s
7373
| thumbprint | Certificate thumbprint. | No | N/A |
7474
| serial-number | Certificate serial number. | No | N/A |
7575
| common-name | Certificate common name (part of Subject string). | No | N/A |
76-
| subject | Subject string. Must follow format of Distinguished Name. | No | N/A |
76+
| subject | Subject string. Must follow format of Distinguished Name, which consists of comma-separated name attributes, for example, *"CN=MyName, OU=MyOrgUnit, C=US..."*.| No | N/A |
7777
| dns-name | Value of dnsName entry inside Subject Alternative Name claim. | No | N/A |
78-
| issuer-subject | Issuer's subject. Must follow format of Distinguished Name. | No | N/A |
78+
| issuer-subject | Issuer's subject. Must follow format of Distinguished Name, which consists of comma-separated name attributes, for example, *"CN=MyName, OU=MyOrgUnit, C=US..."*. | No | N/A |
7979
| issuer-thumbprint | Issuer thumbprint. | No | N/A |
8080
| issuer-certificate-id | Identifier of existing certificate entity representing the issuer's public key. Mutually exclusive with other issuer attributes. | No | N/A |
8181

@@ -85,6 +85,11 @@ For more information about custom CA certificates and certificate authorities, s
8585
- [**Policy scopes:**](./api-management-howto-policies.md#scopes) global, workspace, product, API, operation
8686
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption, self-hosted, workspace
8787

88+
89+
### Usage notes
90+
91+
* You must use double quotes to enclose values of name attributes in the `subject` and `issuer-subject` attributes when they contain certain special characters such as ",". For example, specify `O="Contoso, Inc."` instead of `O=Contoso, Inc.` for the organization name. [Learn more](/windows/win32/api/wincrypt/nf-wincrypt-certnametostra#remarks)
92+
8893
## Example
8994

9095
The following example validates a client certificate to match the policy's default validation rules and checks whether the subject and issuer name match specified values.
@@ -98,7 +103,7 @@ The following example validates a client certificate to match the policy's defau
98103
ignore-error="false">
99104
<identities>
100105
<identity
101-
subject="C=US, ST=Illinois, L=Chicago, O=Contoso Corp., CN=*.contoso.com"
106+
subject="C=US, ST=Illinois, L=Chicago, O="Contoso, Inc.", CN=*.contoso.com"
102107
issuer-subject="C=BE, O=FabrikamSign nv-sa, OU=Root CA, CN=FabrikamSign Root CA" />
103108
</identities>
104109
</validate-client-certificate>

articles/application-gateway/ingress-controller-install-existing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ For this configuration, you need authorization for the AGIC pod to make HTTP req
118118
```
119119
120120
> [!NOTE]
121-
> Make sure the identity that AGIC uses has the **Microsoft.Network/virtualNetworks/subnets/join/action** permission delegated to the subnet where Application Gateway is deployed. If you didn't define a custom role that has this permission, you can use the built-in **Network Contributor** role.
121+
> Please ensure the identity used by AGIC has the proper permissions. A list of permissions needed by the identity can be found here: [Configure Infrastructure - Permissions](configuration-infrastructure.md#permissions). If a custom role is not defined with the required permissions, you may use the _Network Contributor_ role.
122122
123123
### Set up a service principal
124124
-109 KB
Loading
1.54 KB
Loading
10.5 KB
Loading
1.44 KB
Loading

articles/application-gateway/tutorial-ingress-controller-add-on-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ az aks create -n myCluster -g myResourceGroup --network-plugin azure --enable-ma
5757
```
5858

5959
> [!NOTE]
60-
> Please ensure the identity used by AGIC has the **Microsoft.Network/virtualNetworks/subnets/join/action** permission delegated to the subnet Application Gateway is deployed into. If a custom role is not defined with this permission, you may use the built-in _Network Contributor_ role, which contains the _Microsoft.Network/virtualNetworks/subnets/join/action_ permission.
60+
> Please ensure the identity used by AGIC has the proper permissions. A list of permissions needed by the identity can be found here: [Configure Infrastructure - Permissions](configuration-infrastructure.md#permissions). If a custom role is not defined with the required permissions, you may use the _Network Contributor_ role.
6161
6262
```azurecli-interactive
6363
# Get application gateway id from AKS addon profile

articles/azure-app-configuration/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -130,8 +130,6 @@
130130
items:
131131
- name: Use feature flags
132132
items:
133-
- name: ASP.NET Core
134-
href: use-feature-flags-dotnet-core.md
135133
- name: Spring Boot
136134
href: use-feature-flags-spring-boot.md
137135
- name: Enable conditional features with feature filters

0 commit comments

Comments
 (0)