Skip to content

Commit 5facd2c

Browse files
committed
Resolved conflict
2 parents e6ea3c0 + b435824 commit 5facd2c

File tree

10,561 files changed

+139168
-127956
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

10,561 files changed

+139168
-127956
lines changed

.openpublishing.publish.config.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -128,12 +128,6 @@
128128
"branch": "master",
129129
"branch_mapping": {}
130130
},
131-
{
132-
"path_to_root": "azure-docs-snippets-pr",
133-
"url": "https://github.com/MicrosoftDocs/azure-docs-snippets-pr",
134-
"branch": "main",
135-
"branch_mapping": {}
136-
},
137131
{
138132
"path_to_root": "azure-functions-dapr-extension",
139133
"url": "https://github.com/Azure/azure-functions-dapr-extension",

.openpublishing.redirection.json

Lines changed: 5113 additions & 3734 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,10 +78,10 @@ Content-type: application/json
7878
}
7979
],
8080
"displayName": "John Smith",
81-
"objectId": "ab3ec3b2-a435-45e4-b93a-56a005e88bb7",
81+
"objectId": "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",
8282
"extension_<extensions-app-id>_CustomAttribute1": "custom attribute value",
8383
"extension_<extensions-app-id>_CustomAttribute2": "custom attribute value",
84-
"client_id": "231c70e8-8424-48ac-9b5d-5623b9e4ccf3",
84+
"client_id": "00001111-aaaa-2222-bbbb-3333cccc4444",
8585
"step": "PreTokenIssuance",
8686
"ui_locales":"en-US"
8787
}
@@ -169,7 +169,7 @@ A claim provides temporary storage of data during an Azure AD B2C policy executi
169169
</ClaimType>
170170
```
171171
## Add the RESTful API technical profile
172-
A [Restful technical profile](restful-technical-profile.md) provides support for interfacing with your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element in your <em>**`TrustFrameworkExtensions.xml`**</em> file and add a new claims provider as follows:
172+
A [RESTful technical profile](restful-technical-profile.md) provides support for interfacing with your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element in your <em>**`TrustFrameworkExtensions.xml`**</em> file and add a new claims provider as follows:
173173
```xml
174174
<ClaimsProvider>
175175
<DisplayName>REST APIs</DisplayName>
@@ -280,8 +280,8 @@ Save the files you changed: *TrustFrameworkBase.xml*, and *TrustFrameworkExtensi
280280
"exp": 1584961516,
281281
"nbf": 1584957916,
282282
"ver": "1.0",
283-
"iss": "https://contoso.b2clogin.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
284-
"aud": "e1d2612f-c2bc-4599-8e7b-d874eaca1ee1",
283+
"iss": "https://contoso.b2clogin.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/",
284+
"aud": "11112222-bbbb-3333-cccc-4444dddd5555",
285285
"acr": "b2c_1a_signup_signin",
286286
"nonce": "defaultNonce",
287287
"iat": 1584957916,

articles/active-directory-b2c/add-api-connector.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Content-type: application/json
7676
}
7777
],
7878
"displayName": "John Smith",
79-
"objectId": "11111111-0000-0000-0000-000000000000",
79+
"objectId": "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",
8080
"givenName":"John",
8181
"surname":"Smith",
8282
"jobTitle":"Supplier",
@@ -88,7 +88,7 @@ Content-type: application/json
8888
"extension_<extensions-app-id>_CustomAttribute1": "custom attribute value",
8989
"extension_<extensions-app-id>_CustomAttribute2": "custom attribute value",
9090
"step": "<step-name>",
91-
"client_id":"93fd07aa-333c-409d-955d-96008fd08dd9",
91+
"client_id":"00001111-aaaa-2222-bbbb-3333cccc4444",
9292
"ui_locales":"en-US"
9393
}
9494
```
@@ -211,7 +211,7 @@ Content-type: application/json
211211
"extension_<extensions-app-id>_CustomAttribute1": "custom attribute value",
212212
"extension_<extensions-app-id>_CustomAttribute2": "custom attribute value",
213213
"step": "PostAttributeCollection",
214-
"client_id":"93fd07aa-333c-409d-955d-96008fd08dd9",
214+
"client_id":"00001111-aaaa-2222-bbbb-3333cccc4444",
215215
"ui_locales":"en-US"
216216
}
217217
```
@@ -262,7 +262,7 @@ POST <API-endpoint>
262262
Content-type: application/json
263263
264264
{
265-
"clientId": "231c70e8-8424-48ac-9b5d-5623b9e4ccf3",
265+
"clientId": "11112222-bbbb-3333-cccc-4444dddd5555",
266266
"step": "PreTokenApplicationClaims",
267267
"ui_locales":"en-US",
268268
"email": "[email protected]",
@@ -442,7 +442,7 @@ A claim provides temporary storage of data during an Azure AD B2C policy executi
442442

443443
## Add the RESTful API technical profile
444444

445-
A [Restful technical profile](restful-technical-profile.md) provides support for interfacing to your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element and add a new claims provider as follows:
445+
A [RESTful technical profile](restful-technical-profile.md) provides support for interfacing to your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element and add a new claims provider as follows:
446446

447447
```xml
448448
<ClaimsProvider>
@@ -597,8 +597,8 @@ To return the promo code claim back to the relying party application, add an out
597597
"exp": 1584295703,
598598
"nbf": 1584292103,
599599
"ver": "1.0",
600-
"iss": "https://contoso.b2clogin.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
601-
"aud": "e1d2612f-c2bc-4599-8e7b-d874eaca1ee1",
600+
"iss": "https://contoso.b2clogin.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/",
601+
"aud": "22223333-cccc-4444-dddd-5555eeee6666",
602602
"acr": "b2c_1a_signup_signin",
603603
"nonce": "defaultNonce",
604604
"iat": 1584292103,

articles/active-directory-b2c/add-captcha.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -234,9 +234,9 @@ For the various page layouts, use the following page layout versions:
234234

235235
|Page layout |Page layout version range |
236236
|---------|---------|
237-
| Selfasserted | >=2.1.30 |
238-
| Unifiedssp | >=2.1.18 |
239-
| Multifactor | >=1.2.16 |
237+
| Selfasserted | >=2.1.33 |
238+
| Unifiedssp | >=2.1.21 |
239+
| Multifactor | >=1.2.19 |
240240

241241
**Example:**
242242

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77
ms.service: azure-active-directory
88
ms.topic: how-to
9-
ms.date: 11/27/2023
9+
ms.date: 11/27/2024
1010
ms.author: godonnell
1111
ms.subservice: b2c
1212
zone_pivot_groups: b2c-policy-type

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -316,7 +316,7 @@ POST /<tenant-name>.onmicrosoft.com/B2C_1A_ROPC_Auth/oauth2/v2.0/token HTTP/1.1
316316
Host: <tenant-name>.b2clogin.com
317317
Content-Type: application/x-www-form-urlencoded
318318

319-
username=contosouser.outlook.com.ws&password=Passxword1&grant_type=password&scope=openid+bef22d56-552f-4a5b-b90a-1988a7d634ce+offline_access&client_id=bef22d56-552f-4a5b-b90a-1988a7d634ce&response_type=token+id_token
319+
username=contosouser.outlook.com.ws&password=Passxword1&grant_type=password&scope=openid+00001111-aaaa-2222-bbbb-3333cccc4444+offline_access&client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=token+id_token
320320
```
321321

322322
A successful response with offline-access looks like the following example:
@@ -379,4 +379,4 @@ A successful response looks like the following example:
379379

380380
## Use a native SDK or App-Auth
381381

382-
Azure AD B2C meets OAuth 2.0 standards for public client resource owner password credentials and should be compatible with most client SDKs. For the latest information, see [Native App SDK for OAuth 2.0 and OpenID Connect implementing modern best practices](https://appauth.io/).
382+
Azure AD B2C meets OAuth 2.0 standards for public client resource owner password credentials and should be compatible with most client SDKs. For the latest information, see [Native App SDK for OAuth 2.0 and OpenID Connect implementing modern best practices](https://appauth.io/).

articles/active-directory-b2c/add-sign-up-and-sign-in-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77
ms.service: azure-active-directory
88
ms.topic: how-to
9-
ms.date: 03/22/2024
9+
ms.date: 01/10/2025
1010
ms.author: godonnell
1111
ms.subservice: b2c
1212
ms.custom: "b2c-support"

articles/active-directory-b2c/age-gating.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Age gating in Azure Active Directory B2C (Azure AD B2C) enables you to identify
2525
>This feature is in public preview. Do not use feature for production applications.
2626
>
2727
28-
When age gating is enabled for a user flow, users are asked for their date of birth, and country of residence. If a user signs in that hasn't previously entered the information, they'll need to enter it the next time they sign in. The rules are applied every time a user signs in.
28+
When age gating is enabled for a user flow, users are asked for their date of birth, and country/region of residence. If a user signs in that hasn't previously entered the information, they'll need to enter it the next time they sign in. The rules are applied every time a user signs in.
2929

3030
![Screenshot of age gating information gather flow](./media/age-gating/age-gating-information-gathering.png)
3131

@@ -69,7 +69,7 @@ After your tenant is set up to use age gating, you can then use this feature in
6969
1. To test your policy, select **Run user flow**.
7070
1. For **Application**, select the web application named *testapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
7171
1. Select the **Run user flow** button.
72-
1. Sign-in with a local or social account. Then select your country of residence, and date of birth that simulate a minor.
72+
1. Sign-in with a local or social account. Then select your country/region of residence, and date of birth that simulate a minor.
7373
1. Repeat the test, and select a date of birth that simulates an adult.
7474

7575
When you sign-in as a minor, you should see the following error message: *Unfortunately, your sign on has been blocked. Privacy and online safety laws in your country prevent access to accounts belonging to children.*

articles/active-directory-b2c/api-connectors-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,7 @@ If you reference a REST API technical profile directly from a user journey, the
244244

245245
## Development of your REST API
246246

247-
Your REST API can be developed on any platform and written in any programing language, as long as it's secure and can send and receive claims in JSON format.
247+
Your REST API can be developed on any platform and written in any programming language, as long as it's secure and can send and receive claims in JSON format.
248248

249249
The request to your REST API service comes from Azure AD B2C servers. The REST API service must be published to a publicly accessible HTTPS endpoint. The REST API call arrives from an Azure data center IP address.
250250

0 commit comments

Comments
 (0)