Skip to content

Commit 664bfee

Browse files
authored
Merge pull request #178299 from MicrosoftDocs/master
11/02 AM Publish
2 parents 106f5c9 + fc494b7 commit 664bfee

File tree

1,216 files changed

+16908
-8531
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,216 files changed

+16908
-8531
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -833,6 +833,7 @@
833833
".openpublishing.redirection.media-services.json",
834834
".openpublishing.redirection.security-benchmark.json",
835835
".openpublishing.redirection.synapse-analytics.json",
836+
".openpublishing.redirection.azure-web-pubsub.json",
836837
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
837838
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
838839
"articles/azure-relay/.openpublishing.redirection.relay.json",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/azure-web-pubsub/howto-troubleshoot-diagnostic-logs.md",
5+
"redirect_url": "/azure/azure-web-pubsub/howto-troubleshoot-resource-logs",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,11 @@
55
"redirect_url": "/azure/storage/blobs/quickstart-blobs-c-plus-plus",
66
"redirect_document_id": false
77
},
8+
{
9+
"source_path_from_root": "/articles/automanage/virtual-machines-custom-preferences.md",
10+
"redirect_url": "/azure/automanage/automanage-upgrade",
11+
"redirect_document_id": false
12+
},
813
{
914
"source_path": "active-directory/authentication/concept-mfa-plan.md",
1015
"redirect_url": "active-directory/authentication/howto-mfa-getstarted",
@@ -398,6 +403,11 @@
398403
"redirect_url": "/articles/load-balancer/concepts",
399404
"redirect_document_id": false
400405
},
406+
{
407+
"source_path_from_root": "/articles/frontdoor/standard-premium/resource-manager-template-samples.md",
408+
"redirect_url": "/articles/frontdoor/front-door-quickstart-template-samples",
409+
"redirect_document_id": false
410+
},
401411
{
402412
"source_path_from_root": "/articles/azure-sql/database/doc-changes-updates-release-notes.md",
403413
"redirect_url": "/azure/azure-sql/database/doc-changes-updates-release-notes-whats-new",
@@ -11456,6 +11466,21 @@
1145611466
"redirect_url": "/azure/azure-signalr/policy-reference",
1145711467
"redirect_document_id": false
1145811468
},
11469+
{
11470+
"source_path_from_root": "/articles/azure-signalr/authenticate-application.md",
11471+
"redirect_url": "/azure/azure-signalr/signalr-howto-authorize-application",
11472+
"redirect_document_id": false
11473+
},
11474+
{
11475+
"source_path_from_root": "/articles/azure-signalr/authenticate-managed-identity.md",
11476+
"redirect_url": "/azure/azure-signalr/signalr-howto-authorize-managed-identity",
11477+
"redirect_document_id": false
11478+
},
11479+
{
11480+
"source_path_from_root": "/articles/azure-signalr/authorize-access-azure-active-directory.md",
11481+
"redirect_url": "/azure/azure-signalr/signalr-concept-authorize-azure-active-directory",
11482+
"redirect_document_id": false
11483+
},
1145911484
{
1146011485
"source_path_from_root": "/articles/azure-signalr/signalr-authenticate-oauth.md",
1146111486
"redirect_url": "/azure/azure-signalr/signalr-concept-authenticate-oauth",

.whatsnew/.active-directory-b2c.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"relativeLinkPrefix": "/azure/active-directory-b2c"
88
},
99
"inclusionCriteria": {
10-
"excludePullRequestTitles": true,
10+
"omitPullRequestTitles" : true,
1111
"minAdditionsToFile" : 10,
1212
"maxFilesChanged": 50,
1313
"labels": [
@@ -17,7 +17,7 @@
1717
},
1818
"areas": [
1919
{
20-
"name": ".",
20+
"names": [ "."],
2121
"heading": "Azure Active Directory business-to-customer (B2C)"
2222
}
2323
]

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@
222222
displayName: AD-FS, ADFS
223223
- name: Amazon
224224
href: identity-provider-amazon.md
225-
- name: Apple (Preview)
225+
- name: Apple
226226
href: identity-provider-apple-id.md
227227
- name: Azure AD (single tenant)
228228
href: identity-provider-azure-ad-single-tenant.md

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 09/22/2021
12+
ms.date: 11/02/2021
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -99,7 +99,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
9999
|---------|:---------:|:---------:|---------|
100100
|[AD FS](identity-provider-adfs.md) | NA | GA | |
101101
|[Amazon](identity-provider-amazon.md) | GA | GA | |
102-
|[Apple](identity-provider-apple-id.md) | Preview | Preview | |
102+
|[Apple](identity-provider-apple-id.md) | GA | GA | |
103103
|[Azure AD (Single-tenant)](identity-provider-azure-ad-single-tenant.md) | GA | GA | |
104104
|[Azure AD (Multi-tenant)](identity-provider-azure-ad-multi-tenant.md) | NA | GA | |
105105
|[Azure AD B2C](identity-provider-azure-ad-b2c.md) | GA | GA | |

articles/active-directory-b2c/enable-authentication-web-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 06/25/2021
10+
ms.date: 10/26/2021
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -372,7 +372,7 @@ The authentication function also verifies that the web API is called with the ri
372372

373373
## Step 5: Configure the web server
374374

375-
In a development environment, set the web API to listen on incoming HTTP or HTTPS requests port number. In this example, use HTTP port 6000 and HTTPS port 6001. The base URI of the web API will be `http://localhost:6000` for HTTP and `https://localhost:6001` for HTTPS. It is also possible to [setup HTTP and HTTPS endpoints for the Node application](https://github.com/expressjs/express/wiki/Migrating-from-2.x-to-3.x#application-function).
375+
In a development environment, set the web API to listen on incoming HTTP or HTTPS requests port number. In this example, use HTTP port 6000 and HTTPS port 6001. The base URI of the web API will be `http://localhost:6000` for HTTP and `https://localhost:6001` for HTTPS.
376376

377377
# [ASP.NET Core](#tab/csharpclient)
378378

@@ -393,7 +393,7 @@ Add the following JSON snippet to the *appsettings.json* file.
393393

394394
# [Node.js](#tab/nodejsgeneric)
395395

396-
Add the following JavaScript code to the *app.js* file.
396+
Add the following JavaScript code to the *app.js* file. It is possible to [setup HTTP and HTTPS endpoints for the Node application](https://github.com/expressjs/express/wiki/Migrating-from-2.x-to-3.x#application-function).
397397

398398
```javascript
399399
// Starts listening on port 6000

articles/active-directory-b2c/force-password-reset.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ zone_pivot_groups: b2c-policy-type
1919

2020
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2121

22+
::: zone pivot="b2c-user-flow"
23+
2224
## Overview
2325

2426
As an administrator, you can [reset a user's password](manage-users-portal.md#reset-a-users-password) if the user forgets their password. Or you would like to force them to reset the password. In this article, you'll learn how to force a password reset in these scenarios.
@@ -29,12 +31,20 @@ When an administrator resets a user's password via the Azure portal, the value o
2931

3032
The password reset flow is applicable to local accounts in Azure AD B2C that use an [email address](sign-in-options.md#email-sign-in) or [username](sign-in-options.md#username-sign-in) with a password for sign-in.
3133

32-
::: zone pivot="b2c-user-flow"
34+
::: zone-end
35+
36+
::: zone pivot="b2c-custom-policy"
37+
38+
This feature is currently only available for User Flows. For setup steps, choose **User Flow** above. For custom policies, use the force password reset first logon [GitHub sample](https://github.com/azure-ad-b2c/samples/tree/master/policies/force-password-reset-first-logon) with prerequisites below.
39+
40+
::: zone-end
3341

3442
## Prerequisites
3543

3644
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
3745

46+
::: zone pivot="b2c-user-flow"
47+
3848
## Configure your user flow
3949

4050
To enable the **Forced password reset** setting in a sign-up or sign-in user flow:
@@ -115,12 +125,6 @@ The password expiry duration default value is **90** days. The value is configur
115125

116126
::: zone-end
117127

118-
::: zone pivot="b2c-custom-policy"
119-
120-
This feature is currently only available for User Flows. For setup steps, choose **User Flow** above. For custom policies, use the force password reset first logon [GitHub sample](https://github.com/azure-ad-b2c/samples/tree/master/policies/force-password-reset-first-logon).
121-
122-
::: zone-end
123-
124128
## Next steps
125129

126130
Set up a [self-service password reset](add-password-reset-policy.md).

articles/active-directory-b2c/identity-provider-apple-id.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 11/02/2021
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
1616
zone_pivot_groups: b2c-policy-type
1717
---
1818

19-
# Set up sign-up and sign-in with an Apple ID using Azure Active Directory B2C (Preview)
19+
# Set up sign-up and sign-in with an Apple ID using Azure Active Directory B2C
2020

2121
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2222

@@ -77,7 +77,7 @@ To enable sign-in for users with an Apple ID in Azure Active Directory B2C (Azur
7777
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
7878
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
7979
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.
80-
1. Select **Identity providers**, then select **Apple (Preview)**.
80+
1. Select **Identity providers**, then select **Apple**.
8181
1. For the **Name**, enter **Sign in with Apple**.
8282
1. Enter the **Apple developer ID (Team ID)**.
8383
1. Enter the **Apple service ID (Client ID)**.
@@ -88,8 +88,7 @@ To enable sign-in for users with an Apple ID in Azure Active Directory B2C (Azur
8888

8989
> [!IMPORTANT]
9090
> - Sign in with Apple requires the Admin to renew their client secret every 6 months.
91-
> - During the public preview of this feature, you'll need to manually renew the Apple client secret if it expires. A warning will appear in advance on Apple identity providers Configure social IDP page, but we recommend you set your own reminder.
92-
> - If you need to renew the secret, open Azure AD B2C in the Azure portal, go to **Identity providers** > **Apple**, and select **Renew secret**.
91+
> - The Apple client secret will be automatically renewed when it expires. If you need to manually renew the secret, open Azure AD B2C in the Azure portal, go to **Identity providers** > **Apple**, and select **Renew secret**.
9392
> - Follow the guidelines how to [offer Sign in with Apple button](#customize-your-user-interface).
9493
9594
## Add the Apple identity provider to a user flow
@@ -98,7 +97,7 @@ To enable users to sign in using an Apple ID, you need to add the Apple identity
9897

9998
1. In your Azure AD B2C tenant, select **User flows**.
10099
1. Select a user flow for which you want to add the Apple identity provider.
101-
1. Under **Social identity providers**, select **Apple (Preview)**.
100+
1. Under **Social identity providers**, select **Apple**.
102101
1. Select **Save**.
103102
1. To test your policy, select **Run user flow**.
104103
1. For **Application**, select the web application named *testapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
@@ -123,7 +122,7 @@ Use the .p8 file you downloaded previously to sign the client secret into a JWT
123122

124123
- **appleTeamId**: Your Apple Developer Team ID
125124
- **appleServiceId**: The Apple Service ID (client ID)
126-
- **appleKeyId**: The 10 digit Key Id stored in the JWT Header (required by Apple)
125+
- **appleKeyId**: The 10 digit Key ID stored in the JWT Header (required by Apple)
127126
- **p8key**: The PEM format key. You can obtain this by opening the .p8 file in a text editor and copying everything between
128127
`-----BEGIN PRIVATE KEY-----` and `-----END PRIVATE KEY-----` without line breaks.
129128

articles/active-directory-b2c/one-time-password-technical-profile.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ ms.topic: reference
1212
ms.date: 10/19/2020
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
15+
ms.custom: "b2c-support"
1516
---
1617

1718
# Define a one-time password technical profile in an Azure AD B2C custom policy
@@ -72,7 +73,7 @@ The following settings can be used to configure code generation mode:
7273
| CodeExpirationInSeconds | No | Time in seconds until code expiration. Minimum: `60`; Maximum: `1200`; Default: `600`. Every time a code is provided (same code using `ReuseSameCode`, or a new code), the code expiration is extended. This time is also used to set retry timeout (once max attempts are reached, user is locked out from attempting to obtain new codes until this time expires) |
7374
| CodeLength | No | Length of the code. The default value is `6`. |
7475
| CharacterSet | No | The character set for the code, formatted for use in a regular expression. For example, `a-z0-9A-Z`. The default value is `0-9`. The character set must include a minimum of 10 different characters in the set specified. |
75-
| NumRetryAttempts | No | The number of verification attempts before the code is considered invalid. The default value is `5`. |
76+
| NumRetryAttempts | No | The number of verification attempts before the code is considered invalid. The default value is `5`. For example, if you set NumRetryAttempts to 2 it will allow you only 2 attempts in total (first + 1 retry). For the 3rd attempt it will throw max attempts reached irrespective of whether the code is correct or not.|
7677
| NumCodeGenerationAttempts | No | The number of maximum code generation attempts per identifier. The default value is 10 if not specified. |
7778
| Operation | Yes | The operation to be performed. Possible value: `GenerateCode`. |
7879
| ReuseSameCode | No | Whether the same code should be given rather than generating a new code when given code has not expired and is still valid. The default value is `false`. |

0 commit comments

Comments
 (0)