Skip to content

Commit 6731f55

Browse files
committed
Resolving merge conflict
2 parents 196251b + b3443a0 commit 6731f55

File tree

1,804 files changed

+15108
-10424
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,804 files changed

+15108
-10424
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,16 @@
5555
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
5656
"redirect_document_id": false
5757
},
58+
{
59+
"source_path_from_root": "/articles/active-directory/saas-apps/otsuka-shokai-tutorial.md",
60+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path_from_root": "/articles/active-directory/saas-apps/netsuite-provisioning-tutorial.md",
65+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
66+
"redirect_document_id": false
67+
},
5868
{
5969
"source_path_from_root": "/articles/active-directory/governance/tutorial-onboard-custom-workflow-graph.md",
6070
"redirect_url": "/graph/tutorial-lifecycle-workflows-onboard-custom-workflow",
@@ -4361,11 +4371,31 @@
43614371
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",
43624372
"redirect_document_id": false
43634373
},
4374+
{
4375+
"source_path_from_root": "/articles/active-directory/reports-monitoring/workbook-legacy authentication.md",
4376+
"redirect_url": "/azure/active-directory/reports-monitoring/workbook-legacy-authentication",
4377+
"redirect_document_id": false
4378+
},
43644379
{
43654380
"source_path_from_root": "/articles/active-directory/reports-monitoring/troubleshoot-missing-audit-data.md",
43664381
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",
43674382
"redirect_document_id": false
43684383
},
4384+
{
4385+
"source_path_from_root": "/articles/active-directory/reports-monitoring/tutorial-access-api-with-certificates.md",
4386+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
4387+
"redirect_document_id": false
4388+
},
4389+
{
4390+
"source_path_from_root": "/articles/active-directory/reports-monitoring/troubleshoot-graph-api.md",
4391+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
4392+
"redirect_document_id": false
4393+
},
4394+
{
4395+
"source_path_from_root": "/articles/active-directory/reports-monitoring/concept-reporting-api.md",
4396+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
4397+
"redirect_document_id": false
4398+
},
43694399
{
43704400
"source_path_from_root": "/articles/active-directory/customize-branding.md",
43714401
"redirect_url": "/azure/active-directory/fundamentals/customize-branding",

.openpublishing.redirection.azure-monitor.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5626,6 +5626,21 @@
56265626
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-health-troubleshoot.md",
56275627
"redirect_url": "/azure/azure-monitor/vm/vminsights-overview",
56285628
"redirect_document_id": false
5629+
},
5630+
{
5631+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-configure.md",
5632+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine-data-collection",
5633+
"redirect_document_id": false
5634+
},
5635+
{
5636+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-security.md",
5637+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine#security-monitoring",
5638+
"redirect_document_id": false
5639+
},
5640+
{
5641+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-workloads.md",
5642+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine-data-collection",
5643+
"redirect_document_id": false
56295644
}
56305645
]
56315646
}

.openpublishing.redirection.healthcare-apis.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -610,11 +610,15 @@
610610
"redirect_document_id": false
611611
},
612612
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-troubleshoot-error-messages-and-conditions.md",
613-
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-error-messages-and-conditions",
613+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
614+
"redirect_document_id": false
615+
},
616+
{ "source_path_from_root": "/articles/healthcare-apis/iot/troubleshoot-error-messages-and-conditions.md",
617+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
614618
"redirect_document_id": false
615619
},
616620
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-troubleshoot-mappings.md",
617-
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-mappings",
621+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
618622
"redirect_document_id": false
619623
},
620624
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-connector-faqs.md",
@@ -637,6 +641,10 @@
637641
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-arm",
638642
"redirect_document_id": false
639643
},
644+
{ "source_path_from_root": "/articles/healthcare-apis/iot/troubleshoot-mappings.md",
645+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
646+
"redirect_document_id": false
647+
},
640648
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
641649
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
642650
"redirect_document_id": false

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-php.md",
5+
"redirect_url": "/previous-versions/azure/storage/blobs/storage-quickstart-blobs-php",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-ruby.md",
10+
"redirect_url": "/previous-versions/azure/storage/blobs/storage-quickstart-blobs-ruby",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/backup/backup-afs.md",
515
"redirect_url": "/azure/backup/backup-azure-files",

.openpublishing.redirection.virtual-desktop.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,26 @@
104104
"source_path_from_root": "/articles/virtual-desktop/troubleshoot-client.md",
105105
"redirect_url": "/azure/virtual-desktop/troubleshoot-client-windows",
106106
"redirect_document_id": true
107+
},
108+
{
109+
"source_path_from_root": "/articles/virtual-desktop/virtual-desktop-fall-2019/connect-windows-7-10-2019.md",
110+
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/connect-windows-2019",
111+
"redirect_document_id": true
112+
},
113+
{
114+
"source_path_from_root": "/articles/virtual-desktop/virtual-desktop-fall-2019/deploy-windows-7-virtual-machine.md",
115+
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/create-host-pools-azure-marketplace-2019",
116+
"redirect_document_id": false
117+
},
118+
{
119+
"source_path_from_root": "/articles/virtual-desktop/virtual-desktop-fall-2019/troubleshoot-windows-7-vm.md",
120+
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/troubleshoot-vm-configuration-2019",
121+
"redirect_document_id": false
122+
},
123+
{
124+
"source_path_from_root": "/articles/virtual-desktop/deploy-windows-7-virtual-machine.md",
125+
"redirect_url": "/azure/virtual-desktop/deploy-windows-server-virtual-machine",
126+
"redirect_document_id": false
107127
}
108128
]
109129
}

articles/active-directory-b2c/best-practices.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ title: Best practices for Azure AD B2C
33
titleSuffix: Azure AD B2C
44
description: Recommendations and best practices to consider when working with Azure Active Directory B2C (Azure AD B2C).
55
services: active-directory-b2c
6-
author: vigunase
7-
ms.author: vigunase
6+
author: kengaderdus
7+
ms.author: kengaderdus
88
manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 12/01/2022
12+
ms.date: 12/29/2022
1313
ms.subservice: B2C
1414
---
1515

@@ -75,6 +75,7 @@ Manage your Azure AD B2C environment.
7575
| Use version control for your custom policies | Consider using GitHub, Azure Repos, or another cloud-based version control system for your Azure AD B2C custom policies. |
7676
| Use the Microsoft Graph API to automate the management of your B2C tenants | Microsoft Graph APIs:<br/>Manage [Identity Experience Framework](/graph/api/resources/trustframeworkpolicy?preserve-view=true&view=graph-rest-beta) (custom policies)<br/>[Keys](/graph/api/resources/trustframeworkkeyset?preserve-view=true&view=graph-rest-beta)<br/>[User Flows](/graph/api/resources/identityuserflow?preserve-view=true&view=graph-rest-beta) |
7777
| Integrate with Azure DevOps | A [CI/CD pipeline](deploy-custom-policies-devops.md) makes moving code between different environments easy and ensures production readiness always. |
78+
| Custom policy deployment | Azure AD B2C relies on caching to deliver performance to your end users. When you deploy a custom policy using whatever method, expect a delay of up to **30 minutes** for your users to see the changes. As a result of this behavior, consider the following practices when you deploy your custom policies: <br> - If you're deploying to a development environment, set the `DeploymentMode` attribute to `Development` in your custom policy file's `<TrustFrameworkPolicy>` element. <br> - Deploy your updated policy files to a production environment when traffic in your app is low. <br> - When you deploy to a production environment to update existing policy files, upload the updated files with new name(s), and then update your app reference to the new name(s). You can then remove the old policy files afterwards.<br> - You can set the `DeploymentMode` to `Development` in a production environment to bypass the caching behavior. However, we don't recommend this practice. If you [Collect Azure AD B2C logs with Application Insights](troubleshoot-with-application-insights.md), all claims sent to and from identity providers are collected, which is a security and performance risk. |
7879
| Integrate with Azure Monitor | [Audit log events](view-audit-logs.md) are only retained for seven days. [Integrate with Azure Monitor](azure-monitor.md) to retain the logs for long-term use, or integrate with third-party security information and event management (SIEM) tools to gain insights into your environment. |
7980
| Setup active alerting and monitoring | [Track user behavior](./analytics-with-application-insights.md) in Azure AD B2C using Application Insights. |
8081

articles/active-directory-b2c/configure-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ The following values are set in the previous example:
9494

9595
- **token_lifetime_secs** - Access token lifetimes (seconds). The default is 3,600 (1 hour). The minimum is 300 (5 minutes). The maximum is 86,400 (24 hours).
9696
- **id_token_lifetime_secs** - ID token lifetimes (seconds). The default is 3,600 (1 hour). The minimum is 300 (5 minutes). The maximum is 86,400 (24 hours).
97-
- **refresh_token_lifetime_secs** Refresh token lifetimes (seconds). The default is 120,9600 (14 days). The minimum is 86,400 (24 hours). The maximum is 7,776,000 (90 days).
97+
- **refresh_token_lifetime_secs** Refresh token lifetimes (seconds). The default is 1,209,600 (14 days). The minimum is 86,400 (24 hours). The maximum is 7,776,000 (90 days).
9898
- **rolling_refresh_token_lifetime_secs** - Refresh token sliding window lifetime (seconds). The default is 7,776,000 (90 days). The minimum is 86,400 (24 hours). The maximum is 31,536,000 (365 days). If you don't want to enforce a sliding window lifetime, set the value of `allow_infinite_rolling_refresh_token` to `true`.
9999
- **allow_infinite_rolling_refresh_token** - Refresh token sliding window lifetime never expires.
100100

@@ -238,4 +238,4 @@ When using the [OAuth 2.0 authorization code flow](authorization-code-flow.md),
238238
## Next steps
239239

240240
- Learn more about how to [request access tokens](access-tokens.md).
241-
- Learn how to build [Resilience through developer best practices](../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json).
241+
- Learn how to build [Resilience through developer best practices](../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json).

articles/active-directory-b2c/custom-policy-overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 10/14/2021
11+
ms.date: 01/10/2023
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: "b2c-support"
@@ -24,20 +24,20 @@ A custom policy is represented as one or more XML-formatted files, which refer t
2424

2525
## Custom policy starter pack
2626

27-
Azure AD B2C custom policy [starter pack](tutorial-create-user-flows.md?pivots=b2c-custom-policy#get-the-starter-pack) comes with several pre-built policies to get you going quickly. Each of these starter packs contains the smallest number of technical profiles and user journeys needed to achieve the scenarios described:
27+
Azure AD B2C custom policy [starter pack](tutorial-create-user-flows.md?pivots=b2c-custom-policy#get-the-starter-pack) comes with several pre-built policies to get you started quickly. Each of these starter packs contains the smallest number of technical profiles and user journeys needed to achieve the scenarios described:
2828

2929
- **LocalAccounts** - Enables the use of local accounts only.
3030
- **SocialAccounts** - Enables the use of social (or federated) accounts only.
3131
- **SocialAndLocalAccounts** - Enables the use of both local and social accounts. Most of our samples refer to this policy.
3232
- **SocialAndLocalAccountsWithMFA** - Enables social, local, and multi-factor authentication options.
3333

34-
In the [Azure AD B2C samples GitHub repository](https://github.com/azure-ad-b2c/samples), you'll find samples for several enhanced Azure AD B2C custom CIAM user journeys. For example, local account policy enhancements, social account policy enhancements, MFA enhancements, user interface enhancements, generic enhancements, app migration, user migration, conditional access, web test, and CI/CD.
34+
In the [Azure AD B2C samples GitHub repository](https://github.com/azure-ad-b2c/samples), you'll find samples for several enhanced Azure AD B2C custom CIAM user journeys and scenarios. For example, local account policy enhancements, social account policy enhancements, MFA enhancements, user interface enhancements, generic enhancements, app migration, user migration, conditional access, web test, and CI/CD.
3535

3636
## Understanding the basics
3737

3838
### Claims
3939

40-
A claim provides temporary storage of data during an Azure AD B2C policy execution. It can store information about the user, such as first name, last name, or any other claim obtained from the user or other systems (claims exchanges). The [claims schema](claimsschema.md) is the place where you declare your claims.
40+
A claim provides temporary storage of data during an Azure AD B2C policy execution. Claims are more like variable in a programing language. It can store information about the user, such as first name, last name, or any other claim obtained from the user or other systems (claims exchanges). The [claims schema](claimsschema.md) is the place where you declare your claims.
4141

4242
When the policy runs, Azure AD B2C sends and receives claims to and from internal and external parties and then sends a subset of these claims to your relying party application as part of the token. Claims are used in these ways:
4343

@@ -48,7 +48,7 @@ When the policy runs, Azure AD B2C sends and receives claims to and from interna
4848

4949
### Manipulating your claims
5050

51-
The [claims transformations](claimstransformations.md) are predefined functions that can be used to convert a given claim into another one, evaluate a claim, or set a claim value. For example adding an item to a string collection, changing the case of a string, or evaluate a date and time claim. A claims transformation specifies a transform method.
51+
The [claims transformations](claimstransformations.md) are predefined functions that can be used to convert a given claim into another one, evaluate a claim, or set a claim value. For example adding an item to a string collection, changing the case of a string, or evaluate a date and time claim. A claims transformation specifies a transform method, which is also predefined.
5252

5353
### Customize and localize your UI
5454

@@ -105,7 +105,7 @@ The following diagram illustrates how Azure AD B2C uses a validation technical p
105105

106106
## Inheritance model
107107

108-
Each starter pack includes the following files:
108+
Each [starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack) includes the following files:
109109

110110
- A **Base** file that contains most of the definitions. To help with troubleshooting and long-term maintenance of your policies, try to minimize the number of changes you make to this file.
111111
- A **Localization** file that holds the localization strings. This policy file is derived from the Base file. Use this file to accommodate different languages to suit your customer needs.
@@ -127,7 +127,7 @@ The following diagram shows the relationship between the policy files and the re
127127

128128
### Best practices
129129

130-
Within an Azure AD B2C custom policy, you can integrate your own business logic to build the user experiences you require and extend functionality of the service. We have a set of best practices and recommendations to get started.
130+
Within an Azure AD B2C custom policy, you can integrate your own business logic to build the user experiences you require and extend functionality of the service. We've a set of best practices and recommendations to get started.
131131

132132
- Create your logic within the **extension policy**, or **relying party policy**. You can add new elements, which will override the base policy by referencing the same ID. This approach will allow you to scale out your project while making it easier to upgrade base policy later on if Microsoft releases new starter packs.
133133
- Within the **base policy**, we highly recommend avoiding making any changes. When necessary, make comments where the changes are made.
@@ -159,7 +159,7 @@ You get started with Azure AD B2C custom policy:
159159
1. Add the necessary [policy keys](tutorial-create-user-flows.md?pivots=b2c-custom-policy#add-signing-and-encryption-keys-for-identity-experience-framework-applications) and [register the Identity Experience Framework applications](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-identity-experience-framework-applications).
160160
1. [Get the Azure AD B2C policy starter pack](tutorial-create-user-flows.md?pivots=b2c-custom-policy#get-the-starter-pack) and upload to your tenant.
161161
1. After you upload the starter pack, [test your sign-up or sign-in policy](tutorial-create-user-flows.md?pivots=b2c-custom-policy#test-the-custom-policy).
162-
1. We recommend you to download and install [Visual Studio Code](https://code.visualstudio.com/) (VS Code). Visual Studio Code is a lightweight but powerful source code editor, which runs on your desktop and is available for Windows, macOS, and Linux. With VS Code, you can quickly navigate through and edit your Azure AD B2C custom policy XML files by installing the [Azure AD B2C extension for VS Code](https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c)
162+
1. We recommend that you download and install [Visual Studio Code](https://code.visualstudio.com/) (VS Code). Visual Studio Code is a lightweight but powerful source code editor, which runs on your desktop and is available for Windows, macOS, and Linux. With VS Code, you can quickly navigate through and edit your Azure AD B2C custom policy XML files by installing the [Azure AD B2C extension for VS Code](https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c)
163163

164164
## Next steps
165165

0 commit comments

Comments
 (0)