Skip to content

Commit 67dee17

Browse files
committed
fixing merge conflict
2 parents 94236d8 + 3eb43e9 commit 67dee17

File tree

2,919 files changed

+32901
-22519
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,919 files changed

+32901
-22519
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,7 @@
994994
"articles/object-anchors/.openpublishing.redirection.object-anchors.json",
995995
"articles/postgresql/.openpublishing.redirection.postgresql.json",
996996
"articles/purview/.openpublishing.redirection.purview.json",
997+
"articles/sap/.openpublishing.redirection.sap.json",
997998
"articles/service-bus-messaging/.openpublishing.redirection.service-bus-messaging.json",
998999
"articles/spatial-anchors/.openpublishing.redirection.spatial-anchors.json",
9991000
"articles/spring-apps/.openpublishing.redirection.spring-apps.json",

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11095,6 +11095,11 @@
1109511095
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/product-data-inventory.md",
1109611096
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/product-data-billable-resources",
1109711097
"redirect_document_id": false
11098+
},
11099+
{
11100+
"source_path_from_root": "/articles/active-directory/governance/create-access-review-privileged-access-groups.md",
11101+
"redirect_url": "/azure/active-directory/governance/create-access-review-pim-for-groups",
11102+
"redirect_document_id": false
1109811103
}
1109911104
]
1110011105
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 43 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,16 @@
55
"redirect_url": "/azure/azure-monitor/getting-started",
66
"redirect_document_id": false
77
},
8+
{
9+
"source_path_from_root": "/articles/azure-monitor/monitor-reference.md",
10+
"redirect_url": "/azure/azure-monitor/data-sources",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/azure-monitor/observability-data.md",
15+
"redirect_url": "/azure/azure-monitor/overview",
16+
"redirect_document_id": false
17+
},
818
{
919
"source_path_from_root": "/articles/azure-monitor/change/change-analysis-query.md",
1020
"redirect_url": "/azure/azure-monitor/change/change-analysis-visualizations",
@@ -25,6 +35,31 @@
2535
"redirect_url": "/azure/azure-monitor/change/change-analysis",
2636
"redirect_document_id": false
2737
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/javascript-react-plugin.md",
40+
"redirect_url": "/azure/azure-monitor/app/javascript-framework-extensions",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/azure-monitor/app/javascript-react-native-plugin.md",
45+
"redirect_url": "/azure/azure-monitor/app/javascript-framework-extensions",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path_from_root": "/articles/azure-monitor/app/javascript-angular-plugin.md",
50+
"redirect_url": "/azure/azure-monitor/app/javascript-framework-extensions",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path_from_root": "/articles/azure-monitor/app/javascript-click-analytics-plugin.md",
55+
"redirect_url": "/azure/azure-monitor/app/javascript-feature-extensions",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path_from_root": "/articles/azure-monitor/app/java-in-process-agent-redirect.md",
60+
"redirect_url": "/azure/azure-monitor/app/opentelemetry-enable",
61+
"redirect_document_id": false
62+
},
2863
{
2964
"source_path_from_root": "/articles/azure-monitor/app/legacy-pricing.md",
3065
"redirect_url": "/azure/azure-monitor/best-practices-cost",
@@ -5703,13 +5738,18 @@
57035738
"redirect_document_id": false
57045739
},
57055740
{
5741+
"source_path_from_root": "/articles/azure-monitor/alerts/proactive-performance-diagnostics.md",
5742+
"redirect_url": "https://azure.microsoft.com/updates/public-preview-alerts-based-smart-detection-for-application-insights/",
5743+
"redirect_document_id": false
5744+
},
5745+
{
57065746
"source_path_from_root": "/articles/azure-monitor/autoscale/autoscale-resource-log-schema.md",
57075747
"redirect_url": "/azure/azure-monitor/autoscale/autoscale-diagnostics",
57085748
"redirect_document_id": false
57095749
},
5710-
{
5711-
"source_path_from_root": "/articles/azure-monitor/alerts/proactive-performance-diagnostics.md",
5712-
"redirect_url": "https://azure.microsoft.com/updates/public-preview-alerts-based-smart-detection-for-application-insights/",
5750+
{
5751+
"source_path_from_root": "/articles/azure-monitor/app/java-in-process-agent.md",
5752+
"redirect_url": "/azure/azure-monitor/app/opentelemetry-enable",
57135753
"redirect_document_id": false
57145754
}
57155755
]

.openpublishing.redirection.healthcare-apis.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -634,7 +634,11 @@
634634
"redirect_document_id": false
635635
},
636636
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-use-calculated-functions-mappings.md",
637-
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-calculatedcontenttemplate-mappings",
637+
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-calculatedcontent-mappings",
638+
"redirect_document_id": false
639+
},
640+
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-use-calculatedcontenttemplate-mappings.md",
641+
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-calculatedcontent-mappings",
638642
"redirect_document_id": false
639643
},
640644
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-use-iot-jsonpath-content-mappings.md",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22695,6 +22695,11 @@
2269522695
"source_path": "articles/application-gateway/tutorial-protect-application-gateway.md",
2269622696
"redirect_URL": "/azure/application-gateway/tutorial-protect-application-gateway-ddos",
2269722697
"redirect_document_id": false
22698+
},
22699+
{
22700+
"source_path": "articles/virtual-machines/workloads/sap/index.md",
22701+
"redirect_URL": "/azure/sap/workloads/get-started",
22702+
"redirect_document_id": false
2269822703
}
2269922704
]
2270022705
}

articles/active-directory-b2c/add-identity-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77

88
ms.author: godonnell
9-
ms.date: 01/19/2022
9+
ms.date: 02/08/2023
1010
ms.custom: mvc
1111
ms.topic: how-to
1212
ms.service: active-directory
@@ -19,7 +19,7 @@ You can configure Azure AD B2C to allow users to sign in to your application wit
1919

2020
With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.
2121

22-
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once they select one of the external identity providers, they're taken (redirected) to the selected provider's website to complete the sign-in process. After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.
22+
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once a user selects an external identity provider, they're redirected to the selected provider's website to complete their sign-in. After they successfully sign in, they're returned to Azure AD B2C for authentication with your application.
2323

2424
![Diagram showing mobile sign-in example with a social account (Facebook).](media/add-identity-provider/external-idp.png)
2525

articles/active-directory-b2c/add-sign-up-and-sign-in-policy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: Set up a sign-up and sign-in flow
33
titleSuffix: Azure AD B2C
44
description: Learn how to set up a sign-up and sign-in flow in Azure Active Directory B2C.
55
services: active-directory-b2c
6-
author: kengaderdus
6+
author: garrodonnell
77
manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/21/2021
13-
ms.author: kengaderdus
12+
ms.date: 02/09/2023
13+
ms.author: godonnell
1414
ms.subservice: B2C
1515
ms.custom: "b2c-support"
1616
zone_pivot_groups: b2c-policy-type
@@ -37,7 +37,7 @@ Watch this video to learn how the user sign-up and sign-in policy works.
3737
3838
## Prerequisites
3939

40-
If you haven't already done so, [register a web application in Azure Active Directory B2C](tutorial-register-applications.md).
40+
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
4141

4242
::: zone pivot="b2c-user-flow"
4343

articles/active-directory-b2c/enable-authentication-react-spa-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ The sample code is made up of the following components. Add these components fro
8080
- [src/pages/Hello.jsx](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/6-AdvancedScenarios/1-call-api-obo/SPA/src/pages/Hello.jsx) - Demonstrate how to call a protected resource with OAuth2 bearer token.
8181
- It uses the [useMsal](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-react/docs/hooks.md) hook that returns the PublicClientApplication instance.
8282
- With PublicClientApplication instance, it acquires an access token to call the REST API.
83-
- Invokes the [callApiWithToken](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/fetch.js) function to fetch the data from the REST API and renders the result using the **DataDisplay** component.
83+
- Invokes the [callApiWithToken](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/4-Deployment/2-deploy-static/App/src/fetch.js) function to fetch the data from the REST API and renders the result using the **DataDisplay** component.
8484

8585
- [src/components/NavigationBar.jsx](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/components/NavigationBar.jsx) - The app top navigation bar with the sign-in, sign-out, edit profile and call REST API reset buttons.
8686
- It uses the [AuthenticatedTemplate](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-react/docs/getting-started.md#authenticatedtemplate-and-unauthenticatedtemplate) and UnauthenticatedTemplate, which only render their children if a user is authenticated or unauthenticated, respectively.
@@ -94,7 +94,7 @@ The sample code is made up of the following components. Add these components fro
9494

9595
- [src/styles/App.css](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/styles/App.css) and [src/styles/index.css](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/styles/index.css) - CSS styling files for the app.
9696

97-
- [src/fetch.js](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/fetch.js) - Fetches HTTP requests to the REST API.
97+
- [src/fetch.js](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/4-Deployment/2-deploy-static/App/src/fetch.js) - Fetches HTTP requests to the REST API.
9898

9999
## Step 4: Configure your React app
100100

articles/active-directory-b2c/faq.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ metadata:
33
title: 'Frequently asked questions (FAQ) for Azure Active Directory B2C'
44
description: Answers to frequently asked questions about Azure Active Directory B2C.
55
services: active-directory-b2c
6-
author: kengaderdus
6+
author: garrodonnell
77
manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: faq
12-
ms.date: 01/03/2022
13-
ms.author: kengaderdus
12+
ms.date: 02/09/2023
13+
ms.author: godonnell
1414
ms.subservice: B2C
1515
ms.custom: "b2c-support"
1616
title: 'Azure AD B2C: Frequently asked questions (FAQ)'

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/11/2022
12+
ms.date: 02/07/2023
1313
ms.author: godonnell
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit, project-no-code
@@ -67,26 +67,6 @@ To enable sign-in for users with an Azure AD account from a specific Azure AD or
6767
1. Select **Certificates & secrets**, and then select **New client secret**.
6868
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
6969
70-
### Configuring optional claims
71-
72-
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
73-
74-
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
75-
1. Select the **Directories + subscriptions** icon in the portal toolbar.
76-
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
77-
1. In the Azure portal, search for and select **Azure Active Directory**.
78-
1. In the left menu, under **Manage**, select **App registrations**.
79-
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
80-
1. From the **Manage** section, select **Token configuration**.
81-
1. Select **Add optional claim**.
82-
1. For the **Token type**, select **ID**.
83-
1. Select the optional claims to add, `family_name` and `given_name`.
84-
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
85-
86-
## [Optional] Verify your app authenticity
87-
88-
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
89-
9070
::: zone pivot="b2c-user-flow"
9171
9272
## Configure Azure AD as an identity provider
@@ -254,6 +234,26 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
254234

255235
::: zone-end
256236

237+
### [Optional] Configuring optional claims
238+
239+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
240+
241+
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
242+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
243+
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
244+
1. In the Azure portal, search for and select **Azure Active Directory**.
245+
1. In the left menu, under **Manage**, select **App registrations**.
246+
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
247+
1. From the **Manage** section, select **Token configuration**.
248+
1. Select **Add optional claim**.
249+
1. For the **Token type**, select **ID**.
250+
1. Select the optional claims to add, `family_name` and `given_name`.
251+
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
252+
253+
## [Optional] Verify your app authenticity
254+
255+
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
256+
257257
## Next steps
258258

259259
Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).

0 commit comments

Comments
 (0)