Skip to content

Commit 68a3707

Browse files
authored
Merge branch 'main' into patch-14
2 parents 7a6e316 + 978bccf commit 68a3707

File tree

5,576 files changed

+40131
-31220
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

5,576 files changed

+40131
-31220
lines changed

.openpublishing.redirection.azure-resource-manager.json

Lines changed: 1943 additions & 1938 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1649,6 +1649,11 @@
16491649
"source_path_from_root": "/articles/dns/dns-getstarted-create-recordset.md",
16501650
"redirect_url": "/azure/dns/dns-getstarted-powershell",
16511651
"redirect_document_id": false
1652+
},
1653+
{
1654+
"source_path_from_root": "/articles/time-series-insights/migration-to-adx.md",
1655+
"redirect_url": "/azure/time-series-insights/migration-to-fabric.md",
1656+
"redirect_document_id": false
16521657
},
16531658
{
16541659
"source_path_from_root": "/articles/dns/dns-operations-dnszones-cli-nodejs.md",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -537,8 +537,6 @@
537537
href: partner-nok-nok.md
538538
- name: Transmit Security for passwordless
539539
href: partner-bindid.md
540-
- name: Transmit Security for risk detection
541-
href: partner-transmit-security.md
542540
- name: Trusona
543541
href: partner-trusona.md
544542
- name: Twilio
@@ -571,6 +569,8 @@
571569
- name: Microsoft Dynamics 365 Fraud Protection
572570
href: partner-dynamics-365-fraud-protection.md
573571
displayName: m365 dynamics, dynamics fraud protection, fraud, 365 protection
572+
- name: Transmit Security
573+
href: partner-transmit-security.md
574574
- name: Investigate risk with Identity Protection
575575
href: identity-protection-investigate-risk.md
576576
- name: Configure Conditional Access

articles/active-directory-b2c/identity-provider-generic-saml-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -422,7 +422,7 @@ Upon an application sign-out request, Azure AD B2C attempts to sign out from you
422422

423423
## Debug SAML protocol
424424

425-
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Microsoft Edge or IE Developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
425+
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Microsoft Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
426426

427427
Using these tools, you can check the integration between Azure AD B2C and your SAML identity provider. For example:
428428

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -532,7 +532,7 @@ The following IDs are used for an [Microsoft Entra ID multifactor authentication
532532
| `UserMessageIfMaxAllowedCodeRetryReached` | Wrong code entered too many times, please try again later.|
533533
| `UserMessageIfServerError` | Cannot use MFA service, please try again later.|
534534
| `UserMessageIfThrottled` | Your request has been throttled, please try again later.|
535-
| `UserMessageIfWrongCodeEntered` |Wrong code entered, please try again.|
535+
| `UserMessageIfIncorrectOTPCodeEntered` |Wrong code entered, please try again.|
536536

537537
<a name='azure-ad-mfa-example'></a>
538538

@@ -684,4 +684,4 @@ This example shows localized messages for CAPTCHA display control.
684684
See the following articles for localization examples:
685685

686686
- [Language customization with custom policy in Azure AD B2C](language-customization.md)
687-
- [Language customization with user flows in Azure AD B2C](language-customization.md)
687+
- [Language customization with user flows in Azure AD B2C](language-customization.md)

articles/active-directory-b2c/manage-user-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.custom: fasttrack-edit
2222

2323
This article discusses how you can manage the user data in Azure Active Directory B2C (Azure AD B2C) by using the operations that are provided by the [Microsoft Graph API](/graph/use-the-api). Managing user data includes deleting or exporting data from audit logs.
2424

25-
[!INCLUDE [gdpr-intro-sentence.md](../../includes/gdpr-intro-sentence.md)]
25+
[!INCLUDE [gdpr-intro-sentence.md](~/reusable-content/ce-skilling/azure/includes/gdpr-intro-sentence.md)]
2626

2727
## Delete user data
2828

articles/active-directory-b2c/oauth2-error-technical-profile.md

Lines changed: 52 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: reference
12-
ms.date: 01/11/2024
12+
ms.date: 05/07/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

@@ -73,6 +73,43 @@ The following example shows a technical profile for `ReturnOAuth2Error`:
7373
</ClaimsProviders> -->
7474
```
7575

76+
## Define claims transformation to generate custom values of error code and error message
77+
78+
Use these steps to generate custom values of error code and error message:
79+
80+
1. Locate the `ClaimsTransformations` element, then add the following code inside it
81+
82+
```xml
83+
<!--
84+
<ClaimsTransformations> -->
85+
<ClaimsTransformation Id="GenerateErrorCode" TransformationMethod="CreateStringClaim">
86+
<InputParameters>
87+
<InputParameter Id="value" DataType="string" Value="Error_001" />
88+
</InputParameters>
89+
<OutputClaims>
90+
<OutputClaim ClaimTypeReferenceId="errorCode" TransformationClaimType="createdClaim" />
91+
</OutputClaims>
92+
</ClaimsTransformation>
93+
<ClaimsTransformation Id="GenerateErrorMessage" TransformationMethod="CreateStringClaim">
94+
<InputParameters>
95+
<InputParameter Id="value" DataType="string" Value="Insert error description." />
96+
</InputParameters>
97+
<OutputClaims>
98+
<OutputClaim ClaimTypeReferenceId="errorMessage" TransformationClaimType="createdClaim" />
99+
</OutputClaims>
100+
</ClaimsTransformation>
101+
<!--
102+
</ClaimsTransformations> -->
103+
```
104+
105+
1. Add the two claims transformations in the `OutputClaimsTransformations` element of any technical profile before Oauth2 technical that you define:
106+
107+
```xml
108+
<OutputClaimsTransformations>
109+
<OutputClaimsTransformation ReferenceId="generateErrorCode" />
110+
<OutputClaimsTransformation ReferenceId="generateErrorMessage" />
111+
</OutputClaimsTransformations>
112+
```
76113
## Input claims
77114

78115
The **InputClaims** element contains a list of claims required to return OAuth2 error.
@@ -123,6 +160,20 @@ In the following example:
123160
</UserJourney>
124161
```
125162

163+
Optionally, you can use preconditions to manipulate the Oauth2 error technical profile. For example, if there is no email claim, you can set to call Oauth2 error technical profile:
164+
165+
```xml
166+
<OrchestrationStep Order="3" Type="SendClaims" CpimIssuerTechnicalProfileReferenceId="ReturnOAuth2Error">
167+
<Preconditions>
168+
<Precondition Type="ClaimsExist" ExecuteActionsIf="false">
169+
<Value>email</Value>
170+
<Action>SkipThisOrchestrationStep</Action>
171+
</Precondition>
172+
</Preconditions>
173+
</OrchestrationStep>
174+
```
175+
176+
126177
## Next steps
127178

128179
Learn about [UserJourneys](userjourneys.md)

articles/active-directory-b2c/page-layout.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
179179
- Added support for [display controls](display-controls.md) in custom policies.
180180

181181
**1.2.0**
182-
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer (IE) to properly save this information.
182+
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer to properly save this information.
183183
- Added a configurable user input validation delay for improved user experience.
184184
- Accessibility fixes
185185
- Fix an accessibility issue so that error messages are read by Narrator.
@@ -273,7 +273,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
273273
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your sign-in name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
274274

275275
**1.2.0**
276-
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer (IE) to properly save this information.
276+
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer to properly save this information.
277277
- Accessibility fixes
278278
- You can now add the `data-preload="true"` attribute [in your HTML tags](customize-ui-with-html.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
279279
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
@@ -313,7 +313,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
313313

314314
**1.2.7**
315315
- Fixed accessibility issue on label for retries code.
316-
- Fixed issue caused by incompatibility of default parameter on IE 11.
316+
- Fixed issue caused by incompatibility of default parameter on Internet Explorer 11.
317317
- Set up `H1` heading and enable by default.
318318
- Updated HandlebarJS version to 4.7.7.
319319

articles/active-directory-b2c/partner-nevis.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,12 @@ In this tutorial, learn to enable passwordless authentication in Azure Active Di
2323
To get started, you'll need:
2424

2525
- A Nevis demo account
26-
- Go to nevis.net for [Nevis + Microsoft Azure AD B2C](https://www.nevis-security.com/aadb2c/) to request an account
27-
* An Azure subscription
26+
- Go to `nevis.net` for [Nevis + Microsoft Azure AD B2C](https://www.nevis-security.com/aadb2c/) to request an account
27+
28+
- An Azure subscription
2829

2930
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
31+
3032
- An [Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
3133

3234
>[!NOTE]
@@ -56,17 +58,17 @@ The diagram shows the implementation.
5658

5759
### Request a Nevis account
5860

59-
1. Go to nevis.net for [Nevis + Microsoft Azure AD B2C](https://www.nevis-security.com/aadb2c/).
61+
1. Go to `nevis.net` for [Nevis + Microsoft Azure AD B2C](https://www.nevis-security.com/aadb2c/).
6062
2. Use the form request an account.
6163
3. Two emails arrive:
6264

63-
* Management account notification
64-
* Mobile app invitation
65+
- Management account notification
66+
- Mobile app invitation
6567

6668
### Add your Azure AD B2C tenant to your Nevis account
6769

6870
1. From the management account trial email, copy your management key.
69-
2. In a browser, open https://console.nevis.cloud/.
71+
2. In a browser, open the [Nevis management console](https://console.nevis.cloud/).
7072
3. Use the management key to sign in to the management console.
7173
4. Select **Add Instance**.
7274
5. Select the created instance.
@@ -99,14 +101,14 @@ The diagram shows the implementation.
99101
10. For **Key Usage**, select **Encryption**.
100102
11. Select **Create**.
101103

102-
### Configure and upload the nevis.html to Azure blob storage
104+
### Configure and upload the nevis.html file to Azure blob storage
103105

104106
1. In your Identity Environment (IDE), go to the [/master/samples/Nevis/policy](https://github.com/azure-ad-b2c/partner-integrations/tree/master/samples/Nevis/policy) folder.
105-
2. In [/samples/Nevis/policy/nevis.html](https://github.com/azure-ad-b2c/partner-integrations/blob/master/samples/Nevis/policy/nevis.html) open the nevis.html file.
107+
2. In [/samples/Nevis/policy/nevis.html](https://github.com/azure-ad-b2c/partner-integrations/blob/master/samples/Nevis/policy/nevis.html) open the `nevis.html` file.
106108
3. Replace the **authentication_cloud_url** with the Nevis Admin console URL `https://<instance_id>.mauth.nevis.cloud`.
107109
4. Select **Save**.
108110
5. [Create an Azure Blob storage account](./customize-ui-with-html.md#2-create-an-azure-blob-storage-account).
109-
6. Upload the nevis.html file to your Azure blob storage.
111+
6. Upload the `nevis.html` file to your Azure blob storage.
110112
7. [Configure CORS](./customize-ui-with-html.md#3-configure-cors).
111113
8. Enable cross-origin resource sharing (CORS) for the file.
112114
9. In the list, select the **nevis.html** file.
@@ -132,7 +134,7 @@ The diagram shows the implementation.
132134
3. Replace **your tenant** with your Azure tenant account name in **TenantId**.
133135
4. Replace **your tenant** with your Azure tenant account name in **PublicPolicyURI**.
134136
5. Under **BasePolicy**, in the **TenantId**, replace **your tenant** with your Azure tenant account name.
135-
6. Under **BuildingBlocks**, replace **LoadUri** with the nevis.html blob link URL, in your blob storage account.
137+
6. Under **BuildingBlocks**, replace **LoadUri** with the `nevis.html` blob link URL, in your blob storage account.
136138
7. Select **Save**.
137139

138140
### Customize SignUpOrSignin.xml

articles/active-directory-b2c/partner-saviynt.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,9 @@ The following architecture diagram illustrates the implementation.
7070
2. Create delegated administration policies.
7171
3. Assign users the delegated administrator role.
7272

73+
>[!NOTE]
74+
>User administrator role will be required for a Service Principal Name (SPN) to integrate with Saviynt EIC system.
75+
7376
## Configure Azure AD B2C with Saviynt
7477

7578
Use the following instructions to create an application, delete users, and more.

0 commit comments

Comments
 (0)