Skip to content

Commit 698dedc

Browse files
committed
2 parents 33b836d + 7bcc8f6 commit 698dedc

File tree

389 files changed

+9393
-6783
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

389 files changed

+9393
-6783
lines changed

.openpublishing.redirection.json

Lines changed: 131 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -36945,6 +36945,16 @@
3694536945
"redirect_url": "/azure/active-directory-b2c/tutorial-create-tenant",
3694636946
"redirect_document_id": false
3694736947
},
36948+
{
36949+
"source_path": "articles/active-directory/authentication/tutorial-enable-writeback.md",
36950+
"redirect_url": "/azure/active-directory/authentication/tutorial-enable-sspr-writeback",
36951+
"redirect_document_id": false
36952+
},
36953+
{
36954+
"source_path": "articles/active-directory/authentication/howto-sspr-writeback.md",
36955+
"redirect_url": "/azure/active-directory/authentication/tutorial-enable-sspr-writeback",
36956+
"redirect_document_id": true
36957+
},
3694836958
{
3694936959
"source_path": "articles/active-directory/authentication/concept-mfa-get-started.md",
3695036960
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-mfa-get-started",
@@ -41230,6 +41240,26 @@
4123041240
"redirect_url": "/azure/azure-monitor/platform/diagnostic-settings-legacy",
4123141241
"redirect_document_id": false
4123241242
},
41243+
{
41244+
"source_path": "articles/azure-monitor/platform/azure-storage-iis-table.md",
41245+
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-logs",
41246+
"redirect_document_id": false
41247+
},
41248+
{
41249+
"source_path": "articles/azure-monitor/platform/diagnostics-extension-schema-1dot3.md",
41250+
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-schema-windows",
41251+
"redirect_document_id": false
41252+
},
41253+
{
41254+
"source_path": "articles/azure-monitor/platform/diagnostics-extension-schema.md",
41255+
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-versions",
41256+
"redirect_document_id": false
41257+
},
41258+
{
41259+
"source_path": "articles/azure-monitor/platform/diagnostics-extension-to-storage.md",
41260+
"redirect_url": "/azure/azure-monitor/cloud-services/diagnostics-extension-to-storage",
41261+
"redirect_document_id": false
41262+
},
4123341263
{
4123441264
"source_path": "articles/machine-learning/service/how-to-automated-ml.md",
4123541265
"redirect_url": "/azure/machine-learning/service/concept-automated-ml",
@@ -47088,8 +47118,8 @@
4708847118
},
4708947119
{
4709047120
"source_path": "articles/terraform/terraform-vm-msi.md",
47091-
"redirect_url": "/azure/terraform/terraform-vm-managed-identities-for-azure-resources",
47092-
"redirect_document_id": true
47121+
"redirect_url": "/azure/terraform/terraform-create-complete-vm",
47122+
"redirect_document_id": false
4709347123
},
4709447124
{
4709547125
"source_path": "articles/cognitive-services/speech-service/quickstart-csharp-dotnet-windows.md",
@@ -48506,6 +48536,96 @@
4850648536
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/setup-platform?pivots=programming-language-python",
4850748537
"redirect_document_id": false
4850848538
},
48539+
{
48540+
"source_path": "articles/virtual-machines/windows/sizes-general.md",
48541+
"redirect_url": "/azure/virtual-machines/sizes-general",
48542+
"redirect_document_id": false
48543+
},
48544+
{
48545+
"source_path": "articles/virtual-machines/linux/sizes-general.md",
48546+
"redirect_url": "/azure/virtual-machines/sizes-general",
48547+
"redirect_document_id": false
48548+
},
48549+
{
48550+
"source_path": "articles/virtual-machines/windows/sizes-compute.md",
48551+
"redirect_url": "/azure/virtual-machines/sizes-compute",
48552+
"redirect_document_id": false
48553+
},
48554+
{
48555+
"source_path": "articles/virtual-machines/linux/sizes-compute.md",
48556+
"redirect_url": "/azure/virtual-machines/sizes-compute",
48557+
"redirect_document_id": false
48558+
},
48559+
{
48560+
"source_path": "articles/virtual-machines/windows/sizes-memory.md",
48561+
"redirect_url": "/azure/virtual-machines/sizes-memory",
48562+
"redirect_document_id": false
48563+
},
48564+
{
48565+
"source_path": "articles/virtual-machines/linux/sizes-memory.md",
48566+
"redirect_url": "/azure/virtual-machines/sizes-memory",
48567+
"redirect_document_id": false
48568+
},
48569+
{
48570+
"source_path": "articles/virtual-machines/windows/sizes-storage.md",
48571+
"redirect_url": "/azure/virtual-machines/sizes-storage",
48572+
"redirect_document_id": false
48573+
},
48574+
{
48575+
"source_path": "articles/virtual-machines/linux/sizes-storage.md",
48576+
"redirect_url": "/azure/virtual-machines/sizes-storage",
48577+
"redirect_document_id": false
48578+
},
48579+
{
48580+
"source_path": "articles/virtual-machines/windows/sizes-gpu.md",
48581+
"redirect_url": "/azure/virtual-machines/sizes-gpu",
48582+
"redirect_document_id": false
48583+
},
48584+
{
48585+
"source_path": "articles/virtual-machines/linux/sizes-gpu.md",
48586+
"redirect_url": "/azure/virtual-machines/sizes-gpu",
48587+
"redirect_document_id": false
48588+
},
48589+
{
48590+
"source_path": "articles/virtual-machines/windows/sizes-hpc.md",
48591+
"redirect_url": "/azure/virtual-machines/sizes-hpc",
48592+
"redirect_document_id": false
48593+
},
48594+
{
48595+
"source_path": "articles/virtual-machines/linux/sizes-hpc.md",
48596+
"redirect_url": "/azure/virtual-machines/sizes-hpc",
48597+
"redirect_document_id": false
48598+
},
48599+
{
48600+
"source_path": "articles/virtual-machines/windows/sizes-previous-gen.md",
48601+
"redirect_url": "/azure/virtual-machines/sizes-previous-gen",
48602+
"redirect_document_id": false
48603+
},
48604+
{
48605+
"source_path": "articles/virtual-machines/linux/sizes-previous-gen.md",
48606+
"redirect_url": "/azure/virtual-machines/sizes-previous-gen",
48607+
"redirect_document_id": false
48608+
},
48609+
{
48610+
"source_path": "articles/virtual-machines/windows/acu.md",
48611+
"redirect_url": "/azure/virtual-machines/acu",
48612+
"redirect_document_id": false
48613+
},
48614+
{
48615+
"source_path": "articles/virtual-machines/linux/acu.md",
48616+
"redirect_url": "/azure/virtual-machines/acu",
48617+
"redirect_document_id": false
48618+
},
48619+
{
48620+
"source_path": "articles/virtual-machines/windows/b-series-burstable.md",
48621+
"redirect_url": "/azure/virtual-machines/sizes-b-series-burstable",
48622+
"redirect_document_id": false
48623+
},
48624+
{
48625+
"source_path": "articles/virtual-machines/linux/b-series-burstable.md",
48626+
"redirect_url": "/azure/virtual-machines/sizes-b-series-burstable",
48627+
"redirect_document_id": false
48628+
},
4850948629
{
4851048630
"source_path": "articles/cognitive-services/Bing-News-Search/vs-bing-news-search-connected-service.md",
4851148631
"redirect_url": "/azure/cognitive-services/bing-news-search/search-the-web",
@@ -48534,17 +48654,17 @@
4853448654
{
4853548655
"source_path": "articles/virtual-machines/linux/ansible-install-configure.md",
4853648656
"redirect_url": "/azure/ansible/ansible-install-configure",
48537-
"redirect_document_id": false
48657+
"redirect_document_id": true
4853848658
},
4853948659
{
4854048660
"source_path": "articles/virtual-machines/linux/ansible-create-vm.md",
4854148661
"redirect_url": "/azure/ansible/ansible-create-vm",
48542-
"redirect_document_id": false
48662+
"redirect_document_id": true
4854348663
},
4854448664
{
4854548665
"source_path": "articles/virtual-machines/linux/ansible-manage-linux-vm.md",
4854648666
"redirect_url": "/azure/ansible/ansible-manage-linux-vm",
48547-
"redirect_document_id": false
48667+
"redirect_document_id": true
4854848668
},
4854948669
{
4855048670
"source_path": "articles/app-service/containers/tutorial-java-enterprise-postgresql-app.md",
@@ -48554,11 +48674,16 @@
4855448674
{
4855548675
"source_path": "articles/virtual-machines/linux/terraform-install-configure.md",
4855648676
"redirect_url": "/azure/terraform/terraform-install-configure",
48557-
"redirect_document_id": false
48677+
"redirect_document_id": true
4855848678
},
4855948679
{
4856048680
"source_path": "articles/virtual-machines/linux/terraform-create-complete-vm.md",
4856148681
"redirect_url": "/azure/terraform/terraform-create-complete-vm",
48682+
"redirect_document_id": true
48683+
},
48684+
{
48685+
"source_path": "articles/terraform/terraform-vm-managed-identities-for-azure-resources.md",
48686+
"redirect_url": "/azure/terraform/terraform-create-complete-vm",
4856248687
"redirect_document_id": false
4856348688
}
4856448689
]

articles/active-directory-b2c/identity-provider-microsoft-account-custom.md

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/08/2019
12+
ms.date: 02/19/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -25,7 +25,7 @@ This article shows you how to enable sign-in for users from a Microsoft account
2525
- Complete the steps in [Get started with custom policies in Azure Active Directory B2C](custom-policy-get-started.md).
2626
- If you don't already have a Microsoft account, create one at [https://www.live.com/](https://www.live.com/).
2727

28-
## Add an application
28+
## Register an application
2929

3030
To enable sign-in for users with a Microsoft account, you need to register an application within the Azure AD tenant. The Azure AD tenant is not the same as your Azure AD B2C tenant.
3131

@@ -43,6 +43,19 @@ To enable sign-in for users with a Microsoft account, you need to register an ap
4343
1. Enter a **Description** for the secret, for example *MSA Application Client Secret*, and then click **Add**.
4444
1. Record the application password shown in the **Value** column. You use this value in the next section.
4545

46+
## Configuring optional claims
47+
48+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
49+
50+
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
51+
1. From the **Manage** section, select **App registrations**.
52+
1. Select the application you want to configure optional claims for in the list.
53+
1. From the **Manage** section, select **Token configuration (preview)**.
54+
1. Select **Add optional claim**.
55+
1. Select the token type you want to configure.
56+
1. Select the optional claims to add.
57+
1. Click **Add**.
58+
4659
## Create a policy key
4760

4861
Now that you've created the application in your Azure AD tenant, you need to store that application's client secret in your Azure AD B2C tenant.
@@ -90,10 +103,12 @@ You can define Azure AD as a claims provider by adding the **ClaimsProvider** el
90103
<Key Id="client_secret" StorageReferenceId="B2C_1A_MSASecret" />
91104
</CryptographicKeys>
92105
<OutputClaims>
93-
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="live.com" />
94-
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
95-
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="sub" />
106+
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="oid" />
107+
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name" />
108+
<OutputClaim ClaimTypeReferenceId="surName" PartnerClaimType="family_name" />
96109
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="name" />
110+
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
111+
<OutputClaim ClaimTypeReferenceId="identityProvider" PartnerClaimType="iss" />
97112
<OutputClaim ClaimTypeReferenceId="email" />
98113
</OutputClaims>
99114
<OutputClaimsTransformations>

articles/active-directory-b2c/string-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Use this claim transformation to change any string ClaimType to lower or upper c
118118

119119
## CreateStringClaim
120120

121-
Creates a string claim from the provided input parameter in the policy.
121+
Creates a string claim from the provided input parameter in the transformation.
122122

123123
| Item | TransformationClaimType | Data Type | Notes |
124124
|----- | ----------------------- | --------- | ----- |

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
href: tutorial-enable-sspr.md
1212
- name: Enable Azure Multi-Factor Authentication
1313
href: tutorial-enable-azure-mfa.md
14-
- name: Enable SSPR on-premises integration
15-
href: tutorial-enable-writeback.md
14+
- name: Enable password writeback to on-premises
15+
href: tutorial-enable-sspr-writeback.md
1616
- name: Integrate Azure Identity Protection
1717
href: tutorial-risk-based-sspr-mfa.md
1818
- name: Concepts
@@ -68,8 +68,6 @@
6868
href: howto-sspr-deployment.md
6969
- name: Pre-register authentication data
7070
href: howto-sspr-authenticationdata.md
71-
- name: Enable password writeback
72-
href: howto-sspr-writeback.md
7371
- name: SSPR for Windows clients
7472
href: howto-sspr-windows.md
7573
- name: Cloud-based MFA

articles/active-directory/authentication/concept-mfa-howitworks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Multi-Factor Authentication comes as part of the following offerings:
3535

3636
* **Azure Active Directory Premium** or **Microsoft 365 Business** - Full featured use of Azure Multi-Factor Authentication using Conditional Access policies to require multi-factor authentication.
3737

38-
* **Azure AD Free** or standalone **Office 365** licenses - Use pre-created [Conditional Access baseline protection policies](../conditional-access/concept-baseline-protection.md) to require multi-factor authentication for your users and administrators.
38+
* **Azure AD Free** or standalone **Office 365** licenses - Use [Security Defaults](../fundamentals/concept-fundamentals-security-defaults.md) to require multi-factor authentication for your users and administrators.
3939

4040
* **Azure Active Directory Global Administrators** - A subset of Azure Multi-Factor Authentication capabilities are available as a means to protect global administrator accounts.
4141

articles/active-directory/authentication/howto-sspr-writeback.md

Lines changed: 0 additions & 105 deletions
This file was deleted.

0 commit comments

Comments
 (0)