Skip to content

Commit 6aae936

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-roles-sept
2 parents 7a43f0c + b3cc0a5 commit 6aae936

File tree

730 files changed

+16500
-9046
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

730 files changed

+16500
-9046
lines changed

.openpublishing.redirection.json

Lines changed: 40 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1225,11 +1225,6 @@
12251225
"redirect_url": "/azure/cognitive-services/bing-web-search/bing-web-stats",
12261226
"redirect_document_id": false
12271227
},
1228-
{
1229-
"source_path": "articles/governance/management-groups/overview.md",
1230-
"redirect_url": "/azure/governance/management-groups/index",
1231-
"redirect_document_id": true
1232-
},
12331228
{
12341229
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
12351230
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",
@@ -5405,6 +5400,31 @@
54055400
"redirect_url": "/azure/azure-functions/functions-create-vnet",
54065401
"redirect_document_id": false
54075402
},
5403+
{
5404+
"source_path": "articles/azure-functions/create-visual-studio.md",
5405+
"redirect_url": "/azure/azure-functions/functions-create-your-first-function-visual-studio",
5406+
"redirect_document_id": false
5407+
},
5408+
{
5409+
"source_path": "articles/azure-functions/create-visual-studio-code.md",
5410+
"redirect_url": "/azure/azure-functions/functions-create-first-function-vs-code",
5411+
"redirect_document_id": false
5412+
},
5413+
{
5414+
"source_path": "articles/azure-functions/add-output-binding-storage-queue-python.md",
5415+
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-python",
5416+
"redirect_document_id": false
5417+
},
5418+
{
5419+
"source_path": "articles/azure-functions/add-output-binding-storage-queue-vs-code.md",
5420+
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-vs-code",
5421+
"redirect_document_id": false
5422+
},
5423+
{
5424+
"source_path": "articles/azure-functions/add-output-binding-storage-queue-vs.md",
5425+
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-vs",
5426+
"redirect_document_id": false
5427+
},
54085428
{
54095429
"source_path": "articles/azure-functions/tutorial-vs-code-serverless-python.md",
54105430
"redirect_url": "/azure/python/tutorial-vs-code-serverless-python-01",
@@ -28879,6 +28899,11 @@
2887928899
"redirect_url": "/azure/mysql/concepts-pricing-tiers",
2888028900
"redirect_document_id": false
2888128901
},
28902+
{
28903+
"source_path": "articles/mysql/scripts/sample-pitr-restore.md",
28904+
"redirect_url": "/azure/mysql/scripts/sample-point-in-time-restore",
28905+
"redirect_document_id": true
28906+
},
2888228907
{
2888328908
"source_path": "articles/postgresql/concepts-service-tiers.md",
2888428909
"redirect_url": "/azure/postgresql/concepts-pricing-tiers",
@@ -42036,10 +42061,20 @@
4203642061
"redirect_url": "/azure/mysql/reference-stored-procedures",
4203742062
"redirect_document_id": false
4203842063
},
42064+
{
42065+
"source_path": "articles/iot-accelerators/iot-accelerators-architecture-overview.md",
42066+
"redirect_url": "https://docs.microsoft.com/azure/architecture/reference-architectures/iot/",
42067+
"redirect_document_id": false
42068+
},
4203942069
{
4204042070
"source_path": "articles/mariadb/reference-data-in-stored-procedures.md",
4204142071
"redirect_url": "/azure/mariadb/reference-stored-procedures",
4204242072
"redirect_document_id": false
42073+
},
42074+
{
42075+
"source_path": "articles/cloudfoundry/use-osba-pcf-app.md",
42076+
"redirect_url": "/azure/cloudfoundry",
42077+
"redirect_document_id": false
4204342078
}
4204442079
]
4204542080
}

articles/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -184,15 +184,7 @@ Open a browser and navigate to the URL. Make sure you type the correct URL and t
184184
185185
## Create an Azure AD B2C application
186186
187-
Communication with Azure AD B2c occurs through an application that you create in your tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
188-
189-
1. Sign in to the [Azure portal](https://portal.azure.com).
190-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
191-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
192-
4. Select **Applications**, and then select **Add**.
193-
5. Enter a name for the application, for example *testapp1*.
194-
6. For **Web App / Web API**, select `Yes`, and then enter `https://jwt.ms` for the **Reply URL**.
195-
7. Click **Create**.
187+
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
196188
197189
### Update and test the relying party file
198190

articles/active-directory-b2c/active-directory-b2c-custom-setup-goog-idp.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -155,15 +155,7 @@ Now that you have a button in place, you need to link it to an action. The actio
155155

156156
## Create an Azure AD B2C application
157157

158-
Communication with Azure AD B2c occurs through an application that you create in your tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
159-
160-
1. Sign in to the [Azure portal](https://portal.azure.com).
161-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your tenant.
162-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
163-
4. Select **Applications**, and then select **Add**.
164-
5. Enter a name for the application, for example *testapp1*.
165-
6. For **Web App / Web API**, select `Yes`, and then enter `https://jwt.ms` for the **Reply URL**.
166-
7. Click **Create**.
158+
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
167159

168160
## Update and test the relying party file
169161

articles/active-directory-b2c/active-directory-b2c-custom-setup-li-idp.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -213,15 +213,7 @@ Now that you have a button in place, you need to link it to an action. The actio
213213

214214
## Create an Azure AD B2C application
215215

216-
Communication with Azure AD B2C occurs through an application that you create in your tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
217-
218-
1. Sign in to the [Azure portal](https://portal.azure.com).
219-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your tenant.
220-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
221-
4. Select **Applications**, and then select **Add**.
222-
5. Enter a name for the application, for example *testapp1*.
223-
6. For **Web App / Web API**, select `Yes`, and then enter `https://jwt.ms` for the **Reply URL**.
224-
7. Click **Create**.
216+
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
225217

226218
## Update and test the relying party file
227219

articles/active-directory-b2c/active-directory-b2c-custom-setup-msa-idp.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -161,15 +161,7 @@ Now that you have a button in place, you need to link it to an action. The actio
161161

162162
## Create an Azure AD B2C application
163163

164-
Communication with Azure AD B2C occurs through an application that you create in your Azure AD B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
165-
166-
1. Sign in to the [Azure portal](https://portal.azure.com).
167-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your tenant.
168-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
169-
1. Select **Applications**, and then select **Add**.
170-
1. Enter a name for the application, for example *testapp1*.
171-
1. For **Web App / Web API**, select `Yes`, and then enter `https://jwt.ms` for the **Reply URL**.
172-
1. Click **Create**.
164+
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
173165

174166
## Update and test the relying party file
175167

articles/active-directory-b2c/active-directory-b2c-custom-setup-twitter-idp.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -150,15 +150,7 @@ Now that you have a button in place, you need to link it to an action. The actio
150150

151151
## Create an Azure AD B2C application
152152

153-
Communication with Azure AD B2c occurs through an application that you create in your tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
154-
155-
1. Sign in to the [Azure portal](https://portal.azure.com).
156-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your tenant.
157-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
158-
4. Select **Applications**, and then select **Add**.
159-
5. Enter a name for the application, for example *testapp1*.
160-
6. For **Web App / Web API**, select `Yes`, and then enter `https://jwt.ms` for the **Reply URL**.
161-
7. Click **Create**.
153+
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
162154

163155
## Update and test the relying party file
164156

articles/active-directory-b2c/active-directory-b2c-devquickstarts-android.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.subservice: B2C
1818
The Microsoft identity platform uses open standards such as OAuth2 and OpenID Connect. These standards allow you to leverage any library you wish to integrate with Azure Active Directory B2C. To help you use other libraries, you can use a walkthrough like this one to demonstrate how to configure 3rd party libraries to connect to the Microsoft identity platform. Most libraries that implement [the RFC6749 OAuth2 spec](https://tools.ietf.org/html/rfc6749) can connect to the Microsoft Identity platform.
1919

2020
> [!WARNING]
21-
> Microsoft does not provide fixes for 3rd party libraries and has not done a review of those libraries. This sample is using a 3rd party library called AppAuth that has been tested for compatibility in basic scenarios with the Azure AD B2C. Issues and feature requests should be directed to the library's open-source project. Please see [this article](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-libraries) for more information.
21+
> Microsoft does not provide fixes for 3rd party libraries and has not done a review of those libraries. This sample is using a 3rd party library called AppAuth that has been tested for compatibility in basic scenarios with the Azure AD B2C. Issues and feature requests should be directed to the library's open-source project. Please see [this article](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-libraries) for more information.
2222
>
2323
>
2424
@@ -30,11 +30,11 @@ Before you can use Azure AD B2C, you must create a directory, or tenant. A direc
3030

3131
## Create an application
3232

33-
Next, you need to create an app in your B2C directory. This gives Azure AD information that it needs to communicate securely with your app. To create a mobile app, follow [these instructions](active-directory-b2c-app-registration.md). Be sure to:
33+
Next, register an application in your Azure AD B2C tenant. This gives Azure AD the information it needs to communicate securely with your app.
3434

35-
* Include a **Native Client** in the application.
36-
* Copy the **Application ID** that is assigned to your app. You will need this later.
37-
* Set up a native client **Redirect URI** (e.g. com.onmicrosoft.fabrikamb2c.exampleapp://oauth/redirect). You will also need this later.
35+
[!INCLUDE [active-directory-b2c-appreg-native](../../includes/active-directory-b2c-appreg-native.md)]
36+
37+
Record the **APPLICATION ID** for use in a later step. Next, select the application in the list and record the **Custom Redirect URI**, also for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
3838

3939
## Create your user flows
4040

@@ -113,8 +113,8 @@ AuthorizationServiceConfiguration config =
113113

114114
After configuring or retrieving an authorization service configuration, an authorization request can be constructed. To create the request, you will need the following information:
115115

116-
* Client ID (e.g. 00000000-0000-0000-0000-000000000000)
117-
* Redirect URI with a custom scheme (e.g. com.onmicrosoft.fabrikamb2c.exampleapp://oauthredirect)
116+
* Client ID (APPLICATION ID) that you recorded earlier. For example, `00000000-0000-0000-0000-000000000000`.
117+
* Custom Redirect URI that you recorded earlier. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
118118

119119
Both items should have been saved when you were [registering your app](#create-an-application).
120120

@@ -128,4 +128,3 @@ AuthorizationRequest req = new AuthorizationRequest.Builder(
128128
```
129129

130130
Please refer to the [AppAuth guide](https://openid.github.io/AppAuth-Android/) on how to complete the rest of the process. If you need to quickly get started with a working app, check out [our sample](https://github.com/Azure-Samples/active-directory-android-native-appauth-b2c). Follow the steps in the [README.md](https://github.com/Azure-Samples/active-directory-android-native-appauth-b2c/blob/master/README.md) to enter your own Azure AD B2C configuration.
131-

articles/active-directory-b2c/active-directory-b2c-devquickstarts-ios.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,12 @@ If you're new to OAuth2 or OpenID Connect, much of this sample configuration may
2828
Before you can use Azure AD B2C, you must create a directory, or tenant. A directory is a container for all your users, apps, groups, and more. If you don't have one already, [create a B2C directory](tutorial-create-tenant.md) before you continue.
2929

3030
## Create an application
31-
Next, you need to create an app in your B2C directory. The app registration gives Azure AD information that it needs to communicate securely with your app. To create a mobile app, follow [these instructions](active-directory-b2c-app-registration.md). Be sure to:
3231

33-
* Include a **Native client** in the application.
34-
* Copy the **Application ID** that is assigned to your app. You need this GUID later.
35-
* Set up a **Redirect URI** with a custom scheme (for example, com.onmicrosoft.fabrikamb2c.exampleapp://oauth/redirect). You need this URI later.
32+
Next, register an application in your Azure AD B2C tenant. This gives Azure AD the information it needs to communicate securely with your app.
33+
34+
[!INCLUDE [active-directory-b2c-appreg-native](../../includes/active-directory-b2c-appreg-native.md)]
35+
36+
Record the **APPLICATION ID** for use in a later step. Next, select the application in the list and record the **Custom Redirect URI**, also for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
3637

3738
## Create your user flows
3839
In Azure AD B2C, every user experience is defined by a [user flow](active-directory-b2c-reference-policies.md). This application contains one identity experience: a combined sign-in and sign-up. When you create the user flow, be sure to:
@@ -75,21 +76,22 @@ static NSString *const authorizationEndpoint = @"https://<Tenant_name>.b2clogin.
7576
Run the following code to create your AuthorizationServiceConfiguration object:
7677

7778
```objc
78-
OIDServiceConfiguration *configuration =
79+
OIDServiceConfiguration *configuration =
7980
[[OIDServiceConfiguration alloc] initWithAuthorizationEndpoint:authorizationEndpoint tokenEndpoint:tokenEndpoint];
8081
// now we are ready to perform the auth request...
8182
```
8283
8384
### Authorizing
8485
85-
After configuring or retrieving an authorization service configuration, an authorization request can be constructed. To create the request, you need the following information:
86-
* Client ID (for example, 00000000-0000-0000-0000-000000000000)
87-
* Redirect URI with a custom scheme (for example, com.onmicrosoft.fabrikamb2c.exampleapp://oauth/redirect)
86+
After configuring or retrieving an authorization service configuration, an authorization request can be constructed. To create the request, you need the following information:
87+
88+
* Client ID (APPLICATION ID) that you recorded earlier. For example, `00000000-0000-0000-0000-000000000000`.
89+
* Custom Redirect URI that you recorded earlier. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
8890
8991
Both items should have been saved when you were [registering your app](#create-an-application).
9092
9193
```objc
92-
OIDAuthorizationRequest *request =
94+
OIDAuthorizationRequest *request =
9395
[[OIDAuthorizationRequest alloc] initWithConfiguration:configuration
9496
clientId:kClientId
9597
scopes:@[OIDScopeOpenID, OIDScopeProfile]
@@ -98,7 +100,7 @@ OIDAuthorizationRequest *request =
98100
additionalParameters:nil];
99101
100102
AppDelegate *appDelegate = (AppDelegate *)[UIApplication sharedApplication].delegate;
101-
appDelegate.currentAuthorizationFlow =
103+
appDelegate.currentAuthorizationFlow =
102104
[OIDAuthState authStateByPresentingAuthorizationRequest:request
103105
presentingViewController:self
104106
callback:^(OIDAuthState *_Nullable authState, NSError *_Nullable error) {

articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -175,15 +175,7 @@ Now that you have a button in place, you need to link it to an action. The actio
175175
176176
## Create an Azure AD B2C application
177177
178-
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
179-
180-
1. Sign in to the [Azure portal](https://portal.azure.com).
181-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription filter** in the top menu, and then choose the directory that contains your Azure AD B2C tenant.
182-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
183-
1. Select **Applications**, and then select **Add**.
184-
1. Enter a name for the application, for example *testapp1*.
185-
1. For **Web App / Web API**, select `Yes`, and then enter `https://jwt.ms` for the **Reply URL**.
186-
1. Select **Create**.
178+
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
187179
188180
## Update and test the relying party file
189181

articles/active-directory-b2c/active-directory-b2c-setup-commonaad-custom.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -184,15 +184,7 @@ Now that you have a button in place, you need to link it to an action. The actio
184184
185185
## Create an Azure AD B2C application
186186
187-
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
188-
189-
1. Sign in to the [Azure portal](https://portal.azure.com).
190-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription filter** in the top menu, and then choose the directory that contains your Azure AD B2C tenant.
191-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
192-
1. Select **Applications**, and then select **Add**.
193-
1. Enter a name for the application, for example *testapp1*.
194-
1. For **Web App / Web API**, select `Yes`, and then enter `https://jwt.ms` for the **Reply URL**.
195-
1. Select **Create**.
187+
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
196188
197189
## Update and test the relying party file
198190

0 commit comments

Comments
 (0)