Skip to content

Commit 6c49f5f

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into quickstarts11
2 parents f9dc435 + 3479e22 commit 6c49f5f

File tree

698 files changed

+6760
-3591
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

698 files changed

+6760
-3591
lines changed

.openpublishing.redirection.json

Lines changed: 126 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -28465,6 +28465,11 @@
2846528465
"redirect_url": "/azure/data-factory/v1/data-factory-web-table-connector",
2846628466
"redirect_document_id": true
2846728467
},
28468+
{
28469+
"source_path": "articles/data-factory/concepts-data-flow-json.md",
28470+
"redirect_url": "/azure/data-factory/format-json",
28471+
"redirect_document_id": true
28472+
},
2846828473
{
2846928474
"source_path": "articles/data-lake-store/data-lake-store-authenticate-using-active-directory.md",
2847028475
"redirect_url": "/azure/data-lake-store/data-lake-store-service-to-service-authenticate-using-active-directory",
@@ -35897,9 +35902,39 @@
3589735902
},
3589835903
{
3589935904
"source_path": "articles/active-directory/active-directory-enterprise-apps-manage-provisioning.md",
35900-
"redirect_url": "/azure/active-directory/manage-apps/configure-automatic-user-provisioning-portal",
35905+
"redirect_url": "/azure/active-directory/app-provisioning/configure-automatic-user-provisioning-portal",
3590135906
"redirect_document_id": true
3590235907
},
35908+
{
35909+
"source_path": "articles/active-directory/manage-apps/plan-auto-user-provisioning.md",
35910+
"redirect_url": "/azure/active-directory/app-provisioning/plan-auto-user-provisioning",
35911+
"redirect_document_id": false
35912+
},
35913+
{
35914+
"source_path": "articles/active-directory/manage-apps/plan-cloud-hr-provision.md",
35915+
"redirect_url": "/azure/active-directory/app-provisioning/plan-cloud-hr-provision",
35916+
"redirect_document_id": false
35917+
},
35918+
{
35919+
"source_path": "articles/active-directory/manage-apps/provisioning-agent-release-version-history.md",
35920+
"redirect_url": "/azure/active-directory/app-provisioning/provisioning-agent-release-version-history",
35921+
"redirect_document_id": false
35922+
},
35923+
{
35924+
"source_path": "articles/active-directory/manage-apps/sap-successfactors-attribute-reference.md",
35925+
"redirect_url": "/azure/active-directory/app-provisioning/sap-successfactors-attribute-reference",
35926+
"redirect_document_id": false
35927+
},
35928+
{
35929+
"source_path": "articles/active-directory/manage-apps/skip-out-of-scope-deletions.md",
35930+
"redirect_url": "/azure/active-directory/app-provisioning/skip-out-of-scope-deletions",
35931+
"redirect_document_id": false
35932+
},
35933+
{
35934+
"source_path": "articles/active-directory/manage-apps/configure-automatic-user-provisioning-portal.md",
35935+
"redirect_url": "/azure/active-directory/app-provisioning/configure-automatic-user-provisioning-portal",
35936+
"redirect_document_id": false
35937+
},
3590335938
{
3590435939
"source_path": "articles/active-directory/active-directory-enterprise-apps-manage-sso.md",
3590535940
"redirect_url": "/azure/active-directory/manage-apps/configure-single-sign-on-portal",
@@ -35940,6 +35975,16 @@
3594035975
"redirect_url": "/azure/active-directory/manage-apps/use-scim-to-provision-users-and-groups",
3594135976
"redirect_document_id": true
3594235977
},
35978+
{
35979+
"source_path": "articles/active-directory/manage-apps/use-scim-to-provision-users-and-groups.md",
35980+
"redirect_url": "/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups",
35981+
"redirect_document_id": false
35982+
},
35983+
{
35984+
"source_path": "articles/active-directory/manage-apps/workday-attribute-reference.md",
35985+
"redirect_url": "/azure/active-directory/app-provisioning/workday-attribute-reference",
35986+
"redirect_document_id": false
35987+
},
3594335988
{
3594435989
"source_path": "articles/active-directory/active-directory/migrate-adfs-apps-to-azure.md",
3594535990
"redirect_url": "/azure/active-directory/manage-apps/migrate-adfs-apps-to-azure",
@@ -35960,16 +36005,31 @@
3596036005
"redirect_url": "/azure/active-directory/manage-apps/user-provisioning",
3596136006
"redirect_document_id": true
3596236007
},
36008+
{
36009+
"source_path": "articles/active-directory/manage-apps/user-provisioning.md",
36010+
"redirect_url": "/azure/active-directory/app-provisioning/user-provisioning",
36011+
"redirect_document_id": false
36012+
},
36013+
{
36014+
"source_path": "articles/active-directory/manage-apps/user-provisioning-sync-attributes-for-mapping.md",
36015+
"redirect_url": "/azure/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping",
36016+
"redirect_document_id": false
36017+
},
3596336018
{
3596436019
"source_path": "articles/active-directory/active-directory-saas-custom-apps.md",
3596536020
"redirect_url": "/azure/active-directory/manage-apps/configure-single-sign-on-non-gallery-applications",
3596636021
"redirect_document_id": true
3596736022
},
3596836023
{
3596936024
"source_path": "articles/active-directory/active-directory-saas-customizing-attribute-mappings.md",
35970-
"redirect_url": "/azure/active-directory/manage-apps/customize-application-attributes",
36025+
"redirect_url": "/azure/active-directory/app-provisioning/customize-application-attributes",
3597136026
"redirect_document_id": true
3597236027
},
36028+
{
36029+
"source_path": "articles/active-directory/manage-apps/customize-application-attributes.md",
36030+
"redirect_url": "/azure/active-directory/app-provisioning/customize-application-attributes",
36031+
"redirect_document_id": false
36032+
},
3597336033
{
3597436034
"source_path": "articles/active-directory/active-directory-saas-ie-group-policy.md",
3597536035
"redirect_url": "/azure/active-directory/manage-apps/deploy-access-panel-browser-extension",
@@ -35982,19 +36042,34 @@
3598236042
},
3598336043
{
3598436044
"source_path": "articles/active-directory/active-directory-saas-provisioning-reporting.md",
35985-
"redirect_url": "/azure/active-directory/manage-apps/check-status-user-account-provisioning",
36045+
"redirect_url": "/azure/active-directory/app-provisioning/check-status-user-account-provisioning",
3598636046
"redirect_document_id": true
3598736047
},
36048+
{
36049+
"source_path": "articles/active-directory/manage-apps/check-status-user-account-provisioning.md",
36050+
"redirect_url": "/azure/active-directory/app-provisioning/check-status-user-account-provisioning",
36051+
"redirect_document_id": false
36052+
},
3598836053
{
3598936054
"source_path": "articles/active-directory/active-directory-saas-scoping-filters.md",
35990-
"redirect_url": "/azure/active-directory/manage-apps/define-conditional-rules-for-provisioning-user-accounts",
36055+
"redirect_url": "/azure/active-directory/app-provisioning/define-conditional-rules-for-provisioning-user-accounts",
3599136056
"redirect_document_id": true
3599236057
},
36058+
{
36059+
"source_path": "articles/active-directory/manage-apps/define-conditional-rules-for-provisioning-user-accounts.md",
36060+
"redirect_url": "/azure/active-directory/app-provisioning/define-conditional-rules-for-provisioning-user-accounts",
36061+
"redirect_document_id": false
36062+
},
3599336063
{
3599436064
"source_path": "articles/active-directory/active-directory-saas-writing-expressions-for-attribute-mappings.md",
35995-
"redirect_url": "/azure/active-directory/manage-apps/functions-for-customizing-application-data",
36065+
"redirect_url": "/azure/active-directory/app-provisioning/functions-for-customizing-application-data",
3599636066
"redirect_document_id": true
3599736067
},
36068+
{
36069+
"source_path": "articles/active-directory/manage-apps/functions-for-customizing-application-data.md",
36070+
"redirect_url": "/azure/active-directory/app-provisioning/functions-for-customizing-application-data",
36071+
"redirect_document_id": false
36072+
},
3599836073
{
3599936074
"source_path": "articles/active-directory/application-access-assignment-how-to-add-assignment.md",
3600036075
"redirect_url": "/azure/active-directory/manage-apps/methods-for-assigning-users-and-groups",
@@ -36122,34 +36197,74 @@
3612236197
},
3612336198
{
3612436199
"source_path": "articles/active-directory/application-provisioning-config-problem-no-users-provisioned.md",
36125-
"redirect_url": "/azure/active-directory/manage-apps/application-provisioning-config-problem-no-users-provisioned",
36200+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-config-problem-no-users-provisioned",
3612636201
"redirect_document_id": true
3612736202
},
36203+
{
36204+
"source_path": "articles/active-directory/manage-apps/application-provisioning-config-problem-no-users-provisioned.md",
36205+
"redirect_url": "azure/active-directory/app-provisioning/application-provisioning-config-problem-no-users-provisioned",
36206+
"redirect_document_id": false
36207+
},
3612836208
{
3612936209
"source_path": "articles/active-directory/application-provisioning-config-problem-storage-limit.md",
36130-
"redirect_url": "/azure/active-directory/manage-apps/application-provisioning-config-problem-storage-limit",
36210+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-config-problem-storage-limit",
3613136211
"redirect_document_id": true
3613236212
},
36213+
{
36214+
"source_path": "articles/active-directory/manage-apps/application-provisioning-config-problem-storage-limit.md",
36215+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-config-problem-storage-limit",
36216+
"redirect_document_id": false
36217+
},
3613336218
{
3613436219
"source_path": "articles/active-directory/application-provisioning-config-problem-wrong-users-provisioned.md",
36135-
"redirect_url": "/azure/active-directory/manage-apps/application-provisioning-config-problem-wrong-users-provisioned",
36220+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-config-problem-wrong-users-provisioned",
3613636221
"redirect_document_id": true
3613736222
},
36223+
{
36224+
"source_path": "articles/active-directory/manage-apps/application-provisioning-config-problem-wrong-users-provisioned.md",
36225+
"redirect_url": "azure/active-directory/app-provisioning/application-provisioning-config-problem-wrong-users-provisioned",
36226+
"redirect_document_id": false
36227+
},
3613836228
{
3613936229
"source_path": "articles/active-directory/application-provisioning-config-problem.md",
36140-
"redirect_url": "/azure/active-directory/manage-apps/application-provisioning-config-problem",
36230+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-config-problem",
3614136231
"redirect_document_id": true
3614236232
},
36233+
{
36234+
"source_path": "articles/active-directory/manage-apps/application-provisioning-config-problem.md",
36235+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-config-problem",
36236+
"redirect_document_id": false
36237+
},
36238+
{
36239+
"source_path": "articles/active-directory/manage-apps/application-provisioning-configure-api.md",
36240+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-configure-api",
36241+
"redirect_document_id": false
36242+
},
36243+
{
36244+
"source_path": "articles/active-directory/manage-apps/application-provisioning-quarantine-status.md",
36245+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-quarantine-status",
36246+
"redirect_document_id": false
36247+
},
3614336248
{
3614436249
"source_path": "articles/active-directory/application-provisioning-when-will-provisioning-finish-specific-user.md",
36145-
"redirect_url": "/azure/active-directory/manage-apps/application-provisioning-when-will-provisioning-finish-specific-user",
36250+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user",
3614636251
"redirect_document_id": true
3614736252
},
36253+
{
36254+
"source_path": "articles/active-directory/manage-apps/application-provisioning-when-will-provisioning-finish-specific-user.md",
36255+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user",
36256+
"redirect_document_id": false
36257+
},
3614836258
{
3614936259
"source_path": "articles/active-directory/application-provisioning-when-will-provisioning-finish.md",
36150-
"redirect_url": "/azure/active-directory/manage-apps/application-provisioning-when-will-provisioning-finish",
36260+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-when-will-provisioning-finish",
3615136261
"redirect_document_id": true
3615236262
},
36263+
{
36264+
"source_path": "articles/active-directory/manage-apps/application-provisioning-when-will-provisioning-finish.md",
36265+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-when-will-provisioning-finish",
36266+
"redirect_document_id": false
36267+
},
3615336268
{
3615436269
"source_path": "articles/active-directory/application-proxy-back-end-kerberos-constrained-delegation-how-to.md",
3615536270
"redirect_url": "/azure/active-directory/manage-apps/application-proxy-back-end-kerberos-constrained-delegation-how-to",

articles/active-directory-b2c/azure-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,12 @@ ms.workload: identity
1111
ms.topic: conceptual
1212
ms.author: marsma
1313
ms.subservice: B2C
14-
ms.date: 02/03/2020
14+
ms.date: 02/05/2020
1515
---
1616

1717
# Monitor Azure AD B2C with Azure Monitor
1818

19-
Use Azure Monitor to route Azure Active Directory B2C (Azure AD B2C) usage activity events to different monitoring solutions. You can retain the logs for long-term use or integrate with third-party security information and event management (SIEM) tools to gain insights into your environment.
19+
Use Azure Monitor to route Azure Active Directory B2C (Azure AD B2C) sign-in and [auditing](view-audit-logs.md) logs to different monitoring solutions. You can retain the logs for long-term use or integrate with third-party security information and event management (SIEM) tools to gain insights into your environment.
2020

2121
You can route log events to:
2222

articles/active-directory-b2c/custom-email.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/18/2019
12+
ms.date: 02/05/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -387,6 +387,36 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
387387
</ClaimsProvider>
388388
```
389389

390+
## [Optional] Localize your email
391+
392+
To localize the email, you must send localized strings to SendGrid, or your email provider. For example to localize the email subject, body, your code message, or signature of the email. To do so, you can use the [GetLocalizedStringsTransformation](string-transformations.md) claims transformation to copy localized strings into claim types. In the `GenerateSendGridRequestBody` claims transformation, which generates the JSON payload, uses input claims that contain the localized strings.
393+
394+
1. In your policy define the following string claims: subject, message, codeIntro and signature.
395+
1. Define a [GetLocalizedStringsTransformation](string-transformations.md) claims transformation to substitute localized string values into the claims from step 1.
396+
1. Change the `GenerateSendGridRequestBody` claims transformation to use input claims with the following XML snippet.
397+
1. Update your SendGrind template to use dynamic parameters in place of all the strings which will be localized by Azure AD B2C.
398+
399+
```XML
400+
<ClaimsTransformation Id="GenerateSendGridRequestBody" TransformationMethod="GenerateJson">
401+
<InputClaims>
402+
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.to.0.email" />
403+
<InputClaim ClaimTypeReferenceId="subject" TransformationClaimType="personalizations.0.dynamic_template_data.subject" />
404+
<InputClaim ClaimTypeReferenceId="otp" TransformationClaimType="personalizations.0.dynamic_template_data.otp" />
405+
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.dynamic_template_data.email" />
406+
<InputClaim ClaimTypeReferenceId="message" TransformationClaimType="personalizations.0.dynamic_template_data.message" />
407+
<InputClaim ClaimTypeReferenceId="codeIntro" TransformationClaimType="personalizations.0.dynamic_template_data.codeIntro" />
408+
<InputClaim ClaimTypeReferenceId="signature" TransformationClaimType="personalizations.0.dynamic_template_data.signature" />
409+
</InputClaims>
410+
<InputParameters>
411+
<InputParameter Id="template_id" DataType="string" Value="d-1234567890" />
412+
<InputParameter Id="from.email" DataType="string" Value="[email protected]" />
413+
</InputParameters>
414+
<OutputClaims>
415+
<OutputClaim ClaimTypeReferenceId="sendGridReqBody" TransformationClaimType="outputClaim" />
416+
</OutputClaims>
417+
</ClaimsTransformation>
418+
```
419+
390420
## Next steps
391421

392422
You can find an example of a custom email verification policy on GitHub:

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant-custom.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 09/13/2019
12+
ms.date: 02/06/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -60,6 +60,19 @@ You need to store the application key that you created in your Azure AD B2C tena
6060
1. For **Key usage**, select `Signature`.
6161
1. Select **Create**.
6262
63+
## Configuring optional claims
64+
65+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
66+
67+
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
68+
1. From the **Manage** section, select **App registrations**.
69+
1. Select the application you want to configure optional claims for in the list.
70+
1. From the **Manage** section, select **Token configuration (preview)**.
71+
1. Select **Add optional claim**.
72+
1. Select the token type you want to configure.
73+
1. Select the optional claims to add.
74+
1. Click **Add**.
75+
6376
## Add a claims provider
6477
6578
If you want users to sign in by using Azure AD, you need to define Azure AD as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated.
186 KB
Loading

0 commit comments

Comments
 (0)