Skip to content

Commit 74dd976

Browse files
committed
Resolving conflicts
2 parents e0b9681 + 668f889 commit 74dd976

File tree

920 files changed

+11997
-6915
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

920 files changed

+11997
-6915
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/backup/backup-center-community.md",
5+
"redirect_url": "/azure/backup/backup-center-overview",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/api-management/developer-portal-widget-contribution-guidelines.md",
510
"redirect_url": "/azure/api-management/developer-portal-extend-custom-functionality",
@@ -7018,6 +7023,16 @@
70187023
"redirect_url": "/azure/azure-functions/functions-event-grid-blob-trigger",
70197024
"redirect_document_id": false
70207025
},
7026+
{
7027+
"source_path_from_root": "/articles/azure-monitor/app/azure-functions-supported-features.md",
7028+
"redirect_url": "/azure/azure-functions/functions-monitoring",
7029+
"redirect_document_id": false
7030+
},
7031+
{
7032+
"source_path_from_root": "/articles/azure-functions/azure-functions-az-redundancy.md",
7033+
"redirect_url": "/azure/reliability/reliability-functions",
7034+
"redirect_document_id": false
7035+
},
70217036
{
70227037
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
70237038
"redirect_url": "/azure/azure-government",
@@ -18273,6 +18288,11 @@
1827318288
"redirect_url": "/azure/sentinel/sap/sap-solution-log-reference",
1827418289
"redirect_document_id": false
1827518290
},
18291+
{
18292+
"source_path_from_root": "/articles/sentinel/monitor-sentinel-health.md",
18293+
"redirect_url": "/azure/sentinel/enable-monitoring",
18294+
"redirect_document_id": false
18295+
},
1827618296
{
1827718297
"source_path_from_root": "/articles/service-bus/index.md",
1827818298
"redirect_url": "/azure/service-bus-messaging/index",

articles/active-directory-b2c/configure-authentication-sample-react-spa-app.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 08/25/2022
10+
ms.date: 11/17/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -167,13 +167,12 @@ export const protectedResources = {
167167
Now that the web API is registered and you've defined its scopes, configure the web API code to work with your Azure AD B2C tenant. Open the *3-Authorization-II/2-call-api-b2c/API* folder with Visual Studio Code.
168168

169169

170-
In the sample folder, open the *config.json* file. This file contains information about your Azure AD B2C identity provider. The web API app uses this information to validate the access token that the web app passes as a bearer token. Update the following properties of the app settings:
170+
In the sample folder, open the *authConfig.js* file. This file contains information about your Azure AD B2C identity provider. The web API app uses this information to validate the access token that the web app passes as a bearer token. Update the following properties of the app settings:
171171

172172
|Section |Key |Value |
173173
|---------|---------|---------|
174174
|credentials|tenantName| Your Azure AD B2C [domain/tenant name](tenant-management.md#get-your-tenant-name). For example: `contoso.ommicrosoft.com`.|
175175
|credentials|clientID| The web API application ID from step [2.1](#21-register-the-web-api-application). In the [earlier diagram](#app-registration), it's the application with **App ID: 2**.|
176-
|credentials| issuer| (Optional) The token issuer `iss` claim value. Azure AD B2C by default returns the token in the following format: `https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/`. Replace `<your-tenant-name>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). Replace `<your-tenant-ID>` with your [Azure AD B2C tenant ID](tenant-management.md#get-your-tenant-id). |
177176
|policies|policyName|The user flow or custom policy that you created in [step 1](#step-1-configure-your-user-flow). If your application uses multiple user flows or custom policies, specify only one. For example, use the sign-up or sign-in user flow.|
178177
| protectedRoutes| scopes | The scopes of your web API application registration from [step 2.5](#25-grant-permissions). |
179178

@@ -184,7 +183,6 @@ Your final configuration file should look like the following JSON:
184183
"credentials": {
185184
"tenantName": "<your-tenant-name>.ommicrosoft.com",
186185
"clientID": "<your-webapi-application-ID>",
187-
"issuer": "https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/"
188186
},
189187
"policies": {
190188
"policyName": "b2c_1_susi"

articles/active-directory-b2c/error-codes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -144,6 +144,7 @@ The following errors can be returned by the Azure Active Directory B2C service.
144144
| `AADB2C90288` | UserJourney with ID '{0}' referenced in TechnicalProfile '{1}' for refresh token redemption for tenant '{2}' does not exist in policy '{3}' or any of its base policies. |
145145
| `AADB2C90287` | The request contains invalid redirect URI '{0}'.| [Register a web application](tutorial-register-applications.md), [Sending authentication requests](openid-connect.md#send-authentication-requests) |
146146
| `AADB2C90289` | We encountered an error connecting to the identity provider. Please try again later. | [Add an IDP to your Azure AD B2C tenant](add-identity-provider.md) |
147+
| `AADB2C90289` | We encountered an 'invalid_client' error connecting to the identity provider. Please try again later. | Make sure the application secret is correct or it hasn't expired. Learn how to [Register apps](register-apps.md).|
147148
| `AADB2C90296` | Application has not been configured correctly. Please contact administrator of the site you are trying to access. | [Register a web application](tutorial-register-applications.md) |
148149
| `AADB2C99005` | The request contains an invalid scope parameter which includes an illegal character '{0}'. | [Web sign-in with OpenID Connect](openid-connect.md) |
149150
| `AADB2C99006` | Azure AD B2C cannot find the extensions app with app ID '{0}'. Please visit https://go.microsoft.com/fwlink/?linkid=851224 for more information. | [Azure AD B2C extensions app](extensions-app.md) |

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/10/2022
12+
ms.date: 11/17/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -133,7 +133,6 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
133133
</CryptographicKeys>
134134
<OutputClaims>
135135
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="oid"/>
136-
<OutputClaim ClaimTypeReferenceId="tenantId" PartnerClaimType="tid"/>
137136
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name" />
138137
<OutputClaim ClaimTypeReferenceId="surName" PartnerClaimType="family_name" />
139138
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="name" />
@@ -208,4 +207,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
208207
- Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).
209208
- Check out the Azure AD multi-tenant federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#azure-active-directory), and how to pass Azure AD access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#azure-active-directory-with-access-token)
210209

211-
::: zone-end
210+
::: zone-end

articles/active-directory-b2c/relyingparty.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 06/26/2022
11+
ms.date: 11/17/2022
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -144,7 +144,8 @@ The **UserJourneyBehaviors** element contains the following elements:
144144
| JourneyFraming | 0:1| Allows the user interface of this policy to be loaded in an iframe. |
145145
| ScriptExecution| 0:1| The supported [JavaScript](javascript-and-page-layout.md) execution modes. Possible values: `Allow` or `Disallow` (default).
146146

147-
147+
When you use the above elements, you need add them to your **UserJourneyBehaviors** element in the order specified in the table. For example, the **JourneyInsights** element must be added before (above) the **ScriptExecution** element.
148+
148149
### SingleSignOn
149150

150151
The **SingleSignOn** element contains the following attributes:

articles/active-directory-b2c/service-limits.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
1111
ms.author: kengaderdus
12-
ms.date: 10/27/2022
12+
ms.date: 11/14/2022
1313
ms.subservice: B2C
1414
zone_pivot_groups: b2c-policy-type
1515
---
@@ -168,7 +168,7 @@ The following table lists the administrative configuration limits in the Azure A
168168
|Levels of [inheritance](custom-policy-overview.md#inheritance-model) in custom policies |10 |
169169
|Number of policies per Azure AD B2C tenant (user flows + custom policies) |200 |
170170
|Maximum policy file size |1024 KB |
171-
|Number of API connectors per tenant |19 |
171+
|Number of API connectors per tenant |20 |
172172

173173
<sup>1</sup> See also [Azure AD service limits and restrictions](../active-directory/enterprise-users/directory-service-limits-restrictions.md).
174174

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ The sign-up and sign-in user flow handles both sign-up and sign-in experiences w
7676

7777
1. Enter a **Name** for the user flow. For example, *signupsignin1*.
7878
1. For **Identity providers**, select **Email signup**.
79-
1. For **User attributes and claims**, choose the claims and attributes that you want to collect and send from the user during sign-up. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
79+
1. For **User attributes and token claims**, choose the claims and attributes that you want to collect and send from the user during sign-up. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
8080

8181
![Attributes and claims selection page with three claims selected](./media/tutorial-create-user-flows/signup-signin-attributes.png)
8282

articles/active-directory/app-provisioning/hr-attribute-retrieval-issues.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,9 @@ ms.reviewer: chmutali
4040

4141
**Suggested workarounds**
4242
* **Option 1: Using Workday Provisioning Groups**: Check if the calculated field value can be represented as a provisioning group in Workday. Using the same logic that is used for the calculated field, your Workday Admin may be able to assign a Provisioning Group to the user. Reference Workday doc that requires Workday login: [Set Up Account Provisioning Groups](https://doc.workday.com/reader/3DMnG~27o049IYFWETFtTQ/keT9jI30zCzj4Nu9pJfGeQ). Once configured, this Provisioning Group assignment can be [retrieved in the provisioning job](../app-provisioning/workday-integration-reference.md#example-3-retrieving-provisioning-group-assignments) and used in attribute mappings and scoping filter.
43-
* **Option 2: Using Workday Custom IDs**: Check if the calculated field value can be represented as a Custom ID on the Worker Profile. Use `Maintain Custom ID Type` task in Workday to define a new type and populate values in this custom ID. Make sure the [Workday ISU account used for the integration](../saas-apps/workday-inbound-tutorial.md#configuring-domain-security-policy-permissions) has domain security permission for `Person Data: ID Information`. For example, you can define "External_Payroll_ID" as a custom ID in Workday and retrieved it using the XPATH: `wd:Worker/wd:Worker_Data/wd:Personal_Data/wd:Identification_Data/wd:Custom_ID/wd:Custom_ID_Data[wd:ID_Type_Reference/wd:ID[@wd:type=\"Custom_ID_Type_ID\"]=\"External_Payroll_ID\"]/wd:ID/text()`
43+
* **Option 2: Using Workday Custom IDs**: Check if the calculated field value can be represented as a Custom ID on the Worker Profile. Use `Maintain Custom ID Type` task in Workday to define a new type and populate values in this custom ID. Make sure the [Workday ISU account used for the integration](../saas-apps/workday-inbound-tutorial.md#configuring-domain-security-policy-permissions) has domain security permission for `Person Data: ID Information`.
44+
* Example 1: Let's say you have a calculated field called Payroll ID. You can define "External_Payroll_ID" as a custom ID in Workday and retrieve it using an XPATH that uses "Custom_ID_Type_ID" as the selecting mechanism: `wd:Worker/wd:Worker_Data/wd:Personal_Data/wd:Identification_Data/wd:Custom_ID/wd:Custom_ID_Data[string(wd:ID_Type_Reference/wd:ID[@wd:type='Custom_ID_Type_ID']='External_Payroll_ID']/wd:ID/text()`
45+
* Example 2: Let's say you have a calculated field called Badge ID. You can define "Badge ID" as a custom ID in Workday and retrieve the "Descriptor" attribute corresponding to it with an XPATH that uses "wd:ID_Type_Reference/@wd:Descriptor" as the selecting mechanism: `wd:Worker/wd:Worker_Data/wd:Personal_Data/wd:Identification_Data/wd:Custom_ID[string(wd:Custom_ID_Data/wd:ID_Type_Reference/@wd:Descriptor)='BADGE ID']/wd:Custom_ID_Reference/@wd:Descriptor`
4446

4547

4648
## Next steps

articles/active-directory/app-proxy/active-directory-app-proxy-protect-ndes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/27/2021
11+
ms.date: 11/17/2022
1212
ms.author: kenwith
1313
---
1414

articles/active-directory/app-proxy/application-proxy-back-end-kerberos-constrained-delegation-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 04/27/2021
11+
ms.date: 11/17/2022
1212
ms.author: kenwith
1313
ms.reviewer: asteen, ashishj
1414
---

0 commit comments

Comments
 (0)