Skip to content

Commit 75c4fda

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents bfed7a1 + d40ffda commit 75c4fda

File tree

165 files changed

+5388
-710
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

165 files changed

+5388
-710
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -381,6 +381,12 @@
381381
"branch": "main",
382382
"branch_mapping": {}
383383
},
384+
{
385+
"path_to_root": "azureml-examples-cli-preview",
386+
"url": "https://github.com/azure/azureml-examples",
387+
"branch": "cli-preview",
388+
"branch_mapping": {}
389+
},
384390
{
385391
"path_to_root": "samples-qnamaker-nodejs",
386392
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-nodejs",

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -298,9 +298,8 @@
298298
- name: Collect logs using Application Insights
299299
href: troubleshoot-with-application-insights.md
300300
displayName: troubleshooting, app insights
301-
- name: Policy validation
301+
- name: Troubleshooting custom policies
302302
href: troubleshoot-custom-policies.md
303-
displayName: troubleshooting
304303
- name: Reference
305304
items:
306305
- name: TrustFrameworkPolicy

articles/active-directory-b2c/force-password-reset.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ To enable the **Forced password reset** setting in a sign-up or sign-in user flo
8888
1. In the Azure portal, search for and select **Azure AD B2C**.
8989
1. Under **Policies**, select **Identity Experience Framework**.
9090
1. Select the `B2C_1A_signup_signin_Custom_ForcePasswordReset` policy to open it.
91-
1. For **Application**, select a web application that you [previously registered](troubleshoot-custom-policies.md#troubleshoot-the-runtime). The **Reply URL** should show `https://jwt.ms`.
91+
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
9292
1. Select the **Run now** button.
9393
1. Sign in with the user account for which you reset the password.
9494
1. You now must change the password for the user. Change the password and select **Continue**. The token is returned to `https://jwt.ms` and should be displayed to you.

articles/active-directory-b2c/identity-provider-amazon.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ You can define an Amazon account as a claims provider by adding it to the **Clai
171171
## Test your custom policy
172172

173173
1. Select your relying party policy, for example `B2C_1A_signup_signin`.
174-
1. For **Application**, select a web application that you [previously registered](troubleshoot-custom-policies.md#troubleshoot-the-runtime). The **Reply URL** should show `https://jwt.ms`.
174+
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
175175
1. Select the **Run now** button.
176176
1. From the sign-up or sign-in page, select **Amazon** to sign in with Amazon account.
177177

articles/active-directory-b2c/identity-provider-apple-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -247,7 +247,7 @@ You can define an Apple ID as a claims provider by adding it to the **ClaimsProv
247247
## Test your custom policy
248248

249249
1. Select your relying party policy, for example `B2C_1A_signup_signin`.
250-
1. For **Application**, select a web application that you [previously registered](troubleshoot-custom-policies.md#troubleshoot-the-runtime). The **Reply URL** should show `https://jwt.ms`.
250+
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
251251
1. Select the **Run now** button.
252252
1. From the sign-up or sign-in page, select **Apple** to sign in with Apple ID.
253253

articles/active-directory-b2c/identity-provider-azure-ad-b2c.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ You can define Azure AD B2C as a claims provider by adding Azure AD B2C to the *
225225
## Test your custom policy
226226

227227
1. Select your relying party policy, for example `B2C_1A_signup_signin`.
228-
1. For **Application**, select a web application that you [previously registered](troubleshoot-custom-policies.md#troubleshoot-the-runtime). The **Reply URL** should show `https://jwt.ms`.
228+
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
229229
1. Select the **Run now** button.
230230
1. From the sign-up or sign-in page, select **Fabrikam** to sign in with the other Azure AD B2C tenant.
231231

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -187,7 +187,7 @@ Perform these steps for each Azure AD tenant that should be used to sign in:
187187
## Test your custom policy
188188

189189
1. Select your relying party policy, for example `B2C_1A_signup_signin`.
190-
1. For **Application**, select a web application that you [previously registered](troubleshoot-custom-policies.md#troubleshoot-the-runtime). The **Reply URL** should show `https://jwt.ms`.
190+
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
191191
1. Select the **Run now** button.
192192
1. From the sign-up or sign-in page, select **Common AAD** to sign in with Azure AD account.
193193

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,7 @@ To get a token from the Azure AD endpoint, you need to define the protocols that
226226
## Test your custom policy
227227

228228
1. Select your relying party policy, for example `B2C_1A_signup_signin`.
229-
1. For **Application**, select a web application that you [previously registered](troubleshoot-custom-policies.md#troubleshoot-the-runtime). The **Reply URL** should show `https://jwt.ms`.
229+
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
230230
1. Select the **Run now** button.
231231
1. From the sign-up or sign-in page, select **Contoso Employee** to sign in with Azure AD Contoso account.
232232

articles/active-directory-b2c/identity-provider-generic-saml.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ Open a browser and navigate to the URL. Make sure you type the correct URL and t
224224
1. In the Azure portal, search for and select **Azure AD B2C**.
225225
1. Under **Policies**, select **Identity Experience Framework**
226226
1. Select your relying party policy, for example `B2C_1A_signup_signin`.
227-
1. For **Application**, select a web application that you [previously registered](troubleshoot-custom-policies.md#troubleshoot-the-runtime). The **Reply URL** should show `https://jwt.ms`.
227+
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
228228
1. Select the **Run now** button.
229229
1. From the sign-up or sign-in page, select **Contoso** to sign in with Contoso account.
230230

articles/active-directory-b2c/identity-provider-github.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,7 @@ The GitHub technical profile requires the **CreateIssuerUserId** claim transform
204204
## Test your custom policy
205205

206206
1. Select your relying party policy, for example `B2C_1A_signup_signin`.
207-
1. For **Application**, select a web application that you [previously registered](troubleshoot-custom-policies.md#troubleshoot-the-runtime). The **Reply URL** should show `https://jwt.ms`.
207+
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
208208
1. Select the **Run now** button.
209209
1. From the sign-up or sign-in page, select **GitHub** to sign in with GitHub account.
210210

0 commit comments

Comments
 (0)