Skip to content

Commit 79b5f12

Browse files
authored
Merge branch 'main' into josefree-main-262852
2 parents e86e733 + ab68d6f commit 79b5f12

File tree

3,940 files changed

+39130
-31854
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,940 files changed

+39130
-31854
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1264,6 +1264,7 @@
12641264
"articles/iot-hub/.openpublishing.redirection.iot-hub.json",
12651265
"articles/iot-operations/.openpublishing.redirection.iot-operations.json",
12661266
"articles/load-testing/.openpublishing.redirection.azure-load-testing.json",
1267+
"articles/lab-services/.openpublishing.redirection.lab-services.json",
12671268
"articles/logic-apps/.openpublishing.redirection.logic-apps.json",
12681269
"articles/machine-learning/.openpublishing.redirection.machine-learning.json",
12691270
"articles/machine-learning/v1/.openpublishing.redirection.machine-learning-v1.json",

.openpublishing.redirection.app-service.json

Lines changed: 2642 additions & 147 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.azure-monitor.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6573,7 +6573,11 @@
65736573
"source_path_from_root": "/articles/azure-monitor/logs/data-collection-rule-sample-custom-logs.md",
65746574
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-samples",
65756575
"redirect_document_id": false
6576-
}
6577-
6576+
},
6577+
{
6578+
"source_path_from_root": "/articles/azure-monitor/agents/data-collection-rule-sample-agent.md",
6579+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-samples",
6580+
"redirect_document_id": false
6581+
}
65786582
]
65796583
}

.openpublishing.redirection.json

Lines changed: 2395 additions & 5730 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -369,6 +369,11 @@
369369
"source_path_from_root": "/articles/virtual-desktop/publish-applications.md",
370370
"redirect_url": "/azure/virtual-desktop/publish-applications-stream-remoteapp",
371371
"redirect_document_id": false
372+
},
373+
{
374+
"source_path_from_root": "/articles/virtual-desktop/autoscale-new-existing-host-pool.md",
375+
"redirect_url": "/azure/virtual-desktop/autoscale-scaling-plan",
376+
"redirect_document_id": true
372377
}
373378
]
374379
}

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,10 @@
11
---
22
title: Token enrichment - Azure Active Directory B2C
33
description: Enrich tokens with claims from external identity data sources using APIs or outbound webhooks.
4-
54
author: garrodonnell
65
manager: CelesteDG
7-
86
ms.service: active-directory
9-
10-
ms.custom:
117
ms.topic: how-to
12-
138
ms.date: 01/17/2023
149
ms.author: godonnell
1510
ms.subservice: B2C

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: reference
12-
ms.date: 01/11/2024
12+
ms.date: 01/17/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

1616

17-
#Customer intent: As a developer using Azure Active Directory B2C custom policies, I want to understand how to use claim resolvers in my technical profiles, so that I can provide context information about authorization requests and populate claims with dynamic values.
17+
#Customer intent: As a developer using Azure AD B2C custom policies, I want to understand how to use claim resolvers in my technical profiles, so that I can provide context information about authorization requests and populate claims with dynamic values.
1818

1919
---
2020

@@ -122,6 +122,17 @@ Any parameter name included as part of an OIDC or OAuth2 request can be mapped t
122122
| {OAUTH-KV:loyalty_number} | A query string parameter. | 1234 |
123123
| {OAUTH-KV:any custom query string} | A query string parameter. | N/A |
124124

125+
## SAML key-value parameters
126+
127+
In a SAML authentication request, any parameter name that's included in the request, but isn’t specific to the protocol (such as SAMLRequest) can be mapped to a claim in the user journey. For example, the request may include a custom parameter such as `username`. This applies to both SP-Initiated and IDP-Initiated SAML requests.
128+
129+
| Claim | Description | Example |
130+
| ----- | ----------------------- | --------|
131+
| {SAML-KV:username} | A query string or POST body parameter. | [email protected] |
132+
| {SAML-KV:loyalty_number} | A query string or POST body parameter. | 1234 |
133+
| {SAML-KV:any custom query string} | A query string or POST body parameter. | N/A |
134+
135+
125136
## SAML
126137

127138
The following table lists the claim resolvers with information about the SAML authorization request:

articles/active-directory-b2c/conditional-access-identity-protection-overview.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,15 @@
11
---
22
title: Identity Protection and Conditional Access in Azure AD B2C
33
description: Learn how Identity Protection gives you visibility into risky sign-ins and risk detections. Find out how and Conditional Access lets you enforce organizational policies based on risk events in your Azure AD B2C tenants.
4-
54
ms.service: active-directory
65
ms.subservice: conditional-access
76
ms.topic: overview
87
ms.date: 01/11/2024
9-
108
ms.author: kengaderdus
119
author: kengaderdus
1210
manager: CelesteDG
13-
1411
ms.collection: M365-identity-device-management
1512

16-
1713
#Customer intent: As an Azure AD B2C application owner, I want to enhance the security of my applications by using Identity Protection and Conditional Access, so that I can detect and respond to risky authentications and enforce organizational policies.
1814

1915
---

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Configure authentication in a sample Node.js web application by using Azure Active Directory B2C (Azure AD B2C)
3-
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Node.js web application.
3+
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Node.js web application.
44
titleSuffix: Azure AD B2C
55

66
author: kengaderdus
77
manager: CelesteDG
88
ms.service: active-directory
99

10-
ms.custom: devx-track-js, devx-track-linux
10+
ms.custom: devx-track-js, linux-related-content
1111
ms.topic: how-to
1212
ms.date: 01/11/2024
1313
ms.author: kengaderdus
@@ -20,14 +20,14 @@ ms.subservice: B2C
2020

2121
# Configure authentication in a sample Node.js web application by using Azure Active Directory B2C
2222

23-
This sample article uses a sample Node.js application to show how to add Azure Active Directory B2C (Azure AD B2C) authentication to a Node.js web application. The sample application enables users to sign in, sign out, update profile and reset password using Azure AD B2C user flows. The sample web application uses [Microsoft Authentication Library (MSAL) for Node](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node) to handle authentication and authorization.
23+
This sample article uses a sample Node.js application to show how to add Azure Active Directory B2C (Azure AD B2C) authentication to a Node.js web application. The sample application enables users to sign in, sign out, update profile and reset password using Azure AD B2C user flows. The sample web application uses [Microsoft Authentication Library (MSAL) for Node](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node) to handle authentication and authorization.
2424

2525
In this article, you’ll do the following tasks:
2626

2727
- Register a web application in the Azure portal.
2828
- Create combined **Sign in and sign up**, **Profile editing**, and **Password reset** user flows for the app in the Azure portal.
2929
- Update a sample Node application to use your own Azure AD B2C application and user flows.
30-
- Test the sample application.
30+
- Test the sample application.
3131

3232
## Prerequisites
3333

@@ -37,15 +37,15 @@ In this article, you’ll do the following tasks:
3737

3838
## Step 1: Configure your user flows
3939

40-
[!INCLUDE [active-directory-b2c-app-integration-add-user-flow](../../includes/active-directory-b2c-app-integration-add-user-flow.md)]
40+
[!INCLUDE [active-directory-b2c-app-integration-add-user-flow](../../includes/active-directory-b2c-app-integration-add-user-flow.md)]
4141

4242
## Step 2: Register a web application
4343

44-
To enable your application sign in with Azure AD B2C, register your app in the Azure AD B2C directory. The app registration establishes a trust relationship between the app and Azure AD B2C.
44+
To enable your application sign in with Azure AD B2C, register your app in the Azure AD B2C directory. The app registration establishes a trust relationship between the app and Azure AD B2C.
4545

46-
During app registration, you'll specify the *Redirect URI*. The redirect URI is the endpoint to which the user is redirected by Azure AD B2C after they authenticate with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, that uniquely identifies your app. After your app is registered, Azure AD B2C uses both the application ID, and the redirect URI to create authentication requests.
46+
During app registration, you'll specify the *Redirect URI*. The redirect URI is the endpoint to which the user is redirected by Azure AD B2C after they authenticate with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, that uniquely identifies your app. After your app is registered, Azure AD B2C uses both the application ID, and the redirect URI to create authentication requests.
4747

48-
### Step 2.1: Register the app
48+
### Step 2.1: Register the app
4949

5050
To register the web app, follow these steps:
5151

@@ -54,7 +54,7 @@ To register the web app, follow these steps:
5454
1. In the Azure portal, search for and select **Azure AD B2C**.
5555
1. Select **App registrations**, and then select **New registration**.
5656
1. Under **Name**, enter a name for the application (for example, *webapp1*).
57-
1. Under **Supported account types**, select **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**.
57+
1. Under **Supported account types**, select **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**.
5858
1. Under **Redirect URI**, select **Web** and then, in the URL box, enter `http://localhost:3000/redirect`.
5959
1. Under **Permissions**, select the **Grant admin consent to openid and offline_access permissions** checkbox.
6060
1. Select **Register**.
@@ -106,7 +106,7 @@ The `views` folder contains Handlebars files for the application's user interfac
106106

107107
## Step 5: Configure the sample web app
108108

109-
Open your web app in a code editor such as Visual Studio Code. Under the project root folder, open the *.env* file. This file contains information about your Azure AD B2C identity provider. Update the following app settings properties:
109+
Open your web app in a code editor such as Visual Studio Code. Under the project root folder, open the *.env* file. This file contains information about your Azure AD B2C identity provider. Update the following app settings properties:
110110

111111
|Key |Value |
112112
|---------|---------|
@@ -129,7 +129,7 @@ Your final configuration file should look like the following sample:
129129
You can now test the sample app. You need to start the Node server and access it through your browser on `http://localhost:3000`.
130130

131131
1. In your terminal, run the following code to start the Node.js web server:
132-
132+
133133
```bash
134134
node index.js
135135
```
@@ -147,19 +147,19 @@ You can now test the sample app. You need to start the Node server and access it
147147

148148
### Test profile editing
149149

150-
1. After you sign in, select **Edit profile**.
151-
1. Enter new changes as required, and then select **Continue**. You should see the page with sign-in status with the new changes, such as **Given Name**.
150+
1. After you sign in, select **Edit profile**.
151+
1. Enter new changes as required, and then select **Continue**. You should see the page with sign-in status with the new changes, such as **Given Name**.
152152

153153
### Test password reset
154154

155-
1. After you sign in, select **Reset password**.
155+
1. After you sign in, select **Reset password**.
156156
1. In the next dialog that appears, you can cancel the operation by selecting **Cancel**. Alternatively, enter your email address, and then select **Send verification code**. You'll receive a verification code to your email account. Copy the verification code in your email, enter it into the password reset dialog, and then select **Verify code**.
157157
1. Select **Continue**.
158158
1. Enter your new password, confirm it, and then select **Continue**. You should see the page that shows sign-in status.
159159
160160
### Test sign-out
161161
162-
After you sign in, select **Sign out**. You should see the page that has a **Sign in** button.
162+
After you sign in, select **Sign out**. You should see the page that has a **Sign in** button.
163163
164164
## Next steps
165165

articles/active-directory-b2c/configure-authentication-sample-python-web-app.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -86,24 +86,21 @@ Extract the sample file to a folder where the total length of the path is 260 or
8686

8787
In the project's root directory, follow these steps:
8888

89-
1. Rename the *app_config.py* file to *app_config.py.OLD*.
90-
1. Rename the *app_config_b2c.py* file to *app_config.py*. This file contains information about your Azure AD B2C identity provider.
91-
92-
1. Create an `.env` file in the root folder of the project using `.env.sample.b2c` as a guide.
89+
1. Create an `.env` file in the root folder of the project using `.env.sample` as a guide.
9390

9491
```shell
9592
FLASK_DEBUG=True
96-
TENANT_NAME=<tenant name>
93+
B2C_TENANT_NAME=<tenant name>
9794
CLIENT_ID=<client id>
9895
CLIENT_SECRET=<client secret>
99-
SIGNUPSIGNIN_USER_FLOW=B2C_1_profile_editing
100-
EDITPROFILE_USER_FLOW=B2C_1_reset_password
101-
RESETPASSWORD_USER_FLOW=B2C_1_signupsignin1
96+
SIGNUPSIGNIN_USER_FLOW=B2C_1_signupsignin1
97+
EDITPROFILE_USER_FLOW=B2C_1_profile_editing
98+
RESETPASSWORD_USER_FLOW=B2C_1_reset_password
10299
```
103100

104101
|Key |Value |
105102
|---------|---------|
106-
|`TENANT_NAME`| The first part of your Azure AD B2C [tenant name](tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `contoso`). |
103+
|`B2C_TENANT_NAME`| The first part of your Azure AD B2C [tenant name](tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `contoso`). |
107104
|`CLIENT_ID`| The web API application ID from [step 2.1](#step-21-register-the-app).|
108105
|`CLIENT_SECRET`| The client secret value you created in [step 2.2](#step-22-create-a-web-app-client-secret). |
109106
|`*_USER_FLOW`|The user flows you created in [step 1](#step-1-configure-your-user-flow).|

0 commit comments

Comments
 (0)