Skip to content

Commit 7b0325f

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into current
2 parents bba17bc + 6661925 commit 7b0325f

File tree

3,963 files changed

+57646
-37929
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,963 files changed

+57646
-37929
lines changed

.openpublishing.redirection.json

Lines changed: 702 additions & 66 deletions
Large diffs are not rendered by default.

CODEOWNERS

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,3 +5,4 @@
55
# articles/virtual-machines/windows/ @iainfoulds @cynthn
66
# articles/application-insights/ @SergeyKanzhelev
77
# articles/cosmos-db/ @mimig1
8+
articles/cognitive-services/ @nitinme @tchristiani @cjgronlund

articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/04/2017
11+
ms.date: 08/15/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -109,7 +109,7 @@ You can define Azure AD as a claims provider by adding Azure AD to the `<ClaimsP
109109
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name" />
110110
<OutputClaim ClaimTypeReferenceId="surName" PartnerClaimType="family_name" />
111111
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="name" />
112-
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="contosoAuthentication" />
112+
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
113113
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="AzureADContoso" />
114114
</OutputClaims>
115115
<OutputClaimsTransformations>

articles/active-directory-b2c/active-directory-b2c-setup-sf-app-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 06/11/2017
11+
ms.date: 08/15/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -146,7 +146,7 @@ You need to define Salesforce as a claims provider so users can sign in by using
146146
<OutputClaim ClaimTypeReferenceId="surname" PartnerClaimType="family_name"/>
147147
<OutputClaim ClaimTypeReferenceId="email" PartnerClaimType="email"/>
148148
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="username"/>
149-
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="externalIdp"/>
149+
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication"/>
150150
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="SAMLIdp" />
151151
</OutputClaims>
152152
<OutputClaimsTransformations>

articles/active-directory-b2c/active-directory-b2c-tutorials-desktop-app-webapi.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In this tutorial, you learn how to:
3535

3636
## Register web API
3737

38-
Web API resources need to be registered in your tenant before they can accept and respond to [protected resource requests](../active-directory/develop/active-directory-dev-glossary.md#resource-server) by [client applications](../active-directory/develop/active-directory-dev-glossary.md#client-application) that present an [access token](../active-directory/develop/active-directory-dev-glossary.md#access-token) from Azure Active Directory. Registration establishes the [application and service principal object](../active-directory/develop/active-directory-dev-glossary.md#application-object) in your tenant.
38+
Web API resources need to be registered in your tenant before they can accept and respond to [protected resource requests](../active-directory/develop/developer-glossary.md#resource-server) by [client applications](../active-directory/develop/developer-glossary.md#client-application) that present an [access token](../active-directory/develop/developer-glossary.md#access-token) from Azure Active Directory. Registration establishes the [application and service principal object](../active-directory/develop/developer-glossary.md#application-object) in your tenant.
3939

4040
Log in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
4141

@@ -55,7 +55,7 @@ Log in to the [Azure portal](https://portal.azure.com/) as the global administra
5555
| **Include web app / web API** | Yes | Select **Yes** for a web API. |
5656
| **Allow implicit flow** | Yes | Select **Yes** since the API uses [OpenID Connect sign-in](active-directory-b2c-reference-oidc.md). |
5757
| **Reply URL** | `http://localhost:5000` | Reply URLs are endpoints where Azure AD B2C returns any tokens that your API requests. In this tutorial, the sample web API runs locally (localhost) and listens on port 5000. |
58-
| **App ID URI** | demoapi | The URI uniquely identifies the API in the tenant. This allows you to register multiple APIs per tenant. [Scopes](../active-directory/develop/active-directory-dev-glossary.md#scopes) govern access to the protected API resource and are defined per App ID URI. |
58+
| **App ID URI** | demoapi | The URI uniquely identifies the API in the tenant. This allows you to register multiple APIs per tenant. [Scopes](../active-directory/develop/developer-glossary.md#scopes) govern access to the protected API resource and are defined per App ID URI. |
5959
| **Native client** | No | Since this is a web API and not a native client, select No. |
6060

6161
3. Click **Create** to register your API.
@@ -70,7 +70,7 @@ Registering your web API with Azure AD B2C defines a trust relationship. Since t
7070

7171
## Define and configure scopes
7272

73-
[Scopes](../active-directory/develop/active-directory-dev-glossary.md#scopes) provide a way to govern access to protected resources. Scopes are used by the web API to implement scope-based access control. For example, some users could have both read and write access, whereas other users might have read-only permissions. In this tutorial, you define read and write permissions for the web API.
73+
[Scopes](../active-directory/develop/developer-glossary.md#scopes) provide a way to govern access to protected resources. Scopes are used by the web API to implement scope-based access control. For example, some users could have both read and write access, whereas other users might have read-only permissions. In this tutorial, you define read and write permissions for the web API.
7474

7575
### Define scopes for the web API
7676

@@ -106,7 +106,7 @@ To call a protected web API from an app, you need to grant your app permissions
106106

107107
5. Click **OK**.
108108

109-
Your **My Sample WPF App** is registered to call the protected **My sample Node.js web API**. A user [authenticates](../active-directory/develop/active-directory-dev-glossary.md#authentication) with Azure AD B2C to use the WPF deskop app app. The desktop app obtains an [authorization grant](../active-directory/develop/active-directory-dev-glossary.md#authorization-grant) from Azure AD B2C to access the protected web API.
109+
Your **My Sample WPF App** is registered to call the protected **My sample Node.js web API**. A user [authenticates](../active-directory/develop/developer-glossary.md#authentication) with Azure AD B2C to use the WPF deskop app app. The desktop app obtains an [authorization grant](../active-directory/develop/developer-glossary.md#authorization-grant) from Azure AD B2C to access the protected web API.
110110

111111
## Update web API code
112112

articles/active-directory-b2c/active-directory-b2c-tutorials-desktop-app.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ In this tutorial, you learn how to:
3333

3434
## Register desktop app
3535

36-
Applications need to be [registered](../active-directory/develop/active-directory-dev-glossary.md#application-registration) in your tenant before they can receive [access tokens](../active-directory/develop/active-directory-dev-glossary.md#access-token) from Azure Active Directory. App registration creates an [application id](../active-directory/develop/active-directory-dev-glossary.md#application-id-client-id) for the app in your tenant.
36+
Applications need to be [registered](../active-directory/develop/developer-glossary.md#application-registration) in your tenant before they can receive [access tokens](../active-directory/develop/developer-glossary.md#access-token) from Azure Active Directory. App registration creates an [application id](../active-directory/develop/developer-glossary.md#application-id-client-id) for the app in your tenant.
3737

3838
Log in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
3939

@@ -82,7 +82,7 @@ To sign up users to access then sign in to the desktop app, create a **sign-up o
8282
| **Name** | SiUpIn | Enter a **Name** for the policy. The policy name is prefixed with **B2C_1_**. You use the full policy name **B2C_1_SiUpIn** in the sample code. |
8383
| **Identity provider** | Email signup | The identity provider used to uniquely identify the user. |
8484
| **Sign up attributes** | Display Name and Postal Code | Select attributes to be collected from the user during signup. |
85-
| **Application claims** | Display Name, Postal Code, User is new, User's Object ID | Select [claims](../active-directory/develop/active-directory-dev-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/active-directory-dev-glossary.md#access-token). |
85+
| **Application claims** | Display Name, Postal Code, User is new, User's Object ID | Select [claims](../active-directory/develop/developer-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/developer-glossary.md#access-token). |
8686

8787
2. Click **Create** to create your policy.
8888

@@ -99,7 +99,7 @@ To allow users to reset their user profile information on their own, create a **
9999
| **Name** | SiPe | Enter a **Name** for the policy. The policy name is prefixed with **B2C_1_**. You use the full policy name **B2C_1_SiPe** in the sample code. |
100100
| **Identity provider** | Local Account SignIn | The identity provider used to uniquely identify the user. |
101101
| **Profile attributes** | Display Name and Postal Code | Select attributes users can modify during profile edit. |
102-
| **Application claims** | Display Name, Postal Code, User's Object ID | Select [claims](../active-directory/develop/active-directory-dev-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/active-directory-dev-glossary.md#access-token) after a successful profile edit. |
102+
| **Application claims** | Display Name, Postal Code, User's Object ID | Select [claims](../active-directory/develop/developer-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/developer-glossary.md#access-token) after a successful profile edit. |
103103

104104
2. Click **Create** to create your policy.
105105

@@ -115,7 +115,7 @@ To enable password reset on your application, you need to create a **password re
115115
| ------------ | ------- | -------------------------------------------------- |
116116
| **Name** | SSPR | Enter a **Name** for the policy. The policy name is prefixed with **B2C_1_**. You use the full policy name **B2C_1_SSPR** in the sample code. |
117117
| **Identity provider** | Reset password using email address | This is the identity provider used to uniquely identify the user. |
118-
| **Application claims** | User's Object ID | Select [claims](../active-directory/develop/active-directory-dev-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/active-directory-dev-glossary.md#access-token) after a successful password reset. |
118+
| **Application claims** | User's Object ID | Select [claims](../active-directory/develop/developer-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/developer-glossary.md#access-token) after a successful password reset. |
119119

120120
2. Click **Create** to create your policy.
121121

articles/active-directory-b2c/active-directory-b2c-tutorials-spa-webapi.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ In this tutorial, you learn how to:
3636

3737
## Register web API
3838

39-
Web API resources need to be registered in your tenant before they can accept and respond to [protected resource requests](../active-directory/develop/active-directory-dev-glossary.md#resource-server) by [client applications](../active-directory/develop/active-directory-dev-glossary.md#client-application) that present an [access token](../active-directory/develop/active-directory-dev-glossary.md#access-token) from Azure Active Directory. Registration establishes the [application and service principal object](../active-directory/develop/active-directory-dev-glossary.md#application-object) in your tenant.
39+
Web API resources need to be registered in your tenant before they can accept and respond to [protected resource requests](../active-directory/develop/developer-glossary.md#resource-server) by [client applications](../active-directory/develop/developer-glossary.md#client-application) that present an [access token](../active-directory/develop/developer-glossary.md#access-token) from Azure Active Directory. Registration establishes the [application and service principal object](../active-directory/develop/developer-glossary.md#application-object) in your tenant.
4040

4141
Log in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
4242

@@ -56,7 +56,7 @@ Log in to the [Azure portal](https://portal.azure.com/) as the global administra
5656
| **Include web app / web API** | Yes | Select **Yes** for a web API. |
5757
| **Allow implicit flow** | Yes | Select **Yes** since the API uses [OpenID Connect sign-in](active-directory-b2c-reference-oidc.md). |
5858
| **Reply URL** | `http://localhost:44332` | Reply URLs are endpoints where Azure AD B2C returns any tokens that your API requests. In this tutorial, the sample web API runs locally (localhost) and listens on port 5000. |
59-
| **App ID URI** | HelloCoreAPI | The URI uniquely identifies the API in the tenant. This allows you to register multiple APIs per tenant. [Scopes](../active-directory/develop/active-directory-dev-glossary.md#scopes) govern access to the protected API resource and are defined per App ID URI. |
59+
| **App ID URI** | HelloCoreAPI | The URI uniquely identifies the API in the tenant. This allows you to register multiple APIs per tenant. [Scopes](../active-directory/develop/developer-glossary.md#scopes) govern access to the protected API resource and are defined per App ID URI. |
6060
| **Native client** | No | Since this is a web API and not a native client, select No. |
6161

6262
3. Click **Create** to register your API.
@@ -71,7 +71,7 @@ Registering your web API with Azure AD B2C defines a trust relationship. Since t
7171

7272
## Define and configure scopes
7373

74-
[Scopes](../active-directory/develop/active-directory-dev-glossary.md#scopes) provide a way to govern access to protected resources. Scopes are used by the web API to implement scope-based access control. For example, some users could have both read and write access, whereas other users might have read-only permissions. In this tutorial, you define read permissions for the web API.
74+
[Scopes](../active-directory/develop/developer-glossary.md#scopes) provide a way to govern access to protected resources. Scopes are used by the web API to implement scope-based access control. For example, some users could have both read and write access, whereas other users might have read-only permissions. In this tutorial, you define read permissions for the web API.
7575

7676
### Define scopes for the web API
7777

@@ -107,7 +107,7 @@ To call a protected web API from an app, you need to grant your app permissions
107107

108108
5. Click **OK**.
109109

110-
Your **My sample single page app** is registered to call the protected **Hello Core API**. A user [authenticates](../active-directory/develop/active-directory-dev-glossary.md#authentication) with Azure AD B2C to use the WPF deskop app app. The desktop app obtains an [authorization grant](../active-directory/develop/active-directory-dev-glossary.md#authorization-grant) from Azure AD B2C to access the protected web API.
110+
Your **My sample single page app** is registered to call the protected **Hello Core API**. A user [authenticates](../active-directory/develop/developer-glossary.md#authentication) with Azure AD B2C to use the WPF deskop app app. The desktop app obtains an [authorization grant](../active-directory/develop/developer-glossary.md#authorization-grant) from Azure AD B2C to access the protected web API.
111111

112112
## Update code
113113

articles/active-directory-b2c/active-directory-b2c-tutorials-spa.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In this tutorial, you learn how to:
3535

3636
## Register single page app
3737

38-
Applications need to be [registered](../active-directory/develop/active-directory-dev-glossary.md#application-registration) in your tenant before they can receive [access tokens](../active-directory/develop/active-directory-dev-glossary.md#access-token) from Azure Active Directory. App registration creates an [application id](../active-directory/develop/active-directory-dev-glossary.md#application-id-client-id) for the app in your tenant.
38+
Applications need to be [registered](../active-directory/develop/developer-glossary.md#application-registration) in your tenant before they can receive [access tokens](../active-directory/develop/developer-glossary.md#access-token) from Azure Active Directory. App registration creates an [application id](../active-directory/develop/developer-glossary.md#application-id-client-id) for the app in your tenant.
3939

4040
Log in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
4141

@@ -84,7 +84,7 @@ To sign up users to access then sign in to the web app, create a **sign-up or si
8484
| **Name** | SiUpIn | Enter a **Name** for the policy. The policy name is prefixed with **B2C_1_**. You use the full policy name **B2C_1_SiUpIn** in the sample code. |
8585
| **Identity provider** | Email signup | The identity provider used to uniquely identify the user. |
8686
| **Sign up attributes** | Display Name and Postal Code | Select attributes to be collected from the user during signup. |
87-
| **Application claims** | Display Name, Postal Code, User is new, User's Object ID | Select [claims](../active-directory/develop/active-directory-dev-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/active-directory-dev-glossary.md#access-token). |
87+
| **Application claims** | Display Name, Postal Code, User is new, User's Object ID | Select [claims](../active-directory/develop/developer-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/developer-glossary.md#access-token). |
8888

8989
2. Click **Create** to create your policy.
9090

@@ -101,7 +101,7 @@ To allow users to reset their user profile information on their own, create a **
101101
| **Name** | SiPe | Enter a **Name** for the policy. The policy name is prefixed with **B2C_1_**. You use the full policy name **B2C_1_SiPe** in the sample code. |
102102
| **Identity provider** | Local Account SignIn | The identity provider used to uniquely identify the user. |
103103
| **Profile attributes** | Display Name and Postal Code | Select attributes users can modify during profile edit. |
104-
| **Application claims** | Display Name, Postal Code, User's Object ID | Select [claims](../active-directory/develop/active-directory-dev-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/active-directory-dev-glossary.md#access-token) after a successful profile edit. |
104+
| **Application claims** | Display Name, Postal Code, User's Object ID | Select [claims](../active-directory/develop/developer-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/developer-glossary.md#access-token) after a successful profile edit. |
105105

106106
2. Click **Create** to create your policy.
107107

@@ -117,7 +117,7 @@ To enable password reset on your application, you need to create a **password re
117117
| ------------ | ------- | -------------------------------------------------- |
118118
| **Name** | SSPR | Enter a **Name** for the policy. The policy name is prefixed with **B2C_1_**. You use the full policy name **B2C_1_SSPR** in the sample code. |
119119
| **Identity provider** | Reset password using email address | This is the identity provider used to uniquely identify the user. |
120-
| **Application claims** | User's Object ID | Select [claims](../active-directory/develop/active-directory-dev-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/active-directory-dev-glossary.md#access-token) after a successful password reset. |
120+
| **Application claims** | User's Object ID | Select [claims](../active-directory/develop/developer-glossary.md#claim) you want to be included in the [access token](../active-directory/develop/developer-glossary.md#access-token) after a successful password reset. |
121121

122122
2. Click **Create** to create your policy.
123123

0 commit comments

Comments
 (0)