Skip to content

Commit 7ba0b2d

Browse files
committed
Resolve merge conflict
2 parents 2cd69fd + 7980a0f commit 7ba0b2d

File tree

4,440 files changed

+42967
-21741
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,440 files changed

+42967
-21741
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1024,7 +1024,7 @@
10241024
"articles/static-web-apps/.openpublishing.redirection.static-web-apps.json",
10251025
".openpublishing.redirection.virtual-desktop.json",
10261026
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-services.json",
1027-
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-services-renamed.json",
1027+
"articles/applied-ai-services/.openpublishing.archived.json",
10281028
"articles/cognitive-services/.openpublishing.redirection.cognitive-services.json"
10291029
]
10301030
}

.openpublishing.redirection.active-directory.json

Lines changed: 24 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,16 @@
3030
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path_from_root": "/articles/active-directory/saas-apps/facebook-work-accounts-tutorial.md",
35+
"redirect_url": "/azure/active-directory/saas-apps/meta-work-accounts-tutorial",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/active-directory/saas-apps/netmotion-mobility-tutorial.md",
40+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
41+
"redirect_document_id": false
42+
},
3343
{
3444
"source_path_from_root": "/articles/active-directory/fundamentals/whats-new-microsoft-365-government.md",
3545
"redirect_url": "/azure/active-directory/fundamentals/whats-new",
@@ -57,7 +67,7 @@
5767
},
5868
{
5969
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-create-trust-github.md",
60-
"redirect_url":"/azure/active-directory/develop/workload-identity-federation-create-trust",
70+
"redirect_url": "/azure/active-directory/develop/workload-identity-federation-create-trust",
6171
"redirect_document_id": false
6272
},
6373
{
@@ -2038,7 +2048,7 @@
20382048
{
20392049
"source_path_from_root": "/articles/active-directory/conditional-access/conditional-access-for-exo-and-spo.md",
20402050
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
2041-
"redirect_document_id": true
2051+
"redirect_document_id": false
20422052
},
20432053
{
20442054
"source_path_from_root": "/articles/active-directory/conditional-access/baseline-protection.md",
@@ -2800,7 +2810,7 @@
28002810
"redirect_url": "/azure/active-directory/develop/howto-authenticate-service-principal-powershell",
28012811
"redirect_document_id": false
28022812
},
2803-
2813+
28042814
{
28052815
"source_path_from_root": "/articles/active-directory/develop/active-directory-devhowto-multi-tenant-overview.md",
28062816
"redirect_url": "/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant",
@@ -4253,7 +4263,12 @@
42534263
},
42544264
{
42554265
"source_path_from_root": "/articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md",
4256-
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication",
4266+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
4267+
"redirect_document_id": false
4268+
},
4269+
{
4270+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication.md",
4271+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
42574272
"redirect_document_id": true
42584273
},
42594274
{
@@ -10835,6 +10850,11 @@
1083510850
"source_path_from_root": "/articles/active-directory/manage-apps/recover-deleted-apps-faq.md",
1083610851
"redirect_url": "/azure/active-directory/manage-apps/delete-recover-faq",
1083710852
"redirect_document_id": false
10853+
},
10854+
{
10855+
"source_path_from_root": "/articles/azure-percept/voice-control-your-inventory-then-visualize-with-power-bi-dashboard.md",
10856+
"redirect_url": "/azure-docs/articles/azure-percept/index.yml",
10857+
"redirect_document_id": false
1083810858
}
1083910859

1084010860

.openpublishing.redirection.defender-for-iot.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-frequently-asked-questions.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/faqs-general",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/defender-for-iot/organizations/appliance-catalog/appliance-catalog-overview.md",
510
"redirect_url": "/azure/defender-for-iot/organizations/appliance-catalog/index",

.openpublishing.redirection.json

Lines changed: 47 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,11 @@
3030
"redirect_url": "/previous-versions/azure/germany/germany-get-started-connect-with-ps",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path": "articles/security/fundamentals/azure-disk-encryption-vms-vmss.md",
35+
"redirect_url": "/azure/virtual-machines/disk-encryption-overview",
36+
"redirect_document_id": false
37+
},
3338
{
3439
"source_path": "articles/germany/germany-get-started-connect-with-vs.md",
3540
"redirect_url": "/previous-versions/azure/germany/germany-get-started-connect-with-vs",
@@ -4573,6 +4578,11 @@
45734578
"redirect_url": "/azure/security/benchmarks",
45744579
"redirect_document_id": false
45754580
},
4581+
{
4582+
"source_path_from_root": "/articles/azure-resource-manager/bicep/linter-rule-use-protectedsettings-for-commandtoexecute-secrets.md",
4583+
"redirect_url": "/azure/azure-resource-manager/bicep/linter-rule-protect-commandtoexecute-secrets",
4584+
"redirect_document_id": false
4585+
},
45764586
{
45774587
"source_path_from_root": "/articles/azure-resource-manager/templates/view-resources.md",
45784588
"redirect_url": "/azure/azure-resource-manager/templates/export-template-portal",
@@ -5783,6 +5793,11 @@
57835793
"redirect_url": "/azure/automation/manage-run-as-account",
57845794
"redirect_document_id": false
57855795
},
5796+
{
5797+
"source_path_from_root": "/articles/automation/quickstarts/create-account-portal.md",
5798+
"redirect_url": "/azure/automation/create-azure-automation-account-portal",
5799+
"redirect_document_id": false
5800+
},
57865801
{
57875802
"source_path_from_root": "/articles/best-practices-availability-paired-regions.md",
57885803
"redirect_url": "/azure/availability-zones/cross-region-replication-azure",
@@ -12838,6 +12853,16 @@
1283812853
"redirect_url": "/azure/cloudfoundry/cloudfoundry-deploy-your-first-app",
1283912854
"redirect_document_id": true
1284012855
},
12856+
{
12857+
"source_path_from_root": "/articles/virtual-machines/linux/overview.md",
12858+
"redirect_url": "/azure/virtual-machines/overview",
12859+
"redirect_document_id": true
12860+
},
12861+
{
12862+
"source_path_from_root": "/articles/virtual-machines/windows/overview.md",
12863+
"redirect_url": "/azure/virtual-machines/overview",
12864+
"redirect_document_id": false
12865+
},
1284112866
{
1284212867
"source_path_from_root": "/articles/virtual-machines/linux/cloudfoundry-get-started.md",
1284312868
"redirect_url": "/azure/cloudfoundry/cloudfoundry-get-started",
@@ -18294,9 +18319,24 @@
1829418319
"redirect_document_id": false
1829518320
},
1829618321
{
18297-
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
18322+
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
1829818323
"redirect_url": "/connectors/bingsearch",
18299-
"redirect_document_id": false
18324+
"redirect_document_id": false
18325+
},
18326+
{
18327+
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18328+
"redirect_url": "/connectors/twilio",
18329+
"redirect_document_id": false
18330+
},
18331+
{
18332+
"source_path_from_root": "/articles/connectors/connectors-create-api-sendgrid.md",
18333+
"redirect_url": "/connectors/sendgrid",
18334+
"redirect_document_id": false
18335+
},
18336+
{
18337+
"source_path_from_root": "/articles/connectors/connectors-schema-migration.md",
18338+
"redirect_url": "/azure/logic-apps/update-consumption-workflow-schema",
18339+
"redirect_document_id": false
1830018340
},
1830118341
{
1830218342
"source_path_from_root": "/articles/logic-apps/logic-apps-scenario-error-and-exception-handling.md",
@@ -34182,6 +34222,11 @@
3418234222
"source_path_from_root": "/articles/virtual-machines/windows/winrm.md",
3418334223
"redirect_url": "/azure/virtual-machines/windows/connect-winrm",
3418434224
"redirect_document_id": false
34225+
},
34226+
{
34227+
"source_path_from_root": "/articles/virtual-machines/linux/copy-files-to-linux-vm-using-scp.md",
34228+
"redirect_url": "/azure/virtual-machines/copy-files-to-vm-using-scp",
34229+
"redirect_document_id": false
3418534230
}
3418634231
]
3418734232
}

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@
355355
items:
356356
- name: Multi-factor authentication
357357
href: multi-factor-authentication.md
358-
displayName: TOTP, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
358+
displayName: TOTP, multi-factor, multifactor, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
359359
- name: Partner integration
360360
items:
361361
- name: Asignio

articles/active-directory-b2c/configure-authentication-in-azure-static-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 06/28/2022
10+
ms.date: 08/22/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -30,7 +30,7 @@ OpenID Connect (OIDC) is an authentication protocol that's built on OAuth 2.0. U
3030
When the access token expires or the app session is invalidated, Azure Static Web App initiates a new authentication request and redirects users to Azure AD B2C. If the Azure AD B2C [SSO session](session-behavior.md) is active, Azure AD B2C issues an access token without prompting users to sign in again. If the Azure AD B2C session expires or becomes invalid, users are prompted to sign in again.
3131

3232
## Prerequisites
33-
33+
- A premium Azure subscription.
3434
- If you haven't created an app yet, follow the guidance how to create an [Azure Static Web App](../static-web-apps/overview.md).
3535
- Familiarize yourself with the Azure Static Web App [staticwebapp.config.json](../static-web-apps/configuration.md) configuration file.
3636
- Familiarize yourself with the Azure Static Web App [App Settings](../static-web-apps/application-settings.md).

articles/active-directory-b2c/identity-provider-twitter.md

Lines changed: 33 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,32 @@ zone_pivot_groups: b2c-policy-type
3333

3434
To enable sign-in for users with a Twitter account in Azure AD B2C, you need to create a Twitter application. If you don't already have a Twitter account, you can sign up at [`https://twitter.com/signup`](https://twitter.com/signup). You also need to [Apply for a developer account](https://developer.twitter.com/). For more information, see [Apply for access](https://developer.twitter.com/en/apply-for-access).
3535

36+
::: zone pivot="b2c-custom-policy"
37+
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
38+
1. Select **+ Create Project** button.
39+
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
40+
1. Under **Use case** tab, select your preferred use case, and then select **Next**.
41+
1. Under **Project description** tab, enter your project description, and then select **Next** button.
42+
1. Under **App name** tab, enter a name for your app, such as *azureadb2c*, and the select **Next** button.
43+
1. Under **Keys & Tokens** tab, copy the value of **API Key** and **API Key Secret** for later. You use both of them to configure Twitter as an identity provider in your Azure AD B2C tenant.
44+
1. Select **App settings** to open the app settings.
45+
1. At the lower part of the page, under **User authentication settings**, select **Set up**.
46+
1. In the **User authentication settings** page, select **OAuth 2.0** option.
47+
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
48+
1. Under **GENERAL AUTHENTICATION SETTINGS**:
49+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy-id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
50+
- `your-tenant-name` with the name of your tenant name.
51+
- `your-domain-name` with your custom domain.
52+
- `your-policy-id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
53+
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
54+
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
55+
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
56+
1. Select **Save**.
57+
::: zone-end
58+
59+
60+
::: zone pivot="b2c-user-flow"
61+
3662
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
3763
1. Select **+ Create Project** button.
3864
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
@@ -45,15 +71,16 @@ To enable sign-in for users with a Twitter account in Azure AD B2C, you need to
4571
1. In the **User authentication settings** page, select **OAuth 2.0** option.
4672
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
4773
1. Under **GENERAL AUTHENTICATION SETTINGS**:
48-
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
74+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-name/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
4975
- `your-tenant-name` with the name of your tenant name.
5076
- `your-domain-name` with your custom domain.
51-
- `your-user-flow-Id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
52-
77+
- `your-user-flow-name` with the identifier of your user flow. For example, `b2c_1_signup_signin_twitter`.
5378
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
5479
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
5580
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
5681
1. Select **Save**.
82+
83+
::: zone-end
5784

5885
::: zone pivot="b2c-user-flow"
5986

@@ -83,8 +110,6 @@ At this point, the Twitter identity provider has been set up, but it's not yet a
83110
1. Select the **Run user flow** button.
84111
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
85112

86-
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
87-
88113
::: zone-end
89114

90115
::: zone pivot="b2c-custom-policy"
@@ -186,7 +211,9 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
186211
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
187212
1. Select the **Run now** button.
188213
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
214+
::: zone-end
189215

190216
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
191217

192-
::: zone-end
218+
> [!TIP]
219+
> If you're facing `unauthorized` error while testing this identity provider, make sure you use the correct Twitter API Key and API Key Secret, or try to apply for [elevated](https://developer.twitter.com/en/portal/products/elevated) access. Also, we recommend you've a look at [Twitter's projects structure](https://developer.twitter.com/en/docs/projects/overview), if you registered your app before the feature was available.

articles/active-directory-b2c/json-transformations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ The following example generates a JSON string based on the claim value of "email
152152
<InputClaims>
153153
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.to.0.email" />
154154
<InputClaim ClaimTypeReferenceId="otp" TransformationClaimType="personalizations.0.dynamic_template_data.otp" />
155-
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
155+
<InputClaim ClaimTypeReferenceId="copiedEmail" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
156156
</InputClaims>
157157
<InputParameters>
158158
<InputParameter Id="template_id" DataType="string" Value="d-4c56ffb40fa648b1aa6822283df94f60"/>
@@ -169,6 +169,7 @@ The following claims transformation outputs a JSON string claim that will be the
169169

170170
- Input claims:
171171
- **email**, transformation claim type **personalizations.0.to.0.email**: "[email protected]"
172+
- **copiedEmail**, transformation claim type **personalizations.0.dynamic_template_data.verify-email**: "[email protected]"
172173
- **otp**, transformation claim type **personalizations.0.dynamic_template_data.otp** "346349"
173174
- Input parameter:
174175
- **template_id**: "d-4c56ffb40fa648b1aa6822283df94f60"

0 commit comments

Comments
 (0)