Skip to content

Commit 7c8b5c3

Browse files
authored
Merge pull request #202278 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 4f38f12 + c42a28a commit 7c8b5c3

File tree

231 files changed

+2672
-2881
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

231 files changed

+2672
-2881
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -473,7 +473,7 @@
473473
{
474474
"path_to_root": "azureml-examples-online-endpoint-vnet",
475475
"url": "https://github.com/azure/azureml-examples",
476-
"branch": "rsethur/mvnet",
476+
"branch": "main",
477477
"branch_mapping": {}
478478
},
479479
{

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18911,6 +18911,11 @@
1891118911
"redirect_url": "/connectors/todo",
1891218912
"redirect_document_id": false
1891318913
},
18914+
{
18915+
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
18916+
"redirect_url": "/connectors/bingsearch",
18917+
"redirect_document_id": false
18918+
},
1891418919
{
1891518920
"source_path_from_root": "/articles/logic-apps/logic-apps-scenario-error-and-exception-handling.md",
1891618921
"redirect_url": "/azure/logic-apps/logic-apps-exception-handling",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -508,6 +508,8 @@
508508
href: partner-n8identity.md
509509
- name: Saviynt
510510
href: partner-saviynt.md
511+
- name: WhoIAM Rampart
512+
href: partner-whoiam-rampart.md
511513
- name: Logs
512514
items:
513515
- name: Audit logs

articles/active-directory-b2c/direct-signin.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
---
2-
title: Set up direct sign in using Azure Active Directory B2C
3-
description: Learn how to prepopulate the sign in name or redirect straight to a social identity provider.
2+
title: Set up direct sign-in using Azure Active Directory B2C
3+
description: Learn how to prepopulate the sign-in name or redirect straight to a social identity provider.
44
services: active-directory-b2c
55
author: kengaderdus
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/31/2022
11+
ms.date: 06/21/2022
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
1616
---
1717

18-
# Set up direct sign in using Azure Active Directory B2C
18+
# Set up direct sign-in using Azure Active Directory B2C
1919

2020
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2121

articles/active-directory-b2c/implicit-flow-single-page-application.md

Lines changed: 18 additions & 18 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/integrate-with-app-code-samples.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kengaderdus
66
manager: CelesteDG
77

88
ms.author: kengaderdus
9-
ms.date: 03/31/2022
9+
ms.date: 06/21/2022
1010
ms.custom: mvc
1111
ms.topic: sample
1212
ms.service: active-directory
88 KB
Loading
154 KB
Loading
394 KB
Loading

articles/active-directory-b2c/partner-gallery.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
5656
| ![Screenshot of a twilio logo.](./media/partner-gallery/twilio-logo.png) | [Twilio Verify app](./partner-twilio.md) provides multiple solutions to enable MFA through SMS one-time password (OTP), time-based one-time password (TOTP), and push notifications, and to comply with SCA requirements for PSD2. |
5757
| ![Screenshot of a typingDNA logo](./media/partner-gallery/typingdna-logo.png) | [TypingDNA](./partner-typingdna.md) enables strong customer authentication by analyzing a user’s typing pattern. It helps companies enable a silent MFA and comply with SCA requirements for PSD2. |
5858
| ![Screenshot of a whoiam logo](./media/partner-gallery/whoiam-logo.png) | [WhoIAM](./partner-whoiam.md) is a Branded Identity Management System (BRIMS) application that enables organizations to verify their user base by voice, SMS, and email. |
59-
| ![Screenshot of a xid logo](./media/partner-gallery/xid-logo.png) | [xID](./partner-xID.md) is a digital ID solution that provides users with passwordless, secure, multifactor authentication. xID-authenticated users obtain their identities verified by a My Number Card, the digital ID card issued by the Japanese government. Organizations can get users verified Personal Identification Information (PII) through the xID API. |
59+
| ![Screenshot of a xid logo](./media/partner-gallery/xid-logo.png) | [xID](./partner-xID.md) is a digital ID solution that provides users with passwordless, secure, multifactor authentication. xID-authenticated users obtain their identities verified by a My Number Card, the digital ID card issued by the Japanese government. Organizations can get users verified personal information through the xID API. |
6060

6161
## Role-based access control
6262

@@ -66,6 +66,7 @@ Microsoft partners with the following ISVs for role-based access control.
6666
|:-------------------------|:--------------|
6767
| ![Screenshot of a n8identity logo](./media/partner-gallery/n8identity-logo.png) | [N8Identity](./partner-n8identity.md) is an Identity-as-a-Service governance platform that provides solution to address customer accounts migration and Customer Service Requests (CSR) administration running on Microsoft Azure. |
6868
| ![Screenshot of a Saviynt logo](./media/partner-gallery/saviynt-logo.png) | [Saviynt](./partner-Saviynt.md) cloud-native platform promotes better security, compliance, and governance through intelligent analytics and cross application integration for streamlining IT modernization. |
69+
| ![Screenshot of a WhoIAM Rampart logo](./media/partner-gallery/whoiam-logo.png) | [WhoIAM Rampart](./partner-whoiam-rampart.md) provides a fully integrated helpdesk and invitation-gated user registration experience. It allows support specialists to efficiently perform tasks like resetting passwords and multi-factor authentication without using Azure. It also enables apps and role-based access control (RBAC) for end-users of Azure AD B2C. |
6970

7071
## Secure hybrid access to on-premises application
7172

0 commit comments

Comments
 (0)