Skip to content

Commit 8623e63

Browse files
authored
Merge pull request #190447 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents a5d28b1 + 24f2dbb commit 8623e63

File tree

210 files changed

+3109
-2175
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

210 files changed

+3109
-2175
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -893,6 +893,7 @@
893893
"articles/purview/.openpublishing.redirection.purview.json",
894894
"articles/service-bus-messaging/.openpublishing.redirection.service-bus-messaging.json",
895895
"articles/stream-analytics/.openpublishing.redirection.stream-analytics.json",
896+
"articles/spatial-anchors/.openpublishing.redirection.spatial-anchors.json",
896897
"articles/azure-video-analyzer/.openpublishing.redirection.azure-video-analyzer.json",
897898
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
898899
"articles/virtual-machine-scale-sets/.openpublishing.redirection.virtual-machine-scale-sets.json",

.openpublishing.redirection.azure-sql.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,13 +175,23 @@
175175
"redirect_url": "/sql/machine-learning/tutorials/r-predictive-model-train?context=/azure/azure-sql/managed-instance/context/ml-context&view=azuresqldb-mi-current",
176176
"redirect_document_id": false
177177
},
178+
{
179+
"source_path_from_root": "/articles/azure-sql/database/auto-failover-group-overview.md",
180+
"redirect_url": "/azure/azure-sql/database/auto-failover-group-sql-db",
181+
"redirect_document_id": true
182+
},
183+
{
184+
"source_path_from_root": "/articles/azure-sql/database/auto-failover-group-configure.md",
185+
"redirect_url": "/azure/azure-sql/database/auto-failover-group-configure-sql-db",
186+
"redirect_document_id": true
187+
},
178188
{
179189
"source_path_from_root": "/articles/azure-sql/database/job-automation-managed-instances.md",
180190
"redirect_url": "/azure/azure-sql/managed-instance/job-automation-managed-instance",
181191
"redirect_document_id": true
182192
},
183193
{
184-
"source_path": "articles/azure-sql/database/service-tiers-general-purpose-business-critical.md",
194+
"source_path_from_root": "/articles/azure-sql/database/service-tiers-general-purpose-business-critical.md",
185195
"redirect_url": "/azure/azure-sql/database/service-tiers-vcore",
186196
"redirect_document_id": false
187197
}

.openpublishing.redirection.media-services.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -634,10 +634,15 @@
634634
"source_path_from_root": "/articles/media-services/latest/architecture-design-multi-drm-system.md",
635635
"redirect_url": "/azure/media-services/latest/drm-content-protection-concept",
636636
"redirect_document_id": true
637-
},
637+
},
638+
{
639+
"source_path_from_root": "/articles/media-services/latest/job-create-cli-how-to.md",
640+
"redirect_url": "/azure/media-services/latest/job-create-how-to",
641+
"redirect_document_id": false
642+
},
638643
{
639-
"source_path_from_root": "/articles/media-services/latest/latest/questions-collection.md",
640-
"redirect_url": "/articles/media-services/latest/frequently-asked-questions.yml",
644+
"source_path_from_root": "/articles/media-services/latest/latest/asset-publish-cli-how-to.md",
645+
"redirect_url": "/azure/media-services/latest/video-on-demand-simple-portal-quickstart",
641646
"redirect_document_id": false
642647
}
643648
]

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 06/18/2021
11+
ms.date: 03/03/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -40,7 +40,7 @@ The authorization code flow for single page applications requires some additiona
4040
The `spa` redirect type is backwards compatible with the implicit flow. Apps currently using the implicit flow to get tokens can move to the `spa` redirect URI type without issues and continue using the implicit flow.
4141

4242
## 1. Get an authorization code
43-
The authorization code flow begins with the client directing the user to the `/authorize` endpoint. This is the interactive part of the flow, where the user takes action. In this request, the client indicates in the `scope` parameter the permissions that it needs to acquire from the user. The following three examples (with line breaks for readability) each use a different user flow. If you're testing this GET HTTP request, use your browser.
43+
The authorization code flow begins with the client directing the user to the `/authorize` endpoint. This is the interactive part of the flow, where the user takes action. In this request, the client indicates in the `scope` parameter the permissions that it needs to acquire from the user. The following examples (with line breaks for readability) shows how to acquire an authorization code. If you're testing this GET HTTP request, use your browser.
4444

4545

4646
```http
@@ -66,8 +66,8 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
6666
| response_mode |Recommended |The method that you use to send the resulting authorization code back to your app. It can be `query`, `form_post`, or `fragment`. |
6767
| state |Recommended |A value included in the request that can be a string of any content that you want to use. Usually, a randomly generated unique value is used, to prevent cross-site request forgery attacks. The state also is used to encode information about the user's state in the app before the authentication request occurred. For example, the page the user was on, or the user flow that was being executed. |
6868
| prompt |Optional |The type of user interaction that is required. Currently, the only valid value is `login`, which forces the user to enter their credentials on that request. Single sign-on will not take effect. |
69-
| code_challenge | recommended / required | Used to secure authorization code grants via Proof Key for Code Exchange (PKCE). Required if `code_challenge_method` is included. For more information, see the [PKCE RFC](https://tools.ietf.org/html/rfc7636). This is now recommended for all application types - native apps, SPAs, and confidential clients like web apps. |
70-
| `code_challenge_method` | recommended / required | The method used to encode the `code_verifier` for the `code_challenge` parameter. This *SHOULD* be `S256`, but the spec allows the use of `plain` if for some reason the client cannot support SHA256. <br/><br/>If excluded, `code_challenge` is assumed to be plaintext if `code_challenge` is included. Microsoft identity platform supports both `plain` and `S256`. For more information, see the [PKCE RFC](https://tools.ietf.org/html/rfc7636). This is required for [single page apps using the authorization code flow](tutorial-register-spa.md).|
69+
| code_challenge | recommended / required | Used to secure authorization code grants via Proof Key for Code Exchange (PKCE). Required if `code_challenge_method` is included. You need to add logic in your application to generate the `code_verifier` and `code_challenge`. The `code_challenge` is a Base64 URL-encoded SHA256 hash of the `code_verifier`. You store the `code_verifier` in your application for later use, and send the `code_challenge` along with the authorization request. For more information, see the [PKCE RFC](https://tools.ietf.org/html/rfc7636). This is now recommended for all application types - native apps, SPAs, and confidential clients like web apps. |
70+
| `code_challenge_method` | recommended / required | The method used to encode the `code_verifier` for the `code_challenge` parameter. This *SHOULD* be `S256`, but the spec allows the use of `plain` if for some reason the client cannot support SHA256. <br/><br/>If you exclude the `code_challenge_method`, but still include the `code_challenge`, then the `code_challenge` is assumed to be plaintext. Microsoft identity platform supports both `plain` and `S256`. For more information, see the [PKCE RFC](https://tools.ietf.org/html/rfc7636). This is required for [single page apps using the authorization code flow](tutorial-register-spa.md).|
7171
| login_hint | No| Can be used to pre-fill the sign-in name field of the sign-in page. For more information, see [Prepopulate the sign-in name](direct-signin.md#prepopulate-the-sign-in-name). |
7272
| domain_hint | No| Provides a hint to Azure AD B2C about the social identity provider that should be used for sign-in. If a valid value is included, the user goes directly to the identity provider sign-in page. For more information, see [Redirect sign-in to a social provider](direct-signin.md#redirect-sign-in-to-a-social-provider). |
7373
| Custom parameters | No| Custom parameters that can be used with [custom policies](custom-policy-overview.md). For example, [dynamic custom page content URI](customize-ui-with-html.md?pivots=b2c-custom-policy#configure-dynamic-custom-page-content-uri), or [key-value claim resolvers](claim-resolver-overview.md#oauth2-key-value-parameters). |
@@ -125,9 +125,9 @@ grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&sco
125125
| client_secret | Yes, in Web Apps | The application secret that was generated in the [Azure portal](https://portal.azure.com/). Client secrets are used in this flow for Web App scenarios, where the client can securely store a client secret. For Native App (public client) scenarios, client secrets cannot be securely stored, and therefore are not used in this call. If you use a client secret, please change it on a periodic basis. |
126126
| grant_type |Required |The type of grant. For the authorization code flow, the grant type must be `authorization_code`. |
127127
| scope |Required |A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app needs a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
128-
| code |Required |The authorization code that you acquired in the first leg of the flow. |
128+
| code |Required |The authorization code that you acquired in from the `/authorize` endpoint. |
129129
| redirect_uri |Required |The redirect URI of the application where you received the authorization code. |
130-
| code_verifier | recommended | The same code_verifier that was used to obtain the authorization_code. Required if PKCE was used in the authorization code grant request. For more information, see the [PKCE RFC](https://tools.ietf.org/html/rfc7636). |
130+
| code_verifier | recommended | The same `code_verifier` used to obtain the authorization code. Required if PKCE was used in the authorization code grant request. For more information, see the [PKCE RFC](https://tools.ietf.org/html/rfc7636). |
131131

132132
If you're testing this POST HTTP request, you can use any HTTP client such as [Microsoft PowerShell](/powershell/scripting/overview) or [Postman](https://www.postman.com/).
133133

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: conditional-access
77
ms.topic: overview
8-
ms.date: 12/09/2021
8+
ms.date: 03/03/2022
99
ms.custom: project-no-code
1010
ms.author: kengaderdus
1111
author: kengaderdus

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 12/09/2021
11+
ms.date: 03/03/2022
1212
ms.custom: "project-no-code, ignite-fall-2021, b2c-support"
1313
ms.author: kengaderdus
1414
ms.subservice: B2C

articles/active-directory-b2c/partner-bindid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ You should now see BindID as a new OIDC Identity provider listed within your B2C
138138

139139
11. Select **Run user flow**.
140140

141-
12. The browser will be redirected to the BindID login page. Enter the account name registered during User registration. The user will receive a push notification to the registered user mobile device for a Fast Identity Online (FIDO2) certified authentication. It can be a user finger print, biometric or decentralized pin.
141+
12. The browser will be redirected to the BindID login page. Enter the account name registered during User registration. The user enters the registered account email and authenticates using appless FIDO2 biometrics, such as fingerprint.
142142

143143
13. Once the authentication challenge is accepted, the browser will redirect the user to the replying URL.
144144

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 11/02/2021
4+
ms.date: 03/03/2022
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,31 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md).
1717

18+
## February 2022
19+
20+
### New articles
21+
22+
- [Configure authentication in a sample Node.js web application by using Azure Active Directory B2C](configure-a-sample-node-web-app.md)
23+
- [Configure authentication in a sample Node.js web API by using Azure Active Directory B2C](configure-authentication-in-sample-node-web-app-with-api.md)
24+
- [Enable authentication options in a Node.js web app by using Azure Active Directory B2C](enable-authentication-in-node-web-app-options.md)
25+
- [Enable Node.js web API authentication options using Azure Active Directory B2C](enable-authentication-in-node-web-app-with-api-options.md)
26+
- [Enable authentication in your own Node.js web API by using Azure Active Directory B2C](enable-authentication-in-node-web-app-with-api.md)
27+
- [Enable authentication in your own Node web application using Azure Active Directory B2C](enable-authentication-in-node-web-app.md)
28+
29+
### Updated articles
30+
31+
- [Configure session behavior in Azure Active Directory B2C](session-behavior.md)
32+
- [Customize the user interface with HTML templates in Azure Active Directory B2C](customize-ui-with-html.md)
33+
- [Define a self-asserted technical profile in an Azure Active Directory B2C custom policy](self-asserted-technical-profile.md)
34+
- [About claim resolvers in Azure Active Directory B2C custom policies](claim-resolver-overview.md)
35+
- [Date claims transformations](date-transformations.md)
36+
- [Integer claims transformations](integer-transformations.md)
37+
- [JSON claims transformations](json-transformations.md)
38+
- [Define phone number claims transformations in Azure AD B2C](phone-number-claims-transformations.md)
39+
- [Social accounts claims transformations](social-transformations.md)
40+
- [String claims transformations](string-transformations.md)
41+
- [Web sign in with OpenID Connect in Azure Active Directory B2C](openid-connect.md)
42+
1843
## January 2022
1944

2045
### Updated articles

articles/active-directory/authentication/active-directory-passwords-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.author: justinha
1212
author: justinha
1313
manager: karenhoran
14-
ms.reviewer: rhicock
14+
ms.reviewer: tilarso
1515
ms.collection: M365-identity-device-management
1616
title: Self-service password reset frequently asked questions
1717
summary: |

articles/active-directory/authentication/concept-sspr-howitworks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 06/14/2021
1111
ms.author: justinha
1212
author: justinha
1313
manager: karenhoran
14-
ms.reviewer: rhicock
14+
ms.reviewer: tilarso
1515

1616
ms.collection: M365-identity-device-management
1717
---

0 commit comments

Comments
 (0)