Skip to content

Commit 8750358

Browse files
committed
Merge branch 'main' into szuber/update-zerto-disaster-recovery-07132022
2 parents 3c4fe59 + 865cf3f commit 8750358

File tree

1,791 files changed

+19785
-9828
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,791 files changed

+19785
-9828
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -360,6 +360,11 @@
360360
"source_path_from_root": "/articles/azure-monitor/insights/azure-cli-application-insights-component.md" ,
361361
"redirect_url": "/cli/azure/monitor/app-insights",
362362
"redirect_document_id": false
363+
},
364+
{
365+
"source_path_from_root": "/articles/azure-monitor/insights/redis-cache-insights-overview.md" ,
366+
"redirect_url": "/azure/azure-cache-for-redis/redis-cache-insights-overview",
367+
"redirect_document_id": false
363368
}
364369
]
365370
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5906,6 +5906,11 @@
59065906
"redirect_url": "source-control-integration",
59075907
"redirect_document_id": false
59085908
},
5909+
{
5910+
"source_path_from_root": "/articles/automation/manage-runas-account.md",
5911+
"redirect_url": "/azure/automation/manage-run-as-account",
5912+
"redirect_document_id": false
5913+
},
59095914
{
59105915
"source_path_from_root": "/articles/best-practices-availability-paired-regions.md",
59115916
"redirect_url": "/azure/availability-zones/cross-region-replication-azure",

articles/active-directory-b2c/configure-authentication-in-azure-web-app-file-based.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App configuration file by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](/azure/app-service/configure-authentication-file-based) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](../app-service/configure-authentication-file-based.md) article.
1919

2020
## Overview
2121

@@ -141,6 +141,5 @@ From your server code, the provider-specific tokens are injected into the reques
141141

142142
## Next steps
143143

144-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
145-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
146-
144+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](../app-service/configure-authentication-user-identities.md).
145+
* Learn how to [Work with OAuth tokens in Azure App Service authentication](../app-service/configure-authentication-oauth-tokens.md).

articles/active-directory-b2c/configure-authentication-in-azure-web-app.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](/azure/app-service/configure-authentication-provider-openid-connect) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](../app-service/configure-authentication-provider-openid-connect.md) article.
1919

2020
## Overview
2121

@@ -94,7 +94,7 @@ To register your application, follow these steps:
9494
1. For the **Client Secret** provide the Web App (client) secret from [step 2.2](#step-22-create-a-client-secret).
9595
9696
> [!TIP]
97-
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](/azure/app-service/app-service-key-vault-references) if you wish to manage the secret in Azure Key Vault.
97+
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](../app-service/app-service-key-vault-references.md) if you wish to manage the secret in Azure Key Vault.
9898
9999
1. Keep the rest of the settings with the default values.
100100
1. Press the **Add** button to finish setting up the identity provider.
@@ -119,6 +119,5 @@ From your server code, the provider-specific tokens are injected into the reques
119119
120120
## Next steps
121121
122-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
123-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
124-
122+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](../app-service/configure-authentication-user-identities.md).
123+
* Learn how to [Work with OAuth tokens in Azure App Service authentication](../app-service/configure-authentication-oauth-tokens.md).

articles/active-directory-b2c/enable-authentication-python-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -416,7 +416,7 @@ if __name__ == "__main__":
416416
417417
## Step 6: Run your web app
418418
419-
In the Terminal, run the app by entering the following command, which runs the Flask development server. The development server looks for `app.py` by default. Then, open your browser and navigate to the web app URL: <http://localhost:5000>.
419+
In the Terminal, run the app by entering the following command, which runs the Flask development server. The development server looks for `app.py` by default. Then, open your browser and navigate to the web app URL: `http://localhost:5000`.
420420
421421
# [Linux](#tab/linux)
422422

articles/active-directory-b2c/page-layout.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/12/2022
12+
ms.date: 07/18/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -26,7 +26,7 @@ Page layout packages are periodically updated to include fixes and improvements
2626

2727
Azure AD B2C page layout uses the following versions of the [jQuery library](https://jquery.com/) and the [Handlebars templates](https://handlebarsjs.com/):
2828

29-
|Element |Page layout version range |jQuery version |Handlebars Runtime version |Handlebars Compliler version |
29+
|Element |Page layout version range |jQuery version |Handlebars Runtime version |Handlebars Compiler version |
3030
|---------|---------|------|--------|----------|
3131
|multifactor |>= 1.2.4 | 3.5.1 | 4.7.6 |4.7.7 |
3232
| |< 1.2.4 | 3.4.1 |4.0.12 |2.0.1 |
@@ -52,6 +52,9 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
5252

5353
## Self-asserted page (selfasserted)
5454

55+
**2.1.14**
56+
- Fixed WCAG 2.1 accessibility bug for the TOTP multifactor authentication screens.
57+
5558
**2.1.10**
5659

5760
- Correcting to the tab index
@@ -83,7 +86,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
8386
- Fixed an accessibility bug to show inline error messages only on form submission.
8487

8588
**2.1.6**
86-
- Fixed password error get cleared when typing too quickly on a different field.
89+
- Fixed *password error gets cleared when typing too quickly on a different field*.
8790

8891
**2.1.5**
8992
- Fixed cursor jumps issue on iOS when editing in the middle of the text.
@@ -100,7 +103,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
100103

101104
**2.1.1**
102105

103-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
106+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This message is hidden by default.
104107
- Added support for saving passwords to iCloud Keychain.
105108
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
106109
- Added disclaimers on self-asserted page.
@@ -143,7 +146,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
143146

144147
- Initial release
145148

146-
## Unified sign-in sign-up page with password reset link (unifiedssp)
149+
## Unified sign-in and sign-up page with password reset link (unifiedssp)
147150

148151
> [!TIP]
149152
> If you localize your page to support multiple locales, or languages in a user flow. The [localization IDs](localization-string-ids.md) article provides the list of localization IDs that you can use for the page version you select.
@@ -159,7 +162,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
159162
- Updates to the UI elements and CSS classes
160163

161164
**2.1.5**
162-
- Fixed an issue on tab order when idp selector template is used on sign in page.
165+
- Fixed an issue on tab order when idp selector template is used on sign-in page.
163166
- Fixed an encoding issue on sign-in link text.
164167

165168
**2.1.4**
@@ -175,7 +178,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
175178
- Allowing the "forgot password" link to use as claims exchange. For more information, see [Self-service password reset](add-password-reset-policy.md#self-service-password-reset-recommended).
176179

177180
**2.1.1**
178-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
181+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This message is hidden by default.
179182
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
180183
- Added support for saving passwords to iCloud Keychain.
181184
- Focus is now placed on the first error field when multiple fields have errors.
@@ -187,7 +190,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
187190

188191
- Added support for multiple sign-up links.
189192
- Added support for user input validation according to the predicate rules defined in the policy.
190-
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your sign in name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
193+
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your sign-in name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
191194

192195
**1.2.0**
193196

@@ -225,7 +228,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
225228
**1.2.2**
226229
- Fixed an issue with auto-filling the verification code when using iOS.
227230
- Fixed an issue with redirecting a token to the relying party from Android Webview.
228-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
231+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This messages is hidden by default.
229232
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
230233

231234
**1.2.1**
@@ -246,7 +249,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
246249

247250
- 'Confirm Code' button removed
248251
- The input field for the code now only takes input up to six (6) characters
249-
- The page will automatically attempt to verify the code entered when a 6-digit code is entered, without any button having to be clicked
252+
- The page will automatically attempt to verify the code entered when a six-digit code is entered, without any button having to be clicked
250253
- If the code is wrong, the input field is automatically cleared
251254
- After three (3) attempts with an incorrect code, B2C sends an error back to the relying party
252255
- Accessibility fixes
@@ -274,7 +277,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
274277
**1.1.0**
275278

276279
- Accessibility fix
277-
- Removed the default message when there is no contact from the policy
280+
- Removed the default message when there's no contact from the policy
278281
- Default CSS removed
279282

280283
**1.0.0**

articles/active-directory-b2c/string-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ Determines whether one string claim is equal to another. The result is a new boo
171171
| InputClaim | inputClaim1 | string | First claim type, which is to be compared. |
172172
| InputClaim | inputClaim2 | string | Second claim type, which is to be compared. |
173173
| InputParameter | operator | string | Possible values: `EQUAL` or `NOT EQUAL`. |
174-
| InputParameter | ignoreCase | boolean | Specifies whether this comparison should ignore the case of the strings being compared. |
174+
| InputParameter | ignoreCase | string | Specifies whether this comparison should ignore the case of the strings being compared. |
175175
| OutputClaim | outputClaim | boolean | The claim that is produced after this claims transformation has been invoked. |
176176

177177
### Example of CompareClaims
@@ -186,7 +186,7 @@ Use this claims transformation to check if a claim is equal to another claim. T
186186
</InputClaims>
187187
<InputParameters>
188188
<InputParameter Id="operator" DataType="string" Value="NOT EQUAL" />
189-
<InputParameter Id="ignoreCase" DataType="boolean" Value="true" />
189+
<InputParameter Id="ignoreCase" DataType="string" Value="true" />
190190
</InputParameters>
191191
<OutputClaims>
192192
<OutputClaim ClaimTypeReferenceId="SameEmailAddress" TransformationClaimType="outputClaim" />

0 commit comments

Comments
 (0)