Skip to content

Commit 89de0dd

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into update-dbks-urls
2 parents 46b8b28 + 9e12e69 commit 89de0dd

File tree

9,338 files changed

+176892
-123325
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

9,338 files changed

+176892
-123325
lines changed

.openpublishing.publish.config.json

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,10 @@
2626
2727
],
2828
"sync_notification_subscribers": [
29-
"tysonn@microsoft.com"
29+
"angrobe_extended_dir@microsoft.com"
3030
],
3131
"branches_to_filter": [],
32-
"git_repository_url_open_to_public_contributors": "https://github.com/Microsoft/azure-docs",
32+
"git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/azure-docs",
3333
"git_repository_branch_open_to_public_contributors": "master",
3434
"skip_source_output_uploading": false,
3535
"need_preview_pull_request": true,
@@ -233,6 +233,11 @@
233233
"url": "https://github.com/Azure-Samples/azure-iot-samples-node",
234234
"branch": "master"
235235
},
236+
{
237+
"path_to_root": "azure-iot-sdk-node",
238+
"url": "https://github.com/Azure/azure-iot-sdk-node",
239+
"branch": "master"
240+
},
236241
{
237242
"path_to_root": "iot-samples-c",
238243
"url": "https://github.com/Azure/azure-iot-sdk-c",
@@ -414,6 +419,11 @@
414419
"url": "https://github.com/Azure/azure-cosmos-dotnet-v2",
415420
"branch": "master"
416421
},
422+
{
423+
"path_to_root": "samples-cosmosdb-java-v4-web-app",
424+
"url": "https://github.com/Azure-Samples/azure-cosmos-java-sql-api-todo-app",
425+
"branch": "master"
426+
},
417427
{
418428
"path_to_root": "samples-cosmosdb-dotnet-change-feed-processor",
419429
"url": "https://github.com/Azure-Samples/cosmos-dotnet-change-feed-processor",
@@ -499,6 +509,11 @@
499509
"path_to_root": "azure-cosmosdb-java-v4-getting-started",
500510
"url": "https://github.com/Azure-Samples/azure-cosmos-java-getting-started",
501511
"branch": "master"
512+
},
513+
{
514+
"path_to_root": "azure-storage-snippets",
515+
"url": "https://github.com/azure-samples/AzureStorageSnippets",
516+
"branch": "master"
502517
}
503518
],
504519
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 1926 additions & 626 deletions
Large diffs are not rendered by default.

.vscode/settings.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@
5959
"YAML"
6060
],
6161
"cSpell.words": [
62-
"auditd"
62+
"auditd",
63+
"covid"
6364
],
6465
"git.ignoreLimitWarning": true
6566
}

CODEOWNERS

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,17 @@
11
# Testing the new code owners feature in GitHub. Please contact Cory Fowler if you have questions.
2+
3+
# Horizontals
4+
5+
## Azure Policy: Samples
6+
articles/**/policy-samples.md @DCtheGeek
7+
includes/policy/ @DCtheGeek
8+
9+
# Azure Active Directory
10+
11+
articles/active-directory-b2c/ @msmimart @yoelhor
12+
articles/active-directory/app-provisioning/ @CelesteDG
13+
articles/active-directory/manage-apps/ @CelesteDG
14+
215
# Cognitive Services
316
articles/cognitive-services/ @diberry @erhopf @aahill @ievangelist @patrickfarley @nitinme
417

@@ -9,7 +22,7 @@ articles/jenkins/ @TomArcherMsft
922
articles/terraform/ @TomArcherMsft
1023

1124
# Requires Internal Review
12-
articles/best-practices-availability-paired-regions.md @jpconnock @martinekuan @syntaxc4 @tysonn @snoviking
25+
articles/best-practices-availability-paired-regions.md @martinekuan @syntaxc4 @snoviking
1326

1427
# Governance
1528
articles/governance/ @DCtheGeek

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ For more information, see the [Code of Conduct FAQ](https://opensource.microsoft
1111

1212
## How can I contribute?
1313

14-
There are a variety of ways to contribute to the documentation, review the sections below to find out which one is right for you.
14+
There are many ways to contribute to the documentation, review the sections below to find out which one is right for you.
1515

1616
### Reporting Bugs and Suggesting Enhancements
1717

articles/active-directory-b2c/TOC.yml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,8 @@
7676
href: user-overview.md
7777
- name: User profile attributes
7878
href: user-profile-attributes.md
79+
- name: SSO sessions
80+
href: session-overview.md
7981
- name: How-to guides
8082
items:
8183
- name: App integration
@@ -224,7 +226,9 @@
224226
- name: Tokens and session management
225227
items:
226228
- name: Customize tokens
227-
href: custom-policy-manage-sso-and-token-config.md
229+
href: configure-tokens-custom-policy.md
230+
- name: Configure session behavior
231+
href: session-behavior-custom-policy.md
228232
- name: Pass through external IdP token
229233
href: idp-pass-through-custom.md
230234
- name: Adaptive experience
@@ -335,8 +339,8 @@
335339
href: phone-factor-technical-profile.md
336340
- name: REST
337341
href: restful-technical-profile.md
338-
- name: SAML
339-
href: saml-technical-profile.md
342+
- name: SAML identity provider
343+
href: saml-identity-provider-technical-profile.md
340344
- name: SAML token issuer
341345
href: saml-issuer-technical-profile.md
342346
- name: Self-asserted

articles/active-directory-b2c/access-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/16/2019
11+
ms.date: 05/12/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414

@@ -81,7 +81,7 @@ https://jwt.ms/?code=eyJraWQiOiJjcGltY29yZV8wOTI1MjAxNSIsInZlciI6IjEuMC...
8181
After successfully receiving the authorization code, you can use it to request an access token:
8282

8383
```HTTP
84-
POST <tenant-name>.onmicrosoft.com/oauth2/v2.0/token?p=<policy-name> HTTP/1.1
84+
POST <tenant-name>.onmicrosoft.com/<policy-name>/oauth2/v2.0/token HTTP/1.1
8585
Host: <tenant-name>.b2clogin.com
8686
Content-Type: application/x-www-form-urlencoded
8787

articles/active-directory-b2c/best-practices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Define your application and service architecture, inventory current systems, and
3939
| Create a migration plan |Planning ahead can make migration go more smoothly. Learn more about [user migration](user-migration.md).|
4040
| Usability vs. security | Your solution must strike the right balance between application usability and your organization's acceptable level of risk. |
4141
| Move on-premises dependencies to the cloud | To help ensure a resilient solution, consider moving existing application dependencies to the cloud. |
42-
| Migrate existing apps to b2clogin.com | The deprecation of login.microsoftonline.com went into effect for all Azure AD B2C tenants on 04 December 2020. [Learn more](b2clogin.md). |
42+
| Migrate existing apps to b2clogin.com | The deprecation of login.microsoftonline.com will go into effect for all Azure AD B2C tenants on 04 December 2020. [Learn more](b2clogin.md). |
4343

4444
## Implementation
4545

@@ -88,4 +88,4 @@ Stay up to date with the state of the service and find support options.
8888
|--|--|
8989
| [Service updates](https://azure.microsoft.com/updates/?product=active-directory-b2c) | Stay up to date with Azure AD B2C product updates and announcements. |
9090
| [Microsoft Support](support-options.md) | File a support request for Azure AD B2C technical issues. Billing and subscription management support is provided at no cost. |
91-
| [Azure status](https://status.azure.com/status) | View the current health status of all Azure services. |
91+
| [Azure status](https://status.azure.com/status) | View the current health status of all Azure services. |

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/30/2020
12+
ms.date: 04/21/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -86,7 +86,14 @@ The following sections list available claim resolvers.
8686
| {Context:IPAddress} | The user IP address. | 11.111.111.11 |
8787
| {Context:KMSI} | Indicates whether [Keep me signed in](custom-policy-keep-me-signed-in.md) checkbox is selected. | true |
8888

89-
### Non-protocol parameters
89+
### Claims
90+
91+
| Claim | Description | Example |
92+
| ----- | ----------- | --------|
93+
| {Claim:claim type} | An identifier of a claim type already defined in the ClaimsSchema section in the policy file or parent policy file. For example: `{Claim:displayName}`, or `{Claim:objectId}`. | A claim type value.|
94+
95+
96+
### OAuth2 key-value parameters
9097

9198
Any parameter name included as part of an OIDC or OAuth2 request can be mapped to a claim in the user journey. For example, the request from the application might include a query string parameter with a name of `app_session`, `loyalty_number`, or any custom query string.
9299

@@ -114,6 +121,7 @@ Any parameter name included as part of an OIDC or OAuth2 request can be mapped t
114121
| {SAML:AllowCreate} | The `AllowCreate` attribute value, from the `NameIDPolicy` element of the SAML request. | True |
115122
| {SAML:ForceAuthn} | The `ForceAuthN` attribute value, from the `AuthnRequest` element of the SAML request. | True |
116123
| {SAML:ProviderName} | The `ProviderName` attribute value, from the `AuthnRequest` element of the SAML request.| Contoso.com |
124+
| {SAML:RelayState} | The `RelayState` query string parameter.|
117125

118126
## Using claim resolvers
119127

@@ -127,7 +135,7 @@ You can use claims resolvers with the following elements:
127135
|[OpenID Connect](openid-connect-technical-profile.md) technical profile| `InputClaim`, `OutputClaim`| 1, 2|
128136
|[Claims transformation](claims-transformation-technical-profile.md) technical profile| `InputClaim`, `OutputClaim`| 1, 2|
129137
|[RESTful provider](restful-technical-profile.md) technical profile| `InputClaim`| 1, 2|
130-
|[SAML2](saml-technical-profile.md) technical profile| `OutputClaim`| 1, 2|
138+
|[SAML identity provider](saml-identity-provider-technical-profile.md) technical profile| `OutputClaim`| 1, 2|
131139
|[Self-Asserted](self-asserted-technical-profile.md) technical profile| `InputClaim`, `OutputClaim`| 1, 2|
132140
|[ContentDefinition](contentdefinitions.md)| `LoadUri`| |
133141
|[ContentDefinitionParameters](relyingparty.md#contentdefinitionparameters)| `Parameter` | |

articles/active-directory-b2c/code-samples.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,3 +43,9 @@ The following tables provide links to samples for applications including iOS, An
4343
| Sample | Description |
4444
|--------| ----------- |
4545
| [javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp) | A single page application (SPA) calling a Web API. Authentication is done with Azure AD B2C by using MSAL.js. |
46+
47+
## SAML test application
48+
49+
| Sample | Description |
50+
|--------| ----------- |
51+
| [saml-sp-tester](https://github.com/azure-ad-b2c/saml-sp-tester/tree/master/source-code) | SAML test application to test Azure AD B2C configured to act as SAML identity provider. |

0 commit comments

Comments
 (0)