Skip to content

Commit 8a14fae

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into sdg-fix-tutorial
2 parents 9111e70 + dcd8055 commit 8a14fae

File tree

4,797 files changed

+67588
-50933
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,797 files changed

+67588
-50933
lines changed

.openpublishing.redirection.json

Lines changed: 592 additions & 196 deletions
Large diffs are not rendered by default.

.vscode/settings.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,4 +62,4 @@
6262
"auditd"
6363
],
6464
"git.ignoreLimitWarning": true
65-
}
65+
}

articles/active-directory-b2c/azure-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,8 +80,8 @@ To onboard your Azure AD tenant (the **Customer**), create an [Azure Resource Ma
8080

8181
Download the Azure Resource Manager template and parameter files:
8282

83-
- [rgDelegatedResourceManagement.json](https://raw.githubusercontent.com/Azure/Azure-Lighthouse-samples/master/Azure-Delegated-Resource-Management/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.json)
84-
- [rgDelegatedResourceManagement.parameters.json](https://raw.githubusercontent.com/Azure/Azure-Lighthouse-samples/master/Azure-Delegated-Resource-Management/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.parameters.json)
83+
- [rgDelegatedResourceManagement.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.json)
84+
- [rgDelegatedResourceManagement.parameters.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.parameters.json)
8585

8686
Next, update the parameters file with the values you recorded earlier. The following JSON snippet shows an example of an Azure Resource Manager template parameters file. For `authorizations.value.roleDefinitionId`, use the [built-in role](../role-based-access-control/built-in-roles.md) value for the *Contributor role*, `b24988ac-6180-42a0-ab88-20f7382dd24c`.
8787

articles/active-directory-b2c/custom-policy-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ Next, expose the API by adding a scope:
112112
1. In **App registrations (Legacy)**, select **New application registration**.
113113
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
114114
1. For **Application type**, choose **Native**.
115-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
115+
1. For **Redirect URI**, enter `myapp://auth`.
116116
1. Select **Create**. After it's created, copy the application ID and save it to use later.
117117
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
118118
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
@@ -125,7 +125,7 @@ Next, expose the API by adding a scope:
125125
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
126126
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
127127
1. Under **Redirect URI**, use the drop-down to select **Public client/native (mobile & desktop)**.
128-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
128+
1. For **Redirect URI**, enter `myapp://auth`.
129129
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
130130
1. Select **Register**.
131131
1. Record the **Application (client) ID** for use in a later step.

articles/active-directory-b2c/identity-provider-adfs2016-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Now that you have a button in place, you need to link it to an action. The actio
165165
To use ADFS as an identity provider in Azure AD B2C, you need to create an ADFS Relying Party Trust with the Azure AD B2C SAML metadata. The following example shows a URL address to the SAML metadata of an Azure AD B2C technical profile:
166166

167167
```
168-
https://your-tenant-name.b2clogin.com/your-tenant-name/your-policy/samlp/metadata?idptp=your-technical-profile
168+
https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy/samlp/metadata?idptp=your-technical-profile
169169
```
170170
171171
Replace the following values:
27.4 KB
Loading
19.9 KB
Loading
34.7 KB
Loading
44.1 KB
Loading

0 commit comments

Comments
 (0)