Skip to content

Commit 8a7d0de

Browse files
committed
fix merge conflict
2 parents 395be43 + 475b6ea commit 8a7d0de

File tree

515 files changed

+4742
-4216
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

515 files changed

+4742
-4216
lines changed

.openpublishing.publish.config.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -259,6 +259,24 @@
259259
"url": "https://github.com/Azure-Samples/cognitive-services-java-sdk-samples",
260260
"branch": "master",
261261
"branch_mapping": {}
262+
},
263+
{
264+
"path_to_root": "aml-sdk-samples",
265+
"url": "https://github.com/Azure/MachineLearningNotebooks",
266+
"branch": "sdk-codetest",
267+
"branch_mapping": {}
268+
},
269+
{
270+
"path_to_root": "cognitive-services-vision-csharp-sdk-quickstarts",
271+
"url": "https://github.com/Azure-Samples/cognitive-services-vision-csharp-sdk-quickstarts",
272+
"branch": "master",
273+
"branch_mapping": {}
274+
},
275+
{
276+
"path_to_root": "cognitive-face-csharp-sample",
277+
"url": "https://github.com/Azure-Samples/Cognitive-Face-CSharp-sample",
278+
"branch": "master",
279+
"branch_mapping": {}
262280
}
263281
],
264282
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/machine-learning/service/how-to-choose-a-dev-environment.md",
5+
"redirect_url": "/azure/machine-learning/service/how-to-configure-environment",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/frontdoor/front-door-powershell-reference.md",
510
"redirect_url": "/powershell/module/azurerm.frontdoor",
@@ -11069,6 +11074,11 @@
1106911074
"redirect_url": "/azure/monitoring-and-diagnostics/alert-log",
1107011075
"redirect_document_id": false
1107111076
},
11077+
{
11078+
"source_path": "articles/monitoring-and-diagnostics/monitoring-overview-unified-alerts.md",
11079+
"redirect_url": "/azure/monitoring-and-diagnostics/monitoring-overview-alerts",
11080+
"redirect_document_id": false
11081+
},
1107211082
{
1107311083
"source_path": "articles/monitoring-and-diagnostics/monitoring-create-activity-log-alerts-with-resource-manager-template.md",
1107411084
"redirect_url": "/azure/monitoring-and-diagnostics/alert-activity-log",
@@ -30510,6 +30520,17 @@
3051030520
"source_path": "articles/iot-central/howto-create-application.md",
3051130521
"redirect_url": "/azure/iot-central/quick-deploy-iot-central",
3051230522
"redirect_document_id" : false
30523+
},
30524+
{
30525+
"source_path": "articles/media-services/latest/create-account-cli-quickstart.md",
30526+
"redirect_url": "/azure/media-services/latest/create-account-cli-how-to",
30527+
"redirect_document_id" : false
30528+
},
30529+
{
30530+
"source_path": "articles/backup/backup-mabs-upgrade-to-v2.md",
30531+
"redirect_url": "/azure/backup/backup-mabs-whats-new-mabs",
30532+
"redirect_document_id" : false
3051330533
}
30534+
3051430535
]
3051530536
}

articles/active-directory-b2c/claimsschema.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ The **Mask** element contains the following attributes:
105105
| Type | Yes | The type of the claim mask. Possible values: `Simple` or `Regex`. The `Simple` value indicates that a simple text mask is applied to the leading portion of a string claim. The `Regex` value indicates that a regular expression is applied to the string claim as whole. If the `Regex` value is specified, an optional attribute must also be defined with the regular expression to use. |
106106
| Regex | No | If **Type** is set to `Regex`, specify the regular expression to use.
107107

108-
The follwing example configures a **PhoneNumber** claim with the `Simple` mask:
108+
The following example configures a **PhoneNumber** claim with the `Simple` mask:
109109

110110
```XML
111111
<ClaimType Id="PhoneNumber">
@@ -120,7 +120,7 @@ The Identity Experience Framework renders the phone number while hiding the firs
120120

121121
![Using claim type with mask](./media/claimsschema/mask.png)
122122

123-
The follwing example configures a **AlternateEmail** claim with the `Regex` mask:
123+
The following example configures a **AlternateEmail** claim with the `Regex` mask:
124124

125125
```XML
126126
<ClaimType Id="AlternateEmail">

articles/active-directory-b2c/oauth2-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The **InputClaims** and **InputClaimsTransformations** elements are not required
4242

4343
## Output claims
4444

45-
The **OutputClaims** element contains a list of claims returned by the OAuth2 identity provider. You may need to map the name of the claim defined in your policy to the name defined in the identity provider. You can also include claims that aren't returned by the identity provider as long as the you set the `DefaultValue` attribute.
45+
The **OutputClaims** element contains a list of claims returned by the OAuth2 identity provider. You may need to map the name of the claim defined in your policy to the name defined in the identity provider. You can also include claims that aren't returned by the identity provider as long as you set the `DefaultValue` attribute.
4646

4747
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
4848

articles/active-directory-b2c/technical-profiles-overview.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,7 @@ A technical profile enables these types of scenarios:
3434
- [SAML2](saml-technical-profile.md) - Federation with any SAML protocol identity provider.
3535
- [Self-Asserted](self-asserted-technical-profile.md) - Interact with the user. For example, collect the user's credential to sign in, render the sign-up page, or password reset.
3636
- **WsFed** - Federation with any WsFed protocol identity provider.
37-
- **Session management** - Handle different types of sessions.
38-
- **User journey context provider**
37+
- [Session management](active-directory-b2c-reference-sso-custom.md) - Handle different types of sessions.
3938
- **Application insights**
4039

4140
## Technical profile flow
@@ -52,7 +51,7 @@ All types of technical profiles share the same concept. You send input claims, r
5251
- Create or update the user account.
5352
- Sends and verifies the MFA text message.
5453
4. **ValidationTechnicalProfiles** - For a [self asserted technical profile](self-asserted-technical-profile.md), you can call an input [validation technical profile](validation-technical-profile.md). The validation technical profile validates the data profiled by the user and returns an error message or Ok, with or without output claims. For example, before Azure AD B2C creates a new account, it checks whether the user already exists in the directory services. You can call a REST API technical profile to add your own business logic.<p>The scope of the output claims of a validation technical profile is limited to the technical profile that invokes the validation technical profile and other validation technical profiles under same technical profile. If you want to use the output claims in the next orchestration step, you need to add the output claims to the technical profile that invokes the validation technical profile.
55-
5. **OutputClaims** - Claims are retuned back to the claims bag. You can use those claims in the next orchestrations step, or output claims transformations.
54+
5. **OutputClaims** - Claims are returned back to the claims bag. You can use those claims in the next orchestrations step, or output claims transformations.
5655
6. **OutputClaimsTransformations** - Input claims of every output [claims transformation](claimstransformations.md) are picked up from the claims bag. The output claims of the technical profile from the previous steps can be input claims of an output claims transformation. After execution, the output claims are put back in the claims bag. The output claims of an output claims transformation can also be input claims of a subsequent output claims transformation.
5756
7. **Single sign-on (SSO) session management** - [SSO session management](active-directory-b2c-reference-sso-custom.md) controls interaction with a user after the user has already authenticated. For example, the administrator can control whether the selection of identity providers is displayed, or whether local account details need to be entered again.
5857

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ The **UseTechnicalProfileForSessionManagement** element contains the following a
268268
| ReferenceId | Yes | An identifier of a technical profile already defined in the policy file or parent policy file. |
269269

270270
### EnabledForUserJourneys
271-
The **ClaimsProviderSelections** in a user journey defines the list of claims provider selection options and their order. With the **EnabledForUserJourneys** element you filter, which claims provider is avaible to the user. The **EnabledForUserJourneys** element contains one of the following values:
271+
The **ClaimsProviderSelections** in a user journey defines the list of claims provider selection options and their order. With the **EnabledForUserJourneys** element you filter, which claims provider is available to the user. The **EnabledForUserJourneys** element contains one of the following values:
272272

273273
- **Always**, execute the technical profile.
274274
- **Never**, skip the technical profile.

articles/active-directory-b2c/userjourneys.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,7 @@ The **UserJourney** element contains the following elements:
4545

4646
A user journey is represented as an orchestration sequence that must be followed through for a successful transaction. If any step fails, the transaction fails. These orchestration steps reference both the building blocks and the claims providers allowed in the policy file. Any orchestration step that is responsible to show or render a user experience also has a reference to the corresponding content definition identifier.
4747

48-
Orchestration steps can be conditionaly ecxetuted, based on preconditions defined in the orchestration step element. For examle you can check to perform an orchestration step only if a specific claims exists, or if a claim is equal or not to the specified value.
49-
48+
Orchestration steps can be conditionaly executed, based on preconditions defined in the orchestration step element. For examle you can check to perform an orchestration step only if a specific claims exists, or if a claim is equal or not to the specified value.
5049

5150
To specify the ordered list of orchestration steps, an **OrchestrationSteps** element is added as part of the policy. This element is required.
5251

@@ -62,7 +61,7 @@ The **OrchestrationStep** element contains the following attributes:
6261
| --------- | -------- | ----------- |
6362
| Order | Yes | The order of the orchestration steps. |
6463
| Type | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
65-
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples, if the type of the orchestration step is one of follwing: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`. Azure AD B2C needs to display the identity provider selection without having a technical profile. |
64+
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples, if the type of the orchestration step is one of following: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`. Azure AD B2C needs to display the identity provider selection without having a technical profile. |
6665
| CpimIssuerTechnicalProfileReferenceId | No | The type of the orchestration step is `SendClaims`. This property defines the technical profile identifier of the claims provider that issues the token for the relying party. If absent, no relying party token is created. |
6766

6867

articles/active-directory-b2c/validation-technical-profile.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ A validation technical profile is an ordinary technical profile from any protoco
2727
}
2828
```
2929

30-
Claims that are retuned from a validation technical profile are added back to the claims bag. You can use those claims in the next validation technical profiles.
30+
Claims that are returned from a validation technical profile are added back to the claims bag. You can use those claims in the next validation technical profiles.
3131

3232
Validation technical profiles are executed in the sequence that they appear in the **ValidationTechnicalProfiles** element. You can configure in a validation technical profile whether the execution of any subsequent validation technical profiles should continue if the validation technical profile raises an error or is successful.
3333

@@ -49,8 +49,8 @@ The **ValidationTechnicalProfile** element contains the following attribute:
4949
| Attribute | Required | Description |
5050
| --------- | -------- | ----------- |
5151
| ReferenceId | Yes | An identifier of a technical profile already defined in the policy or parent policy. |
52-
|ContinueOnError|No| Indicating whether validation of any subsequent validation technical profiles should continue if this validaiton technical profile raises an error. Posible values: `true` or `false` (default, processing of further validation profiles will stop and an error returned).
53-
|ContinueOnSuccess | No | Indicating whether validation of any subsequent validation profiles should continue if this validation technical profile succeeds. Posible values: `true` or `false`. The default is `true`, meaning that the processing of further validation profiles will continue. |
52+
|ContinueOnError|No| Indicating whether validation of any subsequent validation technical profiles should continue if this validaiton technical profile raises an error. Possible values: `true` or `false` (default, processing of further validation profiles will stop and an error returned).
53+
|ContinueOnSuccess | No | Indicating whether validation of any subsequent validation profiles should continue if this validation technical profile succeeds. Possible values: `true` or `false`. The default is `true`, meaning that the processing of further validation profiles will continue. |
5454

5555
The **ValidationTechnicalProfile** element contains the following element:
5656

@@ -77,8 +77,8 @@ The **Precondition** element contains following elements:
7777
Following example uses these validation technical profiles:
7878

7979
1. The first validation technical profile checks user credentials and doesn't continue if an error occurs, such as invalid username or bad password.
80-
2. The next validation technical profile, doesn't execute if the userType claim does not exist, or if the value of the userType is `Partner`. The validation technical profile tries to read the user profile from the internal customer database and continue if an error occurs, such as REST API service not avaible, or any internal error.
81-
3. The last validation technical profile, doesn't execute if the userType claim has not existed, or if the value of the userType is `Customer`. The validation technical profile tries to read the user profile from the internal partner database and continues if an error occurs, such as REST API service not avaible, or any internal error.
80+
2. The next validation technical profile, doesn't execute if the userType claim does not exist, or if the value of the userType is `Partner`. The validation technical profile tries to read the user profile from the internal customer database and continue if an error occurs, such as REST API service not available, or any internal error.
81+
3. The last validation technical profile, doesn't execute if the userType claim has not existed, or if the value of the userType is `Customer`. The validation technical profile tries to read the user profile from the internal partner database and continues if an error occurs, such as REST API service not available, or any internal error.
8282

8383
```XML
8484
<ValidationTechnicalProfiles>

0 commit comments

Comments
 (0)