Skip to content

Commit 8f3b94a

Browse files
author
Trevor Bye
committed
syncing
2 parents f4f46e6 + dbdd44c commit 8f3b94a

File tree

716 files changed

+13222
-5659
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

716 files changed

+13222
-5659
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3060,6 +3060,11 @@
30603060
"redirect_url": "/azure/virtual-machines/linux/key-vault-setup",
30613061
"redirect_document_id": true
30623062
},
3063+
{
3064+
"source_path": "articles/key-vault/key-vault-whatis.md",
3065+
"redirect_url": "/azure/key-vault/basic-concepts",
3066+
"redirect_document_id": false
3067+
},
30633068
{
30643069
"source_path": "articles/key-vault/key-vault-versions.md",
30653070
"redirect_url": "/azure/key-vault",
@@ -41581,6 +41586,21 @@
4158141586
"redirect_url": "https://github.com/Azure-Samples/cognitive-services-quickstart-code/tree/master/php/ComputerVision/use-domain-model",
4158241587
"redirect_document_id": false
4158341588
},
41589+
{
41590+
"source_path": "articles/cognitive-services/Computer-vision/quickstarts-sdk/csharp-analyze-sdk.md",
41591+
"redirect_url": "/azure/cognitive-services/Computer-vision/quickstarts-sdk/csharp-sdk",
41592+
"redirect_document_id": false
41593+
},
41594+
{
41595+
"source_path": "articles/cognitive-services/Computer-vision/quickstarts-sdk/csharp-hand-text-sdk.md",
41596+
"redirect_url": "/azure/cognitive-services/Computer-vision/quickstarts-sdk/csharp-sdk",
41597+
"redirect_document_id": false
41598+
},
41599+
{
41600+
"source_path": "articles/cognitive-services/Computer-vision/quickstarts-sdk/csharp-thumb-sdk.md",
41601+
"redirect_url": "/azure/cognitive-services/Computer-vision/quickstarts-sdk/csharp-sdk",
41602+
"redirect_document_id": false
41603+
},
4158441604
{
4158541605
"source_path": "articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Upload-Images.md",
4158641606
"redirect_url": "/azure/cognitive-services/content-moderator",

articles/active-directory-b2c/active-directory-b2c-overview-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The customer identity and access management (CIAM) service in Azure includes:
5151

5252
Azure AD B2C interacts with identity providers, users, other systems, and with the local user directory in sequence to achieve an identity task. For example, sign in a user, register a new user, or reset a password. The Identity Experience Framework and a policy (also called a user journey or a trust framework policy) establishes multi-party trust and explicitly defines the actors, the actions, the protocols, and the sequence of steps to complete.
5353

54-
The Identity Experience Framework is a fully configurable, policy-driven, cloud-based Azure platform that orchestrates trust between entities in standard protocol formats such as OpenID Connect, OAuth, SAML, WSFed, and a few non-standard ones, for example REST API-based system-to-system claims exchanges. The framework creates user-friendly, white-labeled experiences that support HTML and CSS.
54+
The Identity Experience Framework is a fully configurable, policy-driven, cloud-based Azure platform that orchestrates trust between entities in standard protocol formats such as OpenID Connect, OAuth, SAML, and a few non-standard ones, for example REST API-based system-to-system claims exchanges. The framework creates user-friendly, white-labeled experiences that support HTML and CSS.
5555

5656
A custom policy is represented as one or several XML-formatted files that refer to each other in a hierarchical chain. The XML elements define the claims schema, claims transformations, content definitions, claims providers, technical profiles, and user journey orchestration steps, among other elements. A custom policy is accessible as one or several XML files that are executed by the Identity Experience Framework when invoked by a relying party. Developers configuring custom policies must define the trusted relationships in careful detail to include metadata endpoints, exact claims exchange definitions, and configure secrets, keys, and certificates as needed by each identity provider.
5757

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 156 additions & 49 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md

Lines changed: 68 additions & 59 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-setup-commonaad-custom.md

Lines changed: 85 additions & 69 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/claimsschema.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ The **Protocol** element contains the following attributes:
6767

6868
| Attribute | Required | Description |
6969
| --------- | -------- | ----------- |
70-
| Name | Yes | The name of a valid protocol supported by Azure AD B2C. Possible values are: OAuth1, OAuth2, SAML2, OpenIdConnect, WsFed, or WsTrust. |
70+
| Name | Yes | The name of a valid protocol supported by Azure AD B2C. Possible values are: OAuth1, OAuth2, SAML2, OpenIdConnect. |
7171
| PartnerClaimType | Yes | The claim type name to be used. |
7272

7373
In the following example, when the Identity Experience Framework interacts with a SAML2 identity provider or relying party application, the **surname** claim is mapped to `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname`, with OpenIdConnect and OAuth2, the claim is mapped to `family_name`.
42.6 KB
Loading
-89.6 KB
Loading

0 commit comments

Comments
 (0)