Skip to content

Commit 8f9559e

Browse files
committed
Fix merge
2 parents e241ec7 + f7f4959 commit 8f9559e

File tree

2,004 files changed

+31516
-16803
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,004 files changed

+31516
-16803
lines changed

.openpublishing.redirection.json

Lines changed: 56 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/php-download-sdk.md",
5+
"redirect_url": "https://github.com/Azure/azure-sdk-for-php",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/azure-government/documentation-government-get-started-connect-with-vs.md",
510
"redirect_url": "/azure/azure-government/documentation-government-welcome",
@@ -115,6 +120,11 @@
115120
"redirect_url": "/articles/active-directory/saas-apps/miro-tutorial",
116121
"redirect_document_id": true
117122
},
123+
{
124+
"source_path": "articles/active-directory/saas-apps/redbrickhealth-tutorial.md",
125+
"redirect_url": "/articles/active-directory/saas-apps/redbrick-health-tutorial",
126+
"redirect_document_id": true
127+
},
118128
{
119129
"source_path": "articles/virtual-network/virtual-networks-dmz-nsg-asm.md",
120130
"redirect_url": "https://docs.microsoft.com/azure/architecture/vdc/networking-virtual-datacenter",
@@ -1535,6 +1545,26 @@
15351545
"redirect_url": "/azure/cosmos-db/powershell-samples-sql",
15361546
"redirect_document_id": true
15371547
},
1548+
{
1549+
"source_path": "articles/cosmos-db/scripts/powershell/create-and-configure-cassandra-database.md",
1550+
"redirect_url": "/azure/cosmos-db/powershell-samples-cassandra",
1551+
"redirect_document_id": false
1552+
},
1553+
{
1554+
"source_path": "articles/cosmos-db/scripts/powershell/create-graph-database-account-powershell.md",
1555+
"redirect_url": "/azure/cosmos-db/powershell-samples-gremlin",
1556+
"redirect_document_id": false
1557+
},
1558+
{
1559+
"source_path": "articles/cosmos-db/scripts/powershell/create-mongodb-database-account-powershell.md",
1560+
"redirect_url": "/azure/cosmos-db/powershell-samples-mongodb",
1561+
"redirect_document_id": false
1562+
},
1563+
{
1564+
"source_path": "articles/cosmos-db/scripts/powershell/create-table-database-account-powershell.md",
1565+
"redirect_url": "/azure/cosmos-db/powershell-samples-table",
1566+
"redirect_document_id": false
1567+
},
15381568
{
15391569
"source_path": "articles/cosmos-db/scripts/powershell/sql/ps-account-delete.md",
15401570
"redirect_url": "/azure/cosmos-db/powershell-samples-sql",
@@ -10785,6 +10815,16 @@
1078510815
"redirect_url": "/azure/dns/dns-reverse-dns-for-azure-services",
1078610816
"redirect_document_id": false
1078710817
},
10818+
{
10819+
"source_path": "articles/dns/scripts/traffic-manager-cli-create-dns-zone-record.md",
10820+
"redirect_url": "/azure/dns/scripts/dns-cli-create-dns-zone-record",
10821+
"redirect_document_id": false
10822+
},
10823+
{
10824+
"source_path": "articles/dns/private-dns-portal.md",
10825+
"redirect_url": "/azure/dns/private-dns-getstarted-portal",
10826+
"redirect_document_id": false
10827+
},
1078810828
{
1078910829
"source_path": "articles/data-lake-analytics/data-lake-analytics-get-started-net-sdk.md",
1079010830
"redirect_url": "/azure/data-lake-analytics/data-lake-analytics-get-started-cli2",
@@ -13892,7 +13932,7 @@
1389213932
},
1389313933
{
1389413934
"source_path": "articles/mysql/reference-sync-data-store-procedures.md",
13895-
"redirect_url": "/azure/mysql/reference-data-in-stored-procedures",
13935+
"redirect_url": "/azure/mysql/reference-stored-procedures",
1389613936
"redirect_document_id": false
1389713937
},
1389813938
{
@@ -26159,11 +26199,6 @@
2615926199
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#custom-alert-rules-preview",
2616026200
"redirect_document_id": false
2616126201
},
26162-
{
26163-
"source_path": "articles/security-center/security-center-threat-intel.md",
26164-
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#menu_securityeventsmap",
26165-
"redirect_document_id": false
26166-
},
2616726202
{
2616826203
"source_path": "articles/virtual-network/virtual-network-deploy-multinic-arm-cli.md",
2616926204
"redirect_url": "/azure/virtual-machines/linux/multiple-nics",
@@ -35648,6 +35683,11 @@
3564835683
"redirect_url": "/azure/key-vault/vs-key-vault-add-connected-service",
3564935684
"redirect_document_id": false
3565035685
},
35686+
{
35687+
"source_path": "articles/iot-central/howto-generate-connection-string.md",
35688+
"redirect_url": "/azure/iot-central",
35689+
"redirect_document_id": false
35690+
},
3565135691
{
3565235692
"source_path": "articles/iot-central/howto-create-application.md",
3565335693
"redirect_url": "/azure/iot-central/quick-deploy-iot-central",
@@ -41840,6 +41880,16 @@
4184041880
"source_path": "articles/sql-database/sql-database-managed-instance-pools.md",
4184141881
"redirect_url": "/azure/sql-database/sql-database-instance-pools",
4184241882
"redirect_document_id": false
41883+
},
41884+
{
41885+
"source_path": "articles/mysql/reference-data-in-stored-procedures.md",
41886+
"redirect_url": "/azure/mysql/reference-stored-procedures",
41887+
"redirect_document_id": false
41888+
},
41889+
{
41890+
"source_path": "articles/mariadb/reference-data-in-stored-procedures.md",
41891+
"redirect_url": "/azure/mariadb/reference-stored-procedures",
41892+
"redirect_document_id": false
4184341893
}
4184441894
]
4184541895
}

articles/active-directory-b2c/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@
55
- name: About Azure AD B2C
66
expanded: true
77
href: active-directory-b2c-overview.md
8+
- name: Technical and feature overview
9+
href: technical-overview.md
810
- name: Quickstarts
911
expanded: true
1012
items:
@@ -374,4 +376,4 @@
374376
- name: Support
375377
href: active-directory-b2c-support.md
376378
- name: Videos
377-
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory-b2c
379+
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory-b2c

articles/active-directory-b2c/active-directory-b2c-access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.subservice: B2C
1515
---
1616
# Request an access token in Azure Active Directory B2C
1717

18-
An *access token* contains claims that you can use in Azure Active Directory (Azure AD) B2C to identify the granted permissions to your APIs. When calling a resource server, an access token must be present in the HTTP request. An access token is denoted as **access_token** in the responses from Azure AD B2C.
18+
An *access token* contains claims that you can use in Azure Active Directory B2C (Azure AD B2C) to identify the granted permissions to your APIs. When calling a resource server, an access token must be present in the HTTP request. An access token is denoted as **access_token** in the responses from Azure AD B2C.
1919

2020
This article shows you how to request an access token for a web application and web API. For more information about tokens in Azure AD B2C, see the [overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md).
2121

articles/active-directory-b2c/active-directory-b2c-apps.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.subservice: B2C
1515
---
1616
# Application types that can be used in Active Directory B2C
1717

18-
Azure Active Directory (Azure AD) B2C supports authentication for a variety of modern application architectures. All of them are based on the industry standard protocols [OAuth 2.0](active-directory-b2c-reference-protocols.md) or [OpenID Connect](active-directory-b2c-reference-protocols.md). This article describes the types of applications that you can build, independent of the language or platform you prefer. It also helps you understand the high-level scenarios before you start building applications.
18+
Azure Active Directory B2C (Azure AD B2C) supports authentication for a variety of modern application architectures. All of them are based on the industry standard protocols [OAuth 2.0](active-directory-b2c-reference-protocols.md) or [OpenID Connect](active-directory-b2c-reference-protocols.md). This article describes the types of applications that you can build, independent of the language or platform you prefer. It also helps you understand the high-level scenarios before you start building applications.
1919

2020
Every application that uses Azure AD B2C must be registered in your [Azure AD B2C tenant](active-directory-b2c-get-started.md) by using the [Azure portal](https://portal.azure.com/). The application registration process collects and assigns values, such as:
2121

@@ -128,12 +128,12 @@ This chained web API scenario can be supported by using the OAuth 2.0 JWT bearer
128128

129129
Do not edit Azure AD B2C applications in these ways:
130130

131-
- On other application management portals such as the [Application Registration Portal](https://apps.dev.microsoft.com/).
131+
- On other application management portals such as the [Application Registration Portal](https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade).
132132
- Using Graph API or PowerShell.
133133

134134
If you edit the Azure AD B2C application outside of the Azure portal, it becomes a faulted application and is no longer usable with Azure AD B2C. Delete the application and create it again.
135135

136-
To delete the application, go to the [Application Registration Portal](https://apps.dev.microsoft.com/) and delete the application there. In order for the application to be visible, you need to be the owner of the application (and not just an admin of the tenant).
136+
To delete the application, go to the [Application Registration Portal](https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade) and delete the application there. In order for the application to be visible, you need to be the owner of the application (and not just an admin of the tenant).
137137

138138
## Next steps
139139

articles/active-directory-b2c/active-directory-b2c-configure-signup-self-asserted-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.subservice: B2C
1616

1717
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1818

19-
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown and define whether it's required.
19+
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory B2C (Azure AD B2C). You configure the entry as a dropdown and define whether it's required.
2020

2121
## Prerequisites
2222

@@ -256,7 +256,7 @@ The following elements are used to define the claim:
256256
## Test the custom policy
257257

258258
1. Sign in to the [Azure portal](https://portal.azure.com).
259-
2. Make sure you're using the directory that contains your Azure AD tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your Azure AD tenant.
259+
2. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
260260
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
261261
4. Select **Identity Experience Framework (Preview)**.
262262
5. Select **Upload Custom Policy**, and then upload the two policy files that you changed.

articles/active-directory-b2c/active-directory-b2c-create-custom-attributes-profile-edit-custom.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.subservice: B2C
1616

1717
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1818

19-
In this article, you create a custom attribute in your Azure Active Directory (Azure AD) B2C directory. You'll use this new attribute as a custom claim in the profile edit user journey.
19+
In this article, you create a custom attribute in your Azure Active Directory B2C (Azure AD B2C) directory. You'll use this new attribute as a custom claim in the profile edit user journey.
2020

2121
## Prerequisites
2222

@@ -38,7 +38,7 @@ If the application is deleted, those extension properties along with any data co
3838
Extension properties exist only in the context of a registered application in the tenant. The object ID of that application must be included in the **TechnicalProfile** that uses it.
3939

4040
>[!NOTE]
41-
>The Azure AD B2C directory typically includes a web app named `b2c-extensions-app`. This application is primarily used by the B2C built-in policies for the custom claims created via the Azure portal. We recommend that only advanced users register extensions for B2C custom policies by using this application.
41+
>The Azure AD B2C directory typically includes a web app named `b2c-extensions-app`. This application is primarily used by the B2C built-in policies for the custom claims created via the Azure portal. We recommend that only advanced users register extensions for B2C custom policies by using this application.
4242
Instructions are included in the **Next steps** section in this article.
4343

4444
## Create a new application to store the extension properties
@@ -64,7 +64,7 @@ Instructions are included in the **Next steps** section in this article.
6464

6565
When you followed the steps in [Azure Active Directory B2C: Get started with custom policies](active-directory-b2c-get-started-custom.md), you downloaded and modified [sample files](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/archive/master.zip) named **TrustFrameworkBase.xml**, **TrustFrameworkExtensions.xml**, **SignUpOrSignin.xml**, **ProfileEdit.xml**, and **PasswordReset.xml**. In this step, you make more modifications to those files.
6666

67-
* Open the **TrustFrameworkBase.xml** file and add the `Metadata` section as shown in the following example. Insert the object ID that you previously recorded for the `ApplicationObjectId` value and the application ID that you recorded for the `ClientId` value:
67+
* Open the **TrustFrameworkBase.xml** file and add the `Metadata` section as shown in the following example. Insert the object ID that you previously recorded for the `ApplicationObjectId` value and the application ID that you recorded for the `ClientId` value:
6868

6969
```xml
7070
<ClaimsProviders>
@@ -98,7 +98,7 @@ When you followed the steps in [Azure Active Directory B2C: Get started with cus
9898

9999
1. Open the **ProfileEdit.xml** file.
100100
2. Add a custom claim `loyaltyId`. By including the custom claim in the `<RelyingParty>` element, it's included in the token for the application.
101-
101+
102102
```xml
103103
<RelyingParty>
104104
<DefaultUserJourney ReferenceId="ProfileEdit" />
@@ -263,10 +263,10 @@ The ID token sent back to your application includes the new extension property a
263263

264264
2. Use the same extension attributes between built-in and custom policies. When you add extension, or custom, attributes via the portal experience, those attributes are registered by using the **b2c-extensions-app** that exists in every B2C tenant. Take the following steps to use extension attributes in your custom policy:
265265

266-
a. Within your B2C tenant in portal.azure.com, navigate to **Azure Active Directory** and select **App registrations**.
267-
b. Find your **b2c-extensions-app** and select it.
268-
c. Under **Essentials**, enter the **Application ID** and the **Object ID**.
269-
d. Include them in your **AAD-Common** TechnicalProfile metadata:
266+
a. Within your B2C tenant in portal.azure.com, navigate to **Azure Active Directory** and select **App registrations**.
267+
b. Find your **b2c-extensions-app** and select it.
268+
c. Under **Essentials**, enter the **Application ID** and the **Object ID**.
269+
d. Include them in your **AAD-Common** TechnicalProfile metadata:
270270

271271
```xml
272272
<ClaimsProviders>
@@ -294,6 +294,6 @@ The ID token sent back to your application includes the new extension property a
294294
For more information on extension properties, see the article [Directory schema extensions | Graph API concepts](/previous-versions/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
295295

296296
> [!NOTE]
297-
> * A **TechnicalProfile** is an element type, or function, that defines an endpoint’s name, metadata, and protocol. The **TechnicalProfile** details the exchange of claims that the Identity Experience Framework performs. When this function is called in an orchestration step or from another **TechnicalProfile**, the **InputClaims** and **OutputClaims** are provided as parameters by the caller.
298-
> * Extension attributes in the Graph API are named by using the convention `extension_ApplicationObjectID_attributename`.
297+
> * A **TechnicalProfile** is an element type, or function, that defines an endpoint’s name, metadata, and protocol. The **TechnicalProfile** details the exchange of claims that the Identity Experience Framework performs. When this function is called in an orchestration step or from another **TechnicalProfile**, the **InputClaims** and **OutputClaims** are provided as parameters by the caller.
298+
> * Extension attributes in the Graph API are named by using the convention `extension_ApplicationObjectID_attributename`.
299299
> * Custom policies refer to extension attributes as **extension_attributename**. This reference omits the **ApplicationObjectId** in XML.

0 commit comments

Comments
 (0)