Skip to content

Commit 9037deb

Browse files
committed
Merge branch 'main' into release-functions-bindings-refactor
2 parents e3f7268 + 1e6041e commit 9037deb

File tree

289 files changed

+2612
-1717
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

289 files changed

+2612
-1717
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43938,6 +43938,11 @@
4393843938
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create-group-policy.md",
4393943939
"redirect_url": "/azure/governance/policy/how-to/guest-configuration-create",
4394043940
"redirect_document_id": false
43941+
},
43942+
{
43943+
"source_path_from_root": "/articles/virtual-desktop/compare-virtual-desktop-windows-365.md",
43944+
"redirect_url": "/azure/virtual-desktop/overview",
43945+
"redirect_document_id": false
4394143946
}
4394243947
]
4394343948
}

articles/active-directory-b2c/claimsschema.md

Lines changed: 4 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 02/16/2022
11+
ms.date: 03/06/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: "b2c-support"
@@ -127,7 +127,7 @@ The **Mask** element contains the following attributes:
127127
| `Type` | Yes | The type of the claim mask. Possible values: `Simple` or `Regex`. The `Simple` value indicates that a simple text mask is applied to the leading portion of a string claim. The `Regex` value indicates that a regular expression is applied to the string claim as whole. If the `Regex` value is specified, an optional attribute must also be defined with the regular expression to use. |
128128
| `Regex` | No | If **`Type`** is set to `Regex`, specify the regular expression to use.
129129

130-
The following example configures a **PhoneNumber** claim with the `Simple` mask:
130+
The following example configures a **PhoneNumber** claim with the `Simple` mask. For more samples, check out the [Claim simple mask live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims#simple-mask).
131131

132132
```xml
133133
<ClaimType Id="PhoneNumber">
@@ -142,7 +142,7 @@ The Identity Experience Framework renders the phone number while hiding the firs
142142

143143
![Phone number claim shown in browser with first six digits masked by Xs](./media/claimsschema/mask.png)
144144

145-
The following example configures a **AlternateEmail** claim with the `Regex` mask:
145+
The following example configures a **AlternateEmail** claim with the `Regex` mask. For more samples, check out the [Regex mask live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims#regex-mask).
146146

147147
```xml
148148
<ClaimType Id="AlternateEmail">
@@ -157,7 +157,6 @@ The Identity Experience Framework renders only the first letter of the email add
157157

158158
![Email claim shown in browser with characters masked by asterisks](./media/claimsschema/mask-regex.png)
159159

160-
161160
### Restriction
162161

163162
The **Restriction** element may contain the following attribute:
@@ -185,7 +184,7 @@ The **Enumeration** element contains the following attributes:
185184
|Value | Yes | The claim value that is associated with selecting this option. |
186185
| SelectByDefault | No | Indicates whether or not this option should be selected by default in the UI. Possible values: True or False. |
187186

188-
The following example configures a **city** dropdown list claim with a default value set to `New York`:
187+
The following example configures a **city** dropdown list claim with a default value set to `New York`. For more samples, check out the [Claim restriction enumeration live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims#restriction-enumeration).
189188

190189
```xml
191190
<ClaimType Id="city">
@@ -390,7 +389,6 @@ The **Readonly** user input type is used to provide a readonly field to display
390389
</ClaimType>
391390
```
392391

393-
394392
#### Paragraph
395393

396394
The **Paragraph** user input type is used to provide a field that shows text only in a paragraph tag. For example, &lt;p&gt;text&lt;/p&gt;. A **Paragraph** user input type `OutputClaim` of self-asserted technical profile, must set the `Required` attribute `false` (default).
@@ -404,10 +402,5 @@ The **Paragraph** user input type is used to provide a field that shows text onl
404402
<AdminHelpText>A claim responsible for holding response messages to send to the relying party</AdminHelpText>
405403
<UserHelpText>A claim responsible for holding response messages to send to the relying party</UserHelpText>
406404
<UserInputType>Paragraph</UserInputType>
407-
<Restriction>
408-
<Enumeration Text="B2C_V1_90001" Value="You cannot sign in because you are a minor" />
409-
<Enumeration Text="B2C_V1_90002" Value="This action can only be performed by gold members" />
410-
<Enumeration Text="B2C_V1_90003" Value="You have not been enabled for this operation" />
411-
</Restriction>
412405
</ClaimType>
413406
```

articles/active-directory-b2c/configure-authentication-sample-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ Under the project root folder, open the *appsettings.json* file. This file conta
113113
|---------|---------|---------|
114114
|AzureAdB2C|Instance| The first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com`).|
115115
|AzureAdB2C|Domain| Your Azure AD B2C tenant full [tenant name](tenant-management.md#get-your-tenant-name) (for example, `contoso.onmicrosoft.com`).|
116-
|AzureAdB2C|ClientId| The web API application ID from [step 2](#step-2-register-a-web-application).|
116+
|AzureAdB2C|ClientId| The Web App Application (client) ID from [step 2](#step-2-register-a-web-application).|
117117
|AzureAdB2C|SignUpSignInPolicyId|The user flows or custom policy you created in [step 1](#step-1-configure-your-user-flow).|
118118

119119
Your final configuration file should look like the following JSON:

articles/active-directory-b2c/localization.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 01/21/2022
10+
ms.date: 03/06/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -110,24 +110,26 @@ The **Item** element contains the following attributes:
110110
| Value | Yes | The string claim value associated with selecting this option. |
111111
| SelectByDefault | No | Indicates whether or not this option should be selected by default in the UI. Possible values: True or False. |
112112

113-
The following example shows the use of the **LocalizedCollections** element. It contains two **LocalizedCollection** elements, one for English and another one for Spanish. Both set the **Restriction** collection of the claim `Gender` with a list of items for English and Spanish.
113+
The following example shows the use of the **LocalizedCollections** element. It contains two **LocalizedCollection** elements, one for English and another one for Spanish. Both set the **Restriction** collection of the claim `Gender` with a list of items for English and Spanish. For more samples, check out the [Claim restriction enumeration live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims#restriction-enumeration).
114114

115115
```xml
116116
<LocalizedResources Id="api.selfasserted.en">
117-
<LocalizedCollections>
118-
<LocalizedCollection ElementType="ClaimType" ElementId="Gender" TargetCollection="Restriction">
117+
<LocalizedCollections>
118+
<LocalizedCollection ElementType="ClaimType" ElementId="Gender" TargetCollection="Restriction">
119119
<Item Text="Female" Value="F" />
120120
<Item Text="Male" Value="M" />
121121
</LocalizedCollection>
122-
</LocalizedCollections>
122+
</LocalizedCollections>
123+
</LocalizedResources>
123124

124125
<LocalizedResources Id="api.selfasserted.es">
125126
<LocalizedCollections>
126127
<LocalizedCollection ElementType="ClaimType" ElementId="Gender" TargetCollection="Restriction">
127128
<Item Text="Femenino" Value="F" />
128129
<Item Text="Masculino" Value="M" />
129130
</LocalizedCollection>
130-
</LocalizedCollections>
131+
</LocalizedCollections>
132+
</LocalizedResources>
131133
```
132134

133135
### LocalizedStrings

articles/active-directory-b2c/protocols-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@ https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/oauth2/v2.0/authorize
3434
https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/oauth2/v2.0/token
3535
```
3636

37+
If you're using a [custom domain](custom-domain.md), replace `{tenant}.b2clogin.com` with the custom domain, such as `contoso.com`, in the endpoints.
38+
3739
In nearly all OAuth and OpenID Connect flows, four parties are involved in the exchange:
3840

3941

articles/active-directory/develop/includes/web-app/quickstart-aspnet-core.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Quickstart: ASP.NET Core web app that signs in users and calls Microsoft Graph | Azure"
33
titleSuffix: Microsoft identity platform
4-
description: In this quickstart, you learn how an app leverages Microsoft.Identity.Web to implement Microsoft sign-in in an ASP.NET Core web app using OpenID Connect and calls Microsoft Graph
4+
description: Learn how an ASP.NET Core web app leverages Microsoft.Identity.Web to implement Microsoft sign-in using OpenID Connect and call Microsoft Graph
55
services: active-directory
66
author: jmprieur
77
manager: CelesteDG
@@ -22,7 +22,7 @@ See [How the sample works](#how-the-sample-works) for an illustration.
2222

2323
## Prerequisites
2424

25-
* [Visual Studio 2019](https://visualstudio.microsoft.com/vs/) or [Visual Studio Code](https://code.visualstudio.com/)
25+
* [Visual Studio](https://visualstudio.microsoft.com/vs/) or [Visual Studio Code](https://code.visualstudio.com/)
2626
* [.NET Core SDK 3.1+](https://dotnet.microsoft.com/download)
2727

2828
## Register and download your quickstart application
@@ -46,7 +46,7 @@ See [How the sample works](#how-the-sample-works) for an illustration.
4646

4747
#### Step 2: Download the ASP.NET Core project
4848

49-
[Download the ASP.NET Core solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore3-1.zip)
49+
[Download the ASP.NET Core solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore3-1-callsgraph.zip)
5050

5151
[!INCLUDE [active-directory-develop-path-length-tip](../../../../../includes/active-directory-develop-path-length-tip.md)]
5252

@@ -84,6 +84,7 @@ After consenting to the requested permissions, the app displays that you've succ
8484

8585
:::image type="content" source="../../media/quickstart-v2-aspnet-core-webapp-calls-graph/webapp-02-signed-in.png" alt-text="Web browser displaying the running web app and the user signed in":::
8686

87+
8788
## More information
8889

8990
This section gives an overview of the code required to sign in users and call the Microsoft Graph API on their behalf. This overview can be useful to understand how the code works, main arguments, and also if you want to add sign-in to an existing ASP.NET Core application and call Microsoft Graph. It uses [Microsoft.Identity.Web](../../microsoft-identity-web.md), which is a wrapper around [MSAL.NET](../../msal-overview.md).

articles/active-directory/develop/msal-net-web-browsers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ MSAL.NET is able to respond with an HTTP message when a token is received or in
110110
```csharp
111111
var options = new SystemWebViewOptions()
112112
{
113-
HtmlMessageError = "<p> An error occured: {0}. Details {1}</p>",
113+
HtmlMessageError = "<p> An error occurred: {0}. Details {1}</p>",
114114
BrowserRedirectSuccess = new Uri("https://www.microsoft.com");
115115
}
116116

articles/active-directory/hybrid/plan-connect-topologies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -149,8 +149,8 @@ This topology implements the following use cases:
149149
* Only one Azure AD tenant sync can be configured to write back to Active Directory for the same object. This includes device and group writeback as well as Hybrid Exchange configurations – these features can only be configured in one tenant. The only exception here is Password Writeback – see below.
150150
* It is supported to configure Password Hash Sync from Active Directory to multiple Azure AD tenants for the same user object. If Password Hash Sync is enabled for a tenant, then Password Writeback may be enabled as well, and this can be done on multiple tenants: if the password is changed on one tenant, then password writeback will update it in Active Directory, and Password Hash Sync will update the password in the other tenants.
151151
* It is not supported to add and verify the same custom domain name in more than one Azure AD tenant, even if these tenants are in different Azure environments.
152-
* It is not supported to configure hybrid experiences such as Seamless SSO and Hybrid Azure AD Join on more than one tenant. Doing so would overwrite the configuration of the other tenant and would make it unusable.
153-
* You can synchronize device objects to more than one tenant but only one tenant can be configured to trust a device.
152+
* It is not supported to configure hybrid experiences that utilize forest level configuration in AD, such as Seamless SSO and Hybrid Azure AD Join (non-targeted approach), with more than one tenant. Doing so would overwrite the configuration of the other tenant, making it no longer usable. You can find additional information in [Plan your hybrid Azure Active Directory join deployment](https://docs.microsoft.com/azure/active-directory/devices/hybrid-azuread-join-plan#hybrid-azure-ad-join-for-single-forest-multiple-azure-ad-tenants).
153+
* You can synchronize device objects to more than one tenant but a device can be Hybrid Azure AD Joined to only one tenant.
154154
* Each Azure AD Connect instance should be running on a domain-joined machine.
155155

156156
>[!NOTE]

0 commit comments

Comments
 (0)