Skip to content

Commit 9806061

Browse files
authored
Merge pull request #1 from MicrosoftDocs/master
pulling latest updates
2 parents 7f20f47 + 2a7e006 commit 9806061

File tree

1,296 files changed

+14667
-7465
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,296 files changed

+14667
-7465
lines changed

.openpublishing.redirection.json

Lines changed: 43 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,21 @@
2525
"redirect_url": "/azure/active-directory/users-groups-roles/directory-self-service-signup",
2626
"redirect_document_id": true
2727
},
28+
{
29+
"source_path": "articles/active-directory/active-directory-certificate-based-authentication-get-started.md",
30+
"redirect_url": "/azure/active-directory/authentication/active-directory-certificate-based-authentication-get-started",
31+
"redirect_document_id": true
32+
},
33+
{
34+
"source_path": "articles/active-directory/active-directory-certificate-based-authentication-android.md",
35+
"redirect_url": "/azure/active-directory/authentication/active-directory-certificate-based-authentication-android",
36+
"redirect_document_id": true
37+
},
38+
{
39+
"source_path": "articles/active-directory/active-directory-certificate-based-authentication-ios.md",
40+
"redirect_url": "/azure/active-directory/authentication/active-directory-certificate-based-authentication-ios",
41+
"redirect_document_id": true
42+
},
2843
{
2944
"source_path": "articles/active-directory/active-directory-service-limits-restrictions.md",
3045
"redirect_url": "/azure/active-directory/users-groups-roles/directory-service-limits-restrictions",
@@ -7163,6 +7178,11 @@
71637178
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/faq#moving-to-cosmos-db",
71647179
"redirect_document_id": false
71657180
},
7181+
{
7182+
"source_path": "articles/cosmos-db/20-days-of-tips.md",
7183+
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/",
7184+
"redirect_document_id": false
7185+
},
71667186
{
71677187
"source_path": "articles/cosmos-db/graph-sdk-dotnet.md",
71687188
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/create-sql-api-dotnet",
@@ -21164,7 +21184,7 @@
2116421184
},
2116521185
{
2116621186
"source_path": "articles/security-center/security-center-resolve-endpoint-protection-health-alerts.md",
21167-
"redirect_url": "/azure/security-center-faq.md",
21187+
"redirect_url": "/azure/security-center/security-center-faq",
2116821188
"redirect_document_id": false
2116921189
},
2117021190
{
@@ -23542,6 +23562,11 @@
2354223562
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-security-wizard",
2354323563
"redirect_document_id": true
2354423564
},
23565+
{
23566+
"source_path": "articles/active-directory/privileged-identity-management/pim-resource-roles-require-mfa.md",
23567+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings",
23568+
"redirect_document_id": true
23569+
},
2354523570
{
2354623571
"source_path": "articles/cosmos-db/troubleshoot-azure-cosmosdb.md",
2354723572
"redirect_url": "/azure/cosmos-db/storage-explorer",
@@ -25924,7 +25949,12 @@
2592425949
},
2592525950
{
2592625951
"source_path": "articles/iot-suite/iot-suite-remote-monitoring-test.md",
25927-
"redirect_url": "/azure/iot-accelerators/iot-accelerators-remote-monitoring-test",
25952+
"redirect_url": "/azure/iot-accelerators/iot-accelerators-remote-monitoring-create-simulated-device",
25953+
"redirect_document_id": false
25954+
},
25955+
{
25956+
"source_path": "articles/iot-accelerators/iot-accelerators-remote-monitoring-test.md",
25957+
"redirect_url": "/azure/iot-accelerators/iot-accelerators-remote-monitoring-create-simulated-device",
2592825958
"redirect_document_id": false
2592925959
},
2593025960
{
@@ -26069,7 +26099,12 @@
2606926099
},
2607026100
{
2607126101
"source_path": "articles/iot-suite/iot-suite-time-series-insights.md",
26072-
"redirect_url": "/azure/iot-accelerators/iot-accelerators-time-series-insights",
26102+
"redirect_url": "/azure/iot-accelerators/iot-accelerators-remote-monitoring-time-series-insights",
26103+
"redirect_document_id": false
26104+
},
26105+
{
26106+
"source_path": "articles/iot-suite/iot-accelerators-time-series-insights.md",
26107+
"redirect_url": "/azure/iot-accelerators/iot-accelerators-remote-monitoring-time-series-insights",
2607326108
"redirect_document_id": false
2607426109
},
2607526110
{
@@ -27405,6 +27440,11 @@
2740527440
"source_path": "articles/cognitive-services/LUIS/luis-reference-gdpr.md",
2740627441
"redirect_url": "/azure/cognitive-services/LUIS/luis-user-privacy",
2740727442
"redirect_document_id": true
27443+
},
27444+
{
27445+
"source_path": "articles/azure-government/documentation-government-get-started-connect-with-vsts.md",
27446+
"redirect_url": "/azure/azure-government/documentation-government-get-started-connect-with-vs",
27447+
"redirect_document_id" : true
2740827448
}
2740927449
]
2741027450
}

articles/active-directory-b2c/TOC.yml

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,20 @@
3636
href: active-directory-b2c-tutorials-spa-webapi.md
3737
- name: Samples
3838
href: code-samples.md
39+
- name: Concepts
40+
items:
41+
- name: Applications types
42+
href: active-directory-b2c-apps.md
43+
- name: Authentication protocols
44+
href: active-directory-b2c-reference-protocols.md
45+
- name: OAuth 2.0
46+
href: active-directory-b2c-reference-oauth-code.md
47+
- name: OpenId Connect
48+
href: active-directory-b2c-reference-oidc.md
49+
- name: Tokens
50+
href: active-directory-b2c-reference-tokens.md
51+
- name: User accounts
52+
href: user-overview.md
3953
- name: How-to guides
4054
items:
4155
- name: Register your application
@@ -44,8 +58,6 @@
4458
href: active-directory-b2c-reference-policies.md
4559
- name: Mobile & desktop apps
4660
items:
47-
- name: Overview
48-
href: active-directory-b2c-reference-oauth-code.md
4961
- name: iOS
5062
items:
5163
- name: iOS Swift using MSAL
@@ -66,8 +78,6 @@
6678
href: configure-ropc.md
6779
- name: Web apps
6880
items:
69-
- name: Overview
70-
href: active-directory-b2c-reference-oidc.md
7181
- name: ASP.NET
7282
href: active-directory-b2c-devquickstarts-web-dotnet-susi.md
7383
- name: ASP.NET Core
@@ -237,14 +247,6 @@
237247
items:
238248
- name: Code samples
239249
href: https://azure.microsoft.com/resources/samples/?service=active-directory-b2c
240-
- name: Glossary
241-
items:
242-
- name: Type of applications
243-
href: active-directory-b2c-apps.md
244-
- name: Authentication protocols
245-
href: active-directory-b2c-reference-protocols.md
246-
- name: Tokens
247-
href: active-directory-b2c-reference-tokens.md
248250
- name: Region availability & data residency
249251
href: active-directory-b2c-reference-tenant-type.md
250252
- name: Enable billing

articles/active-directory-b2c/active-directory-b2c-access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ When requesting an access token, the client application needs to specify the des
7575
> Currently, custom domains are not supported along with access tokens. You must use your tenantName.onmicrosoft.com domain in the request URL.
7676
7777
```
78-
https://login.microsoftonline.com/tfp/<tenantName>.onmicrosoft.com/<yourPolicyId>/oauth2/v2.0/authorize?client_id=<appID_of_your_client_application>&nonce=anyRandomValue&redirect_uri=<redirect_uri_of_your_client_application>&scope=https%3A%2F%2Fcontoso.onmicrosoft.com%2Fnotes%2Fread&response_type=code
78+
https://<tenantName>.b2clogin.com/tfp/<tenantName>.onmicrosoft.com/<yourPolicyId>/oauth2/v2.0/authorize?client_id=<appID_of_your_client_application>&nonce=anyRandomValue&redirect_uri=<redirect_uri_of_your_client_application>&scope=https%3A%2F%2Fcontoso.onmicrosoft.com%2Fnotes%2Fread&response_type=code
7979
```
8080

8181
To acquire multiple permissions in the same request, you can add multiple entries in the single **scope** parameter, separated by spaces. For example:

articles/active-directory-b2c/active-directory-b2c-configure-signup-self-asserted-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -247,7 +247,7 @@ The signup screen in test mode should look similar to this:
247247
"exp": 1493596822,
248248
"nbf": 1493593222,
249249
"ver": "1.0",
250-
"iss": "https://login.microsoftonline.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
250+
"iss": "https://contoso.b2clogin.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
251251
"sub": "9c2a3a9e-ac65-4e46-a12d-9557b63033a9",
252252
"aud": "4e87c1dd-e5f5-4ac8-8368-bc6a98751b8b",
253253
"acr": "b2c_1a_trustf_signup_signin",

articles/active-directory-b2c/active-directory-b2c-create-custom-attributes-profile-edit-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ The ID token sent back to your application includes the new extension property a
242242
"exp": 1493585187,
243243
"nbf": 1493581587,
244244
"ver": "1.0",
245-
"iss": "https://login.microsoftonline.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
245+
"iss": "https://contoso.b2clogin.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
246246
"sub": "a58e7c6c-7535-4074-93da-b0023fbaf3ac",
247247
"aud": "4e87c1dd-e5f5-4ac8-8368-bc6a98751b8b",
248248
"acr": "b2c_1a_trustframeworkprofileedit",

articles/active-directory-b2c/active-directory-b2c-custom-guide-eventlogger-appins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -296,7 +296,7 @@ Any parameter name included as part of an OIDC or OAuth2 request can be mapped t
296296
Here's a sample request from the application:
297297

298298
```
299-
https://login.microsoftonline.com/sampletenant.onmicrosoft.com/oauth2/v2.0/authorize?p=B2C_1A_signup_signin&client_id=e1d2612f-c2bc-4599-8e7b-d874eaca1ae1&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login&app_session=0a2b45c&loyalty_number=1234567
299+
https://sampletenant.b2clogin.com/tfp/sampletenant.onmicrosoft.com/B2C_1A_signup_signin/oauth2/v2.0/authorize?client_id=e1d2612f-c2bc-4599-8e7b-d874eaca1ae1&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login&app_session=0a2b45c&loyalty_number=1234567
300300
301301
```
302302
You can then add the claims by adding an `Input Claim` element to the Application Insights event. Properties of an event are added through the syntax {property:NAME}, where NAME is property being added to the event. For example:

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-basic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -322,7 +322,7 @@ After your RESTful service is protected by the client ID (username) and secret,
322322
"exp": 1507125903,
323323
"nbf": 1507122303,
324324
"ver": "1.0",
325-
"iss": "https://login.microsoftonline.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
325+
"iss": "https://contoso.b2clogin.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
326326
"aud": "e1d2612f-c2bc-4599-8e7b-d874eaca1ee1",
327327
"acr": "b2c_1a_signup_signin",
328328
"nonce": "defaultNonce",

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-cert.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ To support client certificate authentication in your custom policy, change the t
132132
"exp": 1507125903,
133133
"nbf": 1507122303,
134134
"ver": "1.0",
135-
"iss": "https://login.microsoftonline.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
135+
"iss": "https://contoso.b2clogin.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
136136
"aud": "e1d2612f-c2bc-4599-8e7b-d874eaca1ee1",
137137
"acr": "b2c_1a_signup_signin",
138138
"nonce": "defaultNonce",

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -362,7 +362,7 @@ After you add the new claim, the relying party code looks like this:
362362
"exp": 1507125903,
363363
"nbf": 1507122303,
364364
"ver": "1.0",
365-
"iss": "https://login.microsoftonline.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
365+
"iss": "https://contoso.b2clogin.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
366366
"aud": "e1d2612f-c2bc-4599-8e7b-d874eaca1ee1",
367367
"acr": "b2c_1a_signup_signin",
368368
"nonce": "defaultNonce",

0 commit comments

Comments
 (0)