Skip to content

Commit 9860e81

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into dps-faq
2 parents 288aee3 + 8f11429 commit 9860e81

File tree

1,239 files changed

+13645
-10307
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,239 files changed

+13645
-10307
lines changed

.github/workflows/stale.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,8 @@ jobs:
1919
close-pr-label: auto-close
2020
exempt-pr-labels: keep-open
2121
operations-per-run: 1200
22-
ascending: false
22+
ascending: true
23+
start-date: '2020-09-02'
2324
stale-pr-message: >
2425
This pull request has been inactive for at least 14 days.
2526
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation) for instructions.

.openpublishing.redirection.active-directory.json

Lines changed: 32 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@
8282
},
8383
{
8484
"source_path": "articles/active-directory/user-help/multi-factor-authentication-end-user-first-time.md",
85-
"redirect_url": "https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc",
85+
"redirect_url": "https://support.microsoft.com/account-billing/download-and-install-the-microsoft-authenticator-app-351498fc-850a-45da-b7b6-27e523b8702a",
8686
"redirect_document_id": false
8787
},
8888
{
@@ -957,7 +957,7 @@
957957
},
958958
{
959959
"source_path_from_root": "/articles/active-directory/active-directory-saas-facebook-at-work-provisioning-tutorial.md",
960-
"redirect_url": "/azure/active-directory/active-directory-saas-workplacebyfacebook-provisioning-tutorial",
960+
"redirect_url": "/azure/active-directory/saas-apps/workplace-by-facebook-provisioning-tutorial",
961961
"redirect_document_id": false
962962
},
963963
{
@@ -9887,7 +9887,7 @@
98879887
},
98889888
{
98899889
"source_path_from_root": "/articles/active-directory/active-directory-saas-workplacebyfacebook-provisioning-tutorial.md",
9890-
"redirect_url": "/azure/active-directory/saas-apps/workplacebyfacebook-provisioning-tutorial",
9890+
"redirect_url": "/azure/active-directory/saas-apps/workplace-by-facebook-provisioning-tutorial",
98919891
"redirect_document_id": true
98929892
},
98939893
{
@@ -10544,6 +10544,33 @@
1054410544
"source_path_from_root": "/articles/active-directory-b2c/troubleshoot-custom-policies.md",
1054510545
"redirect_url": "/azure/active-directory-b2c/troubleshoot",
1054610546
"redirect_document_id": false
10547-
}
10547+
},
10548+
{
10549+
"source_path": "articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-arm.md",
10550+
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-arm",
10551+
"redirect_document_id": false
10552+
},
10553+
{
10554+
"source_path": "articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-cli.md",
10555+
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azcli",
10556+
"redirect_document_id": false
10557+
},
10558+
{
10559+
"source_path": "articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md",
10560+
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp",
10561+
"redirect_document_id": false
10562+
},
10563+
{
10564+
"source_path": "articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-powershell.md",
10565+
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-powershell",
10566+
"redirect_document_id": false
10567+
},
10568+
{
10569+
"source_path": "articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-rest.md",
10570+
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-rest",
10571+
"redirect_document_id": false
10572+
}
10573+
10574+
1054810575
]
10549-
}
10576+
}

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -408,6 +408,21 @@
408408
"redirect_url": "/articles/frontdoor/front-door-quickstart-template-samples",
409409
"redirect_document_id": false
410410
},
411+
{
412+
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-health-probes.md",
413+
"redirect_url": "/articles/frontdoor/front-door-health-probes",
414+
"redirect_document_id": false
415+
},
416+
{
417+
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-ddos.md",
418+
"redirect_url": "/articles/frontdoor/front-door-ddos",
419+
"redirect_document_id": false
420+
},
421+
{
422+
"source_path_from_root": "/articles/frontdoor/standard-premium/geo-filtering.md",
423+
"redirect_url": "/articles/frontdoor/front-door-geo-filtering",
424+
"redirect_document_id": false
425+
},
411426
{
412427
"source_path_from_root": "/articles/azure-sql/database/doc-changes-updates-release-notes.md",
413428
"redirect_url": "/azure/azure-sql/database/doc-changes-updates-release-notes-whats-new",
@@ -5693,6 +5708,11 @@
56935708
"redirect_url": "/azure/azure-arc/data/release-notes",
56945709
"redirect_document_id": false
56955710
},
5711+
{
5712+
"source_path_from_root": "/articles/azure-arc/data/reference/overview.md",
5713+
"redirect_url": "/azure/azure-arc/data/reference/reference-az-arcdata",
5714+
"redirect_document_id": false
5715+
},
56965716
{
56975717
"source_path_from_root": "/articles/azure-arc/data/create-data-controller-using-k8s-native-tools.md",
56985718
"redirect_url": "/azure/azure-arc/data/create-data-controller-using-kubernetes-native-tools",

.openpublishing.redirection.security-benchmark.json

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -516,6 +516,11 @@
516516
"redirect_url": "/security/benchmark/azure/baselines/virtual-network-security-baseline",
517517
"redirect_document_id": false
518518
},
519+
{
520+
"source_path_from_root": "/articles/virtual-network/nat-gateway/nat-security-baseline.md",
521+
"redirect_url": "/security/benchmark/azure/baselines/virtual-network-nat-security-baseline",
522+
"redirect_document_id": false
523+
},
519524
{
520525
"source_path_from_root": "/articles/virtual-network/nat-security-baseline.md",
521526
"redirect_url": "/security/benchmark/azure/baselines/virtual-network-nat-security-baseline",
@@ -526,6 +531,17 @@
526531
"redirect_url": "/security/benchmark/azure/baselines/virtual-wan-security-baseline",
527532
"redirect_document_id": false
528533
},
534+
{
535+
"source_path_from_root": "/articles/virtual-desktop/security-baseline.md",
536+
"redirect_url": "/security/benchmark/azure/baselines/virtual-desktop-security-baseline",
537+
"redirect_document_id": false
538+
},
539+
{
540+
"source_path_from_root": "/articles/cloud-services/security-baseline.md",
541+
"redirect_url": "/security/benchmark/azure/baselines/cloud-services-security-baseline",
542+
"redirect_document_id": false
543+
},
544+
529545
{
530546
"source_path_from_root": "/articles/vpn-gateway/security-baseline.md",
531547
"redirect_url": "/security/benchmark/azure/baselines/vpn-gateway-security-baseline",

.openpublishing.redirection.synapse-analytics.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,11 @@
6464
"source_path_from_root": "/articles/synapse-analytics/machine-learning/tutorial-spark-pool-filesystem-spec.md",
6565
"redirect_url": "/azure/synapse-analytics/spark/tutorial-spark-pool-filesystem-spec",
6666
"redirect_document_id": false
67+
},
68+
{
69+
"source_path_from_root": "/articles/synapse-analytics/security/synapse-workspace-managed-identity.md",
70+
"redirect_url": "/azure/data-factory/data-factory-service-identity",
71+
"redirect_document_id": false
6772
}
6873
]
6974
}

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -247,8 +247,8 @@ After you deploy your REST API, set the metadata of the `REST-GetProfile` techni
247247

248248
- **ServiceUrl**. Set the URL of the REST API endpoint.
249249
- **SendClaimsIn**. Specify how the input claims are sent to the RESTful claims provider.
250-
- **AuthenticationType**. Set the type of authentication being performed by the RESTful claims provider.
251-
- **AllowInsecureAuthInProduction**. In a production environment, make sure to set this metadata to `true`
250+
- **AuthenticationType**. Set the type of authentication being performed by the RESTful claims provider such as `Basic` or `ClientCertificate`
251+
- **AllowInsecureAuthInProduction**. In a production environment, make sure to set this metadata to `false`
252252

253253
See the [RESTful technical profile metadata](restful-technical-profile.md#metadata) for more configurations.
254254

articles/active-directory-b2c/add-api-connector.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory-b2c
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: how-to
8-
ms.date: 08/24/2021
8+
ms.date: 11/09/2021
99

1010
ms.author: kengaderdus
1111
author: kengaderdus
@@ -72,6 +72,7 @@ Content-type: application/json
7272
}
7373
],
7474
"displayName": "John Smith",
75+
"objectId": "11111111-0000-0000-0000-000000000000"
7576
"givenName":"John",
7677
"surname":"Smith",
7778
"jobTitle":"Supplier",
@@ -142,6 +143,7 @@ Content-type: application/json
142143
}
143144
],
144145
"displayName": "John Smith",
146+
"objectId": "11111111-0000-0000-0000-000000000000",
145147
"givenName":"John",
146148
"lastName":"Smith",
147149
"step": "PostFederationSignup",
@@ -195,6 +197,7 @@ Content-type: application/json
195197
}
196198
],
197199
"displayName": "John Smith",
200+
"objectId": "11111111-0000-0000-0000-000000000000",
198201
"givenName":"John",
199202
"surname":"Smith",
200203
"jobTitle":"Supplier",

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
7676
1. Select **Add optional claim**.
7777
1. For the **Token type**, select **ID**.
7878
1. Select the optional claims to add, `family_name` and `given_name`.
79-
1. Click **Add**.
79+
1. Select **Add**. If **Turn on the Microsoft Graph email permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
8080
8181
## [Optional] Verify your app authenticity
8282
@@ -97,8 +97,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
9797
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration
9898
```
9999
100-
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`.
101-
For example, `https://login.microsoftonline.com/contoso.com/v2.0/.well-known/openid-configuration`.
100+
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`. If you use a custom domain, replace `contoso.com` with your custom domain in `https://login.microsoftonline.com/contoso.com/v2.0/.well-known/openid-configuration`.
102101
103102
1. For **Client ID**, enter the application ID that you previously recorded.
104103
1. For **Client secret**, enter the client secret that you previously recorded.
@@ -121,7 +120,8 @@ At this point, the Azure AD identity provider has been set up, but it's not yet
121120
122121
1. In your Azure AD B2C tenant, select **User flows**.
123122
1. Click the user flow that you want to add the Azure AD identity provider.
124-
1. Under the **Social identity providers**, select **Contoso Azure AD**.
123+
1. Under **Settings**, select **Identity providers**
124+
1. Under **Custom identity providers**, select **Contoso Azure AD**.
125125
1. Select **Save**.
126126
1. To test your policy, select **Run user flow**.
127127
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.

articles/active-directory-b2c/partner-bloksec.md

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,6 @@ zone_pivot_groups: b2c-policy-type
2121

2222
::: zone pivot="b2c-custom-policy"
2323

24-
25-
2624
::: zone-end
2725

2826
In this sample tutorial, learn how to integrate Azure Active Directory (AD) B2C authentication with [BlokSec](https://bloksec.com/). BlokSec simplifies the end-user login experience by providing customers passwordless authentication and tokenless multifactor authentication (MFA). BlokSec protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks.
@@ -55,6 +53,7 @@ The following architecture diagram shows the implementation.
5553
Request a demo tenant with BlokSec by filling out [the form](https://bloksec.com/request-a-demo/). In the message field indicates that you would like to onboard with Azure AD B2C. Download and install the free BlokSec yuID mobile app from the app store. Once your demo tenant has been prepared, you'll receive an email. On your mobile device where the BlokSec application is installed, select the link to register your admin account with your yuID app.
5654

5755
::: zone pivot="b2c-user-flow"
56+
5857
## Prerequisites
5958

6059
To get started, you'll need:
@@ -69,6 +68,7 @@ To get started, you'll need:
6968
::: zone-end
7069

7170
::: zone pivot="b2c-custom-policy"
71+
7272
## Prerequisites
7373

7474
To get started, you'll need:
@@ -112,10 +112,10 @@ To get started, you'll need:
112112
1. Sign-in to the [Azure portal](https://portal.azure.com/#home) as the global administrator of your Azure AD B2C tenant.
113113
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
114114
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
115-
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**
116-
1. Navigate to **Dashboard > Azure Active Directory B2C > Identity providers**
117-
1. Select New **OpenID Connect Provider**
118-
1. Select **Add**
115+
1. Choose **All services** in the top-left corner of the Azure portal, then search for and select **Azure AD B2C**.
116+
1. Navigate to **Dashboard** > **Azure Active Directory B2C** > **Identity providers**.
117+
1. Select New **OpenID Connect Provider**.
118+
1. Select **Add**.
119119

120120
### Part 3 - Configure an Identity provider
121121

@@ -126,14 +126,14 @@ To get started, you'll need:
126126
|Property |Value |
127127
|:---------|:---------|
128128
|Name |Enter BlokSec yuID – Passwordless or a name of your choice|
129-
|Metadata URL|https://api.bloksec.io/oidc/.well-known/openid-configuration|
129+
|Metadata URL| `https://api.bloksec.io/oidc/.well-known/openid-configuration` |
130130
|Client ID|The application ID from the BlokSec admin UI captured in **Part 1**|
131131
|Client Secret|The application Secret from the BlokSec admin UI captured in **Part 1**|
132132
|Scope|OpenID email profile|
133133
|Response type|Code|
134134
|Domain hint|yuID|
135135

136-
1. Select **OK**
136+
1. Select **OK**.
137137

138138
1. Select **Map this identity provider’s claims**.
139139

@@ -177,13 +177,13 @@ You should now see BlokSec as a new OIDC Identity provider listed within your B2
177177

178178
1. Select **Run user flow**
179179

180-
1. In the form, enter the Replying URL, for example, https://jwt.ms
180+
1. In the form, enter the Replying URL, such as `https://jwt.ms`.
181181

182182
1. The browser will be redirected to the BlokSec login page. Enter the account name registered during User registration. The user will receive a push notification to their mobile device where the BlokSec yuID application is installed; upon opening the notification, the user will be presented with an authentication challenge
183183

184-
1. Once the authentication challenge is accepted, the browser will redirect the user to the replying URL.
184+
1. Once the authentication challenge is accepted, the browser will redirect the user to the replying URL.
185185

186-
## Next steps
186+
## Next steps
187187

188188
For additional information, review the following articles:
189189

@@ -320,7 +320,8 @@ The following XML demonstrates the first two orchestration steps of a user journ
320320

321321
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAndLocalAccounts/SignUpOrSignin.xml), specifies the user journey which Azure AD B2C will execute. Find the **DefaultUserJourney** element within relying party. Update the **ReferenceId** to match the user journey ID, in which you added the identity provider.
322322

323-
In the following example, for the `CustomSignUpOrSignIn` user journey, the ReferenceId is set to `CustomSignUpOrSignIn`.
323+
In the following example, for the `CustomSignUpOrSignIn` user journey, the ReferenceId is set to `CustomSignUpOrSignIn`.
324+
324325
```xml
325326
<RelyingParty>
326327
<DefaultUserJourney ReferenceId="CustomSignUpSignIn" />
@@ -346,12 +347,12 @@ Select **Upload Custom Policy**, and then upload the two policy files that you c
346347

347348
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
348349

349-
## Next steps
350+
## Next steps
350351

351352
For additional information, review the following articles:
352353

353354
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
354355

355356
- [Get started with custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy)
356357

357-
::: zone-end
358+
::: zone-end

articles/active-directory-b2c/technical-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Read the [User flows and custom policies overview](user-flow-overview.md) articl
118118

119119
## User interface
120120

121-
In Azure AD B2C, you can craft your users' identity experiences so that the pages are shown blend seamlessly with the look and feel of your brand. You get nearly full control of the HTML and CSS content presented to your users when they proceed through your application's identity journeys. With this flexibility, you can maintain brand and visual consistency between your application and Azure AD B2C.
121+
In Azure AD B2C, you can craft your users' identity experiences so that the pages that are shown blend seamlessly with the look and feel of your brand. You get nearly full control of the HTML and CSS content presented to your users when they proceed through your application's identity journeys. With this flexibility, you can maintain brand and visual consistency between your application and Azure AD B2C.
122122

123123

124124

@@ -132,7 +132,7 @@ For information on UI customization, see:
132132

133133
## Custom domain
134134

135-
You can customize your Azure AD B2C domain in the redirect URLs for Azure AD B2C. Custom domain allows you to create a seamless experience so that the pages are shown blend seamlessly with the domain name of your application.
135+
You can customize your Azure AD B2C domain in the redirect URLs for Azure AD B2C. Custom domain allows you to create a seamless experience so that the pages that are shown blend seamlessly with the domain name of your application.
136136

137137
![Screenshots of Azure AD B2C custom domain](media/technical-overview/custom-domain.png)
138138

0 commit comments

Comments
 (0)