Skip to content

Commit 9a62cae

Browse files
authored
Merge branch 'master' into patch-4
2 parents b367bc3 + 8c11411 commit 9a62cae

File tree

1,571 files changed

+21520
-13633
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,571 files changed

+21520
-13633
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,12 @@
4545
"branch": "master",
4646
"branch_mapping": {}
4747
},
48+
{
49+
"path_to_root": "azure_arc_sample",
50+
"url": "https://github.com/microsoft/azure_arc",
51+
"branch": "main",
52+
"branch_mapping": {}
53+
},
4854
{
4955
"path_to_root": "resourcemanager-templates",
5056
"url": "https://github.com/Azure/azure-docs-json-samples",

.openpublishing.redirection.active-directory.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@
8282
},
8383
{
8484
"source_path": "articles/active-directory/user-help/multi-factor-authentication-end-user-first-time.md",
85-
"redirect_url": "https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc",
85+
"redirect_url": "https://support.microsoft.com/account-billing/download-and-install-the-microsoft-authenticator-app-351498fc-850a-45da-b7b6-27e523b8702a",
8686
"redirect_document_id": false
8787
},
8888
{
@@ -957,7 +957,7 @@
957957
},
958958
{
959959
"source_path_from_root": "/articles/active-directory/active-directory-saas-facebook-at-work-provisioning-tutorial.md",
960-
"redirect_url": "/azure/active-directory/active-directory-saas-workplacebyfacebook-provisioning-tutorial",
960+
"redirect_url": "/azure/active-directory/saas-apps/workplace-by-facebook-provisioning-tutorial",
961961
"redirect_document_id": false
962962
},
963963
{
@@ -9887,7 +9887,7 @@
98879887
},
98889888
{
98899889
"source_path_from_root": "/articles/active-directory/active-directory-saas-workplacebyfacebook-provisioning-tutorial.md",
9890-
"redirect_url": "/azure/active-directory/saas-apps/workplacebyfacebook-provisioning-tutorial",
9890+
"redirect_url": "/azure/active-directory/saas-apps/workplace-by-facebook-provisioning-tutorial",
98919891
"redirect_document_id": true
98929892
},
98939893
{
@@ -10546,4 +10546,4 @@
1054610546
"redirect_document_id": false
1054710547
}
1054810548
]
10549-
}
10549+
}

.openpublishing.redirection.azure-web-pubsub.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,16 @@
44
"source_path_from_root": "/articles/azure-web-pubsub/howto-troubleshoot-diagnostic-logs.md",
55
"redirect_url": "/azure/azure-web-pubsub/howto-troubleshoot-resource-logs",
66
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/azure-web-pubsub/reference-server-sdk-csharp.md",
10+
"redirect_url": "/dotnet/api/overview/azure/webpubsub/client",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/azure-web-pubsub/reference-server-sdk-java.md",
15+
"redirect_url": "/java/api/overview/azure/webpubsub/client",
16+
"redirect_document_id": false
717
}
818
]
919
}

.openpublishing.redirection.json

Lines changed: 440 additions & 0 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.security-benchmark.json

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -516,6 +516,11 @@
516516
"redirect_url": "/security/benchmark/azure/baselines/virtual-network-security-baseline",
517517
"redirect_document_id": false
518518
},
519+
{
520+
"source_path_from_root": "/articles/virtual-network/nat-gateway/nat-security-baseline.md",
521+
"redirect_url": "/security/benchmark/azure/baselines/virtual-network-nat-security-baseline",
522+
"redirect_document_id": false
523+
},
519524
{
520525
"source_path_from_root": "/articles/virtual-network/nat-security-baseline.md",
521526
"redirect_url": "/security/benchmark/azure/baselines/virtual-network-nat-security-baseline",
@@ -526,6 +531,17 @@
526531
"redirect_url": "/security/benchmark/azure/baselines/virtual-wan-security-baseline",
527532
"redirect_document_id": false
528533
},
534+
{
535+
"source_path_from_root": "/articles/virtual-desktop/security-baseline.md",
536+
"redirect_url": "/security/benchmark/azure/baselines/virtual-desktop-security-baseline",
537+
"redirect_document_id": false
538+
},
539+
{
540+
"source_path_from_root": "/articles/cloud-services/security-baseline.md",
541+
"redirect_url": "/security/benchmark/azure/baselines/cloud-services-security-baseline",
542+
"redirect_document_id": false
543+
},
544+
529545
{
530546
"source_path_from_root": "/articles/vpn-gateway/security-baseline.md",
531547
"redirect_url": "/security/benchmark/azure/baselines/vpn-gateway-security-baseline",

.openpublishing.redirection.synapse-analytics.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,11 @@
6464
"source_path_from_root": "/articles/synapse-analytics/machine-learning/tutorial-spark-pool-filesystem-spec.md",
6565
"redirect_url": "/azure/synapse-analytics/spark/tutorial-spark-pool-filesystem-spec",
6666
"redirect_document_id": false
67+
},
68+
{
69+
"source_path_from_root": "/articles/synapse-analytics/security/synapse-workspace-managed-identity.md",
70+
"redirect_url": "/azure/data-factory/data-factory-service-identity",
71+
"redirect_document_id": false
6772
}
6873
]
6974
}

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
7676
1. Select **Add optional claim**.
7777
1. For the **Token type**, select **ID**.
7878
1. Select the optional claims to add, `family_name` and `given_name`.
79-
1. Click **Add**.
79+
1. Select **Add**. If **Turn on the Microsoft Graph email permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
8080
8181
## [Optional] Verify your app authenticity
8282
@@ -97,8 +97,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
9797
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration
9898
```
9999
100-
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`.
101-
For example, `https://login.microsoftonline.com/contoso.com/v2.0/.well-known/openid-configuration`.
100+
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`. If you use a custom domain, replace `contoso.com` with your custom domain in `https://login.microsoftonline.com/contoso.com/v2.0/.well-known/openid-configuration`.
102101
103102
1. For **Client ID**, enter the application ID that you previously recorded.
104103
1. For **Client secret**, enter the client secret that you previously recorded.
@@ -121,7 +120,8 @@ At this point, the Azure AD identity provider has been set up, but it's not yet
121120
122121
1. In your Azure AD B2C tenant, select **User flows**.
123122
1. Click the user flow that you want to add the Azure AD identity provider.
124-
1. Under the **Social identity providers**, select **Contoso Azure AD**.
123+
1. Under **Settings**, select **Identity providers**
124+
1. Under **Custom identity providers**, select **Contoso Azure AD**.
125125
1. Select **Save**.
126126
1. To test your policy, select **Run user flow**.
127127
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.

articles/active-directory-b2c/partner-bloksec.md

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,6 @@ zone_pivot_groups: b2c-policy-type
2121

2222
::: zone pivot="b2c-custom-policy"
2323

24-
25-
2624
::: zone-end
2725

2826
In this sample tutorial, learn how to integrate Azure Active Directory (AD) B2C authentication with [BlokSec](https://bloksec.com/). BlokSec simplifies the end-user login experience by providing customers passwordless authentication and tokenless multifactor authentication (MFA). BlokSec protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks.
@@ -55,6 +53,7 @@ The following architecture diagram shows the implementation.
5553
Request a demo tenant with BlokSec by filling out [the form](https://bloksec.com/request-a-demo/). In the message field indicates that you would like to onboard with Azure AD B2C. Download and install the free BlokSec yuID mobile app from the app store. Once your demo tenant has been prepared, you'll receive an email. On your mobile device where the BlokSec application is installed, select the link to register your admin account with your yuID app.
5654

5755
::: zone pivot="b2c-user-flow"
56+
5857
## Prerequisites
5958

6059
To get started, you'll need:
@@ -69,6 +68,7 @@ To get started, you'll need:
6968
::: zone-end
7069

7170
::: zone pivot="b2c-custom-policy"
71+
7272
## Prerequisites
7373

7474
To get started, you'll need:
@@ -112,10 +112,10 @@ To get started, you'll need:
112112
1. Sign-in to the [Azure portal](https://portal.azure.com/#home) as the global administrator of your Azure AD B2C tenant.
113113
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
114114
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
115-
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**
116-
1. Navigate to **Dashboard > Azure Active Directory B2C > Identity providers**
117-
1. Select New **OpenID Connect Provider**
118-
1. Select **Add**
115+
1. Choose **All services** in the top-left corner of the Azure portal, then search for and select **Azure AD B2C**.
116+
1. Navigate to **Dashboard** > **Azure Active Directory B2C** > **Identity providers**.
117+
1. Select New **OpenID Connect Provider**.
118+
1. Select **Add**.
119119

120120
### Part 3 - Configure an Identity provider
121121

@@ -126,14 +126,14 @@ To get started, you'll need:
126126
|Property |Value |
127127
|:---------|:---------|
128128
|Name |Enter BlokSec yuID – Passwordless or a name of your choice|
129-
|Metadata URL|https://api.bloksec.io/oidc/.well-known/openid-configuration|
129+
|Metadata URL| `https://api.bloksec.io/oidc/.well-known/openid-configuration` |
130130
|Client ID|The application ID from the BlokSec admin UI captured in **Part 1**|
131131
|Client Secret|The application Secret from the BlokSec admin UI captured in **Part 1**|
132132
|Scope|OpenID email profile|
133133
|Response type|Code|
134134
|Domain hint|yuID|
135135

136-
1. Select **OK**
136+
1. Select **OK**.
137137

138138
1. Select **Map this identity provider’s claims**.
139139

@@ -177,13 +177,13 @@ You should now see BlokSec as a new OIDC Identity provider listed within your B2
177177

178178
1. Select **Run user flow**
179179

180-
1. In the form, enter the Replying URL, for example, https://jwt.ms
180+
1. In the form, enter the Replying URL, such as `https://jwt.ms`.
181181

182182
1. The browser will be redirected to the BlokSec login page. Enter the account name registered during User registration. The user will receive a push notification to their mobile device where the BlokSec yuID application is installed; upon opening the notification, the user will be presented with an authentication challenge
183183

184-
1. Once the authentication challenge is accepted, the browser will redirect the user to the replying URL.
184+
1. Once the authentication challenge is accepted, the browser will redirect the user to the replying URL.
185185

186-
## Next steps
186+
## Next steps
187187

188188
For additional information, review the following articles:
189189

@@ -320,7 +320,8 @@ The following XML demonstrates the first two orchestration steps of a user journ
320320

321321
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAndLocalAccounts/SignUpOrSignin.xml), specifies the user journey which Azure AD B2C will execute. Find the **DefaultUserJourney** element within relying party. Update the **ReferenceId** to match the user journey ID, in which you added the identity provider.
322322

323-
In the following example, for the `CustomSignUpOrSignIn` user journey, the ReferenceId is set to `CustomSignUpOrSignIn`.
323+
In the following example, for the `CustomSignUpOrSignIn` user journey, the ReferenceId is set to `CustomSignUpOrSignIn`.
324+
324325
```xml
325326
<RelyingParty>
326327
<DefaultUserJourney ReferenceId="CustomSignUpSignIn" />
@@ -346,12 +347,12 @@ Select **Upload Custom Policy**, and then upload the two policy files that you c
346347

347348
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
348349

349-
## Next steps
350+
## Next steps
350351

351352
For additional information, review the following articles:
352353

353354
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
354355

355356
- [Get started with custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy)
356357

357-
::: zone-end
358+
::: zone-end

articles/active-directory-b2c/technical-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Read the [User flows and custom policies overview](user-flow-overview.md) articl
118118

119119
## User interface
120120

121-
In Azure AD B2C, you can craft your users' identity experiences so that the pages are shown blend seamlessly with the look and feel of your brand. You get nearly full control of the HTML and CSS content presented to your users when they proceed through your application's identity journeys. With this flexibility, you can maintain brand and visual consistency between your application and Azure AD B2C.
121+
In Azure AD B2C, you can craft your users' identity experiences so that the pages that are shown blend seamlessly with the look and feel of your brand. You get nearly full control of the HTML and CSS content presented to your users when they proceed through your application's identity journeys. With this flexibility, you can maintain brand and visual consistency between your application and Azure AD B2C.
122122

123123

124124

@@ -132,7 +132,7 @@ For information on UI customization, see:
132132

133133
## Custom domain
134134

135-
You can customize your Azure AD B2C domain in the redirect URLs for Azure AD B2C. Custom domain allows you to create a seamless experience so that the pages are shown blend seamlessly with the domain name of your application.
135+
You can customize your Azure AD B2C domain in the redirect URLs for Azure AD B2C. Custom domain allows you to create a seamless experience so that the pages that are shown blend seamlessly with the domain name of your application.
136136

137137
![Screenshots of Azure AD B2C custom domain](media/technical-overview/custom-domain.png)
138138

articles/active-directory/app-provisioning/whats-new-docs.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory application provisioning"
33
description: "New and updated documentation for the Azure Active Directory application provisioning."
4-
ms.date: 10/05/2021
4+
ms.date: 11/04/2021
55
ms.service: active-directory
66
ms.subservice: app-provisioning
77
ms.topic: reference
@@ -15,6 +15,13 @@ manager: karenh444
1515

1616
Welcome to what's new in Azure Active Directory application provisioning documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the provisioning service, see [What's new in Azure Active Directory](../fundamentals/whats-new.md).
1717

18+
## October 2021
19+
20+
### New articles
21+
22+
- [Configuring Azure AD to provision users into LDAP directories](on-premises-ldap-connector-configure.md)
23+
24+
1825
## September 2021
1926

2027
### New articles

0 commit comments

Comments
 (0)