Skip to content

Commit 9d80f1a

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-landing-openshift
2 parents 59dd900 + 19df117 commit 9d80f1a

File tree

49 files changed

+1497
-739
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+1497
-739
lines changed

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/05/2020
12+
ms.date: 03/09/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -54,13 +54,13 @@ The following example shows the **AAD-Common** technical profile:
5454

5555
## Input claims
5656

57-
The following technical profiles include **InputClaims** for social and local accounts:
57+
The InputClaims element contains a claim, which is used to look up an account in the directory, or create a new one. There must be exactly one InputClaim element in the input claims collection for all Azure AD technical profiles. You may need to map the name of the claim defined in your policy to the name defined in Azure Active Directory.
5858

59-
- The social account technical profiles **AAD-UserReadUsingAlternativeSecurityId** and **AAD-UserWriteUsingAlternativeSecurityId** includes the **AlternativeSecurityId** claim. This claim contains the social account user identifier.
60-
- The local account technical profiles **AAD-UserReadUsingEmailAddress** and **AAD-UserWriteUsingLogonEmail** includes the **email** claim. This claim contains the sign-in name of the local account.
61-
- The unified (local and social) technical profiles **AAD-UserReadUsingObjectId**, **AAD-UserWritePasswordUsingObjectId**, **AAD-UserWriteProfileUsingObjectId**, and **AAD-UserWritePhoneNumberUsingObjectId** includes the **objectId** claim. The unique identifier of an account.
59+
To read, update, or delete an existing user account, the input claim is a key that uniquely identifies the account in Azure AD directory. For example, **objectId**, **userPrincipalName**, **signInNames.emailAddress**, **signInNames.userName**, or **alternativeSecurityId**.
6260

63-
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones.
61+
To create a new user account, the input claim is a key that uniquely identifies a local or federated account. For example, local account: **signInNames.emailAddress**, or **signInNames.userName**. For a federated account: the **alternativeSecurityId**.
62+
63+
The InputClaimsTransformations element may contain a collection of input claims transformation elements that are used to modify the input claim or generate new one.
6464

6565
## Output claims
6666

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 30 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 02/03/2020
11+
ms.date: 03/09/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -211,6 +211,23 @@ The following are the IDs for a [Verification display control](display-control-v
211211
|verification_control_but_send_code |Send Code |
212212
|verification_control_but_send_new_code |Send New Code |
213213
|verification_control_but_verify_code |Verify Code |
214+
|verification_control_code_sent| Verification code has been sent. Please copy it to the input box below. |
215+
216+
### Example
217+
218+
```XML
219+
<LocalizedResources Id="api.localaccountsignup.en">
220+
<LocalizedStrings>
221+
<LocalizedString ElementType="UxElement" StringId="verification_control_but_change_claims">Change</LocalizedString>
222+
<LocalizedString ElementType="UxElement" StringId="verification_control_fail_send_code">Failed to send the code, please try again later.</LocalizedString>
223+
<LocalizedString ElementType="UxElement" StringId="verification_control_fail_verify_code">Failed to verify the code, please try again later.</LocalizedString>
224+
<LocalizedString ElementType="UxElement" StringId="verification_control_but_send_code">Send Code</LocalizedString>
225+
<LocalizedString ElementType="UxElement" StringId="verification_control_but_send_new_code">Send New Code</LocalizedString>
226+
<LocalizedString ElementType="UxElement" StringId="verification_control_but_verify_code">Verify Code</LocalizedString>
227+
<LocalizedString ElementType="UxElement" StringId="verification_control_code_sent">Verification code has been sent. Please copy it to the input box below.</LocalizedString>
228+
</LocalizedStrings>
229+
</LocalizedResources>
230+
```
214231

215232
## One time password error messages
216233
The following are the IDs for a [one time password technical profile](one-time-password-technical-profile.md) error messages
@@ -222,6 +239,18 @@ The following are the IDs for a [one time password technical profile](one-time-p
222239
|UserMessageIfSessionConflict |One time password verification session has conflict |
223240
|UserMessageIfInvalidCode |One time password provided for verification is incorrect |
224241

242+
### Example
243+
244+
```XML
245+
<LocalizedResources Id="api.localaccountsignup.en">
246+
<LocalizedStrings>
247+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfSessionDoesNotExist">You have exceed the maximum time allowed.</LocalizedString>
248+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfMaxRetryAttempted">You have exceed the number of retries allowed.</LocalizedString>
249+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfInvalidCode">You have entered the wrong code.</LocalizedString>
250+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</LocalizedString>
251+
</LocalizedStrings>
252+
</LocalizedResources>
253+
```
225254

226255

227256

articles/active-directory-b2c/localization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 08/27/2019
11+
ms.date: 03/09/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -142,7 +142,7 @@ The **LocalizedString** element contains the following attributes:
142142

143143
| Attribute | Required | Description |
144144
| --------- | -------- | ----------- |
145-
| ElementType | Yes | A reference to a claim type element or a user interface element in the policy. Possible values: `ClaimType`, `UxElement`, `ErrorMessage`, `Predicate`, or . The `ClaimType` value is used to localize one of the claim attributes, as specified in the StringId. The `UxElement` value is used to localize one of the user interface elements as specified in the StringId. The `ErrorMessage` value is used to localize one of the system error messages as specified in the StringId. The `Predicate` value is used to localize one of the [Predicate](predicates.md) error messages, as specified in the StringId. The `InputValidation` value is used to localize one of the [PredicateValidation](predicates.md) group error messages as specified in the StringId. |
145+
| ElementType | Yes | A reference to a claim type element or a user interface element in the policy. Possible values: `ClaimType`, `UxElement`, `ErrorMessage`, `Predicate`, or `GetLocalizedStringsTransformationClaimType`. The `ClaimType` value is used to localize one of the claim attributes, as specified in the StringId. The `UxElement` value is used to localize one of the user interface elements as specified in the StringId. The `ErrorMessage` value is used to localize one of the system error messages as specified in the StringId. The `Predicate` value is used to localize one of the [Predicate](predicates.md) error messages, as specified in the StringId. The `InputValidation` value is used to localize one of the [PredicateValidation](predicates.md) group error messages as specified in the StringId. The `GetLocalizedStringsTransformationClaimType` value is used to copy localized strings into claims. For more information, see [GetLocalizedStringsTransformation claims transformation](string-transformations.md#getlocalizedstringstransformation) |
146146
| ElementId | Yes | If **ElementType** is set to `ClaimType`, `Predicate`, or `InputValidation`, this element contains a reference to a claim type already defined in the ClaimsSchema section. |
147147
| StringId | Yes | If **ElementType** is set to `ClaimType`, this element contains a reference to an attribute of a claim type. Possible values: `DisplayName`, `AdminHelpText`, or `PatternHelpText`. The `DisplayName` value is used to set the claim display name. The `AdminHelpText` value is used to set the help text name of the claim user. The `PatternHelpText` value is used to set the claim pattern help text. If **ElementType** is set to `UxElement`, this element contains a reference to an attribute of a user interface element. If **ElementType** is set to `ErrorMessage`, this element specifies the identifier of an error message. See [Localization string IDs](localization-string-ids.md) for a complete list of the `UxElement` identifiers.|
148148

articles/active-directory-b2c/one-time-password-technical-profile.md

Lines changed: 40 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/10/2020
12+
ms.date: 03/09/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -65,15 +65,15 @@ The **OutputClaimsTransformations** element may contain a collection of **Output
6565

6666
### Metadata
6767

68-
The following settings can be used to configure code generation and maintenance:
68+
The following settings can be used to configure code generation mode:
6969

7070
| Attribute | Required | Description |
7171
| --------- | -------- | ----------- |
7272
| CodeExpirationInSeconds | No | Time in seconds until code expiration. Minimum: `60`; Maximum: `1200`; Default: `600`. |
7373
| CodeLength | No | Length of the code. The default value is `6`. |
7474
| CharacterSet | No | The character set for the code, formatted for use in a regular expression. For example, `a-z0-9A-Z`. The default value is `0-9`. The character set must include a minimum of 10 different characters in the set specified. |
7575
| NumRetryAttempts | No | The number of verification attempts before the code is considered invalid. The default value is `5`. |
76-
| Operation | Yes | The operation to be performed. Possible values: `GenerateCode`, or `VerifyCode`. |
76+
| Operation | Yes | The operation to be performed. Possible value: `GenerateCode`. |
7777
| ReuseSameCode | No | Whether a duplicate code should be given rather than generating a new code when given code has not expired and is still valid. The default value is `false`. |
7878

7979
### Returning error message
@@ -86,22 +86,22 @@ The following example `TechnicalProfile` is used for generating a code:
8686

8787
```XML
8888
<TechnicalProfile Id="GenerateCode">
89-
<DisplayName>Generate Code</DisplayName>
90-
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.OneTimePasswordProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
91-
<Metadata>
92-
<Item Key="Operation">GenerateCode</Item>
93-
<Item Key="CodeExpirationInSeconds">600</Item>
94-
<Item Key="CodeLength">6</Item>
95-
<Item Key="CharacterSet">0-9</Item>
96-
<Item Key="NumRetryAttempts">5</Item>
97-
<Item Key="ReuseSameCode">false</Item>
98-
</Metadata>
99-
<InputClaims>
100-
<InputClaim ClaimTypeReferenceId="identifier" PartnerClaimType="identifier" />
101-
</InputClaims>
102-
<OutputClaims>
103-
<OutputClaim ClaimTypeReferenceId="otpGenerated" PartnerClaimType="otpGenerated" />
104-
</OutputClaims>
89+
<DisplayName>Generate Code</DisplayName>
90+
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.OneTimePasswordProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
91+
<Metadata>
92+
<Item Key="Operation">GenerateCode</Item>
93+
<Item Key="CodeExpirationInSeconds">600</Item>
94+
<Item Key="CodeLength">6</Item>
95+
<Item Key="CharacterSet">0-9</Item>
96+
<Item Key="NumRetryAttempts">5</Item>
97+
<Item Key="ReuseSameCode">false</Item>
98+
</Metadata>
99+
<InputClaims>
100+
<InputClaim ClaimTypeReferenceId="identifier" PartnerClaimType="identifier" />
101+
</InputClaims>
102+
<OutputClaims>
103+
<OutputClaim ClaimTypeReferenceId="otpGenerated" PartnerClaimType="otpGenerated" />
104+
</OutputClaims>
105105
</TechnicalProfile>
106106
```
107107

@@ -128,46 +128,45 @@ The **OutputClaimsTransformations** element may contain a collection of **Output
128128

129129
### Metadata
130130

131-
The following settings can be used to configure the error message displayed upon code verification failure:
131+
The following settings can be used to code verification mode:
132132

133133
| Attribute | Required | Description |
134134
| --------- | -------- | ----------- |
135-
| UserMessageIfSessionDoesNotExist | No | The message to display to the user if the code verification session has expired. It is either the code has expired or the code has never been generated for a given identifier. |
136-
| UserMessageIfMaxRetryAttempted | No | The message to display to the user if they've exceeded the maximum allowed verification attempts. |
137-
| UserMessageIfInvalidCode | No | The message to display to the user if they've provided an invalid code. |
135+
| Operation | Yes | The operation to be performed. Possible value: `VerifyCode`. |
138136

139-
### Returning error message
140137

141-
As described in [Metadata](#metadata), you can customize error message shown to the user for different error cases. You can further localize those messages by prefixing the locale, for example:
138+
### Error messages
142139

143-
```XML
144-
<Item Key="en.UserMessageIfInvalidCode">Wrong code has been entered.</Item>
145-
```
140+
The following settings can be used to configure the error messages displayed upon code verification failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization-string-ids.md#one-time-password-error-messages).
141+
142+
| Attribute | Required | Description |
143+
| --------- | -------- | ----------- |
144+
| UserMessageIfSessionDoesNotExist | No | The message to display to the user if the code verification session has expired. It is either the code has expired or the code has never been generated for a given identifier. |
145+
| UserMessageIfMaxRetryAttempted | No | The message to display to the user if they've exceeded the maximum allowed verification attempts. |
146+
| UserMessageIfInvalidCode | No | The message to display to the user if they've provided an invalid code. |
147+
|UserMessageIfSessionConflict|No| The message to display to the user if the code cannot be verified.|
146148

147149
### Example
148150

149151
The following example `TechnicalProfile` is used for verifying a code:
150152

151153
```XML
152154
<TechnicalProfile Id="VerifyCode">
153-
<DisplayName>Verify Code</DisplayName>
154-
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.OneTimePasswordProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
155-
<Metadata>
156-
<Item Key="Operation">VerifyCode</Item>
157-
<Item Key="UserMessageIfInvalidCode">Wrong code has been entered.</Item>
158-
<Item Key="UserMessageIfSessionDoesNotExist">Code has expired.</Item>
159-
<Item Key="UserMessageIfMaxRetryAttempted">You've tried too many times.</Item>
160-
</Metadata>
161-
<InputClaims>
162-
<InputClaim ClaimTypeReferenceId="identifier" PartnerClaimType="identifier" />
163-
<InputClaim ClaimTypeReferenceId="otpGenerated" PartnerClaimType="otpToVerify" />
164-
</InputClaims>
155+
<DisplayName>Verify Code</DisplayName>
156+
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.OneTimePasswordProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
157+
<Metadata>
158+
<Item Key="Operation">VerifyCode</Item>
159+
</Metadata>
160+
<InputClaims>
161+
<InputClaim ClaimTypeReferenceId="identifier" PartnerClaimType="identifier" />
162+
<InputClaim ClaimTypeReferenceId="otpGenerated" PartnerClaimType="otpToVerify" />
163+
</InputClaims>
165164
</TechnicalProfile>
166165
```
167166

168167
## Next steps
169168

170-
See the following article for example of using one-time password technial profile with custom email verification:
169+
See the following article for example of using one-time password technical profile with custom email verification:
171170

172171
- [Custom email verification in Azure Active Directory B2C](custom-email.md)
173172

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: conceptual
15-
ms.date: 03/01/2020
15+
ms.date: 03/07/2020
1616
ms.author: mimart
1717
ms.reviewer: arvinh
1818
ms.custom: aaddev;it-pro;seohack1
@@ -30,7 +30,7 @@ SCIM is a standardized definition of two endpoints: a /Users endpoint and a /Gro
3030

3131
The standard user object schema and rest APIs for management defined in SCIM 2.0 (RFC [7642](https://tools.ietf.org/html/rfc7642), [7643](https://tools.ietf.org/html/rfc7643), [7644](https://tools.ietf.org/html/rfc7644)) allow identity providers and apps to more easily integrate with each other. Application developers that build a SCIM endpoint can integrate with any SCIM-compliant client without having to do custom work.
3232

33-
Automating provisioning to an application requires building and integrating a SCIM endpoint with the Azure AD SCIM compliant. Perform the following steps to start provisioning users and groups into your application.
33+
Automating provisioning to an application requires building and integrating a SCIM endpoint with the Azure AD SCIM client. Perform the following steps to start provisioning users and groups into your application.
3434

3535
* **[Step 1: Design your user and group schema.](#step-1-design-your-user-and-group-schema)** Identify the objects and attributes your application needs, and determine how they map to the user and group schema supported by the Azure AD SCIM implementation.
3636

@@ -754,7 +754,7 @@ TLS 1.2 Cipher Suites minimum bar:
754754

755755
## Step 3: Build a SCIM endpoint
756756

757-
Now that you have desidned your schema and understood the Azure AD SCIM implementation, you can get started developing your SCIM endpoint. Rather than starting from scratch and building the implementation completely on your own, you can rely on a number of open source SCIM libraries published by the SCIM commuinty.
757+
Now that you have designed your schema and understood the Azure AD SCIM implementation, you can get started developing your SCIM endpoint. Rather than starting from scratch and building the implementation completely on your own, you can rely on a number of open source SCIM libraries published by the SCIM commuinty.
758758
The open source .NET Core [reference code](https://aka.ms/SCIMReferenceCode) published by the Azure AD provisioning team is one such resource that can jump start your development. Once you've built your SCIM endpoint, you'll want to test it out. You can use the collection of [postman tests](https://github.com/AzureAD/SCIMReferenceCode/wiki/Test-Your-SCIM-Endpoint) provided as part of the reference code or run through the sample requests / responses provided [above](https://docs.microsoft.com/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups#user-operations).
759759

760760
Note: The reference code is intended to help you get started building your SCIM endpoint and is provided "AS IS." Contributions from the community are welcome to help build and maintain the code.

articles/azure-databricks/TOC.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -31,12 +31,6 @@
3131
items:
3232
- name: Getting started
3333
items:
34-
- name: Try Azure Databricks
35-
href: /azure/databricks/getting-started/try-databricks
36-
maintainContext: true
37-
- name: Get started with Azure Databricks
38-
href: /azure/databricks/getting-started/quick-start
39-
maintainContext: true
4034
- name: Data overview
4135
href: /azure/databricks/getting-started/data
4236
maintainContext: true
@@ -1663,6 +1657,9 @@
16631657
- name: Platform release notes
16641658
href: /azure/databricks/release-notes/product/index
16651659
maintainContext: true
1660+
- name: March 2020
1661+
href: /azure/databricks/release-notes/product/2020/march
1662+
maintainContext: true
16661663
- name: February 2020
16671664
href: /azure/databricks/release-notes/product/2020/february
16681665
maintainContext: true

0 commit comments

Comments
 (0)