Skip to content

Commit 9ffe89f

Browse files
authored
Merge branch 'master' into sdg-master2
2 parents 73c8095 + 2d55a72 commit 9ffe89f

File tree

3,676 files changed

+91431
-37221
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,676 files changed

+91431
-37221
lines changed

.gitignore

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
# Operating System files
2-
.DS_Store
2+
.DS_Store
33
Thumbs.db
44

55
# Visual Studio and VS Code files

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -210,6 +210,12 @@
210210
"branch": "tutorial",
211211
"branch_mapping": {}
212212
},
213+
{
214+
"path_to_root": "samples-tsi",
215+
"url": "https://github.com/Azure-Samples/Azure-Time-Series-Insights",
216+
"branch": "master",
217+
"branch_mapping": {}
218+
},
213219
{
214220
"path_to_root": "media-services-v3-dotnet-core-tutorials",
215221
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-core-tutorials",

.openpublishing.redirection.json

Lines changed: 261 additions & 15 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-configure-signup-self-asserted-custom.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,20 +16,20 @@ ms.subservice: B2C
1616

1717
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1818

19-
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown, and define whether it's required.
19+
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown and define whether it's required.
2020

2121
## Prerequisites
2222

2323
Complete the steps in the article [Getting Started with Custom Policies](active-directory-b2c-get-started-custom.md). Test the sign-up or sign-in user journey to sign up a new local account before proceeding.
2424

2525
## Add claims
2626

27-
Gathering initial data from your users is achieved using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its selfasserted provider.
27+
Gathering initial data from your users is achieved using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its self-asserted provider.
2828

2929

3030
### Define the claim
3131

32-
Lets ask the user for their city. Add the following element to the **ClaimsSchema** element in the TrustFrameworkBase policy file:
32+
Let's ask the user for their city. Add the following element to the **ClaimsSchema** element in the TrustFrameworkBase policy file:
3333

3434
```xml
3535
<ClaimType Id="city">

articles/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ You need to store your certificate in your Azure AD B2C tenant.
3131
1. Sign in to the [Azure portal](https://portal.azure.com/).
3232
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory and subscription filter** in the top menu and choose the directory that contains your tenant.
3333
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
34-
4. On the Overview page, select **Identity Experience Framework - PREVIEW**.
34+
4. On the Overview page, select **Identity Experience Framework**.
3535
5. Select **Policy Keys** and then select **Add**.
3636
6. For **Options**, choose `Upload`.
3737
7. Enter a **Name** for the policy key. For example, `SamlCert`. The prefix `B2C_1A_` is added automatically to the name of your key.

articles/active-directory-b2c/active-directory-b2c-custom-setup-li-idp.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -356,8 +356,12 @@ As part of the LinkedIn migration from v1.0 to v2.0, an additional call to anoth
356356

357357
```XML
358358
<!-- Extra step for LinkedIn to get the email -->
359-
<OrchestrationStep Order="4" Type="ClaimsExchange">
359+
<OrchestrationStep Order="3" Type="ClaimsExchange">
360360
<Preconditions>
361+
<Precondition Type="ClaimsExist" ExecuteActionsIf="false">
362+
<Value>identityProvider</Value>
363+
<Action>SkipThisOrchestrationStep</Action>
364+
</Precondition>
361365
<Precondition Type="ClaimEquals" ExecuteActionsIf="false">
362366
<Value>identityProvider</Value>
363367
<Value>linkedin.com</Value>
@@ -372,4 +376,4 @@ As part of the LinkedIn migration from v1.0 to v2.0, an additional call to anoth
372376

373377
Obtaining the email address from LinkedIn during sign-up is optional. If you choose not to obtain the email from LinkedIn but require one during sign up, the user is required to manually enter the email address and validate it.
374378

375-
For a full sample of a policy that uses the LinkedIn identity provider, see the [Custom Policy Starter Pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/linkedin-identity-provider).
379+
For a full sample of a policy that uses the LinkedIn identity provider, see the [Custom Policy Starter Pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/linkedin-identity-provider).

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ ms.subservice: B2C
2929
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
3030
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Click the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
3131
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
32-
4. On the Overview page, select **Identity Experience Framework - PREVIEW**.
32+
4. On the Overview page, select **Identity Experience Framework**.
3333

3434
### Create the signing key
3535

articles/active-directory-b2c/active-directory-b2c-quickstarts-desktop-app.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
2222

2323
## Prerequisites
2424

25-
- [Visual Studio 2017](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
25+
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
2626
- A social account from either Facebook, Google, Microsoft, or Twitter.
2727
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop/archive/master.zip) or clone the sample web app from GitHub.
2828

@@ -41,14 +41,14 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
4141
4242
![Sample application](media/active-directory-b2c-quickstarts-desktop-app/wpf-sample-application.png)
4343
44-
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
44+
The sample supports several sign-up options. These options include using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
4545
4646
4747
2. Azure AD B2C presents a custom login page for a fictitious brand called Wingtip Toys for the sample web app. To sign up using a social identity provider, click the button of the identity provider you want to use.
4848
4949
![Sign In or Sign Up provider](media/active-directory-b2c-quickstarts-desktop-app/sign-in-or-sign-up-wpf.png)
5050
51-
You authenticate (sign-in) using your social account credentials and authorize the application to read information from your social account. By granting access, the application can retrieve profile information from the social account such as your name and city.
51+
You authenticate (sign in) using your social account credentials and authorize the application to read information from your social account. By granting access, the application can retrieve profile information from the social account such as your name and city.
5252
5353
2. Finish the sign-in process for the identity provider.
5454
@@ -76,15 +76,20 @@ Click **Call API** to make a request to the protected resource.
7676
7777
The application includes the Azure AD access token in the request to the protected web API resource. The web API sends back the display name contained in the access token.
7878
79-
You have successfully used your Azure AD B2C user account to make an authorized call an Azure AD B2C protected web API.
79+
You've successfully used your Azure AD B2C user account to make an authorized call an Azure AD B2C protected web API.
8080
8181
## Clean up resources
8282
8383
You can use your Azure AD B2C tenant if you plan to try other Azure AD B2C quickstarts or tutorials. When no longer needed, you can [delete your Azure AD B2C tenant](active-directory-b2c-faqs.md#how-do-i-delete-my-azure-ad-b2c-tenant).
8484
8585
## Next steps
8686
87-
In this quickstart, you used a sample desktop application to sign in with a custom login page, sign in with a social identity provider, create an Azure AD B2C account, and call a web API protected by Azure AD B2C.
87+
In this quickstart, you used a sample desktop application to:
88+
89+
* Sign in with a custom login page
90+
* Sign in with a social identity provider
91+
* Create an Azure AD B2C account
92+
* Call a web API protected by Azure AD B2C
8893
8994
Get started creating your own Azure AD B2C tenant.
9095

articles/active-directory-b2c/active-directory-b2c-quickstarts-spa.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
2121

2222
## Prerequisites
2323

24-
- [Visual Studio 2017](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
24+
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
2525
- Install [Node.js](https://nodejs.org/en/download/)
2626
- A social account from either Facebook, Google, Microsoft, or Twitter.
2727
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp/archive/master.zip) or clone the sample web app from GitHub.
@@ -60,7 +60,7 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
6060
6161
![Sign In or Sign Up provider](media/active-directory-b2c-quickstarts-spa/sign-in-or-sign-up-spa.png)
6262
63-
You authenticate (sign-in) using your social account credentials and authorize the application to read information from your social account. By granting access, the application can retrieve profile information from the social account such as your name and city.
63+
You authenticate (sign in) using your social account credentials and authorize the application to read information from your social account. By granting access, the application can retrieve profile information from the social account such as your name and city.
6464
6565
3. Finish the sign-in process for the identity provider.
6666
@@ -78,7 +78,12 @@ You can use your Azure AD B2C tenant if you plan to try other Azure AD B2C quick
7878
7979
## Next steps
8080
81-
In this quickstart, you used a sample single-page application to sign in with a custom login page, sign in with a social identity provider, create an Azure AD B2C account, and call a web API protected by Azure AD B2C.
81+
In this quickstart, you used a sample single-page application to:
82+
83+
* Sign in with a custom login page
84+
* Sign in with a social identity provider
85+
* Create an Azure AD B2C account
86+
* Call a web API protected by Azure AD B2C
8287
8388
Get started creating your own Azure AD B2C tenant.
8489

articles/active-directory-b2c/active-directory-b2c-quickstarts-web-app.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Quickstart - Set up sign-in for an ASP.NET application using Azure Active Directory B2C | Microsoft Docs
2+
title: Quickstart - Set up sign in for an ASP.NET application using Azure Active Directory B2C | Microsoft Docs
33
description: Run a sample ASP.NET web app that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: davidmu1
@@ -13,15 +13,15 @@ ms.author: davidmu
1313
ms.subservice: B2C
1414
---
1515

16-
# Quickstart: Set up sign-in for an ASP.NET application using Azure Active Directory B2C
16+
# Quickstart: Set up sign in for an ASP.NET application using Azure Active Directory B2C
1717

1818
Azure Active Directory (Azure AD) B2C provides cloud identity management to keep your application, business, and customers protected. Azure AD B2C enables your applications to authenticate to social accounts and enterprise accounts using open standard protocols. In this quickstart, you use an ASP.NET application to sign in using a social identity provider and call an Azure AD B2C protected web API.
1919

2020
[!INCLUDE [quickstarts-free-trial-note](../../includes/quickstarts-free-trial-note.md)]
2121

2222
## Prerequisites
2323

24-
- [Visual Studio 2017](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
24+
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
2525
- A social account from either Facebook, Google, Microsoft, or Twitter.
2626
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi/archive/master.zip) or clone the sample web application from GitHub.
2727

@@ -31,7 +31,7 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
3131
3232
These two projects are in the sample solution:
3333
34-
- **TaskWebApp** - A web application that creates and edits a task list. The web application uses the **sign-up or sign-in** user flow to sign-up or sign-in users.
34+
- **TaskWebApp** - A web application that creates and edits a task list. The web application uses the **sign-up or sign-in** user flow to sign up or sign in users.
3535
- **TaskService** - A web API that supports the create, read, update, and delete task list functionality. The web API is protected by Azure AD B2C and called by the web application.
3636
3737
## Run the application in Visual Studio
@@ -53,11 +53,11 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
5353
5454
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
5555
56-
2. Azure AD B2C presents a custom login page for a fictitious brand called Wingtip Toys for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
56+
2. Azure AD B2C presents a custom sign-in page for a fictitious brand called Wingtip Toys for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
5757
5858
![Sign In or Sign Up provider](media/active-directory-b2c-quickstarts-web-app/sign-in-or-sign-up-web.png)
5959
60-
You authenticate (sign-in) using your social account credentials and authorize the application to read information from your social account. By granting access, the application can retrieve profile information from the social account such as your name and city.
60+
You authenticate (sign in) using your social account credentials and authorize the application to read information from your social account. By granting access, the application can retrieve profile information from the social account such as your name and city.
6161
6262
3. Finish the sign-in process for the identity provider.
6363
@@ -91,7 +91,12 @@ You can use your Azure AD B2C tenant if you plan to try other Azure AD B2C quick
9191
9292
## Next steps
9393
94-
In this quickstart, you used a sample ASP.NET application to sign in with a custom login page, sign in with a social identity provider, create an Azure AD B2C account, and call a web API protected by Azure AD B2C.
94+
In this quickstart, you used a sample ASP.NET application to:
95+
96+
* Sign in with a custom login page
97+
* Sign in with a social identity provider
98+
* Create an Azure AD B2C account
99+
* Call a web API protected by Azure AD B2C
95100
96101
Get started creating your own Azure AD B2C tenant.
97102

0 commit comments

Comments
 (0)