Skip to content

Commit a240f8b

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-partner
2 parents 6d8bb82 + bbd8d8b commit a240f8b

File tree

1,167 files changed

+25381
-17807
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,167 files changed

+25381
-17807
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -845,6 +845,7 @@
845845
"articles/purview/.openpublishing.redirection.purview.json",
846846
"articles/service-bus-messaging/.openpublishing.redirection.service-bus-messaging.json",
847847
"articles/stream-analytics/.openpublishing.redirection.stream-analytics.json",
848-
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json"
848+
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
849+
"articles/mysql/.openpublishing.redirection.mysql.json"
849850
]
850851
}

.openpublishing.redirection.active-directory.json

Lines changed: 10511 additions & 26 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.json

Lines changed: 411 additions & 10887 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/TOC.yml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@
77
href: overview.md
88
- name: Technical and feature overview
99
href: technical-overview.md
10+
- name: Supported Azure AD features
11+
href: supported-azure-ad-features.md
1012
- name: What's new in docs?
1113
href: whats-new-docs.md
1214
- name: Quickstarts
@@ -26,7 +28,9 @@
2628
href: tutorial-register-applications.md
2729
- name: 3 - Create user flows and custom policies
2830
href: tutorial-create-user-flows.md
29-
- name: Clean up and delete tenant
31+
- name: 4 - Manage your tenant
32+
href: tenant-management.md
33+
- name: 5 - Clean up and delete tenant
3034
href: tutorial-delete-tenant.md
3135
- name: Samples
3236
items:
@@ -82,14 +86,14 @@
8286
href: user-overview.md
8387
- name: User profile attributes
8488
href: user-profile-attributes.md
89+
- name: Roles and resource access control
90+
href: roles-resource-access-control.md
8591
- name: Identity Protection and Conditional Access
8692
href: conditional-access-identity-protection-overview.md
8793
- name: Policy keys
8894
href: policy-keys-overview.md
8995
- name: How-to guides
9096
items:
91-
- name: Manage your tenant
92-
href: tenant-management.md
9397
- name: App integration
9498
items:
9599
- name: ASP.NET Core web app

articles/active-directory-b2c/claimstransformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ The **OutputClaim** element contains the following attributes:
111111
| ClaimTypeReferenceId | Yes | A reference to a ClaimType already defined in the ClaimsSchema section in the policy.
112112
| TransformationClaimType | Yes | An identifier to reference a transformation claim type. Each claim transformation has its own values. See the [claims transformation reference](#claims-transformations-reference) for a complete list of the available values. |
113113

114-
If input claim and the output claim are the same type (string, or boolean), you can use the same input claim as the output claim. In this case, the claims transformation changes the input claim with the output value.
114+
Input and output claims used in claims transformation need to be distinct. The same input claim cannot be used as the output claim.
115115

116116
## Example
117117

articles/active-directory-b2c/configure-authentication-sample-angular-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Before you follow the procedures in this article, make sure that your computer i
5959

6060
* [Visual Studio Code](https://code.visualstudio.com/) or another code editor.
6161
* [Node.js runtime](https://nodejs.org/en/download/) and [npm](https://docs.npmjs.com/downloading-and-installing-node-js-and-npm).
62-
* [Angular LCI](https://angular.io/cli).
62+
* [Angular CLI](https://angular.io/cli).
6363

6464
## Step 1: Configure your user flow
6565

articles/active-directory-b2c/configure-tokens.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 09/15/2021
11+
ms.date: 10/08/2021
1212
ms.custom: project-no-code
1313
ms.author: mimart
1414
ms.subservice: B2C
@@ -58,6 +58,11 @@ To configure your user flow token lifetime:
5858
1. Under **Token lifetime**, adjust the properties to fit the needs of your application.
5959
1. Click **Save**.
6060

61+
62+
63+
:::image type="content" source="./media/configure-tokens/configure-tokens.png" alt-text="configure user flows tokens in Azure portal.":::
64+
65+
6166
::: zone-end
6267

6368
::: zone pivot="b2c-custom-policy"

articles/active-directory-b2c/embedded-login.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ zone_pivot_groups: b2c-policy-type
2828

2929
::: zone pivot="b2c-custom-policy"
3030

31-
For a simpler sing-up or sign-in experience, you can avoid redirecting users to a separate sing-up or sign-in page, or generating a pop-up window. By using the inline frame <iframe> HTML element, you can embed the Azure AD B2C sign-in user interface directly into your web application.
31+
For a simpler sign-up or sign-in experience, you can avoid redirecting users to a separate sign-up or sign-in page, or generating a pop-up window. By using the inline frame <iframe> HTML element, you can embed the Azure AD B2C sign-in user interface directly into your web application.
3232

3333
> [!TIP]
3434
> Use the <iframe> HTML element to embed the [sign-up or sign-in](add-sign-up-and-sign-in-policy.md), [edit profile](add-profile-editing-policy.md), or [change password](add-password-change-policy.md) custom policies into your web or single page app.

articles/active-directory-b2c/implicit-flow-single-page-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ error=user_authentication_required
218218
If you receive this error in the iframe request, the user must interactively sign in again to retrieve a new token.
219219

220220
## Refresh tokens
221-
ID tokens and access tokens both expire after a short period of time. Your app must be prepared to refresh these tokens periodically. To refresh either type of token, perform the same hidden iframe request we used in an earlier example, by using the `prompt=none` parameter to control Azure AD steps. To receive a new `id_token` value, be sure to use `response_type=id_token` and `scope=openid`, and a `nonce` parameter.
221+
ID tokens and access tokens both expire after a short period of time. Your app must be prepared to refresh these tokens periodically. Implicit flows do not allow you to obtain a refresh token due to security reasons. To refresh either type of token, use the implicit flow in a hidden HTML iframe element. In the authorization request include the `prompt=none` parameter. To receive a new id_token value, be sure to use `response_type=id_token` and `scope=openid`, and a `nonce` parameter.
222222

223223
## Send a sign-out request
224224
When you want to sign the user out of the app, redirect the user to Azure AD to sign out. If you don't redirect the user, they might be able to reauthenticate to your app without entering their credentials again because they have a valid single sign-on session with Azure AD.
188 KB
Loading

0 commit comments

Comments
 (0)