Skip to content

Commit a9311e3

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into acrfix
2 parents aaf024a + c1d8229 commit a9311e3

File tree

260 files changed

+4844
-2468
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

260 files changed

+4844
-2468
lines changed

.openpublishing.redirection.json

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3732,7 +3732,12 @@
37323732
},
37333733
{
37343734
"source_path": "articles/azure-resource-manager/resource-group-create-multiple.md",
3735-
"redirect_url": "/azure/azure-resource-manager/templates/create-multiple-instances",
3735+
"redirect_url": "/azure/azure-resource-manager/templates/copy-resources",
3736+
"redirect_document_id": false
3737+
},
3738+
{
3739+
"source_path": "articles/azure-resource-manager/templates/create-multiple-instances.md",
3740+
"redirect_url": "/azure/azure-resource-manager/templates/copy-resources",
37363741
"redirect_document_id": false
37373742
},
37383743
{
@@ -4662,7 +4667,7 @@
46624667
},
46634668
{
46644669
"source_path": "articles/resource-group-create-multiple.md",
4665-
"redirect_url": "/azure/azure-resource-manager/templates/create-multiple-instances",
4670+
"redirect_url": "/azure/azure-resource-manager/templates/copy-resources",
46664671
"redirect_document_id": false
46674672
},
46684673
{
@@ -12037,7 +12042,7 @@
1203712042
},
1203812043
{
1203912044
"source_path": "articles/azure-resource-manager/resource-manager-property-copy.md",
12040-
"redirect_url": "/azure/azure-resource-manager/templates/create-multiple-instances",
12045+
"redirect_url": "/azure/azure-resource-manager/templates/copy-properties",
1204112046
"redirect_document_id": false
1204212047
},
1204312048
{
@@ -12047,7 +12052,7 @@
1204712052
},
1204812053
{
1204912054
"source_path": "articles/azure-resource-manager/resource-manager-sequential-loop.md",
12050-
"redirect_url": "/azure/azure-resource-manager/templates/create-multiple-instances",
12055+
"redirect_url": "/azure/azure-resource-manager/templates/copy-resources",
1205112056
"redirect_document_id": false
1205212057
},
1205312058
{

CODEOWNERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Testing the new code owners feature in GitHub. Please contact Cory Fowler if you have questions.
22
# Cognitive Services
3-
articles/cognitive-services/ @diberry @erhopf, @nitinme
3+
articles/cognitive-services/ @diberry @erhopf @aahill @ievangelist @patrickfarley @nitinme
44

55
# DevOps
66
articles/ansible/ @TomArcherMsft

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 49 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Any parameter name included as part of an OIDC or OAuth2 request can be mapped t
102102

103103
## Using claim resolvers
104104

105-
You can use claims resolvers with following elements:
105+
You can use claims resolvers with the following elements:
106106

107107
| Item | Element | Settings |
108108
| ----- | ----------------------- | --------|
@@ -119,16 +119,16 @@ You can use claims resolvers with following elements:
119119
|[RelyingParty](relyingparty.md#technicalprofile) technical profile| `OutputClaim`| 2 |
120120

121121
Settings:
122-
1. The `IncludeClaimResolvingInClaimsHandling` metadata must set to `true`
123-
1. The input or output claims attribute `AlwaysUseDefaultValue` must set to `true`
122+
1. The `IncludeClaimResolvingInClaimsHandling` metadata must be set to `true`.
123+
1. The input or output claims attribute `AlwaysUseDefaultValue` must be set to `true`.
124124

125-
## How to use claim resolvers
125+
## Claim resolvers samples
126126

127127
### RESTful technical profile
128128

129129
In a [RESTful](restful-technical-profile.md) technical profile, you may want to send the user language, policy name, scope, and client ID. Based on these claims the REST API can run custom business logic, and if necessary raise a localized error message.
130130

131-
The following example shows a RESTful technical profile:
131+
The following example shows a RESTful technical profile with this scenario:
132132

133133
```XML
134134
<TechnicalProfile Id="REST">
@@ -138,12 +138,13 @@ The following example shows a RESTful technical profile:
138138
<Item Key="ServiceUrl">https://your-app.azurewebsites.net/api/identity</Item>
139139
<Item Key="AuthenticationType">None</Item>
140140
<Item Key="SendClaimsIn">Body</Item>
141+
<Item Key="IncludeClaimResolvingInClaimsHandling">true</Item>
141142
</Metadata>
142143
<InputClaims>
143-
<InputClaim ClaimTypeReferenceId="userLanguage" DefaultValue="{Culture:LCID}" />
144-
<InputClaim ClaimTypeReferenceId="policyName" DefaultValue="{Policy:PolicyId}" />
145-
<InputClaim ClaimTypeReferenceId="scope" DefaultValue="{OIDC:scope}" />
146-
<InputClaim ClaimTypeReferenceId="clientId" DefaultValue="{OIDC:ClientId}" />
144+
<InputClaim ClaimTypeReferenceId="userLanguage" DefaultValue="{Culture:LCID}" AlwaysUseDefaultValue="true" />
145+
<InputClaim ClaimTypeReferenceId="policyName" DefaultValue="{Policy:PolicyId}" AlwaysUseDefaultValue="true" />
146+
<InputClaim ClaimTypeReferenceId="scope" DefaultValue="{OIDC:scope}" AlwaysUseDefaultValue="true" />
147+
<InputClaim ClaimTypeReferenceId="clientId" DefaultValue="{OIDC:ClientId}" AlwaysUseDefaultValue="true" />
147148
</InputClaims>
148149
<UseTechnicalProfileForSessionManagement ReferenceId="SM-Noop" />
149150
</TechnicalProfile>
@@ -155,9 +156,9 @@ Using claim resolvers, you can prepopulate the sign-in name or direct sign-in to
155156

156157
### Dynamic UI customization
157158

158-
Azure AD B2C enables you to pass query string parameters to your HTML content definition endpoints so that you can dynamically render the page content. For example, you can change the background image on the Azure AD B2C sign-up or sign-in page based on a custom parameter that you pass from your web or mobile application. For more information, see [Dynamically configure the UI by using custom policies in Azure Active Directory B2C](custom-policy-ui-customization-dynamic.md). You can also localize your HTML page based on a language parameter, or you can change the content based on the client ID.
159+
Azure AD B2C enables you to pass query string parameters to your HTML content definition endpoints to dynamically render the page content. For example, this allows the ability to modify the background image on the Azure AD B2C sign-up or sign-in page based on a custom parameter that you pass from your web or mobile application. For more information, see [Dynamically configure the UI by using custom policies in Azure Active Directory B2C](custom-policy-ui-customization-dynamic.md). You can also localize your HTML page based on a language parameter, or you can change the content based on the client ID.
159160

160-
The following example passes in the query string a parameter named **campaignId** with a value of `hawaii`, a **language** code of `en-US`, and **app** representing the client ID:
161+
The following example passes in the query string parameter named **campaignId** with a value of `hawaii`, a **language** code of `en-US`, and **app** representing the client ID:
161162

162163
```XML
163164
<UserJourneyBehaviors>
@@ -169,12 +170,23 @@ The following example passes in the query string a parameter named **campaignId*
169170
</UserJourneyBehaviors>
170171
```
171172

172-
As a result Azure AD B2C sends the above parameters to the HTML content page:
173+
As a result, Azure AD B2C sends the above parameters to the HTML content page:
173174

174175
```
175176
/selfAsserted.aspx?campaignId=hawaii&language=en-US&app=0239a9cc-309c-4d41-87f1-31288feb2e82
176177
```
177178

179+
### Content definition
180+
181+
In a [ContentDefinition](contentdefinitions.md) `LoadUri`, you can send claim resolvers to pull content from different places, based on the parameters used.
182+
183+
```XML
184+
<ContentDefinition Id="api.signuporsignin">
185+
<LoadUri>https://contoso.blob.core.windows.net/{Culture:LanguageName}/myHTML/unified.html</LoadUri>
186+
...
187+
</ContentDefinition>
188+
```
189+
178190
### Application Insights technical profile
179191

180192
With Azure Application Insights and claim resolvers you can gain insights on user behavior. In the Application Insights technical profile, you send input claims that are persisted to Azure Application Insights. For more information, see [Track user behavior in Azure AD B2C journeys by using Application Insights](analytics-with-application-insights.md). The following example sends the policy ID, correlation ID, language, and the client ID to Azure Application Insights.
@@ -192,3 +204,28 @@ With Azure Application Insights and claim resolvers you can gain insights on use
192204
</InputClaims>
193205
</TechnicalProfile>
194206
```
207+
208+
### Relying party policy
209+
210+
In a [Relying party](relyingparty.md) policy technical profile, you may want to send the tenant ID, or correlation ID to the relying party application within the JWT.
211+
212+
```XML
213+
<RelyingParty>
214+
<DefaultUserJourney ReferenceId="SignUpOrSignIn" />
215+
<TechnicalProfile Id="PolicyProfile">
216+
<DisplayName>PolicyProfile</DisplayName>
217+
<Protocol Name="OpenIdConnect" />
218+
<OutputClaims>
219+
<OutputClaim ClaimTypeReferenceId="displayName" />
220+
<OutputClaim ClaimTypeReferenceId="givenName" />
221+
<OutputClaim ClaimTypeReferenceId="surname" />
222+
<OutputClaim ClaimTypeReferenceId="email" />
223+
<OutputClaim ClaimTypeReferenceId="objectId" PartnerClaimType="sub"/>
224+
<OutputClaim ClaimTypeReferenceId="identityProvider" />
225+
<OutputClaim ClaimTypeReferenceId="tenantId" AlwaysUseDefaultValue="true" DefaultValue="{Policy:TenantObjectId}" />
226+
<OutputClaim ClaimTypeReferenceId="correlationId" AlwaysUseDefaultValue="true" DefaultValue="{Context:CorrelationId}" />
227+
</OutputClaims>
228+
<SubjectNamingInfo ClaimType="sub" />
229+
</TechnicalProfile>
230+
</RelyingParty>
231+
```

articles/active-directory-b2c/phone-number-claims-transformations.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/12/2020
12+
ms.date: 02/14/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -28,7 +28,8 @@ This claim validates the format of the phone number. If it is in a valid format,
2828

2929
| Item | TransformationClaimType | Data Type | Notes |
3030
| ---- | ----------------------- | --------- | ----- |
31-
| InputClaim | inputClaim | string | The claim of string type converting from. |
31+
| InputClaim | phoneNumberString | string | The string claim for the phone number. The phone number has to be in international format, complete with a leading "+" and country code. If input claim `country` is provided, the phone number is in local format (without the country code). |
32+
| InputClaim | country | string | [Optional] The string claim for the country code of the phone number in ISO3166 format (the two-letter ISO-3166 country code). |
3233
| OutputClaim | outputClaim | phoneNumber | The result of this claims transformation. |
3334

3435
The **ConvertStringToPhoneNumberClaim** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md) or [display control](display-controls.md). The **UserMessageIfClaimsTransformationInvalidPhoneNumber** self-asserted technical profile metadata controls the error message that is presented to the user.
@@ -40,7 +41,8 @@ You can use this claims transformation to ensure that the provided string claim
4041
```XML
4142
<ClaimsTransformation Id="ConvertStringToPhoneNumber" TransformationMethod="ConvertStringToPhoneNumberClaim">
4243
<InputClaims>
43-
<InputClaim ClaimTypeReferenceId="phoneString" TransformationClaimType="inputClaim" />
44+
<InputClaim ClaimTypeReferenceId="phoneString" TransformationClaimType="phoneNumberString" />
45+
<InputClaim ClaimTypeReferenceId="countryCode" TransformationClaimType="country" />
4446
</InputClaims>
4547
<OutputClaims>
4648
<OutputClaim ClaimTypeReferenceId="phoneNumber" TransformationClaimType="outputClaim" />
@@ -59,11 +61,19 @@ The self-asserted technical profile that calls the validation technical profile
5961
</TechnicalProfile>
6062
```
6163

62-
### Example
64+
### Example 1
6365

6466
- Input claims:
65-
- **inputClaim**: +1 (123) 456-7890
67+
- **phoneNumberString**: 045 456-7890
68+
- **country**: DK
6669
- Output claims:
70+
- **outputClaim**: +450546148120
71+
72+
### Example 2
73+
74+
- Input claims:
75+
- **phoneNumberString**: +1 (123) 456-7890
76+
- Output claims:
6777
- **outputClaim**: +11234567890
6878

6979
## GetNationalNumberAndCountryCodeFromPhoneNumberString

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -296,7 +296,7 @@ Certain attributes such as phoneNumbers and emails are multi-value attributes wh
296296

297297
## Restoring the default attributes and attribute-mappings
298298

299-
Should you need to start over and reset your existing mappings back to their default state, you can select the **Restore default mappings** check box and save the configuration. Doing so sets all mappings as if the application was just added to your Azure AD tenant from the application gallery.
299+
Should you need to start over and reset your existing mappings back to their default state, you can select the **Restore default mappings** check box and save the configuration. Doing so sets all mappings and scoping filters as if the application was just added to your Azure AD tenant from the application gallery.
300300

301301
Selecting this option will effectively force a resynchronization of all users while the provisioning service is running.
302302

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
- name: Evolution of Microsoft identity platform
88
href: about-microsoft-identity-platform.md
99
- name: Quickstarts
10+
expanded: true
1011
items:
1112
- name: Set up a tenant
1213
href: quickstart-create-new-tenant.md
@@ -90,6 +91,7 @@
9091
- name: Samples
9192
href: sample-v2-code.md
9293
- name: Concepts
94+
expanded: true
9395
items:
9496
- name: Authentication basics
9597
href: authentication-scenarios.md

articles/active-directory/develop/howto-convert-app-to-be-multi-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ In this article, you learned how to build an application that can sign in a user
172172

173173
## Related content
174174

175-
* [Multi-tenant application samples](https://docs.microsoft.com/samples/browse/?products=azure-active-directory)
175+
* [Multi-tenant application sample](https://github.com/mspnp/multitenant-saas-guidance)
176176
* [Branding guidelines for applications][AAD-App-Branding]
177177
* [Application objects and service principal objects][AAD-App-SP-Objects]
178178
* [Integrating applications with Azure Active Directory][AAD-Integrating-Apps]

articles/active-directory/saas-apps/jamfprosamlconnector-tutorial.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 08/28/2019
17+
ms.date: 02/11/2020
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -151,16 +151,16 @@ In this section, you grant B.Simon access to Jamf Pro.
151151

152152
b. Select the **Enable Single Sign-On Authentication** check box.
153153

154-
c. Select **Azure** as an option from the **Identity Provider** drop-down menu.
154+
c. Select **Azure** as an option from the **Identity Provider** drop-down menu.
155155

156-
d. Copy the **ENTITY ID** value and paste it into the **Identifier (Entity ID)** field in the **Basic SAML Configuration** section in the Azure portal.
156+
d. Copy the **ENTITY ID** value and paste it into the **Identifier (Entity ID)** field in the **Basic SAML Configuration** section in the Azure portal.
157157

158-
> [!NOTE]
159-
> Use the value in the `<SUBDOMAIN>` field to complete the sign-on URL and reply URL in the **Basic SAML Configuration** section in the Azure portal.
158+
> [!NOTE]
159+
> Use the value in the `<SUBDOMAIN>` field to complete the sign-on URL and reply URL in the **Basic SAML Configuration** section in the Azure portal.
160160
161-
e. Select **Metadata URL** from the **Identity Provider Metadata Source** drop-down menu. In the field that appears, paste the **App Federation Metadata Url** value that you've copied from the Azure portal.
161+
e. Select **Metadata URL** from the **Identity Provider Metadata Source** drop-down menu. In the field that appears, paste the **App Federation Metadata Url** value that you've copied from the Azure portal.
162162

163-
f. (Optional) Edit the token expiration value or select "Disable SAML token expiration".
163+
f. (Optional) Edit the token expiration value or select "Disable SAML token expiration".
164164

165165
7. On the same page, scroll down to the **User Mapping** section. Then, take the following steps.
166166

articles/aks/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,8 @@
174174
href: internal-lb.md
175175
- name: Use a Standard Load Balancer
176176
href: load-balancer-standard.md
177+
- name: Use a user defined route for egress
178+
href: egress-outboundtype.md
177179
- name: Use a static IP address
178180
href: static-ip.md
179181
- name: Ingress

0 commit comments

Comments
 (0)