Skip to content

Commit aab862f

Browse files
committed
1872781a
2 parents 822a9a6 + 52155a1 commit aab862f

File tree

3,374 files changed

+16611
-20976
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,374 files changed

+16611
-20976
lines changed

.github/workflows/stale.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ name: Mark stale pull requests
22

33
on:
44
schedule:
5-
- cron: "0 */6 * * *"
5+
- cron: "0 */4 * * *"
66

77
jobs:
88
stale:
@@ -19,8 +19,8 @@ jobs:
1919
close-pr-label: auto-close
2020
exempt-pr-labels: keep-open
2121
operations-per-run: 1000
22-
ascending: true
23-
start-date: '2021-05-05'
22+
ascending: false
23+
start-date: '2019-05-30'
2424
stale-pr-message: >
2525
This pull request has been inactive for at least 14 days.
2626
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation) for instructions.

.openpublishing.redirection.healthcare-apis.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -454,7 +454,7 @@
454454
},
455455
{
456456
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/access-fhir-postman-tutorial.md",
457-
"redirect_url": "/azure/healthcare-apis/fhir/using-postman",
457+
"redirect_url": "/azure/healthcare-apis/use-postman",
458458
"redirect_document_id": true
459459
}
460460
]

.openpublishing.redirection.json

Lines changed: 125 additions & 60 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.key-vault.json

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -489,6 +489,22 @@
489489
"source_path_from_root": "/articles/key-vault/general/key-vault-integrate-kubernetes.md",
490490
"redirect_url": "/azure/aks/csi-secrets-store-driver",
491491
"redirect_document_id": false
492+
},
493+
494+
{
495+
"source_path_from_root": "/articles/key-vault/general/assign-access-policy-portal.md",
496+
"redirect_url": "/azure/key-vault/general/assign-access-policy",
497+
"redirect_document_id": false
498+
},
499+
{
500+
"source_path_from_root": "/articles/key-vault/general/assign-access-policy-cli.md",
501+
"redirect_url": "/azure/key-vault/general/assign-access-policy",
502+
"redirect_document_id": false
503+
},
504+
{
505+
"source_path_from_root": "/articles/key-vault/general/assign-access-policy-powershell.md",
506+
"redirect_url": "/azure/key-vault/general/assign-access-policy",
507+
"redirect_document_id": false
492508
}
493509

494510
]

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/16/2021
12+
ms.date: 09/12/2021
1313
ms.custom: project-no-code
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -22,9 +22,6 @@ zone_pivot_groups: b2c-policy-type
2222

2323
In Azure Active Directory B2C (Azure AD B2C), the resource owner password credentials (ROPC) flow is an OAuth standard authentication flow. In this flow, an application, also known as the relying party, exchanges valid credentials for tokens. The credentials include a user ID and password. The tokens returned are an ID token, access token, and a refresh token.
2424

25-
[!INCLUDE [active-directory-b2c-public-preview](../../includes/active-directory-b2c-public-preview.md)]
26-
27-
2825
## ROPC flow notes
2926

3027
In Azure Active Directory B2C (Azure AD B2C), the following options are supported:

articles/active-directory-b2c/add-sign-up-and-sign-in-policy.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,10 @@ Sign-up and sign-in policy lets users:
3131

3232
![Profile editing flow](./media/add-sign-up-and-sign-in-policy/add-sign-up-and-sign-in-flow.png)
3333

34+
Watch this video to learn how the user sign-up and sign-in policy works.
35+
36+
>[!Video https://www.youtube.com/embed/c8rN1ZaR7wk]
37+
3438
## Prerequisites
3539

3640
If you haven't already done so, [register a web application in Azure Active Directory B2C](tutorial-register-applications.md).

articles/active-directory-b2c/azure-sentinel.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Once you've configured your Azure AD B2C instance to send logs to Azure Monitor,
7171
7272
Now that you've enabled Azure Sentinel, get notified when something suspicious occurs in your Azure AD B2C tenant.
7373

74-
You can create [custom analytics rules](../sentinel/tutorial-detect-threats-custom.md) to discover threats and
74+
You can create [custom analytics rules](../sentinel/detect-threats-custom.md) to discover threats and
7575
anomalous behaviors that are present in your environment. These rules search for specific events or sets of events, alert you when certain event thresholds or conditions are reached. Then after, generate incidents for further investigation.
7676

7777
In the following example, we explain the scenario where you receive a notification if someone is trying to force access to your environment but they aren't successful. It could mean a brute-force attack. You want to get notified for two or more non-successful logins within 60 seconds.
@@ -118,7 +118,7 @@ In the Query scheduling section, set the following parameters:
118118
8. View the results of your new Azure AD B2C non-successful logins rule. Go to the **Incidents** page, where you can triage, investigate, and remediate the threats. An incident can include multiple alerts. It's an aggregation of all the relevant evidence for a specific investigation. You can set properties such as severity and status at the incident level.
119119

120120
>[!Note]
121-
>A key feature of Azure Sentinel is [incident investigation](../sentinel/tutorial-investigate-cases.md).
121+
>A key feature of Azure Sentinel is [incident investigation](../sentinel/investigate-cases.md).
122122
123123
9. To begin the investigation, select a specific incident. On the
124124
right, you can see detailed information for the incident including its severity, entities involved, the raw events that triggered the incident, and the incident's unique ID.
@@ -147,4 +147,4 @@ In this example, we add an email notification upon an incident created by the ru
147147

148148
- [Sample workbooks](https://github.com/azure-ad-b2c/siem#workbooks)
149149

150-
- [Azure Sentinel documentation](../sentinel/index.yml)
150+
- [Azure Sentinel documentation](../sentinel/index.yml)

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 08/04/2021
12+
ms.date: 09/12/2021
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -108,8 +108,6 @@ The **DataUri** element is used to specify the page identifier. Azure AD B2C use
108108

109109
You can enable [JavaScript client-side code](javascript-and-page-layout.md) by inserting `contract` between `elements` and the page type. For example, `urn:com:microsoft:aad:b2c:elements:contract:page-name:version`.
110110

111-
[!INCLUDE [active-directory-b2c-public-preview](../../includes/active-directory-b2c-public-preview.md)]
112-
113111
The [version](page-layout.md) part of the `DataUri` specifies the package of content containing HTML, CSS, and JavaScript for the user interface elements in your policy. If you intend to enable JavaScript client-side code, the elements you base your JavaScript on must be immutable. If they're not immutable, any changes could cause unexpected behavior on your user pages. To prevent these issues, enforce the use of a page layout and specify a page layout version. Doing so ensures that all content definitions you’ve based your JavaScript on are immutable. Even if you don’t intend to enable JavaScript, you still need to specify the page layout version for your pages.
114112

115113
The following example shows the **DataUri** of `selfasserted` version `1.2.0`:

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/21/2021
12+
ms.date: 09/12/2021
1313
ms.custom: project-no-code
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -51,7 +51,9 @@ The following table summarizes the OAuth 2.0 and OpenId Connect application auth
5151
[On-behalf-of](../active-directory/develop/v2-oauth2-on-behalf-of-flow.md)| NA | NA | An application invokes a service or web API, which in turn needs to call another service or web API. <br /> <br /> For the middle-tier service to make authenticated requests to the downstream service, pass a *client credential* token in the authorization header. Optionally, you can include a custom header with the Azure AD B2C user's token. |
5252
[OpenId Connect](openid-connect.md) | GA | GA | OpenID Connect introduces the concept of an ID token, which is a security token that allows the client to verify the identity of the user. |
5353
[OpenId Connect hybrid flow](openid-connect.md) | GA | GA | Allows a web application retrieve the ID token on the authorize request along with an authorization code. |
54-
[Resource owner password credentials (ROPC)](add-ropc-policy.md) | Preview | Preview | Allows a mobile application to sign in the user by directly handling their password. |
54+
[Resource owner password credentials (ROPC)](add-ropc-policy.md) | GA | GA | Allows a mobile application to sign in the user by directly handling their password. |
55+
| [Sign-out](session-behavior.md#sign-out)| GA | GA | |
56+
| [Single sign-out](session-behavior.md#sign-out) | NA | Preview | |
5557

5658
### OAuth 2.0 options
5759

@@ -62,6 +64,7 @@ The following table summarizes the OAuth 2.0 and OpenId Connect application auth
6264
| Insert JSON into user journey via `client_assertion`| NA| Deprecated | |
6365
| Insert JSON into user journey as [id_token_hint](id-token-hint.md) | NA | GA | |
6466
| [Pass identity provider token to the application](idp-pass-through-user-flow.md)| Preview| Preview| For example, from Facebook to app. |
67+
| [Keep me signed in (KMSI)](session-behavior.md#enable-keep-me-signed-in-kmsi)| GA| GA| |
6568

6669
## SAML2 application authentication flows
6770

@@ -77,6 +80,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
7780
|Feature |User flow |Custom policy |Notes |
7881
|---------|:---------:|:---------:|---------|
7982
| [Multi-language support](localization.md)| GA | GA | |
83+
| [Custom domains](custom-domain.md)| Preview | Preview | |
8084
| [Custom email verification](custom-email-mailjet.md) | NA | GA| |
8185
| [Customize the user interface with built-in templates](customize-ui.md) | GA| GA| |
8286
| [Customize the user interface with custom templates](customize-ui-with-html.md) | GA| GA| By using HTML templates. |
@@ -88,6 +92,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
8892

8993

9094

95+
9196
## Identity providers
9297

9398
|Feature |User flow |Custom policy |Notes |
@@ -143,7 +148,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
143148
| [External login session provider](custom-policy-reference-sso.md#externalloginssosessionprovider) | GA | |
144149
| [SAML SSO session provider](custom-policy-reference-sso.md#samlssosessionprovider) | GA | |
145150
| [OAuth SSO Session Provider](custom-policy-reference-sso.md#oauthssosessionprovider) | GA| |
146-
| [Single sign-out](session-behavior.md#sign-out) | Preview | |
151+
147152

148153
### Components
149154

@@ -155,6 +160,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
155160
| [Azure Active Directory](active-directory-technical-profile.md) as local directory | GA | |
156161
| [Predicate validations](predicates.md) | GA | For example, password complexity. |
157162
| [Display controls](display-controls.md) | GA | |
163+
| [Sub journeys](subjourneys.md) | GA | |
158164

159165
### Developer interface
160166

articles/active-directory-b2c/identity-provider-apple-id.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,7 @@ Use the .p8 file you downloaded previously to sign the client secret into a JWT
122122

123123
- **appleTeamId**: Your Apple Developer Team ID
124124
- **appleServiceId**: The Apple Service ID (client ID)
125+
- **appleKeyId**: The 10 digit Key Id stored in the JWT Header (required by Apple)
125126
- **p8key**: The PEM format key. You can obtain this by opening the .p8 file in a text editor and copying everything between
126127
`-----BEGIN PRIVATE KEY-----` and `-----END PRIVATE KEY-----` without line breaks.
127128

@@ -131,6 +132,7 @@ The following json is an example of a call to the Azure function:
131132
{
132133
"appleTeamId": "ABC123DEFG",
133134
"appleServiceId": "com.yourcompany.app1",
135+
"appleKeyId": "URKEYID001",
134136
"p8key": "MIGTAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBHkwdwIBAQQg+s07NiAcuGEu8rxsJBG7ttupF6FRe3bXdHxEipuyK82gCgYIKoZIzj0DAQehRANCAAQnR1W/KbbaihTQayXH3tuAXA8Aei7u7Ij5OdRy6clOgBeRBPy1miObKYVx3ki1msjjG2uGqRbrc1LvjLHINWRD"
135137
}
136138
```

0 commit comments

Comments
 (0)