Skip to content

Commit ac52481

Browse files
authored
Merge pull request #190039 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 264d6d0 + 8a6422d commit ac52481

File tree

36 files changed

+189
-186
lines changed

36 files changed

+189
-186
lines changed

articles/active-directory-b2c/configure-authentication-in-sample-node-web-app-with-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -151,10 +151,10 @@ Open your web app in a code editor such as Visual Studio Code. Under the `call-p
151151
|---------|---------|
152152
|`APP_CLIENT_ID`|The **Application (client) ID** for the web app you registered in [step 2.3](#step-23-register-the-web-app). |
153153
|`APP_CLIENT_SECRET`|The client secret for the web app you created in [step 2.4](#step-24-create-a-client-secret) |
154-
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority for the user flow you created in [step 1](#step-1-configure-your-user-flow) such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi_node_app`. Learn how to [Get your tenant name](tenant-management.md#get-your-tenant-name). |
154+
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority for the user flow you created in [step 1](#step-1-configure-your-user-flow) such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`. Learn how to [Get your tenant name](tenant-management.md#get-your-tenant-name). |
155155
|`AUTHORITY_DOMAIN`| The Azure AD B2C authority domain such as `https://<your-tenant-name>.b2clogin.com`. Replace `<your-tenant-name>` with the name of your tenant.|
156156
|`APP_REDIRECT_URI`| The application redirect URI where Azure AD B2C will return authentication responses (tokens). It matches the **Redirect URI** you set while registering your app in Azure portal. This URL need to be publicly accessible. Leave the value as is.|
157-
|`LOGOUT_ENDPOINT`| The Azure AD B2C sign out endpoint such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>/oauth2/v2.0/logout?post_logout_redirect_uri=http://localhost:3000`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi_node_app`.|
157+
|`LOGOUT_ENDPOINT`| The Azure AD B2C sign out endpoint such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>/oauth2/v2.0/logout?post_logout_redirect_uri=http://localhost:3000`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`.|
158158

159159
After the update, your final configuration file should look similar to the following sample:
160160

@@ -186,7 +186,7 @@ To get the web API sample code, do one of the following:
186186
187187
- For `clientID`, use the **Application (Client) ID** for the web API you created in [step 2.1](#step-21-register-the-web-api-application).
188188
189-
- For `policyName`, use the name of the **Sing in and sign up** user flow you created in [step 1](#step-1-configure-your-user-flow) such as `B2C_1_susi_node_app`.
189+
- For `policyName`, use the name of the **Sing in and sign up** user flow you created in [step 1](#step-1-configure-your-user-flow) such as `B2C_1_susi`.
190190
191191
After the update, your code should look similar to the following sample:
192192

articles/active-directory-b2c/partner-experian.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The Experian integration includes the following components:
4747

4848
- Experian – The Experian service takes inputs provided by the user and verifies the user's identity
4949

50-
- Custom Rest API – This API implements the integration between Azure AD B2C and the Experian service.
50+
- Custom REST API – This API implements the integration between Azure AD B2C and the Experian service.
5151

5252
The following architecture diagram shows the implementation.
5353

@@ -87,7 +87,7 @@ The Experian API call is protected by a client certificate. This client certific
8787

8888
### Part 3 - Configure the API
8989

90-
Application settings can be [configured in the App service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the Rest API:
90+
Application settings can be [configured in the App service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the REST API:
9191

9292
| Application settings | Source | Notes |
9393
| :-------- | :------------| :-----------|

articles/active-directory-b2c/partner-hypr.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To get started, you'll need:
2727

2828
- A HYPR cloud tenant, get a free [trial account](https://get.hypr.com/free-trial).
2929

30-
- A user's mobile device registered using the HYPR Rest APIs or the HYPR Device Manager in your HYPR tenant. For example, you can use the [HYPR Java SDK](https://docs.hypr.com/integratinghypr/docs/hypr-java-web-sdk) to accomplish this task.
30+
- A user's mobile device registered using the HYPR REST APIs or the HYPR Device Manager in your HYPR tenant. For example, you can use the [HYPR Java SDK](https://docs.hypr.com/integratinghypr/docs/hypr-java-web-sdk) to accomplish this task.
3131

3232
## Scenario description
3333

@@ -39,7 +39,7 @@ The HYRP integration includes the following components:
3939

4040
- The HYPR mobile app - The HYPR mobile app can be used to execute this sample if prefer not to use the mobile SDKs in your own mobile applications.
4141

42-
- HYPR Rest APIs - You can use the HYPR APIs to do both user device registration and authentication. These APIs can be found [here](https://apidocs.hypr.com).
42+
- HYPR REST APIs - You can use the HYPR APIs to do both user device registration and authentication. These APIs can be found [here](https://apidocs.hypr.com).
4343

4444
The following architecture diagram shows the implementation.
4545

articles/active-directory-b2c/partner-idology.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The IDology integration includes the following components:
3131

3232
- Azure AD B2C – The authorization server responsible for verifying the user’s credentials. It's also known as the identity provider.
3333
- IDology – The IDology service takes input provided by the user and verifies the user’s identity.
34-
- Custom Rest API – This API implements the integration between Azure AD and the IDology service.
34+
- Custom REST API – This API implements the integration between Azure AD and the IDology service.
3535

3636
The following architecture diagram shows the implementation.
3737

@@ -69,7 +69,7 @@ You'll need the URL of the deployed service to configure Azure AD with the requi
6969

7070
### Part 2 - Configure the API
7171

72-
Application settings can be [configured in App Service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the Rest API:
72+
Application settings can be [configured in App Service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the REST API:
7373

7474
| Application settings | Source | Notes |
7575
| :-------- | :------------| :-----------|

articles/active-directory-b2c/partner-jumio.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The Jumio integration includes the following components:
3434

3535
- Jumio: The service that takes the ID details provided by the user and verifies them.
3636

37-
- Intermediate Rest API: The API that implements the integration between Azure AD B2C and the Jumio service.
37+
- Intermediate REST API: The API that implements the integration between Azure AD B2C and the Jumio service.
3838

3939
- Azure Blob storage: The service that supplies custom UI files to the Azure AD B2C policies.
4040

@@ -98,7 +98,7 @@ Use the following PowerShell script to create the string:
9898

9999
### Configure the API
100100

101-
You can [configure application settings in Azure App Service](../app-service/configure-common.md#configure-app-settings). With this method, you can securely configure settings without checking them into a repository. You'll need to provide the following settings to the Rest API:
101+
You can [configure application settings in Azure App Service](../app-service/configure-common.md#configure-app-settings). With this method, you can securely configure settings without checking them into a repository. You'll need to provide the following settings to the REST API:
102102

103103
| Application settings | Source | Notes |
104104
| :-------- | :------------| :-----------|

articles/active-directory-b2c/partner-lexisnexis.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The ThreatMetrix integration includes the following components:
3838

3939
- ThreatMetrix – The ThreatMetrix service takes inputs provided by the user and combines it with profiling information gathered from the user's machine to verify the security of the user interaction.
4040

41-
- Custom Rest API – This API implements the integration between Azure AD B2C and the ThreatMetrix service.
41+
- Custom REST API – This API implements the integration between Azure AD B2C and the ThreatMetrix service.
4242

4343
The following architecture diagram shows the implementation.
4444

@@ -75,7 +75,7 @@ Deploy the provided [API code](https://github.com/azure-ad-b2c/partner-integrati
7575
7676
### Part 2 - Configure the API
7777

78-
Application settings can be [configured in the App service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the Rest API:
78+
Application settings can be [configured in the App service in Azure](../app-service/configure-common.md#configure-app-settings). With this method, settings can be securely configured without checking them into a repository. You'll need to provide the following settings to the REST API:
7979

8080
| Application settings | Source | Notes |
8181
| :-------- | :------------| :-----------|

articles/active-directory-b2c/partner-onfido.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The Onfido integration includes the following components:
3737

3838
- Onfido client – A configurable JavaScript client document collection utility deployed within other webpages. Collects the documents and does preliminary checks like document size and quality.
3939

40-
- Intermediate Rest API – Provides endpoints for the Azure AD B2C tenant to communicate with the Onfido API service, handling data processing and adhering to the security requirements of both.
40+
- Intermediate REST API – Provides endpoints for the Azure AD B2C tenant to communicate with the Onfido API service, handling data processing and adhering to the security requirements of both.
4141

4242
- Onfido API service – The backend service provided by Onfido, which saves and verifies the documents provided by the user.
4343

@@ -77,7 +77,7 @@ For more information about Onfido, see [Onfido API documentation](https://docume
7777
7878
#### Adding sensitive configuration settings
7979

80-
Application settings can be configured in the [App service in Azure](../app-service/configure-common.md#configure-app-settings). The App service allows for settings to be securely configured without checking them into a repository. The Rest API needs the following settings:
80+
Application settings can be configured in the [App service in Azure](../app-service/configure-common.md#configure-app-settings). The App service allows for settings to be securely configured without checking them into a repository. The REST API needs the following settings:
8181

8282
| Application setting name | Source | Notes |
8383
|:-------------------------|:-------|:-------|

articles/active-directory-b2c/phone-authentication-user-flows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Here's an example showing how to add phone sign-up to a new user flow.
7979
1. Under **Social identity providers**, select any other identity providers you want to allow for this user flow.
8080

8181
> [!NOTE]
82-
> Multi-factor authentication (MFA) is disabled by default for sign-up user flows. You can enable MFA for a phone sign-up user flow, but because a phone number is used as the primary identifier, email one-time passcode is the only option available for the second authentication factor.
82+
> [Multi-factor authentication (MFA)](multi-factor-authentication.md) is disabled by default for sign-up user flows. You can enable MFA for a phone sign-up user flow, but because a phone number is used as the primary identifier, email one-time passcode and Authenticator app - TOTP (preview) are the only options available for the second authentication factor.
8383
8484
1. In the **User attributes and token claims** section, choose the claims and attributes that you want to collect and send from the user during sign-up. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
8585

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-howto-create-alert-trigger.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ This article describes how you can create and view activity alerts and alert tri
5151
1. From the **Alert Name** dropdown, select an alert.
5252
1. From the **Date** dropdown, select **Last 24 Hours**, **Last 2 Days**, **Last Week**, or **Custom Range**.
5353

54-
If you select **Custom range**, select date and time settings, and then select **Apply**.
54+
If you select **Custom Range**, select date and time settings, and then select **Apply**.
5555
1. To view the alert, select **Apply**
5656

5757
The **Alerts** table displays information about your alert.
@@ -61,7 +61,7 @@ This article describes how you can create and view activity alerts and alert tri
6161
## View activity alert triggers
6262

6363
1. In the CloudKnox home page, select **Activity triggers** (the bell icon).
64-
1. In the **Activity** tab, select the **Alert triggers** subtab.
64+
1. In the **Activity** tab, select the **Alert Triggers** subtab.
6565
1. From the **Status** dropdown, select **All**, **Activated** or **Deactivated**, then select **Apply**.
6666

6767
The **Triggers** table displays the following information:
@@ -71,9 +71,9 @@ This article describes how you can create and view activity alerts and alert tri
7171

7272
- Select a number in this column to view information about the user.
7373

74-
- **Created by**: The email address of the user who created the alert trigger.
75-
- **Modified by**: The email address of the user who last modified the alert trigger.
76-
- **Last updated**: The date and time the alert trigger was last updated.
74+
- **Created By**: The email address of the user who created the alert trigger.
75+
- **Modified By**: The email address of the user who last modified the alert trigger.
76+
- **Last Updated**: The date and time the alert trigger was last updated.
7777
- **Subscription**: A switch that displays if the alert is **On** or **Off**.
7878

7979
- If the column displays **Off**, the current user isn't subscribed to that alert. Switch the toggle to **On** to subscribe to the alert.
@@ -94,12 +94,12 @@ This article describes how you can create and view activity alerts and alert tri
9494
- **Rename**: Enter the new name of the query, and then select **Save.**
9595
- **Deactivate**: The alert will still be listed, but will no longer send emails to subscribed users.
9696
- **Activate**: Activate the alert trigger and start sending emails to subscribed users.
97-
- **Notification settings**: View the **Email** of users who are subscribed to the alert trigger and their **User status**.
97+
- **Notification Settings**: View the **Email** of users who are subscribed to the alert trigger and their **User Status**.
9898
- **Delete**: Delete the alert.
9999

100100
If the **Subscription** is **Off**, the following options are available:
101101
- **View**: View details of the alert trigger.
102-
- **Notification settings**: View the **Email** of users who are subscribed to the alert trigger and their **User status**.
102+
- **Notification Settings**: View the **Email** of users who are subscribed to the alert trigger and their **User Status**.
103103
- **Duplicate**: Create a duplicate copy of the selected alert trigger.
104104

105105

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-howto-create-rule.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -27,30 +27,30 @@ This article describes how to create a rule in the CloudKnox Permissions Managem
2727

2828
1. In the CloudKnox home page, select the **Autopilot** tab.
2929
1. In the **Autopilot** dashboard, from the **Authorization system types** dropdown, select Amazon Web Services (**AWS**), Microsoft **Azure**, or Google Cloud Platform (**GCP**).
30-
1. From the **Authorization system** dropdown, in the **List** and **Folders** box, select the account and folder names that you want, and then select **Apply**.
31-
1. In the **Autopilot** dashboard, select **New rule**.
32-
1. In the **Rule name** box, enter a name for your rule.
30+
1. From the **Authorization System** dropdown, in the **List** and **Folders** box, select the account and folder names that you want, and then select **Apply**.
31+
1. In the **Autopilot** dashboard, select **New Rule**.
32+
1. In the **Rule Name** box, enter a name for your rule.
3333
1. Select **AWS**, **Azure**, **GCP**, and then select **Next**.
3434

35-
1. Select **Authorization systems**, and then select **All** or the account names that you want.
35+
1. Select **Authorization Systems**, and then select **All** or the account names that you want.
3636
1. From the **Folders** dropdown, select a folder, and then select **Apply**.
3737

3838
To change your folder settings, select **Reset**.
3939

4040
- The **Status** column displays if the authorization system is **Online** or **Offline**.
41-
- The **Controller** column displays if the controller is **Enabled** or **Not enabled**.
41+
- The **Controller** column displays if the controller is **Enabled** or **Not Enabled**.
4242

4343

4444
1. Select **Configure** , and then select the following parameters for your rule:
4545

46-
- **Role created on is**: Select the duration in days.
47-
- **Role last used on is**: Select the duration in days when the role was last used.
48-
- **Cross account role**: Select **True** or **False**.
46+
- **Role Created On Is**: Select the duration in days.
47+
- **Role Last Used On Is**: Select the duration in days when the role was last used.
48+
- **Cross Account Role**: Select **True** or **False**.
4949

50-
1. Select **Mode**, and then, if you want recommendations to be generated and applied manually, select **On-demand**.
50+
1. Select **Mode**, and then, if you want recommendations to be generated and applied manually, select **On-Demand**.
5151
1. Select **Save**
5252

53-
The following information displays in the **Autopilot rules** table:
53+
The following information displays in the **Autopilot Rules** table:
5454

5555
- **Rule Name**: The name of the rule.
5656
- **State**: The status of the rule: idle (not being use) or active (being used).

0 commit comments

Comments
 (0)