Skip to content

Commit aea48dd

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1668386b
2 parents 1c9a4fa + 7ea48d8 commit aea48dd

File tree

598 files changed

+16594
-7142
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

598 files changed

+16594
-7142
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -820,6 +820,16 @@
820820
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
821821
"redirect_document_id": false
822822
},
823+
{
824+
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-bot-csharp-appinsights.md",
825+
"redirect_url": "/azure/cognitive-services/LUIS/luis-csharp-tutorial-bf-v4",
826+
"redirect_document_id": false
827+
},
828+
{
829+
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-bot-nodejs-appinsights.md",
830+
"redirect_url": "/azure/cognitive-services/LUIS/luis-nodejs-tutorial-bf-v4",
831+
"redirect_document_id": false
832+
},
823833
{
824834
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-pattern-roles.md",
825835
"redirect_url": "/azure/cognitive-services/LUIS/luis-tutorial-pattern",

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -382,6 +382,7 @@
382382
href: https://azure.microsoft.com/resources/samples/?service=active-directory-b2c
383383
- name: Cookie definitions
384384
href: cookie-definitions.md
385+
displayName: cookies, SameSite
385386
- name: Error codes
386387
href: error-codes.md
387388
- name: Region availability & data residency

articles/active-directory-b2c/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ GET https://<tenant-name>.b2clogin.com/tfp/<tenant-name>.onmicrosoft.com/<policy
6868
client_id=<application-ID>
6969
&nonce=anyRandomValue
7070
&redirect_uri=https://jwt.ms
71-
&scope=https://tenant-name>.onmicrosoft.com/api/read
71+
&scope=https://<tenant-name>.onmicrosoft.com/api/read
7272
&response_type=code
7373
```
7474

articles/active-directory-b2c/claimsproviders.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 01/29/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -48,7 +48,7 @@ The **ClaimsProvider** element contains the following child elements:
4848
| Element | Occurrences | Description |
4949
| ------- | ---------- | ----------- |
5050
| Domain | 0:1 | A string that contains the domain name for the claim provider. For example, if your claims provider includes the Facebook technical profile, the domain name is Facebook.com. This domain name is used for all technical profiles defined in the claims provider unless overridden by the technical profile. The domain name can also be referenced in a **domain_hint**. For more information, see the **Redirect sign-in to a social provider** section of [Set up direct sign-in using Azure Active Directory B2C](direct-signin.md). |
51-
| DisplayName | 1:1 | A string that contains the name of the claims provider that can be displayed to users. |
51+
| DisplayName | 1:1 | A string that contains the name of the claims provider. |
5252
| [TechnicalProfiles](technicalprofiles.md) | 0:1 | A set of technical profiles supported by the claim provider |
5353

5454
**ClaimsProvider** organizes how your technical profiles relate to the claims provider. The following example shows the Azure Active Directory claims provider with the Azure Active Directory technical profiles:

articles/active-directory-b2c/claimsschema.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 03/02/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -46,8 +46,8 @@ The **ClaimType** element contains the following elements:
4646

4747
| Element | Occurrences | Description |
4848
| ------- | ----------- | ----------- |
49-
| DisplayName | 0:1 | The title that's displayed to users on various screens. The value can be [localized](localization.md). |
50-
| DataType | 0:1 | The type of the claim. The data types of boolean, date, dateTime, int, long, string, stringCollection, alternativeSecurityIdCollection can be used. |
49+
| DisplayName | 1:1 | The title that's displayed to users on various screens. The value can be [localized](localization.md). |
50+
| DataType | 1:1 | The type of the claim. The data types of boolean, date, dateTime, int, long, string, stringCollection can be used. Primitive data type represents the equivalent of C# variable data type. stringCollection represents a collection of strings. For more information see [C# Types and variables](https://docs.microsoft.com/dotnet/csharp/tour-of-csharp/types-and-variables). Date follows ISO 8601 convention. |
5151
| DefaultPartnerClaimTypes | 0:1 | The partner default claim types to use for a specified protocol. The value can be overwritten in the **PartnerClaimType** specified in the **InputClaim** or **OutputClaim** elements. Use this element to specify the default name for a protocol. |
5252
| Mask | 0:1 | An optional string of masking characters that can be applied when displaying the claim. For example, the phone number 324-232-4343 can be masked as XXX-XXX-4343. |
5353
| UserHelpText | 0:1 | A description of the claim type that can be helpful for users to understand its purpose. The value can be [localized](localization.md). |
@@ -61,7 +61,7 @@ The **DefaultPartnerClaimTypes** may contain the following element:
6161

6262
| Element | Occurrences | Description |
6363
| ------- | ----------- | ----------- |
64-
| Protocol | 0:n | List of protocols with their default partner claim type name. |
64+
| Protocol | 1:n | List of protocols with their default partner claim type name. |
6565

6666
The **Protocol** element contains the following attributes:
6767

articles/active-directory-b2c/code-samples.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mmacy
66
manager: celestedg
77

88
ms.author: marsma
9-
ms.date: 01/23/2018
9+
ms.date: 01/29/2020
1010
ms.custom: mvc
1111
ms.topic: sample
1212
ms.service: active-directory
@@ -37,6 +37,7 @@ The following tables provide links to samples for applications including iOS, An
3737
| [openidconnect-nodejs](https://github.com/AzureADQuickStarts/B2C-WebApp-OpenIDConnect-NodeJS) | A Node.js app that provides a quick and easy way to set up a Web application with Express using OpenID Connect. |
3838
| [javascript-nodejs-webapp](https://github.com/AzureADQuickStarts/active-directory-b2c-javascript-nodejs-webapp) | A node.js server that provides a quick and easy way to set up a REST API service using the OAuth2 protocol. |
3939
| [javascript-nodejs-webapi](https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi) | A small node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using passport.js. |
40+
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/master/README_B2C.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
4041

4142
## Single page apps
4243

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 27 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 02/03/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -75,7 +75,7 @@ The following example localizes the Facebook identity provider to Arabic:
7575
<LocalizedString ElementType="ClaimsProvider" StringId="FacebookExchange">فيس بوك</LocalizedString>
7676
```
7777

78-
## Sign-up or sign-in error messages
78+
### Sign-up or sign-in error messages
7979

8080
| ID | Default value |
8181
| -- | ------------- |
@@ -128,7 +128,7 @@ The following are the IDs for a content definition with an ID of `api.localaccou
128128
| **ver_intro_msg** | Verification is necessary. Please click Send button. |
129129
| **ver_input** | Verification code |
130130

131-
## Sign-up and self asserted pages error messages
131+
### Sign-up and self asserted pages error messages
132132

133133
| ID | Default value |
134134
| -- | ------------- |
@@ -199,6 +199,30 @@ The following example shows the use of some of the user interface elements in th
199199

200200
![Sign-up page email verification UX elements](./media/localization-string-ids/localization-mfa2.png)
201201

202+
## Verification display control user interface elements
203+
204+
The following are the IDs for a [Verification display control](display-control-verification.md)
205+
206+
| ID | Default value |
207+
| -- | ------------- |
208+
|verification_control_but_change_claims |Change |
209+
|verification_control_fail_send_code |Failed to send the code, please try again later. |
210+
|verification_control_fail_verify_code |Failed to verify the code, please try again later. |
211+
|verification_control_but_send_code |Send Code |
212+
|verification_control_but_send_new_code |Send New Code |
213+
|verification_control_but_verify_code |Verify Code |
214+
215+
## One time password error messages
216+
The following are the IDs for a [one time password technical profile](one-time-password-technical-profile.md) error messages
217+
218+
| ID | Default value |
219+
| -- | ------------- |
220+
|UserMessageIfMaxRetryAttempted |One time password provided verification has exceeded maximum number of attempts |
221+
|UserMessageIfSessionDoesNotExist |One time password verification session has expired |
222+
|UserMessageIfSessionConflict |One time password verification session has conflict |
223+
|UserMessageIfInvalidCode |One time password provided for verification is incorrect |
224+
225+
202226

203227

204228

articles/active-directory-b2c/one-time-password-technical-profile.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/10/2019
12+
ms.date: 02/03/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -73,6 +73,7 @@ The following settings can be used to configure code generation and maintenance:
7373
| CodeLength | No | Length of the code. The default value is `6`. |
7474
| CharacterSet | No | The character set for the code, formatted for use in a regular expression. For example, `a-z0-9A-Z`. The default value is `0-9`. The character set must include a minimum of 10 different characters in the set specified. |
7575
| NumRetryAttempts | No | The number of verification attempts before the code is considered invalid. The default value is `5`. |
76+
| Operation | Yes | The operation to be performed. Possible values: `GenerateCode`, or `VerifyCode`. |
7677
| ReuseSameCode | No | Whether a duplicate code should be given rather than generating a new code when given code has not expired and is still valid. The default value is `false`. |
7778

7879
### Returning error message
@@ -162,4 +163,4 @@ The following example `TechnicalProfile` is used for verifying a code:
162163
<InputClaim ClaimTypeReferenceId="otpGenerated" PartnerClaimType="otpToVerify" />
163164
</InputClaims>
164165
</TechnicalProfile>
165-
```
166+
```

articles/active-directory-b2c/relyingparty.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 01/25/2019
11+
ms.date: 02/02/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -122,6 +122,8 @@ The **SingleSignOn** element contains in the following attribute:
122122
| --------- | -------- | ----------- |
123123
| Scope | Yes | The scope of the single sign-on behavior. Possible values: `Suppressed`, `Tenant`, `Application`, or `Policy`. The `Suppressed` value indicates that the behavior is suppressed. For example, in the case of a single sign-on session, no session is maintained for the user and the user is always prompted for an identity provider selection. The `TrustFramework` value indicates that the behavior is applied for all policies in the trust framework. For example, a user navigating through two policy journeys for a trust framework is not prompted for an identity provider selection. The `Tenant` value indicates that the behavior is applied to all policies in the tenant. For example, a user navigating through two policy journeys for a tenant is not prompted for an identity provider selection. The `Application` value indicates that the behavior is applied to all policies for the application making the request. For example, a user navigating through two policy journeys for an application is not prompted for an identity provider selection. The `Policy` value indicates that the behavior only applies to a policy. For example, a user navigating through two policy journeys for a trust framework is prompted for an identity provider selection when switching between policies. |
124124
| KeepAliveInDays | Yes | Controls how long the user remains signed in. Setting the value to 0 turns off KMSI functionality. For more information, see [Keep me signed in](custom-policy-keep-me-signed-in.md). |
125+
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more infomation, see [Web sign-in with OpenID Connect](openid-connect.md). |
126+
125127

126128
## JourneyInsights
127129

@@ -172,12 +174,12 @@ The **TechnicalProfile** contains the following elements:
172174

173175
| Element | Occurrences | Description |
174176
| ------- | ----------- | ----------- |
175-
| DisplayName | 0:1 | The string that contains the name of the technical profile that is displayed to users. |
176-
| Description | 0:1 | The string that contains the description of the technical profile that is displayed to users. |
177+
| DisplayName | 1:1 | The string that contains the name of the technical profile. |
178+
| Description | 0:1 | The string that contains the description of the technical profile. |
177179
| Protocol | 1:1 | The protocol used for the federation. |
178180
| Metadata | 0:1 | The collection of *Item* of key/value pairs utilized by the protocol for communicating with the endpoint in the course of a transaction to configure interaction between the relying party and other community participants. |
179-
| OutputClaims | 0:1 | A list of claim types that are taken as output in the technical profile. Each of these elements contains reference to a **ClaimType** already defined in the **ClaimsSchema** section or in a policy from which this policy file inherits. |
180-
| SubjectNamingInfo | 0:1 | The subject name used in tokens. |
181+
| OutputClaims | 1:1 | A list of claim types that are taken as output in the technical profile. Each of these elements contains reference to a **ClaimType** already defined in the **ClaimsSchema** section or in a policy from which this policy file inherits. |
182+
| SubjectNamingInfo | 1:1 | The subject name used in tokens. |
181183

182184
The **Protocol** element contains the following attribute:
183185

articles/active-directory-b2c/technical-profiles-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 09/10/2018
12+
ms.date: 03/02/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -36,6 +36,7 @@ A technical profile enables these types of scenarios:
3636
- [Self-Asserted](self-asserted-technical-profile.md) - Interact with the user. For example, collect the user's credential to sign in, render the sign-up page, or password reset.
3737
- [Session management](custom-policy-reference-sso.md) - Handle different types of sessions.
3838
- **Application insights**
39+
- [One time password](one-time-password-technical-profile.md) - Provides support for managing the generation and verification of a one-time password.
3940

4041
## Technical profile flow
4142

0 commit comments

Comments
 (0)