Skip to content

Commit b146b50

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into timlt1
2 parents c3645ba + a981b62 commit b146b50

File tree

435 files changed

+8045
-2421
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

435 files changed

+8045
-2421
lines changed

.openpublishing.redirection.json

Lines changed: 56 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2170,6 +2170,11 @@
21702170
"redirect_url": "/azure/cosmos-db/create-sql-api-python",
21712171
"redirect_document_id": false
21722172
},
2173+
{
2174+
"source_path": "articles/cosmos-db/cosmos-db-security-controls.md",
2175+
"redirect_url": "/azure/cosmos-db/security-baseline",
2176+
"redirect_document_id": false
2177+
},
21732178
{
21742179
"source_path": "articles/cosmos-db/powershell-samples.md",
21752180
"redirect_url": "/azure/cosmos-db/powershell-samples-sql",
@@ -13604,6 +13609,11 @@
1360413609
"redirect_url": "/azure/event-hubs/authorize-access-azure-active-directory",
1360513610
"redirect_document_id": false
1360613611
},
13612+
{
13613+
"source_path": "articles/event-hubs/event-hubs-tutorial-virtual-networks-firewalls.md",
13614+
"redirect_url": "/azure/event-hubs/event-hubs-service-endpoints",
13615+
"redirect_document_id": false
13616+
},
1360713617
{
1360813618
"source_path": "articles/active-directory/active-directory-saml-protocol-reference.md",
1360913619
"redirect_url": "/azure/active-directory/develop/active-directory-saml-protocol-reference",
@@ -15786,7 +15796,12 @@
1578615796
},
1578715797
{
1578815798
"source_path": "articles/machine-learning/machine-learning-dedicated-capacity-for-bes-jobs.md",
15789-
"redirect_url": "/azure/machine-learning/studio/dedicated-capacity-for-bes-jobs",
15799+
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
15800+
"redirect_document_id": false
15801+
},
15802+
{
15803+
"source_path": "articles/machine-learning/studio/dedicated-capacity-for-bes-jobs.md",
15804+
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
1579015805
"redirect_document_id": false
1579115806
},
1579215807
{
@@ -41779,6 +41794,16 @@
4177941794
"redirect_url": "/azure/azure-monitor/platform/diagnostic-settings-legacy",
4178041795
"redirect_document_id": false
4178141796
},
41797+
{
41798+
"source_path": "articles/azure-monitor/platform/flow-tutorial.md",
41799+
"redirect_url": "/azure/azure-monitor/platform/logicapp-flow-connector",
41800+
"redirect_document_id": false
41801+
},
41802+
{
41803+
"source_path": "articles/azure-monitor/app/automate-with-flow.md",
41804+
"redirect_url": "/azure/azure-monitor/platform/logicapp-flow-connector",
41805+
"redirect_document_id": false
41806+
},
4178241807
{
4178341808
"source_path": "articles/azure-monitor/platform/azure-storage-iis-table.md",
4178441809
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-logs",
@@ -49274,6 +49299,11 @@
4927449299
"redirect_url": "/azure/azure-monitor/overview",
4927549300
"redirect_document_id": false
4927649301
},
49302+
{
49303+
"source_path": "articles/cli/index.yml",
49304+
"redirect_url": "/cli/azure",
49305+
"redirect_document_id": false
49306+
},
4927749307
{
4927849308
"source_path": "articles/virtual-machines/linux/tutorial-build-deploy-jenkins.md",
4927949309
"redirect_url": "/azure/jenkins/tutorial-build-deploy-jenkins",
@@ -49354,6 +49384,16 @@
4935449384
"redirect_url": "/azure/cognitive-services/speech-service",
4935549385
"redirect_document_id": false
4935649386
},
49387+
{
49388+
"source_path": "articles/media-services/latest/access-api-portal.md",
49389+
"redirect_url": "/azure/media-services/latest/access-api-howto",
49390+
"redirect_document_id": false
49391+
},
49392+
{
49393+
"source_path": "articles/media-services/latest/access-api-cli-how-to.md",
49394+
"redirect_url": "/azure/media-services/latest/access-api-howto",
49395+
"redirect_document_id": false
49396+
},
4935749397
{
4935849398
"source_path": "articles/media-services/latest/create-account-portal.md",
4935949399
"redirect_url": "/azure/media-services/latest/create-account-howto",
@@ -49363,6 +49403,21 @@
4936349403
"source_path": "articles/media-services/latest/create-account-cli-how-to.md",
4936449404
"redirect_url": "/azure/media-services/latest/create-account-howto",
4936549405
"redirect_document_id": false
49406+
},
49407+
{
49408+
"source_path": "articles/mariadb/howto-tls-configurations.md",
49409+
"redirect_url": "/azure/mariadb/howto-configure-ssl",
49410+
"redirect_document_id": false
49411+
},
49412+
{
49413+
"source_path": "articles/mysql/howto-tls-configurations.md",
49414+
"redirect_url": "/azure/mysql/howto-configure-ssl",
49415+
"redirect_document_id": false
49416+
},
49417+
{
49418+
"source_path": "articles/postgresql/howto-tls-configurations.md",
49419+
"redirect_url": "/azure/postgresql/concepts-ssl-connection-security",
49420+
"redirect_document_id": false
4936649421
}
4936749422
]
4936849423
}

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,7 @@ The name of the claim is the name of the Azure AD attribute unless the **Partner
111111
## Requirements of an operation
112112

113113
- There must be exactly one **InputClaim** element in the claims bag for all Azure AD technical profiles.
114+
- The [user profile attributes article](user-profile-attributes.md) describes the supported Azure AD B2C user profile attributes you can use in the input claims, output claims, and persisted claims.
114115
- If the operation is `Write` or `DeleteClaims`, then it must also appear in a **PersistedClaims** element.
115116
- The value of the **userPrincipalName** claim must be in the format of `[email protected]`.
116117
- The **displayName** claim is required and cannot be an empty string.

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/03/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -62,7 +62,7 @@ Checks that boolean values of two claims are equal, and throws an exception if t
6262
| inputClaim | inputClaim | boolean | The ClaimType to be asserted. |
6363
| InputParameter |valueToCompareTo | boolean | The value to compare (true or false). |
6464

65-
The **AssertBooleanClaimIsEqualToValue** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationBooleanValueIsNotEqual** self-asserted technical profile metadata controls the error message that the technical profile presents to the user.
65+
The **AssertBooleanClaimIsEqualToValue** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationBooleanValueIsNotEqual** self-asserted technical profile metadata controls the error message that the technical profile presents to the user. The error messages can be [localized](localization-string-ids.md#claims-transformations-error-messages).
6666

6767
![AssertStringClaimsAreEqual execution](./media/boolean-transformations/assert-execution.png)
6868

articles/active-directory-b2c/date-transformations.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 02/03/2020
11+
ms.date: 02/16/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -31,7 +31,7 @@ Checks that one date and time claim (string data type) is later than a second da
3131
| InputParameter | AssertIfRightOperandIsNotPresent | boolean | Specifies whether this assertion should pass if the right operand is missing. |
3232
| InputParameter | TreatAsEqualIfWithinMillseconds | int | Specifies the number of milliseconds to allow between the two date times to consider the times equal (for example, to account for clock skew). |
3333

34-
The **AssertDateTimeIsGreaterThan** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **DateTimeGreaterThan** self-asserted technical profile metadata controls the error message that the technical profile presents to the user.
34+
The **AssertDateTimeIsGreaterThan** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **DateTimeGreaterThan** self-asserted technical profile metadata controls the error message that the technical profile presents to the user. The error messages can be [localized](localization-string-ids.md#claims-transformations-error-messages).
3535

3636
![AssertStringClaimsAreEqual execution](./media/date-transformations/assert-execution.png)
3737

@@ -77,8 +77,8 @@ The self-asserted technical profile calls the validation **login-NonInteractive*
7777
### Example
7878

7979
- Input claims:
80-
- **leftOperand**: 2018-10-01T15:00:00.0000000Z
81-
- **rightOperand**: 2018-10-01T14:00:00.0000000Z
80+
- **leftOperand**: 2020-03-01T15:00:00.0000000Z
81+
- **rightOperand**: 2020-03-01T14:00:00.0000000Z
8282
- Result: Error thrown
8383

8484
## ConvertDateToDateTimeClaim
@@ -106,9 +106,9 @@ The following example demonstrates the conversion of the claim `dateOfBirth` (da
106106
### Example
107107

108108
- Input claims:
109-
- **inputClaim**: 2019-06-01
109+
- **inputClaim**: 2020-15-03
110110
- Output claims:
111-
- **outputClaim**: 1559347200 (June 1, 2019 12:00:00 AM)
111+
- **outputClaim**: 2020-15-03T00:00:00.0000000Z
112112

113113
## ConvertDateTimeToDateClaim
114114

@@ -135,9 +135,9 @@ The following example demonstrates the conversion of the claim `systemDateTime`
135135
### Example
136136

137137
- Input claims:
138-
- **inputClaim**: 1559347200 (June 1, 2019 12:00:00 AM)
138+
- **inputClaim**: 2020-15-03T11:34:22.0000000Z
139139
- Output claims:
140-
- **outputClaim**: 2019-06-01
140+
- **outputClaim**: 2020-15-03
141141

142142
## GetCurrentDateTime
143143

@@ -158,7 +158,7 @@ Get the current UTC date and time and add the value to a ClaimType.
158158
### Example
159159

160160
* Output claims:
161-
* **currentDateTime**: 1534418820 (August 16, 2018 11:27:00 AM)
161+
* **currentDateTime**: 2020-15-03T11:40:35.0000000Z
162162

163163
## DateTimeComparison
164164

@@ -194,8 +194,8 @@ To run the claim transformation, you first need to get the current dateTime and
194194
### Example
195195

196196
- Input claims:
197-
- **firstDateTime**: 2018-01-01T00:00:00.100000Z
198-
- **secondDateTime**: 2018-04-01T00:00:00.100000Z
197+
- **firstDateTime**: 2020-01-01T00:00:00.100000Z
198+
- **secondDateTime**: 2020-04-01T00:00:00.100000Z
199199
- Input parameters:
200200
- **operator**: later than
201201
- **timeSpanInSeconds**: 7776000 (90 days)

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 31 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Localization string IDs - Azure Active Directory B2C | Microsoft Docs
3-
description: Specify the IDs for a content definition with an Id of api.signuporsignin in a custom policy in Azure Active Directory B2C.
3+
description: Specify the IDs for a content definition with an ID of api.signuporsignin in a custom policy in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: msmimart
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 03/09/2020
11+
ms.date: 03/16/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -21,7 +21,7 @@ The **Localization** element enables you to support multiple locales or language
2121

2222
## Sign-up or sign-in page elements
2323

24-
The following Ids are used for a content definition with an ID of `api.signuporsignin`.
24+
The following IDs are used for a content definition with an ID of `api.signuporsignin`.
2525

2626
| ID | Default value |
2727
| -- | ------------- |
@@ -87,7 +87,7 @@ The following example localizes the Facebook identity provider to Arabic:
8787
| **UserMessageIfUserAccountLocked** | Your account is temporarily locked to prevent unauthorized use. Try again later. |
8888
| **AADRequestsThrottled** | There are too many requests at this moment. Please wait for some time and try again. |
8989

90-
## Sign-up and self asserted pages user interface elements
90+
## Sign-up and self-asserted pages user interface elements
9191

9292
The following are the IDs for a content definition with an ID of `api.localaccountsignup` or any content definition that starts with `api.selfasserted`, such as `api.selfasserted.profileupdate` and `api.localaccountpasswordreset`.
9393

@@ -128,7 +128,7 @@ The following are the IDs for a content definition with an ID of `api.localaccou
128128
| **ver_intro_msg** | Verification is necessary. Please click Send button. |
129129
| **ver_input** | Verification code |
130130

131-
### Sign-up and self asserted pages error messages
131+
### Sign-up and self-asserted pages error messages
132132

133133
| ID | Default value |
134134
| -- | ------------- |
@@ -253,6 +253,32 @@ The following are the IDs for a [one time password technical profile](one-time-p
253253
```
254254

255255

256+
## Claims transformations error messages
257+
258+
The following are the IDs for claims transformations error messages:
259+
260+
| ID | Claims transformation | Default value |
261+
| -- | ------------- |------------- |
262+
|UserMessageIfClaimsTransformationBooleanValueIsNotEqual |[AssertBooleanClaimIsEqualToValue](boolean-transformations.md#assertbooleanclaimisequaltovalue) | Boolean claim value comparison failed for claim type "inputClaim".|
263+
|DateTimeGreaterThan |[AssertDateTimeIsGreaterThan](date-transformations.md#assertdatetimeisgreaterthan) | Claim value comparison failed: The provided left operand is greater than the right operand.|
264+
|UserMessageIfClaimsTransformationStringsAreNotEqual |[AssertStringClaimsAreEqual](string-transformations.md#assertstringclaimsareequal) | Claim value comparison failed using StringComparison "OrdinalIgnoreCase".|
265+
266+
### Example
267+
268+
```XML
269+
<LocalizedResources Id="api.localaccountsignup.en">
270+
<LocalizedStrings>
271+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfClaimsTransformationBooleanValueIsNotEqual">Your email address hasn't been verified.</LocalizedString>
272+
<LocalizedString ElementType="ErrorMessage" StringId="DateTimeGreaterThan">Expiration date must be greater that the current date.</LocalizedString>
273+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfClaimsTransformationStringsAreNotEqual">The email entry fields do not match. Please enter the same email address in both fields and try again.</LocalizedString>
274+
</LocalizedStrings>
275+
</LocalizedResources>
276+
```
277+
278+
279+
280+
281+
256282

257283

258284

articles/active-directory-b2c/manage-user-accounts-graph-api.md

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/14/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -60,6 +60,28 @@ In the Microsoft Graph API, both local and federated identities are stored in th
6060
|issuer|string|Specifies the issuer of the identity. For local accounts (where **signInType** is not `federated`), this property is the local B2C tenant default domain name, for example `contoso.onmicrosoft.com`. For social identity (where **signInType** is `federated`) the value is the name of the issuer, for example `facebook.com`|
6161
|issuerAssignedId|string|Specifies the unique identifier assigned to the user by the issuer. The combination of **issuer** and **issuerAssignedId** must be unique within your tenant. For local account, when **signInType** is set to `emailAddress` or `userName`, it represents the sign-in name for the user.<br>When **signInType** is set to: <ul><li>`emailAddress` (or starts with `emailAddress` like `emailAddress1`) **issuerAssignedId** must be a valid email address</li><li>`userName` (or any other value), **issuerAssignedId** must be a valid [local part of an email address](https://tools.ietf.org/html/rfc3696#section-3)</li><li>`federated`, **issuerAssignedId** represents the federated account unique identifier</li></ul>|
6262

63+
The following **Identities** property, with a local account identity with a sign-in name, an email address as sign-in, and with a social identity.
64+
65+
```JSON
66+
"identities": [
67+
{
68+
"signInType": "userName",
69+
"issuer": "contoso.onmicrosoft.com",
70+
"issuerAssignedId": "johnsmith"
71+
},
72+
{
73+
"signInType": "emailAddress",
74+
"issuer": "contoso.onmicrosoft.com",
75+
"issuerAssignedId": "[email protected]"
76+
},
77+
{
78+
"signInType": "federated",
79+
"issuer": "facebook.com",
80+
"issuerAssignedId": "5eecb0cd"
81+
}
82+
]
83+
```
84+
6385
For federated identities, depending on the identity provider, the **issuerAssignedId** is a unique value for a given user per application or development account. Configure the Azure AD B2C policy with the same application ID that was previously assigned by the social provider or another application within the same development account.
6486

6587
### Password profile property
@@ -116,9 +138,9 @@ After you've obtained the code sample, configure it for your environment and the
116138
```
117139
1. Run the application with the `dotnet` command:
118140

119-
```console
120-
dotnet bin/Debug/netcoreapp3.0/b2c-ms-graph.dll
121-
```
141+
```console
142+
dotnet bin/Debug/netcoreapp3.0/b2c-ms-graph.dll
143+
```
122144

123145
The application displays a list of commands you can execute. For example, get all users, get a single user, delete a user, update a user's password, and bulk import.
124146

articles/active-directory-b2c/string-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/24/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -30,7 +30,7 @@ Compare two claims, and throw an exception if they are not equal according to th
3030
| InputClaim | inputClaim2 | string | Second claim's type, which is to be compared. |
3131
| InputParameter | stringComparison | string | string comparison, one of the values: Ordinal, OrdinalIgnoreCase. |
3232

33-
The **AssertStringClaimsAreEqual** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md), or a [DisplayConrtol](display-controls.md). The `UserMessageIfClaimsTransformationStringsAreNotEqual` metadata of a self-asserted technical profile controls the error message that is presented to the user.
33+
The **AssertStringClaimsAreEqual** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md), or a [DisplayConrtol](display-controls.md). The `UserMessageIfClaimsTransformationStringsAreNotEqual` metadata of a self-asserted technical profile controls the error message that is presented to the user. The error messages can be [localized](localization-string-ids.md#claims-transformations-error-messages).
3434

3535

3636
![AssertStringClaimsAreEqual execution](./media/string-transformations/assert-execution.png)

0 commit comments

Comments
 (0)