Skip to content

Commit b27f65b

Browse files
2 parents 1868aca + c2c70e0 commit b27f65b

File tree

2,176 files changed

+59913
-48467
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,176 files changed

+59913
-48467
lines changed

.openpublishing.publish.config.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1022,6 +1022,9 @@
10221022
"articles/azure-video-indexer/.openpublishing.redirection.azure-video-indexer.json",
10231023
"articles/machine-learning/.openpublishing.redirection.machine-learning.json",
10241024
"articles/static-web-apps/.openpublishing.redirection.static-web-apps.json",
1025-
".openpublishing.redirection.virtual-desktop.json"
1025+
".openpublishing.redirection.virtual-desktop.json",
1026+
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-services.json",
1027+
"articles/applied-ai-services/.openpublishing.archived.json",
1028+
"articles/cognitive-services/.openpublishing.redirection.cognitive-services.json"
10261029
]
10271030
}

.openpublishing.redirection.defender-for-iot.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-frequently-asked-questions.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/faqs-general",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/defender-for-iot/organizations/appliance-catalog/appliance-catalog-overview.md",
510
"redirect_url": "/azure/defender-for-iot/organizations/appliance-catalog/index",

.openpublishing.redirection.json

Lines changed: 34205 additions & 40335 deletions
Large diffs are not rendered by default.

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Thank you for taking the time to contribute to the Microsoft Azure documentation.
44

5-
This guide covers some general topics related to contribution and refers to the [contributor guide](https://docs.microsoft.com/contribute) for more detailed explanations when required.
5+
This guide covers some general topics related to contribution and refers to our [contributor guide](https://docs.microsoft.com/contribute) for more detailed explanations when required.
66

77
## Code of Conduct
88

articles/active-directory-b2c/identity-provider-twitter.md

Lines changed: 33 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,32 @@ zone_pivot_groups: b2c-policy-type
3333

3434
To enable sign-in for users with a Twitter account in Azure AD B2C, you need to create a Twitter application. If you don't already have a Twitter account, you can sign up at [`https://twitter.com/signup`](https://twitter.com/signup). You also need to [Apply for a developer account](https://developer.twitter.com/). For more information, see [Apply for access](https://developer.twitter.com/en/apply-for-access).
3535

36+
::: zone pivot="b2c-custom-policy"
37+
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
38+
1. Select **+ Create Project** button.
39+
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
40+
1. Under **Use case** tab, select your preferred use case, and then select **Next**.
41+
1. Under **Project description** tab, enter your project description, and then select **Next** button.
42+
1. Under **App name** tab, enter a name for your app, such as *azureadb2c*, and the select **Next** button.
43+
1. Under **Keys & Tokens** tab, copy the value of **API Key** and **API Key Secret** for later. You use both of them to configure Twitter as an identity provider in your Azure AD B2C tenant.
44+
1. Select **App settings** to open the app settings.
45+
1. At the lower part of the page, under **User authentication settings**, select **Set up**.
46+
1. In the **User authentication settings** page, select **OAuth 2.0** option.
47+
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
48+
1. Under **GENERAL AUTHENTICATION SETTINGS**:
49+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy-id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
50+
- `your-tenant-name` with the name of your tenant name.
51+
- `your-domain-name` with your custom domain.
52+
- `your-policy-id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
53+
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
54+
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
55+
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
56+
1. Select **Save**.
57+
::: zone-end
58+
59+
60+
::: zone pivot="b2c-user-flow"
61+
3662
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
3763
1. Select **+ Create Project** button.
3864
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
@@ -45,15 +71,16 @@ To enable sign-in for users with a Twitter account in Azure AD B2C, you need to
4571
1. In the **User authentication settings** page, select **OAuth 2.0** option.
4672
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
4773
1. Under **GENERAL AUTHENTICATION SETTINGS**:
48-
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
74+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-name/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
4975
- `your-tenant-name` with the name of your tenant name.
5076
- `your-domain-name` with your custom domain.
51-
- `your-user-flow-Id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
52-
77+
- `your-user-flow-name` with the identifier of your user flow. For example, `b2c_1_signup_signin_twitter`.
5378
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
5479
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
5580
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
5681
1. Select **Save**.
82+
83+
::: zone-end
5784

5885
::: zone pivot="b2c-user-flow"
5986

@@ -83,8 +110,6 @@ At this point, the Twitter identity provider has been set up, but it's not yet a
83110
1. Select the **Run user flow** button.
84111
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
85112

86-
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
87-
88113
::: zone-end
89114

90115
::: zone pivot="b2c-custom-policy"
@@ -186,7 +211,9 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
186211
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
187212
1. Select the **Run now** button.
188213
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
214+
::: zone-end
189215

190216
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
191217

192-
::: zone-end
218+
> [!TIP]
219+
> If you're facing `unauthorized` error while testing this identity provider, make sure you use the correct Twitter API Key and API Key Secret, or try to apply for [elevated](https://developer.twitter.com/en/portal/products/elevated) access. Also, we recommend you've a look at [Twitter's projects structure](https://developer.twitter.com/en/docs/projects/overview), if you registered your app before the feature was available.

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -377,7 +377,7 @@ The following are the IDs for a [Verification display control](display-control-v
377377

378378
| ID | Default value |
379379
| --- | ------------- |
380-
|intro_msg <sup>*</sup>| Verification is necessary. Please click Send button.|
380+
|intro_msg<sup>1</sup>| Verification is necessary. Please click Send button.|
381381
|success_send_code_msg | Verification code has been sent. Please copy it to the input box below.|
382382
|failure_send_code_msg | We are having trouble verifying your email address. Please enter a valid email address and try again.|
383383
|success_verify_code_msg | E-mail address verified. You can now continue.|
@@ -386,13 +386,16 @@ The following are the IDs for a [Verification display control](display-control-v
386386
|but_verify_code | Verify code|
387387
|but_send_new_code | Send new code|
388388
|but_change_claims | Change e-mail|
389+
| UserMessageIfVerificationControlClaimsNotVerified<sup>2</sup>| The claims for verification control have not been verified. |
389390

390-
Note: The `intro_msg` element is hidden, and not shown on the self-asserted page. To make it visible, use the [HTML customization](customize-ui-with-html.md) with Cascading Style Sheets. For example:
391+
<sup>1</sup> The `intro_msg` element is hidden, and not shown on the self-asserted page. To make it visible, use the [HTML customization](customize-ui-with-html.md) with Cascading Style Sheets. For example:
391392

392393
```css
393394
.verificationInfoText div{display: block!important}
394395
```
395396

397+
<sup>2</sup> This error message is displayed to the user if they enter a verification code, but instead of completing the verification by selecting on the **Verify** button, they select the **Continue** button.
398+
396399
### Verification display control example
397400

398401
```xml
@@ -408,6 +411,7 @@ Note: The `intro_msg` element is hidden, and not shown on the self-asserted page
408411
<LocalizedString ElementType="DisplayControl" ElementId="emailVerificationControl" StringId="but_verify_code">Verify code</LocalizedString>
409412
<LocalizedString ElementType="DisplayControl" ElementId="emailVerificationControl" StringId="but_send_new_code">Send new code</LocalizedString>
410413
<LocalizedString ElementType="DisplayControl" ElementId="emailVerificationControl" StringId="but_change_claims">Change e-mail</LocalizedString>
414+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfVerificationControlClaimsNotVerified">The claims for verification control have not been verified.</LocalizedString>
411415
</LocalizedStrings>
412416
</LocalizedResources>
413417
```

articles/active-directory-b2c/page-layout.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,25 +28,32 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
2828

2929
|Element |Page layout version range |jQuery version |Handlebars Runtime version |Handlebars Compiler version |
3030
|---------|---------|------|--------|----------|
31-
|multifactor |>= 1.2.4 | 3.5.1 | 4.7.6 |4.7.7 |
31+
|multifactor |>= 1.2.8 | 3.5.1 | 4.7.7 |4.7.7 |
32+
| |>= 1.2.4 | 3.5.1 | 4.7.6 |4.7.7 |
3233
| |< 1.2.4 | 3.4.1 |4.0.12 |2.0.1 |
3334
| |< 1.2.0 | 1.12.4 |
34-
|selfasserted |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
35+
|selfasserted |>= 2.1.11 | 3.5.1 |4.7.7 |4.7.7 |
36+
| |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
3537
| |< 2.1.4 | 3.4.1 |4.0.12 |2.0.1 |
3638
| |< 1.2.0 | 1.12.4 |
37-
|unifiedssp |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
39+
|unifiedssp |>= 2.1.7 | 3.5.1 |4.7.7 |4.7.7 |
40+
| |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
3841
| |< 2.1.4 | 3.4.1 |4.0.12 |2.0.1 |
3942
| |< 1.2.0 | 1.12.4 |
40-
|globalexception |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
43+
|globalexception |>= 1.2.3 | 3.5.1 |4.7.7 |4.7.7 |
44+
| |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
4145
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
4246
| |< 1.2.0 | 1.12.4 |
43-
|providerselection |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
47+
|providerselection |>= 1.2.3 | 3.5.1 |4.7.7 |4.7.7 |
48+
| |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
4449
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
4550
| |< 1.2.0 | 1.12.4 |
46-
|claimsconsent |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
51+
|claimsconsent |>= 1.2.2 | 3.5.1 |4.7.7 |4.7.7 |
52+
| |>= 1.2.2 | 3.5.1 |4.7.7 |4.7.7 |
4753
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
4854
| |< 1.2.0 | 1.12.4 |
49-
|unifiedssd |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
55+
|unifiedssd |>= 1.2.3 | 3.5.1 |4.7.7 |4.7.7 |
56+
| |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
5057
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
5158
| |< 1.2.0 | 1.12.4 |
5259

articles/active-directory-b2c/string-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -864,7 +864,7 @@ Checks whether the provided phone number is valid, based on phone number regular
864864
</InputClaims>
865865
<InputParameters>
866866
<InputParameter Id="matchTo" DataType="string" Value="^[0-9]{4,16}$" />
867-
<InputParameter Id="outputClaimIfMatched" DataType="string" Value="Phone" />
867+
<InputParameter Id="outputClaimIfMatched" DataType="string" Value="iPhone" />
868868
</InputParameters>
869869
<OutputClaims>
870870
<OutputClaim ClaimTypeReferenceId="validationResult" TransformationClaimType="outputClaim" />

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/07/2022
11+
ms.date: 08/15/2022
1212
ms.author: justinha
1313
ms.custom: devx-track-azurepowershell
1414

@@ -172,9 +172,15 @@ Before you begin the migration process, complete the following initial checks an
172172

173173
Make sure that network settings don't block necessary ports required for Azure AD DS. Ports must be open on both the Classic virtual network and the Resource Manager virtual network. These settings include route tables (although it's not recommended to use route tables) and network security groups.
174174

175-
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain. To view the ports required, see [Network security groups and required ports][network-ports].
175+
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain.
176176

177-
If you use secure LDAP, add a rule to the network security group to allow incoming traffic for *TCP* port *636*. For more information, see [Lock down secure LDAP access over the internet](tutorial-configure-ldaps.md#lock-down-secure-ldap-access-over-the-internet)
177+
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet your managed domain is deployed into.
178+
179+
| Inbound port number | Protocol | Source | Destination | Action | Required | Purpose |
180+
|:-----------:|:--------:|:----------------------------------:|:-----------:|:------:|:--------:|:--------|
181+
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
182+
| 3389 | TCP | CorpNetSaw | Any | Allow | Optional | Debugging for support. |
183+
| 636 | TCP | AzureActiveDirectoryDomainServices | Inbound | Allow | Optional | Secure LDAP. |
178184

179185
Make a note of this target resource group, target virtual network, and target virtual network subnet. These resource names are used during the migration process.
180186

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 08/08/2022
4+
ms.date: 08/16/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

0 commit comments

Comments
 (0)