Skip to content

Commit b42ece5

Browse files
author
David Curwin
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into wi-147392-agentless-discovery-aug20-2023
2 parents f0b684a + f57376c commit b42ece5

File tree

1,961 files changed

+17165
-8942
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,961 files changed

+17165
-8942
lines changed

.openpublishing.redirection.azure-productivity.json

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,6 +184,26 @@
184184
"source_path": "articles/lab-services/how-to-access-vm-for-students-within-teams.md",
185185
"redirect_url": "/azure/lab-services/tutorial-access-lab-virtual-machine-teams-canvas",
186186
"redirect_document_id": false
187+
},
188+
{
189+
"source_path": "articles/lab-services/lab-creator-support-information.md",
190+
"redirect_url": "/azure/lab-services/how-to-manage-labs",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path": "articles/lab-services/lab-user-support-information.md",
195+
"redirect_url": "/azure/lab-services/how-to-access-lab-virtual-machine",
196+
"redirect_document_id": false
197+
},
198+
{
199+
"source_path": "articles/lab-services/how-to-create-lab-plan-template.md",
200+
"redirect_url": "/azure/lab-services/how-to-create-lab-plan-bicep",
201+
"redirect_document_id": false
202+
},
203+
{
204+
"source_path": "articles/lab-services/how-to-create-lab-template.md",
205+
"redirect_url": "/azure/lab-services/how-to-create-lab-bicep",
206+
"redirect_document_id": false
187207
}
188208
]
189-
}
209+
}

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/migrate/tutorial-assess-webapps-physical.md",
5+
"redirect_URL": "tutorial-assess-webapps",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/migrate/tutorial-assess-webapps-hyper-v.md",
10+
"redirect_URL": "tutorial-assess-webapps",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "articles/route-server/tutorial-protect-route-server.md",
515
"redirect_URL": "/azure/route-server/tutorial-protect-route-server-ddos",
@@ -2373,6 +2383,11 @@
23732383
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-geo-filtering",
23742384
"redirect_document_id": false
23752385
},
2386+
{
2387+
"source_path_from_root": "/articles/web-application-firewall/scripts/waf-custom-rules-powershell.md",
2388+
"redirect_url": "/azure/web-application-firewall/ag/configure-waf-custom-rules",
2389+
"redirect_document_id": false
2390+
},
23762391
{
23772392
"source_path_from_root": "/articles/frontdoor/standard-premium/edge-locations.md",
23782393
"redirect_url": "/azure/frontdoor/edge-locations-by-region",
@@ -24232,10 +24247,20 @@
2423224247
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-vanillajs-sign-in-sign-out",
2423324248
"redirect_document_id": false
2423424249
},
24250+
{
24251+
"source_path_from_root": "/articles/virtual-machines/image-builder-reliability.md",
24252+
"redirect_url": "/azure/reliability/reliability-image-builder.md",
24253+
"redirect_document_id": false
24254+
},
2423524255
{
2423624256
"source_path_from_root": "/articles/bastion/bastion-connect-vm-rdp-linux.md",
2423724257
"redirect_url": "/azure/bastion/bastion-connect-vm-ssh-linux",
2423824258
"redirect_document_id": false
24259+
},
24260+
{
24261+
"source_path_from_root": "/articles/reliability/reliability-postgre-flexible.md",
24262+
"redirect_url": "/azure/reliability/reliability-postgresql-flexible-server",
24263+
"redirect_document_id": false
2423924264
}
2424024265
]
2424124266
}

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/04/2021
12+
ms.date: 08/22/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -88,7 +88,7 @@ The technical profile also returns claims that aren't returned by the identity p
8888
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the Http status code is in the 5xx range. The default is `false`. |
8989
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token.If you need to build the metadata endpoint URL based on Issuer, set this to `true`.|
9090
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
91-
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic` (public preview), `private_key_jwt` (public preview). For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
91+
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic` (public preview), `private_key_jwt`. For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
9292
|token_signing_algorithm| No | Specifies the signing algorithm to use when `token_endpoint_auth_method` is set to `private_key_jwt`. Possible values: `RS256` (default) or `RS512`.|
9393
| SingleLogoutEnabled | No | Indicates whether during sign-in the technical profile attempts to sign out from federated identity providers. For more information, see [Azure AD B2C session sign-out](./session-behavior.md#sign-out). Possible values: `true` (default), or `false`. |
9494
|ReadBodyClaimsOnIdpRedirect| No| Set to `true` to read claims from response body on identity provider redirect. This metadata is used with [Apple ID](identity-provider-apple-id.md), where claims return in the response payload.|
@@ -134,3 +134,4 @@ Examples:
134134
- [Add Microsoft Account (MSA) as an identity provider using custom policies](identity-provider-microsoft-account.md)
135135
- [Sign in by using Azure AD accounts](identity-provider-azure-ad-single-tenant.md)
136136
- [Allow users to sign in to a multi-tenant Azure AD identity provider using custom policies](identity-provider-azure-ad-multi-tenant.md)
137+

articles/active-directory-b2c/page-layout.md

Lines changed: 138 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 07/18/2022
12+
ms.date: 08/23/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -59,13 +59,46 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
5959

6060
## Self-asserted page (selfasserted)
6161

62+
**2.1.26**
63+
64+
- Replaced `Keypress` to `Key Down` event and avoid `Asterisk` for non-required in classic mode.
65+
66+
**2.1.25**
67+
68+
- Fixed content security policy (CSP) violation and remove additional request header X-Aspnetmvc-Version.
69+
70+
- Introduced Captcha mechanism for Self-asserted and Unified SSP Flows (_Beta-version-Internal use only_).
71+
72+
**2.1.24**
73+
74+
- Fixed accessibility bugs.
75+
76+
- Fixed MFA related issue and IE11 compatibility issues.
77+
78+
**2.1.23**
79+
80+
- Fixed accessibility bugs.
81+
82+
- Reduced `min-width` value for UI viewport for default template.
83+
84+
**2.1.22**
85+
86+
- Fixed accessibility bugs.
87+
88+
- Added logic to adopt QR Code Image generated from backend library.
89+
90+
**2.1.21**
91+
92+
- Additional sanitization of script tags to avoid XSS attacks.
93+
6294
**2.1.20**
63-
- Fixed an XSS issue on input from textbox
95+
- Fixed Enter event trigger on MFA.
96+
- CSS changes rendering page text/control in vertical manner for small screens
6497

6598
**2.1.19**
66-
- Fixed accessibility bugs
67-
- Handle Undefined Error message for existing user sign up
68-
- Move Password Mismatch Error to Inline instead of Page Level
99+
- Fixed accessibility bugs.
100+
- Handled Undefined Error message for existing user sign up.
101+
- Moved Password mismatch error to Inline instead of page level.
69102
- Accessibility changes related to High Contrast button display and anchor focus improvements
70103

71104
**2.1.18**
@@ -81,6 +114,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
81114
- Enforce Validation Error Update on control change and enable continue on email verified
82115
- Added additional field to error code to validation failure response
83116

117+
84118
**2.1.16**
85119
- Fixed "Claims for verification control have not been verified" bug while verifying code.
86120
- Hide error message on validation succeeds and send code to verify
@@ -94,7 +128,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
94128
**2.1.10**
95129

96130
- Correcting to the tab index
97-
- Fixing WCAG 2.1 accessibility and screen reader issues
131+
- Fixed WCAG 2.1 accessibility and screen reader issues
98132

99133
**2.1.9**
100134

@@ -187,10 +221,34 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
187221
> [!TIP]
188222
> If you localize your page to support multiple locales, or languages in a user flow. The [localization IDs](localization-string-ids.md) article provides the list of localization IDs that you can use for the page version you select.
189223
224+
**2.1.14**
225+
226+
- Replaced `Keypress` to `Key Down` event.
227+
228+
**2.1.13**
229+
230+
- Fixed content security policy (CSP) violation and remove additional request header X-Aspnetmvc-Version
231+
232+
- Introduced Captcha mechanism for Self-asserted and Unified SSP Flows (_Beta-version-Internal use only_)
233+
234+
**2.1.12**
235+
236+
- Removed `ReplaceAll` function for IE11 compatibility.
237+
238+
**2.1.11**
239+
240+
- Fixed accessibility bugs.
241+
242+
**2.1.10**
243+
244+
- Added additional sanitization of script tags to avoid XSS attacks.
245+
190246
**2.1.9**
191-
- Fix accessibility bugs
247+
248+
- Fixed accessibility bugs.
249+
192250
- Accessibility changes related to High Contrast button display and anchor focus improvements
193-
251+
194252
**2.1.8**
195253
- Add descriptive error message and fixed forgotPassword link!
196254

@@ -255,6 +313,46 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
255313

256314
## MFA page (multifactor)
257315

316+
**1.2.12**
317+
318+
- Replaced `KeyPress` to `KeyDown` event.
319+
320+
**1.2.11**
321+
322+
- Removed `ReplaceAll` function for IE11 compatibility.
323+
324+
**1.2.10**
325+
326+
- Fixed accessibility bugs.
327+
328+
**1.2.9**
329+
330+
- Fixed `Enter` event trigger on MFA.
331+
332+
- CSS changes render page text/control in vertical manner for small screens
333+
334+
- Fixed Multifactor tab navigation bug.
335+
336+
**1.2.8**
337+
338+
- Passed the response status for MFA verification with error for backend to further triage.
339+
340+
**1.2.7**
341+
342+
- Fixed accessibility issue on label for retries code.
343+
344+
- Fixed issue caused by incompatibility of default parameter on IE 11.
345+
346+
- Set up `H1` heading and enable by default.
347+
348+
- Updated HandlebarJS version to 4.7.7.
349+
350+
**1.2.6**
351+
352+
- Corrected the `autocomplete` value on verification code field from false to off.
353+
354+
- Fixed a few XSS encoding issues.
355+
258356
**1.2.5**
259357
- Fixed a language encoding issue that is causing the request to fail.
260358

@@ -303,7 +401,24 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
303401

304402
## Exception Page (globalexception)
305403

404+
**1.2.5**
405+
406+
- Removed `ReplaceAl`l function for IE11 compatibility.
407+
408+
**1.2.4**
409+
410+
- Fixed accessibility bugs.
411+
412+
**1.2.3**
413+
414+
- Updated HandlebarJS version to 4.7.7.
415+
416+
**1.2.2**
417+
418+
- Set up `H1` heading and enable by default.
419+
306420
**1.2.1**
421+
307422
- Updated jQuery version to 3.5.1.
308423
- Updated HandlebarJS version to 4.7.6.
309424

@@ -328,7 +443,20 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
328443

329444
## Other pages (ProviderSelection, ClaimsConsent, UnifiedSSD)
330445

446+
**1.2.4**
447+
448+
- Remove `ReplaceAll` function for IE11 compatibility.
449+
450+
**1.2.3**
451+
452+
- Fixed accessibility bugs.
453+
454+
**1.2.2**
455+
456+
- Updated HandlebarJS version to 4.7.7
457+
331458
**1.2.1**
459+
332460
- Updated jQuery version to 3.5.1.
333461
- Updated HandlebarJS version to 4.7.6.
334462

@@ -348,3 +476,5 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
348476
## Next steps
349477

350478
For details on how to customize the user interface of your applications in custom policies, see [Customize the user interface of your application using a custom policy](customize-ui-with-html.md).
479+
480+

articles/active-directory-b2c/secure-rest-api.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -230,8 +230,6 @@ The following XML snippet is an example of a RESTful technical profile configure
230230

231231
## OAuth2 bearer authentication
232232

233-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
234-
235233
Bearer token authentication is defined in [OAuth2.0 Authorization Framework: Bearer Token Usage (RFC 6750)](https://www.rfc-editor.org/rfc/rfc6750.txt). In bearer token authentication, Azure AD B2C sends an HTTP request with a token in the authorization header.
236234

237235
```http
@@ -243,7 +241,6 @@ A bearer token is an opaque string. It can be a JWT access token or any string t
243241
- **Bearer token**. To be able to send the bearer token in the Restful technical profile, your policy needs to first acquire the bearer token and then use it in the RESTful technical profile.
244242
- **Static bearer token**. Use this approach when your REST API issues a long-term access token. To use a static bearer token, create a policy key and make a reference from the RESTful technical profile to your policy key.
245243

246-
247244
## Using OAuth2 Bearer
248245

249246
The following steps demonstrate how to use client credentials to obtain a bearer token and pass it into the Authorization header of the REST API calls.
@@ -488,15 +485,18 @@ Add the validation technical profile reference to the sign up technical profile,
488485

489486

490487

488+
489+
491490
For example:
492-
```XML
493-
<ValidationTechnicalProfiles>
494-
....
495-
<ValidationTechnicalProfile ReferenceId="REST-AcquireAccessToken" />
496-
....
497-
</ValidationTechnicalProfiles>
498-
```
499-
491+
```ruby
492+
```XML
493+
<ValidationTechnicalProfiles>
494+
....
495+
<ValidationTechnicalProfile ReferenceId="REST-AcquireAccessToken" />
496+
....
497+
</ValidationTechnicalProfiles>
498+
```
499+
```
500500

501501
::: zone-end
502502

@@ -531,7 +531,6 @@ To configure a REST API technical profile with API key authentication, create th
531531
1. For **Key usage**, select **Encryption**.
532532
1. Select **Create**.
533533

534-
535534
### Configure your REST API technical profile to use API key authentication
536535

537536
After creating the necessary key, configure your REST API technical profile metadata to reference the credentials.
@@ -584,3 +583,4 @@ The following XML snippet is an example of a RESTful technical profile configure
584583
::: zone pivot="b2c-custom-policy"
585584
- Learn more about the [Restful technical profile](restful-technical-profile.md) element in the custom policy reference.
586585
::: zone-end
586+

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 08/08/2023
4+
ms.date: 08/25/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/inbound-provisioning-api-grant-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,6 @@ This section describes how you can assign the necessary permissions to a managed
8686
## Next steps
8787
- [Quick start using cURL](inbound-provisioning-api-curl-tutorial.md)
8888
- [Quick start using Postman](inbound-provisioning-api-postman.md)
89-
- [Quick start using Postman](inbound-provisioning-api-graph-explorer.md)
89+
- [Quick start using Graph Explorer](inbound-provisioning-api-graph-explorer.md)
9090
- [Frequently asked questions about API-driven inbound provisioning](inbound-provisioning-api-faqs.md)
9191

0 commit comments

Comments
 (0)