Skip to content

Commit b483823

Browse files
Merge pull request #177647 from aahill/release-cogsvcs-language-service
[DIRTY PR] Fix for merge conflicts
2 parents 14811b0 + 5d982fe commit b483823

File tree

418 files changed

+8169
-1995
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

418 files changed

+8169
-1995
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4240,6 +4240,26 @@
42404240
"redirect_url": "/azure/active-directory/governance/review-your-access",
42414241
"redirect_document_id": true
42424242
},
4243+
{
4244+
"source_path_from_root": "/azure/active-directory/governance/review-your-access.md",
4245+
"redirect_url": "/azure/active-directory/governance/self-access-review",
4246+
"redirect_document_id": false
4247+
},
4248+
{
4249+
"source_path_from_root": "/azure/active-directory/governance/entitlement-management-access-reviews-self-review.md",
4250+
"redirect_url": "/azure/active-directory/governance/self-access-review",
4251+
"redirect_document_id": false
4252+
},
4253+
{
4254+
"source_path_from_root": "/azure/active-directory/governance/manage-guest-access-with-access-reviews.md",
4255+
"redirect_url": "/azure/active-directory/governance/manage-access-review",
4256+
"redirect_document_id": false
4257+
},
4258+
{
4259+
"source_path_from_root": "/azure/active-directory/governance/manage-user-access-with-access-reviews.md",
4260+
"redirect_url": "/azure/active-directory/governance/manage-access-review",
4261+
"redirect_document_id": false
4262+
},
42434263
{
42444264
"source_path_from_root": "/articles/active-directory/cloud-provisioning/what-is-cloud-provisioning.md",
42454265
"redirect_url": "/azure/active-directory/cloud-sync/what-is-cloud-sync",

.openpublishing.redirection.json

Lines changed: 73 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4358,6 +4358,11 @@
43584358
"redirect_url": "/azure/app-service/tutorial-auth-aad",
43594359
"redirect_document_id": false
43604360
},
4361+
{
4362+
"source_path_from_root": "/articles/app-service/app-service-web-tutorial-connect-msi.md",
4363+
"redirect_url": "/azure/app-service/tutorial-connect-msi-sql-database",
4364+
"redirect_document_id": false
4365+
},
43614366
{
43624367
"source_path_from_root": "/articles/app-service/containers/tutorial-auth-aad.md",
43634368
"redirect_url": "/azure/app-service/tutorial-auth-aad?pivots=platform-linux",
@@ -4592,7 +4597,7 @@
45924597
"source_path_from_root": "/articles/app-service/app-service-migration-assistant.md",
45934598
"redirect_url": "/azure/app-service/app-service-asp-net-migration",
45944599
"redirect_document_id": false
4595-
},
4600+
},
45964601
{
45974602
"source_path_from_root": "/articles/architecture-overview.md",
45984603
"redirect_url": "/azure/architecture",
@@ -10631,6 +10636,11 @@
1063110636
"redirect_url": "/azure/azure-resource-manager/templates/common-deployment-errors",
1063210637
"redirect_document_id": false
1063310638
},
10639+
{
10640+
"source_path_from_root": "/articles/azure-resource-manager/templates/common-deployment-errors.md",
10641+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/common-deployment-errors",
10642+
"redirect_document_id": false
10643+
},
1063410644
{
1063510645
"source_path_from_root": "/articles/azure-resource-manager/complete-mode-deletion.md",
1063610646
"redirect_url": "/azure/azure-resource-manager/templates/complete-mode-deletion",
@@ -10801,6 +10811,21 @@
1080110811
"redirect_url": "/azure/azure-resource-manager/templates/deployment-quota-exceeded",
1080210812
"redirect_document_id": false
1080310813
},
10814+
{
10815+
"source_path_from_root": "/articles/azure-resource-manager/templates/deployment-quota-exceeded.md",
10816+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/deployment-quota-exceeded",
10817+
"redirect_document_id": false
10818+
},
10819+
{
10820+
"source_path_from_root": "/articles/azure-resource-manager/templates/error-invalid-template.md",
10821+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/error-invalid-template",
10822+
"redirect_document_id": false
10823+
},
10824+
{
10825+
"source_path_from_root": "/articles/azure-resource-manager/templates/error-job-size-exceeded.md",
10826+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/error-job-size-exceeded",
10827+
"redirect_document_id": false
10828+
},
1080410829
{
1080510830
"source_path_from_root": "/articles/azure-resource-manager/templates/template-tutorial-create-linked-templates.md",
1080610831
"redirect_url": "/azure/azure-resource-manager/templates/deployment-tutorial-linked-template",
@@ -10881,41 +10906,81 @@
1088110906
"redirect_url": "/azure/azure-resource-manager/templates/error-not-found",
1088210907
"redirect_document_id": false
1088310908
},
10909+
{
10910+
"source_path_from_root": "/articles/azure-resource-manager/templates/error-not-found.md",
10911+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/error-not-found",
10912+
"redirect_document_id": false
10913+
},
1088410914
{
1088510915
"source_path_from_root": "/articles/azure-resource-manager/resource-manager-parent-resource-errors.md",
1088610916
"redirect_url": "/azure/azure-resource-manager/templates/error-parent-resource",
1088710917
"redirect_document_id": false
1088810918
},
10919+
{
10920+
"source_path_from_root": "/articles/azure-resource-manager/templates/error-parent-resource.md",
10921+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/error-parent-resource",
10922+
"redirect_document_id": false
10923+
},
1088910924
{
1089010925
"source_path_from_root": "/articles/azure-resource-manager/resource-manager-policy-requestdisallowedbypolicy-error.md",
1089110926
"redirect_url": "/azure/azure-resource-manager/templates/error-policy-requestdisallowedbypolicy",
1089210927
"redirect_document_id": false
1089310928
},
10929+
{
10930+
"source_path_from_root": "/articles/azure-resource-manager/templates/error-policy-requestdisallowedbypolicy.md",
10931+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/error-policy-requestdisallowedbypolicy",
10932+
"redirect_document_id": false
10933+
},
1089410934
{
1089510935
"source_path_from_root": "/articles/azure-resource-manager/resource-manager-register-provider-errors.md",
1089610936
"redirect_url": "/azure/azure-resource-manager/templates/error-register-resource-provider",
1089710937
"redirect_document_id": false
1089810938
},
10939+
{
10940+
"source_path_from_root": "/articles/azure-resource-manager/templates/error-register-resource-provider.md",
10941+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/error-register-resource-provider",
10942+
"redirect_document_id": false
10943+
},
1089910944
{
1090010945
"source_path_from_root": "/articles/azure-resource-manager/resource-manager-reserved-resource-name.md",
1090110946
"redirect_url": "/azure/azure-resource-manager/templates/error-reserved-resource-name",
1090210947
"redirect_document_id": false
1090310948
},
10949+
{
10950+
"source_path_from_root": "/articles/azure-resource-manager/templates/error-reserved-resource-name.md",
10951+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/error-reserved-resource-name",
10952+
"redirect_document_id": false
10953+
},
1090410954
{
1090510955
"source_path_from_root": "/articles/azure-resource-manager/resource-manager-quota-errors.md",
1090610956
"redirect_url": "/azure/azure-resource-manager/templates/error-resource-quota",
1090710957
"redirect_document_id": false
1090810958
},
10959+
{
10960+
"source_path_from_root": "/articles/azure-resource-manager/templates/error-resource-quota.md",
10961+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/error-resource-quota",
10962+
"redirect_document_id": false
10963+
},
1090910964
{
1091010965
"source_path_from_root": "/articles/azure-resource-manager/resource-manager-sku-not-available-errors.md",
1091110966
"redirect_url": "/azure/azure-resource-manager/templates/error-sku-not-available",
1091210967
"redirect_document_id": false
1091310968
},
10969+
{
10970+
"source_path_from_root": "/articles/azure-resource-manager/templates/error-sku-not-available.md",
10971+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/error-sku-not-available",
10972+
"redirect_document_id": false
10973+
},
1091410974
{
1091510975
"source_path_from_root": "/articles/azure-resource-manager/resource-manager-storage-account-name-errors.md",
1091610976
"redirect_url": "/azure/azure-resource-manager/templates/error-storage-account-name",
1091710977
"redirect_document_id": false
1091810978
},
10979+
{
10980+
"source_path_from_root": "/articles/azure-resource-manager/templates/error-storage-account-name.md",
10981+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/error-storage-account-name",
10982+
"redirect_document_id": false
10983+
},
1091910984
{
1092010985
"source_path_from_root": "/articles/azure-resource-manager/export-template-portal.md",
1092110986
"redirect_url": "/azure/azure-resource-manager/templates/export-template-portal",
@@ -11316,6 +11381,11 @@
1131611381
"redirect_url": "/azure/azure-resource-manager/templates/template-tutorial-troubleshoot",
1131711382
"redirect_document_id": false
1131811383
},
11384+
{
11385+
"source_path_from_root": "/articles/azure-resource-manager/templates/template-tutorial-troubleshoot.md",
11386+
"redirect_url": "/azure/azure-resource-manager/troubleshooting/quickstart-troubleshoot-arm-deployment",
11387+
"redirect_document_id": false
11388+
},
1131911389
{
1132011390
"source_path_from_root": "/articles/azure-resource-manager/resource-manager-tutorial-use-azure-pipelines.md",
1132111391
"redirect_url": "/azure/azure-resource-manager/templates/template-tutorial-use-azure-pipelines",
@@ -36973,7 +37043,7 @@
3697337043
},
3697437044
{
3697537045
"source_path_from_root": "/articles/active-directory-domain-services/contact-us.md",
36976-
"redirect_url": "https://feedback.azure.com/forums/169401-azure-active-directory?category_id=160593",
37046+
"redirect_url": "/azure/active-directory/fundamentals/support-help-options",
3697737047
"redirect_document_id": false
3697837048
},
3697937049
{
@@ -46772,4 +46842,4 @@
4677246842
"redirect_document_id": false
4677346843
}
4677446844
]
46775-
}
46845+
}

articles/active-directory-b2c/access-tokens.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ If the **response_type** parameter in an `/authorize` request includes `token`,
6262

6363
To request an access token, you need an authorization code. Below is an example of a request to the `/authorize` endpoint for an authorization code. Custom domains are not supported for use with access tokens. Use your tenant-name.onmicrosoft.com domain in the request URL.
6464

65-
In the following example, you replace these values:
65+
In the following example, you replace these values in the query string:
6666

6767
- `<tenant-name>` - The name of your Azure AD B2C tenant.
6868
- `<policy-name>` - The name of your custom policy or user flow.
@@ -86,7 +86,7 @@ The response with the authorization code should be similar to this example:
8686
https://jwt.ms/?code=eyJraWQiOiJjcGltY29yZV8wOTI1MjAxNSIsInZlciI6IjEuMC...
8787
```
8888

89-
After successfully receiving the authorization code, you can use it to request an access token:
89+
After successfully receiving the authorization code, you can use it to request an access token. Note that the parameters are in the body of the HTTP POST request:
9090

9191
```http
9292
POST <tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/<policy-name>/oauth2/v2.0/token HTTP/1.1
@@ -100,7 +100,7 @@ grant_type=authorization_code
100100
&redirect_uri=https://jwt.ms
101101
&client_secret=2hMG2-_:y12n10vwH...
102102
```
103-
103+
104104
You should see something similar to the following response:
105105

106106
```json

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The following flows are not supported:
3737

3838
When using the ROPC flow, consider the following:
3939

40-
- ROPC doesn’t work when there is any interruption to the authentication flow that needs user interaction. For example, when a password has expired or needs to be changed, [multi-factor authentication](multi-factor-authentication.md) is required, or when more information needs to be collected during sign-in (for example, user consent).
40+
- ROPC doesn’t work when there is any interruption to the authentication flow that needs user interaction. For example, when a password has expired or needs to be changed, [multifactor authentication](multi-factor-authentication.md) is required, or when more information needs to be collected during sign-in (for example, user consent).
4141
- ROPC supports local accounts only. Users can’t sign in with [federated identity providers](add-identity-provider.md) like Microsoft, Google+, Twitter, AD-FS, or Facebook.
4242
- [Session Management](session-behavior.md), including [keep me signed-in (KMSI)](session-behavior.md#enable-keep-me-signed-in-kmsi), is not applicable.
4343

@@ -67,6 +67,9 @@ When using the ROPC flow, consider the following:
6767

6868
::: zone pivot="b2c-custom-policy"
6969

70+
## Pre-requisite
71+
If you've not done so, learn about custom policy starter pack in [Get started with custom policies in Active Directory B2C](tutorial-create-user-flows.md).
72+
7073
## Create a resource owner policy
7174

7275
1. Open the *TrustFrameworkExtensions.xml* file.

articles/active-directory-b2c/configure-authentication-sample-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 09/15/2021
10+
ms.date: 10/25/2021
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"

articles/active-directory-b2c/configure-user-input.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/15/2021
12+
ms.date: 10/22/2021
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -32,6 +32,10 @@ In this article, you collect a new attribute during your sign-up journey in Azur
3232

3333
## Add user attributes your user flow
3434

35+
1. Sign in to the [Azure portal](https://portal.azure.com/).
36+
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
37+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
38+
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.
3539
1. In your Azure AD B2C tenant, select **User flows**.
3640
1. Select your policy (for example, "B2C_1_SignupSignin") to open it.
3741
1. Select **User attributes** and then select the user attribute (for example, "City").
@@ -63,7 +67,7 @@ To provide a set list of values for the city attribute:
6367
1. [Enable language customization on the user flow](language-customization.md#support-requested-languages-for-ui_locales)
6468
1. Select your policy (for example, "B2C_1_SignupSignin") to open it.
6569
1. On the **Languages** page for the user flow, select the language that you want to customize.
66-
1. Under **Page-level-resources files**, select **Local account sign up page**.
70+
1. Under **Page-level resources files**, select **Local account sign up page**.
6771
1. Select **Download defaults** (or **Download overrides** if you have previously edited this language).
6872
1. Create a `LocalizedCollections` attribute.
6973

@@ -107,7 +111,7 @@ The `LocalizedCollections` is an array of `Name` and `Value` pairs. The order fo
107111
1. Select **User flows** and select your policy (for example, "B2C_1_SignupSignin") to open it.
108112
1. Select **Languages**.
109113
1. Select the language that you want to translate to.
110-
1. Select the **Local account sign up page**.
114+
1. Under **Page-level-resources files**, select **Local account sign up page**.
111115
1. Select the folder icon, and select the JSON file to upload. The changes are saved to your user flow automatically.
112116

113117
## Test your user flow

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,10 +47,10 @@ To enable sign-in for users with an Azure AD account from a specific Azure AD or
4747
1. Sign in to the [Azure portal](https://portal.azure.com).
4848
1. Make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso). Select the **Directories + subscriptions** icon in the portal toolbar.
4949
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
50-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
50+
1. Under **Azure services**, select **App registrations** or search for and select **App registrations**.
5151
1. Select **New registration**.
5252
1. Enter a **Name** for your application. For example, `Azure AD B2C App`.
53-
1. Accept the default selection of **Accounts in this organizational directory only** for this application.
53+
1. Accept the default selection of **Accounts in this organizational directory only (Default Directory only - Single tenant)** for this application.
5454
1. For the **Redirect URI**, accept the value of **Web**, and enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant.
5555

5656
```

articles/active-directory-b2c/language-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -458,7 +458,7 @@ Microsoft is committed to providing the most up-to-date translations for your us
458458

459459
### Support for right-to-left languages
460460

461-
Microsoft currently doesn't provide support for right-to-left languages. You can accomplish this by using custom locales and using CSS to change the way the strings are displayed. If you need this feature, please vote for it on [Azure Feedback](https://feedback.azure.com/forums/169401-azure-active-directory/suggestions/19393000-provide-language-support-for-right-to-left-languag).
461+
Microsoft currently doesn't provide support for right-to-left languages. You can accomplish this by using custom locales and using CSS to change the way the strings are displayed. If you need this feature, please vote for it on [Azure Feedback](https://feedback.azure.com/d365community/idea/10a7e89c-c325-ec11-b6e6-000d3a4f0789).
462462

463463
### Social identity provider translations
464464

275 Bytes
Loading

articles/active-directory-b2c/saml-service-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -313,10 +313,10 @@ For SAML apps, you need to configure several properties in the application regis
313313

314314
When your SAML application makes a request to Azure AD B2C, the SAML AuthN request includes an `Issuer` attribute. The value of this attribute is typically the same as the application's metadata `entityID` value. Azure AD B2C uses this value to look up the application registration in the directory and read the configuration. For this lookup to succeed, `identifierUri` in the application registration must be populated with a value that matches the `Issuer` attribute.
315315

316-
In the registration manifest, find the `identifierURIs` parameter and add the appropriate value. This value will be the same value that's configured in the SAML AuthN requests for `EntityId` at the application, and the `entityID` value in the application's metadata. You will also need to find the `accessTokenAcceptedVersion` paramater and set the value to `2`.
316+
In the registration manifest, find the `identifierURIs` parameter and add the appropriate value. This value will be the same value that's configured in the SAML AuthN requests for `EntityId` at the application, and the `entityID` value in the application's metadata. You will also need to find the `accessTokenAcceptedVersion` parameter and set the value to `2`.
317317

318318
> [!IMPORTANT]
319-
> If you do not update the `accessTokenAcceptedVersion` to `2` you will recive an error message requiring a verfied domain.
319+
> If you do not update the `accessTokenAcceptedVersion` to `2` you will recieve an error message requiring a verified domain.
320320
321321
The following example shows the `entityID` value in the SAML metadata:
322322

0 commit comments

Comments
 (0)