Skip to content

Commit b5d75b2

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 2412ee0 + 083aa7c commit b5d75b2

File tree

207 files changed

+1504
-1087
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

207 files changed

+1504
-1087
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41748,7 +41748,7 @@
4174841748
},
4174941749
{
4175041750
"source_path": "articles/azure-monitor/insights/service-map-configure.md",
41751-
"redirect_url": "/azure/azure-monitor/insights/vminsights-enable-hybrid-cloud",
41751+
"redirect_url": "/azure/azure-monitor/insights/vminsights-enable-overview",
4175241752
"redirect_document_id": false
4175341753
},
4175441754
{

articles/active-directory-b2c/active-directory-b2c-quickstarts-desktop-app.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Quickstart - Set up sign-in for a desktop app using Azure Active Directory B2C | Microsoft Docs
3-
description: Run a sample ASP.NET desktop application that uses Azure Active Directory B2C to provide account sign-in.
2+
title: Quickstart - Set up sign-in for a desktop app using Azure Active Directory B2C
3+
description: Run a sample WPF desktop application that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
1111
ms.custom: mvc
12-
ms.date: 11/30/2018
12+
ms.date: 09/12/2019
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -23,7 +23,7 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
2323
## Prerequisites
2424

2525
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
26-
- A social account from either Facebook, Google, Microsoft, or Twitter.
26+
- A social account from either Facebook, Google, or Microsoft.
2727
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop/archive/master.zip) or clone the sample web app from GitHub.
2828

2929
```
@@ -41,10 +41,10 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
4141
4242
![Screenshot of the sample WPF application](media/active-directory-b2c-quickstarts-desktop-app/wpf-sample-application.png)
4343
44-
The sample supports several sign-up options. These options include using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
44+
The sample supports several sign-up options. These options include using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, or Microsoft.
4545
4646
47-
2. Azure AD B2C presents a custom login page for a fictitious brand called Wingtip Toys for the sample web app. To sign up using a social identity provider, click the button of the identity provider you want to use.
47+
2. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
4848
4949
![Sign In or Sign Up page showing identity providers](media/active-directory-b2c-quickstarts-desktop-app/sign-in-or-sign-up-wpf.png)
5050
@@ -62,7 +62,7 @@ Azure AD B2C provides functionality to allow users to update their profiles. The
6262
6363
![Edit profile button highlighted in WPF sample app](media/active-directory-b2c-quickstarts-desktop-app/edit-profile-wpf.png)
6464
65-
2. Choose the identity provider associated with the account you created. For example, if you used Twitter as the identity provider when you created your account, choose Twitter to modify the associated profile details.
65+
2. Choose the identity provider associated with the account you created. For example, if you used Facebook as the identity provider when you created your account, choose Facebook to modify the associated profile details.
6666
6767
3. Change your **Display name** or **City**, and then click **Continue**.
6868

articles/active-directory-b2c/active-directory-b2c-quickstarts-spa.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Quickstart - Set up sign-in for a single-page app using Azure Active Directory B2C | Microsoft Docs
2+
title: Quickstart - Set up sign-in for a single-page app using Azure Active Directory B2C
33
description: Run a sample single-page application that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
11-
ms.date: 10/24/2018
11+
ms.date: 09/12/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -23,7 +23,7 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
2323

2424
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
2525
- Install [Node.js](https://nodejs.org/en/download/)
26-
- A social account from either Facebook, Google, Microsoft, or Twitter.
26+
- A social account from either Facebook, Google, or Microsoft.
2727
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp/archive/master.zip) or clone the sample web app from GitHub.
2828

2929
```
@@ -54,9 +54,9 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
5454
5555
![Single-page application sample app shown in browser](media/active-directory-b2c-quickstarts-spa/sample-app-spa.png)
5656
57-
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
57+
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, or Microsoft.
5858
59-
2. Azure AD B2C presents a custom login page for a fictitious brand called Wingtip Toys for the sample web app. To sign up using a social identity provider, click the button of the identity provider you want to use.
59+
2. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
6060
6161
![Sign In or Sign Up page showing identity provider buttons](media/active-directory-b2c-quickstarts-spa/sign-in-or-sign-up-spa.png)
6262

articles/active-directory-b2c/active-directory-b2c-quickstarts-web-app.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Quickstart - Set up sign in for an ASP.NET application using Azure Active Directory B2C | Microsoft Docs
2+
title: Quickstart - Set up sign in for an ASP.NET application using Azure Active Directory B2C
33
description: Run a sample ASP.NET web app that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.topic: quickstart
1010
ms.custom: mvc
11-
ms.date: 11/30/2018
11+
ms.date: 09/12/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -22,14 +22,14 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
2222
## Prerequisites
2323

2424
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
25-
- A social account from either Facebook, Google, Microsoft, or Twitter.
25+
- A social account from Facebook, Google, or Microsoft.
2626
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi/archive/master.zip) or clone the sample web application from GitHub.
2727

2828
```
2929
git clone https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi.git
3030
```
3131
32-
These two projects are in the sample solution:
32+
There are two projects are in the sample solution:
3333
3434
- **TaskWebApp** - A web application that creates and edits a task list. The web application uses the **sign-up or sign-in** user flow to sign up or sign in users.
3535
- **TaskService** - A web API that supports the create, read, update, and delete task list functionality. The web API is protected by Azure AD B2C and called by the web application.
@@ -51,9 +51,9 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
5151
5252
![Sample ASP.NET web app in browser with sign up/sign link highlighted](media/active-directory-b2c-quickstarts-web-app/web-app-sign-in.png)
5353
54-
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
54+
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, or Microsoft.
5555
56-
2. Azure AD B2C presents a custom sign-in page for a fictitious brand called Wingtip Toys for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
56+
2. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
5757
5858
![Sign In or Sign Up page showing identity provider buttons](media/active-directory-b2c-quickstarts-web-app/sign-in-or-sign-up-web.png)
5959

articles/active-directory-b2c/active-directory-b2c-tutorials-web-app.md

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Tutorial - Enable authentication in a web application - Azure Active Directory B2C | Microsoft Docs
2+
title: Tutorial - Enable authentication in a web application - Azure Active Directory B2C
33
description: Tutorial on how to use Azure Active Directory B2C to provide user login for an ASP.NET web application.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
77

88
ms.author: marsma
9-
ms.date: 02/04/2019
9+
ms.date: 09/12/2019
1010
ms.custom: mvc
1111
ms.topic: tutorial
1212
ms.service: active-directory
@@ -28,8 +28,8 @@ In this tutorial, you learn how to:
2828

2929
## Prerequisites
3030

31-
- [Create user flows](tutorial-create-user-flows.md) to enable user experiences in your application.
32-
- Install [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
31+
* [Create user flows](tutorial-create-user-flows.md) to enable user experiences in your application.
32+
* Install [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
3333

3434
## Update the application
3535

@@ -54,15 +54,21 @@ git clone https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-an
5454

5555
The following two projects are in the sample solution:
5656

57-
- **TaskWebApp** - Create and edit a task list. The sample uses the **sign-up or sign-in** user flow to sign up or sign in users.
57+
- **TaskWebApp** - Create and edit a task list. The sample uses the **sign-up or sign-in** user flow to sign up and sign in users.
5858
- **TaskService** - Supports the create, read, update, and delete task list functionality. The API is protected by Azure AD B2C and called by TaskWebApp.
5959

60-
You change the sample to use the application that's registered in your tenant, which includes the application ID and the key that you previously recorded. You also configure the user flows that you created. The sample defines the configuration values as settings in the Web.config file. To change the settings:
60+
You change the sample to use the application that's registered in your tenant, which includes the application ID and the key that you previously recorded. You also configure the user flows that you created. The sample defines the configuration values as settings in the *Web.config* file.
6161

62-
1. Open the **B2C-WebAPI-DotNet** solution in Visual Studio.
63-
2. In the **TaskWebApp** project, open the **Web.config** file. Replace the value for `ida:Tenant` with the name of the tenant that you created. Replace the value for `ida:ClientId` with the application ID that you recorded. Replace the value of `ida:ClientSecret` with the key that you recorded. You must XML-encode the client secret before adding it to your Web.config.
64-
3. In the **Web.config** file, replace the value for `ida:SignUpSignInPolicyId` with `b2c_1_signupsignin1`. Replace the value for `ida:EditProfilePolicyId` with `b2c_1_profileediting1`. Replace the value for `ida:ResetPasswordPolicyId` with `b2c_1_passwordreset1`.
62+
Update the settings in the Web.config file to work with your user flow:
6563

64+
1. Open the **B2C-WebAPI-DotNet** solution in Visual Studio.
65+
1. In the **TaskWebApp** project, open the **Web.config** file.
66+
1. Replace the value of `ida:Tenant` and `ida:AadInstance` with the name of the tenant that you created.
67+
1. Replace the value of `ida:ClientId` with the application ID that you recorded.
68+
1. Replace the value of `ida:ClientSecret` with the key that you recorded. You must XML-encode the client secret before adding it to your Web.config.
69+
1. Replace the value of `ida:SignUpSignInPolicyId` with `b2c_1_signupsignin1`.
70+
1. Replace the value of `ida:EditProfilePolicyId` with `b2c_1_profileediting1`.
71+
1. Replace the value of `ida:ResetPasswordPolicyId` with `b2c_1_passwordreset1`.
6672

6773
## Run the sample
6874

-47 KB
Loading
-40.1 KB
Loading
18.9 KB
Loading

articles/active-directory/devices/hybrid-azuread-join-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Hybrid Azure AD join is currently not supported if your environment consists of
7474

7575
Hybrid Azure AD join is currently not supported when using virtual desktop infrastructure (VDI).
7676

77-
Hybrid Azure AD join is supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2 . If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Hybrid Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support.
77+
Hybrid Azure AD join is supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Hybrid Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support. Starting from WIndows 10 1903 release, TPMs 1.2 are not used for hybrid Azure AD join and devices with those TPMs will be considered as if they don't have a TPM.
7878

7979
Hybrid Azure AD join is not supported for Windows Server running the Domain Controller (DC) role.
8080

articles/active-directory/user-help/multi-factor-authentication-end-user-app-passwords.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,12 +24,10 @@ ms.collection: M365-identity-device-management
2424
2525
When using app passwords, it's important to remember:
2626

27-
- App passwords are auto-generated and only entered once per app.
27+
- App passwords are auto-generated, and should be created and entered once per app.
2828

2929
- There's a limit of 40 passwords per user. If you try to create one after that limit, you'll be prompted to delete an existing password before being allowed to create the new one.
3030

31-
- Use one app password per device, not per app. For example, create a single password for all the apps on your laptop, and then another single password for all the apps on your desktop.
32-
3331
>[!Note]
3432
>Office 2013 clients (including Outlook) support new authentication protocols and can be used with two-step verification. This support means that after two-step verification is turned on, you'll no longer need app passwords for Office 2013 clients. For more info, see the [How modern authentication works for Office 2013 and Office 2016 client apps](https://support.office.com/article/how-modern-authentication-works-for-office-2013-and-office-2016-client-apps-e4c45989-4b1a-462e-a81b-2a13191cf517) article.
3533

0 commit comments

Comments
 (0)