Skip to content

Commit b821816

Browse files
committed
2 parents d61ea2a + 3883e55 commit b821816

File tree

926 files changed

+9302
-6493
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

926 files changed

+9302
-6493
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -632,6 +632,12 @@
632632
"branch": "master",
633633
"branch_mapping": {}
634634
},
635+
{
636+
"path_to_root": "samples-cosmosdb-mongodb-javascript",
637+
"url": "https://github.com/Azure-Samples/cosmos-db-mongodb-api-javascript-samples",
638+
"branch": "main",
639+
"branch_mapping": {}
640+
},
635641
{
636642
"path_to_root": "samples-cosmosdb-java-v4-web-app",
637643
"url": "https://github.com/Azure-Samples/azure-cosmos-java-sql-api-todo-app",

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -355,6 +355,11 @@
355355
"redirect_url": "/azure/active-directory/saas-apps/mimecast-personal-portal-tutorial",
356356
"redirect_document_id": false
357357
},
358+
{
359+
"source_path_from_root": "/articles/active-directory/saas-apps/carlsonwagonlit-tutorial.md",
360+
"redirect_url": "/azure/active-directory/saas-apps/cwt-tutorial",
361+
"redirect_document_id": false
362+
},
358363
{
359364
"source_path_from_root": "/articles/active-directory/active-directory-saas-fax.plus-tutorial.md",
360365
"redirect_url": "/articles/active-directory/saas-apps/fax-plus-tutorial",

.openpublishing.redirection.azure-monitor.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@
203203
},
204204
{
205205
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-instances.md" ,
206-
"redirect_url": "/azure/azure-monitor/alerts/alerts-page.md",
206+
"redirect_url": "/azure/azure-monitor/alerts/alerts-page",
207207
"redirect_document_id": false
208208
},
209209
{

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -754,6 +754,11 @@
754754
"redirect_url": "/azure/frontdoor/create-front-door-cli",
755755
"redirect_document_id": false
756756
},
757+
{
758+
"source_path_from_root": "/articles/cdn/index.yml",
759+
"redirect_url": "/azure/frontdoor",
760+
"redirect_document_id": false
761+
},
757762
{
758763
"source_path_from_root": "/articles/app-service-web/web-sites-dotnet-deploy-aspnet-mvc-app-membership-oauth-sql-database.md",
759764
"redirect_url": "/aspnet/core/security/authorization/secure-data",
@@ -2399,6 +2404,21 @@
23992404
"redirect_url": "/azure/aks/ingress-tls",
24002405
"redirect_document_id": true
24012406
},
2407+
{
2408+
"source_path_from_root": "/articles/aks/ingress-internal-ip.md",
2409+
"redirect_url": "/azure/aks/ingress-basic",
2410+
"redirect_document_id": false
2411+
},
2412+
{
2413+
"source_path_from_root": "/articles/aks/ingress-own-tls.md",
2414+
"redirect_url": "/azure/aks/ingress-tls",
2415+
"redirect_document_id": false
2416+
},
2417+
{
2418+
"source_path_from_root": "/articles/aks/ingress-static-ip.md",
2419+
"redirect_url": "/azure/aks/ingress-tls",
2420+
"redirect_document_id": false
2421+
},
24022422
{
24032423
"source_path_from_root": "/articles/container-service/kubernetes/container-service-kubernetes-jenkins.md",
24042424
"redirect_url": "/azure/aks/jenkins-continuous-deployment",
@@ -18991,6 +19011,16 @@
1899119011
"redirect_url": "/azure/logic-apps/logic-apps-exception-handling",
1899219012
"redirect_document_id": false
1899319013
},
19014+
{
19015+
"source_path_from_root": "/articles/machine-learning/tutorial-power-bi-automated-model.md",
19016+
"redirect_url": "/azure/machine-learning/tutorial-power-bi-custom-model",
19017+
"redirect_document_id": false
19018+
},
19019+
{
19020+
"source_path_from_root": "/articles/machine-learning/tutorial-power-bi-designer-model.md",
19021+
"redirect_url": "/azure/machine-learning/tutorial-power-bi-custom-model",
19022+
"redirect_document_id": false
19023+
},
1899419024
{
1899519025
"source_path_from_root": "/articles/cognitive-services/LinguisticAnalysisAPI/AnalyzeMethod.md",
1899619026
"redirect_url": "/azure/machine-learning/classic-module-reference/text-analytics",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -222,6 +222,8 @@
222222
href: force-password-reset.md
223223
- name: Profile editing policy
224224
href: add-profile-editing-policy.md
225+
- name: Client credentials policy
226+
href: client-credentials-grant-flow.md
225227
- name: Resource owner password credentials policy
226228
href: add-ropc-policy.md
227229
displayName: ROPC

articles/active-directory-b2c/add-api-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -262,7 +262,7 @@ Content-type: application/json
262262
{
263263
"clientId": "231c70e8-8424-48ac-9b5d-5623b9e4ccf3",
264264
"step": "PreTokenApplicationClaims",
265-
"ui_locales":"en-US"
265+
"ui_locales":"en-US",
266266
"email": "[email protected]",
267267
"identities": [
268268
{

articles/active-directory-b2c/application-types.md

Lines changed: 6 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/30/2022
12+
ms.date: 06/14/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

@@ -72,6 +72,7 @@ To see this scenario in action, try one of the web application sign in code samp
7272
In addition to facilitating simple sign in, a web server application might also need to access a back-end web service. In this case, the web application can perform a slightly different [OpenID Connect flow](openid-connect.md) and acquire tokens by using authorization codes and refresh tokens. This scenario is depicted in the following [Web APIs section](#web-apis).
7373

7474
## Single-page applications
75+
7576
Many modern web applications are built as client-side single-page applications ("SPAs"). Developers write them by using JavaScript or a SPA framework such as Angular, Vue, and React. These applications run on a web browser and have different authentication characteristics than traditional server-side web applications.
7677

7778
Azure AD B2C provides **two** options to enable single-page applications to sign in users and get tokens to access back-end services or web APIs:
@@ -129,21 +130,15 @@ Applications that are installed on devices, such as mobile and desktop applicati
129130

130131
In this flow, the application executes [policies](user-flow-overview.md) and receives an `authorization_code` from Azure AD after the user completes the policy. The `authorization_code` represents the application's permission to call back-end services on behalf of the user who is currently signed in. The application can then exchange the `authorization_code` in the background for an `access_token` and a `refresh_token`. The application can use the `access_token` to authenticate to a back-end web API in HTTP requests. It can also use the `refresh_token` to get a new `access_token` when an older one expires.
131132

132-
## Current limitations
133-
134-
### Unsupported application types
135-
136-
#### Daemons/server-side applications
133+
## Daemons/server-side applications
137134

138135
Applications that contain long-running processes or that operate without the presence of a user also need a way to access secured resources such as web APIs. These applications can authenticate and get tokens by using their identities (rather than a user's delegated identity) and by using the OAuth 2.0 client credentials flow. Client credential flow isn't the same as on-behalf-flow and on-behalf-flow shouldn't be used for server-to-server authentication.
139136

140-
Although the OAuth 2.0 client credentials grant flow isn't currently directly supported by the Azure AD B2C authentication service, you can set up client credential flow using Azure AD and the Microsoft identity platform /token (https://login.microsoftonline.com/your-tenant-name.onmicrosoft.com/oauth2/v2.0/token) endpoint for an application in your Azure AD B2C tenant. An Azure AD B2C tenant shares some functionality with Azure AD enterprise tenants.
141-
142-
To set up client credential flow, see [Azure Active Directory v2.0 and the OAuth 2.0 client credentials flow](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md). A successful authentication results in the receipt of a token formatted so that it can be used by Azure AD as described in [Azure AD token reference](../active-directory/develop/id-tokens.md).
137+
The [OAuth 2.0 client credentials flow](./client-credentials-grant-flow.md) is currently in public preview. You can also set up client credential flow using Azure AD and the Microsoft identity platform /token endpoint (`https://login.microsoftonline.com/your-tenant-name.onmicrosoft.com/oauth2/v2.0/token`) for a [Microsoft Graph application](microsoft-graph-get-started.md) or your own application. For more information, check out the [Azure AD token reference](../active-directory/develop/id-tokens.md) article.
143138

144-
For instructions on registering a management application, see [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-get-started.md).
139+
## Unsupported application types
145140

146-
#### Web API chains (on-behalf-of flow)
141+
### Web API chains (on-behalf-of flow)
147142

148143
Many architectures include a web API that needs to call another downstream web API, where both are secured by Azure AD B2C. This scenario is common in native clients that have a Web API back-end and calls a Microsoft online service such as the Microsoft Graph API.
149144

0 commit comments

Comments
 (0)