Skip to content

Commit b956aa2

Browse files
authored
Merge pull request #184005 from MicrosoftDocs/master
1/03 PM Publish
2 parents 982fac5 + 51f9d37 commit b956aa2

File tree

153 files changed

+864
-1531
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

153 files changed

+864
-1531
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -820,6 +820,7 @@
820820
".openpublishing.redirection.azure-web-pubsub.json",
821821
".openpublishing.redirection.azure-monitor.json",
822822
".openpublishing.redirection.azure-percept.json",
823+
".openpublishing.redirection.azure-productivity.json",
823824
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
824825
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
825826
"articles/azure-relay/.openpublishing.redirection.relay.json",

.openpublishing.redirection.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17939,8 +17939,8 @@
1793917939
},
1794017940
{
1794117941
"source_path_from_root": "/articles/lab-services/classroom-labs/classroom-labs-overview.md",
17942-
"redirect_url": "/azure/lab-services/classroom-labs-overview",
17943-
"redirect_document_id": true
17942+
"redirect_url": "/azure/lab-services/get-started-manage-labs",
17943+
"redirect_document_id": false
1794417944
},
1794517945
{
1794617946
"source_path_from_root": "/articles/lab-services/classroom-labs/classroom-labs-scenarios.md",
@@ -45169,4 +45169,4 @@
4516945169
"redirect_document_id": false
4517045170
}
4517145171
]
45172-
}
45172+
}

articles/active-directory-b2c/session-behavior.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -275,7 +275,7 @@ During the sign-out, Azure AD B2C simultaneously sends an HTTP request to the re
275275
To support single sign-out, the token issuer technical profiles for both JWT and SAML must specify:
276276

277277
- The protocol name, such as `<Protocol Name="OpenIdConnect" />`
278-
- The reference to the session technical profile, such as `UseTechnicalProfileForSessionManagement ReferenceId="SM-OAuth-issuer" />`.
278+
- The reference to the session technical profile, such as `UseTechnicalProfileForSessionManagement ReferenceId="SM-jwt-issuer" />`.
279279

280280
The following example illustrates the JWT and SAML token issuers with single sign-out:
281281

@@ -289,11 +289,11 @@ The following example illustrates the JWT and SAML token issuers with single sig
289289
<Protocol Name="OpenIdConnect" />
290290
<OutputTokenFormat>JWT</OutputTokenFormat>
291291
...
292-
<UseTechnicalProfileForSessionManagement ReferenceId="SM-OAuth-issuer" />
292+
<UseTechnicalProfileForSessionManagement ReferenceId="SM-jwt-issuer" />
293293
</TechnicalProfile>
294294

295295
<!-- Session management technical profile for OIDC based tokens -->
296-
<TechnicalProfile Id="SM-OAuth-issuer">
296+
<TechnicalProfile Id="SM-jwt-issuer">
297297
<DisplayName>Session Management Provider</DisplayName>
298298
<Protocol Name="Proprietary" Handler="Web.TPEngine.SSO.OAuthSSOSessionProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
299299
</TechnicalProfile>

articles/active-directory/app-proxy/what-is-application-proxy.md

Lines changed: 14 additions & 14 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/tutorial-v2-javascript-spa.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -436,8 +436,8 @@ The `acquireTokenSilent` method handles token acquisition and renewal without an
436436

437437
```JavaScript
438438
const graphConfig = {
439-
graphMeEndpoint: "Enter_the_Graph_Endpoint_Herev1.0/me",
440-
graphMailEndpoint: "Enter_the_Graph_Endpoint_Herev1.0/me/messages"
439+
graphMeEndpoint: "Enter_the_Graph_Endpoint_Here/v1.0/me",
440+
graphMailEndpoint: "Enter_the_Graph_Endpoint_Here/v1.0/me/messages"
441441
};
442442
```
443443

@@ -481,6 +481,10 @@ In the sample application created by this guide, the `callMSGraph()` method is u
481481
```
482482
1. In your browser, enter **http://localhost:3000** or **http://localhost:{port}**, where *port* is the port that your web server is listening to. You should see the contents of your *index.html* file and the **Sign In** button.
483483

484+
485+
> [!Important]
486+
> Enable popups and redirects for your site in your browser settings.
487+
484488
After the browser loads your *index.html* file, select **Sign In**. You're prompted to sign in with the Microsoft identity platform:
485489

486490
![The JavaScript SPA account sign-in window](media/active-directory-develop-guidedsetup-javascriptspa-test/javascriptspascreenshot1.png)

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -347,7 +347,7 @@ az vmss identity assign --name myVMSS --resource-group AzureADLinuxVM
347347
2. Install the Azure AD extension on your virtual machine scale set.
348348

349349
```azurecli
350-
az vmss extension set --publisher Microsoft.Azure.ActiveDirectory --name Azure ADSSHLoginForLinux --resource-group AzureADLinuxVM --vmss-name myVMSS
350+
az vmss extension set --publisher Microsoft.Azure.ActiveDirectory --name AADSSHLoginForLinux --resource-group AzureADLinuxVM --vmss-name myVMSS
351351
```
352352

353353
Virtual machine scale sets usually don't have public IP addresses, so you must have connectivity to them from another machine that can reach their Azure virtual network. This example shows how to use the private IP of a virtual machine scale set VM to connect from a machine in the same virtual network.
76.1 KB
Loading
73.2 KB
Loading

0 commit comments

Comments
 (0)