Skip to content

Commit bb6d5e7

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into aca/quotas
2 parents 6fbea2f + 96fa905 commit bb6d5e7

File tree

624 files changed

+7242
-3372
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

624 files changed

+7242
-3372
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6313,6 +6313,11 @@
63136313
"redirect_url": "/azure/azure-app-configuration/quickstart-azure-functions-csharp",
63146314
"redirect_document_id": false
63156315
},
6316+
{
6317+
"source_path_from_root": "/articles/azure-arc/data/reference/reference-az-sql-mi-arc-dag.md",
6318+
"redirect_url": "/azure/azure-arc/data/reference/reference-az-sql-instance-failover-group-arc",
6319+
"redirect_document_id":true
6320+
},
63166321
{
63176322
"source_path_from_root": "/articles/azure-arc/data/retrieve-the-username-password-for-data-controller.md",
63186323
"redirect_url": "/azure/azure-arc/data/update-service-principal-credentials",

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Please use the Feedback tool at the bottom of any article to submit bugs and sug
2222

2323
### Editing in GitHub
2424

25-
Follow the guidance for [Quick edits to existing documents](https://docs.microsoft.com/contribute/#quick-edits-to-existing-documents) in our contributor guide.
25+
Follow the guidance for [Quick edits to existing documents](https://docs.microsoft.com/contribute/#quick-edits-to-documentation) in our contributor guide.
2626

2727
### Pull requests
2828

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -671,7 +671,7 @@
671671
- name: Resources
672672
items:
673673
- name: Azure Roadmap
674-
href: https://azure.microsoft.com/roadmap/?category=security-identity
674+
href: https://azure.microsoft.com/updates/?status=nowavailable,inpreview,indevelopment&category=identity,security&query=b2c
675675
- name: Frequently asked questions
676676
href: ./faq.yml
677677
displayName: FAQ

articles/active-directory-b2c/configure-authentication-sample-angular-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ export const b2cPolicies = {
145145
export const msalConfig: Configuration = {
146146
auth: {
147147
clientId: '<your-MyApp-application-ID>',
148-
authority: b2cPolicies.authorities.signUpSignIn,
148+
authority: b2cPolicies.authorities.signUpSignIn.authority,
149149
knownAuthorities: [b2cPolicies.authorityDomain],
150150
redirectUri: '/',
151151
},

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 04/30/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -156,7 +156,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
156156
| ------- | :--: | ----- |
157157
| [MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods) | Preview | Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
158158
| [Phone factor authentication](phone-factor-technical-profile.md) | GA | |
159-
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | Preview | |
159+
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | GA | |
160160
| [One-time password](one-time-password-technical-profile.md) | GA | |
161161
| [Azure Active Directory](active-directory-technical-profile.md) as local directory | GA | |
162162
| [Predicate validations](predicates.md) | GA | For example, password complexity. |
@@ -168,8 +168,8 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
168168
| Feature | Custom policy | Notes |
169169
| ------- | :--: | ----- |
170170
| Azure portal | GA | |
171-
| [Application Insights user journey logs](troubleshoot-with-application-insights.md) | Preview | Used for troubleshooting during development. |
172-
| [Application Insights event logs](analytics-with-application-insights.md) | Preview | Used to monitor user flows in production. |
171+
| [Application Insights user journey logs](troubleshoot-with-application-insights.md) | GA | Used for troubleshooting during development. |
172+
| [Application Insights event logs](analytics-with-application-insights.md) | GA | Used to monitor user flows in production. |
173173

174174
## Responsibilities of custom policy feature-set developers
175175

articles/active-directory-b2c/deploy-custom-policies-devops.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/25/2022
12+
ms.date: 04/30/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---

articles/active-directory-b2c/multi-factor-auth-technical-profile.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 04/30/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -18,8 +18,6 @@ ms.subservice: B2C
1818

1919
Azure Active Directory B2C (Azure AD B2C) provides support for verifying a phone number by using a verification code, or verifying a Time-based One-time Password (TOTP) code.
2020

21-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
22-
2321
## Protocol
2422

2523
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C:
@@ -168,9 +166,9 @@ The following example shows an Azure AD MFA technical profile used to verify the
168166

169167
In this mode, the user is required to install any authenticator app that supports time-based one-time password (TOTP) verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app), on a device that they own.
170168

171-
During the first sign-up or sign-in, the user scans a QR code, opens a deep link, or enters the code manually using the authenticator app. To verify the TOTP code, use the [Begin verify OTP](#begin-verify-totp) followed by [Verify TOTP](#verify-totp) validation technical profiles.
169+
During the first sign up or sign in, the user scans a QR code, opens a deep link, or enters the code manually using the authenticator app. To verify the TOTP code, use the [Begin verify OTP](#begin-verify-totp) followed by [Verify TOTP](#verify-totp) validation technical profiles.
172170

173-
For subsequent sign-ins, use the [Get available devices](#get-available-devices) method to check if the user has already enrolled their device. If the number of available devices is greater than zero, this indicates the user has enrolled before. In this case, the user needs to type the TOTP code that appears in the authenticator app.
171+
For subsequent sign ins, use the [Get available devices](#get-available-devices) method to check if the user has already enrolled their device. If the number of available devices is greater than zero, this indicates the user has enrolled before. In this case, the user needs to type the TOTP code that appears in the authenticator app.
174172

175173
The technical profile:
176174

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/17/2022
12+
ms.date: 04/30/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -50,8 +50,6 @@ In a self-asserted technical profile, you can use the **InputClaims** and **Inpu
5050

5151
## Display claims
5252

53-
The display claims feature is currently in **preview**.
54-
5553
The **DisplayClaims** element contains a list of claims to be presented on the screen for collecting data from the user. To prepopulate the values of display claims, use the input claims that were previously described. The element may also contain a default value.
5654

5755
The order of the claims in **DisplayClaims** specifies the order in which Azure AD B2C renders the claims on the screen. To force the user to provide a value for a specific claim, set the **Required** attribute of the **DisplayClaim** element to `true`.
@@ -133,7 +131,7 @@ Use output claims when:
133131
- **Claims are output by output claims transformation**.
134132
- **Setting a default value in an output claim** without collecting data from the user or returning the data from the validation technical profile. The `LocalAccountSignUpWithLogonEmail` self-asserted technical profile sets the **executed-SelfAsserted-Input** claim to `true`.
135133
- **A validation technical profile returns the output claims** - Your technical profile may call a validation technical profile that returns some claims. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. For example, when signing in with a local account, the self-asserted technical profile named `SelfAsserted-LocalAccountSignin-Email` calls the validation technical profile named `login-NonInteractive`. This technical profile validates the user credentials and also returns the user profile. Such as 'userPrincipalName', 'displayName', 'givenName' and 'surName'.
136-
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. The display control feature is currently in **preview**.
134+
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey.
137135

138136
The following example demonstrates the use of a self-asserted technical profile that uses both display claims and output claims.
139137

articles/active-directory-b2c/string-transformations.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1178,6 +1178,9 @@ Returns a string array that contains the substrings in this instance that are de
11781178
| InputParameter | delimiter | string | The string to use as a separator, such as comma `,`. |
11791179
| OutputClaim | outputClaim | stringCollection | A string collection whose elements contain the substrings in this string that are delimited by the `delimiter` input parameter. |
11801180

1181+
> [!NOTE]
1182+
> Any existing elements in the `OutputClaim` stringCollection will be removed.
1183+
11811184
### Example of StringSplit
11821185

11831186
The following example takes a comma delimiter string of user roles, and converts it to a string collection.

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 11/30/2021
12+
ms.date: 04/30/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -99,7 +99,7 @@ The **TechnicalProfile** element contains the following elements:
9999
| InputClaimsTransformations | 0:1 | A list of previously defined references to claims transformations that should be executed before any claims are sent to the claims provider or the relying party. |
100100
| InputClaims | 0:1 | A list of previously defined references to claim types that are taken as input in the technical profile. |
101101
| PersistedClaims | 0:1 | A list of previously defined references to claim types that will be persisted by the technical profile. |
102-
| DisplayClaims | 0:1 | A list of previously defined references to claim types that are presented by the [self-asserted technical profile](self-asserted-technical-profile.md). The DisplayClaims feature is currently in preview. |
102+
| DisplayClaims | 0:1 | A list of previously defined references to claim types that are presented by the [self-asserted technical profile](self-asserted-technical-profile.md). |
103103
| OutputClaims | 0:1 | A list of previously defined references to claim types that are taken as output in the technical profile. |
104104
| OutputClaimsTransformations | 0:1 | A list of previously defined references to claims transformations that should be executed after the claims are received from the claims provider. |
105105
| ValidationTechnicalProfiles | 0:n | A list of references to other technical profiles that the technical profile uses for validation purposes. For more information, see [Validation technical profile](validation-technical-profile.md).|

0 commit comments

Comments
 (0)