Skip to content

Commit bd7caa0

Browse files
authored
Merge pull request #263463 from v-thepet/final
PostgreSQL: Last? dirty PR for release branch merge conflict with upstream main
2 parents 8a50c18 + 0d15ed6 commit bd7caa0

File tree

451 files changed

+3281
-1352
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

451 files changed

+3281
-1352
lines changed

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: reference
12-
ms.date: 01/11/2024
12+
ms.date: 01/17/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

1616

17-
#Customer intent: As a developer using Azure Active Directory B2C custom policies, I want to understand how to use claim resolvers in my technical profiles, so that I can provide context information about authorization requests and populate claims with dynamic values.
17+
#Customer intent: As a developer using Azure AD B2C custom policies, I want to understand how to use claim resolvers in my technical profiles, so that I can provide context information about authorization requests and populate claims with dynamic values.
1818

1919
---
2020

@@ -122,6 +122,17 @@ Any parameter name included as part of an OIDC or OAuth2 request can be mapped t
122122
| {OAUTH-KV:loyalty_number} | A query string parameter. | 1234 |
123123
| {OAUTH-KV:any custom query string} | A query string parameter. | N/A |
124124

125+
## SAML key-value parameters
126+
127+
In a SAML authentication request, any parameter name that's included in the request, but isn’t specific to the protocol (such as SAMLRequest) can be mapped to a claim in the user journey. For example, the request may include a custom parameter such as `username`. This applies to both SP-Initiated and IDP-Initiated SAML requests.
128+
129+
| Claim | Description | Example |
130+
| ----- | ----------------------- | --------|
131+
| {SAML-KV:username} | A query string or POST body parameter. | [email protected] |
132+
| {SAML-KV:loyalty_number} | A query string or POST body parameter. | 1234 |
133+
| {SAML-KV:any custom query string} | A query string or POST body parameter. | N/A |
134+
135+
125136
## SAML
126137

127138
The following table lists the claim resolvers with information about the SAML authorization request:

articles/active-directory-b2c/configure-authentication-sample-python-web-app.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -86,24 +86,21 @@ Extract the sample file to a folder where the total length of the path is 260 or
8686

8787
In the project's root directory, follow these steps:
8888

89-
1. Rename the *app_config.py* file to *app_config.py.OLD*.
90-
1. Rename the *app_config_b2c.py* file to *app_config.py*. This file contains information about your Azure AD B2C identity provider.
91-
92-
1. Create an `.env` file in the root folder of the project using `.env.sample.b2c` as a guide.
89+
1. Create an `.env` file in the root folder of the project using `.env.sample` as a guide.
9390

9491
```shell
9592
FLASK_DEBUG=True
96-
TENANT_NAME=<tenant name>
93+
B2C_TENANT_NAME=<tenant name>
9794
CLIENT_ID=<client id>
9895
CLIENT_SECRET=<client secret>
99-
SIGNUPSIGNIN_USER_FLOW=B2C_1_profile_editing
100-
EDITPROFILE_USER_FLOW=B2C_1_reset_password
101-
RESETPASSWORD_USER_FLOW=B2C_1_signupsignin1
96+
SIGNUPSIGNIN_USER_FLOW=B2C_1_signupsignin1
97+
EDITPROFILE_USER_FLOW=B2C_1_profile_editing
98+
RESETPASSWORD_USER_FLOW=B2C_1_reset_password
10299
```
103100

104101
|Key |Value |
105102
|---------|---------|
106-
|`TENANT_NAME`| The first part of your Azure AD B2C [tenant name](tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `contoso`). |
103+
|`B2C_TENANT_NAME`| The first part of your Azure AD B2C [tenant name](tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `contoso`). |
107104
|`CLIENT_ID`| The web API application ID from [step 2.1](#step-21-register-the-app).|
108105
|`CLIENT_SECRET`| The client secret value you created in [step 2.2](#step-22-create-a-web-app-client-secret). |
109106
|`*_USER_FLOW`|The user flows you created in [step 1](#step-1-configure-your-user-flow).|

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
177177
| ------- | :--: | ----- |
178178
| Azure portal | GA | |
179179
| [Application Insights user journey logs](troubleshoot-with-application-insights.md) | Preview | Used for troubleshooting during development. |
180-
| [Application Insights event logs](analytics-with-application-insights.md) | Preview | Used to monitor user flows in production. |
180+
| [Application Insights event logs](analytics-with-application-insights.md) | Preview | Used to monitor user flows and custom policies in production. |
181181

182182
## Other features
183183

articles/active-directory-b2c/identity-provider-facebook.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
5353
1. Select **Save Changes**.
5454
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
5555
1. From the menu, select **Facebook Login**, select **Settings**.
56-
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-id.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-id.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-id` with the id of your tenant, and `your-domain-name` with your custom domain.
56+
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-id.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-id` with the id of your tenant, and `your-domain-name` with your custom domain.
5757
1. Select **Save Changes** at the bottom of the page.
5858
1. To make your Facebook application available to Azure AD B2C, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
5959

articles/active-directory-b2c/openid-connect.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Error responses can also be sent to the `redirect_uri` parameter so that the app
9494
```http
9595
GET https://jwt.ms/#
9696
error=access_denied
97-
&error_description=the+user+canceled+the+authentication
97+
&error_description=AADB2C90091%3a+The+user+has+cancelled+entering+self-asserted+information.%0d%0aCorrelation+ID%3a+xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx%0d%0aTimestamp%3a+xxxx-xx-xx+xx%3a23%3a27Z%0d%0a
9898
&state=arbitrary_data_you_can_receive_in_the_response
9999
```
100100

@@ -202,8 +202,8 @@ Error responses look like:
202202

203203
```json
204204
{
205-
"error": "access_denied",
206-
"error_description": "The user revoked access to the app."
205+
"error": "invalid_grant",
206+
"error_description": "AADB2C90080: The provided grant has expired. Please re-authenticate and try again. Current time: xxxxxxxxxx, Grant issued time: xxxxxxxxxx, Grant expiration time: xxxxxxxxxx\r\nCorrelation ID: xxxxxxxx-xxxx-xxxX-xxxx-xxxxxxxxxxxx\r\nTimestamp: xxxx-xx-16 xx:10:52Z\r\n"
207207
}
208208
```
209209

@@ -279,8 +279,8 @@ Error responses look like:
279279

280280
```json
281281
{
282-
"error": "access_denied",
283-
"error_description": "The user revoked access to the app.",
282+
"error": "invalid_grant",
283+
"error_description": "AADB2C90129: The provided grant has been revoked. Please reauthenticate and try again.\r\nCorrelation ID: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\r\nTimestamp: xxxx-xx-xx xx:xx:xxZ\r\n",
284284
}
285285
```
286286

@@ -318,4 +318,4 @@ To set the required ID Token in logout requests, see [Configure session behavior
318318

319319
## Next steps
320320

321-
- Learn more about [Azure AD B2C session](session-behavior.md).
321+
- Learn more about [Azure AD B2C session](session-behavior.md).

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -276,13 +276,13 @@ The following example shows a C# class that returns an error message:
276276
```csharp
277277
public class ResponseContent
278278
{
279-
public string version { get; set; }
280-
public int status { get; set; }
281-
public string code { get; set; }
282-
public string userMessage { get; set; }
283-
public string developerMessage { get; set; }
284-
public string requestId { get; set; }
285-
public string moreInfo { get; set; }
279+
public string Version { get; set; }
280+
public int Status { get; set; }
281+
public string Code { get; set; }
282+
public string UserMessage { get; set; }
283+
public string DeveloperMessage { get; set; }
284+
public string RequestId { get; set; }
285+
public string MoreInfo { get; set; }
286286
}
287287
```
288288

articles/active-directory-b2c/userinfo-endpoint.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ ms.service: active-directory
99

1010
ms.topic: reference
1111
ms.date: 01/11/2024
12+
1213
ms.author: kengaderdus
1314
ms.subservice: B2C
1415
zone_pivot_groups: b2c-policy-type

articles/active-directory-b2c/userjourneys.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,12 @@ manager: CelesteDG
88
ms.service: active-directory
99

1010
ms.topic: reference
11-
ms.date: 01/11/2024
11+
ms.date: 01/17/2024
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414

1515

16-
#Customer intent: As a developer integrating Azure AD B2C into an application, I want to understand how user journeys, authorization technical profiles, orchestration steps, preconditions, claims provider selection, claims exchanges, and journey lists work, so that I can configure the policy file correctly and ensure a successful user flow.
17-
16+
#Customer intent: As a developer integrating Azure AD B2C into an application, I want to understand how custom policy user journeys work so that I can design the steps that a users goes through for the relying party application to obtain the desired claims for a user.
1817
---
1918

2019
# UserJourneys
@@ -92,7 +91,7 @@ A user journey is represented as an orchestration sequence that must be followed
9291

9392
Orchestration steps can be conditionally executed based on preconditions defined in the orchestration step element. For example, you can check to perform an orchestration step only if a specific claim exists, or if a claim is equal or not to the specified value.
9493

95-
To specify the ordered list of orchestration steps, an **OrchestrationSteps** element is added as part of the policy. This element is required.
94+
To specify the ordered list of orchestration steps, an **OrchestrationSteps** element is added as part of the policy. This element is required.
9695

9796
```xml
9897
<UserJourney Id="SignUpOrSignIn">
@@ -111,7 +110,7 @@ The **OrchestrationStep** element contains the following attributes:
111110

112111
| Attribute | Required | Description |
113112
| --------- | -------- | ----------- |
114-
| `Order` | Yes | The order of the orchestration steps. |
113+
| `Order` | Yes | The order of the orchestration steps. The value of the `Order` attribute starts at `1` through `N`. So, if you've 10 steps and you delete the second step, you need to renumber the steps three to 10 to become two to nine. |
115114
| `Type` | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**GetClaims** - Specifies that the orchestration step should process claim data sent to Azure AD B2C from the relying party via its `InputClaims` configuration.</li><li>**InvokeSubJourney** - Indicates that the orchestration step exchanges claims with a [sub journey](subjourneys.md).</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
116115
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples - if the type of the orchestration step is one of following: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`, Azure AD B2C needs to display the identity provider selection without having a technical profile. |
117116
| CpimIssuerTechnicalProfileReferenceId | No | The type of the orchestration step is `SendClaims`. This property defines the technical profile identifier of the claims provider that issues the token for the relying party. If absent, no relying party token is created. |

articles/ai-services/Anomaly-Detector/quickstarts/client-libraries-multivariate.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,8 @@ ms.topic: quickstart
1111
ms.date: 10/27/2022
1212
ms.author: mbullwin
1313
keywords: anomaly detection, algorithms
14-
ms.devlang: csharp, java, javascript, python
14+
ms.devlang: csharp
15+
# ms.devlang: csharp, java, javascript, python
1516
ms.custom: mode-api, devx-track-dotnet, devx-track-extended-java, devx-track-js, devx-track-python
1617
---
1718

articles/ai-services/Anomaly-Detector/quickstarts/client-libraries.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,8 @@ ms.topic: quickstart
1111
ms.date: 10/27/2022
1212
ms.author: mbullwin
1313
keywords: anomaly detection, algorithms
14-
ms.devlang: csharp, javascript, python
14+
ms.devlang: csharp
15+
# ms.devlang: csharp, javascript, python
1516
recommendations: false
1617
ms.custom: devx-track-python, devx-track-js, devx-track-csharp, cog-serv-seo-aug-2020, mode-api, devx-track-dotnet, devx-track-extended-java
1718
---

0 commit comments

Comments
 (0)