Skip to content

Commit bfcb1f2

Browse files
author
Muhammad Sehgal (Aquent LLC)
committed
Merge branch 'docsMetaDescription' of https://github.com/walsehgal/azure-docs-pr into docsMetaDescription
2 parents d402882 + bdaf002 commit bfcb1f2

File tree

1,959 files changed

+25081
-11106
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,959 files changed

+25081
-11106
lines changed

.gitignore

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,5 +22,5 @@ articles/directories.txt
2222
AzureMigration.ps1
2323

2424
!/.vscode/extensions.json
25-
articles/data-lake-analytics/.vscode/settings.json
2625
.gitignore
26+
**/.vscode/settings.json

.openpublishing.redirection.json

Lines changed: 410 additions & 325 deletions
Large diffs are not rendered by default.

CODEOWNERS

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,17 @@
11
# Testing the new code owners feature in GitHub. Please contact Cory Fowler if you have questions.
2-
# articles/storage/ @tamram @robinsh
3-
# articles/virtual-machines/ @iainfoulds @cynthn
4-
# articles/virtual-machines/linux/ @iainfoulds @cynthn
5-
# articles/virtual-machines/windows/ @iainfoulds @cynthn
6-
# articles/application-insights/ @SergeyKanzhelev
7-
# articles/cosmos-db/ @mimig1
8-
9-
# All Articles
10-
articles/ @apex-docs-pr-reviewers
11-
122
# Cognitive Services
133
articles/cognitive-services/ @diberry @erhopf, @nitinme
144

155
# DevOps
16-
176
articles/ansible/ @TomArcherMsft
187
articles/chef/ @TomArcherMsft
198
articles/jenkins/ @TomArcherMsft
209
articles/terraform/ @TomArcherMsft
2110

2211
# Governance
23-
2412
articles/governance/ @DCtheGeek
13+
14+
# Configuration
15+
*.json @SyntaxC4 @snoviking @arob98
16+
.acrolinx-config.edn @MonicaRush @arob98
17+
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking @arob98

FETCH_HEAD

Whitespace-only changes.

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -372,6 +372,8 @@
372372
href: https://azure.microsoft.com/resources/samples/?service=active-directory-b2c
373373
- name: Cookie definitions
374374
href: cookie-definitions.md
375+
- name: Error codes
376+
href: error-codes.md
375377
- name: Region availability & data residency
376378
href: active-directory-b2c-reference-tenant-type.md
377379
- name: Enable billing

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ OpenID Connect is an authentication protocol, built on top of OAuth 2.0, that ca
2020

2121
[OpenID Connect](https://openid.net/specs/openid-connect-core-1_0.html) extends the OAuth 2.0 *authorization* protocol for use as an *authentication* protocol. This authentication protocol allows you to perform single sign-on. It introduces the concept of an *ID token*, which allows the client to verify the identity of the user and obtain basic profile information about the user.
2222

23-
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. If you want to add identity management to your mobile or desktop applications using Azure AD B2C, you should use [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) rather than OpenID Connect. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
23+
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
2424

2525
Azure AD B2C extends the standard OpenID Connect protocol to do more than simple authentication and authorization. It introduces the [user flow parameter](active-directory-b2c-reference-policies.md), which enables you to use OpenID Connect to add user experiences to your application, such as sign-up, sign-in, and profile management.
2626

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ Your custom policy and Azure AD B2C tenant are now ready. Next, create an applic
269269
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
270270
1. Select **App registrations (Preview)**, and then select **New registration**.
271271
1. Enter a **Name** for the application. For example, *SAMLApp1*.
272-
1. Under **Supported account types**, select **Accounts in any organizational directory or any identity provider.**
272+
1. Under **Supported account types**, select **Accounts in this organizational directory only**
273273
1. Under **Redirect URI**, select **Web**, and then enter `https://localhost`. You modify this value later in the application registration's manifest.
274274
1. Select **Grant admin consent to openid and offline_access permissions**.
275275
1. Select **Register**.
@@ -281,11 +281,11 @@ For SAML apps, there are several properties you need to configure in the applica
281281
1. In the [Azure portal](https://portal.azure.com), navigate to the application registration that you created in the previous section.
282282
1. Under **Manage**, select **Manifest** to open the manifest editor. You modify several properties in the following sections.
283283

284-
#### IdentifierUri
284+
#### identifierUris
285285

286-
The `IdentifierUri` is a string collection containing user-defined URI(s) that uniquely identify a Web app within its Azure AD B2C tenant. The identifier URI must be from a verified domain within your organization's directory. For example, `https://contoso.onmicrosoft.com/app-name`. Your service provider must set this value in the `Issuer` element of a SAML request.
286+
The `identifierUris` is a string collection containing user-defined URI(s) that uniquely identify a Web app within its Azure AD B2C tenant. Your service provider must set this value in the `Issuer` element of a SAML request.
287287

288-
#### SamlMetadataUrl
288+
#### samlMetadataUrl
289289

290290
This property represents service provider's publicly available metadata URL. The metadata URL can point to a metadata file uploaded to any anonymously accessible endpoint, for example blob storage.
291291

@@ -299,7 +299,7 @@ For this tutorial which uses the SAML test application, use the following value
299299
"samlMetadataUrl":"https://samltestapp2.azurewebsites.net/Metadata",
300300
```
301301

302-
#### ReplyUrlWithType (Optional)
302+
#### replyUrlsWithType (Optional)
303303

304304
If you do not provide a metadata URI, you can explicitly specify the reply URL. This optional property represents the `AssertionConsumerServiceUrl` (`SingleSignOnService` URL in the service provider metadata) and the `BindingType` is assumed to be `HTTP POST`.
305305

@@ -316,7 +316,7 @@ For this tutorial, in which you use the SAML test application, set the `url` pro
316316
],
317317
```
318318

319-
#### LogoutUrl (Optional)
319+
#### logoutUrl (Optional)
320320

321321
This optional property represents the `Logout` URL (`SingleLogoutService` URL in the relying party metadata), and the `BindingType` for this is assumed to be `Http-Redirect`.
322322

0 commit comments

Comments
 (0)