Skip to content

Commit c2dd9b1

Browse files
committed
Merge branch 'main' into release-preview-aml-cli-v2-refresh
2 parents fbd7615 + 27b1f05 commit c2dd9b1

File tree

1,343 files changed

+7053
-119449
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,343 files changed

+7053
-119449
lines changed

.openpublishing.redirection.azure-sql.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -190,6 +190,16 @@
190190
"redirect_url": "/azure/azure-sql/managed-instance/job-automation-managed-instance",
191191
"redirect_document_id": true
192192
},
193+
{
194+
"source_path_from_root": "/articles/azure-sql/managed-instance/link-feature.md",
195+
"redirect_url": "/azure/azure-sql/managed-instance/managed-instance-link-feature-overview",
196+
"redirect_document_id": true
197+
},
198+
{
199+
"source_path_from_root": "/articles/azure-sql/managed-instance/link-feature-best-practices.md",
200+
"redirect_url": "/azure/azure-sql/managed-instance/managed-instance-link-best-practices",
201+
"redirect_document_id": true
202+
},
193203
{
194204
"source_path_from_root": "/articles/azure-sql/database/service-tiers-general-purpose-business-critical.md",
195205
"redirect_url": "/azure/azure-sql/database/service-tiers-vcore",

.openpublishing.redirection.media-services.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -628,12 +628,12 @@
628628
{
629629
"source_path_from_root": "/articles/media-services/latest/asset-create-asset-upload-portal-quickstart.md",
630630
"redirect_url": "/azure/media-services/latest/video-on-demand-simple-portal-quickstart",
631-
"redirect_document_id": true
631+
"redirect_document_id": false
632632
},
633633
{
634634
"source_path_from_root": "/articles/media-services/latest/architecture-design-multi-drm-system.md",
635635
"redirect_url": "/azure/media-services/latest/drm-content-protection-concept",
636-
"redirect_document_id": true
636+
"redirect_document_id": false
637637
},
638638
{
639639
"source_path_from_root": "/articles/media-services/latest/job-create-cli-how-to.md",
@@ -644,7 +644,7 @@
644644
"source_path_from_root": "/articles/media-services/latest/transform-subclip-video-dotnet-how-to.md",
645645
"redirect_url": "/azure/media-services/latest/transform-subclip-video-how-to",
646646
"redirect_document_id": false
647-
},
647+
},
648648
{
649649
"source_path_from_root": "/articles/media-services/latest/transform-subclip-video-rest-how-to.md",
650650
"redirect_url": "/azure/media-services/latest/transform-subclip-video-how-to",
@@ -659,12 +659,12 @@
659659
"source_path_from_root": "/articles/media-services/latest/transform-generate-thumbnails-dotnet-how-to.md",
660660
"redirect_url": "/azure/media-services/latest/transform-generate-thumbnails-how-to",
661661
"redirect_document_id": false
662-
},
662+
},
663663
{
664664
"source_path_from_root": "/articles/media-services/latest/crop-howto.md",
665665
"redirect_url": "/azure/media-services/latest/transform-crop-how-to",
666666
"redirect_document_id": false
667-
},
667+
},
668668
{
669669
"source_path_from_root": "/articles/media-services/latest/transform-custom-preset-cli-how-to.md",
670670
"redirect_url": "/azure/media-services/latest/transform-custom-transform-how-to",
@@ -694,6 +694,6 @@
694694
"source_path_from_root": "/articles/media-services/video-indexer/upload-index-video.md",
695695
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/upload-index-video",
696696
"redirect_document_id": false
697-
}
697+
}
698698
]
699699
}

CODEOWNERS

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@
55
# NOTE: The people you choose as code owners must have _write_ permissions for the repository. When the code owner is a team, that team must be _visible_ and it must have _write_ permissions, even if all the individual members of the team already have write permissions directly, through organization membership, or through another team membership.
66

77
# Azure Policy: Samples and Compliance Controls
8-
/articles/**/policy-reference.md @DCtheGeek
9-
/articles/**/security-controls-policy.md @DCtheGeek
10-
/includes/policy/ @DCtheGeek
8+
/articles/**/policy-reference.md @timwarner
9+
/articles/**/security-controls-policy.md @timwarner
10+
/includes/policy/ @timwarner
1111

1212
# Azure Monitor
1313
articles/azure-monitor/* @bwren
@@ -57,7 +57,7 @@ articles/service-health @rboucher
5757
/articles/container-registry/ @dlepow @mimckitt
5858

5959
# Governance
60-
/articles/governance/ @DCtheGeek
60+
/articles/governance/ @timwarner
6161

6262
# Security
6363
/articles/security/fundamentals/feature-availability.md @msmbaldwin @terrylanfear

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -357,6 +357,8 @@
357357
href: partner-typingdna.md
358358
- name: WhoIAM
359359
href: partner-whoiam.md
360+
- name: xID
361+
href: partner-xid.md
360362
- name: Set up direct sign-in
361363
href: direct-signin.md
362364
- name: Tokens and session management
2.38 KB
Loading
119 KB
Loading

articles/active-directory-b2c/partner-eid-me.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -92,9 +92,7 @@ The following architecture diagram shows the implementation.
9292

9393
[Contact eID-Me](https://bluink.ca/contact) and configure a test or production environment to set up Azure AD B2C tenants as a Relying Party. Tenants must determine what identity claims they'll need from their consumers as they sign up using eID-Me.
9494

95-
## Integrate eID-Me with Azure AD B2C
96-
97-
### Step 1 - Configure an application in eID-Me
95+
## Step 1: Configure an application in eID-Me
9896

9997
To configure your tenant application as a Relying Party in eID-Me the following information should be supplied to eID-Me:
10098

@@ -114,7 +112,7 @@ eID-Me will provide a Client ID and a Client Secret once the Relying Party has b
114112
115113
::: zone pivot="b2c-user-flow"
116114

117-
### Step 2 - Add a new Identity provider in Azure AD B2C
115+
## Step 2: Add a new Identity provider in Azure AD B2C
118116

119117
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as the global administrator of your Azure AD B2C tenant.
120118

@@ -128,7 +126,7 @@ eID-Me will provide a Client ID and a Client Secret once the Relying Party has b
128126

129127
6. Select **Add**.
130128

131-
### Step 3 - Configure an Identity provider
129+
## Step 3: Configure an Identity provider
132130

133131
To configure an identity provider, follow these steps:
134132

@@ -161,11 +159,11 @@ To configure an identity provider, follow these steps:
161159

162160
6. Select **Save** to complete the setup for your new OIDC Identity provider.
163161

164-
### Step 4 - Configure multi-factor authentication
162+
## Step 4: Configure multi-factor authentication
165163

166164
eID-Me is a decentralized digital identity with strong two-factor user authentication built in. Since eID-Me is already a multi-factor authenticator, you don't need to configure any multi-factor authentication settings in your user flows when using eID-Me. eID-Me offers a fast and simple user experience, which also eliminates the need for any additional passwords.
167165

168-
### Step 5 - Create a user flow policy
166+
## Step 5: Create a user flow policy
169167

170168
You should now see eID-Me as a new OIDC Identity provider listed within your B2C identity providers.
171169

@@ -206,7 +204,7 @@ For additional information, review the following articles:
206204
>[!NOTE]
207205
>In Azure AD B2C, [**custom policies**](./user-flow-overview.md) are designed primarily to address complex scenarios. For most scenarios, we recommend that you use built-in [**user flows**](./user-flow-overview.md).
208206
209-
### Step 2 - Create a policy key
207+
## Step 2: Create a policy key
210208

211209
Store the client secret that you previously recorded in your Azure AD B2C tenant.
212210

@@ -232,7 +230,7 @@ Store the client secret that you previously recorded in your Azure AD B2C tenant
232230

233231
11. Select **Create**.
234232

235-
### Step 3- Configure eID-Me as an Identity provider
233+
## Step 3: Configure eID-Me as an Identity provider
236234

237235
To enable users to sign in using eID-Me decentralized identity, you need to define eID-Me as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify a specific user has authenticated using digital ID available on their device, proving the user’s identity.
238236

@@ -430,7 +428,7 @@ There are additional identity claims that eID-Me supports and can be added.
430428

431429
```
432430

433-
### Step 4 - Add a user journey
431+
## Step 4: Add a user journey
434432

435433
At this point, the identity provider has been set up, but it's not yet available in any of the sign-in pages. If you don't have your own custom user journey, create a duplicate of an existing template user journey, otherwise continue to the next step.
436434

@@ -444,7 +442,7 @@ At this point, the identity provider has been set up, but it's not yet available
444442

445443
5. Rename the ID of the user journey. For example, ID=`CustomSignUpSignIn`
446444

447-
### Step 5 - Add the identity provider to a user journey
445+
## Step 5: Add the identity provider to a user journey
448446

449447
Now that you have a user journey, add the new identity provider to the user journey.
450448

@@ -533,7 +531,7 @@ Now that you have a user journey, add the new identity provider to the user jour
533531

534532
```
535533

536-
### Step 6 - Configure the relying party policy
534+
## Step 6: Configure the relying party policy
537535

538536
The relying party policy specifies the user journey which Azure AD B2C will execute. You can also control what claims are passed to your application by adjusting the **OutputClaims** element of the **eID-Me-OIDC-Signup** TechnicalProfile element. In this sample, the application will receive the user’s postal code, locality, region, IAL, portrait, middle name, and birth date. It also receives the boolean **signupConditionsSatisfied** claim, which indicates whether an account has been created or not:
539537

@@ -566,7 +564,7 @@ The relying party policy specifies the user journey which Azure AD B2C will exec
566564

567565
```
568566

569-
### Step 7 - Upload the custom policy
567+
## Step 7: Upload the custom policy
570568

571569
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
572570

@@ -579,7 +577,7 @@ The relying party policy specifies the user journey which Azure AD B2C will exec
579577
5. Under Policies, select **Identity Experience Framework**.
580578
Select **Upload Custom Policy**, and then upload the two policy files that you changed, in the following order: the extension policy, for example `TrustFrameworkBase.xml`, then the relying party policy, such as `SignUp.xml`.
581579

582-
### Step 8 - Test your custom policy
580+
## Step 8: Test your custom policy
583581

584582
1. Select your relying party policy, for example `B2C_1A_signup`.
585583

articles/active-directory-b2c/partner-gallery.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
5555
| ![Screenshot of a twilio logo.](./media/partner-gallery/twilio-logo.png) | [Twilio Verify app](./partner-twilio.md) provides multiple solutions to enable MFA through SMS one-time password (OTP), time-based one-time password (TOTP), and push notifications, and to comply with SCA requirements for PSD2. |
5656
| ![Screenshot of a typingDNA logo](./media/partner-gallery/typingdna-logo.png) | [TypingDNA](./partner-typingdna.md) enables strong customer authentication by analyzing a user’s typing pattern. It helps companies enable a silent MFA and comply with SCA requirements for PSD2. |
5757
| ![Screenshot of a whoiam logo](./media/partner-gallery/whoiam-logo.png) | [WhoIAM](./partner-whoiam.md) is a Branded Identity Management System (BRIMS) application that enables organizations to verify their user base by voice, SMS, and email. |
58+
| ![Screenshot of a xid logo](./media/partner-gallery/xid-logo.png) | [xID](./partner-xID.md) is a digital ID solution that provides users with passwordless, secure, multifactor authentication. xID-authenticated users obtain their identities verified by a My Number Card, the digital ID card issued by the Japanese government. Organizations can get users verified Personal Identification Information (PII) through the xID API. |
5859

5960
## Role-based access control
6061

0 commit comments

Comments
 (0)