Skip to content

Commit c4477d5

Browse files
committed
fixing merge conflict
2 parents 8696e68 + 5d40078 commit c4477d5

File tree

4,194 files changed

+52510
-48135
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,194 files changed

+52510
-48135
lines changed

.openpublishing.redirection.json

Lines changed: 421 additions & 194 deletions
Large diffs are not rendered by default.

.vscode/settings.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,4 +62,4 @@
6262
"auditd"
6363
],
6464
"git.ignoreLimitWarning": true
65-
}
65+
}

articles/active-directory-b2c/azure-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,8 +80,8 @@ To onboard your Azure AD tenant (the **Customer**), create an [Azure Resource Ma
8080

8181
Download the Azure Resource Manager template and parameter files:
8282

83-
- [rgDelegatedResourceManagement.json](https://raw.githubusercontent.com/Azure/Azure-Lighthouse-samples/master/Azure-Delegated-Resource-Management/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.json)
84-
- [rgDelegatedResourceManagement.parameters.json](https://raw.githubusercontent.com/Azure/Azure-Lighthouse-samples/master/Azure-Delegated-Resource-Management/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.parameters.json)
83+
- [rgDelegatedResourceManagement.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.json)
84+
- [rgDelegatedResourceManagement.parameters.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.parameters.json)
8585

8686
Next, update the parameters file with the values you recorded earlier. The following JSON snippet shows an example of an Azure Resource Manager template parameters file. For `authorizations.value.roleDefinitionId`, use the [built-in role](../role-based-access-control/built-in-roles.md) value for the *Contributor role*, `b24988ac-6180-42a0-ab88-20f7382dd24c`.
8787

articles/active-directory-b2c/custom-policy-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ Next, expose the API by adding a scope:
112112
1. In **App registrations (Legacy)**, select **New application registration**.
113113
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
114114
1. For **Application type**, choose **Native**.
115-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
115+
1. For **Redirect URI**, enter `myapp://auth`.
116116
1. Select **Create**. After it's created, copy the application ID and save it to use later.
117117
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
118118
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
@@ -125,7 +125,7 @@ Next, expose the API by adding a scope:
125125
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
126126
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
127127
1. Under **Redirect URI**, use the drop-down to select **Public client/native (mobile & desktop)**.
128-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
128+
1. For **Redirect URI**, enter `myapp://auth`.
129129
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
130130
1. Select **Register**.
131131
1. Record the **Application (client) ID** for use in a later step.

articles/active-directory-b2c/custom-policy-keep-me-signed-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ To enable KMSI, set the content definition `DataUri` element to [page identifier
5050

5151
## Add the metadata to the self-asserted technical profile
5252

53-
To add the KMSI checkbox to the sign-up and sign-in page, set the `setting.enableRememberMe` metadata to false. Override the SelfAsserted-LocalAccountSignin-Email technical profiles in the extension file.
53+
To add the KMSI checkbox to the sign-up and sign-in page, set the `setting.enableRememberMe` metadata to true. Override the SelfAsserted-LocalAccountSignin-Email technical profiles in the extension file.
5454

5555
1. Find the ClaimsProviders element. If the element doesn't exist, add it.
5656
1. Add the following claims provider to the ClaimsProviders element:
27.4 KB
Loading
19.9 KB
Loading
34.7 KB
Loading
44.1 KB
Loading

0 commit comments

Comments
 (0)