Skip to content

Commit c59cb1b

Browse files
committed
ts_hbase12
2 parents 218662e + fd67143 commit c59cb1b

File tree

147 files changed

+2277
-2644
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

147 files changed

+2277
-2644
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3265,6 +3265,16 @@
32653265
"redirect_url": "/azure/azure-portal/azure-portal-dashboards",
32663266
"redirect_document_id": false
32673267
},
3268+
{
3269+
"source_path": "articles/azure-resource-manager/resource-manager-powershell-sas-token.md",
3270+
"redirect_url": "/azure/azure-resource-manager/secure-template-with-sas-token",
3271+
"redirect_document_id": false
3272+
},
3273+
{
3274+
"source_path": "articles/azure-resource-manager/resource-manager-cli-sas-token.md",
3275+
"redirect_url": "/azure/azure-resource-manager/secure-template-with-sas-token",
3276+
"redirect_document_id": false
3277+
},
32683278
{
32693279
"source_path": "articles/azure-resource-manager/resource-manager-tutorial-move-resources.md",
32703280
"redirect_url": "/azure/azure-resource-manager/resource-group-move-resources",
@@ -25854,6 +25864,16 @@
2585425864
"redirect_url": "/azure/security-center/security-center-detection-capabilities",
2585525865
"redirect_document_id": false
2585625866
},
25867+
{
25868+
"source_path": "articles/security-center/security-center-alerts-type.md",
25869+
"redirect_url": "/azure/security-center/security-center-alerts-overview",
25870+
"redirect_document_id": false
25871+
},
25872+
{
25873+
"source_path": "articles/security-center/security-center-ueba-mcas.md",
25874+
"redirect_url": "/azure/security-center/security-center-alerts-service-layer#azure-management-layer-azure-resource-manager-preview",
25875+
"redirect_document_id": false
25876+
},
2585725877
{
2585825878
"source_path": "articles/virtual-network/virtual-network-deploy-multinic-arm-cli.md",
2585925879
"redirect_url": "/azure/virtual-machines/linux/multiple-nics",

articles/active-directory-b2c/active-directory-b2c-setup-oidc-azure-active-directory.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,13 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/08/2019
11+
ms.date: 08/06/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Set up sign-in for a specific Azure Active Directory organization in Azure Active Directory B2C
1717

18-
>[!NOTE]
19-
> This feature is in public preview. Do not use the feature in production environments.
20-
2118
To use an Azure Active Directory (Azure AD) as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure AD B2C, you need to create an application that represents it. This article shows you how to enable sign-in for users from a specific Azure AD organization using a user flow in Azure AD B2C.
2219

2320
## Create an Azure AD app
@@ -50,7 +47,7 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
5047
2. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
5148
3. Select **Identity providers**, and then select **Add**.
5249
4. Enter a **Name**. For example, enter `Contoso Azure AD`.
53-
5. Select **Identity provider type**, select **OpenID Connect (Preview)**, and then click **OK**.
50+
5. Select **Identity provider type**, select **OpenID Connect**, and then click **OK**.
5451
6. Select **Set up this identity provider**
5552
7. For **Metadata url**, enter the following URL replacing `your-AD-tenant-domain` with the domain name of your Azure AD tenant. For example `https://login.microsoftonline.com/contoso.onmicrosoft.com/.well-known/openid-configuration`:
5653

articles/active-directory-b2c/active-directory-b2c-setup-oidc-idp.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Set up sign-up and sign-in with OpenID Connect - Azure Active Directory B2C | Microsoft Docs
2+
title: Set up sign-up and sign-in with OpenID Connect - Azure Active Directory B2C
33
description: Set up sign-up and sign-in with OpenID Connect using Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,26 +8,22 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/30/2018
11+
ms.date: 08/06/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Set up sign-up and sign-in with OpenID Connect using Azure Active Directory B2C
1717

18-
>[!NOTE]
19-
> This feature is in public preview. Do not use the feature in production environments.
20-
21-
22-
[OpenID Connect](active-directory-b2c-reference-oidc.md) is an authentication protocol, built on top of OAuth 2.0, that can be used to securely sign users in. Most identity providers that use this protocol, are supported in Azure AD B2C. This article explains how you can add custom OpenID Connect identity providers into your user flows.
18+
[OpenID Connect](active-directory-b2c-reference-oidc.md) is an authentication protocol built on top of OAuth 2.0 that can be used for secure user sign-in. Most identity providers that use this protocol are supported in Azure AD B2C. This article explains how you can add custom OpenID Connect identity providers into your user flows.
2319

2420
## Add the identity provider
2521

2622
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
2723
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
2824
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
2925
4. Select **Identity Providers**, and then click **Add**.
30-
5. For the **Identity provider type**, select **OpenID Connect (Preview)**.
26+
5. For the **Identity provider type**, select **OpenID Connect**.
3127

3228
## Configure the identity provider
3329

articles/active-directory-b2c/idp-pass-through-custom.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Pass an access token through a custom policy to your application in Azure Active Directory B2C | Microsoft Docs
2+
title: Pass an access token through a custom policy to your application in Azure Active Directory B2C
33
description: Learn how you can pass an access token for OAuth2.0 identity providers as a claim through a custom policy to your application in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,22 +8,20 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 02/19/2019
11+
ms.date: 08/17/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Pass an access token through a custom policy to your application in Azure Active Directory B2C
1717

18-
[!INCLUDE [active-directory-b2c-public-preview](../../includes/active-directory-b2c-public-preview.md)]
19-
20-
A [custom policy](active-directory-b2c-get-started-custom.md) in Azure Active Directory (Azure AD) B2C provides users of your application an opportunity to sign up or sign in with an identity provider. When this happens, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You add a claim type and output claim to your custom policy to pass the token through to the applications that you register in Azure AD B2C.
18+
A [custom policy](active-directory-b2c-get-started-custom.md) in Azure Active Directory B2C (Azure AD B2C) provides users of your application an opportunity to sign up or sign in with an identity provider. When this happens, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You add a claim type and output claim to your custom policy to pass the token through to the applications that you register in Azure AD B2C.
2119

2220
Azure AD B2C supports passing the access token of [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) and [OpenID Connect](active-directory-b2c-reference-oidc.md) identity providers. For all other identity providers, the claim is returned blank.
2321

2422
## Prerequisites
2523

26-
- Your custom policy is configured with an OAuth 2.0 or OpenID Connect identity provider.
24+
* Your custom policy is configured with an OAuth 2.0 or OpenID Connect identity provider.
2725

2826
## Add the claim elements
2927

@@ -82,24 +80,24 @@ When testing your applications in Azure AD B2C, it can be useful to have the Azu
8280
### Upload the files
8381

8482
1. Sign in to the [Azure portal](https://portal.azure.com/).
85-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
83+
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
8684
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
8785
4. Select **Identity Experience Framework**.
8886
5. On the Custom Policies page, click **Upload Policy**.
8987
6. Select **Overwrite the policy if it exists**, and then search for and select the *TrustframeworkExtensions.xml* file.
90-
7. Click **Upload**.
88+
7. Select **Upload**.
9189
8. Repeat steps 5 through 7 for the relying party file, such as *SignUpOrSignIn.xml*.
9290

9391
### Run the policy
9492

9593
1. Open the policy that you changed. For example, *B2C_1A_signup_signin*.
9694
2. For **Application**, select your application that you previously registered. To see the token in the example below, the **Reply URL** should show `https://jwt.ms`.
97-
3. Click **Run now**.
95+
3. Select **Run now**.
9896

9997
You should see something similar to the following example:
10098

10199
![Decoded token in jwt.ms with idp_access_token block highlighted](./media/idp-pass-through-custom/idp-pass-through-custom-token.PNG)
102100

103101
## Next steps
104102

105-
Learn more about tokens in the [Azure Active Directory token reference](active-directory-b2c-reference-tokens.md).
103+
Learn more about tokens in the [Azure Active Directory B2C token reference](active-directory-b2c-reference-tokens.md).

articles/active-directory-b2c/idp-pass-through-user-flow.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,28 @@
11
---
2-
title: Pass an access token through a user flow to your application - Azure Active Directory B2C | Microsoft Docs
3-
description: Learn how you can pass through an access token for OAuth2.0 identity providers as a claim in a user flow in Azure Active Directory B2C.
2+
title: Pass an access token through a user flow to your application - Azure Active Directory B2C
3+
description: Learn how to pass an access token for OAuth 2.0 identity providers as a claim in a user flow in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/16/2019
11+
ms.date: 08/17/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Pass an access token through a user flow to your application in Azure Active Directory B2C
1717

18-
> [!NOTE]
19-
> This feature is currently in public preview.
20-
21-
A [user flow](active-directory-b2c-reference-policies.md) in Azure Active Directory (Azure AD) B2C provides users of your application an opportunity to sign up or sign in with an identity provider. When the journey starts, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You enable a claim in your user flow to pass the token through to the applications that you register in Azure AD B2C.
18+
A [user flow](active-directory-b2c-reference-policies.md) in Azure Active Directory B2C (Azure AD B2C) provides users of your application an opportunity to sign up or sign in with an identity provider. When the journey starts, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You enable a claim in your user flow to pass the token through to the applications that you register in Azure AD B2C.
2219

2320
Azure AD B2C currently only supports passing the access token of [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) identity providers, which include [Facebook](active-directory-b2c-setup-fb-app.md) and [Google](active-directory-b2c-setup-goog-app.md). For all other identity providers, the claim is returned blank.
2421

2522
## Prerequisites
2623

27-
- Your application must be using a [v2 user flow](user-flow-versions.md).
28-
- Your user flow is configured with an OAuth 2.0 identity provider.
24+
* Your application must be using a [v2 user flow](user-flow-versions.md).
25+
* Your user flow is configured with an OAuth 2.0 identity provider.
2926

3027
## Enable the claim
3128

articles/active-directory-b2c/tutorial-add-identity-providers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ After you create the application for the identity provider that you want to add,
9494
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
9595
1. Select **Identity providers**, and then select **Add**.
9696
1. Enter a **Name**. For example, enter *Contoso Azure AD*.
97-
1. Select **Identity provider type**, select **OpenID Connect (Preview)**, and then click **OK**.
97+
1. Select **Identity provider type**, select **OpenID Connect**, and then click **OK**.
9898
1. Click **Set up this identity provider**
9999
1. For **Metadata url**, enter the following URL, replacing `your-AD-tenant-domain` with the domain name of your Azure AD tenant.
100100

articles/active-directory/develop/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Claims are present only if a value exists to fill it. So, your app shouldn't tak
8383

8484
| Claim | Format | Description |
8585
|-----|--------|-------------|
86-
| `aud` | String, an App ID URI | Identifies the intended recipient of the token. In access tokens, the audience is your app's Application ID, assigned to your app in the Azure portal. Your app should validate this value and reject the token if the value does not match. |
86+
| `aud` | String, an App ID URI | Identifies the intended recipient of the token. In id tokens, the audience is your app's Application ID, assigned to your app in the Azure portal. Your app should validate this value and reject the token if the value does not match. |
8787
| `iss` | String, an STS URI | Identifies the security token service (STS) that constructs and returns the token, and the Azure AD tenant in which the user was authenticated. If the token issued is a v2.0 token (see the `ver` claim), the URI will end in `/v2.0`. The GUID that indicates that the user is a consumer user from a Microsoft account is `9188040d-6c67-4c5b-b112-36a304b66dad`. Your app should use the GUID portion of the claim to restrict the set of tenants that can sign in to the app, if applicable. |
8888
|`idp`| String, usually an STS URI | Records the identity provider that authenticated the subject of the token. This value is identical to the value of the Issuer claim unless the user account not in the same tenant as the issuer - guests, for instance. If the claim isn't present, it means that the value of `iss` can be used instead. For personal accounts being used in an organizational context (for instance, a personal account invited to an Azure AD tenant), the `idp` claim may be 'live.com' or an STS URI containing the Microsoft account tenant `9188040d-6c67-4c5b-b112-36a304b66dad`. |
8989
| `iat` | int, a UNIX timestamp | "Issued At" indicates when the authentication for this token occurred. |

0 commit comments

Comments
 (0)