Skip to content

Commit ca002b5

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into symmetric_key_derived_0923
2 parents 8745bb0 + cd9dc13 commit ca002b5

File tree

808 files changed

+13077
-16488
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

808 files changed

+13077
-16488
lines changed

.openpublishing.redirection.json

Lines changed: 163 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -755,6 +755,31 @@
755755
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-azure-subscription",
756756
"redirect_document_id": false
757757
},
758+
{
759+
"source_path": "articles/cognitive-services/QnAMaker/quickstarts/csharp.md",
760+
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-publish-kb-csharp-sdk",
761+
"redirect_document_id": false
762+
},
763+
{
764+
"source_path": "articles/cognitive-services/QnAMaker/quickstarts/go.md",
765+
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-new-kb-go",
766+
"redirect_document_id": false
767+
},
768+
{
769+
"source_path": "articles/cognitive-services/QnAMaker/quickstarts/java.md",
770+
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-new-kb-java",
771+
"redirect_document_id": false
772+
},
773+
{
774+
"source_path": "articles/cognitive-services/QnAMaker/quickstarts/nodejs.md",
775+
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-publish-kb-nodejs-sdk",
776+
"redirect_document_id": false
777+
},
778+
{
779+
"source_path": "articles/cognitive-services/QnAMaker/quickstarts/python.md",
780+
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/python-sdk",
781+
"redirect_document_id": false
782+
},
758783
{
759784
"source_path": "articles/cognitive-services/QnAMaker/How-To/key-management.md",
760785
"redirect_url": "/azure/cognitive-services/QnAMaker/How-To/set-up-qnamaker-service-azure#types-of-keys-in-qna-maker",
@@ -1715,6 +1740,66 @@
17151740
"redirect_url": "/azure/cosmos-db/manage-with-powershell",
17161741
"redirect_document_id": true
17171742
},
1743+
{
1744+
"source_path": "articles/cosmos-db/scripts/create-cassandra-database-account-cli.md",
1745+
"redirect_url": "/azure/cosmos-db/scripts/cli/cassandra/create",
1746+
"redirect_document_id": false
1747+
},
1748+
{
1749+
"source_path": "articles/cosmos-db/scripts/create-database-account-collections-cli.md",
1750+
"redirect_url": "/azure/cosmos-db/scripts/cli/sql/create",
1751+
"redirect_document_id": false
1752+
},
1753+
{
1754+
"source_path": "articles/cosmos-db/scripts/create-firewall-cli.md",
1755+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/ipfirewall",
1756+
"redirect_document_id": false
1757+
},
1758+
{
1759+
"source_path": "articles/cosmos-db/scripts/create-gremlin-database-account-cli.md",
1760+
"redirect_url": "/azure/cosmos-db/scripts/cli/gremlin/create",
1761+
"redirect_document_id": false
1762+
},
1763+
{
1764+
"source_path": "articles/cosmos-db/scripts/create-mongodb-database-account-cli.md",
1765+
"redirect_url": "/azure/cosmos-db/scripts/cli/mongodb/create",
1766+
"redirect_document_id": false
1767+
},
1768+
{
1769+
"source_path": "articles/cosmos-db/scripts/create-table-database-account-cli.md",
1770+
"redirect_url": "/azure/cosmos-db/scripts/cli/table/create",
1771+
"redirect_document_id": false
1772+
},
1773+
{
1774+
"source_path": "articles/cosmos-db/scripts/ha-failover-policy.md",
1775+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/regions",
1776+
"redirect_document_id": false
1777+
},
1778+
{
1779+
"source_path": "articles/cosmos-db/scripts/scale-collection-throughput-cli.md",
1780+
"redirect_url": "/azure/cosmos-db/scripts/cli/sql/throughput",
1781+
"redirect_document_id": false
1782+
},
1783+
{
1784+
"source_path": "articles/cosmos-db/scripts/scale-multiregion-cli.md",
1785+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/regions",
1786+
"redirect_document_id": false
1787+
},
1788+
{
1789+
"source_path": "articles/cosmos-db/scripts/secure-get-account-key-cli.md",
1790+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/keys",
1791+
"redirect_document_id": false
1792+
},
1793+
{
1794+
"source_path": "articles/cosmos-db/scripts/secure-mongo-connection-string.md",
1795+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/keys",
1796+
"redirect_document_id": false
1797+
},
1798+
{
1799+
"source_path": "articles/cosmos-db/scripts/secure-generate-key-cli.md",
1800+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/keys",
1801+
"redirect_document_id": false
1802+
},
17181803
{
17191804
"source_path": "articles/cosmos-db/programming.md",
17201805
"redirect_url": "/azure/cosmos-db/storedprocedures-triggers-udfs",
@@ -3070,16 +3155,6 @@
30703155
"redirect_url": "/azure/virtual-machines/linux/expand-disks",
30713156
"redirect_document_id": true
30723157
},
3073-
{
3074-
"source_path": "articles/virtual-machines/linux/disks-upload-vhd-to-managed-disk-cli.md",
3075-
"redirect_url": "/azure/virtual-machines/linux/managed-disks-overview",
3076-
"redirect_document_id": false
3077-
},
3078-
{
3079-
"source_path": "articles/virtual-machines/windows/disks-upload-vhd-to-managed-disk-powershell.md",
3080-
"redirect_url": "/azure/virtual-machines/windows/managed-disks-overview",
3081-
"redirect_document_id": false
3082-
},
30833158
{
30843159
"source_path": "articles/virtual-machines/linux/install-mongodb-nodejs.md",
30853160
"redirect_url": "/azure/virtual-machines/linux/install-mongodb",
@@ -15630,6 +15705,11 @@
1563015705
"redirect_url": "/azure/vpn-gateway/vpn-gateway-about-vpngateways",
1563115706
"redirect_document_id": false
1563215707
},
15708+
{
15709+
"source_path": "articles/vpn-gateway/vpn-gateway-point-to-site-gateway-public-ca.md",
15710+
"redirect_url": "/azure/vpn-gateway/point-to-site-about",
15711+
"redirect_document_id": false
15712+
},
1563315713
{
1563415714
"source_path": "articles/virtual-network/virtual-networks-create-nsg-arm-pportal.md",
1563515715
"redirect_url": "/azure/virtual-network/tutorial-filter-network-traffic",
@@ -20533,6 +20613,11 @@
2053320613
"source_path": "articles/virtual-machines/virtual-machines-linux-quick-create-cli-nodejs.md",
2053420614
"redirect_url": "/azure/virtual-machines/linux/quick-create-cli-nodejs",
2053520615
"redirect_document_id": false
20616+
},
20617+
{
20618+
"source_path": "articles/virtual-machines/linux/quick-create-cli-nodejs.md",
20619+
"redirect_url": "/azure/virtual-machines/linux/quick-create-cli",
20620+
"redirect_document_id": false
2053620621
},
2053720622
{
2053820623
"source_path": "articles/virtual-machines/virtual-machines-linux-quick-create-cli.md",
@@ -26039,11 +26124,21 @@
2603926124
"redirect_url": "/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-autoscale-powershell",
2604026125
"redirect_document_id": false
2604126126
},
26127+
{
26128+
"source_path": "articles/sentinel/tutorial-detect-threats.md",
26129+
"redirect_url": "/azure/sentinel/tutorial-detect-threats-built-in",
26130+
"redirect_document_id": false
26131+
},
2604226132
{
2604326133
"source_path": "articles/sentinel/user-analytics.md",
2604426134
"redirect_url": "/azure/sentinel/overview",
2604526135
"redirect_document_id": false
2604626136
},
26137+
{
26138+
"source_path": "articles/sentinel/connect-fusion.md",
26139+
"redirect_url": "/azure/sentinel/fusion",
26140+
"redirect_document_id": false
26141+
},
2604726142
{
2604826143
"source_path": "articles/security-center/security-center-ata-integration.md",
2604926144
"redirect_url": "/azure/security-center/security-center-partner-integration",
@@ -36870,7 +36965,12 @@
3687036965
},
3687136966
{
3687236967
"source_path": "articles/monitoring-and-diagnostics/monitoring-archive-diagnostic-logs.md",
36873-
"redirect_url": "/azure/azure-monitor/platform/archive-diagnostic-logs",
36968+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-collect-storage",
36969+
"redirect_document_id": false
36970+
},
36971+
{
36972+
"source_path": "articles/azure-monitor/platform/archive-diagnostic-logs.md",
36973+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-collect-storage",
3687436974
"redirect_document_id": true
3687536975
},
3687636976
{
@@ -36888,6 +36988,11 @@
3688836988
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-stream-template",
3688936989
"redirect_document_id": true
3689036990
},
36991+
{
36992+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-stream-template.md",
36993+
"redirect_url": "/azure/azure-monitor/platform/diagnostic-settings-template",
36994+
"redirect_document_id": true
36995+
},
3689136996
{
3689236997
"source_path": "articles/monitoring-and-diagnostics/monitoring-autoscale-scale-by-custom-metric.md",
3689336998
"redirect_url": "/azure/azure-monitor/platform/autoscale-custom-metric",
@@ -36955,7 +37060,17 @@
3695537060
},
3695637061
{
3695737062
"source_path": "articles/monitoring-and-diagnostics/monitoring-overview-of-diagnostic-logs.md",
36958-
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-overview",
37063+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
37064+
"redirect_document_id": false
37065+
},
37066+
{
37067+
"source_path": "articles/monitoring-and-diagnostics/diagnostic-logs-overview.md",
37068+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
37069+
"redirect_document_id": false
37070+
},
37071+
{
37072+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-overview.md",
37073+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
3695937074
"redirect_document_id": true
3696037075
},
3696137076
{
@@ -36970,14 +37085,24 @@
3697037085
},
3697137086
{
3697237087
"source_path": "articles/monitoring-and-diagnostics/monitoring-stream-diagnostic-logs-to-event-hubs.md",
36973-
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-stream-event-hubs",
37088+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-stream-event-hubs",
37089+
"redirect_document_id": false
37090+
},
37091+
{
37092+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-stream-event-hubs.md",
37093+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-stream-event-hubs",
3697437094
"redirect_document_id": true
3697537095
},
3697637096
{
3697737097
"source_path": "articles/monitoring-and-diagnostics/monitor-stream-diagnostic-logs-log-analytics.md",
3697837098
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-stream-log-store",
3697937099
"redirect_document_id": true
3698037100
},
37101+
{
37102+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-stream-log-store.md",
37103+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-collect-workspace",
37104+
"redirect_document_id": true
37105+
},
3698137106
{
3698237107
"source_path": "articles/monitoring-and-diagnostics/monitor-tutorial-archive-monitoring-data.md",
3698337108
"redirect_url": "/azure/azure-monitor/learn/tutorial-archive-data",
@@ -41368,6 +41493,11 @@
4136841493
"redirect_url": "/azure/azure-monitor/app/overview-dashboard",
4136941494
"redirect_document_id": false
4137041495
},
41496+
{
41497+
"source_path": "articles/azure-monitor/platform/diagnostic-logs.md",
41498+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
41499+
"redirect_document_id": false
41500+
},
4137141501
{
4137241502
"source_path": "articles/active-directory-domain-services/active-directory-ds-admin-guide-administer-domain.md",
4137341503
"redirect_url": "/azure/active-directory-domain-services/manage-domain",
@@ -41666,6 +41796,26 @@
4166641796
"redirect_url": "/azure/azure-monitor/app/java-get-started",
4166741797
"redirect_document_id": false
4166841798
},
41799+
{
41800+
"source_path": "articles/azure-monitor/app/java-get-started-25-beta.md",
41801+
"redirect_url": "/azure/azure-monitor/app/java-get-started",
41802+
"redirect_document_id": false
41803+
},
41804+
{
41805+
"source_path": "articles/azure-monitor/app/java-trace-logs-25-beta.md",
41806+
"redirect_url": "/azure/azure-monitor/app/java-trace-logs",
41807+
"redirect_document_id": false
41808+
},
41809+
{
41810+
"source_path": "articles/azure-monitor/app/java-agent-25-beta.md",
41811+
"redirect_url": "/azure/azure-monitor/app/java-agent",
41812+
"redirect_document_id": false
41813+
},
41814+
{
41815+
"source_path": "articles/azure-monitor/app/micrometer-java-25-beta.md",
41816+
"redirect_url": "/azure/azure-monitor/app/micrometer-java",
41817+
"redirect_document_id": false
41818+
},
4166941819
{
4167041820
"source_path": "articles/cognitive-services/Translator/quickstart-csharp-translate.md",
4167141821
"redirect_url": "/azure/cognitive-services/Translator/quickstart-translate",

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/16/2019
11+
ms.date: 09/26/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -21,44 +21,45 @@ ms.subservice: B2C
2121

2222
## Prerequisites
2323

24-
- If you don't have one already, you need to [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
24+
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
2525
- [Register your application](tutorial-register-applications.md) in the tenant that you created so that it can communicate with Azure AD B2C.
26+
- Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
2627

2728
## Add signing and encryption keys
2829

29-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
30-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your tenant.
31-
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
32-
4. On the Overview page, select **Identity Experience Framework**.
30+
1. Sign in to the [Azure portal](https://portal.azure.com)
31+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
32+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
33+
1. On the Overview page, select **Identity Experience Framework**.
3334

3435
### Create the signing key
3536

3637
1. Select **Policy Keys** and then select **Add**.
37-
2. For **Options**, choose `Generate`.
38-
3. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
39-
4. For **Key type**, select **RSA**.
40-
5. For **Key usage**, select **Signature**.
41-
6. Click **Create**.
38+
1. For **Options**, choose `Generate`.
39+
1. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
40+
1. For **Key type**, select **RSA**.
41+
1. For **Key usage**, select **Signature**.
42+
1. Select **Create**.
4243

4344
### Create the encryption key
4445

4546
1. Select **Policy Keys** and then select **Add**.
46-
2. For **Options**, choose `Generate`.
47-
3. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
48-
4. For **Key type**, select **RSA**.
49-
5. For **Key usage**, select **Encryption**.
50-
6. Click **Create**.
47+
1. For **Options**, choose `Generate`.
48+
1. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
49+
1. For **Key type**, select **RSA**.
50+
1. For **Key usage**, select **Encryption**.
51+
1. Select **Create**.
5152

5253
### Create the Facebook key
5354

54-
If you already have a [Facebook application secret](active-directory-b2c-setup-fb-app.md), add it as a policy key to your tenant. Otherwise, you must create the key with a placeholder value so that your policies pass validation.
55+
Add your Facebook application's [App Secret](active-directory-b2c-setup-fb-app.md) as a policy key. You can use the App Secret of the application you created as part of this article's prerequisites.
5556

5657
1. Select **Policy Keys** and then select **Add**.
57-
2. For **Options**, choose `Manual`.
58-
3. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
59-
4. In **Secret**, enter your Facebook secret from developers.facebook.com or `0` as a placeholder. This value is the secret, not the application ID.
60-
5. For **Key usage**, select **Signature**.
61-
6. Click **Create**.
58+
1. For **Options**, choose `Manual`.
59+
1. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
60+
1. In **Secret**, enter your Facebook application's *App Secret* from developers.facebook.com. This value is the secret, not the application ID.
61+
1. For **Key usage**, select **Signature**.
62+
1. Select **Create**.
6263

6364
## Register Identity Experience Framework applications
6465

@@ -74,19 +75,19 @@ Azure AD B2C requires you to register two applications that are used to sign up
7475
1. For **Name**, enter `IdentityExperienceFramework`.
7576
1. For **Application type**, choose **Web app/API**.
7677
1. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name. All URLs should now be using [b2clogin.com](b2clogin.md).
77-
1. Click **Create**. After it's created, copy the application ID and save it to use later.
78+
1. Select **Create**. After it's created, copy the application ID and save it to use later.
7879

7980
### Register the ProxyIdentityExperienceFramework application
8081

8182
1. In **App registrations (Legacy)**, select **New application registration**.
82-
2. For **Name**, enter `ProxyIdentityExperienceFramework`.
83-
3. For **Application type**, choose **Native**.
84-
4. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
85-
5. Click **Create**. After it's created, copy the application ID and save it to use later.
86-
6. On the Settings page, select **Required permissions**, and then select **Add**.
87-
7. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
88-
9. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
89-
10. Select **Grant Permissions**, and then confirm by selecting **Yes**.
83+
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
84+
1. For **Application type**, choose **Native**.
85+
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
86+
1. Select **Create**. After it's created, copy the application ID and save it to use later.
87+
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
88+
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
89+
1. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
90+
1. Select **Grant permissions**, and then confirm by selecting **Yes**.
9091

9192
## Custom policy starter pack
9293

@@ -156,7 +157,6 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
156157

157158
## Add Facebook as an identity provider
158159

159-
1. Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
160160
1. In the `SocialAndLocalAccounts/`**`TrustFrameworkExtensions.xml`** file, replace the value of `client_id` with the Facebook application ID:
161161

162162
```xml
@@ -168,7 +168,7 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
168168

169169
1. Upload the *TrustFrameworkExtensions.xml* file to your tenant.
170170
1. Under **Custom policies**, select **B2C_1A_signup_signin**.
171-
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy. Or, invoke the policy directly from your registered application.
171+
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy.
172172

173173
## Next steps
174174

0 commit comments

Comments
 (0)