Skip to content

Commit cb47ef3

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into postgres-app
2 parents 9ff4569 + 3e78fec commit cb47ef3

File tree

1,080 files changed

+17644
-9030
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,080 files changed

+17644
-9030
lines changed

.openpublishing.redirection.json

Lines changed: 21 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -555,6 +555,11 @@
555555
"redirect_url": "/azure/machine-learning",
556556
"redirect_document_id": false
557557
},
558+
{
559+
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-knowledge-rest-api-nodejs.md",
560+
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/publish-kb-nodejs",
561+
"redirect_document_id": false
562+
},
558563
{
559564
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-postman.md",
560565
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
@@ -565,6 +570,16 @@
565570
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
566571
"redirect_document_id": false
567572
},
573+
{
574+
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-pattern-roles.md",
575+
"redirect_url": "/azure/cognitive-services/LUIS/luis-tutorial-pattern",
576+
"redirect_document_id": false
577+
},
578+
{
579+
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-pattern-any.md",
580+
"redirect_url": "/azure/cognitive-services/LUIS/luis-tutorial-pattern",
581+
"redirect_document_id": false
582+
},
568583
{
569584
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-primary-and-secondary-data.md",
570585
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-machine-learned-entity",
@@ -24668,7 +24683,7 @@
2466824683
"source_path": "articles/storage/common/storage-security-guide.md",
2466924684
"redirect_url": "/azure/storage/blobs/security-recommendations",
2467024685
"redirect_document_id": true
24671-
},
24686+
},
2467224687
{
2467324688
"source_path": "articles/storage/storage-service-encryption-customer-managed-keys.md",
2467424689
"redirect_url": "/azure/storage/common/storage-service-encryption-customer-managed-keys",
@@ -31769,11 +31784,6 @@
3176931784
"redirect_url": "/azure/cognitive-services/QnAMaker/concepts/knowledge-base",
3177031785
"redirect_document_id": false
3177131786
},
31772-
{
31773-
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/publish-kb-nodejs.md",
31774-
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/create-knowledge-rest-api-nodejs#publish-a-knowledge-base",
31775-
"redirect_document_id": false
31776-
},
3177731787
{
3177831788
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-new-kb-nodejs.md",
3177931789
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/create-knowledge-rest-api-nodejs",
@@ -42208,6 +42218,11 @@
4220842218
"redirect_url": "/azure/iot-central/preview/quick-monitor-devices/",
4220942219
"redirect_document_id": true
4221042220
},
42221+
{
42222+
"source_path": "articles/iot-central/core/overview-iot-options.md",
42223+
"redirect_url": "/azure/iot-fundamentals/iot-services-and-technologies/",
42224+
"redirect_document_id": true
42225+
},
4221142226
{
4221242227
"source_path": "articles/iot-accelerators/iot-accelerators-arduino-iot-devkit-az3166-devkit-remote-monitoringV2.md",
4221342228
"redirect_url": "/azure/iot-accelerators/iot-accelerators-arduino-iot-devkit-az3166-devkit-remote-monitoring-v2",

articles/active-directory-b2c/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,9 @@
163163
href: active-directory-b2c-reference-kmsi-custom.md
164164
- name: Password change
165165
href: active-directory-b2c-reference-password-change-custom.md
166+
- name: Phone sign-up & sign-in
167+
href: phone-authentication.md
168+
displayName: otp, passwordless, phone number
166169
- name: UX customization
167170
items:
168171
- name: Configure user input
@@ -262,6 +265,8 @@
262265
href: integer-transformations.md
263266
- name: JSON
264267
href: json-transformations.md
268+
- name: Phone number
269+
href: phone-number-claims-transformations.md
265270
- name: External accounts
266271
href: social-transformations.md
267272
- name: StringCollection
@@ -285,6 +290,9 @@
285290
items:
286291
- name: About technical profiles
287292
href: technical-profiles-overview.md
293+
- name: Azure Multi-Factor Authentication
294+
href: multi-factor-auth-technical-profile.md
295+
displayName: mfa
288296
- name: Claim resolvers
289297
href: claim-resolver-overview.md
290298
- name: Azure Active Directory

articles/active-directory-b2c/active-directory-b2c-custom-guide-eventlogger-appins.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Track user behavior with Application Insights
33
titleSuffix: Azure AD B2C
4-
description: Learn how to enable event logs in Application Insights from Azure AD B2C user journeys by using custom policies (preview).
4+
description: Learn how to enable event logs in Application Insights from Azure AD B2C user journeys by using custom policies.
55
services: active-directory-b2c
66
author: mmacy
77
manager: celestedg
@@ -29,7 +29,7 @@ When you use Azure Active Directory B2C (Azure AD B2C) together with Azure Appli
2929

3030
The Identity Experience Framework in Azure AD B2C includes the provider `Handler="Web.TPEngine.Providers.AzureApplicationInsightsProvider, Web.TPEngine, Version=1.0.0.0`. It sends event data directly to Application Insights by using the instrumentation key provided to Azure AD B2C.
3131

32-
A technical profile uses this provider to define an event from Azure AD B2C. The profile specifies the name of the event, the claims that are recorded, and the instrumentation key. To post an event, the technical profile is then added as an `orchestration step`, or as a `validation technical profile` in a custom user journey.
32+
A technical profile uses this provider to define an event from Azure AD B2C. The profile specifies the name of the event, the claims that are recorded, and the instrumentation key. To post an event, the technical profile is then added as an `orchestration step` in a custom user journey.
3333

3434
Application Insights can unify the events by using a correlation ID to record a user session. Application Insights makes the event and session available within seconds and presents many visualization, export, and analytical tools.
3535

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,6 @@ For B2C tenants, there are two primary modes of communicating with the Graph API
2626

2727
In this article, you learn how to perform the automated use case. You'll build a .NET 4.5 `B2CGraphClient` that performs user create, read, update, and delete (CRUD) operations. The client will have a Windows command-line interface (CLI) that allows you to invoke various methods. However, the code is written to behave in a non-interactive, automated fashion.
2828

29-
>[!IMPORTANT]
30-
> You **must** use the [Azure AD Graph API](../active-directory/develop/active-directory-graph-api-quickstart.md) to manage users in an Azure AD B2C directory. The Azure AD Graph API is different from the Microsoft Graph API. Learn more in this MSDN blog post: [Microsoft Graph or Azure AD Graph](https://blogs.msdn.microsoft.com/aadgraphteam/2016/07/08/microsoft-graph-or-azure-ad-graph/).
31-
3229
## Prerequisites
3330

3431
Before you can create applications or users, you need an Azure AD B2C tenant. If you don't already have one, [Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).

articles/active-directory-b2c/active-directory-b2c-quickstarts-desktop-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,9 @@ Azure AD B2C provides functionality to allow users to update their profiles. The
7373
7474
Click **Call API** to make a request to the protected resource.
7575
76-
![Call API](media/active-directory-b2c-quickstarts-desktop-app/call-api-wpf.png)
76+
![Call API](media/active-directory-b2c-quickstarts-desktop-app/call-api-wpf.png)
7777
78-
The application includes the Azure AD access token in the request to the protected web API resource. The web API sends back the display name contained in the access token.
78+
The application includes the Azure AD access token in the request to the protected web API resource. The web API sends back the display name contained in the access token.
7979
8080
You've successfully used your Azure AD B2C user account to make an authorized call an Azure AD B2C protected web API.
8181

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -271,6 +271,7 @@ GET https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/
271271
| {tenant} | Yes | Name of your Azure AD B2C tenant |
272272
| {policy} | Yes | The user flow that you want to use to sign the user out of your application. |
273273
| id_token_hint| No | A previously issued ID token to pass to the logout endpoint as a hint about the end user's current authenticated session with the client. The `id_token_hint` ensures that the `post_logout_redirect_uri` is a registered reply URL in your Azure AD B2C application settings. |
274+
| client_id | No* | The application ID that the [Azure portal](https://portal.azure.com/) assigned to your application.<br><br>\**This is required when using `Application` isolation SSO configuration and _Require ID Token_ in logout request is set to `No`.* |
274275
| post_logout_redirect_uri | No | The URL that the user should be redirected to after successful sign out. If it isn't included, Azure AD B2C shows the user a generic message. Unless you provide an `id_token_hint`, you should not register this URL as a reply URL in your Azure AD B2C application settings. |
275276
| state | No | If a `state` parameter is included in the request, the same value should appear in the response. The application should verify that the `state` values in the request and response are identical. |
276277

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ Now that your tenant can issue SAML assertions, you need to create the SAML rely
160160

161161
1. Open the *SignUpOrSigninSAML.xml* file in your preferred editor.
162162

163-
1. Change the `PolicyId` and `PublicPolicyUri` of the policy to _B2C_1A_signup_signin_saml_ and _http://tenant-name.onmicrosoft.com/B2C_1A_signup_signin_saml_ as seen below.
163+
1. Change the `PolicyId` and `PublicPolicyUri` of the policy to _B2C_1A_signup_signin_saml_ and `http://tenant-name.onmicrosoft.com/B2C_1A_signup_signin_saml` as seen below.
164164

165165
```XML
166166
<TrustFrameworkPolicy

0 commit comments

Comments
 (0)