Skip to content

Commit ce41f9f

Browse files
author
gitName
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into apimropc
2 parents cdd9aef + 02d302e commit ce41f9f

File tree

3,321 files changed

+59725
-45479
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,321 files changed

+59725
-45479
lines changed

.github/workflows/stale.yml

Lines changed: 0 additions & 37 deletions
This file was deleted.

.openpublishing.publish.config.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -128,12 +128,6 @@
128128
"branch": "master",
129129
"branch_mapping": {}
130130
},
131-
{
132-
"path_to_root": "azure-docs-snippets-pr",
133-
"url": "https://github.com/MicrosoftDocs/azure-docs-snippets-pr",
134-
"branch": "main",
135-
"branch_mapping": {}
136-
},
137131
{
138132
"path_to_root": "azure-functions-dapr-extension",
139133
"url": "https://github.com/Azure/azure-functions-dapr-extension",

.openpublishing.redirection.json

Lines changed: 5223 additions & 4769 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/api-connectors-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,7 @@ If you reference a REST API technical profile directly from a user journey, the
244244

245245
## Development of your REST API
246246

247-
Your REST API can be developed on any platform and written in any programing language, as long as it's secure and can send and receive claims in JSON format.
247+
Your REST API can be developed on any platform and written in any programming language, as long as it's secure and can send and receive claims in JSON format.
248248

249249
The request to your REST API service comes from Azure AD B2C servers. The REST API service must be published to a publicly accessible HTTPS endpoint. The REST API call arrives from an Azure data center IP address.
250250

articles/active-directory-b2c/claimsschema.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -325,7 +325,7 @@ The **DateTimeDropdown** user input type is used to provide a set of drop-downs
325325

326326
The **RadioSingleSelect** user input type is used to provide a collection of radio buttons that allows the user to select one option.
327327

328-
![Using claim type with radiodsingleselect](./media/claimsschema/radiosingleselect.png)
328+
![Using claim type with radiosingleselect](./media/claimsschema/radiosingleselect.png)
329329

330330
```xml
331331
<ClaimType Id="color">

articles/active-directory-b2c/configure-authentication-sample-angular-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ Your final configuration file should look like the following JSON:
190190
```json
191191
{
192192
"credentials": {
193-
"tenantName": "<your-tenant-namee>",
193+
"tenantName": "<your-tenant-name>",
194194
"clientID": "<your-webapi-application-ID>",
195195
"issuer": "https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/"
196196
},

articles/active-directory-b2c/custom-policy-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ In the [Azure AD B2C samples GitHub repository](https://github.com/azure-ad-b2c/
4141

4242
### Claims
4343

44-
A claim provides temporary storage of data during an Azure AD B2C policy execution. Claims are more like variable in a programing language. It can store information about the user, such as first name, last name, or any other claim obtained from the user or other systems (claims exchanges). The [claims schema](claimsschema.md) is the place where you declare your claims.
44+
A claim provides temporary storage of data during an Azure AD B2C policy execution. Claims are more like variable in a programming language. It can store information about the user, such as first name, last name, or any other claim obtained from the user or other systems (claims exchanges). The [claims schema](claimsschema.md) is the place where you declare your claims.
4545

4646
When the policy runs, Azure AD B2C sends and receives claims to and from internal and external parties and then sends a subset of these claims to your relying party application as part of the token. Claims are used in these ways:
4747

articles/active-directory-b2c/custom-policy-reference-sso.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ To use a session provider in your technical profile:
7171

7272
```xml
7373
<TechnicalProfile Id="SM-AAD">
74-
<DisplayName>Session Mananagement Provider</DisplayName>
74+
<DisplayName>Session Management Provider</DisplayName>
7575
<Protocol Name="Proprietary" Handler="Web.TPEngine.SSO.DefaultSSOSessionProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
7676
<PersistedClaims>
7777
<PersistedClaim ClaimTypeReferenceId="objectId" />

articles/active-directory-b2c/enable-authentication-angular-spa-app-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -411,7 +411,7 @@ if (this.msalGuardConfig.authRequest) {
411411
authRequestConfig = { ...this.msalGuardConfig.authRequest } as RedirectRequest
412412
}
413413

414-
authRequestConfig.extraQueryParameters = {"id_token_hint": idToken};;
414+
authRequestConfig.extraQueryParameters = {"id_token_hint": idToken};
415415

416416
this.authService.loginRedirect(authRequestConfig);
417417

articles/active-directory-b2c/json-transformations.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Create a JSON single element array from a claim value. Check out the [Live demo]
3636
The following example creates a JSON single array.
3737

3838
```xml
39-
<ClaimsTransformation Id="createlJsonPayload" TransformationMethod="CreateJsonArray">
39+
<ClaimsTransformation Id="CreateJsonPayload" TransformationMethod="CreateJsonArray">
4040
<InputClaims>
4141
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="inputClaim" />
4242
</InputClaims>
@@ -315,7 +315,7 @@ In the following example, the claims transformation extracted the `emailAddress`
315315
The GetClaimFromJson claims transformation gets a single element from a JSON data. In the preceding example, the emailAddress. To get the displayName, create another claims transformation. For example:
316316

317317
```xml
318-
<ClaimsTransformation Id="GetDispalyNameClaimFromJson" TransformationMethod="GetClaimFromJson">
318+
<ClaimsTransformation Id="GetDisplayNameClaimFromJson" TransformationMethod="GetClaimFromJson">
319319
<InputClaims>
320320
<InputClaim ClaimTypeReferenceId="customUserData" TransformationClaimType="inputJson" />
321321
</InputClaims>
@@ -593,7 +593,7 @@ In the following example, the claims transformation extracts the first element (
593593

594594
- Output claims:
595595
- **key**: givenName
596-
- **value**: Emilty
596+
- **value**: Emily
597597

598598

599599
## GetSingleValueFromJsonArray
@@ -637,7 +637,7 @@ Convert XML data to JSON format. Check out the [Live demo](https://github.com/az
637637
```xml
638638
<ClaimsTransformation Id="ConvertXmlToJson" TransformationMethod="XmlStringToJsonString">
639639
<InputClaims>
640-
<InputClaim ClaimTypeReferenceId="intpuXML" TransformationClaimType="xml" />
640+
<InputClaim ClaimTypeReferenceId="inputXML" TransformationClaimType="xml" />
641641
</InputClaims>
642642
<OutputClaims>
643643
<OutputClaim ClaimTypeReferenceId="outputJson" TransformationClaimType="json" />

0 commit comments

Comments
 (0)