Skip to content

Commit ce8eecb

Browse files
authored
Merge pull request #134711 from MicrosoftDocs/master
10/20 PM Publish
2 parents b6f3cca + a3dfd12 commit ce8eecb

File tree

639 files changed

+2948
-2284
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

639 files changed

+2948
-2284
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1246,6 +1246,11 @@
12461246
"redirect_url": "/azure/machine-learning/how-to-debug-pipelines",
12471247
"redirect_document_id": false
12481248
},
1249+
{
1250+
"source_path": "articles/machine-learning/how-to-use-parallel-run-step.md",
1251+
"redirect_url": "/azure/machine-learning/tutorial-pipeline-batch-scoring-classification",
1252+
"redirect_document_id": false
1253+
},
12491254
{
12501255
"source_path": "articles/batch-ai/cli-samples.md",
12511256
"redirect_url": "/previous-versions/azure/batch-ai/cli-samples",
@@ -8935,7 +8940,7 @@
89358940
},
89368941
{
89378942
"source_path": "articles/connectors/connectors-create-api-twitter",
8938-
"redirect_url": "/connectors/twitterconnector/",
8943+
"redirect_url": "/connectors/twitter/",
89398944
"redirect_document_id": true
89408945
},
89418946
{
@@ -24344,8 +24349,13 @@
2434424349
},
2434524350
{
2434624351
"source_path": "articles/active-directory/develop/howto-v1-debug-saml-sso-issues.md",
24347-
"redirect_url": "/azure/active-directory/azuread-dev/howto-v1-debug-saml-sso-issues",
24348-
"redirect_document_id": true
24352+
"redirect_url": "/azure/active-directory/manage-apps/debug-saml-sso-issues",
24353+
"redirect_document_id": false
24354+
},
24355+
{
24356+
"source_path": "articles/active-directory/azuread-dev/howto-v1-debug-saml-sso-issues.md",
24357+
"redirect_url": "/azure/active-directory/manage-apps/debug-saml-sso-issues",
24358+
"redirect_document_id": false
2434924359
},
2435024360
{
2435124361
"source_path": "articles/active-directory/develop/howto-v1-enable-sso-android.md",
@@ -25614,8 +25624,8 @@
2561425624
},
2561525625
{
2561625626
"source_path": "articles/active-directory/develop/active-directory-saml-debugging.md",
25617-
"redirect_url": "/azure/active-directory/develop/howto-v1-debug-saml-sso-issues",
25618-
"redirect_document_id": true
25627+
"redirect_url": "/azure/active-directory/manage-apps/debug-saml-sso-issues",
25628+
"redirect_document_id": false
2561925629
},
2562025630
{
2562125631
"source_path": "articles/active-directory/develop/active-directory-devhowto-appsource-certified.md",

articles/active-directory-b2c/access-tokens.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 05/12/2020
11+
ms.date: 10/19/2020
1212
ms.custom: project-no-code
1313
ms.author: mimart
1414
ms.subservice: B2C
@@ -46,10 +46,15 @@ The following example shows scopes encoded in a URL:
4646
scope=https%3A%2F%2Fcontoso.onmicrosoft.com%2Fapi%2Fread%20openid%20offline_access
4747
```
4848

49-
If you request more scopes than what is granted for your client application, the call succeeds if at least one permission is granted. The **scp** claim in the resulting access token is populated with only the permissions that were successfully granted. The OpenID Connect standard specifies several special scope values. The following scopes represent the permission to access the user's profile:
49+
If you request more scopes than what is granted for your client application, the call succeeds if at least one permission is granted. The **scp** claim in the resulting access token is populated with only the permissions that were successfully granted.
50+
51+
### OpenID Connect scopes
52+
53+
The OpenID Connect standard specifies several special scope values. The following scopes represent the permission to access the user's profile:
5054

5155
- **openid** - Requests an ID token.
5256
- **offline_access** - Requests a refresh token using [Auth Code flows](authorization-code-flow.md).
57+
- **00000000-0000-0000-0000-000000000000** - Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID.
5358

5459
If the **response_type** parameter in an `/authorize` request includes `token`, the **scope** parameter must include at least one resource scope other than `openid` and `offline_access` that will be granted. Otherwise, the `/authorize` request fails.
5560

articles/active-directory-b2c/conditional-access-identity-protection-setup.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,12 @@ The following risk detections are currently supported for Azure AD B2C:
3838
|Risk detection type |Description |
3939
|---------|---------|
4040
| Atypical travel | Sign in from an atypical location based on the user's recent sign-ins. |
41-
|Anonymous IP address | Sign in from an anonymous IP address (for example: Tor browser, anonymizer VPNs) |
41+
|Anonymous IP address | Sign in from an anonymous IP address (for example: Tor browser, anonymizer VPNs). |
42+
|Malware linked IP address | Sign in from a malware linked IP address. |
4243
|Unfamiliar sign-in properties | Sign in with properties we've not seen recently for the given user. |
43-
|Malware linked IP address | Sign in from a malware linked IP address |
44-
|Azure AD threat intelligence | Microsoft's internal and external threat intelligence sources have identified a known attack pattern |
44+
|Admin confirmed user compromised | An admin has indicated that a user was compromised. |
45+
|Password spray | Sign in through a password spray attack. |
46+
|Azure AD threat intelligence | Microsoft's internal and external threat intelligence sources have identified a known attack pattern. |
4547

4648
## View risk events for your Azure AD B2C tenant
4749

articles/active-directory-b2c/data-residency.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/06/2020
12+
ms.date: 10/20/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
ms.custom: references_regions
@@ -55,6 +55,14 @@ The following countries/regions are in the process of being added to the list. F
5555

5656
> Argentina, Australia, Brazil, Chile, Colombia, Ecuador, Iraq, New Zealand, Paraguay, Peru, Uruguay, and Venezuela.
5757
58+
## Remote profile solution
59+
60+
With Azure AD B2C [custom policies](custom-policy-overview.md), you can integrate with [RESTful API services](custom-policy-rest-api-intro.md), which allow you to store and read user profiles from a remote database (such as a marketing database, CRM system, or any line-of-business application).
61+
- During the sign-up and profile editing flows, Azure AD B2C calls a custom REST API to persist the user profile to the remote data source. The user's credentials are stored in Azure AD B2C directory.
62+
- Upon sign-in, after credentials validation with a local or social account, Azure AD B2C invokes the REST API, which sends the user's unique identifier as a user primary key (email address or user objectId). The REST API reads the data from the remote database and returns the user profile.
63+
64+
After sign-up, profile editing, or sign-in is complete, Azure AD B2C includes the user profile in the access token that is returned to the application. For more information, see the [Azure AD B2C Remote profile sample solution](https://github.com/azure-ad-b2c/samples/tree/master/policies/remote-profile) in GitHub.
65+
5866
## Preview tenant
5967

6068
If you had created a B2C tenant during Azure AD B2C's preview period, it's likely that your **Tenant type** says **Preview tenant**.
@@ -65,4 +73,8 @@ If this is the case, you must use your tenant ONLY for development and testing p
6573

6674
There are known issues when you delete a preview B2C tenant and create a production-scale B2C tenant with the same domain name. *You must create a production-scale B2C tenant with a different domain name*.
6775

68-
![Screenshot of a tenant type, as preview tenant.](./media/data-residency/preview-b2c-tenant.png)
76+
![Screenshot of a tenant type, as preview tenant.](./media/data-residency/preview-b2c-tenant.png)
77+
78+
## Next steps
79+
80+
- [Create an Azure AD B2C tenant](tutorial-create-tenant.md).

articles/active-directory/azuread-dev/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -97,8 +97,6 @@
9797
href: howto-v1-enable-sso-android.md
9898
- name: Enable SSO on iOS
9999
href: howto-v1-enable-sso-ios.md
100-
- name: Debug SAML-based SSO
101-
href: howto-v1-debug-saml-sso-issues.md
102100
- name: Configure claims
103101
items:
104102
- name: Configure role claims

articles/active-directory/fundamentals/active-directory-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ For a complete list of the pre-integrated applications, see the [Active Director
158158

159159
For more information, see:
160160

161-
* [Configuring single sign-on to applications that are not in the Azure Active Directory application gallery](../manage-apps/configure-federated-single-sign-on-non-gallery-applications.md)
161+
* [Configuring single sign-on to applications that are not in the Azure Active Directory application gallery](../manage-apps/configure-saml-single-sign-on.md)
162162
* [Using SCIM to enable automatic provisioning of users and groups from Azure Active Directory to applications](../app-provisioning/use-scim-to-provision-users-and-groups.md)
163163

164164
---

articles/active-directory/fundamentals/active-directory-ops-guide-ops.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Some identity and access management services require on-premises agents to enabl
8686
#### On-premises agents logs recommended reading
8787

8888
- [Troubleshoot Application Proxy](../manage-apps/application-proxy-troubleshoot.md)
89-
- [Self-service password reset troubleshooting- Azure Active Directory](../authentication/active-directory-passwords-troubleshoot.md#password-writeback-event-log-error-codes)
89+
- [Self-service password reset troubleshooting- Azure Active Directory](../authentication/troubleshoot-sspr.md)
9090
- [Understand Azure AD Application Proxy connectors](../manage-apps/application-proxy-connectors.md)
9191
- [Azure AD Connect: Troubleshoot Pass-through Authentication](../hybrid/tshoot-connect-pass-through-authentication.md#collecting-pass-through-authentication-agent-logs)
9292
- [Troubleshoot error codes for the Azure MFA NPS extension](../authentication/howto-mfa-nps-extension-errors.md)

0 commit comments

Comments
 (0)