Skip to content

Commit cf30dbe

Browse files
committed
Merge branch 'master' into pubclientrediruri
2 parents 4f90025 + 9b5c0c9 commit cf30dbe

File tree

764 files changed

+18397
-13638
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

764 files changed

+18397
-13638
lines changed

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10455,7 +10455,7 @@
1045510455
},
1045610456
{
1045710457
"source_path_from_root": "/articles/azure-resource-manager/templates/template-functions-any.md",
10458-
"redirect_url": "/azure/azure-resource-manager/bicep/template-functions-any",
10458+
"redirect_url": "/azure/azure-resource-manager/bicep/bicep-functions-any",
1045910459
"redirect_document_id": false
1046010460
},
1046110461
{
@@ -14063,6 +14063,16 @@
1406314063
"redirect_url": "/azure/azure-toolkit-for-intelliJ",
1406414064
"redirect_document_id": false
1406514065
},
14066+
{
14067+
"source_path_from_root": "/articles/azure-vmware/deploy-disaster-recovery-using-jetstream.md",
14068+
"redirect_url": "/azure/azure-vmware/concepts-run-command",
14069+
"redirect_document_id": false
14070+
},
14071+
{
14072+
"source_path_from_root": "/articles/azure-vmware/deploy-zerto-disaster-recovery.md",
14073+
"redirect_url": "/azure/azure-vmware/introduction",
14074+
"redirect_document_id": false
14075+
},
1406614076
{
1406714077
"source_path_from_root": "/articles/azure-vmware/concepts-monitor-protection.md",
1406814078
"redirect_url": "/azure/azure-vmware/integrate-azure-native-services",

articles/active-directory-b2c/azure-monitor.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,10 @@ In this article, you learn how to transfer the logs to an Azure Log Analytics wo
3131
> [!IMPORTANT]
3232
> When you plan to transfer Azure AD B2C logs to different monitoring solutions, or repository, consider the following. Azure AD B2C logs contain personal data. Such data should be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing, using appropriate technical or organizational measures.
3333
34+
Watch this video to learn how to configure monitoring for Azure AD B2C using Azure Monitor.
35+
36+
>[!Video https://www.youtube.com/embed/tF2JS6TGc3g]
37+
3438
## Deployment overview
3539

3640
Azure AD B2C leverages [Azure Active Directory monitoring](../active-directory/reports-monitoring/overview-monitoring.md). Because an Azure AD B2C tenant, unlike Azure AD tenants, can't have a subscription associated with it, we need to take some additional steps to enable the integration between Azure AD B2C and Log Analytics, which is where we'll send the logs.

articles/active-directory-b2c/azure-sentinel.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ In this tutorial, you'll learn to:
3838

3939
Enable **Diagnostic settings** in Azure AD within your Azure AD B2C tenant to define where logs and metrics for a resource should be sent.
4040

41-
Then after, [configure Azure AD B2C to send logs to Azure Monitor](https://docs.microsoft.com/azure/active-directory-b2c/azure-monitor).
41+
Then after, [configure Azure AD B2C to send logs to Azure Monitor](./azure-monitor.md).
4242

4343
## Deploy an Azure Sentinel instance
4444

@@ -79,7 +79,7 @@ In the following example, we explain the scenario where you receive a notificati
7979
1. From the Azure Sentinel navigation menu, select **Analytics**.
8080

8181
2. In the action bar at the top, select **+ Create** and select
82-
**Scheduled query rule**. It will open the **Analytics rule wizard**.
82+
**Scheduled query rule**. This will open the **Analytics rule wizard**.
8383

8484
![image shows select create scheduled query rule](./media/azure-sentinel/create-scheduled-rule.png)
8585

articles/active-directory-b2c/customize-ui.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/27/2021
12+
ms.date: 09/06/2021
1313
ms.custom: "project-no-code, b2c-support"
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -206,11 +206,10 @@ Keep these things in mind when you configure company branding in Azure AD B2C:
206206
* The banner logo appears in the verification emails sent to your users when they initiate a sign-up user flow.
207207

208208

209+
::: zone pivot="b2c-user-flow"
209210

210211
## Enable company branding in user flow pages
211212

212-
::: zone pivot="b2c-user-flow"
213-
214213
Once you've configured company branding, enable it in your user flows.
215214

216215
1. In the left menu of the Azure portal, select **Azure AD B2C**.
@@ -228,6 +227,8 @@ If you'd like to brand all pages in the user flow, set the page layout version f
228227

229228
::: zone pivot="b2c-custom-policy"
230229

230+
## Enable company branding in custom policy pages
231+
231232
Once you've configured company branding, enable it in your custom policy. Configure the [page layout version](contentdefinitions.md#migrating-to-page-layout) with page `contract` version for *all* of the content definitions in your custom policy. The format of the value must contain the word `contract`: _urn:com:microsoft:aad:b2c:elements:**contract**:page-name:version_. To specify a page layout in your custom policies that use an old **DataUri** value. For more information, learn how to [migrate to page layout](contentdefinitions.md#migrating-to-page-layout) with page version.
232233

233234
The following example shows the content definitions with their corresponding the page contract, and *Ocean Blue* page template:

articles/active-directory-b2c/language-customization.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,10 @@ You might not need that level of control over what languages your customer sees.
3434
> [!NOTE]
3535
> If you're using custom user attributes, you need to provide your own translations. For more information, see [Customize your strings](#customize-your-strings).
3636
37+
Watch this video to learn how to localize or customize language using Azure AD B2C.
38+
39+
>[!Video https://www.youtube.com/embed/yqrX5_tA7Ms]
40+
3741
::: zone pivot="b2c-custom-policy"
3842

3943
Localization requires three steps:

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -144,11 +144,8 @@ It helps to categorize between `/User` and `/Group` to map any default user attr
144144
| Azure Active Directory group | urn:ietf:params:scim:schemas:core:2.0:Group |
145145
| --- | --- |
146146
| displayName |displayName |
147-
| mail |emails[type eq "work"].value |
148-
| mailNickname |displayName |
149147
| members |members |
150148
| objectId |externalId |
151-
| proxyAddresses |emails[type eq "other"].Value |
152149

153150
**Example list of group attributes**
154151

@@ -1422,4 +1419,4 @@ To help drive awareness and demand of our joint integration, we recommend you up
14221419
> [Writing expressions for attribute mappings](functions-for-customizing-application-data.md)
14231420
> [Scoping filters for user provisioning](define-conditional-rules-for-provisioning-user-accounts.md)
14241421
> [Account provisioning notifications](user-provisioning.md)
1425-
> [List of tutorials on how to integrate SaaS apps](../saas-apps/tutorial-list.md)
1422+
> [List of tutorials on how to integrate SaaS apps](../saas-apps/tutorial-list.md)

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@
264264
- name: Interactive with WAM
265265
href: scenario-desktop-acquire-token-wam.md
266266
- name: Integrated Windows Auth
267-
href: scenario-desktop-acquire-token-iwa.md
267+
href: scenario-desktop-acquire-token-integrated-windows-authentication.md
268268
- name: Username Password
269269
href: scenario-desktop-acquire-token-username-password.md
270270
- name: Device code flow

articles/active-directory/develop/howto-add-branding-in-azure-ad-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.subservice: develop
11-
ms.topic: how-to
11+
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.date: 08/31/2020
1414
ms.author: ryanwi

articles/active-directory/develop/howto-handle-samesite-cookie-changes-chrome-browser.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.workload: identity
12-
ms.topic: how-to
12+
ms.topic: conceptual
1313
ms.date: 01/27/2020
1414
ms.author: jmprieur
1515
ms.reviewer: kkrishna
228 KB
Loading

0 commit comments

Comments
 (0)