Skip to content

Commit d330c46

Browse files
authored
Merge branch 'main' into five-private-endpoint-articles
2 parents cbf6a7b + b36d8cf commit d330c46

File tree

1,835 files changed

+18233
-8564
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,835 files changed

+18233
-8564
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,11 @@
1010
"redirect_url": "/azure/azure-monitor/app/performance-counters",
1111
"redirect_document_id": true
1212
},
13+
{
14+
"source_path_from_root": "/articles/application-insights/cloudservices.md",
15+
"redirect_url": "/azure/azure-monitor/app/azure-web-apps-net",
16+
"redirect_document_id": false
17+
},
1318
{
1419
"source_path_from_root": "/articles/azure-monitor/insights/service-bus-insights.md",
1520
"redirect_url": "/azure/service-bus-messaging/service-bus-insights",

.openpublishing.redirection.json

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44154,6 +44154,11 @@
4415444154
"redirect_url": "/azure/azure-monitor/agents/azure-monitor-agent-manage",
4415544155
"redirect_document_id": true
4415644156
},
44157+
{
44158+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/managed-identity-byos.md",
44159+
"redirect_url": "/azure/applied-ai-services/form-recognizer/managed-identities",
44160+
"redirect_document_id": false
44161+
},
4415744162
{
4415844163
"source_path_from_root": "/articles/azure/virtual-desktop/azure-advisor.md",
4415944164
"redirect_url": "/azure/advisor/advisor-overview",
@@ -44178,6 +44183,25 @@
4417844183
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create-group-policy.md",
4417944184
"redirect_url": "/azure/governance/policy/how-to/guest-configuration-create",
4418044185
"redirect_document_id": false
44186+
},
44187+
{ "source_path_from_root": "/articles/azure/marketplace/co-sell-requirements.md",
44188+
"redirect_url": "/partner-center/co-sell-requirements",
44189+
"redirect_document_id": false
44190+
},
44191+
{
44192+
"source_path_from_root": "/articles/azure/marketplace/co-sell-status.md",
44193+
"redirect_url": "/partner-center/co-sell-status",
44194+
"redirect_document_id": false
44195+
},
44196+
{
44197+
"source_path_from_root": "/articles/azure/marketplace/co-sell-configure.md",
44198+
"redirect_url": "/partner-center/co-sell-configure",
44199+
"redirect_document_id": false
44200+
},
44201+
{
44202+
"source_path_from_root": "/articles/azure/marketplace/co-sell-overview.md",
44203+
"redirect_url": "/partner-center/co-sell-overview",
44204+
"redirect_document_id": false
4418144205
}
4418244206
]
4418344207
}

CONTRIBUTING.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Thank you for taking the time to contribute to the Microsoft Azure documentation.
44

5-
This guide covers some general topics related to contribution and refers to the [contributors guide](https://docs.microsoft.com/contribute) for more detailed explanations when required.
5+
This guide covers some general topics related to contribution and refers to the [contributors guide](/contribute) for more detailed explanations when required.
66

77
## Code of Conduct
88

@@ -21,8 +21,8 @@ Please use the Feedback tool at the bottom of any article to submit bugs and sug
2121

2222
### Editing in GitHub
2323

24-
Follow the guidance for [Quick edits to existing documents](https://docs.microsoft.com/contribute/#quick-edits-to-existing-documents) in our contributors guide.
24+
Follow the guidance for [Quick edits to existing documents](/contribute/#quick-edits-to-existing-documents) in our contributors guide.
2525

2626
### Pull Request
2727

28-
Review the guidance for [Pull Requests](https://docs.microsoft.com/contribute/how-to-write-workflows-major#pull-request-processing) in our contributors guide.
28+
Review the guidance for [Pull Requests](/contribute/how-to-write-workflows-major#pull-request-processing) in our contributors guide.

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Contributing to open source is more than just providing updates, it's also about
1010

1111
You've decided to contribute, that's great! To contribute to the documentation, you need a few tools.
1212

13-
Contributing to the documentation requires a GitHub account. If you don't have an account, follow the instructions for the [GitHub account setup](https://docs.microsoft.com/contribute/get-started-setup-github) from our contributor guide.
13+
Contributing to the documentation requires a GitHub account. If you don't have an account, follow the instructions for the [GitHub account setup](/contribute/get-started-setup-github) from our contributor guide.
1414

1515
#### Download
1616

@@ -22,7 +22,7 @@ Install the following tools:
2222

2323
#### Install
2424

25-
Follow the instructions provided in the [Install content authoring tools](https://docs.microsoft.com/contribute/get-started-setup-tools) from our contributor guide.
25+
Follow the instructions provided in the [Install content authoring tools](/contribute/get-started-setup-tools) from our contributor guide.
2626

2727
## License
2828

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 01/17/2022
12+
ms.date: 02/16/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -20,7 +20,7 @@ This article provides examples for using the boolean claims transformations of t
2020

2121
## AndClaims
2222

23-
Computes an `And` operation of two boolean input claims, and sets the output claim with result of the operation.
23+
Computes an `And` operation of two boolean input claims, and sets the output claim with result of the operation. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean#andclaims) of this claims transformation.
2424

2525
| Element | TransformationClaimType | Data Type | Notes |
2626
|-------| ------------------------ | ---------- | ----- |
@@ -54,7 +54,7 @@ The following claims transformation demonstrates how to `And` two boolean claims
5454

5555
## AssertBooleanClaimIsEqualToValue
5656

57-
Checks that boolean values of two claims are equal, and throws an exception if they are not.
57+
Checks that boolean values of two claims are equal, and throws an exception if they aren't. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean#assertbooleanclaimisequaltovalue) of this claims transformation.
5858

5959
| Element | TransformationClaimType | Data Type | Notes |
6060
| ---- | ------------------------ | ---------- | ----- |
@@ -63,7 +63,7 @@ Checks that boolean values of two claims are equal, and throws an exception if t
6363

6464
The **AssertBooleanClaimIsEqualToValue** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationBooleanValueIsNotEqual** self-asserted technical profile metadata controls the error message that the technical profile presents to the user. The error messages can be [localized](localization-string-ids.md#claims-transformations-error-messages).
6565

66-
![AssertStringClaimsAreEqual execution](./media/boolean-transformations/assert-execution.png)
66+
![Diagram shows how to use the AssertStringClaimsAreEqual claims transformation.](./media/boolean-transformations/assert-execution.png)
6767

6868
### Example of AssertBooleanClaimIsEqualToValue
6969

@@ -122,7 +122,7 @@ The self-asserted technical profile calls the validation `Example-AssertBoolean`
122122

123123
## CompareBooleanClaimToValue
124124

125-
Checks that boolean value of a claim is equal to `true` or `false`, and return the result of the compression.
125+
Checks that boolean value of a claim is equal to `true` or `false`, and return the result of the compression. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean#comparebooleanclaimtovalue) of this claims transformation.
126126

127127
| Element | TransformationClaimType | Data Type | Notes |
128128
| ---- | ------------------------ | ---------- | ----- |
@@ -157,7 +157,7 @@ The following claims transformation demonstrates how to check the value of a boo
157157

158158
## NotClaims
159159

160-
Computes a `Not` operation of the boolean input claim and sets the output claim with result of the operation.
160+
Computes a `Not` operation of the boolean input claim and sets the output claim with result of the operation. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean#notclaims) of this claims transformation.
161161

162162
| Element | TransformationClaimType | Data Type | Notes |
163163
| ---- | ----------------------- | --------- | ----- |
@@ -186,7 +186,7 @@ The following claims transformation demonstrates how to perform logical negation
186186

187187
## OrClaims
188188

189-
Computes an `Or` of two boolean claims and sets the output claim with result of the operation.
189+
Computes an `Or` of two boolean claims and sets the output claim with result of the operation. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean#orclaims) of this claims transformation.
190190

191191
| Element | TransformationClaimType | Data Type | Notes |
192192
| ---- | ----------------------- | --------- | ----- |
@@ -218,4 +218,4 @@ The following claims transformation demonstrates how to `Or` two boolean claims.
218218

219219
## Next steps
220220

221-
- Find more [claims transformation samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation) on the Azure AD B2C community GitHub repo
221+
- Find more [claims transformation samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean) on the Azure AD B2C community GitHub repo

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 1/11/2022
12+
ms.date: 02/16/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -47,6 +47,8 @@ The following table lists the claim resolvers with information about the languag
4747
| {Culture:RegionName} | The two letter ISO code for the region. | US |
4848
| {Culture:RFC5646} | The RFC5646 language code. | en-US |
4949

50+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#culture) of the culture claim resolvers.
51+
5052
## Policy
5153

5254
The following table lists the claim resolvers with information about the policy used in the authorization request:
@@ -58,6 +60,7 @@ The following table lists the claim resolvers with information about the policy
5860
| {Policy:TenantObjectId} | The tenant object ID of the relying party policy. | 00000000-0000-0000-0000-000000000000 |
5961
| {Policy:TrustFrameworkTenantId} | The tenant ID of the trust framework. | your-tenant.onmicrosoft.com |
6062

63+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#policy) of the policy claim resolvers.
6164

6265
## Context
6366

@@ -73,6 +76,8 @@ The following table lists the contextual claim resolvers of the authorization re
7376
| {Context:IPAddress} | The user IP address. | 11.111.111.11 |
7477
| {Context:KMSI} | Indicates whether [Keep me signed in](session-behavior.md?pivots=b2c-custom-policy#enable-keep-me-signed-in-kmsi) checkbox is selected. | true |
7578

79+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#context) of the context claim resolvers.
80+
7681
## Claims
7782

7883
This section describes how to get a claim value as a claim resolver.
@@ -100,6 +105,8 @@ The following table lists the claim resolvers with information about the OpenID
100105
| {OIDC:Scope} |The `scope` query string parameter. | openid |
101106
| {OIDC:Username}| The [resource owner password credentials flow](add-ropc-policy.md) user's username.| [email protected]|
102107

108+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#openid-connect-relying-party-application) of the OpenID Connect claim resolvers.
109+
103110
## OAuth2 key-value parameters
104111

105112
Any parameter name included as part of an OIDC or OAuth2 request can be mapped to a claim in the user journey. For example, the request from the application might include a query string parameter with a name of `app_session`, `loyalty_number`, or any custom query string.
@@ -127,6 +134,8 @@ The following table lists the claim resolvers with information about the SAML a
127134
| {SAML:Subject} | The `Subject` from the NameId element of the SAML AuthN request.|
128135
| {SAML:Binding} | The `ProtocolBinding` attribute value, from the `AuthnRequest` element of the SAML request. | urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST |
129136

137+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#saml-service-provider) of the SAML claim resolvers.
138+
130139
## OAuth2 identity provider
131140

132141
The following table lists the [OAuth2 identity provider](oauth2-technical-profile.md) claim resolvers:
@@ -157,7 +166,6 @@ To use the OAuth2 identity provider claim resolvers, set the output claim's `Par
157166
</ClaimsProvider>
158167
```
159168

160-
161169
## Using claim resolvers
162170

163171
You can use claims resolvers with the following elements:
@@ -287,3 +295,7 @@ In a [Relying party](relyingparty.md) policy technical profile, you may want to
287295
</TechnicalProfile>
288296
</RelyingParty>
289297
```
298+
299+
## Next steps
300+
301+
- Find more [claims resolvers samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver) on the Azure AD B2C community GitHub repo

articles/active-directory-b2c/claimsschema.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 03/05/2020
11+
ms.date: 02/16/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: "b2c-support"
@@ -238,6 +238,8 @@ The Identity Experience Framework renders the email address claim with email for
238238

239239
Azure AD B2C supports a variety of user input types, such as a textbox, password, and dropdown list that can be used when manually entering claim data for the claim type. You must specify the **UserInputType** when you collect information from the user by using a [self-asserted technical profile](self-asserted-technical-profile.md) and [display controls](display-controls.md).
240240

241+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims#user-input-types) of the user input type.
242+
241243
The **UserInputType** element available user input types:
242244

243245
| UserInputType | Supported ClaimType | Description |

0 commit comments

Comments
 (0)