Skip to content

Commit d50b846

Browse files
authored
Merge branch 'main' into patch-3
2 parents b3f86bb + 733c11b commit d50b846

File tree

10,938 files changed

+138745
-134673
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

10,938 files changed

+138745
-134673
lines changed

.github/workflows/stale.yml

Lines changed: 0 additions & 37 deletions
This file was deleted.

.openpublishing.publish.config.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -128,12 +128,6 @@
128128
"branch": "master",
129129
"branch_mapping": {}
130130
},
131-
{
132-
"path_to_root": "azure-docs-snippets-pr",
133-
"url": "https://github.com/MicrosoftDocs/azure-docs-snippets-pr",
134-
"branch": "main",
135-
"branch_mapping": {}
136-
},
137131
{
138132
"path_to_root": "azure-functions-dapr-extension",
139133
"url": "https://github.com/Azure/azure-functions-dapr-extension",

.openpublishing.redirection.json

Lines changed: 5118 additions & 3734 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,10 +78,10 @@ Content-type: application/json
7878
}
7979
],
8080
"displayName": "John Smith",
81-
"objectId": "ab3ec3b2-a435-45e4-b93a-56a005e88bb7",
81+
"objectId": "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",
8282
"extension_<extensions-app-id>_CustomAttribute1": "custom attribute value",
8383
"extension_<extensions-app-id>_CustomAttribute2": "custom attribute value",
84-
"client_id": "231c70e8-8424-48ac-9b5d-5623b9e4ccf3",
84+
"client_id": "00001111-aaaa-2222-bbbb-3333cccc4444",
8585
"step": "PreTokenIssuance",
8686
"ui_locales":"en-US"
8787
}
@@ -169,7 +169,7 @@ A claim provides temporary storage of data during an Azure AD B2C policy executi
169169
</ClaimType>
170170
```
171171
## Add the RESTful API technical profile
172-
A [Restful technical profile](restful-technical-profile.md) provides support for interfacing with your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element in your <em>**`TrustFrameworkExtensions.xml`**</em> file and add a new claims provider as follows:
172+
A [RESTful technical profile](restful-technical-profile.md) provides support for interfacing with your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element in your <em>**`TrustFrameworkExtensions.xml`**</em> file and add a new claims provider as follows:
173173
```xml
174174
<ClaimsProvider>
175175
<DisplayName>REST APIs</DisplayName>
@@ -280,8 +280,8 @@ Save the files you changed: *TrustFrameworkBase.xml*, and *TrustFrameworkExtensi
280280
"exp": 1584961516,
281281
"nbf": 1584957916,
282282
"ver": "1.0",
283-
"iss": "https://contoso.b2clogin.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
284-
"aud": "e1d2612f-c2bc-4599-8e7b-d874eaca1ee1",
283+
"iss": "https://contoso.b2clogin.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/",
284+
"aud": "11112222-bbbb-3333-cccc-4444dddd5555",
285285
"acr": "b2c_1a_signup_signin",
286286
"nonce": "defaultNonce",
287287
"iat": 1584957916,

articles/active-directory-b2c/add-api-connector.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Content-type: application/json
7676
}
7777
],
7878
"displayName": "John Smith",
79-
"objectId": "11111111-0000-0000-0000-000000000000",
79+
"objectId": "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",
8080
"givenName":"John",
8181
"surname":"Smith",
8282
"jobTitle":"Supplier",
@@ -88,7 +88,7 @@ Content-type: application/json
8888
"extension_<extensions-app-id>_CustomAttribute1": "custom attribute value",
8989
"extension_<extensions-app-id>_CustomAttribute2": "custom attribute value",
9090
"step": "<step-name>",
91-
"client_id":"93fd07aa-333c-409d-955d-96008fd08dd9",
91+
"client_id":"00001111-aaaa-2222-bbbb-3333cccc4444",
9292
"ui_locales":"en-US"
9393
}
9494
```
@@ -211,7 +211,7 @@ Content-type: application/json
211211
"extension_<extensions-app-id>_CustomAttribute1": "custom attribute value",
212212
"extension_<extensions-app-id>_CustomAttribute2": "custom attribute value",
213213
"step": "PostAttributeCollection",
214-
"client_id":"93fd07aa-333c-409d-955d-96008fd08dd9",
214+
"client_id":"00001111-aaaa-2222-bbbb-3333cccc4444",
215215
"ui_locales":"en-US"
216216
}
217217
```
@@ -262,7 +262,7 @@ POST <API-endpoint>
262262
Content-type: application/json
263263
264264
{
265-
"clientId": "231c70e8-8424-48ac-9b5d-5623b9e4ccf3",
265+
"clientId": "11112222-bbbb-3333-cccc-4444dddd5555",
266266
"step": "PreTokenApplicationClaims",
267267
"ui_locales":"en-US",
268268
"email": "[email protected]",
@@ -442,7 +442,7 @@ A claim provides temporary storage of data during an Azure AD B2C policy executi
442442

443443
## Add the RESTful API technical profile
444444

445-
A [Restful technical profile](restful-technical-profile.md) provides support for interfacing to your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element and add a new claims provider as follows:
445+
A [RESTful technical profile](restful-technical-profile.md) provides support for interfacing to your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element and add a new claims provider as follows:
446446

447447
```xml
448448
<ClaimsProvider>
@@ -597,8 +597,8 @@ To return the promo code claim back to the relying party application, add an out
597597
"exp": 1584295703,
598598
"nbf": 1584292103,
599599
"ver": "1.0",
600-
"iss": "https://contoso.b2clogin.com/f06c2fe8-709f-4030-85dc-38a4bfd9e82d/v2.0/",
601-
"aud": "e1d2612f-c2bc-4599-8e7b-d874eaca1ee1",
600+
"iss": "https://contoso.b2clogin.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/",
601+
"aud": "22223333-cccc-4444-dddd-5555eeee6666",
602602
"acr": "b2c_1a_signup_signin",
603603
"nonce": "defaultNonce",
604604
"iat": 1584292103,

articles/active-directory-b2c/add-captcha.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -234,9 +234,9 @@ For the various page layouts, use the following page layout versions:
234234

235235
|Page layout |Page layout version range |
236236
|---------|---------|
237-
| Selfasserted | >=2.1.30 |
238-
| Unifiedssp | >=2.1.18 |
239-
| Multifactor | >=1.2.16 |
237+
| Selfasserted | >=2.1.33 |
238+
| Unifiedssp | >=2.1.21 |
239+
| Multifactor | >=1.2.19 |
240240

241241
**Example:**
242242

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77
ms.service: azure-active-directory
88
ms.topic: how-to
9-
ms.date: 11/27/2023
9+
ms.date: 11/27/2024
1010
ms.author: godonnell
1111
ms.subservice: b2c
1212
zone_pivot_groups: b2c-policy-type

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -316,7 +316,7 @@ POST /<tenant-name>.onmicrosoft.com/B2C_1A_ROPC_Auth/oauth2/v2.0/token HTTP/1.1
316316
Host: <tenant-name>.b2clogin.com
317317
Content-Type: application/x-www-form-urlencoded
318318

319-
username=contosouser.outlook.com.ws&password=Passxword1&grant_type=password&scope=openid+bef22d56-552f-4a5b-b90a-1988a7d634ce+offline_access&client_id=bef22d56-552f-4a5b-b90a-1988a7d634ce&response_type=token+id_token
319+
username=contosouser.outlook.com.ws&password=Passxword1&grant_type=password&scope=openid+00001111-aaaa-2222-bbbb-3333cccc4444+offline_access&client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=token+id_token
320320
```
321321

322322
A successful response with offline-access looks like the following example:
@@ -379,4 +379,4 @@ A successful response looks like the following example:
379379

380380
## Use a native SDK or App-Auth
381381

382-
Azure AD B2C meets OAuth 2.0 standards for public client resource owner password credentials and should be compatible with most client SDKs. For the latest information, see [Native App SDK for OAuth 2.0 and OpenID Connect implementing modern best practices](https://appauth.io/).
382+
Azure AD B2C meets OAuth 2.0 standards for public client resource owner password credentials and should be compatible with most client SDKs. For the latest information, see [Native App SDK for OAuth 2.0 and OpenID Connect implementing modern best practices](https://appauth.io/).

articles/active-directory-b2c/add-sign-up-and-sign-in-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77
ms.service: azure-active-directory
88
ms.topic: how-to
9-
ms.date: 03/22/2024
9+
ms.date: 01/10/2025
1010
ms.author: godonnell
1111
ms.subservice: b2c
1212
ms.custom: "b2c-support"

articles/active-directory-b2c/age-gating.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Age gating in Azure Active Directory B2C (Azure AD B2C) enables you to identify
2525
>This feature is in public preview. Do not use feature for production applications.
2626
>
2727
28-
When age gating is enabled for a user flow, users are asked for their date of birth, and country of residence. If a user signs in that hasn't previously entered the information, they'll need to enter it the next time they sign in. The rules are applied every time a user signs in.
28+
When age gating is enabled for a user flow, users are asked for their date of birth, and country/region of residence. If a user signs in that hasn't previously entered the information, they'll need to enter it the next time they sign in. The rules are applied every time a user signs in.
2929

3030
![Screenshot of age gating information gather flow](./media/age-gating/age-gating-information-gathering.png)
3131

@@ -69,7 +69,7 @@ After your tenant is set up to use age gating, you can then use this feature in
6969
1. To test your policy, select **Run user flow**.
7070
1. For **Application**, select the web application named *testapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
7171
1. Select the **Run user flow** button.
72-
1. Sign-in with a local or social account. Then select your country of residence, and date of birth that simulate a minor.
72+
1. Sign-in with a local or social account. Then select your country/region of residence, and date of birth that simulate a minor.
7373
1. Repeat the test, and select a date of birth that simulates an adult.
7474

7575
When you sign-in as a minor, you should see the following error message: *Unfortunately, your sign on has been blocked. Privacy and online safety laws in your country prevent access to accounts belonging to children.*

0 commit comments

Comments
 (0)