Skip to content

Commit d788122

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nw-sfi-01
2 parents 77918ec + 5bf9859 commit d788122

File tree

60 files changed

+891
-932
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+891
-932
lines changed

articles/active-directory-b2c/force-password-reset.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,11 @@
22
title: Configure a force password reset flow in Azure AD B2C
33
titleSuffix: Azure AD B2C
44
description: Learn how to set up a forced password reset flow in Azure Active Directory B2C.
5-
65
author: kengaderdus
76
manager: CelesteDG
8-
97
ms.service: azure-active-directory
10-
118
ms.topic: how-to
12-
ms.date: 01/11/2024
9+
ms.date: 10/11/2024
1310
ms.author: kengaderdus
1411
ms.subservice: b2c
1512
ms.custom: b2c-support, has-azure-ad-ps-ref,azure-ad-ref-level-one-done
@@ -160,16 +157,13 @@ Connect-MgGraph -Scopes 'Domain.ReadWrite.All'
160157
$domainId = "contoso.com"
161158
$params = @{
162159
passwordValidityPeriodInDays = 90
163-
passwordNotificationWindowInDays = 15
164160
}
165161
166162
Update-MgDomain -DomainId $domainId -BodyParameter $params
167163
```
168164

169-
> [!NOTE]
170-
> `passwordValidityPeriodInDays` indicates the length of time in days that a password remains valid before it must be changed. `passwordNotificationWindowInDays` indicates the length of time in days before the password expiration date when users receive their first notification to indicate that their password is about to expire.
171-
172-
## Next steps
165+
- `passwordValidityPeriodInDays` is the length of time in days that a password remains valid before it must be changed.
173166

174-
Set up a [self-service password reset](add-password-reset-policy.md).
167+
## Related content
175168

169+
Set up a [self-service password reset](add-password-reset-policy.md).

articles/api-management/developer-portal-wordpress-plugin.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,8 @@ In this step, create a new Microsoft Entra app. In later steps, you configure th
6969

7070
`https://<apim-instance-name>.developer.azure-api.net/signin`
7171

72-
1. On the **Authentication** page, under **Single-page application**, select **Add URI** and enter the following URI, substituting the name of your API Management instance:
72+
1. Select **+ Add a platform** again. Select **Single-page application** agaain.
73+
1. On the **Configure single-page application** page, enter the following redirect URI, substituting the name of your API Management instance, and select **Configure**:
7374

7475
`https://<apim-instance-name>.developer.azure-api.net/`
7576

Loading
26.4 KB
Loading
18.5 KB
Loading
11.3 KB
Loading
73.2 KB
Loading
114 KB
Loading
40.4 KB
Loading
30.1 KB
Loading

0 commit comments

Comments
 (0)