Skip to content

Commit dcb1191

Browse files
authored
Merge pull request #215073 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 7068679 + 6f65a23 commit dcb1191

30 files changed

+90
-34
lines changed

articles/active-directory-b2c/threat-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ The smart lockout feature uses many factors to determine when an account should
5555
- Passwords such as 12456! and 1234567! (or newAccount1234 and newaccount1234) are so similar that the algorithm interprets them as human error and counts them as a single try.
5656
- Larger variations in pattern, such as 12456! and ABCD2!, are counted as separate tries.
5757

58-
When testing the smart lockout feature, use a distinctive pattern for each password you enter. Consider using password generation web apps, such as `https://passwordsgenerator.net/`.
58+
When testing the smart lockout feature, use a distinctive pattern for each password you enter. Consider using password generation web apps, such as `https://password-generator.net/`.
5959

6060
When the smart lockout threshold is reached, you'll see the following message while the account is locked: **Your account is temporarily locked to prevent unauthorized use. Try again later**. The error messages can be [localized](localization-string-ids.md#sign-up-or-sign-in-error-messages).
6161

articles/active-directory/develop/userinfo.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@ ms.custom: aaddev
1717

1818
# Microsoft identity platform UserInfo endpoint
1919

20-
Part of the OpenID Connect (OIDC) standard, the [UserInfo endpoint](https://openid.net/specs/openid-connect-core-1_0.html#UserInfo) is returns information about an authenticated user. In the Microsoft identity platform, the UserInfo endpoint is hosted by Microsoft Graph at https://graph.microsoft.com/oidc/userinfo.
20+
As part of the OpenID Connect (OIDC) standard, the [UserInfo endpoint](https://openid.net/specs/openid-connect-core-1_0.html#UserInfo) returns information about an authenticated user. In the Microsoft identity platform, the UserInfo endpoint is hosted by Microsoft Graph at https://graph.microsoft.com/oidc/userinfo.
2121

2222
## Find the .well-known configuration endpoint
2323

2424
You can find the UserInfo endpoint programmatically by reading the `userinfo_endpoint` field of the OpenID configuration document at `https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration`. We don't recommend hard-coding the UserInfo endpoint in your applications. Instead, use the OIDC configuration document to find the endpoint at runtime.
2525

26-
The UserInfo endpoint is typically called automatically by [OIDC-compliant libraries](https://openid.net/developers/certified/) to get information about the user.From the [list of claims identified in the OIDC standard](https://openid.net/specs/openid-connect-core-1_0.html#StandardClaims), the Microsoft identity platform produces the name claims, subject claim, and email when available and consented to.
26+
The UserInfo endpoint is typically called automatically by [OIDC-compliant libraries](https://openid.net/developers/certified/) to get information about the user. From the [list of claims identified in the OIDC standard](https://openid.net/specs/openid-connect-core-1_0.html#StandardClaims), the Microsoft identity platform produces the name claims, subject claim, and email when available and consented to.
2727

2828
## Consider using an ID token instead
2929

@@ -33,7 +33,7 @@ If you require more details about the user like manager or job title, call the [
3333

3434
## Calling the UserInfo endpoint
3535

36-
UserInfo is a standard OAuth bearer token API hosted by Microsoft Graph. Call the UserInfo endpoint as you would any Microsoft Graph API by using the access token your application received when it requested access to Microsoft Graph. The UserInfo endpoint returns a JSON response containing claims about the user.
36+
UserInfo is a standard OAuth bearer token API hosted by Microsoft Graph. Call the UserInfo endpoint as you would call any Microsoft Graph API by using the access token your application received when it requested access to Microsoft Graph. The UserInfo endpoint returns a JSON response containing claims about the user.
3737

3838
### Permissions
3939

@@ -69,11 +69,11 @@ Authorization: Bearer eyJ0eXAiOiJKV1QiLCJub25jZSI6Il…
6969
```jsonc
7070
{
7171
"sub": "OLu859SGc2Sr9ZsqbkG-QbeLgJlb41KcdiPoLYNpSFA",
72-
"name": "Mikah Ollenburg", // names all require the “profile” scope.
72+
"name": "Mikah Ollenburg", // all names require the “profile” scope.
7373
"family_name": " Ollenburg",
7474
"given_name": "Mikah",
7575
"picture": "https://graph.microsoft.com/v1.0/me/photo/$value",
76-
"email": "[email protected]" //requires the “email” scope.
76+
"email": "[email protected]" // requires the “email” scope.
7777
}
7878
```
7979

articles/active-directory/verifiable-credentials/decentralized-identifier-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ editor:
88
ms.service: decentralized-identity
99
ms.subservice: verifiable-credentials
1010
ms.topic: overview
11-
ms.date: 06/02/2022
11+
ms.date: 08/20/2022
1212
ms.author: barclayn
1313
ms.reviewer:
1414
---

articles/active-directory/verifiable-credentials/how-to-dnsbind.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ ms.author: barclayn
1717

1818
[!INCLUDE [Verifiable Credentials announcement](../../../includes/verifiable-credentials-brand.md)]
1919

20+
2021
## Prerequisites
2122

2223
To link your DID to your domain, you need to have completed the following.

articles/active-directory/verifiable-credentials/how-to-opt-out.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ In this article:
2424
- What happens to your data?
2525
- Effect on existing verifiable credentials.
2626

27+
2728
## Prerequisites
2829

2930
- Complete verifiable credentials onboarding.

articles/active-directory/verifiable-credentials/how-to-register-didwebsite.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ ms.author: barclayn
1717

1818
[!INCLUDE [Verifiable Credentials announcement](../../../includes/verifiable-credentials-brand.md)]
1919

20+
2021
## Prerequisites
2122

2223
- Complete verifiable credentials onboarding with Web as the selected trust system.

articles/active-directory/verifiable-credentials/how-to-use-quickstart-idtoken.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ ms.author: barclayn
1717

1818
[!INCLUDE [Verifiable Credentials announcement](../../../includes/verifiable-credentials-brand.md)]
1919

20+
2021
A [rules definition](rules-and-display-definitions-model.md#rulesmodel-type) that uses the [idTokens attestation](rules-and-display-definitions-model.md#idtokenattestation-type) produces an issuance flow where you're required to do an interactive sign-in to an OpenID Connect (OIDC) identity provider in Microsoft Authenticator. Claims in the ID token that the identity provider returns can be used to populate the issued verifiable credential. The claims mapping section in the rules definition specifies which claims are used.
2122

2223
## Create a custom credential with the idTokens attestation type

articles/active-directory/verifiable-credentials/how-to-use-quickstart-selfissued.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ ms.author: barclayn
1717

1818
[!INCLUDE [Verifiable Credentials announcement](../../../includes/verifiable-credentials-brand.md)]
1919

20+
2021
A [rules definition](rules-and-display-definitions-model.md#rulesmodel-type) that uses the [selfIssued attestation](rules-and-display-definitions-model.md#selfissuedattestation-type) type produces an issuance flow where you're required to manually enter values for the claims in Microsoft Authenticator.
2122

2223
## Create a custom credential with the selfIssued attestation type

articles/active-directory/verifiable-credentials/how-use-vcnetwork.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ ms.author: barclayn
1717

1818
[!INCLUDE [Verifiable Credentials announcement](../../../includes/verifiable-credentials-brand.md)]
1919

20+
2021
## Prerequisites
2122

2223
To use the Entra Verified ID Network, you need to have completed the following.

articles/active-directory/verifiable-credentials/introduction-to-verifiable-credentials-architecture.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ ms.author: barclayn
1515

1616
[!INCLUDE [Verifiable Credentials announcement](../../../includes/verifiable-credentials-brand.md)]
1717

18+
1819
It’s important to plan your verifiable credential solution so that in addition to issuing and or validating credentials, you have a complete view of the architectural and business impacts of your solution. If you haven’t reviewed them already, we recommend you review [Introduction to Microsoft Entra Verified ID](decentralized-identifier-overview.md) and the [FAQs](verifiable-credentials-faq.md), and then complete the [Getting Started](get-started-verifiable-credentials.md) tutorial.
1920

2021
This architectural overview introduces the capabilities and components of the Microsoft Entra Verified ID service. For more detailed information on issuance and validation, see

0 commit comments

Comments
 (0)