Skip to content

Commit dcf378a

Browse files
committed
fix merge conflict
2 parents e75bd6c + 9273312 commit dcf378a

File tree

425 files changed

+18345
-8785
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

425 files changed

+18345
-8785
lines changed

.openpublishing.redirection.json

Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25893,6 +25893,11 @@
2589325893
"redirect_url": "/azure/storage/common/storage-account-create",
2589425894
"redirect_document_id": true
2589525895
},
25896+
{
25897+
"source_path": "articles/storage/common/authorize-active-directory-cli.md",
25898+
"redirect_url": "/azure/storage/common/authorize-data-operations-cli",
25899+
"redirect_document_id": true
25900+
},
2589625901
{
2589725902
"source_path": "articles/storage/common/storage-account-manage.md",
2589825903
"redirect_url": "/azure/storage/common/storage-account-keys-manage",
@@ -29393,6 +29398,11 @@
2939329398
"redirect_url": "/azure/hdinsight/kafka/apache-kafka-log-analytics-operations-management",
2939429399
"redirect_document_id": true
2939529400
},
29401+
{
29402+
"source_path": "articles/hdinsight/kafka/apache-kafka-byok.md",
29403+
"redirect_url": "/azure/hdinsight/disk-encryption",
29404+
"redirect_document_id": false
29405+
},
2939629406
{
2939729407
"source_path": "articles/hdinsight/hdinsight-apache-kafka-connect-vpn-gateway.md",
2939829408
"redirect_url": "/azure/hdinsight/kafka/apache-kafka-connect-vpn-gateway",
@@ -34983,6 +34993,76 @@
3498334993
"redirect_url": "/azure/cognitive-services/academic-knowledge/home",
3498434994
"redirect_document_id": false
3498534995
},
34996+
{
34997+
"source_path": "articles/cognitive-services/academic-knowledge/home.md",
34998+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/introduction",
34999+
"redirect_document_id": false
35000+
},
35001+
{
35002+
"source_path": "articles/cognitive-services/academic-knowledge/QueryExpressionSyntax.md",
35003+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-query-expression-syntax",
35004+
"redirect_document_id": false
35005+
},
35006+
{
35007+
"source_path": "articles/cognitive-services/academic-knowledge/EntityAttributes.md",
35008+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-entity-attributes",
35009+
"redirect_document_id": false
35010+
},
35011+
{
35012+
"source_path": "articles/cognitive-services/academic-knowledge/AffiliationEntityAttributes.md",
35013+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-affiliation-entity-attributes",
35014+
"redirect_document_id": false
35015+
},
35016+
{
35017+
"source_path": "articles/cognitive-services/academic-knowledge/AuthorEntityAttributes.md",
35018+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-author-entity-attributes",
35019+
"redirect_document_id": false
35020+
},
35021+
{
35022+
"source_path": "articles/cognitive-services/academic-knowledge/ConferenceInstanceEntityAttributes.md",
35023+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-conference-instance-entity-attributes",
35024+
"redirect_document_id": false
35025+
},
35026+
{
35027+
"source_path": "articles/cognitive-services/academic-knowledge/ConferenceSeriesEntityAttributes.md",
35028+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-conference-series-entity-attributes",
35029+
"redirect_document_id": false
35030+
},
35031+
{
35032+
"source_path": "articles/cognitive-services/academic-knowledge/FieldsOfStudyEntityAttributes.md",
35033+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-field-of-study-entity-attributes",
35034+
"redirect_document_id": false
35035+
},
35036+
{
35037+
"source_path": "articles/cognitive-services/academic-knowledge/JournalEntityAttributes.md",
35038+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-journal-entity-attributes",
35039+
"redirect_document_id": false
35040+
},
35041+
{
35042+
"source_path": "articles/cognitive-services/academic-knowledge/PaperEntityAttributes.md",
35043+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-paper-entity-attributes",
35044+
"redirect_document_id": false
35045+
},
35046+
{
35047+
"source_path": "articles/cognitive-services/academic-knowledge/CalcHistogramMethod.md",
35048+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-calchistogram-method",
35049+
"redirect_document_id": false
35050+
},
35051+
{
35052+
"source_path": "articles/cognitive-services/academic-knowledge/EvaluateMethod.md",
35053+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-evaluate-method",
35054+
"redirect_document_id": false
35055+
},
35056+
{
35057+
"source_path": "articles/cognitive-services/academic-knowledge/InterpretMethod.md",
35058+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-interpret-method",
35059+
"redirect_document_id": false
35060+
},
35061+
{
35062+
"source_path": "articles/cognitive-services/academic-knowledge/SimilarityMethod.md",
35063+
"redirect_url": "https://docs.microsoft.com/academic-services/project-academic-knowledge/reference-similarity-method",
35064+
"redirect_document_id": false
35065+
},
3498635066
{
3498735067
"source_path": "articles/cognitive-services/entitylinking/index.md",
3498835068
"redirect_url": "/azure/cognitive-services/text-analytics",

articles/active-directory-b2c/custom-policy-reference-sso.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/27/2020
12+
ms.date: 03/02/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -120,20 +120,19 @@ This provider is used to suppress the "choose identity provider" screen. It is t
120120

121121
### SamlSSOSessionProvider
122122

123-
This provider is used for managing the Azure AD B2C SAML sessions between a relying party application or a federated SAML identity provider. When using the SSO provider for storing a SAML identity provider session, the `IncludeSessionIndex` and `RegisterServiceProviders` must be set to `false`. The following `SM-Saml-idp` technical profile is used by the [SAML technical profile](saml-technical-profile.md).
123+
This provider is used for managing the Azure AD B2C SAML sessions between a relying party application or a federated SAML identity provider. When using the SSO provider for storing a SAML identity provider session, the `RegisterServiceProviders` must be set to `false`. The following `SM-Saml-idp` technical profile is used by the [SAML technical profile](saml-technical-profile.md).
124124

125125
```XML
126126
<TechnicalProfile Id="SM-Saml-idp">
127127
<DisplayName>Session Management Provider</DisplayName>
128128
<Protocol Name="Proprietary" Handler="Web.TPEngine.SSO.SamlSSOSessionProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
129129
<Metadata>
130-
<Item Key="IncludeSessionIndex">false</Item>
131130
<Item Key="RegisterServiceProviders">false</Item>
132131
</Metadata>
133132
</TechnicalProfile>
134133
```
135134

136-
When using the provider for storing the B2C SAML session, the `IncludeSessionIndex` and `RegisterServiceProviders` must set to `true`. SAML session logout requires the `SessionIndex` and `NameID` to complete.
135+
When using the provider for storing the B2C SAML session, the `RegisterServiceProviders` must set to `true`. SAML session logout requires the `SessionIndex` and `NameID` to complete.
137136

138137
The following `SM-Saml-idp` technical profile is used by [SAML issuer technical profile](connect-with-saml-service-providers.md)
139138

@@ -147,7 +146,7 @@ The following `SM-Saml-idp` technical profile is used by [SAML issuer technical
147146

148147
| Attribute | Required | Description|
149148
| --- | --- | --- |
150-
| IncludeSessionIndex | No | Indicates to the provider that the session index should be stored. Possible values: `true` (default), or `false`.|
149+
| IncludeSessionIndex | No | Not currently used, can be ignored.|
151150
| RegisterServiceProviders | No | Indicates that the provider should register all SAML service providers that have been issued an assertion. Possible values: `true` (default), or `false`.|
152151

153152

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/24/2020
12+
ms.date: 03/02/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -122,6 +122,7 @@ The technical profile also returns claims, that aren't returned by the identity
122122
| --------- | -------- | ----------- |
123123
| ServiceUrl | Yes | The URL of the REST API endpoint. |
124124
| AuthenticationType | Yes | The type of authentication being performed by the RESTful claims provider. Possible values: `None`, `Basic`, `Bearer`, or `ClientCertificate`. The `None` value indicates that the REST API is not anonymous. The `Basic` value indicates that the REST API is secured with HTTP basic authentication. Only verified users, including Azure AD B2C, can access your API. The `ClientCertificate` (recommended) value indicates that the REST API restricts access by using client certificate authentication. Only services that have the appropriate certificates, for example Azure AD B2C, can access your API. The `Bearer` value indicates that the REST API restricts access using client OAuth2 Bearer token. |
125+
| AllowInsecureAuthInProduction| No| Indicates whether the `AuthenticationType` can be set to `none` in production environment (`DeploymentMode` of the [TrustFrameworkPolicy](trustframeworkpolicy.md) is set to `Production`, or not specified). Possible values: true, or false (default). |
125126
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. The HTTP verbs invoked by each are as follows:<br /><ul><li>`Body`: POST</li><li>`Form`: POST</li><li>`Header`: GET</li><li>`QueryString`: GET</li></ul> |
126127
| ClaimsFormat | No | Specifies the format for the output claims. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the output claim that is sent in the request body in JSON format. The `Form` value is the output claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the output claim that is sent in the request header. The `QueryString` value is the output claim that is sent in the request query string. |
127128
| ClaimUsedForRequestPayload| No | Name of a string claim that contains the payload to be sent to the REST API. |

articles/active-directory-b2c/userjourneys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ The **OrchestrationStep** element contains the following attributes:
6060
| Attribute | Required | Description |
6161
| --------- | -------- | ----------- |
6262
| `Order` | Yes | The order of the orchestration steps. |
63-
| `Type` | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
63+
| `Type` | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**GetClaims** - Indicates that the orchestration step reads the input claims.</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
6464
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples - if the type of the orchestration step is one of following: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`, Azure AD B2C needs to display the identity provider selection without having a technical profile. |
6565
| CpimIssuerTechnicalProfileReferenceId | No | The type of the orchestration step is `SendClaims`. This property defines the technical profile identifier of the claims provider that issues the token for the relying party. If absent, no relying party token is created. |
6666

0 commit comments

Comments
 (0)