Skip to content

Commit df5bc70

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 367cce0 + d4b9f9e commit df5bc70

34 files changed

+356
-97
lines changed

articles/active-directory-b2c/identity-provider-adfs.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@ To create an Application Group, follow theses steps:
4040
1. Select **Next**.
4141
1. On the Application Group Wizard **Native Application** screen:
4242
1. Copy the **Client Identifier** value. The client identifier is your AD FS **Application ID**. You will need the application ID later in this article.
43-
1. In **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
44-
1. Select **Next**, and then **Next** to complete the app registration wizard.
43+
1. In **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`, and then **Add**. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
44+
1. Select **Next**, and then **Next**, and then **Next** again to complete the app registration wizard.
4545
1. Select **Close**.
4646

4747

@@ -53,8 +53,8 @@ In this step, configure the claims AD FS application returns to Azure AD B2C.
5353
1. In the application properties window, under the **Applications**, select the **Web Application**. Then select **Edit**.
5454
:::image type="content" source="./media/identity-provider-adfs/ad-fs-edit-app.png" alt-text="Screenshot that shows how to edit a web application.":::
5555
1. Select the **Issuance Transformation Rules** tab. Then select **Add Rule**.
56-
1. In **Claim rule template**, select **Send LDAP attributes as claims**.
57-
1. Provide a **Claim rule name**. For the **Attribute store**, select **Select Active Directory**, add the following claims.
56+
1. In **Claim rule template**, select **Send LDAP attributes as claims**, and then **Next**.
57+
1. Provide a **Claim rule name**. For the **Attribute store**, select **Active Directory**, add the following claims.
5858

5959
| LDAP attribute | Outgoing claim type |
6060
| -------------- | ------------------- |
@@ -63,9 +63,11 @@ In this step, configure the claims AD FS application returns to Azure AD B2C.
6363
| Given-Name | given_name |
6464
| Display-Name | name |
6565

66-
Note some of the names will not display in the outgoing claim type dropdown. You need to manually type them in. (The dropdown is editable).
66+
Note some of the names will not display in the outgoing claim type dropdown. You need to manually type them in (the dropdown is editable).
6767

68-
1. Select **Finish**, then select **Close**.
68+
1. Select **Finish**.
69+
1. Select **Apply**, and then **OK**.
70+
1. Select **OK** again to finish.
6971

7072

7173
::: zone pivot="b2c-user-flow"
@@ -86,7 +88,7 @@ In this step, configure the claims AD FS application returns to Azure AD B2C.
8688
8789
1. For **Client ID**, enter the application ID that you previously recorded.
8890
1. For the **Scope**, enter the `openid`.
89-
1. For **Response type**, select **id_token**.
91+
1. For **Response type**, select **id_token**, which makes the **Client secret** optional. Learn more about use of [Client ID and secret](identity-provider-generic-openid-connect.md#client-id-and-secret) when adding a generic OpenID Connect identity provider.
9092
1. (Optional) For the **Domain hint**, enter `contoso.com`. For more information, see [Set up direct sign-in using Azure Active Directory B2C](direct-signin.md#redirect-sign-in-to-a-social-provider).
9193
1. Under **Identity provider claims mapping**, select the following claims:
9294

articles/active-directory/develop/userinfo.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,7 @@ Authorization: Bearer eyJ0eXAiOiJKV1QiLCJub25jZSI6Il…
7373
"name": "Mikah Ollenburg", // names all require the “profile” scope.
7474
"family_name": " Ollenburg",
7575
"given_name": "Mikah",
76+
"picture": "https://graph.microsoft.com/v1.0/me/photo/$value",
7677
"email": "[email protected]" //requires the “email” scope.
7778
}
7879
```

articles/aks/TOC.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,13 @@
6565
href: ./security-controls-policy.md
6666
- name: Security Hardening in host OS
6767
href: security-hardened-vm-host-image.md
68+
- name: Compliance
69+
items:
70+
- name: CIS Baseline overview
71+
href: /compliance/regulatory/offering-CIS-Benchmark
72+
maintainContext: True
73+
- name: CIS Kubernetes benchmark
74+
href: cis-kubernetes.md
6875
- name: Access and identity
6976
href: concepts-identity.md
7077
- name: Networking

articles/aks/azure-disk-csi.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ $ kubectl describe volumesnapshot azuredisk-volume-snapshot
135135
Name: azuredisk-volume-snapshot
136136
Namespace: default
137137
Labels: <none>
138-
Annotations: API Version: snapshot.storage.k8s.io/v1beta1
138+
Annotations: API Version: snapshot.storage.k8s.io/v1
139139
Kind: VolumeSnapshot
140140
Metadata:
141141
Creation Timestamp: 2020-08-27T05:27:58Z
@@ -144,7 +144,7 @@ Metadata:
144144
snapshot.storage.kubernetes.io/volumesnapshot-bound-protection
145145
Generation: 1
146146
Resource Version: 714582
147-
Self Link: /apis/snapshot.storage.k8s.io/v1beta1/namespaces/default/volumesnapshots/azuredisk-volume-snapshot
147+
Self Link: /apis/snapshot.storage.k8s.io/v1/namespaces/default/volumesnapshots/azuredisk-volume-snapshot
148148
UID: dd953ab5-6c24-42d4-ad4a-f33180e0ef87
149149
Spec:
150150
Source:
@@ -292,7 +292,7 @@ metadata:
292292
name: managed-csi-shared
293293
provisioner: disk.csi.azure.com
294294
parameters:
295-
skuname: Premium_LRS # Currently shared disk is only available with premium SSD
295+
skuname: Premium_LRS
296296
maxShares: "2"
297297
cachingMode: None # ReadOnly cache is not available for premium SSD with maxShares>1
298298
reclaimPolicy: Delete

0 commit comments

Comments
 (0)