Skip to content

Commit e17528c

Browse files
2 parents a46b32c + 2351c17 commit e17528c

File tree

678 files changed

+4810
-2743
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

678 files changed

+4810
-2743
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1610,6 +1610,11 @@
16101610
"redirect_url": "/azure/cosmos-db/create-sql-api-dotnet",
16111611
"redirect_document_id": false
16121612
},
1613+
{
1614+
"source_path": "articles/cosmos-db/spark-api-introduction.md",
1615+
"redirect_url": "/azure/cosmos-db/analytics-usecases",
1616+
"redirect_document_id": false
1617+
},
16131618
{
16141619
"source_path": "articles/cosmos-db/sql-api-python-application.md",
16151620
"redirect_url": "/azure/cosmos-db/create-sql-api-python",
@@ -24659,6 +24664,11 @@
2465924664
"redirect_url": "/azure/storage/common/storage-security-guide",
2466024665
"redirect_document_id": true
2466124666
},
24667+
{
24668+
"source_path": "articles/storage/common/storage-security-guide.md",
24669+
"redirect_url": "/azure/storage/blobs/security-recommendations",
24670+
"redirect_document_id": true
24671+
},
2466224672
{
2466324673
"source_path": "articles/storage/storage-service-encryption-customer-managed-keys.md",
2466424674
"redirect_url": "/azure/storage/common/storage-service-encryption-customer-managed-keys",

articles/active-directory-b2c/TOC.yml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,8 +76,11 @@
7676
items:
7777
- name: App integration
7878
items:
79-
- name: Register an application
79+
- name: Register an OIDC application
8080
href: tutorial-register-applications.md
81+
- name: Register a SAML service provider
82+
href: connect-with-saml-service-providers.md
83+
displayName: SP, RP, service provider, connect
8184
- name: Add a web API application
8285
href: add-web-application.md
8386
- name: Add a native client application
@@ -199,8 +202,10 @@
199202
items:
200203
- name: ADFS
201204
href: active-directory-b2c-custom-setup-adfs2016-idp.md
205+
displayName: SAML
202206
- name: Salesforce
203207
href: active-directory-b2c-setup-sf-app-custom.md
208+
displayName: SAML
204209
- name: Tokens and session management
205210
items:
206211
- name: Customize tokens

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,9 @@ The *Read and write directory data* permission that you granted earlier does **N
5959

6060
If you want to give your application the ability to delete users or update passwords, you need to grant it the *User administrator* role.
6161

62-
1. Sign in to the [Azure portal](https://portal.azure.com) and switch to the directory that contains your Azure AD B2C tenant.
63-
1. Select **Azure AD B2C** in the left menu. Or, select **All services** and then search for and select **Azure AD B2C**.
62+
1. Sign in to the [Azure portal](https://portal.azure.com).
63+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
64+
1. In the Azure portal, search for and select **Azure AD B2C**.
6465
1. Under **Manage**, select **Roles and administrators**.
6566
1. Select the **User administrator** role.
6667
1. Select **Add assignment**.

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,10 @@ ms.subservice: B2C
2727

2828
## Add signing and encryption keys
2929

30-
1. Sign in to the [Azure portal](https://portal.azure.com)
31-
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
32-
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
33-
1. On the Overview page, select **Identity Experience Framework** from the **Policies** pane.
30+
1. Sign in to the [Azure portal](https://portal.azure.com).
31+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
32+
1. In the Azure portal, search for and select **Azure AD B2C**.
33+
1. On the overview page, under **Policies**, select **Identity Experience Framework**.
3434

3535
### Create the signing key
3636

@@ -73,10 +73,9 @@ To register an application in your Azure AD B2C tenant, you can use the current
7373

7474
#### [Applications](#tab/applications/)
7575

76-
1. Select **All services** in the top-left corner of the Azure portal.
77-
1. In the search box, enter `Azure Active Directory`.
78-
1. Select **Azure Active Directory** in the search results.
79-
1. Under **Manage** in the left-hand menu, select **App registrations (Legacy)**.
76+
1. Sign in to the [Azure portal](https://portal.azure.com).
77+
1. In the Azure portal, search for and select **Azure Active Directory**.
78+
1. In the **Azure Active Directory** overview menu, under **Manage**, select **App registrations (Legacy)**.
8079
1. Select **New application registration**.
8180
1. For **Name**, enter `IdentityExperienceFramework`.
8281
1. For **Application type**, choose **Web app/API**.

articles/active-directory-b2c/active-directory-b2c-reference-password-complexity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,9 @@ If you are using custom policies, you can ([configure password complexity in a c
3434
## Configure password complexity
3535

3636
1. Sign in to the [Azure portal](https://portal.azure.com).
37-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
38-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
39-
4. Select **User flows**.
37+
2. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
38+
3. In the Azure portal, search for and select **Azure AD B2C**.
39+
4. Select **User flows (policies)**.
4040
2. Select a user flow, and click **Properties**.
4141
3. Under **Password complexity**, change the password complexity for this user flow to **Simple**, **Strong**, or **Custom**.
4242

articles/active-directory-b2c/active-directory-b2c-setup-qq-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,9 +43,9 @@ To use a QQ account as an identity provider in Azure Active Directory B2C (Azure
4343

4444
## Configure QQ as an identity provider
4545

46-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
47-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
48-
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
46+
1. Sign in to the [Azure portal](https://portal.azure.com/).
47+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
48+
1. In the Azure portal, search for and select **Azure AD B2C**.
4949
1. Select **Identity providers**, then select **QQ (Preview)**.
5050
1. Enter a **Name**. For example, *QQ*.
5151
1. For the **Client ID**, enter the APP ID of the QQ application that you created earlier.

0 commit comments

Comments
 (0)