Skip to content

Commit e3f814c

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into work-whitelist
2 parents 8dc08d7 + bca9a48 commit e3f814c

File tree

775 files changed

+8411
-6481
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

775 files changed

+8411
-6481
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1756,6 +1756,11 @@
17561756
"redirect_url": "/azure/cosmos-db/conflict-resolution-policies",
17571757
"redirect_document_id": true
17581758
},
1759+
{
1760+
"source_path": "articles/cosmos-db/how-to-custom-synchronization.md",
1761+
"redirect_url": "/azure/cosmos-db/how-to-multi-master",
1762+
"redirect_document_id": true
1763+
},
17591764
{
17601765
"source_path": "articles/cosmos-db/create-sql-api-dotnet-preview.md",
17611766
"redirect_url": "/azure/cosmos-db/create-sql-api-dotnet",
@@ -11681,6 +11686,11 @@
1168111686
"redirect_url": "/azure/lab-services/devtest-lab-attach-detach-data-disk",
1168211687
"redirect_document_id": false
1168311688
},
11689+
{
11690+
"source_path": "articles/lab-services/devtest-lab-auto-shutdown-vm.md",
11691+
"redirect_url": "/azure/lab-services/devtest-lab-auto-shutdown",
11692+
"redirect_document_id": false
11693+
},
1168411694
{
1168511695
"source_path": "articles/devtest-lab/devtest-lab-comparing-vm-base-image-types.md",
1168611696
"redirect_url": "/azure/lab-services/devtest-lab-comparing-vm-base-image-types",
@@ -27971,6 +27981,11 @@
2797127981
"redirect_url": "/azure/security-center/security-center-partner-integration",
2797227982
"redirect_document_id": false
2797327983
},
27984+
{
27985+
"source_path": "articles/security-center/security-center-playbooks.md",
27986+
"redirect_url": "/azure/security-center/workflow-automation",
27987+
"redirect_document_id": false
27988+
},
2797427989
{
2797527990
"source_path": "articles/security-center/security-center-compliance-rest-api.md",
2797627991
"redirect_url": "https://docs.microsoft.com/rest/api/securitycenter/compliances",
@@ -46575,6 +46590,16 @@
4657546590
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/overview",
4657646591
"redirect_document_id": false
4657746592
},
46593+
{
46594+
"source_path": "articles/load-balancer/load-balancer-standard-overview.md",
46595+
"redirect_url": "/azure/load-balancer/load-balancer-overview",
46596+
"redirect_document_id": false
46597+
},
46598+
{
46599+
"source_path": "articles/backup/backup-azure-files.md",
46600+
"redirect_url": "/azure/backup/backup-afs",
46601+
"redirect_document_id": false
46602+
},
4657846603
{
4657946604
"source_path": "articles/load-balancer/load-balancer-arm.md",
4658046605
"redirect_url": "/azure/load-balancer/load-balancer-overview",

articles/active-directory-b2c/TOC.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@
7676
items:
7777
- name: App integration
7878
items:
79-
- name: Register an OIDC application
79+
- name: Register an application
8080
href: tutorial-register-applications.md
8181
- name: Register a SAML service provider
8282
href: connect-with-saml-service-providers.md
@@ -282,6 +282,11 @@
282282
items:
283283
- name: Localization string IDs
284284
href: localization-string-ids.md
285+
- name: DisplayControls
286+
href: display-controls.md
287+
items:
288+
- name: Verification
289+
href: display-control-verification.md
285290
- name: ClaimsProviders
286291
href: claimsproviders.md
287292
items:
@@ -320,11 +325,6 @@
320325
href: active-directory-b2c-reference-sso-custom.md
321326
- name: Validation
322327
href: validation-technical-profile.md
323-
- name: DisplayControls
324-
href: display-controls.md
325-
items:
326-
- name: Verification
327-
href: display-control-verification.md
328328
- name: UserJourneys
329329
href: userjourneys.md
330330
- name: RelyingParty

articles/active-directory-b2c/active-directory-b2c-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ There are two common reasons for why the Azure AD extension is not working for y
2323

2424
### Can I use Azure AD B2C features in my existing, employee-based Azure AD tenant?
2525

26-
Azure AD and Azure AD B2C are separate product offerings and cannot coexist in the same tenant. An Azure AD tenant represents an organization. An Azure AD B2C tenant represents a collection of identities to be used with relying party applications. With custom policies, Azure AD B2C can federate to Azure AD allowing authentication of employees in an organization.
26+
Azure AD and Azure AD B2C are separate product offerings and cannot coexist in the same tenant. An Azure AD tenant represents an organization. An Azure AD B2C tenant represents a collection of identities to be used with relying party applications. By adding **New OpenID Connect provider** under **Azure AD B2C > Identity providers** or with custom policies, Azure AD B2C can federate to Azure AD allowing authentication of employees in an organization.
2727

2828
### Can I use Azure AD B2C to provide social login (Facebook and Google+) into Office 365?
2929

articles/active-directory-b2c/active-directory-b2c-reference-oauth-code.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -98,8 +98,8 @@ Now that you've acquired an authorization code, you can redeem the `code` for a
9898
You can also request an access token for your app's own back-end Web API by convention of using the app's client ID as the requested scope (which will result in an access token with that client ID as the "audience"):
9999

100100
```HTTP
101-
POST {tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/token HTTP/1.1
102-
Host: {tenant}.b2clogin.com
101+
POST https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/token HTTP/1.1
102+
103103
Content-Type: application/x-www-form-urlencoded
104104
105105
grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access&code=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob
@@ -165,8 +165,8 @@ Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6Ik5HVEZ2ZEstZn
165165
Access tokens and ID tokens are short-lived. After they expire, you must refresh them to continue to access resources. To do this, submit another POST request to the `/token` endpoint. This time, provide the `refresh_token` instead of the `code`:
166166

167167
```HTTP
168-
POST {tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/token HTTP/1.1
169-
Host: {tenant}.b2clogin.com
168+
POST https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/token HTTP/1.1
169+
170170
Content-Type: application/x-www-form-urlencoded
171171
172172
grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access&refresh_token=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob

articles/active-directory-b2c/active-directory-b2c-setup-goog-app.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,14 @@ ms.subservice: B2C
1818

1919
## Create a Google application
2020

21-
To use a Google account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your tenant that represents it. If you don't already have a Google account you can sign up at [https://accounts.google.com/SignUp](https://accounts.google.com/SignUp).
21+
To use a Google account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your Google Developers Console. If you don't already have a Google account you can sign up at [https://accounts.google.com/SignUp](https://accounts.google.com/SignUp).
2222

2323
1. Sign in to the [Google Developers Console](https://console.developers.google.com/) with your Google account credentials.
2424
1. In the upper-left corner of the page, select the project list, and then select **New Project**.
25-
1. Enter a **Project Name**, click **Create**, and then make sure you are using the new project.
25+
1. Enter a **Project Name**, select **Create**.
26+
1. Make sure you are using the new project by selecting the project drop-down in the top-left of the screen, select your project by name, then select **Open**.
27+
1. Select **OAuth consent screen** in the left menu, select **External**, and then select **Create**.
28+
Enter a **Name** for your application. Enter *b2clogin.com* in the **Authorized domains** section and select **Save**.
2629
1. Select **Credentials** in the left menu, and then select **Create credentials** > **Oauth client ID**.
2730
1. Under **Application type**, select **Web application**.
2831
1. Enter a **Name** for your application, enter `https://your-tenant-name.b2clogin.com` in **Authorized JavaScript origins**, and `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Authorized redirect URIs**. Replace `your-tenant-name` with the name of your tenant. You need to use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C.

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ The technical profile also returns claims, that aren't returned by the identity
125125
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. The HTTP verbs invoked by each are as follows:<br /><ul><li>`Body`: POST</li><li>`Form`: POST</li><li>`Header`: GET</li><li>`QueryString`: GET</li></ul> |
126126
| ClaimsFormat | No | Specifies the format for the output claims. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the output claim that is sent in the request body in JSON format. The `Form` value is the output claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the output claim that is sent in the request header. The `QueryString` value is the output claim that is sent in the request query string. |
127127
| ClaimUsedForRequestPayload| No | Name of a string claim that contains the payload to be sent to the REST API. |
128-
| DebugMode | No | Runs the technical profile in debug mode. In debug mode, the REST API can return more information. See the returning error message section. |
128+
| DebugMode | No | Runs the technical profile in debug mode. Possible values: `true`, or `false` (default). In debug mode, the REST API can return more information. See the [Returning error message](#returning-error-message) section. |
129129

130130
## Cryptographic keys
131131

@@ -212,7 +212,7 @@ If the type of authentication is set to `Bearer`, the **CryptographicKeys** elem
212212

213213
## Returning error message
214214

215-
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. In an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
215+
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. If an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
216216

217217
| Attribute | Required | Description |
218218
| --------- | -------- | ----------- |

0 commit comments

Comments
 (0)