Skip to content

Commit e511d36

Browse files
authored
Merge pull request #90422 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents affd023 + 014a382 commit e511d36

16 files changed

+92
-60
lines changed

articles/active-directory-b2c/active-directory-b2c-reference-sspr.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ By default, your directory doesn't have self-service password reset turned on. U
2626

2727
1. Sign in to the [Azure portal](https://portal.azure.com/) as the Subscription Administrator. This is the same work or school account or the same Microsoft account that you used to create your directory.
2828
2. Open **Azure Active Directory** (in the navigation bar on the left side).
29+
3. Scroll down on the options blade and select **Password reset**.
2930
4. Set **Self service password reset enabled** to **All**.
3031
5. Click **Save** at the top of the page. You're done!
3132

articles/active-directory-b2c/date-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ Checks that one date and time claim (string data type) is later than a second da
2525

2626
| Item | TransformationClaimType | Data Type | Notes |
2727
| ---- | ----------------------- | --------- | ----- |
28-
| inputClaim | leftOperand | string | First claim's type, which should be later than the second claim. |
29-
| inputClaim | rightOperand | string | Second claim's type, which should be earlier than the first claim. |
28+
| InputClaim | leftOperand | string | First claim's type, which should be later than the second claim. |
29+
| InputClaim | rightOperand | string | Second claim's type, which should be earlier than the first claim. |
3030
| InputParameter | AssertIfEqualTo | boolean | Specifies whether this assertion should pass if the left operand is equal to the right operand. |
3131
| InputParameter | AssertIfRightOperandIsNotPresent | boolean | Specifies whether this assertion should pass if the right operand is missing. |
3232
| InputParameter | TreatAsEqualIfWithinMillseconds | int | Specifies the number of milliseconds to allow between the two date times to consider the times equal (for example, to account for clock skew). |

articles/active-directory-b2c/string-transformations.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ Compare two claims, and throw an exception if they are not equal according to th
2525

2626
| Item | TransformationClaimType | Data Type | Notes |
2727
| ---- | ----------------------- | --------- | ----- |
28-
| inputClaim | inputClaim1 | string | First claim's type, which is to be compared. |
29-
| inputClaim | inputClaim2 | string | Second claim's type, which is to be compared. |
28+
| InputClaim | inputClaim1 | string | First claim's type, which is to be compared. |
29+
| InputClaim | inputClaim2 | string | Second claim's type, which is to be compared. |
3030
| InputParameter | stringComparison | string | string comparison, one of the values: Ordinal, OrdinalIgnoreCase. |
3131

3232
The **AssertStringClaimsAreEqual** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationStringsAreNotEqual** self-asserted technical profile metadata controls the error message that is presented to the user.
@@ -150,8 +150,8 @@ Determine whether one string claim is equal to another. The result is a new bool
150150

151151
| Item | TransformationClaimType | Data Type | Notes |
152152
| ---- | ----------------------- | --------- | ----- |
153-
| inputClaim | inputClaim1 | string | First claim type, which is to be compared. |
154-
| inputClaim | inputClaim2 | string | Second claim type, which is to be compared. |
153+
| InputClaim | inputClaim1 | string | First claim type, which is to be compared. |
154+
| InputClaim | inputClaim2 | string | Second claim type, which is to be compared. |
155155
| InputParameter | operator | string | Possible values: `EQUAL` or `NOT EQUAL`. |
156156
| InputParameter | ignoreCase | boolean | Specifies whether this comparison should ignore the case of the strings being compared. |
157157
| OutputClaim | outputClaim | boolean | The ClaimType that is produced after this claims transformation has been invoked. |
@@ -191,7 +191,7 @@ Determines whether a claim value is equal to the input parameter value.
191191

192192
| Item | TransformationClaimType | Data Type | Notes |
193193
| ---- | ----------------------- | --------- | ----- |
194-
| inputClaim | inputClaim1 | string | The claim's type, which is to be compared. |
194+
| InputClaim | inputClaim1 | string | The claim's type, which is to be compared. |
195195
| InputParameter | operator | string | Possible values: `EQUAL` or `NOT EQUAL`. |
196196
| InputParameter | compareTo | string | string comparison, one of the values: Ordinal, OrdinalIgnoreCase. |
197197
| InputParameter | ignoreCase | boolean | Specifies whether this comparison should ignore the case of the strings being compared. |
@@ -500,7 +500,7 @@ Checks that a string claim and `matchTo` input parameter are equal, and sets the
500500

501501
| Item | TransformationClaimType | Data Type | Notes |
502502
| ---- | ----------------------- | --------- | ----- |
503-
| inputClaim | inputClaim | string | The claim type, which is to be compared. |
503+
| InputClaim | inputClaim | string | The claim type, which is to be compared. |
504504
| InputParameter | matchTo | string | The string to be compared with `inputClaim`. |
505505
| InputParameter | stringComparison | string | Possible values: `Ordinal` or `OrdinalIgnoreCase`. |
506506
| InputParameter | stringMatchMsg | string | First value to be set if strings are equal. |
@@ -549,7 +549,7 @@ Checks that a string claim and `matchTo` input parameter are equal, and sets the
549549

550550
| Item | TransformationClaimType | Data Type | Notes |
551551
| ---- | ----------------------- | --------- | ----- |
552-
| inputClaim | claimToMatch | string | The claim type, which is to be compared. |
552+
| InputClaim | claimToMatch | string | The claim type, which is to be compared. |
553553
| InputParameter | matchTo | string | The string to be compared with inputClaim. |
554554
| InputParameter | stringComparison | string | Possible values: `Ordinal` or `OrdinalIgnoreCase`. |
555555
| InputParameter | outputClaimIfMatched | string | The value to be set if strings are equal. |

articles/active-directory/develop/active-directory-saml-claims-customization.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,6 @@ From the **Choose name identifier format** dropdown, you can select one of the f
6161
| **Persistent** | Azure AD will use Persistent as the NameID format. |
6262
| **EmailAddress** | Azure AD will use EmailAddress as the NameID format. |
6363
| **Unspecified** | Azure AD will use Unspecified as the NameID format. |
64-
| **Transient** | Azure AD will use Transient as the NameID format. |
6564

6665
To learn more about the NameIDPolicy attribute, see [Single Sign-On SAML protocol](single-sign-on-saml-protocol.md).
6766

articles/active-directory/develop/registration-config-multi-tenant-application-add-to-gallery-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Azure Active Directory (Azure AD) is a cloud-based identity service. The [Azure
3030
## If your application supports SAML or OpenIDConnect
3131
If you have a multitenant application that you want listed in the Azure AD application gallery, you must first make sure that your application supports one of the following single sign-on technologies:
3232

33-
- **OpenID Connect**: To have your app listed, create the multitenant application in Azure AD and implement the [Azure AD consent framework](https://docs.microsoft.com/azure/active-directory/develop/active-directory-integrating-applications) for your application. Send the login request to a common endpoint so that any customer can provide consent to the application. You can control a user's access based on the tenant ID and the user's UPN received in the token. Submit the application by using the process outlined in [Listing your application in the Azure Active Directory application gallery](https://docs.microsoft.com/azure/active-directory/develop/active-directory-app-gallery-listing).
33+
- **OpenID Connect**: To have your app listed, create the multitenant application in Azure AD and implement the [Azure AD consent framework](https://docs.microsoft.com/azure/active-directory/develop/consent-framework) for your application. Send the login request to a common endpoint so that any customer can provide consent to the application. You can control a user's access based on the tenant ID and the user's UPN received in the token. Submit the application by using the process outlined in [Listing your application in the Azure Active Directory application gallery](https://docs.microsoft.com/azure/active-directory/develop/active-directory-app-gallery-listing).
3434

3535
- **SAML**: If your application supports SAML 2.0, the app can be listed in the gallery. Follow the instructions in [Listing your application in the Azure Active Directory application gallery](https://docs.microsoft.com/azure/active-directory/develop/active-directory-app-gallery-listing).
3636

articles/active-directory/develop/scenario-web-api-call-api-app-configuration.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -107,40 +107,40 @@ In practice, the OBO flow is often used to acquire a token for a downstream API
107107
```CSharp
108108
private void AddAccountToCacheFromJwt(IEnumerable<string> scopes, JwtSecurityToken jwtToken, ClaimsPrincipal principal, HttpContext httpContext)
109109
{
110-
try
111-
{
112-
UserAssertion userAssertion;
113-
IEnumerable<string> requestedScopes;
114-
if (jwtToken != null)
115-
{
116-
userAssertion = new UserAssertion(jwtToken.RawData, "urn:ietf:params:oauth:grant-type:jwt-bearer");
117-
requestedScopes = scopes ?? jwtToken.Audiences.Select(a => $"{a}/.default");
118-
}
119-
else
120-
{
121-
throw new ArgumentOutOfRangeException("tokenValidationContext.SecurityToken should be a JWT Token");
122-
}
123-
124-
// Create the application
125-
var application = BuildConfidentialClientApplication(httpContext, principal);
126-
127-
// .Result to make sure that the cache is filled-in before the controller tries to get access tokens
128-
var result = application.AcquireTokenOnBehalfOf(requestedScopes.Except(scopesRequestedByMsalNet),
129-
userAssertion)
130-
.ExecuteAsync()
131-
.GetAwaiter().GetResult();
132-
}
133-
catch (MsalException ex)
134-
{
135-
Debug.WriteLine(ex.Message);
136-
throw;
137-
}
110+
try
111+
{
112+
UserAssertion userAssertion;
113+
IEnumerable<string> requestedScopes;
114+
if (jwtToken != null)
115+
{
116+
userAssertion = new UserAssertion(jwtToken.RawData, "urn:ietf:params:oauth:grant-type:jwt-bearer");
117+
requestedScopes = scopes ?? jwtToken.Audiences.Select(a => $"{a}/.default");
118+
}
119+
else
120+
{
121+
throw new ArgumentOutOfRangeException("tokenValidationContext.SecurityToken should be a JWT Token");
122+
}
123+
124+
// Create the application
125+
var application = BuildConfidentialClientApplication(httpContext, principal);
126+
127+
// .Result to make sure that the cache is filled-in before the controller tries to get access tokens
128+
var result = application.AcquireTokenOnBehalfOf(requestedScopes.Except(scopesRequestedByMsalNet),
129+
userAssertion)
130+
.ExecuteAsync()
131+
.GetAwaiter().GetResult();
132+
}
133+
catch (MsalException ex)
134+
{
135+
Debug.WriteLine(ex.Message);
136+
throw;
137+
}
138138
}
139139
```
140140

141141
## Protocol
142142

143-
For more information about the on-behalf-of protocol, see [Microsoft identity platform and OAuth 2.0 On-Behalf-Of flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow)
143+
For more information about the on-behalf-of protocol, see [Microsoft identity platform and OAuth 2.0 On-Behalf-Of flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow).
144144

145145
## Next steps
146146

articles/azure-monitor/app/javascript.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ appInsights.loadAppInsights();
4444

4545
### Snippet based setup
4646

47-
If your app does not use NPM, you can directly instrument your webpages with Application Insights by pasting this snippet at the top of each your pages. Preferably, it should be the first script in your `<head>` section so that it can monitor any potential issues with all of your dependencies.
47+
If your app does not use NPM, you can directly instrument your webpages with Application Insights by pasting this snippet at the top of each your pages. Preferably, it should be the first script in your `<head>` section so that it can monitor any potential issues with all of your dependencies. If you are using Blazor Server App, add the snippet at the top of the file `_Host.cshtml` in the `<head>` section.
4848

4949
```html
5050
<script type="text/javascript">

articles/azure-resource-manager/resource-group-template-functions-string.md

Lines changed: 25 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1909,10 +1909,33 @@ Creates an absolute URI by combining the baseUri and the relativeUri string.
19091909

19101910
| Parameter | Required | Type | Description |
19111911
|:--- |:--- |:--- |:--- |
1912-
| baseUri |Yes |string |The base uri string. |
1912+
| baseUri |Yes |string |The base uri string. Take care to observe the behavior regarding the handling of the trailing slash ('/'), as described following this table. |
19131913
| relativeUri |Yes |string |The relative uri string to add to the base uri string. |
19141914

1915-
The value for the **baseUri** parameter can include a specific file, but only the base path is used when constructing the URI. For example, passing `http://contoso.com/resources/azuredeploy.json` as the baseUri parameter results in a base URI of `http://contoso.com/resources/`.
1915+
* If **baseUri** ends in a trailing slash, the result is simply
1916+
**baseUri** followed by **relativeUri**.
1917+
1918+
* If **baseUri** does not end in a trailing slash one of two things
1919+
happens.
1920+
1921+
* If **baseUri** has no slashes at all (aside from the "//" near
1922+
the front) the result is simply **baseUri** followed by **relativeUri**.
1923+
1924+
* If **baseUri** has some slashes, but does not end with a slash,
1925+
everything from the last slash onward is removed from **baseUri**
1926+
and the result is **baseUri** followed by **relativeUri**.
1927+
1928+
Here are some examples:
1929+
1930+
```
1931+
uri('http://contoso.org/firstpath', 'myscript.sh') -> http://contoso.org/myscript.sh
1932+
uri('http://contoso.org/firstpath/', 'myscript.sh') -> http://contoso.org/firstpath/myscript.sh
1933+
uri('http://contoso.org/firstpath/azuredeploy.json', 'myscript.sh') -> http://contoso.org/firstpath/myscript.sh
1934+
uri('http://contoso.org/firstpath/azuredeploy.json/', 'myscript.sh') -> http://contoso.org/firstpath/azuredeploy.json/myscript.sh
1935+
```
1936+
For complete details, the **baseUri** and **relativeUri** parameters are
1937+
resolved as specified in
1938+
[RFC 3986, section 5](https://tools.ietf.org/html/rfc3986#section-5).
19161939

19171940
### Return value
19181941

articles/data-explorer/ingest-data-event-hub.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,8 @@ Now you connect to the event hub from Azure Data Explorer. When this connection
126126
| | |
127127
128128
> [!NOTE]
129-
> Select **My data includes routing info** to use dynamic routing, where your data includes the necessary routing information as seen in the [sample app](https://github.com/Azure-Samples/event-hubs-dotnet-ingest) comments. If both static and dynamic properties are set, the dynamic properties override the static ones.
129+
> * Select **My data includes routing info** to use dynamic routing, where your data includes the necessary routing information as seen in the [sample app](https://github.com/Azure-Samples/event-hubs-dotnet-ingest) comments. If both static and dynamic properties are set, the dynamic properties override the static ones.
130+
> * Only events enqueued after you create the data connection are ingested.
130131
131132
## Copy the connection string
132133

articles/data-explorer/ingest-data-iot-hub.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -73,11 +73,11 @@ Now you connect to the IoT Hub from Azure Data Explorer. When this connection is
7373
7474
**Setting** | **Field description**
7575
|---|---|
76-
| Data connection name | The name of the connection you want to create in Azure Data Explorer
77-
| IoT Hub | IoT Hub name |
78-
| Shared access policy | The name of the shared access policy. Must have read permissions |
79-
| Consumer group | The consumer group defined in the IoT Hub built-in endpoint |
80-
| Event system properties | The IoT Hub event system properties |
76+
| Data connection name | The name of the connection you want to create in Azure Data Explorer.
77+
| IoT Hub | IoT Hub name. |
78+
| Shared access policy | The name of the shared access policy. Must have read permissions. |
79+
| Consumer group | The consumer group defined in the IoT Hub built-in endpoint. |
80+
| Event system properties | The IoT Hub event system properties. In case that there are multiple records per event message, the system properties will be added to the first one. |
8181
| |
8282
8383
> [!NOTE]
@@ -95,8 +95,9 @@ Now you connect to the IoT Hub from Azure Data Explorer. When this connection is
9595
| Column mapping | *TestMapping* | The mapping you created in **testdb**, which maps incoming JSON data to the column names and data types of **testdb**. Required for JSON, MULTILINE JSON, and AVRO, and optional for other formats.|
9696
| | |
9797
98-
> [!TIP]
99-
> Select **My data includes routing info** to use dynamic routing, where your data includes the necessary routing information as seen in the [sample app](https://github.com/Azure-Samples/event-hubs-dotnet-ingest) comments. If both static and dynamic properties are set, the dynamic properties override the static ones.
98+
> [!NOTE]
99+
> * Select **My data includes routing info** to use dynamic routing, where your data includes the necessary routing information as seen in the [sample app](https://github.com/Azure-Samples/event-hubs-dotnet-ingest) comments. If both static and dynamic properties are set, the dynamic properties override the static ones.
100+
> * Only events enqueued after you create the data connection are ingested.
100101
101102
## Generate sample data for testing
102103

0 commit comments

Comments
 (0)