Skip to content

Commit e5beb67

Browse files
Merge branch 'main' into May-16-2025-TVM
2 parents 5b5a040 + 2baf2d2 commit e5beb67

File tree

2,260 files changed

+33519
-30089
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,260 files changed

+33519
-30089
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/private-multi-access-edge-compute-mec/index.yml",
5+
"redirect_url": "/previous-versions/azure/private-multi-access-edge-compute-mec/index",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/site-recovery/shared-disks-common-questions.md",
10+
"redirect_url": "/azure/site-recovery/azure-to-azure-common-questions",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "articles/network-watcher/traffic-analytics-schema-update.md",
515
"redirect_url": "/previous-versions/azure/network-watcher/traffic-analytics-schema-update",

articles/active-directory-b2c/api-connectors-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Using Azure AD B2C, you can add your own business logic to a user journey by cal
8787
![Diagram of a RESTful service claims exchange](media/api-connectors-overview/restful-service-claims-exchange.png)
8888

8989
> [!NOTE]
90-
> HTTP requests may be cancelled if there is a slow or no response from the RESTful service to Azure AD B2C. The default timeout is 10 seconds and the default retry count is one (meaning there are 2 tries in total).
90+
> HTTP requests may be cancelled if there is a slow or no response from the RESTful service to Azure AD B2C. The default timeout is 10 seconds for custom policies and 5 seconds for user flows. The default retry count is one (meaning there are 2 tries in total).
9191
9292
## Calling a RESTful service
9393

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ A successful token response looks like this:
233233
| access_token |The signed JWT that you requested. |
234234
| scope |The scopes that the token is valid for. You also can use the scopes to cache tokens for later use. |
235235
| expires_in |The length of time that the token is valid (in seconds). |
236-
| refresh_token |An OAuth 2.0 refresh token. The app can use this token to acquire additional tokens after the current token expires. Refresh tokens are long-lived, and can be used to retain access to resources for extended periods of time. For more information, see the [Azure AD B2C token reference](tokens-overview.md). |
236+
| refresh_token |An OAuth 2.0 refresh token. The app can use this token to acquire additional tokens after the current token expires. Refresh tokens are long-lived and can be used to retain access to resources for extended periods of time. For more information, see the [Azure AD B2C token reference](tokens-overview.md). |
237237

238238
Error responses look like this:
239239

articles/active-directory-b2c/custom-policies-series-call-rest-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ to:
216216
```xml
217217
<ValidationTechnicalProfile ReferenceId="ValidateAccessCodeViaHttp"/>
218218
```
219-
At this point, the Technical Profile with `Id` *CheckAccessCodeViaClaimsTransformationChecker* isn't needed, and can be removed.
219+
At this point, the Technical Profile with `Id` *CheckAccessCodeViaClaimsTransformationChecker* isn't needed and can be removed.
220220

221221

222222
## Step 3 - Upload custom policy file

articles/active-directory-b2c/external-identities-videos.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ ms.subservice: b2c
1515
---
1616

1717
# Microsoft Azure Active Directory B2C external identity video series
18+
1819
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
1920

2021
Learn the basics of External Identities - Azure Active Directory B2C (Azure AD B2C) and Microsoft Entra B2B in the Microsoft identity platform.

articles/active-directory-b2c/faq.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ metadata:
1414
ms.custom: b2c-support, has-azure-ad-ps-ref,azure-ad-ref-level-one-done
1515
title: 'Azure AD B2C: Frequently asked questions (FAQ)'
1616
summary: |
17+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
18+
1719
This page answers frequently asked questions about the Azure Active Directory B2C (Azure AD B2C). Keep checking back for updates.
1820
1921
sections:
@@ -22,7 +24,7 @@ sections:
2224
- question: |
2325
Azure AD B2C end of sale
2426
answer: |
25-
Effective May 1, 2025 Azure AD B2C will no longer be available to purchase for new customers, but current Azure AD B2C customers can continue using the product. The product experience, including creating new tenants or user flows, will remain unchanged. The operational commitments, including service level agreements (SLAs), security updates, and compliance, will also remain unchanged. We'll continue supporting Azure AD B2C until at least May 2030. More information, including migration plans will be made available. Contact your account representative for more information and to learn more about Microsoft Entra External ID.
27+
Effective **May 1, 2025** Azure AD B2C will no longer be available to purchase for new customers, but current Azure AD B2C customers can continue using the product. The product experience, including creating new tenants or user flows, will remain unchanged. The operational commitments, including service level agreements (SLAs), security updates, and compliance, will also remain unchanged. We'll continue supporting Azure AD B2C until at least May 2030. More information, including migration plans will be made available. Contact your account representative for more information and to learn more about Microsoft Entra External ID.
2628
- question: |
2729
What is Microsoft Entra External ID?
2830
answer: |

articles/active-directory-b2c/string-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -446,7 +446,7 @@ The following example generates an error message when an account is already in t
446446
</Localization>
447447
```
448448

449-
The claims transformation creates a response message based on the localized string. The message contains the user's email address embedded into the localized sting *ResponseMessage_EmailExists*.
449+
The claims transformation creates a response message based on the localized string. The message contains the user's email address embedded into the localized string *ResponseMessage_EmailExists*.
450450

451451
```xml
452452
<ClaimsTransformation Id="SetResponseMessageForEmailAlreadyExists" TransformationMethod="FormatLocalizedString">

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -211,8 +211,8 @@ Next, specify that the application should be treated as a public client:
211211
1. In the left menu, under **Manage**, select **Authentication**.
212212
1. Under **Advanced settings**, in the **Allow public client flows** section, set **Enable the following mobile and desktop flows** to **Yes**.
213213
1. Select **Save**.
214-
1. Ensure that **"isFallbackPublicClient": true** is set in the application manifest:
215-
1. In the left menu, under **Manage**, select **Manifest** to open application manifest.
214+
1. Ensure that **"isFallbackPublicClient": true** is set in the Microsoft Graph App Manifest(New):
215+
1. In the left menu, under **Manage**, select **Manifest** to open Microsoft Graph App Manifest(New)
216216
1. Switch from the **Microsoft Graph App Manifest (New)** tab to the **AAD Graph App Manifest (Deprecating Soon)** tab.
217217
1. Find **isFallbackPublicClient** key and ensure its value is set to **true**.
218218

articles/api-management/api-management-features.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: concept-article
9-
ms.date: 05/12/2025
9+
ms.date: 05/21/2025
1010
ms.author: danlep
1111
---
1212

@@ -52,7 +52,7 @@ Each API Management [pricing tier](api-management-key-concepts.md#api-management
5252
| Export API to Postman | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
5353
| Export API to MCP server (preview) | No | No | Yes | No | Yes | No | Yes | No |
5454

55-
<sup>1</sup> Enables the use of Microsoft Entra ID (and Azure AD B2C) as an identity provider for user sign in on the developer portal.<br/>
55+
<sup>1</sup> Enables the use of Microsoft Entra ID (and Azure AD B2C or [Microsoft Entra External ID](/entra/external-id/customers/overview-customers-ciam)) as an identity provider for user sign in on the developer portal.<br/>
5656
<sup>2</sup> Including related functionality such as users, groups, issues, applications, and email templates and notifications.<br/>
5757
<sup>3</sup> See [Gateway overview](api-management-gateways-overview.md#feature-comparison-managed-versus-self-hosted-gateways) for a feature comparison of managed versus self-hosted gateways. In the Developer tier, self-hosted gateways are limited to a single gateway node. <br/>
5858
<sup>4</sup> See [Gateway overview](api-management-gateways-overview.md#policies) for differences in policy support in the classic, v2, consumption, and self-hosted gateways. <br/>
@@ -62,4 +62,4 @@ Each API Management [pricing tier](api-management-key-concepts.md#api-management
6262
* [Overview of Azure API Management](api-management-key-concepts.md)
6363
* [API Management limits](/azure/azure-resource-manager/management/azure-subscription-service-limits?toc=/azure/api-management/toc.json&bc=/azure/api-management/breadcrumb/toc.json#api-management-limits)
6464
* [V2 tiers overview](v2-service-tiers-overview.md)
65-
* [API Management pricing](https://azure.microsoft.com/pricing/details/api-management/)
65+
* [API Management pricing](https://azure.microsoft.com/pricing/details/api-management/)

articles/api-management/api-management-howto-aad-b2c.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: azure-api-management
99
ms.topic: how-to
10-
ms.date: 01/07/2025
10+
ms.date: 05/20/2025
1111
ms.author: danlep
1212
ms.custom: engagement-fy23
1313
---
@@ -16,6 +16,8 @@ ms.custom: engagement-fy23
1616

1717
[!INCLUDE [premium-dev-standard-premiumv2-standardv2-basicv2.md](../../includes/api-management-availability-premium-dev-standard-premiumv2-standardv2-basicv2.md)]
1818

19+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
20+
1921
Azure Active Directory B2C is a cloud identity management solution for consumer-facing web and mobile applications. You can use it to manage access to your API Management developer portal.
2022

2123
In this tutorial, you'll learn the configuration required in your API Management service to integrate with Azure Active Directory B2C.

0 commit comments

Comments
 (0)