Skip to content

Commit e762e74

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 26a2c4f + 253d4c7 commit e762e74

File tree

239 files changed

+2411
-1565
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

239 files changed

+2411
-1565
lines changed

.openpublishing.redirection.json

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26594,6 +26594,21 @@
2659426594
"redirect_url": "/azure/virtual-machines/linux/tutorial-lamp-stack",
2659526595
"redirect_document_id": false
2659626596
},
26597+
{
26598+
"source_path": "articles/vpn-gateway/nva-working-remotely-support.md",
26599+
"redirect_url": "/azure/vpn-gateway/nva-work-remotely-support",
26600+
"redirect_document_id": false
26601+
},
26602+
{
26603+
"source_path": "articles/expressroute/working-remotely-support.md",
26604+
"redirect_url": "/azure/expressroute/work-remotely-support",
26605+
"redirect_document_id": false
26606+
},
26607+
{
26608+
"source_path": "articles/bastion/working-remotely-support.md",
26609+
"redirect_url": "/azure/bastion/work-remotely-support",
26610+
"redirect_document_id": false
26611+
},
2659726612
{
2659826613
"source_path": "articles/vpn-gateway/vpn-gateway-site-to-site-create.md",
2659926614
"redirect_url": "/azure/vpn-gateway/vpn-gateway-howto-site-to-site-classic-portal",
@@ -50325,6 +50340,18 @@
5032550340
"source_path": "articles/sql-data-warehouse/what-is-a-data-warehouse-unit-dwu-cdwu.md",
5032650341
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/what-is-a-data-warehouse-unit-dwu-cdwu",
5032750342
"redirect_document_id": true
50343+
},
50344+
{
50345+
"source_path": "articles/cognitive-services/speech-service/quickstart-voice-assistant-java-android.md",
50346+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-java&tabs=android"
50347+
},
50348+
{
50349+
"source_path": "articles/cognitive-services/speech-service/quickstart-voice-assistant-java-jre.md",
50350+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-java&tabs=jre"
50351+
},
50352+
{
50353+
"source_path": "articles/cognitive-services/Speech-Service/quickstart-voice-assistant-csharp-uwp.md",
50354+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-csharp&tabs=uwp"
5032850355
}
5032950356
]
5033050357
}

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/16/2020
12+
ms.date: 03/24/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -251,7 +251,7 @@ The following technical profile deletes a social user account using **alternativ
251251
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md) |
252252
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
253253

254-
## Error messages
254+
### Error messages
255255

256256
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
257257

articles/active-directory-b2c/custom-policy-keep-me-signed-in.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 02/27/2020
11+
ms.date: 03/24/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -103,7 +103,15 @@ We recommend that you set the value of SessionExpiryInSeconds to be a short peri
103103
</RelyingParty>
104104
```
105105

106-
4. Save your changes and then upload the file.
107-
5. To test the custom policy that you uploaded, in the Azure portal, go to the policy page, and then select **Run now**.
106+
## Test your policy
108107

109-
You can find the sample policy [here](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/keep%20me%20signed%20in).
108+
1. Save your changes, and then upload the file.
109+
1. To test the custom policy you uploaded, in the Azure portal, go to the policy page, and then select **Run now**.
110+
1. Type your **username** and **password**, select **Keep me signed in**, and then click **sign-in**.
111+
1. Go back to the Azure portal. Go to the policy page, and then select **Copy** to copy the sign-in URL.
112+
1. In the browser address bar, remove the `&prompt=login` query string parameter, which forces the user to enter their credentials on that request.
113+
1. In the browser, click **Go**. Now Azure AD B2C will issue an access token without prompting you to sign-in again.
114+
115+
## Next steps
116+
117+
Find the sample policy [here](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/keep%20me%20signed%20in).

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,16 @@ The technical profile also returns claims that aren't returned by the identity p
8888
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token. |
8989
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
9090

91+
### Error messages
92+
93+
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the OpenID Connect technical profile. The error messages can be [localized](localization-string-ids.md#sign-up-or-sign-in-error-messages).
94+
95+
| Attribute | Required | Description |
96+
| --------- | -------- | ----------- |
97+
| UserMessageIfClaimsPrincipalDoesNotExist | No | The message to display to the user if an account with the provided username not found in the directory. |
98+
| UserMessageIfInvalidPassword | No | The message to display to the user if the password is incorrect. |
99+
| UserMessageIfOldPasswordUsed| No | The message to display to the user if an old password used.|
100+
91101
## Cryptographic keys
92102

93103
The **CryptographicKeys** element contains the following attribute:

0 commit comments

Comments
 (0)