Skip to content

Commit e877590

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into four-vmware-cloudsimple-articles
2 parents 062b192 + 91817f6 commit e877590

File tree

300 files changed

+4649
-2650
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

300 files changed

+4649
-2650
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -306,6 +306,12 @@
306306
"branch": "master",
307307
"branch_mapping": {}
308308
},
309+
{
310+
"path_to_root": "cosmosdb-nodejs-get-started",
311+
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-api-nodejs-getting-started",
312+
"branch": "master",
313+
"branch_mapping": {}
314+
},
309315
{
310316
"path_to_root": "cognitive-services-content-moderator-samples",
311317
"url": "https://github.com/Azure-Samples/cognitive-services-content-moderator-samples",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,11 @@
140140
"redirect_url": "https://docs.microsoft.com/azure/architecture/topics/high-performance-computing/",
141141
"redirect_document_id": false
142142
},
143+
{
144+
"source_path": "articles/virtual-machines/workloads/oracle/oracle-considerations.md",
145+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview/",
146+
"redirect_document_id": false
147+
},
143148
{
144149
"source_path": "articles/machine-learning/studio/consume-web-service-with-web-app-template.md",
145150
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
@@ -19299,6 +19304,11 @@
1929919304
"redirect_url": "/azure/active-directory/develop/quickstart-v2-register-an-app",
1930019305
"redirect_document_id": true
1930119306
},
19307+
{
19308+
"source_path": "articles/active-directory/authentication/howto-mfa-sdk.md",
19309+
"redirect_url": "/azure/active-directory/develop/",
19310+
"redirect_document_id": true
19311+
},
1930219312
{
1930319313
"source_path": "articles/active-directory/active-directory-claims-mapping.md",
1930419314
"redirect_url": "/azure/active-directory/develop/active-directory-claims-mapping",

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Azure AD B2C requires you to register two applications that are used to sign up
7979
1. In **App registrations (Legacy)**, select **New application registration**.
8080
2. For **Name**, enter `ProxyIdentityExperienceFramework`.
8181
3. For **Application type**, choose **Native**.
82-
4. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `yourtenant` is your Azure AD B2C tenant.
82+
4. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
8383
5. Click **Create**. After it's created, copy the application ID and save it to use later.
8484
6. On the Settings page, select **Required permissions**, and then select **Add**.
8585
7. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.

articles/active-directory-b2c/active-directory-b2c-setup-fb-app.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 09/11/2018
11+
ms.date: 06/05/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -20,26 +20,26 @@ ms.subservice: B2C
2020
To use a Facebook account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory (Azure AD) B2C, you need to create an application in your tenant that represents it. If you don’t already have a Facebook account, you can get it at [https://www.facebook.com/](https://www.facebook.com/).
2121

2222
1. Sign in to [Facebook for developers](https://developers.facebook.com/) with your Facebook account credentials.
23-
2. If you have not already done so, you need to register as a Facebook developer. To do this, select **Register** on the upper-right corner of the page, accept Facebook's policies, and complete the registration steps.
24-
3. Select **My Apps** and then click **Add a New App**.
23+
2. If you have not already done so, you need to register as a Facebook developer. To do this, select **Get Started** on the upper-right corner of the page, accept Facebook's policies, and complete the registration steps.
24+
3. Select **My Apps** and then **Add New App**.
2525
4. Enter a **Display Name** and a valid **Contact Email**.
2626
5. Click **Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
2727
6. Select **Settings** > **Basic**.
2828
7. Choose a **Category**, for example `Business and Pages`. This value is required by Facebook, but not used for Azure AD B2C.
2929
8. At the bottom of the page, select **Add Platform**, and then select **Website**.
3030
9. In **Site URL**, enter `https://your-tenant-name.b2clogin.com/` replacing `your-tenant-name` with the name of your tenant. Enter a URL for the **Privacy Policy URL**, for example `http://www.contoso.com`. The policy URL is a page you maintain to provide privacy information for your application.
3131
10. Select **Save Changes**.
32-
11. At the top of the page, copy the value of **App ID**.
32+
11. At the top of the page, copy the value of **App ID**.
3333
12. Click **Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
34-
13. Select **Products**, and then select **Set up** under **Facebook Login**.
35-
14. Select **Settings** under **Facebook Login**.
34+
13. Select the plus sign next to **PRODUCTS**, and then select **Set up** under **Facebook Login**.
35+
14. Under **Facebook Login**, select **Settings**.
3636
15. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant. Click **Save Changes** at the bottom of the page.
3737
16. To make your Facebook application available to Azure AD B2C, click the Status selector at the top right of the page and turn it **On** to make the Application public, and then click **Confirm**. At this point the Status should change from **Development** to **Live**.
3838

3939
## Configure a Facebook account as an identity provider
4040

4141
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
42-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
42+
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
4343
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
4444
4. Select **Identity providers**, and then select **Add**.
4545
5. Enter a **Name**. For example, enter *Facebook*.

articles/active-directory-b2c/ropc-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ Complete the steps in [Get started with custom policies in Azure Active Director
136136
</TechnicalProfile>
137137
```
138138

139-
Replace the **DefaultValue** of **client_id** and **resource_id** with the Application ID of the ProxyIdentityExperienceFramework application that you created in the prerequisite tutorial.
139+
Replace the **DefaultValue** of **client_id** with the Application ID of the ProxyIdentityExperienceFramework application that you created in the prerequisite tutorial. Then replace **DefaultValue** of **resource_id** with the Application ID of the IdentityExperienceFramework application that you also created in the prerequisite tutorial.
140140

141141
5. Add following **ClaimsProvider** elements with their technical profiles to the **ClaimsProviders** element:
142142

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
3030
## Create an Azure AD B2C tenant
3131

3232
1. Sign in to the [Azure portal](https://portal.azure.com/).
33-
2. Make sure that you are using the directory that contains your subscription by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains it. This directory is different than the one that will contain your Azure AD B2C tenant.
33+
2. Make sure that you are using the directory that contains your subscription by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains it. This directory is different from the one that will contain your Azure AD B2C tenant.
3434

3535
![Switch to subscription directory](./media/tutorial-create-tenant/switch-directory-subscription.png)
3636

articles/active-directory/authentication/TOC.yml

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -142,10 +142,6 @@
142142
href: active-directory-certificate-based-authentication-android.md
143143
- name: CBA on iOS Devices
144144
href: active-directory-certificate-based-authentication-ios.md
145-
- name: Develop
146-
items:
147-
- name: Build MFA into custom apps
148-
href: howto-mfa-sdk.md
149145
- name: Reporting
150146
items:
151147
- name: SSPR Reports

articles/active-directory/authentication/howto-mfa-sdk.md

Lines changed: 0 additions & 161 deletions
This file was deleted.

articles/active-directory/authentication/howto-password-ban-bad-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Many organizations find their users create passwords using common local words su
2121

2222
## Add to the custom list
2323

24-
Configuring the custom banned password list requires an Azure Active Directory Premium P1 or P2 license. For more detailed information about Azure Active Directory licensing, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory/).|
24+
Configuring the custom banned password list requires an Azure Active Directory Premium P1 or P2 license. For more detailed information about Azure Active Directory licensing, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory/).
2525

2626
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory**, **Authentication methods**, then **Password protection**.
2727
1. Set the option **Enforce custom list**, to **Yes**.

articles/active-directory/authentication/tutorial-sspr-windows.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -113,6 +113,8 @@ When users reset their password from the login screen of a Windows 10 device, a
113113

114114
## Limitations
115115

116+
Account unlock, mobile app notification, and mobile app code are not supported by SSPR for Windows 10.
117+
116118
When testing this functionality using Hyper-V, the "Reset password" link does not appear.
117119

118120
* Go to the VM you are using to test click on **View** and then uncheck **Enhanced session**.

0 commit comments

Comments
 (0)