Skip to content

Commit e9a8d2a

Browse files
authored
Merge branch 'master' into azmlresponsible012022
2 parents bf0b1c4 + 3fce5ef commit e9a8d2a

File tree

1,084 files changed

+9938
-7395
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,084 files changed

+9938
-7395
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@
3232
},
3333
{
3434
"source_path_from_root": "/articles/active-directory/develop/registration-config-multi-tenant-application-add-to-gallery-how-to.md",
35-
"redirect_url": "/azure/active-directory/develop/v2-howto-app-gallery-listing",
35+
"redirect_url": "/azure/active-directory/manage-apps/v2-howto-app-gallery-listing",
3636
"redirect_document_id": false
3737
},
3838
{
@@ -3170,34 +3170,39 @@
31703170
"redirect_url": "/azure/active-directory/develop/v2-conditional-access-dev-guide",
31713171
"redirect_document_id": false
31723172
},
3173+
{
3174+
"source_path_from_root": "/articles/active-directory/develop/v2-howto-app-gallery-listing.md",
3175+
"redirect_url": "/azure/active-directory/manage-apps/v2-howto-app-gallery-listing",
3176+
"redirect_document_id": false
3177+
},
31733178
{
31743179
"source_path_from_root": "/articles/active-directory/azuread-dev/howto-app-gallery-listing.md",
3175-
"redirect_url": "/azure/active-directory/develop/v2-howto-app-gallery-listing",
3180+
"redirect_url": "/azure/active-directory/manage-apps/v2-howto-app-gallery-listing",
31763181
"redirect_document_id": false
31773182
},
31783183
{
31793184
"source_path_from_root": "/articles/active-directory/develop/howto-app-gallery-listing.md",
3180-
"redirect_url": "/azure/active-directory/develop/v2-howto-app-gallery-listing",
3185+
"redirect_url": "/azure/active-directory/manage-apps/v2-howto-app-gallery-listing",
31813186
"redirect_document_id": false
31823187
},
31833188
{
31843189
"source_path_from_root": "/articles/active-directory/manage-apps/isv-choose-multi-tenant-federation.md",
3185-
"redirect_url": "/azure/active-directory/develop/v2-howto-app-gallery-listing",
3190+
"redirect_url": "/azure/active-directory/manage-apps/v2-howto-app-gallery-listing",
31863191
"redirect_document_id": false
31873192
},
31883193
{
31893194
"source_path_from_root": "/articles/active-directory/manage-apps/isv-create-sso-documentation.md",
3190-
"redirect_url": "/azure/active-directory/develop/v2-howto-app-gallery-listing",
3195+
"redirect_url": "/azure/active-directory/manage-apps/v2-howto-app-gallery-listing",
31913196
"redirect_document_id": false
31923197
},
31933198
{
31943199
"source_path_from_root": "/articles/active-directory/manage-apps/isv-sso-content.md",
3195-
"redirect_url": "/azure/active-directory/develop/v2-howto-app-gallery-listing",
3200+
"redirect_url": "/azure/active-directory/manage-apps/v2-howto-app-gallery-listing",
31963201
"redirect_document_id": false
31973202
},
31983203
{
31993204
"source_path_from_root": "/articles/active-directory/manage-apps/isv-tenant-multi-tenant-app.md",
3200-
"redirect_url": "/azure/active-directory/develop/v2-howto-app-gallery-listing",
3205+
"redirect_url": "/azure/active-directory/manage-apps/v2-howto-app-gallery-listing",
32013206
"redirect_document_id": false
32023207
},
32033208
{

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25258,6 +25258,11 @@
2525825258
"redirect_url": "/azure/spring-cloud/expose-apps-gateway",
2525925259
"redirect_document_id": false
2526025260
},
25261+
{
25262+
"source_path_from_root": "/articles/spring-cloud/tutorial-dump-jvm-options.md",
25263+
"redirect_url": "/azure/spring-cloud/how-to-dump-jvm-options",
25264+
"redirect_document_id": false
25265+
},
2526125266
{
2526225267
"source_path_from_root": "/articles/spring-cloud/how-to-provision-azure-spring-cloud-instance-terraform.md",
2526325268
"redirect_url": "/azure/spring-cloud/quickstart-deploy-infrastructure-vnet-terraform",
@@ -45212,6 +45217,11 @@
4521245217
"source_path_from_root": "/articles/azure/sentinel/connect-windows-virtual-desktop.md",
4521345218
"redirect_url": "/azure/sentinel/connect-azure-virtual-desktop",
4521445219
"redirect_document_id": true
45220+
},
45221+
{
45222+
"source_path_from_root": "/articles/azure/cognitive-services/translator/custom-translator/v2-preview/project-overview.md",
45223+
"redirect_url": "/azure/cognitive-services/translator/custom-translator/v2-preview/beginners-guide",
45224+
"redirect_document_id": true
4521545225
}
4521645226
]
4521745227
}

articles/active-directory-b2c/force-password-reset.md

Lines changed: 31 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 01/24/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -19,8 +19,6 @@ zone_pivot_groups: b2c-policy-type
1919

2020
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2121

22-
::: zone pivot="b2c-user-flow"
23-
2422
## Overview
2523

2624
As an administrator, you can [reset a user's password](manage-users-portal.md#reset-a-users-password) if the user forgets their password. Or you would like to force them to reset the password. In this article, you'll learn how to force a password reset in these scenarios.
@@ -31,13 +29,6 @@ When an administrator resets a user's password via the Azure portal, the value o
3129

3230
The password reset flow is applicable to local accounts in Azure AD B2C that use an [email address](sign-in-options.md#email-sign-in) or [username](sign-in-options.md#username-sign-in) with a password for sign-in.
3331

34-
::: zone-end
35-
36-
::: zone pivot="b2c-custom-policy"
37-
38-
This feature is currently only available for User Flows. For setup steps, choose **User Flow** above. For custom policies, use the force password reset first logon [GitHub sample](https://github.com/azure-ad-b2c/samples/tree/master/policies/force-password-reset-first-logon) with prerequisites below.
39-
40-
::: zone-end
4132

4233
## Prerequisites
4334

@@ -75,6 +66,36 @@ To enable the **Forced password reset** setting in a sign-up or sign-in user flo
7566
1. Sign in with the user account for which you reset the password.
7667
1. You now must change the password for the user. Change the password and select **Continue**. The token is returned to `https://jwt.ms` and should be displayed to you.
7768

69+
::: zone-end
70+
71+
::: zone pivot="b2c-custom-policy"
72+
73+
## Configure your custom policy
74+
75+
Get the example of the force password reset policy on [GitHub](https://github.com/azure-ad-b2c/samples/tree/master/policies/force-password-reset). In each file, replace the string `yourtenant` with the name of your Azure AD B2C tenant. For example, if the name of your B2C tenant is *contosob2c*, all instances of `yourtenant.onmicrosoft.com` become `contosob2c.onmicrosoft.com`.
76+
77+
## Upload and test the policy
78+
79+
1. Sign in to the [Azure portal](https://portal.azure.com/).
80+
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
81+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
82+
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
83+
1. Select **Identity Experience Framework**.
84+
1. In **Custom Policies**, select **Upload Policy**.
85+
1. Select the *TrustFrameworkExtensionsCustomForcePasswordReset.xml* file.
86+
1. Select **Upload**.
87+
1. Repeat steps 6 through 8 for the relying party file *TrustFrameworkExtensionsCustomForcePasswordReset.xml*.
88+
89+
## Run the policy
90+
91+
1. Open the policy that you uploaded *B2C_1A_TrustFrameworkExtensions_custom_ForcePasswordReset*.
92+
1. For **Application**, select the application that you registered earlier. To see the token, the **Reply URL** should show `https://jwt.ms`.
93+
1. Select **Run now**.
94+
1. Sign in with the user account for which you reset the password.
95+
1. You now must change the password for the user. Change the password and select **Continue**. The token is returned to `https://jwt.ms` and should be displayed to you.
96+
97+
::: zone-end
98+
7899
## Force password reset on next login
79100

80101
To force reset the password on next login, update the account password profile using MS Graph [Update user](/graph/api/user-update) operation. The following example updates the password profile [forceChangePasswordNextSignIn](user-profile-attributes.md#password-profile-property) attribute to `true`, which forces the user to reset the password on next login.
@@ -123,8 +144,6 @@ Once a password expiration policy has been set, you must also configure force pa
123144

124145
The password expiry duration default value is **90** days. The value is configurable by using the [Set-MsolPasswordPolicy](/powershell/module/msonline/set-msolpasswordpolicy) cmdlet from the Azure Active Directory Module for Windows PowerShell. This command updates the tenant, so that all users' passwords expire after number of days you configure.
125146

126-
::: zone-end
127-
128147
## Next steps
129148

130149
Set up a [self-service password reset](add-password-reset-policy.md).

articles/active-directory-b2c/localization.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 03/08/2021
10+
ms.date: 01/21/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -142,8 +142,8 @@ The **LocalizedString** element contains the following attributes:
142142

143143
| Attribute | Required | Description |
144144
| --------- | -------- | ----------- |
145-
| ElementType | Yes | Possible values: [ClaimsProvider](#claimsprovider), [ClaimType](#claimtype), [ErrorMessage](#errormessage), [GetLocalizedStringsTransformationClaimType](#getlocalizedstringstransformationclaimtype), [FormatLocalizedStringTransformationClaimType](#formatlocalizedstringtransformationclaimtype), [Predicate](#predicate), [InputValidation](#inputvalidation), or [UxElement](#uxelement). |
146-
| ElementId | Yes | If **ElementType** is set to `ClaimType`, `Predicate`, or `InputValidation`, this element contains a reference to a claim type already defined in the ClaimsSchema section. |
145+
| ElementType | Yes | Possible values: [ClaimsProvider](#claimsprovider), [ClaimType](#claimtype), [ErrorMessage](#errormessage), [GetLocalizedStringsTransformationClaimType](#getlocalizedstringstransformationclaimtype), [FormatLocalizedStringTransformationClaimType](#formatlocalizedstringtransformationclaimtype), [Predicate](#predicate), [PredicateValidation](#predicatevalidation), or [UxElement](#uxelement). |
146+
| ElementId | Yes | If **ElementType** is set to `ClaimType`, `Predicate`, or `PredicateValidation`, this element contains a reference to a claim type already defined in the ClaimsSchema section. |
147147
| StringId | Yes | If **ElementType** is set to `ClaimType`, this element contains a reference to an attribute of a claim type. Possible values: `DisplayName`, `AdminHelpText`, or `PatternHelpText`. The `DisplayName` value is used to set the claim display name. The `AdminHelpText` value is used to set the help text name of the claim user. The `PatternHelpText` value is used to set the claim pattern help text. If **ElementType** is set to `UxElement`, this element contains a reference to an attribute of a user interface element. If **ElementType** is set to `ErrorMessage`, this element specifies the identifier of an error message. See [Localization string IDs](localization-string-ids.md) for a complete list of the `UxElement` identifiers.|
148148

149149
## ElementType
@@ -157,7 +157,7 @@ The ElementType reference to a claim type, a claim transformation, or a user int
157157
|Error message|`ErrorMessage`||The ID of the error message |
158158
|Copies localized strings into claims|`GetLocalizedStringsTra nsformationClaimType`||The name of the output claim|
159159
|Predicate user message|`Predicate`|The name of the predicate| The attribute of the predicate to be localized. Possible values: `HelpText`.|
160-
|Predicate group user message|`InputValidation`|The ID of the PredicateValidation element.|The ID of the PredicateGroup element. The predicate group must be a child of the predicate validation element as defined in the ElementId.|
160+
|Predicate group user message|`PredicateValidation`|The ID of the PredicateValidation element.|The ID of the PredicateGroup element. The predicate group must be a child of the predicate validation element as defined in the ElementId.|
161161
|User interface elements |`UxElement` | | The ID of the user interface element to be localized.|
162162
|[Display Control](display-controls.md) |`DisplayControl` |The ID of the display control. | The ID of the user interface element to be localized.|
163163

@@ -312,9 +312,9 @@ The following example shows how to localize predicates help text.
312312
<LocalizedString ElementType="Predicate" ElementId="Uppercase" StringId="HelpText">an uppercase letter</LocalizedString>
313313
```
314314

315-
### InputValidation
315+
### PredicateValidation
316316

317-
The InputValidation value is used to localize one of the [PredicateValidation](predicates.md) group error messages.
317+
The PredicateValidation value is used to localize one of the [PredicateValidation](predicates.md) group error messages.
318318

319319
```xml
320320
<PredicateValidations>
@@ -342,7 +342,7 @@ The InputValidation value is used to localize one of the [PredicateValidation](p
342342
The following example shows how to localize a predicate validation group help text.
343343

344344
```xml
345-
<LocalizedString ElementType="InputValidation" ElementId="CustomPassword" StringId="CharacterClasses">The password must have at least 3 of the following:</LocalizedString>
345+
<LocalizedString ElementType="PredicateValidation" ElementId="CustomPassword" StringId="CharacterClasses">The password must have at least 3 of the following:</LocalizedString>
346346
```
347347

348348
### UxElement

articles/active-directory-b2c/oauth2-error-technical-profile.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 05/26/2021
12+
ms.date: 01/25/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -41,7 +41,7 @@ https://jwt.ms/#error=access_denied&error_description=AAD_Custom_1234%3a+My+cust
4141

4242
## Protocol
4343

44-
The **Name** attribute of the **Protocol** element needs to be set to `None`. Set the **OutputTokenFormat** element to `OAuth2Error`.
44+
The **Name** attribute of the **Protocol** element needs to be set to `OAuth2`. Set the **OutputTokenFormat** element to `OAuth2Error`.
4545

4646
The following example shows a technical profile for `ReturnOAuth2Error`:
4747

@@ -53,7 +53,7 @@ The following example shows a technical profile for `ReturnOAuth2Error`:
5353
<TechnicalProfiles>
5454
<TechnicalProfile Id="ReturnOAuth2Error">
5555
<DisplayName>Return OAuth2 error</DisplayName>
56-
<Protocol Name="None" />
56+
<Protocol Name="OAuth2" />
5757
<OutputTokenFormat>OAuth2Error</OutputTokenFormat>
5858
<CryptographicKeys>
5959
<Key Id="issuer_secret" StorageReferenceId="B2C_1A_TokenSigningKeyContainer" />
@@ -121,4 +121,4 @@ In the following example:
121121

122122
## Next steps
123123

124-
Learn about [UserJourneys](userjourneys.md)
124+
Learn about [UserJourneys](userjourneys.md)

articles/active-directory-b2c/publish-app-to-azure-ad-app-gallery.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -72,10 +72,10 @@ In production environments, the app registration redirect URI is ordinarily a pu
7272

7373
## Step 4: Publish your Azure AD B2C app
7474

75-
Finally, add the multitenant app to the Azure AD app gallery. Follow the instructions in [Publish your app to the Azure AD app gallery](../active-directory/develop/v2-howto-app-gallery-listing.md). To add your app to the app gallery, do the following:
75+
Finally, add the multitenant app to the Azure AD app gallery. Follow the instructions in [Publish your app to the Azure AD app gallery](../active-directory/manage-apps/v2-howto-app-gallery-listing.md). To add your app to the app gallery, do the following:
7676

77-
1. [Create and publish documentation](../active-directory/develop/v2-howto-app-gallery-listing.md#step-5---create-and-publish-documentation).
78-
1. [Submit your app](../active-directory/develop/v2-howto-app-gallery-listing.md#step-6---submit-your-app) with the following information:
77+
1. [Create and publish documentation](../active-directory/manage-apps/v2-howto-app-gallery-listing.md#create-and-publish-documentation).
78+
1. [Submit your app](../active-directory/manage-apps/v2-howto-app-gallery-listing.md#submit-your-application) with the following information:
7979

8080
|Question |Answer you should provide |
8181
|---------|---------|
@@ -89,4 +89,4 @@ Finally, add the multitenant app to the Azure AD app gallery. Follow the instruc
8989

9090
## Next steps
9191

92-
- Learn how to [Publish your app to the Azure AD app gallery](../active-directory/develop/v2-howto-app-gallery-listing.md).
92+
- Learn how to [Publish your app to the Azure AD app gallery](../active-directory/manage-apps/v2-howto-app-gallery-listing.md).

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The **Azure AD Provisioning Service** provisions users to SaaS apps and other sy
3333

3434
The Azure AD provisioning service uses the [SCIM 2.0 protocol](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/bg-p/IdentityStandards) for automatic provisioning. The service connects to the SCIM endpoint for the application, and uses SCIM user object schema and REST APIs to automate the provisioning and de-provisioning of users and groups. A SCIM-based provisioning connector is provided for most applications in the Azure AD gallery. When building apps for Azure AD, developers can use the SCIM 2.0 user management API to build a SCIM endpoint that integrates Azure AD for provisioning. For details, see [Build a SCIM endpoint and configure user provisioning](../app-provisioning/use-scim-to-provision-users-and-groups.md).
3535

36-
To request an automatic Azure AD provisioning connector for an app that doesn't currently have one, see [Azure Active Directory Application Request](../develop/v2-howto-app-gallery-listing.md).
36+
To request an automatic Azure AD provisioning connector for an app that doesn't currently have one, see [Azure Active Directory Application Request](../manage-apps/v2-howto-app-gallery-listing.md).
3737

3838
## Authorization
3939

articles/active-directory/app-provisioning/isv-automatic-provisioning-multi-tenant-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ SAML JIT uses the claims information in the SAML token to create and update user
106106

107107
## Next Steps
108108

109-
* [Enable Single Sign-on for your application](../develop/v2-howto-app-gallery-listing.md)
109+
* [Enable Single Sign-on for your application](../manage-apps/v2-howto-app-gallery-listing.md)
110110

111111
* [Submit your application listing](https://microsoft.sharepoint.com/teams/apponboarding/Apps/SitePages/Default.aspx) and partner with Microsoft to create documentation on Microsoft’s site.
112112

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ The actual steps required to enable and configure automatic provisioning vary de
152152

153153
If not, follow the steps below:
154154

155-
1. [Create a request](../develop/v2-howto-app-gallery-listing.md) for a pre-integrated user provisioning connector. Our team will work with you and the application developer to onboard your application to our platform if it supports SCIM.
155+
1. [Create a request](../manage-apps/v2-howto-app-gallery-listing.md) for a pre-integrated user provisioning connector. Our team will work with you and the application developer to onboard your application to our platform if it supports SCIM.
156156

157157
1. Use the [BYOA SCIM](../app-provisioning/use-scim-to-provision-users-and-groups.md) generic user provisioning support for the app. This is a requirement for Azure AD to provision users to the app without a pre-integrated provisioning connector.
158158

0 commit comments

Comments
 (0)