Skip to content

Commit eb960bb

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into pauljewell-upload-download
2 parents 6a13876 + 1dc076f commit eb960bb

File tree

273 files changed

+4559
-2537
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

273 files changed

+4559
-2537
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4256,6 +4256,11 @@
42564256
"redirect_url": "/azure/active-directory/external-identities/user-token",
42574257
"redirect_document_id": true
42584258
},
4259+
{
4260+
"source_path_from_root": "/articles/active-directory/fundamentals/certificate-authorities.md",
4261+
"redirect_url": "/azure/security/fundamentals/azure-CA-details",
4262+
"redirect_document_id": true
4263+
},
42594264
{
42604265
"source_path_from_root": "/articles/active-directory/b2b/what-is-b2b.md",
42614266
"redirect_url": "/azure/active-directory/external-identities/what-is-b2b",

.openpublishing.redirection.azure-monitor.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6135,7 +6135,12 @@
61356135
"source_path_from_root": "/articles/azure-monitor/app/data-model-context.md",
61366136
"redirect_url": "/azure/azure-monitor/app/data-model-complete",
61376137
"redirect_document_id": false
6138+
},
6139+
{
6140+
"source_path_from_root": "/articles/azure-monitor/logs/dashboard-upgrade.md",
6141+
"redirect_url": "/azure/azure-monitor/visualize/tutorial-logs-dashboards",
6142+
"redirect_document_id": false
61386143
}
6139-
6144+
61406145
]
61416146
}

articles/active-directory-b2c/configure-authentication-sample-react-spa-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 11/17/2022
10+
ms.date: 04/24/2023
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -213,7 +213,7 @@ You're now ready to test the React scoped access to the API. In this step, run b
213213

214214
```console
215215
npm install && npm update
216-
node index.js
216+
npm start
217217
```
218218

219219
The console window displays the port number where the application is hosted:

articles/active-directory-b2c/enable-authentication-react-spa-app.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 07/07/2022
10+
ms.date: 04/24/2023
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -31,7 +31,6 @@ You can use an existing React app, or [create a new React App](https://reactjs.o
3131
```
3232
npx create-react-app my-app
3333
cd my-app
34-
npm start
3534
```
3635

3736
## Step 2: Install the dependencies

articles/active-directory-b2c/saml-service-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/16/2022
12+
ms.date: 04/24/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit
@@ -327,7 +327,7 @@ The following example shows the `entityID` value in the SAML metadata:
327327
The `identifierUris` property will accept URLs only on the domain `tenant-name.onmicrosoft.com`.
328328

329329
```json
330-
"identifierUris":"https://tenant-name.onmicrosoft.com",
330+
"identifierUris":"https://tenant-name.onmicrosoft.com/app-name",
331331
```
332332

333333
#### Share the application's metadata with Azure AD B2C

articles/active-directory-b2c/tokens-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/09/2023
11+
ms.date: 04/24/2023
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: b2c-support
@@ -24,7 +24,7 @@ Azure AD B2C supports the [OAuth 2.0 and OpenID Connect protocols](protocols-ove
2424

2525
The following tokens are used in communication with Azure AD B2C:
2626

27-
- **ID token** - A JWT that contains claims that you can use to identify users in your application. This token is securely sent in HTTP requests for communication between two components of the same application or service. You can use the claims in an ID token as you see fit. They're commonly used to display account information or to make access control decisions in an application. ID tokens are signed, but they're not encrypted. When your application or API receives an ID token, it must validate the signature to prove that the token is authentic. Your application or API must also validate a few claims in the token to prove that it's valid. Depending on the scenario requirements, the claims validated by an application can vary, but your application must perform some common claim validations in every scenario.
27+
- **ID token** - A JWT that contains claims that you can use to identify users in your application. This token is securely sent in HTTP requests for communication between two components of the same application or service. You can use the claims in an ID token as you see fit. They're commonly used to display account information or to make access control decisions in an application. The ID tokens issued by Azure AD B2C are signed, but they're not encrypted. When your application or API receives an ID token, it must validate the signature to prove that the token is authentic. Your application or API must also validate a few claims in the token to prove that it's valid. Depending on the scenario requirements, the claims validated by an application can vary, but your application must perform some common claim validations in every scenario.
2828

2929
- **Access token** - A JWT that contains claims that you can use to identify the granted permissions to your APIs. Access tokens are signed, but they aren't encrypted. Access tokens are used to provide access to APIs and resource servers. When your API receives an access token, it must validate the signature to prove that the token is authentic. Your API must also validate a few claims in the token to prove that it's valid. Depending on the scenario requirements, the claims validated by an application can vary, but your application must perform some common claim validations in every scenario.
3030

articles/active-directory/fundamentals/certificate-authorities.md

Lines changed: 0 additions & 97 deletions
This file was deleted.

articles/active-directory/fundamentals/how-to-customize-branding.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,8 @@ The branding elements are called out in the following example. Text descriptions
5555

5656
1. **Favicon**: Small icon that appears on the left side of the browser tab.
5757
1. **Header logo**: Space across the top of the web page, below the web browser navigation area.
58-
1. **Background image** and **page background color**: The entire space behind the sign-in box.
58+
1. **Background image**: The entire space behind the sign-in box.
59+
1. **Page background color**: The entire space behind the sign-in box.
5960
1. **Banner logo**: The logo that appears in the upper-left corner of the sign-in box.
6061
1. **Username hint and text**: The text that appears before a user enters their information.
6162
1. **Sign-in page text**: Additional text you can add below the username field.

articles/active-directory/fundamentals/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -277,8 +277,6 @@ items:
277277
href: ../develop/howto-build-services-resilient-to-metadata-refresh.md?toc=/azure/active-directory/fundamentals/toc.json
278278
- name: Monitor application health for resilience
279279
href: monitor-sign-in-health-for-resilience.md
280-
- name: Certificate authorities used in Azure
281-
href: certificate-authorities.md
282280
- name: Secure with Azure Active Directory
283281
items:
284282
- name: Introduction

0 commit comments

Comments
 (0)