Skip to content

Commit eec40ba

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1679050d
2 parents 6dcf9f4 + 98c17d5 commit eec40ba

File tree

6,490 files changed

+131216
-81560
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

6,490 files changed

+131216
-81560
lines changed

.openpublishing.publish.config.json

Lines changed: 71 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,12 +151,52 @@
151151
"url": "https://github.com/Azure-Samples/functions-python-tensorflow-tutorial",
152152
"branch": "master",
153153
"branch_mapping": {}
154-
},
154+
},
155+
{
156+
"path_to_root": "functions-pytorch",
157+
"url": "https://github.com/Azure-Samples/functions-python-pytorch-tutorial",
158+
"branch": "master",
159+
"branch_mapping": {}
160+
},
161+
{
162+
"path_to_root": "functions-quickstart-templates",
163+
"url": "https://github.com/Azure/azure-functions-templates",
164+
"branch": "dev"
165+
},
166+
{
167+
"path_to_root": "functions-docs-csharp",
168+
"url": "https://github.com/Azure-Samples/functions-docs-csharp",
169+
"branch": "master"
170+
},
171+
{
172+
"path_to_root": "functions-docs-javascript",
173+
"url": "https://github.com/Azure-Samples/functions-docs-javascript",
174+
"branch": "master"
175+
},
176+
{
177+
"path_to_root": "functions-docs-typescript",
178+
"url": "https://github.com/Azure-Samples/functions-docs-typescript",
179+
"branch": "master"
180+
},
155181
{
182+
"path_to_root": "functions-docs-python",
183+
"url": "https://github.com/Azure-Samples/functions-docs-python",
184+
"branch": "master"
185+
},
186+
{
187+
"path_to_root": "functions-docs-powershell",
188+
"url": "https://github.com/Azure-Samples/functions-docs-powershell",
189+
"branch": "master"
190+
}, {
156191
"path_to_root": "samples-personalizer",
157192
"url": "https://github.com/Azure-Samples/cognitive-services-personalizer-samples",
158193
"branch": "master"
159194
},
195+
{
196+
"path_to_root": "samples-cognitive-services-data-files",
197+
"url": "https://github.com/Azure-Samples/cognitive-services-sample-data-files",
198+
"branch": "master"
199+
},
160200
{
161201
"path_to_root": "samples-luis",
162202
"url": "https://github.com/Azure-Samples/cognitive-services-language-understanding",
@@ -237,6 +277,11 @@
237277
"url": "https://github.com/Azure/pcs-remote-monitoring-webui.git",
238278
"branch": "master"
239279
},
280+
{
281+
"path_to_root": "MachineLearningNotebooks",
282+
"url": "https://github.com/Azure/MachineLearningNotebooks",
283+
"branch": "master"
284+
},
240285
{
241286
"path_to_root": "aml-sdk-samples",
242287
"url": "https://github.com/Azure/MachineLearningNotebooks",
@@ -312,6 +357,26 @@
312357
"url": "https://github.com/Azure-Samples/azure-sdk-for-go-samples",
313358
"branch": "master"
314359
},
360+
{
361+
"path_to_root": "azure-sdk-for-java-event-hubs",
362+
"url": "https://github.com/Azure/azure-sdk-for-java/",
363+
"branch": "master"
364+
},
365+
{
366+
"path_to_root": "azure-sdk-for-java-script-event-hubs",
367+
"url": "https://github.com/Azure/azure-sdk-for-js/",
368+
"branch": "master"
369+
},
370+
{
371+
"path_to_root": "azure-sdk-for-net-event-hubs",
372+
"url": "https://github.com/Azure/azure-sdk-for-net/",
373+
"branch": "master"
374+
},
375+
{
376+
"path_to_root": "azure-sdk-for-python-event-hubs",
377+
"url": "https://github.com/Azure/azure-sdk-for-python/",
378+
"branch": "master"
379+
},
315380
{
316381
"path_to_root": "cosmos-dotnet-getting-started",
317382
"url": "https://github.com/Azure-Samples/cosmos-dotnet-getting-started",
@@ -419,6 +484,11 @@
419484
"url": "https://github.com/Azure/azure-cosmosdb-java",
420485
"branch": "master"
421486
},
487+
{
488+
"path_to_root": "azure-cosmosdb-graph-dotnet",
489+
"url": "https://github.com/Azure-Samples/azure-cosmos-db-graph-gremlindotnet-getting-started",
490+
"branch": "master"
491+
},
422492
{
423493
"path_to_root": "azure-cosmosdb-java-v4-getting-started",
424494
"url": "https://github.com/Azure-Samples/azure-cosmos-java-getting-started",

.openpublishing.redirection.json

Lines changed: 707 additions & 94 deletions
Large diffs are not rendered by default.

.vscode/settings.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,5 +54,9 @@
5454
"XAML",
5555
"XML",
5656
"YAML"
57-
]
57+
],
58+
"cSpell.words": [
59+
"auditd"
60+
],
61+
"git.ignoreLimitWarning": true
5862
}

articles/active-directory-b2c/TOC.yml

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,8 @@
4848
href: code-samples.md
4949
- name: Concepts
5050
items:
51+
- name: Azure AD B2C best practices
52+
href: best-practices.md
5153
- name: Application types
5254
href: application-types.md
5355
- name: Authentication protocols
@@ -72,6 +74,8 @@
7274
href: custom-policy-overview.md
7375
- name: User accounts
7476
href: user-overview.md
77+
- name: User profile attributes
78+
href: user-profile-attributes.md
7579
- name: How-to guides
7680
items:
7781
- name: App integration
@@ -180,9 +184,13 @@
180184
- name: Customize the UI
181185
href: custom-policy-ui-customization.md
182186
displayName: ux, input, cors, html, css
187+
- name: Customize language
188+
href: custom-policy-localization.md
183189
- name: Custom email
184190
href: custom-email.md
185191
displayName: verification
192+
- name: Disable email verification
193+
href: custom-policy-disable-email-verification.md
186194
- name: Enable JavaScript
187195
href: javascript-samples.md
188196
- name: Password complexity
@@ -327,6 +335,8 @@
327335
href: restful-technical-profile.md
328336
- name: SAML
329337
href: saml-technical-profile.md
338+
- name: SAML token issuer
339+
href: saml-issuer-technical-profile.md
330340
- name: Self-asserted
331341
href: self-asserted-technical-profile.md
332342
- name: SSO session
@@ -350,10 +360,9 @@
350360
- name: Azure Monitor
351361
href: azure-monitor.md
352362
displayName: log, logs, logging, usage, events
353-
- name: Export usage report
354-
href: view-usage-reports.md
355-
- name: Account management
363+
- name: Manage users - Microsoft Graph
356364
href: manage-user-accounts-graph-api.md
365+
displayName: account, accounts
357366
- name: Deploy with Azure Pipelines
358367
href: deploy-custom-policies-devops.md
359368
displayName: azure devops, ci/cd, cicd, custom policy, policies

articles/active-directory-b2c/access-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Request an access token - Azure Active Directory B2C | Microsoft Docs
33
description: Learn how to request an access token from Azure Active Directory B2C.
44
services: active-directory-b2c
5-
author: mmacy
5+
author: msmimart
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
1111
ms.date: 04/16/2019
12-
ms.author: marsma
12+
ms.author: mimart
1313
ms.subservice: B2C
1414

1515
---

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 35 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: Define an Azure AD technical profile in a custom policy
33
titleSuffix: Azure AD B2C
44
description: Define an Azure Active Directory technical profile in a custom policy in Azure Active Directory B2C.
55
services: active-directory-b2c
6-
author: mmacy
6+
author: msmimart
77
manager: celestedg
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/13/2020
13-
ms.author: marsma
12+
ms.date: 03/16/2020
13+
ms.author: mimart
1414
ms.subservice: B2C
1515
---
1616

@@ -24,8 +24,8 @@ Azure Active Directory B2C (Azure AD B2C) provides support for the Azure Active
2424

2525
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly `Web.TPEngine.Providers.AzureActiveDirectoryProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null`.
2626

27-
All Azure AD technical profiles include the **AAD-Common** technical profile. The following technical profiles don't specify the protocol because the protocol is configured in the **AAD-Common** technical profile:
28-
27+
Following [custom policy starter pack](custom-policy-get-started.md#custom-policy-starter-pack) Azure AD technical profiles include the **AAD-Common** technical profile. The Azure AD technical profiles don't specify the protocol because the protocol is configured in the **AAD-Common** technical profile:
28+
2929
- **AAD-UserReadUsingAlternativeSecurityId** and **AAD-UserReadUsingAlternativeSecurityId-NoError** - Look up a social account in the directory.
3030
- **AAD-UserWriteUsingAlternativeSecurityId** - Create a new social account.
3131
- **AAD-UserReadUsingEmailAddress** - Look up a local account in the directory.
@@ -52,21 +52,21 @@ The following example shows the **AAD-Common** technical profile:
5252
</TechnicalProfile>
5353
```
5454

55-
## Input claims
55+
## InputClaims
56+
57+
The InputClaims element contains a claim, which is used to look up an account in the directory, or create a new one. There must be exactly one InputClaim element in the input claims collection for all Azure AD technical profiles. You may need to map the name of the claim defined in your policy to the name defined in Azure Active Directory.
5658

57-
The following technical profiles include **InputClaims** for social and local accounts:
59+
To read, update, or delete an existing user account, the input claim is a key that uniquely identifies the account in Azure AD directory. For example, **objectId**, **userPrincipalName**, **signInNames.emailAddress**, **signInNames.userName**, or **alternativeSecurityId**.
5860

59-
- The social account technical profiles **AAD-UserReadUsingAlternativeSecurityId** and **AAD-UserWriteUsingAlternativeSecurityId** includes the **AlternativeSecurityId** claim. This claim contains the social account user identifier.
60-
- The local account technical profiles **AAD-UserReadUsingEmailAddress** and **AAD-UserWriteUsingLogonEmail** includes the **email** claim. This claim contains the sign-in name of the local account.
61-
- The unified (local and social) technical profiles **AAD-UserReadUsingObjectId**, **AAD-UserWritePasswordUsingObjectId**, **AAD-UserWriteProfileUsingObjectId**, and **AAD-UserWritePhoneNumberUsingObjectId** includes the **objectId** claim. The unique identifier of an account.
61+
To create a new user account, the input claim is a key that uniquely identifies a local or federated account. For example, local account: **signInNames.emailAddress**, or **signInNames.userName**. For a federated account: the **alternativeSecurityId**.
6262

63-
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones.
63+
The [InputClaimsTransformations](technicalprofiles.md#inputclaimstransformations) element may contain a collection of input claims transformation elements that are used to modify the input claim or generate new one.
6464

65-
## Output claims
65+
## OutputClaims
6666

6767
The **OutputClaims** element contains a list of claims returned by the Azure AD technical profile. You may need to map the name of the claim defined in your policy to the name defined in Azure Active Directory. You can also include claims that aren't returned by the Azure Active Directory, as long as you set the `DefaultValue` attribute.
6868

69-
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
69+
The [OutputClaimsTransformations](technicalprofiles.md#outputclaimstransformations) element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
7070

7171
For example, the **AAD-UserWriteUsingLogonEmail** technical profile creates a local account and returns the following claims:
7272

@@ -88,7 +88,7 @@ For example, the **AAD-UserWriteUsingLogonEmail** technical profile creates a lo
8888

8989
## PersistedClaims
9090

91-
The **PersistedClaims** element contains all of the values that should be persisted by Azure AD with possible mapping information between a claim type already defined in the ClaimsSchema section in the policy and the Azure AD attribute name.
91+
The **PersistedClaims** element contains all of the values that should be persisted by Azure AD with possible mapping information between a claim type already defined in the [ClaimsSchema](claimsschema.md) section in the policy and the Azure AD attribute name.
9292

9393
The **AAD-UserWriteUsingLogonEmail** technical profile, which creates new local account, persists following claims:
9494

@@ -111,6 +111,7 @@ The name of the claim is the name of the Azure AD attribute unless the **Partner
111111
## Requirements of an operation
112112

113113
- There must be exactly one **InputClaim** element in the claims bag for all Azure AD technical profiles.
114+
- The [user profile attributes article](user-profile-attributes.md) describes the supported Azure AD B2C user profile attributes you can use in the input claims, output claims, and persisted claims.
114115
- If the operation is `Write` or `DeleteClaims`, then it must also appear in a **PersistedClaims** element.
115116
- The value of the **userPrincipalName** claim must be in the format of `[email protected]`.
116117
- The **displayName** claim is required and cannot be an empty string.
@@ -119,9 +120,7 @@ The name of the claim is the name of the Azure AD attribute unless the **Partner
119120

120121
### Read
121122

122-
The **Read** operation reads data about a single user account. To read user data, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames** (any type, user name and email-based account) or **alternativeSecurityId**.
123-
124-
The following technical profile reads data about a user account using the user's objectId:
123+
The **Read** operation reads data about a single user account. The following technical profile reads data about a user account using the user's objectId:
125124

126125
```XML
127126
<TechnicalProfile Id="AAD-UserReadUsingObjectId">
@@ -151,9 +150,7 @@ The following technical profile reads data about a user account using the user's
151150

152151
### Write
153152

154-
The **Write** operation creates or updates a single user account. To write a user account, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress**, or **alternativeSecurityId**.
155-
156-
The following technical profile creates new social account:
153+
The **Write** operation creates or updates a single user account. The following technical profile creates new social account:
157154

158155
```XML
159156
<TechnicalProfile Id="AAD-UserWriteUsingAlternativeSecurityId">
@@ -193,9 +190,7 @@ The following technical profile creates new social account:
193190

194191
### DeleteClaims
195192

196-
The **DeleteClaims** operation clears the information from a provided list of claims. To delete information from claims, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress** or **alternativeSecurityId**.
197-
198-
The following technical profile deletes claims:
193+
The **DeleteClaims** operation clears the information from a provided list of claims. The following technical profile deletes claims:
199194

200195
```XML
201196
<TechnicalProfile Id="AAD-DeleteClaimsUsingObjectId">
@@ -216,9 +211,7 @@ The following technical profile deletes claims:
216211

217212
### DeleteClaimsPrincipal
218213

219-
The **DeleteClaimsPrincipal** operation deletes a single user account from the directory. To delete a user account, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress** or **alternativeSecurityId**.
220-
221-
The following technical profile deletes a user account from the directory using the user principal name:
214+
The **DeleteClaimsPrincipal** operation deletes a single user account from the directory. The following technical profile deletes a user account from the directory using the user principal name:
222215

223216
```XML
224217
<TechnicalProfile Id="AAD-DeleteUserUsingObjectId">
@@ -253,13 +246,27 @@ The following technical profile deletes a social user account using **alternativ
253246
| --------- | -------- | ----------- |
254247
| Operation | Yes | The operation to be performed. Possible values: `Read`, `Write`, `DeleteClaims`, or `DeleteClaimsPrincipal`. |
255248
| RaiseErrorIfClaimsPrincipalDoesNotExist | No | Raise an error if the user object does not exist in the directory. Possible values: `true` or `false`. |
256-
| UserMessageIfClaimsPrincipalDoesNotExist | No | If an error is to be raised (see the RaiseErrorIfClaimsPrincipalDoesNotExist attribute description), specify the message to show to the user if user object does not exist. The value can be [localized](localization.md).|
257249
| RaiseErrorIfClaimsPrincipalAlreadyExists | No | Raise an error if the user object already exists. Possible values: `true` or `false`.|
258-
| UserMessageIfClaimsPrincipalAlreadyExists | No | If an error is to be raised (see RaiseErrorIfClaimsPrincipalAlreadyExists attribute description), specify the message to show to the user if user object already exists. The value can be [localized](localization.md).|
259250
| ApplicationObjectId | No | The application object identifier for extension attributes. Value: ObjectId of an application. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md). |
260251
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md) |
261252
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
262253

254+
## Error messages
255+
256+
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
257+
258+
| Attribute | Required | Description |
259+
| --------- | -------- | ----------- |
260+
| UserMessageIfClaimsPrincipalAlreadyExists | No | If an error is to be raised (see RaiseErrorIfClaimsPrincipalAlreadyExists attribute description), specify the message to show to the user if user object already exists. |
261+
| UserMessageIfClaimsPrincipalDoesNotExist | No | If an error is to be raised (see the RaiseErrorIfClaimsPrincipalDoesNotExist attribute description), specify the message to show to the user if user object does not exist. |
262+
263+
264+
## Next steps
265+
266+
See the following article, for example of using Azure AD technical profile:
267+
268+
- [Add claims and customize user input using custom policies in Azure Active Directory B2C](custom-policy-configure-user-input.md)
269+
263270

264271

265272

articles/active-directory-b2c/add-native-application.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
title: Add a native client application - Azure Active Directory B2C | Microsoft Docs
33
description: Learn how to add a native client application to your Active Directory B2C tenant.
44
services: active-directory-b2c
5-
author: mmacy
5+
author: msmimart
66
manager: celestedg
77

8-
ms.author: marsma
8+
ms.author: mimart
99
ms.date: 02/04/2019
1010
ms.custom: mvc
1111
ms.topic: conceptual

articles/active-directory-b2c/add-web-application.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
title: Add a web API application - Azure Active Directory B2C | Microsoft Docs
33
description: Learn how to add a web API application to your Active Directory B2C tenant.
44
services: active-directory-b2c
5-
author: mmacy
5+
author: msmimart
66
manager: celestedg
77

8-
ms.author: marsma
8+
ms.author: mimart
99
ms.date: 04/16/2019
1010
ms.custom: mvc
1111
ms.topic: conceptual

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: Track user behavior with Application Insights
33
titleSuffix: Azure AD B2C
44
description: Learn how to enable event logs in Application Insights from Azure AD B2C user journeys by using custom policies.
55
services: active-directory-b2c
6-
author: mmacy
6+
author: msmimart
77
manager: celestedg
88

99
ms.service: active-directory
1010
ms.topic: conceptual
1111
ms.workload: identity
1212
ms.date: 02/11/2020
13-
ms.author: marsma
13+
ms.author: mimart
1414
ms.subservice: B2C
1515

1616
---

articles/active-directory-b2c/application-types.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: Application types supported by Azure AD B2C
33
titleSuffix: Azure AD B2C
44
description: Learn about the types of applications you can use with Azure Active Directory B2C.
55
services: active-directory-b2c
6-
author: mmacy
6+
author: msmimart
77
manager: celestedg
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
1212
ms.date: 07/24/2019
13-
ms.author: marsma
13+
ms.author: mimart
1414
ms.subservice: B2C
1515

1616
---

0 commit comments

Comments
 (0)