Skip to content

Commit efabeb2

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-startvm-character
2 parents 44b0466 + b05c3e4 commit efabeb2

File tree

1,172 files changed

+15570
-6423
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,172 files changed

+15570
-6423
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10941,6 +10941,11 @@
1094110941
"redirect_url": "/azure/active-directory-b2c/tenant-management-add-administrator",
1094210942
"redirect_document_id": false
1094310943
},
10944+
{
10945+
"source_path_from_root": "/articles/active-directory-b2c/support-options.md",
10946+
"redirect_url": "/azure/active-directory-b2c/find-help-open-support-ticket",
10947+
"redirect_document_id": false
10948+
},
1094410949
{
1094510950
"source_path": "articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-arm.md",
1094610951
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-arm",

.openpublishing.redirection.azure-monitor.json

Lines changed: 27 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3863,12 +3863,12 @@
38633863
"redirect_document_id": false
38643864
},
38653865
{
3866-
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema-definitions.md",
3866+
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema.md",
38673867
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
38683868
"redirect_document_id": false
38693869
},
38703870
{
3871-
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema.md",
3871+
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema-definitions.md",
38723872
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
38733873
"redirect_document_id": false
38743874
},
@@ -3877,6 +3877,11 @@
38773877
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
38783878
"redirect_document_id": false
38793879
},
3880+
{
3881+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-common-schema-test-action-definitions.md",
3882+
"redirect_url": "/azure/azure-monitor/alerts/alerts-payload-samples",
3883+
"redirect_document_id": false
3884+
},
38803885
{
38813886
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema-integrations.md",
38823887
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema-integrations",
@@ -6000,6 +6005,26 @@
60006005
"source_path_from_root": "/articles/azure-monitor/app/availability-multistep.md",
60016006
"redirect_url": "/previous-versions/azure/azure-monitor/app/availability-multistep",
60026007
"redirect_document_id": false
6008+
},
6009+
{
6010+
"source_path_from_root": "/articles/azure-monitor/app/status-monitor-v2-overview.md",
6011+
"redirect_url": "/azure/azure-monitor/app/application-insights-asp-net-agent",
6012+
"redirect_document_id": false
6013+
},
6014+
{
6015+
"source_path_from_root": "/articles/azure-monitor/app/status-monitor-v2-get-started.md",
6016+
"redirect_url": "/azure/azure-monitor/app/application-insights-asp-net-agent",
6017+
"redirect_document_id": false
6018+
},
6019+
{
6020+
"source_path_from_root": "/articles/azure-monitor/app/status-monitor-v2-detailed-instructions.md",
6021+
"redirect_url": "/azure/azure-monitor/app/application-insights-asp-net-agent",
6022+
"redirect_document_id": false
6023+
},
6024+
{
6025+
"source_path_from_root": "/articles/azure-monitor/app/status-monitor-v2-api-reference.md",
6026+
"redirect_url": "/azure/azure-monitor/app/application-insights-asp-net-agent",
6027+
"redirect_document_id": false
60036028
}
60046029
]
60056030
}

.openpublishing.redirection.azure-productivity.json

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,61 @@
8989
"source_path": "articles/lab-services/troubleshoot.md",
9090
"redirect_url": "/azure/lab-services/troubleshoot-lab-creation",
9191
"redirect_document_id": true
92+
},
93+
{
94+
"source_path": "articles/lab-services/quick-create-lab-portal.md",
95+
"redirect_url": "/azure/lab-services/quick-create-connect-lab",
96+
"redirect_document_id": true
97+
},
98+
{
99+
"source_path": "articles/lab-services/tutorial-setup-lab-plan.md",
100+
"redirect_url": "/azure/lab-services/quick-create-resources",
101+
"redirect_document_id": true
102+
},
103+
{
104+
"source_path": "articles/lab-services/quick-create-lab-plan-portal.md",
105+
"redirect_url": "/azure/lab-services/quick-create-resources",
106+
"redirect_document_id": false
107+
},
108+
{
109+
"source_path": "articles/lab-services/quick-create-lab-bicep.md",
110+
"redirect_url": "/azure/lab-services/how-to-create-lab-bicep",
111+
"redirect_document_id": true
112+
},
113+
{
114+
"source_path": "articles/lab-services/quick-create-lab-plan-bicep.md",
115+
"redirect_url": "/azure/lab-services/how-to-create-lab-plan-bicep",
116+
"redirect_document_id": true
117+
},
118+
{
119+
"source_path": "articles/lab-services/quick-create-lab-plan-powershell.md",
120+
"redirect_url": "/azure/lab-services/how-to-create-lab-plan-powershell",
121+
"redirect_document_id": true
122+
},
123+
{
124+
"source_path": "articles/lab-services/quick-create-lab-plan-python.md",
125+
"redirect_url": "/azure/lab-services/how-to-create-lab-plan-python",
126+
"redirect_document_id": true
127+
},
128+
{
129+
"source_path": "articles/lab-services/quick-create-lab-plan-template.md",
130+
"redirect_url": "/azure/lab-services/how-to-create-lab-plan-template",
131+
"redirect_document_id": true
132+
},
133+
{
134+
"source_path": "articles/lab-services/quick-create-lab-powershell.md",
135+
"redirect_url": "/azure/lab-services/how-to-create-lab-powershell",
136+
"redirect_document_id": true
137+
},
138+
{
139+
"source_path": "articles/lab-services/quick-create-lab-python.md",
140+
"redirect_url": "/azure/lab-services/how-to-create-lab-python",
141+
"redirect_document_id": true
142+
},
143+
{
144+
"source_path": "articles/lab-services/quick-create-lab-template.md",
145+
"redirect_url": "/azure/lab-services/how-to-create-lab-template",
146+
"redirect_document_id": true
92147
}
93148
]
94149
}

articles/active-directory-b2c/faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,4 +259,4 @@ sections:
259259
- question: |
260260
How do I report issues with Azure AD B2C?
261261
answer: |
262-
See [File support requests for Azure Active Directory B2C](support-options.md).
262+
See [File support requests for Azure Active Directory B2C](find-help-open-support-ticket.md).

articles/active-directory-b2c/find-help-open-support-ticket.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: troubleshooting
12-
ms.date: 03/30/2022
12+
ms.date: 03/13/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---

articles/active-directory-b2c/idp-pass-through-user-flow.md

Lines changed: 72 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/10/2022
12+
ms.date: 03/16/2023
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -150,6 +150,77 @@ When testing your applications in Azure AD B2C, it can be useful to have the Azu
150150

151151
![Decoded token in jwt.ms with idp_access_token block highlighted](./media/idp-pass-through-user-flow/identity-provider-pass-through-token-custom.png)
152152

153+
## Pass the IDP refresh token (optional)
154+
155+
The access token the identity provider returns is valid for a short period of time. Some identity providers also issue a refresh token along with the access token. Your client application can then exchange the identity provider's refresh token for a new access token when needed.
156+
157+
Azure AD B2C custom policy supports passing the refresh token of OAuth 2.0 identity providers, which includes [Facebook](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token), [Google](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token) and [GitHub](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#github-with-access-token).
158+
159+
To pass the identity provider's refresh token, follow these steps:
160+
161+
1. Open your *TrustframeworkExtensions.xml* file and add the following **ClaimType** element with an identifier of `identityProviderRefreshToken` to the **ClaimsSchema** element.
162+
163+
```xml
164+
<ClaimType Id="identityProviderRefreshToken">
165+
<DisplayName>Identity provider refresh token</DisplayName>
166+
<DataType>string</DataType>
167+
</ClaimType>
168+
```
169+
170+
1. Add the **OutputClaim** element to the **TechnicalProfile** element for each OAuth 2.0 identity provider that you would like the refresh token for. The following example shows the element added to the Facebook technical profile:
171+
172+
```xml
173+
<ClaimsProvider>
174+
<DisplayName>Facebook</DisplayName>
175+
<TechnicalProfiles>
176+
<TechnicalProfile Id="Facebook-OAUTH">
177+
<OutputClaims>
178+
<OutputClaim ClaimTypeReferenceId="identityProviderRefreshToken" PartnerClaimType="{oauth2:refresh_token}" />
179+
</OutputClaims>
180+
...
181+
</TechnicalProfile>
182+
</TechnicalProfiles>
183+
</ClaimsProvider>
184+
```
185+
186+
1. Some identity providers require you to include metadata or scopes to the identity provider's technical profile.
187+
188+
- For Google identity provider, add two claim types `access_type` and `prompt`. Then add the following input claims to the identity provider's technical profile:
189+
190+
```xml
191+
<InputClaims>
192+
<InputClaim ClaimTypeReferenceId="access_type" PartnerClaimType="access_type" DefaultValue="offline" AlwaysUseDefaultValue="true" />
193+
194+
<!-- The refresh_token is return only on the first authorization for a given user. Subsequent authorization request doesn't return the refresh_token.
195+
To fix this issue we add the prompt=consent query string parameter to the authorization request-->
196+
<InputClaim ClaimTypeReferenceId="prompt" PartnerClaimType="prompt" DefaultValue="consent" AlwaysUseDefaultValue="true" />
197+
</InputClaims>
198+
```
199+
200+
- Other identity providers may have different methods to issue a refresh token. Follow the identity provider's audience and add the necessary elements to your identity provider's technical profile.
201+
202+
1. Save the changes you made in your *TrustframeworkExtensions.xml* file.
203+
1. Open your relying party policy file, such as *SignUpOrSignIn.xml*, and add the **OutputClaim** element to the **TechnicalProfile**:
204+
205+
```xml
206+
<RelyingParty>
207+
<DefaultUserJourney ReferenceId="SignUpOrSignIn" />
208+
<TechnicalProfile Id="PolicyProfile">
209+
<OutputClaims>
210+
<OutputClaim ClaimTypeReferenceId="identityProviderRefreshToken" PartnerClaimType="idp_refresh_token"/>
211+
</OutputClaims>
212+
...
213+
</TechnicalProfile>
214+
</RelyingParty>
215+
```
216+
217+
1. Save the changes you made in your policy's relying party policy file.
218+
1. Upload the *TrustframeworkExtensions.xml* file, and then the relying party policy file.
219+
1. [Test your policy](#test-your-policy)
220+
221+
222+
223+
153224
::: zone-end
154225

155226
## Next steps
112 KB
Loading
196 KB
Loading

0 commit comments

Comments
 (0)