Skip to content

Commit efc2163

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nat-avail-diagrams
2 parents 08dba1c + 6c2f44a commit efc2163

File tree

194 files changed

+2114
-561
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

194 files changed

+2114
-561
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5943,11 +5943,6 @@
59435943
"redirect_url": "/azure/availability-zones/az-overview",
59445944
"redirect_document_id": false
59455945
},
5946-
{
5947-
"source_path_from_root": "/articles/partner-solutions/index.md",
5948-
"redirect_url": "/azure/partner-solutions/overview",
5949-
"redirect_document_id": false
5950-
},
59515946
{
59525947
"source_path_from_root": "/articles/fxt-edge-filer/fxt-add-nodes.md",
59535948
"redirect_url": "/azure/fxt-edge-filer/add-nodes",

articles/active-directory-b2c/error-codes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 07/18/2022
12+
ms.date: 10/28/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -33,7 +33,7 @@ The following errors can be returned by the Azure Active Directory B2C service.
3333
| `AADB2C90016` | The requested client assertion type '{0}' does not match the expected type '{1}'. | deprecated |
3434
| `AADB2C90017` | The client assertion provided in the request is invalid: {0} | deprecated |
3535
| `AADB2C90018` | The client ID '{0}' specified in the request is not registered in tenant '{1}'. | [Register a web application](tutorial-register-applications.md), [Sending authentication requests](openid-connect.md#send-authentication-requests) |
36-
| `AADB2C90019` | The key container with ID '{0}' in tenant '{1}' does not has a valid key. Reason: {2}. | |
36+
| `AADB2C90019` | The key container with ID '{0}' in tenant '{1}' does not have a valid key. Reason: {2}. | |
3737
| `AADB2C90021` | The technical profile '{0}' does not exist in the policy '{1}' of tenant '{2}'. | |
3838
| `AADB2C90022` | Unable to return metadata for the policy '{0}' in tenant '{1}'. | [Share the application's metadata publicly](saml-service-provider.md) |
3939
| `AADB2C90023` | Profile '{0}' does not contain the required metadata key '{1}'. | |
@@ -43,7 +43,7 @@ The following errors can be returned by the Azure Active Directory B2C service.
4343
| `AADB2C90031` | Policy '{0}' does not specify a default user journey. Ensure that the policy or it's parents specify a default user journey as part of a relying party section. | [Default user journey](relyingparty.md#defaultuserjourney) |
4444
| `AADB2C90035` | The service is temporarily unavailable. Please retry after a few minutes. | |
4545
| `AADB2C90036` | The request does not contain a URI to redirect the user to post logout. Specify a URI in the post_logout_redirect_uri parameter field. | [Send a sign-out request](openid-connect.md#send-a-sign-out-request) |
46-
| `AADB2C90037` | An error occurred while processing the request. Please contact administrator of the site you are trying to access. | |
46+
| `AADB2C90037` | An error occurred while processing the request. Please locate the `CorellationId` from the response. | [Submit a new support request](find-help-open-support-ticket.md), and include the `CorrelationId`. |
4747
| `AADB2C90039` | The request contains a client assertion, but the provided policy '{0}' in tenant '{1}' is missing a client_secret in RelyingPartyPolicy. | deprecated |
4848
| `AADB2C90040` | User journey '{0}' does not contain a send claims step. | [User journey orchestration steps](userjourneys.md#orchestrationsteps) |
4949
| `AADB2C90043` | The prompt included in the request contains invalid values. Expected 'none', 'login', 'consent' or 'select_account'. | |

articles/active-directory-b2c/service-limits.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
1111
ms.author: kengaderdus
12-
ms.date: 04/15/2022
12+
ms.date: 10/27/2022
1313
ms.subservice: B2C
1414
zone_pivot_groups: b2c-policy-type
1515
---
@@ -168,6 +168,7 @@ The following table lists the administrative configuration limits in the Azure A
168168
|Levels of [inheritance](custom-policy-overview.md#inheritance-model) in custom policies |10 |
169169
|Number of policies per Azure AD B2C tenant (user flows + custom policies) |200 |
170170
|Maximum policy file size |1024 KB |
171+
|Number of API connectors per tenant |19 |
171172

172173
<sup>1</sup> See also [Azure AD service limits and restrictions](../active-directory/enterprise-users/directory-service-limits-restrictions.md).
173174

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection: M365-identity-device-management
1616
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
1717

1818
>[!NOTE]
19-
>Number matching is a key security upgrade to traditional second factor notifications in Microsoft Authenticator that will begin to be enabled by default for all users starting February 27, 2023.<br>
19+
>Number matching is a key security upgrade to traditional second factor notifications in Microsoft Authenticator that will begin to be enabled by default for all users starting February 28, 2023.<br>
2020
>We highly recommend enabling number matching in the near-term for improved sign-in security.
2121
2222
## Prerequisites
@@ -358,7 +358,7 @@ To enable number matching in the Azure AD portal, complete the following steps:
358358

359359
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?
360360

361-
Number match will be enabled for all users of Microsoft Authenticator app after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
361+
Number match will be enabled for all users of Microsoft Authenticator app after February 28, 2023. Relevant services will begin deploying these changes after February 28, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
362362

363363
### Can I opt out of number matching?
364364

articles/active-directory/develop/msal-net-xamarin-android-considerations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ protected override void OnActivityResult(int requestCode,
7575
To support System WebView, the *AndroidManifest.xml* file should contain the following values:
7676

7777
```xml
78-
<activity android:name="microsoft.identity.client.BrowserTabActivity" android:configChanges="orientation|screenSize">
78+
<activity android:name="microsoft.identity.client.BrowserTabActivity" android:configChanges="orientation|screenSize" android:exported="true">
7979
<intent-filter>
8080
<action android:name="android.intent.action.VIEW" />
8181
<category android:name="android.intent.category.DEFAULT" />
@@ -96,7 +96,7 @@ Alternatively, [create the activity in code](/xamarin/android/platform/android-m
9696
Here's an example of a class that represents the values of the XML file:
9797

9898
```csharp
99-
[Activity]
99+
[Activity(Exported = true)]
100100
[IntentFilter(new[] { Intent.ActionView },
101101
Categories = new[] { Intent.CategoryBrowsable, Intent.CategoryDefault },
102102
DataHost = "auth",

articles/active-directory/verifiable-credentials/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,8 @@
6666
href: howto-verifiable-credentials-partner-au10tix.md
6767
- name: LexisNexis
6868
href: howto-verifiable-credentials-partner-lexisnexis.md
69+
- name: Vu
70+
href: partner-vu.md
6971
- name: Samples
7072
expanded: true
7173
items:
@@ -108,4 +110,4 @@
108110
- name: Video overview of decentralized identities
109111
href: https://www.youtube.com/watch?v=Whc9Im-U0Wg
110112

111-
113+

articles/active-directory/verifiable-credentials/howto-verifiable-credentials-partner-au10tix.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,9 @@ As a developer you can share these steps with your tenant administrator to obtai
6666

6767
As a developer you now have the request URL and body from your tenant admin, follow these steps to update your application or website:
6868

69-
1. Add the request URL and body to your application or website to request Verified IDs from your users. Note: If you are using [one of the sample apps](https://aka.ms/vcsample), you'll need to replace the contents of the presentation_request_config.json with the request body obtained.
69+
1. Add the request URL and body to your application or website to request Verified IDs from your users.
70+
>[!Note]
71+
>If you are using [one of the sample apps](https://aka.ms/vcsample), you'll need to replace the contents of the `presentation_request_config.json` with the request body obtained in [Part 1](#part-1). The sample code overwrites the `trustedIssuers` values with `IssuerAuthority` value from `appsettings.json`. Copy the `trustedIssuers` value from the payload to `IssuerAuthority` in `appsettings.json` file.
7072
1. Be sure to replace the values for the "url", "state", and "api-key" with your respective values.
7173
1. [Grant permissions](verifiable-credentials-configure-tenant.md#grant-permissions-to-get-access-tokens) to your app to obtain access token for the Verified ID service request service principal.
7274

articles/active-directory/verifiable-credentials/howto-verifiable-credentials-partner-lexisnexis.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,8 @@ As a developer you'll provide the steps below to your tenant administrator. The
5959
As a developer you now have the request URL and body from your tenant admin, follow these steps to update your application or website:
6060

6161
1. Add the request URL and body to your application or website to request Verified IDs from your users.
62-
>[!NOTE]
63-
> If you are using [one of the sample apps](https://aka.ms/vcsample) you need to replace the contents of the presentation_request_config.json with the request body obtained.
62+
>[!Note]
63+
>If you are using [one of the sample apps](https://aka.ms/vcsample), you'll need to replace the contents of the `presentation_request_config.json` with the request body obtained in [Part 1](#part-1). The sample code overwrites the `trustedIssuers` values with `IssuerAuthority` value from `appsettings.json`. Copy the `trustedIssuers` value from the payload to `IssuerAuthority` in `appsettings.json` file.
6464
1. Replace the values for the "url", "state", and "api-key" with your respective values.
6565
1. Grant your app [permissions](verifiable-credentials-configure-tenant.md#grant-permissions-to-get-access-tokens) to obtain an access token for the Verified ID service request service principal.
6666

2.78 KB
Loading
Binary file not shown.

0 commit comments

Comments
 (0)