Skip to content

Commit f0b4be3

Browse files
committed
fixing merge conflict
2 parents a3e4c6e + f8930b5 commit f0b4be3

File tree

1,032 files changed

+15304
-5411
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,032 files changed

+15304
-5411
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/manage-apps/my-apps-deployment-plan.md",
5+
"redirect_url": "/azure/active-directory/manage-apps/myapps-overview",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/active-directory/authentication/cloud-native-certificate-based-authentication-faq.yml",
510
"redirect_url": "/azure/active-directory/authentication/certificate-based-authentication-faq",

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -684,6 +684,16 @@
684684
"source_path_from_root": "/articles/defender-for-cloud/defender-for-kubernetes-azure-arc.md",
685685
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc#protect-arc-enabled-kubernetes-clusters",
686686
"redirect_document_id": true
687+
},
688+
{
689+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-container-registries-cicd.md",
690+
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-cicd",
691+
"redirect_document_id": true
692+
},
693+
{
694+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-container-registries-usage.md",
695+
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-usage",
696+
"redirect_document_id": true
687697
}
688698
]
689699
}

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -943,6 +943,11 @@
943943
"redirect_url": "/azure/frontdoor/front-door-overview",
944944
"redirect_document_id": false
945945
},
946+
{
947+
"source_path_from_root": "/articles/frontdoor/standard-premium/how-to-configure-endpoint-manager.md",
948+
"redirect_url": "/azure/frontdoor/how-to-configure-endpoints",
949+
"redirect_document_id": false
950+
},
946951
{
947952
"source_path_from_root": "/articles/app-service-web/web-sites-dotnet-deploy-aspnet-mvc-app-membership-oauth-sql-database.md",
948953
"redirect_url": "/aspnet/core/security/authorization/secure-data",
@@ -6313,6 +6318,11 @@
63136318
"redirect_url": "/azure/azure-app-configuration/quickstart-azure-functions-csharp",
63146319
"redirect_document_id": false
63156320
},
6321+
{
6322+
"source_path_from_root": "/articles/azure-arc/data/deploy-byok-active-directory-connector.md",
6323+
"redirect_url": "/azure/azure-arc/data/deploy-customer-managed-keytab-active-directory-connector",
6324+
"redirect_document_id": false
6325+
},
63166326
{
63176327
"source_path_from_root": "/articles/azure-arc/data/reference/reference-az-sql-mi-arc-dag.md",
63186328
"redirect_url": "/azure/azure-arc/data/reference/reference-az-sql-instance-failover-group-arc",

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/30/2022
12+
ms.date: 12/09/2021
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -156,7 +156,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
156156
| ------- | :--: | ----- |
157157
| [MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods) | Preview | Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
158158
| [Phone factor authentication](phone-factor-technical-profile.md) | GA | |
159-
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | GA | |
159+
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | Preview | |
160160
| [One-time password](one-time-password-technical-profile.md) | GA | |
161161
| [Azure Active Directory](active-directory-technical-profile.md) as local directory | GA | |
162162
| [Predicate validations](predicates.md) | GA | For example, password complexity. |
@@ -168,8 +168,8 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
168168
| Feature | Custom policy | Notes |
169169
| ------- | :--: | ----- |
170170
| Azure portal | GA | |
171-
| [Application Insights user journey logs](troubleshoot-with-application-insights.md) | GA | Used for troubleshooting during development. |
172-
| [Application Insights event logs](analytics-with-application-insights.md) | GA | Used to monitor user flows in production. |
171+
| [Application Insights user journey logs](troubleshoot-with-application-insights.md) | Preview | Used for troubleshooting during development. |
172+
| [Application Insights event logs](analytics-with-application-insights.md) | Preview | Used to monitor user flows in production. |
173173

174174
## Responsibilities of custom policy feature-set developers
175175

articles/active-directory-b2c/deploy-custom-policies-devops.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/30/2022
12+
ms.date: 03/25/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---

articles/active-directory-b2c/multi-factor-auth-technical-profile.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/30/2022
12+
ms.date: 12/09/2021
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -18,6 +18,8 @@ ms.subservice: B2C
1818

1919
Azure Active Directory B2C (Azure AD B2C) provides support for verifying a phone number by using a verification code, or verifying a Time-based One-time Password (TOTP) code.
2020

21+
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
22+
2123
## Protocol
2224

2325
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C:
@@ -166,9 +168,9 @@ The following example shows an Azure AD MFA technical profile used to verify the
166168

167169
In this mode, the user is required to install any authenticator app that supports time-based one-time password (TOTP) verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app), on a device that they own.
168170

169-
During the first sign up or sign in, the user scans a QR code, opens a deep link, or enters the code manually using the authenticator app. To verify the TOTP code, use the [Begin verify OTP](#begin-verify-totp) followed by [Verify TOTP](#verify-totp) validation technical profiles.
171+
During the first sign-up or sign-in, the user scans a QR code, opens a deep link, or enters the code manually using the authenticator app. To verify the TOTP code, use the [Begin verify OTP](#begin-verify-totp) followed by [Verify TOTP](#verify-totp) validation technical profiles.
170172

171-
For subsequent sign ins, use the [Get available devices](#get-available-devices) method to check if the user has already enrolled their device. If the number of available devices is greater than zero, this indicates the user has enrolled before. In this case, the user needs to type the TOTP code that appears in the authenticator app.
173+
For subsequent sign-ins, use the [Get available devices](#get-available-devices) method to check if the user has already enrolled their device. If the number of available devices is greater than zero, this indicates the user has enrolled before. In this case, the user needs to type the TOTP code that appears in the authenticator app.
172174

173175
The technical profile:
174176

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,7 @@ Your REST API may need to return an error message, such as 'The user was not fou
259259
| Attribute | Required | Description |
260260
| --------- | -------- | ----------- |
261261
| version | Yes | Your REST API version. For example: 1.0.1 |
262-
| status | Yes | Must be 409 |
262+
| status | Yes | An HTTP response status codes-like number, and must be 409 |
263263
| code | No | An error code from the RESTful endpoint provider, which is displayed when `DebugMode` is enabled. |
264264
| requestId | No | A request identifier from the RESTful endpoint provider, which is displayed when `DebugMode` is enabled. |
265265
| userMessage | Yes | An error message that is shown to the user. |

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/30/2022
12+
ms.date: 02/17/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -50,6 +50,8 @@ In a self-asserted technical profile, you can use the **InputClaims** and **Inpu
5050

5151
## Display claims
5252

53+
The display claims feature is currently in **preview**.
54+
5355
The **DisplayClaims** element contains a list of claims to be presented on the screen for collecting data from the user. To prepopulate the values of display claims, use the input claims that were previously described. The element may also contain a default value.
5456

5557
The order of the claims in **DisplayClaims** specifies the order in which Azure AD B2C renders the claims on the screen. To force the user to provide a value for a specific claim, set the **Required** attribute of the **DisplayClaim** element to `true`.
@@ -131,7 +133,7 @@ Use output claims when:
131133
- **Claims are output by output claims transformation**.
132134
- **Setting a default value in an output claim** without collecting data from the user or returning the data from the validation technical profile. The `LocalAccountSignUpWithLogonEmail` self-asserted technical profile sets the **executed-SelfAsserted-Input** claim to `true`.
133135
- **A validation technical profile returns the output claims** - Your technical profile may call a validation technical profile that returns some claims. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. For example, when signing in with a local account, the self-asserted technical profile named `SelfAsserted-LocalAccountSignin-Email` calls the validation technical profile named `login-NonInteractive`. This technical profile validates the user credentials and also returns the user profile. Such as 'userPrincipalName', 'displayName', 'givenName' and 'surName'.
134-
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey.
136+
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. The display control feature is currently in **preview**.
135137

136138
The following example demonstrates the use of a self-asserted technical profile that uses both display claims and output claims.
137139

articles/active-directory-b2c/technical-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Read the [User flows and custom policies overview](user-flow-overview.md) articl
118118

119119
## User interface
120120

121-
In Azure AD B2C, you can craft your users' identity experiences so that the pages that are shown blend seamlessly with the look and feel of your brand. You get nearly full control of the HTML and CSS content presented to your users when they proceed through your application's identity journeys. With this flexibility, you can maintain brand and visual consistency between your application and Azure AD B2C.
121+
In Azure AD B2C, you can craft your users' identity experiences so that the pages that are shown blend seamlessly with the look and feel of your brand. You get nearly full control of the HTML and CSS content presented to your users when they proceed through your application's identity journeys. (Customizing the pages rendered by third parties when using social accounts is limited to the options provided by the identity provider, and these are outside the control of Azure AD B2C.) With this flexibility, you can maintain brand and visual consistency between your application and Azure AD B2C.
122122

123123

124124

@@ -200,7 +200,7 @@ The following diagram shows how Azure AD B2C can communicate using various proto
200200

201201
## Application integration
202202

203-
When a user wants to sign in to your application, the application initiates an authorization request to a user flow- or custom policy-provided endpoint. The user flow or custom policy defines and controls the user's experience. When they complete a user flow, for example the *sign-up or sign-in* flow, Azure AD B2C generates a token, then redirects the user back to your application.
203+
When a user wants to sign in to your application, the application initiates an authorization request to a user-flow or custom policy-provided endpoint. The user flow or custom policy defines and controls the user's experience. When they complete a user flow, for example the *sign up or sign in* flow, Azure AD B2C generates a token, then redirects the user back to your application. This token is specific to Azure AD B2C and is not to be confused with the token issued by third-party identity providers when using social accounts. For information about how to use third-party tokens, see [Pass an identity provider access token to your application in Azure Active Directory B2C](idp-pass-through-user-flow.md).
204204

205205
:::image type="content" source="media/technical-overview/app-integration.png" alt-text="Mobile app with arrows showing flow between Azure AD B2C sign-in page.":::
206206

@@ -226,7 +226,7 @@ Azure AD B2C evaluates each sign-in event and ensures that all policy requiremen
226226

227227
## Password complexity
228228

229-
During sign up or password reset, your users must supply a password that meets complexity rules. By default, Azure AD B2C enforces a strong password policy. Azure AD B2C also provides configuration options for specifying the complexity requirements of the passwords your customers use.
229+
During sign up or password reset, your users must supply a password that meets complexity rules. By default, Azure AD B2C enforces a strong password policy. Azure AD B2C also provides configuration options for specifying the complexity requirements of the passwords your customers use when they use local accounts.
230230

231231
![Screenshot of password complexity user experience](media/technical-overview/password-complexity.png)
232232

@@ -259,7 +259,7 @@ Sessions are modeled as encrypted data, with the decryption key known only to th
259259

260260
### Access to user data
261261

262-
Azure AD B2C tenants share many characteristics with enterprise Azure Active Directory tenants used for employees and partners. Shared aspects include mechanisms for viewing administrative roles, assigning roles, and auditing activities.
262+
Azure AD B2C tenants share many characteristics with enterprise Azure Active Directory tenants used for employees and partners. Shared aspects include mechanisms for viewing administrative roles, assigning roles, and auditing activities.
263263

264264
You can assign roles to control who can perform certain administrative actions in Azure AD B2C, including:
265265

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/30/2022
12+
ms.date: 11/30/2021
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -99,7 +99,7 @@ The **TechnicalProfile** element contains the following elements:
9999
| InputClaimsTransformations | 0:1 | A list of previously defined references to claims transformations that should be executed before any claims are sent to the claims provider or the relying party. |
100100
| InputClaims | 0:1 | A list of previously defined references to claim types that are taken as input in the technical profile. |
101101
| PersistedClaims | 0:1 | A list of previously defined references to claim types that will be persisted by the technical profile. |
102-
| DisplayClaims | 0:1 | A list of previously defined references to claim types that are presented by the [self-asserted technical profile](self-asserted-technical-profile.md). |
102+
| DisplayClaims | 0:1 | A list of previously defined references to claim types that are presented by the [self-asserted technical profile](self-asserted-technical-profile.md). The DisplayClaims feature is currently in preview. |
103103
| OutputClaims | 0:1 | A list of previously defined references to claim types that are taken as output in the technical profile. |
104104
| OutputClaimsTransformations | 0:1 | A list of previously defined references to claims transformations that should be executed after the claims are received from the claims provider. |
105105
| ValidationTechnicalProfiles | 0:n | A list of references to other technical profiles that the technical profile uses for validation purposes. For more information, see [Validation technical profile](validation-technical-profile.md).|

0 commit comments

Comments
 (0)