Skip to content

Commit f316c75

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into Includes
2 parents 07a0a97 + cc8844e commit f316c75

File tree

647 files changed

+9399
-8577
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

647 files changed

+9399
-8577
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -306,6 +306,12 @@
306306
"branch": "master",
307307
"branch_mapping": {}
308308
},
309+
{
310+
"path_to_root": "cosmosdb-nodejs-get-started",
311+
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-api-nodejs-getting-started",
312+
"branch": "master",
313+
"branch_mapping": {}
314+
},
309315
{
310316
"path_to_root": "cognitive-services-content-moderator-samples",
311317
"url": "https://github.com/Azure-Samples/cognitive-services-content-moderator-samples",

.openpublishing.redirection.json

Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,11 @@
140140
"redirect_url": "https://docs.microsoft.com/azure/architecture/topics/high-performance-computing/",
141141
"redirect_document_id": false
142142
},
143+
{
144+
"source_path": "articles/virtual-machines/workloads/oracle/oracle-considerations.md",
145+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview/",
146+
"redirect_document_id": false
147+
},
143148
{
144149
"source_path": "articles/machine-learning/studio/consume-web-service-with-web-app-template.md",
145150
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
@@ -19299,6 +19304,11 @@
1929919304
"redirect_url": "/azure/active-directory/develop/quickstart-v2-register-an-app",
1930019305
"redirect_document_id": true
1930119306
},
19307+
{
19308+
"source_path": "articles/active-directory/authentication/howto-mfa-sdk.md",
19309+
"redirect_url": "/azure/active-directory/develop/",
19310+
"redirect_document_id": true
19311+
},
1930219312
{
1930319313
"source_path": "articles/active-directory/active-directory-claims-mapping.md",
1930419314
"redirect_url": "/azure/active-directory/develop/active-directory-claims-mapping",
@@ -26804,6 +26814,86 @@
2680426814
"redirect_url": "/azure/marketplace/cloud-partner-portal/test-drive/what-is-test-drive",
2680526815
"redirect_document_id": false
2680626816
},
26817+
{
26818+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-channel-info-tab.md",
26819+
"redirect_url": "/azure/marketplace/partner-center-portal/create-new-saas-offer",
26820+
"redirect_document_id": false
26821+
},
26822+
{
26823+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-contacts-tab.md",
26824+
"redirect_url": "/azure/marketplace/partner-center-portal/create-new-saas-offer",
26825+
"redirect_document_id": false
26826+
},
26827+
{
26828+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-create-offer.md",
26829+
"redirect_url": "/azure/marketplace/partner-center-portal/create-new-saas-offer",
26830+
"redirect_document_id": false
26831+
},
26832+
{
26833+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-offer-settings-tab.md",
26834+
"redirect_url": "/azure/marketplace/partner-center-portal/create-new-saas-offer",
26835+
"redirect_document_id": false
26836+
},
26837+
{
26838+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-plans-tab.md",
26839+
"redirect_url": "/azure/marketplace/partner-center-portal/create-new-saas-offer",
26840+
"redirect_document_id": false
26841+
},
26842+
{
26843+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-prerequisites.md",
26844+
"redirect_url": "/azure/marketplace/partner-center-portal/offer-creation-checklist",
26845+
"redirect_document_id": false
26846+
},
26847+
{
26848+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-publish-offer.md",
26849+
"redirect_url": "/azure/marketplace/partner-center-portal/create-new-saas-offer",
26850+
"redirect_document_id": false
26851+
},
26852+
{
26853+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-saas-subscription-apis.md",
26854+
"redirect_url": "/azure/marketplace/partner-center-portal/create-new-saas-offer",
26855+
"redirect_document_id": false
26856+
},
26857+
{
26858+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-storefront-tab.md",
26859+
"redirect_url": "/azure/marketplace/partner-center-portal/create-new-saas-offer",
26860+
"redirect_document_id": false
26861+
},
26862+
{
26863+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-technical-info-tab.md",
26864+
"redirect_url": "/azure/marketplace/partner-center-portal/create-new-saas-offer",
26865+
"redirect_document_id": false
26866+
},
26867+
{
26868+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-testdrive-tab.md",
26869+
"redirect_url": "/azure/marketplace/partner-center-portal/create-new-saas-offer",
26870+
"redirect_document_id": false
26871+
},
26872+
{
26873+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-update-existing-offer.md",
26874+
"redirect_url": "/azure/marketplace/partner-center-portal/create-new-saas-offer",
26875+
"redirect_document_id": false
26876+
},
26877+
{
26878+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-saas-fulfillment-api-v1.md",
26879+
"redirect_url": "/azure/marketplace/partner-center-portal/pc-saas-fulfillment-api-v1",
26880+
"redirect_document_id": false
26881+
},
26882+
{
26883+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-saas-fulfillment-api-v2.md",
26884+
"redirect_url": "/azure/marketplace/partner-center-portal/pc-saas-fulfillment-api-v2",
26885+
"redirect_document_id": false
26886+
},
26887+
{
26888+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-saas-fulfillment-apis.md",
26889+
"redirect_url": "/azure/marketplace/partner-center-portal/pc-saas-fulfillment-apis",
26890+
"redirect_document_id": false
26891+
},
26892+
{
26893+
"source_path": "articles/marketplace/cloud-partner-portal/saas-app/cpp-saas-registration.md",
26894+
"redirect_url": "/azure/marketplace/partner-center-portal/pc-saas-registration",
26895+
"redirect_document_id": false
26896+
},
2680726897
{
2680826898
"source_path": "articles/marketplace/grow-your-business-azure-marketplace.md",
2680926899
"redirect_url": "/azure/marketplace/grow-your-business-with-azure-marketplace",

articles/active-directory-b2c/active-directory-b2c-setup-fb-app.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 09/11/2018
11+
ms.date: 06/05/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -20,26 +20,26 @@ ms.subservice: B2C
2020
To use a Facebook account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory (Azure AD) B2C, you need to create an application in your tenant that represents it. If you don’t already have a Facebook account, you can get it at [https://www.facebook.com/](https://www.facebook.com/).
2121

2222
1. Sign in to [Facebook for developers](https://developers.facebook.com/) with your Facebook account credentials.
23-
2. If you have not already done so, you need to register as a Facebook developer. To do this, select **Register** on the upper-right corner of the page, accept Facebook's policies, and complete the registration steps.
24-
3. Select **My Apps** and then click **Add a New App**.
23+
2. If you have not already done so, you need to register as a Facebook developer. To do this, select **Get Started** on the upper-right corner of the page, accept Facebook's policies, and complete the registration steps.
24+
3. Select **My Apps** and then **Add New App**.
2525
4. Enter a **Display Name** and a valid **Contact Email**.
2626
5. Click **Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
2727
6. Select **Settings** > **Basic**.
2828
7. Choose a **Category**, for example `Business and Pages`. This value is required by Facebook, but not used for Azure AD B2C.
2929
8. At the bottom of the page, select **Add Platform**, and then select **Website**.
3030
9. In **Site URL**, enter `https://your-tenant-name.b2clogin.com/` replacing `your-tenant-name` with the name of your tenant. Enter a URL for the **Privacy Policy URL**, for example `http://www.contoso.com`. The policy URL is a page you maintain to provide privacy information for your application.
3131
10. Select **Save Changes**.
32-
11. At the top of the page, copy the value of **App ID**.
32+
11. At the top of the page, copy the value of **App ID**.
3333
12. Click **Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
34-
13. Select **Products**, and then select **Set up** under **Facebook Login**.
35-
14. Select **Settings** under **Facebook Login**.
34+
13. Select the plus sign next to **PRODUCTS**, and then select **Set up** under **Facebook Login**.
35+
14. Under **Facebook Login**, select **Settings**.
3636
15. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant. Click **Save Changes** at the bottom of the page.
3737
16. To make your Facebook application available to Azure AD B2C, click the Status selector at the top right of the page and turn it **On** to make the Application public, and then click **Confirm**. At this point the Status should change from **Development** to **Live**.
3838

3939
## Configure a Facebook account as an identity provider
4040

4141
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
42-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
42+
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
4343
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
4444
4. Select **Identity providers**, and then select **Add**.
4545
5. Enter a **Name**. For example, enter *Facebook*.
50.6 KB
Loading
23.8 KB
Loading
15.4 KB
Loading
9.67 KB
Loading

articles/active-directory-b2c/ropc-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ Complete the steps in [Get started with custom policies in Azure Active Director
136136
</TechnicalProfile>
137137
```
138138

139-
Replace the **DefaultValue** of **client_id** and **resource_id** with the Application ID of the ProxyIdentityExperienceFramework application that you created in the prerequisite tutorial.
139+
Replace the **DefaultValue** of **client_id** with the Application ID of the ProxyIdentityExperienceFramework application that you created in the prerequisite tutorial. Then replace **DefaultValue** of **resource_id** with the Application ID of the IdentityExperienceFramework application that you also created in the prerequisite tutorial.
140140

141141
5. Add following **ClaimsProvider** elements with their technical profiles to the **ClaimsProviders** element:
142142

articles/active-directory-b2c/social-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ This article provides examples for using the social account claims transformatio
3434

3535
## CreateAlternativeSecurityId
3636

37-
Creates a JSON representation of the user’s alternativeSecurityId property that can be used in the calls to Azure Active Directory. For more information, see [AlternativeSecurityId's schema](/previous-versions/azure/ad/graph/api/entity-and-complex-type-reference#AlternativeSecurityIdType).
37+
Creates a JSON representation of the user’s alternativeSecurityId property that can be used in the calls to Azure Active Directory. For more information, see [AlternativeSecurityId's schema](/previous-versions/azure/ad/graph/api/entity-and-complex-type-reference#alternativesecurityid-type).
3838

3939
| Item | TransformationClaimType | Data Type | Notes |
4040
| ---- | ----------------------- | --------- | ----- |

articles/active-directory-b2c/tutorial-add-identity-providers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ To enable sign-in for users from Azure AD, you need to register an application w
4242

4343
1. Sign in to the [Azure portal](https://portal.azure.com).
4444
2. Make sure you're using the directory that contains your Azure AD tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your Azure AD tenant.
45-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
45+
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations (Legacy)**.
4646
4. Select **New application registration**.
4747
5. Enter a name for your application. For example, `Azure AD B2C App`.
4848
6. For the **Application type**, select `Web app / API`.
@@ -147,4 +147,4 @@ In this article, you learned how to:
147147
> * Add the identity providers to your user flow
148148
149149
> [!div class="nextstepaction"]
150-
> [Customize the user interface of your applications in Azure Active Directory B2C](tutorial-customize-ui.md)
150+
> [Customize the user interface of your applications in Azure Active Directory B2C](tutorial-customize-ui.md)

0 commit comments

Comments
 (0)