Skip to content

Commit f71b82c

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 3b66add + 29880cf commit f71b82c

File tree

178 files changed

+2710
-11388
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

178 files changed

+2710
-11388
lines changed

.openpublishing.redirection.json

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -755,6 +755,31 @@
755755
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-azure-subscription",
756756
"redirect_document_id": false
757757
},
758+
{
759+
"source_path": "articles/cognitive-services/QnAMaker/quickstarts/csharp.md",
760+
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-publish-kb-csharp-sdk",
761+
"redirect_document_id": false
762+
},
763+
{
764+
"source_path": "articles/cognitive-services/QnAMaker/quickstarts/go.md",
765+
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-new-kb-go",
766+
"redirect_document_id": false
767+
},
768+
{
769+
"source_path": "articles/cognitive-services/QnAMaker/quickstarts/java.md",
770+
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-new-kb-java",
771+
"redirect_document_id": false
772+
},
773+
{
774+
"source_path": "articles/cognitive-services/QnAMaker/quickstarts/nodejs.md",
775+
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-publish-kb-nodejs-sdk",
776+
"redirect_document_id": false
777+
},
778+
{
779+
"source_path": "articles/cognitive-services/QnAMaker/quickstarts/python.md",
780+
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/python-sdk",
781+
"redirect_document_id": false
782+
},
758783
{
759784
"source_path": "articles/cognitive-services/QnAMaker/How-To/key-management.md",
760785
"redirect_url": "/azure/cognitive-services/QnAMaker/How-To/set-up-qnamaker-service-azure#types-of-keys-in-qna-maker",
@@ -15680,6 +15705,11 @@
1568015705
"redirect_url": "/azure/vpn-gateway/vpn-gateway-about-vpngateways",
1568115706
"redirect_document_id": false
1568215707
},
15708+
{
15709+
"source_path": "articles/vpn-gateway/vpn-gateway-point-to-site-gateway-public-ca.md",
15710+
"redirect_url": "/azure/vpn-gateway/point-to-site-about",
15711+
"redirect_document_id": false
15712+
},
1568315713
{
1568415714
"source_path": "articles/virtual-network/virtual-networks-create-nsg-arm-pportal.md",
1568515715
"redirect_url": "/azure/virtual-network/tutorial-filter-network-traffic",
@@ -41766,6 +41796,26 @@
4176641796
"redirect_url": "/azure/azure-monitor/app/java-get-started",
4176741797
"redirect_document_id": false
4176841798
},
41799+
{
41800+
"source_path": "articles/azure-monitor/app/java-get-started-25-beta.md",
41801+
"redirect_url": "/azure/azure-monitor/app/java-get-started",
41802+
"redirect_document_id": false
41803+
},
41804+
{
41805+
"source_path": "articles/azure-monitor/app/java-trace-logs-25-beta.md",
41806+
"redirect_url": "/azure/azure-monitor/app/java-trace-logs",
41807+
"redirect_document_id": false
41808+
},
41809+
{
41810+
"source_path": "articles/azure-monitor/app/java-agent-25-beta.md",
41811+
"redirect_url": "/azure/azure-monitor/app/java-agent",
41812+
"redirect_document_id": false
41813+
},
41814+
{
41815+
"source_path": "articles/azure-monitor/app/micrometer-java-25-beta.md",
41816+
"redirect_url": "/azure/azure-monitor/app/micrometer-java",
41817+
"redirect_document_id": false
41818+
},
4176941819
{
4177041820
"source_path": "articles/cognitive-services/Translator/quickstart-csharp-translate.md",
4177141821
"redirect_url": "/azure/cognitive-services/Translator/quickstart-translate",

articles/active-directory-b2c/tutorial-customize-ui.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Although you can store your files in many ways, for this tutorial, you store the
5959

6060
1. In the menu, select **CORS**.
6161
2. For **Allowed origins**, enter `https://your-tenant-name.b2clogin.com`. Replace `your-tenant-name` with the name of your Azure AD B2C tenant. For example, `https://fabrikam.b2clogin.com`. You need to use all lowercase letters when entering your tenant name.
62-
3. For **Allowed Methods**, select both `GET` and `OPTIONS`.
62+
3. For **Allowed Methods**, select `GET`,`PUT`, and `OPTIONS`.
6363
4. For **Allowed Headers**, enter an asterisk (*).
6464
5. For **Exposed Headers**, enter an asterisk (*).
6565
6. For **Max age**, enter 200.

articles/active-directory/develop/access-tokens.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,24 @@ Claims are present only if a value exists to fill it. So, your app shouldn't tak
111111
| `rh` | Opaque String | An internal claim used by Azure to revalidate tokens. Resources should not use this claim. |
112112
| `ver` | String, either `1.0` or `2.0` | Indicates the version of the access token. |
113113

114+
115+
> [!Groups overage claim]
116+
> To ensure that the token size doesn’t exceed HTTP header size limits, Azure AD limits the number of object Ids that it includes in the groups claim. If a user is member of more groups than the overage limit (150 for SAML tokens, 200 for JWT tokens), then Azure AD does not emit the groups claim in the token. Instead, it includes an overage claim in the token that indicates to the application to query the Graph API to retrieve the user’s group membership.
117+
{
118+
...
119+
"_claim_names": {
120+
"groups": "src1"
121+
},
122+
{
123+
"_claim_sources": {
124+
"src1": {
125+
"endpoint":"[Graph Url to get this user's group membership from]"
126+
}
127+
}
128+
...
129+
}
130+
> You can use the `BulkCreateGroups.ps1` provided in the [App Creation Scripts](https://github.com/Azure-Samples/active-directory-dotnet-webapp-groupclaims/blob/master/AppCreationScripts/) folder to help test overage scenarios.
131+
114132
#### v1.0 basic claims
115133

116134
The following claims will be included in v1.0 tokens if applicable, but aren't included in v2.0 tokens by default. If you're using v2.0 and need one of these claims, request them using [optional claims](active-directory-optional-claims.md).

articles/active-directory/develop/id-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ This list shows the claims that are in most id_tokens by default (except where n
7676
|`email` | String | The `email` claim is present by default for guest accounts that have an email address. Your app can request the email claim for managed users (those from the same tenant as the resource) using the `email` [optional claim](active-directory-optional-claims.md). On the v2.0 endpoint, your app can also request the `email` OpenID Connect scope - you don't need to request both the optional claim and the scope to get the claim. The email claim only supports addressable mail from the user's profile information. |
7777
|`name` | String | The `name` claim provides a human-readable value that identifies the subject of the token. The value isn't guaranteed to be unique, it is mutable, and it's designed to be used only for display purposes. The `profile` scope is required to receive this claim. |
7878
|`nonce`| String | The nonce matches the parameter included in the original /authorize request to the IDP. If it does not match, your application should reject the token. |
79-
|`oid` | String, a GUID | The immutable identifier for an object in the Microsoft identity system, in this case, a user account. This ID uniquely identifies the user across applications - two different applications signing in the same user will receive the same value in the `oid` claim. The Microsoft Graph will return this ID as the `id` property for a given user account. Because the `oid` allows multiple apps to correlate users, the `profile` scope is required to receive this claim. Note that if a single user exists in multiple tenants, the user will contain a different object ID in each tenant - they're considered different accounts, even though the user logs into each account with the same credentials. |
79+
|`oid` | String, a GUID | The immutable identifier for an object in the Microsoft identity system, in this case, a user account. This ID uniquely identifies the user across applications - two different applications signing in the same user will receive the same value in the `oid` claim. The Microsoft Graph will return this ID as the `id` property for a given user account. Because the `oid` allows multiple apps to correlate users, the `profile` scope is required to receive this claim. Note that if a single user exists in multiple tenants, the user will contain a different object ID in each tenant - they're considered different accounts, even though the user logs into each account with the same credentials. The `oid` claim is a GUID and cannot be reused. |
8080
|`roles`| Array of strings | The set of roles that were assigned to the user who is logging in. |
8181
|`rh` | Opaque String |An internal claim used by Azure to revalidate tokens. Should be ignored. |
8282
|`sub` | String, a GUID | The principal about which the token asserts information, such as the user of an app. This value is immutable and cannot be reassigned or reused. The subject is a pairwise identifier - it is unique to a particular application ID. If a single user signs into two different apps using two different client IDs, those apps will receive two different values for the subject claim. This may or may not be wanted depending on your architecture and privacy requirements. |
23.7 KB
Loading
11.7 KB
Loading
10.1 KB
Loading
29.4 KB
Loading

articles/active-directory/develop/quickstart-v2-javascript.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,8 @@ Select the option that's suitable to your development environment:
9595
var msalConfig = {
9696
auth: {
9797
clientId: "Enter_the_Application_Id_here",
98-
authority: "https://login.microsoftonline.com/Enter_the_Tenant_info_here"
98+
authority: "https://login.microsoftonline.com/Enter_the_Tenant_info_here",
99+
redirectURI: "http://localhost:30662/"
99100
},
100101
cache: {
101102
cacheLocation: "localStorage",
@@ -168,7 +169,8 @@ The quickstart code also shows how to initialize the MSAL library:
168169
var msalConfig = {
169170
auth: {
170171
clientId: "Enter_the_Application_Id_here",
171-
authority: "https://login.microsoftonline.com/Enter_the_Tenant_Info_Here"
172+
authority: "https://login.microsoftonline.com/Enter_the_Tenant_Info_Here",
173+
redirectURI: "http://localhost:30662/"
172174
},
173175
cache: {
174176
cacheLocation: "localStorage",
@@ -181,8 +183,9 @@ var myMSALObj = new Msal.UserAgentApplication(msalConfig);
181183

182184
> |Where | |
183185
> |---------|---------|
184-
> |`ClientId` | The application ID of the application that's registered in the Azure portal.|
186+
> |`clientId` | The application ID of the application that's registered in the Azure portal.|
185187
> |`authority` | (Optional) The authority URL that supports account types, as described previously in the configuration section. The default authority is `https://login.microsoftonline.com/common`. |
188+
> |`redirectURI` | The application registration's configured reply/redirect URI. In this case, `http://localhost:30662/`. |
186189
> |`cacheLocation` | (Optional) Sets the browser storage for the auth state. The default is sessionStorage. |
187190
> |`storeAuthStateInCookie` | (Optional) The library that stores the authentication request state that's required for validation of the authentication flows in the browser cookies. This cookie is set for IE and Edge browsers to mitigate certain [known issues](https://github.com/AzureAD/microsoft-authentication-library-for-js/wiki/Known-issues-on-IE-and-Edge-Browser#issues). |
188191
@@ -278,4 +281,4 @@ To browse the MSAL repo for documentation, FAQ, issues, and more, see:
278281
Help us improve the Microsoft identity platform. Tell us what you think by completing a short two-question survey.
279282

280283
> [!div class="nextstepaction"]
281-
> [Microsoft identity platform survey](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRyKrNDMV_xBIiPGgSvnbQZdUQjFIUUFGUE1SMEVFTkdaVU5YT0EyOEtJVi4u)
284+
> [Microsoft identity platform survey](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRyKrNDMV_xBIiPGgSvnbQZdUQjFIUUFGUE1SMEVFTkdaVU5YT0EyOEtJVi4u)

0 commit comments

Comments
 (0)