Skip to content

Commit f81fe86

Browse files
committed
what's new
2 parents 06dd7c1 + 7a0b8eb commit f81fe86

File tree

4,244 files changed

+74882
-32931
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,244 files changed

+74882
-32931
lines changed

.openpublishing.build.ps1

Lines changed: 0 additions & 17 deletions
This file was deleted.

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -590,6 +590,12 @@
590590
"branch": "main",
591591
"branch_mapping": {}
592592
},
593+
{
594+
"path_to_root": "msdocs-jboss-mysql-sample-app",
595+
"url": "https://github.com/Azure-Samples/msdocs-jboss-mysql-sample-app",
596+
"branch": "main",
597+
"branch_mapping": {}
598+
},
593599
{
594600
"path_to_root": "playwright-testing-service",
595601
"url": "https://github.com/microsoft/playwright-testing-service",

.openpublishing.redirection.json

Lines changed: 133 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,105 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/lab-services/class-type-adobe-creative-cloud.md",
5+
"redirect_url": "/previous-versions/azure/lab-services/class-type-adobe-creative-cloud",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/lab-services/class-type-arcgis.md",
10+
"redirect_url": "/previous-versions/azure/lab-services/class-type-arcgis",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/lab-services/class-type-autodesk.md",
15+
"redirect_url": "/previous-versions/azure/lab-services/class-type-autodesk",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/lab-services/class-type-big-data-analytics.md",
20+
"redirect_url": "/previous-versions/azure/lab-services/class-type-big-data-analytics",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/lab-services/class-type-database-management.md",
25+
"redirect_url": "/previous-versions/azure/lab-services/class-type-database-management",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/lab-services/class-type-deep-learning-natural-language-processing.md",
30+
"redirect_url": "/previous-versions/azure/lab-services/class-type-deep-learning-natural-language-processing",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/lab-services/class-type-ethical-hacking.md",
35+
"redirect_url": "/previous-versions/azure/lab-services/class-type-ethical-hacking",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/lab-services/class-type-matlab.md",
40+
"redirect_url": "/previous-versions/azure/lab-services/class-type-matlab",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "articles/lab-services/class-type-jupyter-notebook.md",
45+
"redirect_url": "/previous-versions/azure/lab-services/class-type-jupyter-notebook",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "articles/lab-services/class-type-networking-gns3.md",
50+
"redirect_url": "/previous-versions/azure/lab-services/class-type-networking-gns3",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "articles/lab-services/class-type-pltw.md",
55+
"redirect_url": "/previous-versions/azure/lab-services/class-type-pltw",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "articles/lab-services/class-type-react-linux.md",
60+
"redirect_url": "/previous-versions/azure/lab-services/class-type-react-linux",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "articles/lab-services/class-type-react-windows.md",
65+
"redirect_url": "/previous-versions/azure/lab-services/class-type-react-windows",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "articles/lab-services/class-type-rstudio-linux.md",
70+
"redirect_url": "/previous-versions/azure/lab-services/class-type-rstudio-linux",
71+
"redirect_document_id": false
72+
},
73+
{
74+
"source_path": "articles/lab-services/class-type-rstudio-windows.md",
75+
"redirect_url": "/previous-versions/azure/lab-services/class-type-rstudio-windows",
76+
"redirect_document_id": false
77+
},
78+
{
79+
"source_path": "articles/lab-services/class-type-shell-scripting-linux.md",
80+
"redirect_url": "/previous-versions/azure/lab-services/class-type-shell-scripting-linux",
81+
"redirect_document_id": false
82+
},
83+
{
84+
"source_path": "articles/lab-services/class-type-solidworks.md",
85+
"redirect_url": "/previous-versions/azure/lab-services/class-type-solidworks",
86+
"redirect_document_id": false
87+
},
88+
{
89+
"source_path": "articles/lab-services/class-type-sql-server.md",
90+
"redirect_url": "/previous-versions/azure/lab-services/class-type-sql-server",
91+
"redirect_document_id": false
92+
},
93+
{
94+
"source_path": "articles/lab-services/class-types.md",
95+
"redirect_url": "/previous-versions/azure/lab-services/class-types",
96+
"redirect_document_id": false
97+
},
98+
{
99+
"source_path": "articles/lab-services/how-to-create-lab-accounts.md",
100+
"redirect_url": "/previous-versions/azure/lab-services/how-to-create-lab-accounts",
101+
"redirect_document_id": false
102+
},
3103
{
4104
"source_path": "articles/devtest-labs/devtest-lab-integrate-ci-cd.md",
5105
"redirect_url": "/previous-versions/azure/devtest-labs/devtest-lab-integrate-ci-cd",
@@ -108,7 +208,7 @@
108208
{
109209
"source_path_from_root": "/articles/application-insights/app-insights-analytics-diagnostics.md",
110210
"redirect_url": "/azure/application-insights/app-insights-analytics",
111-
"redirect_document_id": true
211+
"redirect_document_id": false
112212
},
113213
{
114214
"source_path_from_root": "/articles/application-insights/app-insights-analytics-reference.md",
@@ -118,7 +218,7 @@
118218
{
119219
"source_path_from_root": "/articles/application-insights/app-insights-azure.md",
120220
"redirect_url": "/azure/application-insights/app-insights-overview",
121-
"redirect_document_id": true
221+
"redirect_document_id": false
122222
},
123223
{
124224
"source_path_from_root": "/articles/application-insights/app-insights-developer-analytics.md",
@@ -133,7 +233,7 @@
133233
{
134234
"source_path_from_root": "/articles/application-insights/app-insights-java-eclipse.md",
135235
"redirect_url": "/azure/application-insights/app-insights-java-quick-start",
136-
"redirect_document_id": true
236+
"redirect_document_id": false
137237
},
138238
{
139239
"source_path_from_root": "/articles/application-insights/app-insights-pricing-enterprise-details.md",
@@ -3330,6 +3430,11 @@
33303430
"redirect_url": "/azure/vpn-gateway/add-remove-site-to-site-connections",
33313431
"redirect_document_id": false
33323432
},
3433+
{
3434+
"source_path_from_root": "/articles/vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal.md",
3435+
"redirect_url": "/azure/vpn-gateway/point-to-site-certificate-gateway",
3436+
"redirect_document_id": false
3437+
},
33333438
{
33343439
"source_path_from_root": "/articles/vpn-gateway/vpn-gateway-howto-openvpn-clients.md",
33353440
"redirect_url": "/azure/vpn-gateway/point-to-site-vpn-client-cert-windows",
@@ -3599,6 +3704,31 @@
35993704
"source_path_from_root": "/articles/third-party-notices.md",
36003705
"redirect_url": "https://github.com/MicrosoftDocs/azure-docs/blob/main/ThirdPartyNotices.md",
36013706
"redirect_document_id": false
3707+
},
3708+
{
3709+
"source_path_from_root": "/articles/reliability/glossary.md",
3710+
"redirect_url": "/azure/reliability/overview",
3711+
"redirect_document_id": false
3712+
},
3713+
{
3714+
"source_path_from_root": "/articles/reliability/resiliency-recommendations/recommend-cosmos-db-nosql.md",
3715+
"redirect_url": "/azure/reliability/reliability-cosmos-db-nosql",
3716+
"redirect_document_id": false
3717+
},
3718+
{
3719+
"source_path_from_root": "/articles/virtual-network/tutorial-create-route-table-portal.md",
3720+
"redirect_url": "/azure/virtual-network/tutorial-create-route-table",
3721+
"redirect_document_id": false
3722+
},
3723+
{
3724+
"source_path_from_root": "/articles/virtual-network/tutorial-create-route-table-powershell.md",
3725+
"redirect_url": "/azure/virtual-network/tutorial-create-route-table",
3726+
"redirect_document_id": false
3727+
},
3728+
{
3729+
"source_path_from_root": "/articles/virtual-network/tutorial-create-route-table-cli.md",
3730+
"redirect_url": "/azure/virtual-network/tutorial-create-route-table",
3731+
"redirect_document_id": false
36023732
}
36033733
]
36043734
}

articles/active-directory-b2c/age-gating.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Age gating in Azure Active Directory B2C (Azure AD B2C) enables you to identify
2525
>This feature is in public preview. Do not use feature for production applications.
2626
>
2727
28-
When age gating is enabled for a user flow, users are asked for their date of birth, and country of residence. If a user signs in that hasn't previously entered the information, they'll need to enter it the next time they sign in. The rules are applied every time a user signs in.
28+
When age gating is enabled for a user flow, users are asked for their date of birth, and country/region of residence. If a user signs in that hasn't previously entered the information, they'll need to enter it the next time they sign in. The rules are applied every time a user signs in.
2929

3030
![Screenshot of age gating information gather flow](./media/age-gating/age-gating-information-gathering.png)
3131

@@ -69,7 +69,7 @@ After your tenant is set up to use age gating, you can then use this feature in
6969
1. To test your policy, select **Run user flow**.
7070
1. For **Application**, select the web application named *testapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
7171
1. Select the **Run user flow** button.
72-
1. Sign-in with a local or social account. Then select your country of residence, and date of birth that simulate a minor.
72+
1. Sign-in with a local or social account. Then select your country/region of residence, and date of birth that simulate a minor.
7373
1. Repeat the test, and select a date of birth that simulates an adult.
7474

7575
When you sign-in as a minor, you should see the following error message: *Unfortunately, your sign on has been blocked. Privacy and online safety laws in your country prevent access to accounts belonging to children.*

articles/active-directory-b2c/identity-provider-mobile-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ To enable sign-in for users with Mobile ID in Azure AD B2C, you need to create a
4646

4747
|Key |Note |
4848
|---------|---------|
49-
| Client ID | The Mobile ID client ID. For example, 11111111-2222-3333-4444-555555555555. |
49+
| Client ID | The Mobile ID client ID. For example, 00001111-aaaa-2222-bbbb-3333cccc4444. |
5050
| Client Secret| The Mobile ID client secret.|
5151

5252

articles/active-directory-b2c/identity-provider-swissid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To enable sign-in for users with a SwissID account in Azure AD B2C, you need to
4848
|Key |Note |
4949
|---------|---------|
5050
| Environment| The SwissID OpenId well-known configuration endpoint. For example, `https://login.sandbox.pre.swissid.ch/idp/oauth2/.well-known/openid-configuration`. |
51-
| Client ID | The SwissID client ID. For example, `11111111-2222-3333-4444-555555555555`. |
51+
| Client ID | The SwissID client ID. For example, `00001111-aaaa-2222-bbbb-3333cccc4444`. |
5252
| Password| The SwissID client secret.|
5353

5454

articles/active-directory-b2c/implicit-flow-single-page-application.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -47,13 +47,13 @@ In this request, the client indicates the permissions that it needs to acquire f
4747

4848
- `{tenant}` with the name of your Azure AD B2C tenant.
4949

50-
- `90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6` with the app ID of the application you've registered in your tenant.
50+
- `00001111-aaaa-2222-bbbb-3333cccc4444` with the app ID of the application you've registered in your tenant.
5151

5252
- `{policy}` with the name of a policy you've created in your tenant, for example `b2c_1_sign_in`.
5353

5454
```http
5555
GET https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/authorize?
56-
client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
56+
client_id=00001111-aaaa-2222-bbbb-3333cccc4444
5757
&response_type=id_token+token
5858
&redirect_uri=https%3A%2F%2Faadb2cplayground.azurewebsites.net%2F
5959
&response_mode=fragment
@@ -88,7 +88,7 @@ GET https://aadb2cplayground.azurewebsites.net/#
8888
access_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6Ik5HVEZ2ZEstZnl0aEV1Q...
8989
&token_type=Bearer
9090
&expires_in=3599
91-
&scope="90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access",
91+
&scope="00001111-aaaa-2222-bbbb-3333cccc4444 offline_access",
9292
&id_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6Ik5HVEZ2ZEstZnl0aEV1Q...
9393
&state=arbitrary_data_you_sent_earlier
9494
```
@@ -175,7 +175,7 @@ In a typical web app flow, you would make a request to the `/token` endpoint. Ho
175175

176176
```http
177177
https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/authorize?
178-
client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
178+
client_id=00001111-aaaa-2222-bbbb-3333cccc4444
179179
&response_type=token
180180
&redirect_uri=https%3A%2F%2Faadb2cplayground.azurewebsites.net%2F
181181
&scope=https%3A%2F%2Fapi.contoso.com%2Ftasks.read
@@ -265,4 +265,4 @@ GET https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/
265265

266266
## Next steps
267267

268-
See the code sample: [Sign-in with Azure AD B2C in a JavaScript SPA](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-browser-samples/VanillaJSTestApp2.0/app/b2c).
268+
See the code sample: [Sign-in with Azure AD B2C in a JavaScript SPA](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-browser-samples/VanillaJSTestApp2.0/app/b2c).

articles/active-directory-b2c/json-transformations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ The following claims transformation outputs a JSON string claim that will be the
231231

232232
- Input claims:
233233
- **email**, transformation claim type **customerEntity.email**: "[email protected]"
234-
- **objectId**, transformation claim type **customerEntity.userObjectId** "01234567-89ab-cdef-0123-456789abcdef"
234+
- **objectId**, transformation claim type **customerEntity.userObjectId** "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb"
235235
- **givenName**, transformation claim type **customerEntity.firstName** "John"
236236
- **surname**, transformation claim type **customerEntity.lastName** "Smith"
237237
- Input parameter:
@@ -244,7 +244,7 @@ The following claims transformation outputs a JSON string claim that will be the
244244
{
245245
"customerEntity":{
246246
"email":"[email protected]",
247-
"userObjectId":"01234567-89ab-cdef-0123-456789abcdef",
247+
"userObjectId":"aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",
248248
"firstName":"John",
249249
"lastName":"Smith",
250250
"role":{
@@ -264,7 +264,7 @@ The **GenerateJson** claims transformation accepts plain strings. If an input cl
264264
{
265265
"customerEntity":{
266266
"email":"[\"[email protected]\"]",
267-
"userObjectId":"01234567-89ab-cdef-0123-456789abcdef",
267+
"userObjectId":"aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",
268268
"firstName":"John",
269269
"lastName":"Smith",
270270
"role":{

articles/active-directory-b2c/jwt-issuer-technical-profile.md

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The **InputClaims**, **OutputClaims**, and **PersistClaims** elements are empty
6363
| refresh_token_lifetime_secs | No | Refresh token lifetimes. The maximum time period before which a refresh token can be used to acquire a new access token, if your application had been granted the offline_access scope. The default is 120,9600 seconds (14 days). The minimum (inclusive) is 86,400 seconds (24 hours). The maximum (inclusive) is 7,776,000 seconds (90 days). |
6464
| rolling_refresh_token_lifetime_secs | No | Refresh token sliding window lifetime. After this time period elapses the user is forced to reauthenticate, irrespective of the validity period of the most recent refresh token acquired by the application. If you don't want to enforce a sliding window lifetime, set the value of allow_infinite_rolling_refresh_token to `true`. The default is 7,776,000 seconds (90 days). The minimum (inclusive) is 86,400 seconds (24 hours). The maximum (inclusive) is 31,536,000 seconds (365 days). |
6565
| allow_infinite_rolling_refresh_token | No | If set to `true`, the refresh token sliding window lifetime never expires. |
66-
| IssuanceClaimPattern | No | Controls the Issuer (iss) claim. One of the values:<ul><li>AuthorityAndTenantGuid - The iss claim includes your domain name, such as `login.microsoftonline` or `tenant-name.b2clogin.com`, and your tenant identifier https:\//login.microsoftonline.com/00000000-0000-0000-0000-000000000000/v2.0/</li><li>AuthorityWithTfp - The iss claim includes your domain name, such as `login.microsoftonline` or `tenant-name.b2clogin.com`, your tenant identifier and your relying party policy name. https:\//login.microsoftonline.com/tfp/00000000-0000-0000-0000-000000000000/b2c_1a_tp_sign-up-or-sign-in/v2.0/</li></ul> Default value: AuthorityAndTenantGuid |
66+
| IssuanceClaimPattern | No | Controls the Issuer (iss) claim. One of the values:<ul><li>AuthorityAndTenantGuid - The iss claim includes your domain name, such as `login.microsoftonline` or `tenant-name.b2clogin.com`, and your tenant identifier https:\//login.microsoftonline.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0/</li><li>AuthorityWithTfp - The iss claim includes your domain name, such as `login.microsoftonline` or `tenant-name.b2clogin.com`, your tenant identifier and your relying party policy name. https:\//login.microsoftonline.com/tfp/aaaabbbb-0000-cccc-1111-dddd2222eeee/b2c_1a_tp_sign-up-or-sign-in/v2.0/</li></ul> Default value: AuthorityAndTenantGuid |
6767
| AuthenticationContextReferenceClaimPattern | No | Controls the `acr` claim value.<ul><li>None - Azure AD B2C doesn't issue the acr claim</li><li>PolicyId - the `acr` claim contains the policy name</li></ul>The options for setting this value are TFP (trust framework policy) and ACR (authentication context reference). It is recommended setting this value to TFP, to set the value, ensure the `<Item>` with the `Key="AuthenticationContextReferenceClaimPattern"` exists and the value is `None`. In your relying party policy, add `<OutputClaims>` item, add this element `<OutputClaim ClaimTypeReferenceId="trustFrameworkPolicy" Required="true" DefaultValue="{policy}" PartnerClaimType="tfp"/>`. Also make sure your policy contains the claim type `<ClaimType Id="trustFrameworkPolicy"> <DisplayName>trustFrameworkPolicy</DisplayName> <DataType>string</DataType> </ClaimType>` |
6868
|RefreshTokenUserJourneyId| No | The identifier of a user journey that should be executed during the [refresh an access token](authorization-code-flow.md#4-refresh-the-token) POST request to the `/token` endpoint. |
6969

@@ -79,17 +79,3 @@ The CryptographicKeys element contains the following attributes:
7979
## Session management
8080

8181
To configure the Azure AD B2C sessions between Azure AD B2C and a relying party application, in the attribute of the `UseTechnicalProfileForSessionManagement` element, add a reference to [OAuthSSOSessionProvider](custom-policy-reference-sso.md#oauthssosessionprovider) SSO session.
82-
83-
84-
85-
86-
87-
88-
89-
90-
91-
92-
93-
94-
95-

articles/active-directory-b2c/language-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -436,7 +436,7 @@ In the following example, English (en) and Spanish (es) custom strings are added
436436
1. Switch your browser default language to Spanish. Or you can add the query string parameter, `ui_locales` to the authorization request. For example:
437437

438438
```http
439-
https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/B2C_1A_signup_signin/oauth2/v2.0/authorize&client_id=0239a9cc-309c-4d41-12f1-31299feb2e82&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login&ui_locales=es
439+
https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/B2C_1A_signup_signin/oauth2/v2.0/authorize&client_id=00001111-aaaa-2222-bbbb-3333cccc4444&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login&ui_locales=es
440440
```
441441

442442
::: zone-end

0 commit comments

Comments
 (0)