Skip to content

Commit f97c35d

Browse files
authored
Merge pull request #191342 from MicrosoftDocs/main
3/10 PM Publish
2 parents 3de5995 + f93b6e2 commit f97c35d

File tree

241 files changed

+1783
-972
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

241 files changed

+1783
-972
lines changed

.openpublishing.redirection.json

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -689,7 +689,7 @@
689689
"redirect_document_id": false
690690
},
691691
{
692-
"source_path_from_root": "/articles/frontdoor/concept-rules-set-action.md",
692+
"source_path_from_root": "/articles/frontdoor/concept-rule-set-actions.md",
693693
"redirect_url": "/azure/frontdoor/front-door-rules-engine-actions",
694694
"redirect_document_id": false
695695
},
@@ -708,6 +708,11 @@
708708
"redirect_url": "/azure/frontdoor/front-door-route-matching",
709709
"redirect_document_id": false
710710
},
711+
{
712+
"source_path_from_root": "/articles/frontdoor/concept-rule-set-url-redirect-and-rewrite.md",
713+
"redirect_url": "/azure/frontdoor/front-door-url-redirect",
714+
"redirect_document_id": false
715+
},
711716
{
712717
"source_path_from_root": "/articles/app-service-web/web-sites-dotnet-deploy-aspnet-mvc-app-membership-oauth-sql-database.md",
713718
"redirect_url": "/aspnet/core/security/authorization/secure-data",
@@ -9139,8 +9144,18 @@
91399144
"redirect_document_id": false
91409145
},
91419146
{
9142-
"source_path": "articles/azure-resource-manager/managed-application-createuidefinition-overview.md",
9143-
"redirect_url": "/azure/azure-resource-manager/managed-applications/create-uidefinition-overview",
9147+
"source_path": "articles/azure-resource-manager/managed-applications/scripts/managed-application-cli-sample-create-application.md",
9148+
"redirect_url": "/azure/azure-resource-manager/managed-applications/scripts/managed-application-define-create-cli-sample",
9149+
"redirect_document_id": false
9150+
},
9151+
{
9152+
"source_path": "articles/azure-resource-manager/managed-applications/scripts/managed-application-cli-sample-create-definition.md",
9153+
"redirect_url": "/azure/azure-resource-manager/managed-applications/scripts/managed-application-define-create-cli-sample",
9154+
"redirect_document_id": false
9155+
},
9156+
{
9157+
"source_path": "articles/azure-resource-manager/managed-applications/scripts/managed-application-cli-sample-get-managed-group-resize-vm.md",
9158+
"redirect_url": "/azure/azure-resource-manager/managed-applications/update-managed-resources",
91449159
"redirect_document_id": false
91459160
},
91469161
{

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 02/25/2022
12+
ms.date: 03/10/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -205,6 +205,7 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
205205

206206
## Next steps
207207

208-
Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).
208+
- Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).
209+
- Check out the Azure AD multi-tenant federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#azure-active-directory), and how to pass Azure AD access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#azure-active-directory-with-access-token)
209210

210211
::: zone-end

articles/active-directory-b2c/identity-provider-facebook.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 03/10/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -130,8 +130,9 @@ Update the relying party (RP) file that initiates the user journey that you crea
130130

131131
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
132132

133-
::: zone-end
134-
135133
## Next steps
136134

137-
Learn how to [pass Facebook token to your application](idp-pass-through-user-flow.md).
135+
- Learn how to [pass Facebook token to your application](idp-pass-through-user-flow.md).
136+
- Check out the Facebook federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook), and how to pass Facebook access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token)
137+
138+
::: zone-end

articles/active-directory-b2c/identity-provider-github.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 03/10/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -218,4 +218,9 @@ The GitHub technical profile requires the **CreateIssuerUserId** claim transform
218218

219219
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
220220

221+
## Next steps
222+
223+
- Learn how to [pass GitHub token to your application](idp-pass-through-user-flow.md).
224+
- Check out the GitHub federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#github), and how to pass GitHub access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#github-with-access-token)
225+
221226
::: zone-end

articles/active-directory-b2c/identity-provider-google.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 03/10/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -189,8 +189,10 @@ You can define a Google account as a claims provider by adding it to the **Claim
189189

190190
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
191191

192-
::: zone-end
193-
194192
## Next steps
195193

196-
Learn how to [pass a Google token to your application](idp-pass-through-user-flow.md).
194+
- Learn how to [pass Google token to your application](idp-pass-through-user-flow.md).
195+
- Check out the Google federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#google), and how to pass Google access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#google-with-access-token)
196+
197+
198+
::: zone-end

articles/active-directory-b2c/idp-pass-through-user-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 03/10/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -30,7 +30,7 @@ Azure AD B2C supports passing the access token of [OAuth 2.0](add-identity-provi
3030

3131
::: zone pivot="b2c-custom-policy"
3232

33-
Azure AD B2C supports passing the access token of [OAuth 2.0](authorization-code-flow.md) and [OpenID Connect](openid-connect.md) identity providers. For all other identity providers, the claim is returned blank.
33+
Azure AD B2C supports passing the access token of [OAuth 2.0](authorization-code-flow.md) and [OpenID Connect](openid-connect.md) identity providers. For all other identity providers, the claim is returned blank. For more details, check out the identity providers federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers).
3434

3535
::: zone-end
3636

articles/active-directory-b2c/partner-bindid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ For [Applications](https://admin.bindid-sandbox.io/console/#/applications) to co
6969
| Name | Azure AD B2C/your desired application name|
7070
| Domain | name.onmicrosoft.com|
7171
| Redirect URIs| https://jwt.ms |
72-
| Redirect URLs |Specify the page to which users are redirected after BindID authentication: https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp<br>For Example: `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`<br>If you use a custom domain, enter https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp.<br>Replace your-domain-name with your custom domain, and your-tenant-name with the name of your tenant.|
72+
| Redirect URLs |Specify the page to which users are redirected after BindID authentication: `https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp`<br>For Example: `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`<br>If you use a custom domain, enter https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp.<br>Replace your-domain-name with your custom domain, and your-tenant-name with the name of your tenant.|
7373

7474
>[!NOTE]
7575
>BindID will provide you Client ID and Client Secret, which you'll need later to configure the Identity provider in Azure AD B2C.

articles/active-directory/app-provisioning/skip-out-of-scope-deletions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Skip deletion of out of scope users in Azure Active Directory Application
33
description: Learn how to override the default behavior of de-provisioning out of scope users in Azure Active Directory.
44
services: active-directory
55
author: kenwith
6-
manager: karenhoran
6+
manager:
77
ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
@@ -20,7 +20,7 @@ This article describes how to use the Microsoft Graph API and the Microsoft Grap
2020
* If ***SkipOutOfScopeDeletions*** is set to 0 (false), accounts that go out of scope will be disabled in the target.
2121
* If ***SkipOutOfScopeDeletions*** is set to 1 (true), accounts that go out of scope will not be disabled in the target. This flag is set at the *Provisioning App* level and can be configured using the Graph API.
2222

23-
Because this configuration is widely used with the *Workday to Active Directory user provisioning* app, the following steps include screenshots of the Workday application. However, the configuration can also be used with *all other apps*, such as ServiceNow, Salesforce, and Dropbox.
23+
Because this configuration is widely used with the *Workday to Active Directory user provisioning* app, the following steps include screenshots of the Workday application. However, the configuration can also be used with *all other apps*, such as ServiceNow, Salesforce, and Dropbox. Note that in order to successfully complete this procedure you must have first set up app provisioning for the app. Each app has its own configuration article. For example, to configure the Workday application, see [Tutorial: Configure Workday to Azure AD user provisioning](../saas-apps/workday-inbound-cloud-only-tutorial.md).
2424

2525
## Step 1: Retrieve your Provisioning App Service Principal ID (Object ID)
2626

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 03/03/2022
9+
ms.date: 03/10/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -116,6 +116,7 @@ These browsers support device authentication, allowing the device to be identifi
116116
> [!NOTE]
117117
> Edge 85+ requires the user to be signed in to the browser to properly pass device identity. Otherwise, it behaves like Chrome without the accounts extension. This sign-in might not occur automatically in a Hybrid Azure AD Join scenario.
118118
> Safari is supported for device-based Conditional Access, but it can not satisfy the **Require approved client app** or **Require app protection policy** conditions. A managed browser like Microsoft Edge will satisfy approved client app and app protection policy requirements.
119+
> [Firefox 91+](https://support.mozilla.org/kb/windows-sso) is supported for device-based Conditional Access, but "Allow Windows single sign-on for Microsoft, work, and school accounts" needs to be enabled.
119120
120121
#### Why do I see a certificate prompt in the browser
121122

articles/applied-ai-services/immersive-reader/how-to-create-immersive-reader.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ The script is designed to be flexible. It will first look for existing Immersive
157157
-ResourceGroupName 'MyResourceGroupName'
158158
-ResourceGroupLocation 'westus2'
159159
-AADAppDisplayName 'MyOrganizationImmersiveReaderAADApp'
160-
-AADAppIdentifierUri 'https://MyOrganizationImmersiveReaderAADApp'
160+
-AADAppIdentifierUri 'api://MyOrganizationImmersiveReaderAADApp'
161161
-AADAppClientSecret 'SomeStrongPassword'
162162
-AADAppClientSecretExpiration '2021-12-31'
163163
```
@@ -172,7 +172,7 @@ The script is designed to be flexible. It will first look for existing Immersive
172172
| ResourceGroupName |Resources are created in resource groups within subscriptions. Supply the name of an existing resource group. If the resource group does not already exist, a new one with this name will be created. |
173173
| ResourceGroupLocation |If your resource group doesn't exist, you need to supply a location in which to create the group. To find a list of locations, run `az account list-locations`. Use the *name* property (without spaces) of the returned result. This parameter is optional if your resource group already exists. |
174174
| AADAppDisplayName |The Azure Active Directory application display name. If an existing Azure AD application is not found, a new one with this name will be created. This parameter is optional if the Azure AD application already exists. |
175-
| AADAppIdentifierUri |The URI for the Azure AD app. If an existing Azure AD app is not found, a new one with this URI will be created. For example, `https://immersivereaderaad-mycompany`. |
175+
| AADAppIdentifierUri |The URI for the Azure AD app. If an existing Azure AD app is not found, a new one with this URI will be created. For example, `api://MyOrganizationImmersiveReaderAADApp`. Here we are using the default Azure AD URI scheme prefix of `api://` for compatibility with the [Azure AD policy of using verified domains](../../active-directory/develop/reference-breaking-changes.md#appid-uri-in-single-tenant-applications-will-require-use-of-default-scheme-or-verified-domains). |
176176
| AADAppClientSecret |A password you create that will be used later to authenticate when acquiring a token to launch the Immersive Reader. The password must be at least 16 characters long, contain at least 1 special character, and contain at least 1 numeric character. To manage Azure AD application client secrets after you've created this resource please visit https://portal.azure.com and go to Home -> Azure Active Directory -> App Registrations -> `[AADAppDisplayName]` -> Certificates and Secrets blade -> Client Secrets section (as shown in the "Manage your Azure AD application secrets" screenshot below). |
177177
| AADAppClientSecretExpiration |The date or datetime after which your `[AADAppClientSecret]` will expire (e.g. '2020-12-31T11:59:59+00:00' or '2020-12-31'). |
178178

0 commit comments

Comments
 (0)