Skip to content

Commit fac86c4

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into anomaly-finder-tutorial
2 parents 7f32e48 + 0c9f380 commit fac86c4

File tree

8,780 files changed

+172752
-74609
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

8,780 files changed

+172752
-74609
lines changed

.gitignore

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
# Operating System files
2-
.DS_Store
2+
.DS_Store
33
Thumbs.db
44

55
# Visual Studio and VS Code files

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -210,6 +210,12 @@
210210
"branch": "tutorial",
211211
"branch_mapping": {}
212212
},
213+
{
214+
"path_to_root": "samples-tsi",
215+
"url": "https://github.com/Azure-Samples/Azure-Time-Series-Insights",
216+
"branch": "master",
217+
"branch_mapping": {}
218+
},
213219
{
214220
"path_to_root": "media-services-v3-dotnet-core-tutorials",
215221
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-core-tutorials",

.openpublishing.redirection.json

Lines changed: 581 additions & 103 deletions
Large diffs are not rendered by default.

CONTRIBUTING.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
11
# Contributing to Microsoft Azure Documentation
22

3-
> Between March 5th and March 9th 2019, the MicrosoftDocs/azure-docs repo will be undergoing a Migration from it's current Markdown engine to the [Markdig](https://github.com/lunet-io/markdig) markdown engine. During this time, we will be turning off the ability to suspending merging of public pull requests in order to complete the migration.
4-
53
Thank you for taking the time to contribute to the Microsoft Azure documentation.
64

75
This guide covers some general topics around contribution and refers out to our [contributors guide](https://docs.microsoft.com/contribute) for more detailed explanations where relevant.

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@
5656
href: active-directory-b2c-overview-custom.md
5757
- name: User access
5858
href: manage-user-access.md
59+
- name: JavaScript and page contracts
60+
href: user-flow-javascript-overview.md
5961
- name: OAuth 2.0
6062
href: active-directory-b2c-reference-oauth-code.md
6163
- name: OpenId Connect
@@ -70,8 +72,6 @@
7072
href: manage-user-data.md
7173
- name: User flows
7274
href: active-directory-b2c-reference-policies.md
73-
- name: User flows with JavaScript
74-
href: user-flow-javascript-overview.md
7575
- name: User interface customization
7676
href: customize-ui-overview.md
7777
- name: How-to guides

articles/active-directory-b2c/active-directory-b2c-access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Request an access token - Azure Active Directory B2C | Microsoft Docs
33
description: Learn how to request an access token from Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: davidmu1
6-
manager: daveba
6+
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity

articles/active-directory-b2c/active-directory-b2c-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Applications types that can be used in Azure Active Directory B2C | Micro
33
description: Learn about the types of applications you can use in the Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: davidmu1
6-
manager: daveba
6+
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity

articles/active-directory-b2c/active-directory-b2c-configure-signup-self-asserted-custom.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Add claims and customize user input using custom policies - Azure Active
33
description: Learn how to customize user input and add claims to the sign-up or sign-in journey in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: davidmu1
6-
manager: daveba
6+
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
@@ -16,20 +16,20 @@ ms.subservice: B2C
1616

1717
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1818

19-
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown, and define whether it's required.
19+
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown and define whether it's required.
2020

2121
## Prerequisites
2222

2323
Complete the steps in the article [Getting Started with Custom Policies](active-directory-b2c-get-started-custom.md). Test the sign-up or sign-in user journey to sign up a new local account before proceeding.
2424

2525
## Add claims
2626

27-
Gathering initial data from your users is achieved using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its selfasserted provider.
27+
Gathering initial data from your users is achieved using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its self-asserted provider.
2828

2929

3030
### Define the claim
3131

32-
Lets ask the user for their city. Add the following element to the **ClaimsSchema** element in the TrustFrameworkBase policy file:
32+
Let's ask the user for their city. Add the following element to the **ClaimsSchema** element in the TrustFrameworkBase policy file:
3333

3434
```xml
3535
<ClaimType Id="city">

articles/active-directory-b2c/active-directory-b2c-create-custom-attributes-profile-edit-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Add your own attributes to custom policies in Azure Active Directory B2C
33
description: A walkthrough on using extension properties and custom attributes and including them in the user interface.
44
services: active-directory-b2c
55
author: davidmu1
6-
manager: daveba
6+
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity

articles/active-directory-b2c/active-directory-b2c-custom-guide-eventlogger-appins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Track user behavior by using events in Application Insights from Azure Ac
33
description: Learn how to enable event logs in Application Insights from Azure AD B2C user journeys by using custom policies (preview).
44
services: active-directory-b2c
55
author: davidmu1
6-
manager: daveba
6+
manager: celestedg
77

88
ms.service: active-directory
99
ms.topic: conceptual

0 commit comments

Comments
 (0)