Skip to content

Commit bd45f1e

Browse files
authored
Merge branch 'main' into patch-48
2 parents a4582ea + bef7ddc commit bd45f1e

3,698 files changed

Lines changed: 67913 additions & 66158 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.publish.config.json

Lines changed: 30 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -506,6 +506,18 @@
506506
"branch": "dev",
507507
"branch_mapping": {}
508508
},
509+
{
510+
"path_to_root": "functions-nodejs-extensions",
511+
"url": "https://github.com/Azure/azure-functions-nodejs-extensions",
512+
"branch": "main",
513+
"branch_mapping": {}
514+
},
515+
{
516+
"path_to_root": "functions-node-sdk-bindings-blob",
517+
"url": "https://github.com/Azure-Samples/azure-functions-blob-sdk-bindings-nodejs",
518+
"branch": "main",
519+
"branch_mapping": {}
520+
},
509521
{
510522
"path_to_root": "functions-python-tensorflow-tutorial",
511523
"url": "https://github.com/Azure-Samples/functions-python-tensorflow-tutorial",
@@ -543,7 +555,24 @@
543555
"branch_mapping": {}
544556
},
545557
{
546-
"path_to_root": "functions-sql-todo-sample",
558+
"path_to_root": "functions-scenarios-durable-dotnet",
559+
"url": "https://github.com/Azure-Samples/durable-functions-quickstart-dotnet-azd",
560+
"branch": "main",
561+
"branch_mapping": {}
562+
},
563+
{
564+
"path_to_root": "functions-scenarios-durable-typescript",
565+
"url": "https://github.com/Azure-Samples/durable-functions-quickstart-typescript-azd",
566+
"branch": "main",
567+
"branch_mapping": {}
568+
},
569+
{
570+
"path_to_root": "functions-scenarios-durable-python",
571+
"url": "https://github.com/Azure-Samples/durable-functions-quickstart-python-azd",
572+
"branch": "main",
573+
"branch_mapping": {}
574+
},
575+
{ "path_to_root": "functions-sql-todo-sample",
547576
"url": "https://github.com/Azure-Samples/azure-sql-binding-func-dotnet-todo",
548577
"branch": "docs-snippets",
549578
"branch_mapping": {}

.openpublishing.redirection.json

Lines changed: 410 additions & 1 deletion
Large diffs are not rendered by default.

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ The **InputClaimsTransformations** element may contain a collection of **InputCl
6464

6565
### Output claims
6666

67-
The Microsoft Entra SSPR protocol provider does not return any **OutputClaims**, thus there is no need to specify output claims. You can, however, include claims that aren't returned by the Microsoft Entra SSPR protocol provider as long as you set the `DefaultValue` attribute.
67+
The Microsoft Entra SSPR protocol provider does not return any **OutputClaims**, thus, there is no need to specify output claims. You can, however, include claims that aren't returned by the Microsoft Entra SSPR protocol provider as long as you set the `DefaultValue` attribute.
6868

6969
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
7070

articles/active-directory-b2c/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Replace the values in the query string as follows:
8585

8686
To get a feel of how the request works, paste the request into your browser and run it.
8787

88-
This's the interactive part of the flow, where you take action. You're asked to complete the user flow's workflow. This might involve entering your username and password in a sign in form or any other number of steps. The steps you complete depend on how the user flow is defined.
88+
This is the interactive part of the flow, where you take action. You're asked to complete the user flow's workflow. This might involve entering your username and password in a sign in form or any other number of steps. The steps you complete depend on how the user flow is defined.
8989

9090
The response with the authorization code should be similar to this example:
9191

articles/active-directory-b2c/client-credentials-grant-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ There are no specific actions to enable the client credentials for user flows or
152152
| grant_type | `client_credentials` |
153153
| client_id | The **Client ID** from the [Step 2 Register an application](#step-2-register-an-application). |
154154
| client_secret | The **Client secret** value from [Step 2.1 Create a client secret](#step-21-create-a-client-secret). |
155-
| scope | The **Application ID URI** from [Step 1.1 Define web API roles (scopes)](#step-11-define-web-api-roles-scopes) and `.default`. For example `https://contoso.onmicrosoft.com/api/.default`, or `https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444/.default`.|
155+
| scope | The **Application ID URI** from [Step 1.1 Define web API roles (scopes)](#step-11-define-web-api-roles-scopes) and `.default`. For example `https://contoso.onmicrosoft.com/api/.default`, or `https://contoso.onmicrosoft.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/.default`.|
156156

157157
The actual POST request looks like the following example:
158158

articles/active-directory-b2c/partner-asignio.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ The following diagram illustrates the implementation.
7676

7777
## Configure an application with Asignio
7878

79-
Configurating an application with Asignio is with the Asignio Partner Administration site.
79+
Configuring an application with Asignio is with the Asignio Partner Administration site.
8080

8181
1. To request access for your organization, go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page.
8282
2. With credentials, sign into Asignio Partner Administration.

articles/active-directory-b2c/partner-biocatch.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -407,7 +407,7 @@ For the following instructions, see [Tutorial: Register a web application in Azu
407407

408408
"score": 275,
409409

410-
"tid": "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb"
410+
"tid": "bbbbcccc-1111-dddd-2222-eeee3333ffff"
411411

412412
}.[Signature]
413413

articles/active-directory-b2c/partner-deduce.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ With this integration, organizations can extend their Azure AD B2C capabilities
3131

3232
To get started, you'll need:
3333

34-
- An Azure subscription. If you don't have one, get a [free account](https://azure.microsoft.com/free).
34+
- An Azure subscription. If you don't have one, get a [free account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
3535

3636
- An [Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
3737

articles/active-directory-b2c/partner-dynamics-365-fraud-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ In the provided [custom policies](https://github.com/azure-ad-b2c/partner-integr
117117
|{Settings:FacebookClientId}|App ID of the Facebook app you configured for federation with B2C| `000000000000000`|
118118
|{Settings:FacebookClientSecretKeyContainer}| Name of the policy key, in which you saved Facebook's app secret |`B2C_1A_FacebookAppSecret`|
119119
|{Settings:ContentDefinitionBaseUri}|Endpoint in where you deployed the UI files|`https://<my-storage-account>.blob.core.windows.net/<my-storage-container>`|
120-
|{Settings:DfpApiBaseUrl}|The base path for your DFP API instance, found in the DFP portal| `https://tenantname-00001111-aaaa-2222-bbbb-3333cccc4444.api.dfp.dynamics.com/v1.0/`|
120+
|{Settings:DfpApiBaseUrl}|The base path for your DFP API instance, found in the DFP portal| `https://tenantname-aaaabbbb-0000-cccc-1111-dddd2222eeee.api.dfp.dynamics.com/v1.0/`|
121121
|{Settings:DfpApiAuthScope}|The client_credentials scope for the DFP API service|`https://api.dfp.dynamics-int.com/.default or https://api.dfp.dynamics.com/.default`|
122122
|{Settings:DfpTenantId}|The ID of the Microsoft Entra tenant (not B2C) where DFP is licensed and installed|`00001111-aaaa-2222-bbbb-3333cccc4444` or `contoso.onmicrosoft.com` |
123123
|{Settings:DfpAppClientIdKeyContainer}|Name of the policy key-in which you save the DFP client ID|`B2C_1A_DFPClientId`|

articles/active-directory-b2c/partner-eid-me.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To get started, you need:
3737
* A Relying Party account with eID-Me
3838
* Go to bluink.ca to [learn more](https://bluink.ca/eid-me/solutions/id-verification#contact-form) and request a demo
3939
* An Azure subscription
40-
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free)
40+
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn)
4141
* An Azure AD B2C tenant linked to the Azure subscription
4242
* See, [Tutorial: Create an Azure AD B2C tenant](tutorial-create-tenant.md)
4343
* A trial or production version of the eID-Me Digital ID App

0 commit comments

Comments
 (0)