Skip to content

Commit 46e7083

Browse files
committed
markdig migration for 2019-03-15
1 parent 6a038a8 commit 46e7083

File tree

1,601 files changed

+20706
-20754
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,601 files changed

+20706
-20754
lines changed

articles/active-directory-b2c/active-directory-b2c-create-custom-attributes-profile-edit-custom.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -255,20 +255,20 @@ The ID token sent back to your application includes the new extension property a
255255

256256
1. Add the new claim to the flows to sign in to social accounts by changing the following **TechnicalProfiles**. Social and federated accounts use these two **TechnicalProfiles** to sign in. They write and read user data by using the **alternativeSecurityId** as the locator of the user object.
257257

258-
```xml
258+
```xml
259259
<TechnicalProfile Id="AAD-UserWriteUsingAlternativeSecurityId">
260260

261261
<TechnicalProfile Id="AAD-UserReadUsingAlternativeSecurityId">
262-
```
262+
```
263263

264264
2. Use the same extension attributes between built-in and custom policies. When you add extension, or custom, attributes via the portal experience, those attributes are registered by using the **b2c-extensions-app** that exists in every B2C tenant. Take the following steps to use extension attributes in your custom policy:
265265

266-
a. Within your B2C tenant in portal.azure.com, navigate to **Azure Active Directory** and select **App registrations**.
267-
b. Find your **b2c-extensions-app** and select it.
268-
c. Under **Essentials**, enter the **Application ID** and the **Object ID**.
269-
d. Include them in your **AAD-Common** TechnicalProfile metadata:
266+
a. Within your B2C tenant in portal.azure.com, navigate to **Azure Active Directory** and select **App registrations**.
267+
b. Find your **b2c-extensions-app** and select it.
268+
c. Under **Essentials**, enter the **Application ID** and the **Object ID**.
269+
d. Include them in your **AAD-Common** TechnicalProfile metadata:
270270

271-
```xml
271+
```xml
272272
<ClaimsProviders>
273273
<ClaimsProvider>
274274
<DisplayName>Azure Active Directory</DisplayName>
@@ -280,14 +280,14 @@ The ID token sent back to your application includes the new extension property a
280280
<Item Key="ApplicationObjectId">insert objectId here</Item> <!-- This is the "Object ID" from the "b2c-extensions-app"-->
281281
<Item Key="ClientId">insert appId here</Item> <!--This is the "Application ID" from the "b2c-extensions-app"-->
282282
</Metadata>
283-
```
283+
```
284284

285285
3. Stay consistent with the portal experience. Create these attributes by using the portal UI before you use them in your custom policies. When you create an attribute **ActivationStatus** in the portal, you must refer to it as follows:
286286

287-
```
288-
extension_ActivationStatus in the custom policy.
289-
extension_<app-guid>_ActivationStatus via Graph API.
290-
```
287+
```
288+
extension_ActivationStatus in the custom policy.
289+
extension_<app-guid>_ActivationStatus via Graph API.
290+
```
291291

292292
## Reference
293293

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -245,10 +245,10 @@ A claims provider can have multiple technical profiles for various reasons. For
245245
The following XML snippet contains a claims provider node with two technical profiles:
246246

247247
* **TechnicalProfile Id="REST-API-SignUp"**: Defines your RESTful service.
248-
* `Proprietary` is described as the protocol for a RESTful-based provider.
249-
* `InputClaims` defines the claims that will be sent from Azure AD B2C to the REST service.
248+
* `Proprietary` is described as the protocol for a RESTful-based provider.
249+
* `InputClaims` defines the claims that will be sent from Azure AD B2C to the REST service.
250250

251-
In this example, the content of the claim `givenName` sends to the REST service as `firstName`, the content of the claim `surname` sends to the REST service as `lastName`, and `email` sends as is. The `OutputClaims` element defines the claims that are retrieved from RESTful service back to Azure AD B2C.
251+
In this example, the content of the claim `givenName` sends to the REST service as `firstName`, the content of the claim `surname` sends to the REST service as `lastName`, and `email` sends as is. The `OutputClaims` element defines the claims that are retrieved from RESTful service back to Azure AD B2C.
252252

253253
* **TechnicalProfile Id="LocalAccountSignUpWithLogonEmail"**: Adds a validation technical profile to an existing technical profile (defined in base policy). During the sign-up journey, the validation technical profile invokes the preceding technical profile. If the RESTful service returns an HTTP error 409 (a conflict error), the error message is displayed to the user.
254254

articles/active-directory-b2c/active-directory-b2c-reference-customize-ui-custom.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -118,16 +118,16 @@ To verify that the storage you are hosting your content on has CORS enabled, pro
118118

119119
1. Open a browsing session and navigate to the page *unified.html* using the full URL of its location in your storage account, `https://<storageAccountName>.blob.core.windows.net/<containerName>/unified.html`. For example, https://contoso369b2c.blob.core.windows.net/b2c/unified.html.
120120
2. Navigate to https://test-cors.org. This site allows you to verify that the page you are using has CORS enabled.
121-
<!--
122-
![test-cors.org](../../media/active-directory-b2c-customize-ui-of-a-user-journey/test-cors.png)
123-
-->
121+
<!--
122+
![test-cors.org](../../media/active-directory-b2c-customize-ui-of-a-user-journey/test-cors.png)
123+
-->
124124

125125
3. In **Remote URL**, enter the full URL for your unified.html content, and click **Send Request**.
126126
4. Verify that the output in the **Results** section contains *XHR status: 200*, which indicates that CORS is enabled.
127-
<!--
128-
![CORS enabled](../../media/active-directory-b2c-customize-ui-of-a-user-journey/cors-enabled.png)
129-
-->
130-
The storage account should now contain a blob container named *b2c* in the illustration that contains the following wingtiptoys templates from the *Starter-Pack*.
127+
<!--
128+
![CORS enabled](../../media/active-directory-b2c-customize-ui-of-a-user-journey/cors-enabled.png)
129+
-->
130+
The storage account should now contain a blob container named *b2c* in the illustration that contains the following wingtiptoys templates from the *Starter-Pack*.
131131

132132
<!--
133133
![Correctly configured storage account](../../articles/active-directory-b2c/media/active-directory-b2c-reference-customize-ui-custom/storage-account-final.png)

articles/active-directory-b2c/active-directory-b2c-social-migration.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,14 +28,14 @@ This article is a continuation of the user migration article, and focuses on soc
2828
* **Combine local account with social identity**. As mentioned, local account sign-in names, and social account identities are stored in different attributes. `signInNames` is used for local account, while `userIdentities` for social account. A single Azure AD B2C account, can be a local account only, social account only, or combine a local account with social identity in one user record. This behavior allows you to manage a single account, while a user can sign in with the local account credential(s) or with the social identities.
2929

3030
* `UserIdentity` Type - Contains information about the identity of a social account user in an Azure AD B2C tenant:
31-
* `issuer` The string representation of the identity provider that issued the user identifier, such as facebook.com.
32-
* `issuerUserId` The unique user identifier used by the social identity provider in base64 format.
31+
* `issuer` The string representation of the identity provider that issued the user identifier, such as facebook.com.
32+
* `issuerUserId` The unique user identifier used by the social identity provider in base64 format.
3333

3434
```JSON
3535
"userIdentities": [{
36-
"issuer": "Facebook.com",
37-
"issuerUserId": "MTIzNDU2Nzg5MA=="
38-
}
36+
"issuer": "Facebook.com",
37+
"issuerUserId": "MTIzNDU2Nzg5MA=="
38+
}
3939
]
4040
```
4141

articles/active-directory-b2c/active-directory-b2c-troubleshoot-custom.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -40,40 +40,40 @@ Azure AD B2C supports a feature for sending data to Application Insights. Appli
4040
1. Open the RP file (for example, SignUpOrSignin.xml).
4141
1. Add the following attributes to the `<TrustFrameworkPolicy>` element:
4242

43-
```XML
44-
DeploymentMode="Development"
45-
UserJourneyRecorderEndpoint="urn:journeyrecorder:applicationinsights"
46-
```
43+
```XML
44+
DeploymentMode="Development"
45+
UserJourneyRecorderEndpoint="urn:journeyrecorder:applicationinsights"
46+
```
4747

4848
1. If it doesn't exist already, add a child node `<UserJourneyBehaviors>` to the `<RelyingParty>` node. It must be located immediately after the `<DefaultUserJourney ReferenceId="UserJourney Id from your extensions policy, or equivalent (for example:SignUpOrSigninWithAAD" />`
4949
2. Add the following node as a child of the `<UserJourneyBehaviors>` element. Make sure to replace `{Your Application Insights Key}` with the **Instrumentation Key** that you obtained from Application Insights in the previous section.
5050

51-
```XML
52-
<JourneyInsights TelemetryEngine="ApplicationInsights" InstrumentationKey="{Your Application Insights Key}" DeveloperMode="true" ClientEnabled="false" ServerEnabled="true" TelemetryVersion="1.0.0" />
53-
```
51+
```XML
52+
<JourneyInsights TelemetryEngine="ApplicationInsights" InstrumentationKey="{Your Application Insights Key}" DeveloperMode="true" ClientEnabled="false" ServerEnabled="true" TelemetryVersion="1.0.0" />
53+
```
5454

55-
* `DeveloperMode="true"` tells ApplicationInsights to expedite the telemetry through the processing pipeline, good for development, but constrained at high volumes.
56-
* `ClientEnabled="true"` sends the ApplicationInsights client-side script for tracking page view and client-side errors (not needed).
57-
* `ServerEnabled="true"` sends the existing UserJourneyRecorder JSON as a custom event to Application Insights.
58-
Sample:
55+
* `DeveloperMode="true"` tells ApplicationInsights to expedite the telemetry through the processing pipeline, good for development, but constrained at high volumes.
56+
* `ClientEnabled="true"` sends the ApplicationInsights client-side script for tracking page view and client-side errors (not needed).
57+
* `ServerEnabled="true"` sends the existing UserJourneyRecorder JSON as a custom event to Application Insights.
58+
Sample:
5959

60-
```XML
61-
<TrustFrameworkPolicy
60+
```XML
61+
<TrustFrameworkPolicy
6262
...
6363
TenantId="fabrikamb2c.onmicrosoft.com"
6464
PolicyId="SignUpOrSignInWithAAD"
6565
DeploymentMode="Development"
6666
UserJourneyRecorderEndpoint="urn:journeyrecorder:applicationinsights"
67-
>
67+
>
6868
...
6969
<RelyingParty>
7070
<DefaultUserJourney ReferenceId="UserJourney ID from your extensions policy, or equivalent (for example: SignUpOrSigninWithAzureAD)" />
7171
<UserJourneyBehaviors>
7272
<JourneyInsights TelemetryEngine="ApplicationInsights" InstrumentationKey="{Your Application Insights Key}" DeveloperMode="true" ClientEnabled="false" ServerEnabled="true" TelemetryVersion="1.0.0" />
7373
</UserJourneyBehaviors>
7474
...
75-
</TrustFrameworkPolicy>
76-
```
75+
</TrustFrameworkPolicy>
76+
```
7777

7878
3. Upload the policy.
7979

articles/active-directory-b2c/configure-ropc.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -33,15 +33,15 @@ The following flows are not supported:
3333

3434
## Create a resource owner user flow
3535

36-
1. Sign in to the Azure portal as the global administrator of your Azure AD B2C tenant.
37-
2. To switch to your Azure AD B2C tenant, select the B2C directory in the upper-right corner of the portal.
38-
3. Click **User flows**, and select **New user flow**.
39-
4. Click the **All** tab and select **Sign in using ROPC**.
40-
5. Provide a name for the user flow, such as *ROPC_Auth*.
41-
6. Under **Application claims**, click **Show more**.
42-
7. Select the application claims that you need for your application, such as Display Name, Email Address, and Identity Provider.
43-
8. Select **OK**, and then select **Create**.
44-
9. Click **Run user flow**.
36+
1. Sign in to the Azure portal as the global administrator of your Azure AD B2C tenant.
37+
2. To switch to your Azure AD B2C tenant, select the B2C directory in the upper-right corner of the portal.
38+
3. Click **User flows**, and select **New user flow**.
39+
4. Click the **All** tab and select **Sign in using ROPC**.
40+
5. Provide a name for the user flow, such as *ROPC_Auth*.
41+
6. Under **Application claims**, click **Show more**.
42+
7. Select the application claims that you need for your application, such as Display Name, Email Address, and Identity Provider.
43+
8. Select **OK**, and then select **Create**.
44+
9. Click **Run user flow**.
4545

4646
You'll then see an endpoint such as this example:
4747

articles/active-directory-b2c/general-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Use this claims transformation to check if a claim exists or contains any value.
4444
### Example
4545

4646
- Input claims:
47-
- **inputClaim**: someone@contoso.com
47+
- **inputClaim**: someone@contoso.com
4848
- Output claims:
4949
- **outputClaim**: true
5050

articles/active-directory-b2c/json-transformations.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -48,11 +48,11 @@ In the following example, the claims transformation extracted the `emailAddress`
4848
### Example
4949

5050
- Input claims:
51-
- **inputJson**: {"emailAddress": "someone@example.com", "displayName": "Someone"}
51+
- **inputJson**: {"emailAddress": "someone@example.com", "displayName": "Someone"}
5252
- Input parameter:
5353
- **claimToExtract**: emailAddress
5454
- Output claims:
55-
- **extractedClaim**: someone@example.com
55+
- **extractedClaim**: someone@example.com
5656

5757

5858
## GetClaimsFromJsonArray
@@ -96,18 +96,18 @@ In the following example, the claims transformation extracts the following claim
9696
```
9797

9898
- Input claims:
99-
- **jsonSourceClaim**: [{"key":"email","value":"someone@example.com"}, {"key":"displayName","value":"Someone"}, {"key":"membershipNum","value":6353399}, {"key":"active","value": true}, {"key":"birthdate","value":"1980-09-23T00:00:00Z"}]
99+
- **jsonSourceClaim**: [{"key":"email","value":"someone@example.com"}, {"key":"displayName","value":"Someone"}, {"key":"membershipNum","value":6353399}, {"key":"active","value": true}, {"key":"birthdate","value":"1980-09-23T00:00:00Z"}]
100100
- Input parameters:
101101
- **errorOnMissingClaims**: false
102102
- **includeEmptyClaims**: false
103103
- **jsonSourceKeyName**: key
104104
- **jsonSourceValueName**: value
105105
- Output claims:
106-
- **email**: "someone@example.com"
107-
- **displayName**: "Someone"
108-
- **membershipNum**: 6353399
109-
- **active**: true
110-
- **birthdate**: 1980-09-23T00:00:00Z
106+
- **email**: "someone@example.com"
107+
- **displayName**: "Someone"
108+
- **membershipNum**: 6353399
109+
- **active**: true
110+
- **birthdate**: 1980-09-23T00:00:00Z
111111

112112
## GetNumericClaimFromJson
113113

@@ -146,7 +146,7 @@ In the following example, the claims transformation extracts the `id` element fr
146146
### Example
147147

148148
- Input claims:
149-
- **inputJson**: {"emailAddress": "someone@example.com", "displayName": "Someone", "id" : 6353399}
149+
- **inputJson**: {"emailAddress": "someone@example.com", "displayName": "Someone", "id" : 6353399}
150150
- Input parameters
151151
- **claimToExtract**: id
152152
- Output claims:
@@ -177,9 +177,9 @@ In the following example, the claims transformation extracts the first element (
177177
### Example
178178

179179
- Input claims:
180-
- **inputJsonClaim**: ["someone@example.com", "Someone", 6353399]
180+
- **inputJsonClaim**: ["someone@example.com", "Someone", 6353399]
181181
- Output claims:
182-
- **extractedClaim**: someone@example.com
182+
- **extractedClaim**: someone@example.com
183183

184184
## XmlStringToJsonString
185185

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -168,13 +168,13 @@ The following example shows a REST API that returns an error message formatted i
168168

169169
```JSON
170170
{
171-
  "version": "1.0.0",
172-
  "status": 409,
173-
  "code": "API12345",
174-
  "requestId": "50f0bd91-2ff4-4b8f-828f-00f170519ddb",
175-
  "userMessage": "Message for the user",
176-
  "developerMessage": "Verbose description of problem and how to fix it.",
177-
  "moreInfo": "https://restapi/error/API12345/moreinfo"
171+
"version": "1.0.0",
172+
"status": 409,
173+
"code": "API12345",
174+
"requestId": "50f0bd91-2ff4-4b8f-828f-00f170519ddb",
175+
"userMessage": "Message for the user",
176+
"developerMessage": "Verbose description of problem and how to fix it.",
177+
"moreInfo": "https://restapi/error/API12345/moreinfo"
178178
}
179179
```
180180

articles/active-directory-b2c/string-transformations.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -74,10 +74,10 @@ The self-asserted technical profile calls the validation **login-NonInteractive*
7474
### Example
7575

7676
- Input claims:
77-
- **inputClaim1**: someone@contoso.com
78-
- **inputClaim2**: someone@outlook.com
79-
- Input parameters:
80-
- **stringComparison**: ordinalIgnoreCase
77+
- **inputClaim1**: someone@contoso.com
78+
- **inputClaim2**: someone@outlook.com
79+
- Input parameters:
80+
- **stringComparison**: ordinalIgnoreCase
8181
- Result: Error thrown
8282

8383
## ChangeCase
@@ -109,11 +109,11 @@ Use this claim transformation to change any string ClaimType to lower or upper c
109109
### Example
110110

111111
- Input claims:
112-
- **email**: SomeOne@contoso.com
112+
- **email**: SomeOne@contoso.com
113113
- Input parameters:
114114
- **toCase**: LOWER
115115
- Output claims:
116-
- **email**: someone@contoso.com
116+
- **email**: someone@contoso.com
117117

118118
## CreateStringClaim
119119

@@ -177,8 +177,8 @@ Use this claims transformation to check if a claim is equal to another claim. Fo
177177
### Example
178178

179179
- Input claims:
180-
- **inputClaim1**: someone@contoso.com
181-
- **inputClaim2**: someone@outlook.com
180+
- **inputClaim1**: someone@contoso.com
181+
- **inputClaim2**: someone@outlook.com
182182
- Input parameters:
183183
- **operator**: NOT EQUAL
184184
- **ignoreCase**: true
@@ -317,7 +317,7 @@ Use this claims transformation to format any string with one parameter {0}. The
317317
- Input parameters:
318318
- **stringFormat**: cpim_{0}@{RelyingPartyTenantId}
319319
- Output claims:
320-
- **outputClaim**: cpim_5164db16-3eee-4629-bfda-dcc3326790e9@b2cdemo.onmicrosoft.com
320+
- **outputClaim**: cpim_5164db16-3eee-4629-bfda-dcc3326790e9@b2cdemo.onmicrosoft.com
321321

322322
## FormatStringMultipleClaims
323323

@@ -490,7 +490,7 @@ Use this claims transformation to parse the domain name after the @ symbol of th
490490
### Example
491491

492492
- Input claims:
493-
- **emailAddress**: joe@outlook.com
493+
- **emailAddress**: joe@outlook.com
494494
- Output claims:
495495
- **domain**: outlook.com
496496

0 commit comments

Comments
 (0)