This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ windows_tools
⚠️ missing_linux_example
⚠️ windows_first
Summary:
The documentation demonstrates Windows bias by exclusively referencing Windows-specific tools (such as Server Manager and AD FS Management), providing only GUI-based instructions for AD FS setup, and omitting any Linux or cross-platform alternatives. There are no command-line or Linux-based examples for configuring AD FS or equivalent identity providers, and all instructions assume a Windows Server environment.
Recommendations:
  • Provide equivalent command-line instructions using PowerShell and, if possible, cross-platform tools or APIs.
  • Acknowledge that AD FS is a Windows-only technology, but suggest or link to Linux-compatible alternatives (such as Shibboleth, Keycloak, or other OpenID Connect providers) for non-Windows environments.
  • Include a section or appendix outlining how to integrate Azure AD B2C with OpenID Connect providers running on Linux, with example configurations.
  • Clarify early in the documentation that the steps are specific to Windows Server and AD FS, and offer guidance for users on other platforms.
  • Where possible, reference REST APIs or scripting approaches that could be used from non-Windows systems to automate or replicate the configuration.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-09-13 00:00 #110 completed ❌ Biased
2025-08-13 00:00 #79 in_progress ❌ Biased
2025-07-13 21:17 #46 cancelled ❌ Biased
2025-07-13 21:11 #45 cancelled ✅ Clean
2025-07-13 20:48 #44 cancelled ❌ Biased
2025-07-13 20:32 #43 cancelled ❌ Biased
2025-07-09 13:09 #3 cancelled ✅ Clean
2025-07-08 04:23 #2 cancelled ❌ Biased

Flagged Code Snippets

<ClaimsProvider> <Domain>contoso.com</Domain> <DisplayName>Contoso</DisplayName> <TechnicalProfiles> <TechnicalProfile Id="Contoso-OpenIdConnect"> <DisplayName>Contoso</DisplayName> <Protocol Name="OpenIdConnect" /> <Metadata> <Item Key="METADATA">https://your-adfs-domain/adfs/.well-known/openid-configuration</Item> <Item Key="response_types">id_token</Item> <Item Key="response_mode">form_post</Item> <Item Key="scope">openid</Item> <Item Key="HttpBinding">POST</Item> <Item Key="UsePolicyInRedirectUri">0</Item> <!-- Update the Client ID below to the Application ID --> <Item Key="client_id">Your AD FS application ID</Item> </Metadata> <OutputClaims> <OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="upn" /> <OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name" /> <OutputClaim ClaimTypeReferenceId="surname" PartnerClaimType="family_name" /> <OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="unique_name" /> <OutputClaim ClaimTypeReferenceId="identityProvider" PartnerClaimType="iss" /> <OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" AlwaysUseDefaultValue="true" /> </OutputClaims> <OutputClaimsTransformations> <OutputClaimsTransformation ReferenceId="CreateRandomUPNUserName" /> <OutputClaimsTransformation ReferenceId="CreateUserPrincipalName" /> <OutputClaimsTransformation ReferenceId="CreateAlternativeSecurityId" /> </OutputClaimsTransformations> <UseTechnicalProfileForSessionManagement ReferenceId="SM-SocialLogin" /> </TechnicalProfile> </TechnicalProfiles> </ClaimsProvider>