This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ windows_tools
⚠️ missing_linux_example
⚠️ windows_first
Summary:
The documentation demonstrates a Windows bias by exclusively referencing Windows tools (e.g., Server Manager, AD FS Management), using only GUI-based instructions specific to Windows Server, and omitting any Linux or cross-platform alternatives for AD FS setup or management. There are no PowerShell or command-line examples, but all setup steps assume a Windows Server environment and do not mention or provide guidance for Linux-based AD FS alternatives or management approaches.
Recommendations:
  • Provide equivalent command-line (PowerShell and, where possible, cross-platform CLI) instructions for AD FS configuration, so that users can automate or script the process.
  • Acknowledge that AD FS is a Windows Server technology, but mention and link to any open source or cross-platform alternatives for federated identity (e.g., Keycloak, IdentityServer) and how they could be integrated with Azure AD B2C.
  • If possible, include a note or section for Linux users, clarifying that AD FS is not available on Linux, and suggest supported alternatives for similar scenarios.
  • Where GUI steps are described, offer PowerShell or REST API equivalents to improve automation and accessibility for non-Windows environments.
  • Reorder or supplement instructions to clarify platform dependencies early in the prerequisites section.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-09-13 00:00 #110 completed ❌ Biased
2025-08-13 00:00 #79 in_progress ❌ Biased
2025-07-13 21:17 #46 cancelled ❌ Biased
2025-07-13 21:11 #45 cancelled ✅ Clean
2025-07-13 20:48 #44 cancelled ❌ Biased
2025-07-13 20:32 #43 cancelled ❌ Biased
2025-07-09 13:09 #3 cancelled ✅ Clean
2025-07-08 04:23 #2 cancelled ❌ Biased

Flagged Code Snippets

<ClaimsProvider> <Domain>contoso.com</Domain> <DisplayName>Contoso</DisplayName> <TechnicalProfiles> <TechnicalProfile Id="Contoso-OpenIdConnect"> <DisplayName>Contoso</DisplayName> <Protocol Name="OpenIdConnect" /> <Metadata> <Item Key="METADATA">https://your-adfs-domain/adfs/.well-known/openid-configuration</Item> <Item Key="response_types">id_token</Item> <Item Key="response_mode">form_post</Item> <Item Key="scope">openid</Item> <Item Key="HttpBinding">POST</Item> <Item Key="UsePolicyInRedirectUri">0</Item> <!-- Update the Client ID below to the Application ID --> <Item Key="client_id">Your AD FS application ID</Item> </Metadata> <OutputClaims> <OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="upn" /> <OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name" /> <OutputClaim ClaimTypeReferenceId="surname" PartnerClaimType="family_name" /> <OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="unique_name" /> <OutputClaim ClaimTypeReferenceId="identityProvider" PartnerClaimType="iss" /> <OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" AlwaysUseDefaultValue="true" /> </OutputClaims> <OutputClaimsTransformations> <OutputClaimsTransformation ReferenceId="CreateRandomUPNUserName" /> <OutputClaimsTransformation ReferenceId="CreateUserPrincipalName" /> <OutputClaimsTransformation ReferenceId="CreateAlternativeSecurityId" /> </OutputClaimsTransformations> <UseTechnicalProfileForSessionManagement ReferenceId="SM-SocialLogin" /> </TechnicalProfile> </TechnicalProfiles> </ClaimsProvider>