Skip to content

Commit 0410b6e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into 1-12-power-platform
2 parents dddd842 + 977ab33 commit 0410b6e

File tree

1,013 files changed

+18440
-12022
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,013 files changed

+18440
-12022
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -998,6 +998,7 @@
998998
".openpublishing.redirection.baremetal-infrastructure.json",
999999
"articles/iot-dps/.openpublishing.redirection.iot-dps.json",
10001000
"articles/cloud-shell/.openpublishing.redirection.cloud-shell.json",
1001-
".openpublishing.redirection.azure-vmware.json"
1001+
".openpublishing.redirection.azure-vmware.json",
1002+
".openpublishing.redirection.openshift.json"
10021003
]
10031004
}

.openpublishing.redirection.active-directory.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11055,6 +11055,21 @@
1105511055
"source_path_from_root": "/articles/active-directory/develop/microsoft-graph-intro.md",
1105611056
"redirect_url": "/graph/overview?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json",
1105711057
"redirect_document_id": false
11058+
},
11059+
{
11060+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/concept-privileged-access-versus-role-assignable.md",
11061+
"redirect_url": "azure/active-directory/privileged-identity-management/concept-pim-for-groups",
11062+
"redirect_document_id": false
11063+
},
11064+
{
11065+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/groups-features.md",
11066+
"redirect_url": "azure/active-directory/privileged-identity-management/concept-pim-for-groups",
11067+
"redirect_document_id": false
11068+
},
11069+
{
11070+
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/product-data-inventory.md",
11071+
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/product-data-billable-resources",
11072+
"redirect_document_id": false
1105811073
}
1105911074
]
1106011075
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3787,14 +3787,19 @@
37873787
"redirect_url": "/azure/azure-monitor/alerts/alerts-classic-portal",
37883788
"redirect_document_id": false
37893789
},
3790+
{
3791+
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema-definitions.md",
3792+
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
3793+
"redirect_document_id": false
3794+
},
37903795
{
37913796
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema.md",
37923797
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
37933798
"redirect_document_id": false
37943799
},
37953800
{
3796-
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema-definitions.md",
3797-
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema-definitions",
3801+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-common-schema-definitions.md",
3802+
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
37983803
"redirect_document_id": false
37993804
},
38003805
{
@@ -5661,6 +5666,21 @@
56615666
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-workloads.md",
56625667
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine-data-collection",
56635668
"redirect_document_id": false
5669+
},
5670+
{
5671+
"source_path_from_root": "/articles/azure-monitor/logs/azure-data-explorer-monitor-cross-service-query.md",
5672+
"redirect_url": "/azure/azure-monitor/logs/azure-monitor-data-explorer-proxy",
5673+
"redirect_document_id": false
5674+
},
5675+
{
5676+
"source_path_from_root": "/articles/azure-monitor/app/mobile-center-quickstart.md",
5677+
"redirect_url": "https://github.com/Microsoft/appcenter",
5678+
"redirect_document_id": false
5679+
},
5680+
{
5681+
"source_path_from_root": "/articles/azure-monitor/app/windows-desktop.md",
5682+
"redirect_url": "https://github.com/Microsoft/appcenter",
5683+
"redirect_document_id": false
56645684
}
56655685
]
56665686
}

.openpublishing.redirection.azure-productivity.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,11 @@
8989
"source_path": "articles/lab-services/how-to-enable-nested-virtualization-template-vm.md",
9090
"redirect_url": "/azure/lab-services/concept-nested-virtualization-template-vm",
9191
"redirect_document_id": true
92+
},
93+
{
94+
"source_path": "articles/lab-services/troubleshoot.md",
95+
"redirect_url": "/azure/lab-services/troubleshoot-lab-creation",
96+
"redirect_document_id": true
9297
}
9398
]
9499
}

.openpublishing.redirection.defender-for-iot.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -654,6 +654,11 @@
654654
"redirect_url": "/azure/defender-for-iot/device-builders/tutorial-standalone-agent-binary-installation",
655655
"redirect_document_id": false
656656
},
657+
{
658+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-connect-sensor-by-proxy.md",
659+
"redirect_url": "/azure/defender-for-iot/organizations/connect-sensors",
660+
"redirect_document_id": false
661+
},
657662
{
658663
"source_path_from_root": "/articles/defender-for-iot/organizations/references-defender-for-iot-glossary.md",
659664
"redirect_url": "/azure/defender-for-iot/organizations/overview",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18384,6 +18384,11 @@
1838418384
"redirect_url": "/azure/sentinel/enable-monitoring",
1838518385
"redirect_document_id": false
1838618386
},
18387+
{
18388+
"source_path_from_root": "/articles/sentinel/web-normalization-schema.md",
18389+
"redirect_url": "/azure/sentinel/normalization-schema-web",
18390+
"redirect_document_id": true
18391+
},
1838718392
{
1838818393
"source_path_from_root": "/articles/sentinel/dns-normalization-schema.md",
1838918394
"redirect_url": "/azure/sentinel/normalization-schema-dns",
@@ -27965,6 +27970,11 @@
2796527970
"redirect_url": "/azure/azure-cache-for-redis/cache-insights-overview",
2796627971
"redirect_document_id": false
2796727972
},
27973+
{
27974+
"source_path_from_root": "/articles/aks/uptime-sla.md",
27975+
"redirect_url": "/azure/aks/free-standard-pricing-tiers",
27976+
"redirect_document_id": "false"
27977+
},
2796827978
{
2796927979
"source_path": "articles/dotnet-develop-multitenant-applications.md",
2797027980
"redirect_URL": "/azure/architecture/guide/multitenant/overview",
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/openshift/cluster-administration-cluster-admin-role.md",
5+
"redirect_url": "/azure/openshift/intro-openshift",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/openshift/cluster-administration-security-context-constraints.md",
10+
"redirect_url": "/azure/openshift/intro-openshift",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/openshift/howto-aad-app-configuration.md",
15+
"redirect_url": "/azure/openshift/intro-openshift",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/openshift/howto-create-private-cluster-3x.md",
20+
"redirect_url": "/azure/openshift/intro-openshift",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/openshift/howto-create-tenant.md",
25+
"redirect_url": "/azure/openshift/intro-openshift",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/openshift/howto-deploy-prometheus.md",
30+
"redirect_url": "/azure/openshift/intro-openshift",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path_from_root": "/articles/openshift/howto-manage-projects.md",
35+
"redirect_url": "/azure/openshift/intro-openshift",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/openshift/howto-run-privileged-containers.md",
40+
"redirect_url": "/azure/openshift/intro-openshift",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/openshift/howto-setup-environment.md",
45+
"redirect_url": "/azure/openshift/intro-openshift",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path_from_root": "/articles/openshift/migration.md",
50+
"redirect_url": "/azure/openshift/intro-openshift",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path_from_root": "/articles/openshift/supported-resources.md",
55+
"redirect_url": "/azure/openshift/intro-openshift",
56+
"redirect_document_id": false
57+
}
58+
]
59+
}
68.3 KB
Loading

articles/active-directory-b2c/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.workload: identity
1010
ms.topic: overview
1111
ms.date: 10/26/2022
1212
ms.custom: engagement-fy23
13-
ms.author: kengaderdus
13+
ms.author: godonnell
1414
ms.subservice: B2C
1515
---
1616

articles/active-directory-b2c/partner-datawiza.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@ ms.reviewer: kengaderdus
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/12/2022
12+
ms.date: 01/23/2023
1313
ms.author: gasinh
1414
ms.subservice: B2C
1515
---
1616

1717
# Tutorial: Configure Azure Active Directory B2C with Datawiza to provide secure hybrid access
1818

19-
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with [Datawiza Access Broker (DAB)](https://www.datawiza.com/access-broker). DAB enables single sign-on (SSO) and granular access control, helping Azure AD B2C protect on-premises legacy applications. With this solution, enterprises can transition from legacy to Azure AD B2C without rewriting applications.
19+
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with [Datawiza Access Proxy (DAP)](https://www.datawiza.com/), which enables single sign-on (SSO) and granular access control, helping Azure AD B2C protect on-premises legacy applications. With this solution, enterprises can transition from legacy to Azure AD B2C without rewriting applications.
2020

2121
## Prerequisites
2222

@@ -29,7 +29,7 @@ To get started, you'll need:
2929
- Your applications can run on platforms such as virtual machine and bare metal
3030
- An on-premises application to transition from a legacy identity system, to Azure AD B2C
3131
- In this tutorial, DAB is deployed on the same server as the application
32-
- The application runs on localhost: 3001 and DAB proxies traffic to applications via localhost: 9772
32+
- The application runs on localhost: 3001 and DAP proxies traffic to applications via localhost: 9772
3333
- The application traffic reaches DAB first and then is proxied to the application
3434

3535
## Scenario description
@@ -38,17 +38,17 @@ Datawiza integration includes the following components:
3838

3939
- **Azure AD B2C**: The authorization server to verify user credentials
4040
- Authenticated users access on-premises applications using a local account stored in the Azure AD B2C directory
41-
- **Datawiza Access Broker (DAB)**: The service that passes identity to applications through HTTP headers
41+
- **Datawiza Access Proxy (DAP)**: The service that passes identity to applications through HTTP headers
4242
- **Datawiza Cloud Management Console (DCMC)**: A management console for DAB. DCMC UI and RESTful APIs help manage DAB configurations and access control policies
4343

4444
The following architecture diagram shows the implementation.
4545

4646
![Diagram of the architecture of an Azure AD B2C integration with Datawiza for secure access to hybrid applications.](./media/partner-datawiza/datawiza-architecture-diagram.png)
4747

4848
1. The user requests access to an on-premises application. DAB proxies the request to the application.
49-
2. DAB checks user authentication state. With no session token, or an invalid token, the user goes to Azure AD B2C for authentication.
50-
3. Azure AD B2C sends the user request to the endpoint specified during DAB registration in the Azure AD B2C tenant.
51-
4. The DAB evaluates access policies and calculates attribute values in HTTP headers forwarded to the application. The DAB might call to the identity provider (IdP) to retrieve information to set the header values. The DAB sets the header values and sends the request to the application.
49+
2. DAP checks user authentication state. With no session token, or an invalid token, the user goes to Azure AD B2C for authentication.
50+
3. Azure AD B2C sends the user request to the endpoint specified during DAP registration in the Azure AD B2C tenant.
51+
4. The DAP evaluates access policies and calculates attribute values in HTTP headers forwarded to the application. The DAP might call to the identity provider (IdP) to retrieve information to set the header values. The DAP sets the header values and sends the request to the application.
5252
5. The user is authenticated with access to the application.
5353

5454
## Onboard with Datawiza
@@ -74,11 +74,11 @@ Go to docs.datawiza.com to:
7474

7575
## Run DAB with a header-based application
7676

77-
You can use Docker or Kubernetes to run DAB. Use the Docker image for users to create a sample header-based application.
77+
You can use Docker or Kubernetes to run DAP. Use the Docker image for users to create a sample header-based application.
7878

79-
Learn more: To configure DAB and SSO integration, see [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html)
79+
Learn more: To configure DAP and SSO integration, see [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html)
8080

81-
A sample docker image `docker-compose.yml file` is provided. Sign in to the container registry to download DAB images and the header-based application.
81+
A sample docker image `docker-compose.yml file` is provided. Sign in to the container registry to download DAP images and the header-based application.
8282

8383
1. [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html#important-step).
8484

@@ -114,17 +114,17 @@ A sample docker image `docker-compose.yml file` is provided. Sign in to the cont
114114

115115
DAB gets user attributes from IdP and passes them to the application with header or cookie. After you configure user attributes, the green check sign appears for user attributes.
116116

117-
![Screenshot of passed user attributes.](./media/partner-datawiza/pass-user-attributes.png)
117+
![Screenshot of passed user attributes.](./media/partner-datawiza/pass-user-attributes-new.png)
118118

119119
Learn more: [Pass User Attributes](https://docs.datawiza.com/step-by-step/step4.html) such as email address, firstname, and lastname to the header-based application.
120120

121121
## Test the flow
122122

123123
1. Navigate to the on-premises application URL.
124-
2. The DAB redirects to the page you configured in your user flow.
124+
2. The DAP redirects to the page you configured in your user flow.
125125
3. From the list, select the IdP.
126126
4. At the prompt, enter your credentials. If necessary, include an Azure AD Multi-Factor Authentication (MFA) token.
127-
5. You're redirected to Azure AD B2C, which forwards the application request to the DAB redirect URI.
127+
5. You're redirected to Azure AD B2C, which forwards the application request to the DAP redirect URI.
128128
6. The DAB evaluates policies, calculates headers, and sends the user to the upstream application.
129129
7. The requested application appears.
130130

0 commit comments

Comments
 (0)