Skip to content

Commit 079beac

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nw-agent
2 parents 658734e + e9d9661 commit 079beac

File tree

3,796 files changed

+35013
-41879
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,796 files changed

+35013
-41879
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -986,6 +986,12 @@
986986
"branch": "main",
987987
"branch_mapping": {}
988988
},
989+
{
990+
"path_to_root": "msdocs-app-service-sqldb-dotnetcore",
991+
"url": "https://github.com/Azure-Samples/msdocs-app-service-sqldb-dotnetcore",
992+
"branch": "main",
993+
"branch_mapping": {}
994+
},
989995
{
990996
"path_to_root": "azuresignalr-samples",
991997
"url": "https://github.com/aspnet/AzureSignalR-samples",

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5509,6 +5509,11 @@
55095509
"redirect_url": "/azure/azure-monitor/logs/resource-manager-workspace",
55105510
"redirect_document_id": false
55115511
},
5512+
{
5513+
"source_path_from_root": "/articles/azure-monitor/logs/resource-manager-cluster.md",
5514+
"redirect_url": "/azure/azure-monitor/logs/logs-dedicated-clusters",
5515+
"redirect_document_id": false
5516+
},
55125517
{
55135518
"source_path_from_root": "/articles/azure-monitor/visualize/powerbi.md",
55145519
"redirect_url": "/azure/azure-monitor/logs/log-powerbi",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/education-hub/custom-tenant-set-up-classroom.md",
5+
"redirect_url": "/articles/education-hub/about-education-hub.md",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

.openpublishing.redirection.json

Lines changed: 613 additions & 26 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.sentinel.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1624,6 +1624,16 @@
16241624
"source_path_from_root": "/articles/sentinel/data-connectors/fortinet.md",
16251625
"redirect_url": "/azure/sentinel/data-connectors/deprecated-fortinet-via-legacy-agent",
16261626
"redirect_document_id": true
1627+
},
1628+
{
1629+
"source_path_from_root": "/articles/sentinel/data-connectors/cisco-stealthwatch.md",
1630+
"redirect_url": "/azure/sentinel/data-connectors-reference",
1631+
"redirect_document_id": false
1632+
},
1633+
{
1634+
"source_path_from_root": "/articles/sentinel/data-connectors/hyas-protect.md",
1635+
"redirect_url": "/azure/sentinel/data-connectors-reference",
1636+
"redirect_document_id": false
16271637
}
16281638
]
16291639
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -434,6 +434,11 @@
434434
"source_path_from_root": "/articles/virtual-desktop/configure-rdp-shortpath-limit-ports-public-networks.md",
435435
"redirect_url": "/azure/virtual-desktop/configure-rdp-shortpath",
436436
"redirect_document_id": true
437+
},
438+
{
439+
"source_path_from_root": "/articles/virtual-desktop/disaster-recovery.md",
440+
"redirect_url": "/azure/virtual-desktop/disaster-recovery-concepts",
441+
"redirect_document_id": true
437442
}
438443
]
439444
}

articles/active-directory-b2c/faq.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -274,6 +274,12 @@ sections:
274274
275275
* API connectors
276276
* Conditional Access
277+
278+
- question: |
279+
I am using rolling refresh tokens for my application and I am getting an invalid_grant error on redeeming newly acquired refresh tokens well within their set validity period. Why does this happen?
280+
answer: |
281+
While determining validity for rolling refresh tokens, B2C will consider the initial login time of the user in the application also to calculate the token validity skew. If the user haven't logged out of the application for a very long time, this skew value will exceed the validity period of the token and hence for security reasons the tokens will be considered as invalid. Hence the error. Inform the user to perform a proper logout and login back into the application and this should reset the skew. This scenario is not applicable if refresh token rolling is set as infinite rolling.
282+
277283
278284
- question: |
279285
I've revoked the refresh token using Microsoft Graph invalidateAllRefreshTokens, or Microsoft Graph PowerShell, Revoke-MgUserSignInSession. Why is Azure AD B2C still accepting the old refresh token?
@@ -286,6 +292,9 @@ sections:
286292
1. Wait for 10 minutes.
287293
288294
1. Retrieve the `RefreshToken` again.
295+
296+
> [!TIP]
297+
> With Azure AD B2C [custom policy](custom-policy-overview.md), you can reduce the above mentioned skew time of 5 minutes (300000 milliseconds) by adjusting the value for InputParameter "TreatAsEqualIfWithinMillseconds" under claim transformation Id "AssertRefreshTokenIssuedLaterThanValidFromDate". This claim transformation can be found in the TrustFrameworkBase.xml file under latest custom policy [stater-pack](https://learn.microsoft.com/en-us/azure/active-directory-b2c/tutorial-create-user-flows?pivots=b2c-custom-policy#get-the-starter-pack).
289298
290299
- question: |
291300
I use multiple tabs in a web browser to sign in to multiple applications that I registered in the same Azure AD B2C tenant. When I try to perform a single sign-out, not all of the applications are signed out. Why does this happen?

articles/active-directory-b2c/javascript-and-page-layout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ zone_pivot_groups: b2c-policy-type
2323

2424
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2525

26-
With Azure Active Directory B2C (Azure AD B2C) [HTML templates](customize-ui-with-html.md), you can craft your users' identity experiences. Your HTML templates can contain only certain HTML tags and attributes. Basic HTML tags, such as &lt;b&gt;, &lt;i&gt;, &lt;u&gt;, &lt;h1&gt;, and &lt;hr&gt; are allowed. More advanced tags such as &lt;script&gt;, and &lt;iframe&gt; are removed for security reasons but the `<script>` tag should be added in the `<head>` tag.
26+
With Azure Active Directory B2C (Azure AD B2C) [HTML templates](customize-ui-with-html.md), you can craft your users' identity experiences. Your HTML templates can contain only certain HTML tags and attributes. Basic HTML tags, such as &lt;b&gt;, &lt;i&gt;, &lt;u&gt;, &lt;h1&gt;, and &lt;hr&gt; are allowed. More advanced tags such as &lt;script&gt;, and &lt;iframe&gt; are removed for security reasons but the `<script>` tag should be added in the `<head>` tag. From selfasserted page layout version 2.1.21 / unifiedssp version 2.1.10 / multifactor version 1.2.10 onwards B2C doesn't support adding scripts in `<body>` tag (as this can pose a risk for cross site scripting attack). Migrating existing scripts from `<body>` to `<head>` may at-times require rewriting existing scripts with mutation observers for proper working.
2727

2828
The `<script>` tag should be added in the `<head>` tag in two ways:
2929

articles/active-directory-b2c/manage-user-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.custom: fasttrack-edit
2222

2323
This article discusses how you can manage the user data in Azure Active Directory B2C (Azure AD B2C) by using the operations that are provided by the [Microsoft Graph API](/graph/use-the-api). Managing user data includes deleting or exporting data from audit logs.
2424

25-
[!INCLUDE [gdpr-intro-sentence.md](../../includes/gdpr-intro-sentence.md)]
25+
[!INCLUDE [gdpr-intro-sentence.md](~/reusable-content/ce-skilling/azure/includes/gdpr-intro-sentence.md)]
2626

2727
## Delete user data
2828

articles/active-directory-b2c/quickstart-native-app-desktop.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.subservice: B2C
2121

2222
Azure Active Directory B2C (Azure AD B2C) provides cloud identity management to keep your application, business, and customers protected. Azure AD B2C enables your applications to authenticate to social accounts and enterprise accounts using open standard protocols. In this quickstart, you use a Windows Presentation Foundation (WPF) desktop application to sign in using a social identity provider and call an Azure AD B2C protected web API.
2323

24-
[!INCLUDE [quickstarts-free-trial-note](../../includes/quickstarts-free-trial-note.md)]
24+
[!INCLUDE [quickstarts-free-trial-note](~/reusable-content/ce-skilling/azure/includes/quickstarts-free-trial-note.md)]
2525

2626
## Prerequisites
2727

0 commit comments

Comments
 (0)