Skip to content

Commit 084d879

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/azure-docs-pr into 0215-stack-known-issue
2 parents 65f75fa + 2b1ff13 commit 084d879

File tree

2,368 files changed

+72923
-23887
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,368 files changed

+72923
-23887
lines changed

.openpublishing.redirection.app-service.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/app-service/security-recommendations.md",
5+
"redirect_url": "/security/benchmark/azure/baselines/app-service-security-baseline",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/app-service/scenario-secure-app-authentication-app-service-as-user.md",
510
"redirect_url": "/azure/app-service/scenario-secure-app-authentication-app-service",

.openpublishing.redirection.azure-monitor.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1807,7 +1807,7 @@
18071807
},
18081808
{
18091809
"source_path_from_root": "/articles/monitoring-and-diagnostics/resource-group-insights.md",
1810-
"redirect_url": "/azure/azure-monitor/insights/resource-group-insights",
1810+
"redirect_url": "/azure/azure-resource-manager/management/resource-group-insights",
18111811
"redirect_document_id": true
18121812
},
18131813
{
@@ -6608,6 +6608,11 @@
66086608
"source_path_from_root": "/articles/azure-monitor/monitor-reference.md",
66096609
"redirect_url": "/azure/azure-monitor/overview",
66106610
"redirect_document_id": false
6611+
},
6612+
{
6613+
"source_path_from_root": "/articles/azure-monitor/insights/resource-group-insights.md",
6614+
"redirect_url": "/azure/azure-resource-manager/management/resource-group-insights",
6615+
"redirect_document_id": false
66116616
}
66126617
]
66136618
}

.openpublishing.redirection.json

Lines changed: 25 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2290,6 +2290,31 @@
22902290
"redirect_url": "/azure/automation/automation-solution-vm-management",
22912291
"redirect_document_id": false
22922292
},
2293+
{
2294+
"source_path_from_root": "/articles/automation/automation-solution-vm-management.md",
2295+
"redirect_url":"/azure/azure-functions/start-stop-vms/overview",
2296+
"redirect_document_id": false
2297+
},
2298+
{
2299+
"source_path_from_root": "/articles/automation/automation-solution-vm-management-config.md",
2300+
"redirect_url": "/azure/azure-functions/start-stop-vms/deploy",
2301+
"redirect_document_id": false
2302+
},
2303+
{
2304+
"source_path_from_root": "/articles/automation/automation-solution-vm-management-logs.md",
2305+
"redirect_url": "/azure/azure-functions/start-stop-vms/deploy",
2306+
"redirect_document_id": false
2307+
},
2308+
{
2309+
"source_path_from_root": "/articles/automation/automation-solution-vm-management-remove.md",
2310+
"redirect_url": "/azure/azure-functions/start-stop-vms/remove",
2311+
"redirect_document_id": false
2312+
},
2313+
{
2314+
"source_path_from_root": "/articles/automation/troubleshoot/start-stop-vm.md",
2315+
"redirect_url": "/azure/azure-functions/start-stop-vms/troubleshoot",
2316+
"redirect_document_id": false
2317+
},
22932318
{
22942319
"source_path_from_root": "/articles/update-center/enable-machines.md",
22952320
"redirect_url": "/azure/update-center/updates-maintenance-schedules",
@@ -10640,11 +10665,6 @@
1064010665
"redirect_url": "/azure/orbital/overview",
1064110666
"redirect_document_id": false
1064210667
},
10643-
{
10644-
"source_path_from_root": "/articles/load-balancer/cross-region-overview.md",
10645-
"redirect_url": "/azure/reliability/reliability-load-balancer",
10646-
"redirect_document_id": false
10647-
},
1064810668
{
1064910669
"source_path_from_root": "/articles/load-balancer/load-balancer-standard-availability-zones.md",
1065010670
"redirect_url": "/azure/reliability/reliability-load-balancer",

.openpublishing.redirection.sentinel.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1054,6 +1054,21 @@
10541054
"source_path_from_root": "/articles/sentinel/process-events-normalization-schema.md",
10551055
"redirect_url": "/azure/sentinel/normalization-schema-process-event",
10561056
"redirect_document_id": true
1057+
},
1058+
{
1059+
"source_path_from_root": "/articles/sentinel/notebooks-with-synapse.md",
1060+
"redirect_url": "/azure/sentinel/notebooks-hunt",
1061+
"redirect_document_id": false
1062+
},
1063+
{
1064+
"source_path_from_root": "/articles/sentinel/notebooks-with-synapse-export-data.md",
1065+
"redirect_url": "/azure/sentinel/notebooks-hunt",
1066+
"redirect_document_id": false
1067+
},
1068+
{
1069+
"source_path_from_root": "/articles/sentinel/notebooks-with-synapse-hunt.md",
1070+
"redirect_url": "/azure/sentinel/notebooks-hunt",
1071+
"redirect_document_id": false
10571072
}
10581073
]
10591074
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@
6363
{
6464
"source_path_from_root": "/articles/virtual-desktop/user-documentation/connect-windows-7-10.md",
6565
"redirect_url": "/azure/virtual-desktop/users/connect-windows",
66-
"redirect_document_id": true
66+
"redirect_document_id": false
6767
},
6868
{
6969
"source_path_from_root": "/articles/virtual-desktop/user-documentation/index.yml",
@@ -374,6 +374,36 @@
374374
"source_path_from_root": "/articles/virtual-desktop/autoscale-new-existing-host-pool.md",
375375
"redirect_url": "/azure/virtual-desktop/autoscale-scaling-plan",
376376
"redirect_document_id": true
377+
},
378+
{
379+
"source_path_from_root": "/articles/virtual-desktop/users/connect-windows-azure-virtual-desktop-app.md",
380+
"redirect_url": "/azure/virtual-desktop/users/connect-windows",
381+
"redirect_document_id": true
382+
},
383+
{
384+
"source_path_from_root": "/articles/virtual-desktop/users/connect-microsoft-store.md",
385+
"redirect_url": "/azure/virtual-desktop/users/connect-windows",
386+
"redirect_document_id": false
387+
},
388+
{
389+
"source_path_from_root": "/articles/virtual-desktop/users/client-features-windows-azure-virtual-desktop-app.md",
390+
"redirect_url": "/azure/virtual-desktop/users/client-features-windows",
391+
"redirect_document_id": true
392+
},
393+
{
394+
"source_path_from_root": "/articles/virtual-desktop/users/client-features-microsoft-store.md",
395+
"redirect_url": "/azure/virtual-desktop/users/client-features-windows",
396+
"redirect_document_id": false
397+
},
398+
{
399+
"source_path_from_root": "/articles/virtual-desktop/whats-new-client-windows-azure-virtual-desktop-app.md",
400+
"redirect_url": "/azure/virtual-desktop/whats-new-client-windows",
401+
"redirect_document_id": true
402+
},
403+
{
404+
"source_path_from_root": "/articles/virtual-desktop/whats-new-client-microsoft-store.md",
405+
"redirect_url": "/azure/virtual-desktop/whats-new-client-windows",
406+
"redirect_document_id": false
377407
}
378408
]
379409
}

articles/active-directory-b2c/custom-domain.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Enable Azure AD B2C custom domains
2+
title: Enable custom domains in Azure Active Directory B2C
33
titleSuffix: Azure AD B2C
4-
description: Learn how to enable custom domains in your redirect URLs for Azure Active Directory B2C.
4+
description: Learn how to enable custom domains in your redirect URLs for Azure Active Directory B2C, so that my users have a seamless experience.
55
author: kengaderdus
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 02/14/2024
1010
ms.author: kengaderdus
1111
ms.subservice: B2C
1212
ms.custom: "b2c-support"
@@ -15,7 +15,7 @@ zone_pivot_groups: b2c-policy-type
1515
#Customer intent: As a developer, I want to use my own domain name for the sign-in and sign-up experience, so that my users have a seamless experience.
1616
---
1717

18-
# Enable custom domains for Azure Active Directory B2C
18+
# Enable custom domains in Azure Active Directory B2C
1919

2020
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2121

@@ -52,8 +52,12 @@ When using custom domains, consider the following:
5252

5353
- You can set up multiple custom domains. For the maximum number of supported custom domains, see [Microsoft Entra service limits and restrictions](/entra/identity/users/directory-service-limits-restrictions) for Azure AD B2C and [Azure subscription and service limits, quotas, and constraints](/azure/azure-resource-manager/management/azure-subscription-service-limits#azure-front-door-classic-limits) for Azure Front Door.
5454
- Azure Front Door is a separate Azure service, so extra charges will be incurred. For more information, see [Front Door pricing](https://azure.microsoft.com/pricing/details/frontdoor).
55-
- After you configure custom domains, users will still be able to access the Azure AD B2C default domain name *<tenant-name>.b2clogin.com* (unless you're using a custom policy and you [block access](#optional-block-access-to-the-default-domain-name).
56-
- If you have multiple applications, migrate them all to the custom domain because the browser stores the Azure AD B2C session under the domain name currently being used.
55+
- If you've multiple applications, migrate all oft them to the custom domain because the browser stores the Azure AD B2C session under the domain name currently being used.
56+
- After you configure custom domains, users will still be able to access the Azure AD B2C default domain name *<tenant-name>.b2clogin.com*. You need to block access to the default domain so that attackers can't use it to access your apps or run distributed denial-of-service (DDoS) attacks. [Submit a support ticket](find-help-open-support-ticket.md) to request for the blocking of access to the default domain.
57+
58+
> [!WARNING]
59+
> Don't request blocking of the default domain until your custom domain works properly.
60+
5761

5862
## Prerequisites
5963

articles/active-directory-b2c/custom-policies-series-validate-user-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Azure Active Directory B2C (Azure AD B2C) custom policy not only allows you to m
4949

5050
## Step 1 - Validate user input by limiting user input options
5151

52-
If you know all the possible values that a user can enter for a given input, you can provide a finite set of values that a user must select from. You can use *DropdownSinglSelect*, *CheckboxMultiSelect*, and *RadioSingleSelect* [UserInputType](claimsschema.md#userinputtype) for this purpose. In this article, you'll use a *RadioSingleSelect* input type:
52+
If you know all the possible values that a user can enter for a given input, you can provide a finite set of values that a user must select from. You can use *DropdownSingleSelect*, *CheckboxMultiSelect*, and *RadioSingleSelect* [UserInputType](claimsschema.md#userinputtype) for this purpose. In this article, you'll use a *RadioSingleSelect* input type:
5353

5454
1. In VS Code, open the file `ContosoCustomPolicy.XML`.
5555

articles/active-directory-b2c/find-help-open-support-ticket.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ If you're unable to find answers by using self-help resources, you can open an o
4141
4242
1. Sign in to the [Azure portal](https://portal.azure.com).
4343

44-
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
44+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra tenant from the **Directories + subscriptions** menu. Currently, you can't submit support cases directly from your Azure AD B2C tenant.
4545

4646
1. In the Azure portal, search for and select **Microsoft Entra ID**.
4747

0 commit comments

Comments
 (0)