Skip to content

Commit 0e41c5e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into dashboard-widgets
2 parents 83a2f9c + 9c7932e commit 0e41c5e

File tree

2,877 files changed

+27560
-28095
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,877 files changed

+27560
-28095
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,9 +135,9 @@
135135
"branch_mapping": {}
136136
},
137137
{
138-
"path_to_root": "ms-identity-dotnetcore-b2c-account-management",
138+
"path_to_root": "ms-identity-dotnetcore-b2c-account-management-archive",
139139
"url": "https://github.com/Azure-Samples/ms-identity-dotnetcore-b2c-account-management",
140-
"branch": "master",
140+
"branch": "archive",
141141
"branch_mapping": {}
142142
},
143143
{

.openpublishing.redirection.azure-kubernetes-service.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,11 @@
8080
"redirect_url": "/azure/aks/azure-csi-files-storage-provision",
8181
"redirect_document_id": false
8282
},
83+
{
84+
"source_path_from_root": "/articles/aks/learn/tutorial-kubernetes-workload-identity.md",
85+
"redirect_url": "/azure/aks/workload-identity-deploy-cluster",
86+
"redirect_document_id": false
87+
},
8388
{
8489
"source_path_from_root": "/articles/aks/workload-identity-migration-sidecar.md",
8590
"redirect_url": "/azure/aks/workload-identity-migrate-from-pod-identity",
@@ -451,11 +456,6 @@
451456
"redirect_url": "/azure/aks/create-node-pools",
452457
"redirect_document_id": false
453458
},
454-
{
455-
"source_path_from_root": "/articles/copilot/limited-access.md",
456-
"redirect_url": "/azure/copilot/manage-access",
457-
"redirect_document_id": false
458-
},
459459
{
460460
"source_path_from_root": "/articles/aks/command-invoke.md",
461461
"redirect_url": "/azure/aks/access-private-cluster",

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6679,6 +6679,11 @@
66796679
"redirect_url": "/azure/azure-monitor/monitor-azure-monitor-reference",
66806680
"redirect_document_id": false
66816681
},
6682+
{
6683+
"source_path_from_root": "/articles/azure-monitor/azure-monitor-monitoring-reference.md",
6684+
"redirect_url": "/azure/azure-monitor/monitor-azure-monitor-reference",
6685+
"redirect_document_id": false
6686+
},
66826687
{
66836688
"source_path_from_root": "/articles/azure-monitor/ai-ops/responsible-ai-faq.md",
66846689
"redirect_url": "/azure/copilot/overview",
@@ -6694,11 +6699,6 @@
66946699
"redirect_url": "/azure/copilot/overview",
66956700
"redirect_document_id": false
66966701
},
6697-
{
6698-
"source_path_from_root": "/articles/azure-monitor/azure-monitor-monitoring-reference.md",
6699-
"redirect_url": "/azure/azure-monitor/monitor-azure-monitor-reference",
6700-
"redirect_document_id": false
6701-
},
67026702
{
67036703
"source_path_from_root": "/articles/azure-monitor/insights/resource-group-insights.md",
67046704
"redirect_url": "/azure/azure-resource-manager/management/resource-group-insights",

.openpublishing.redirection.azure-resource-manager.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1920,6 +1920,11 @@
19201920
"redirect_url": "/azure/azure-resource-manager/managed-applications/overview",
19211921
"redirect_document_id": false
19221922
},
1923+
{
1924+
"source_path_from_root": "/articles/azure-resource-manager/managed-applications/deploy-marketplace-app-quickstart.md",
1925+
"redirect_url": "/azure/azure-resource-manager/managed-applications/deploy-service-catalog-quickstart",
1926+
"redirect_document_id": false
1927+
},
19231928
{
19241929
"source_path_from_root": "/articles/resource-manager-policy.md",
19251930
"redirect_url": "/azure/governance/policy/overview",

.openpublishing.redirection.container-registry.json

Lines changed: 53 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,33 +1,55 @@
11
{
22
"redirections": [
3+
4+
{
5+
"source_path_from_root": "/articles/container-registry/container-registry-oci-artifacts.md",
6+
"redirect_url": "/azure/container-registry/container-registry-manage-artifact",
7+
"redirect_document_id": false
8+
},
9+
{
10+
"source_path_from_root": "/articles/container-registry/container-registry-oras-artifacts.md",
11+
"redirect_url": "/azure/container-registry/container-registry-manage-artifact",
12+
"redirect_document_id": false
13+
},
314
{
415
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-auth.md",
5-
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-auth",
16+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
617
"redirect_document_id": false
718
},
19+
820
{
921
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-auth-cli.md",
10-
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-auth-cli",
22+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
1123
"redirect_document_id": false
1224
},
1325
{
1426
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache.md",
15-
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache",
27+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
1628
"redirect_document_id": false
1729
},
1830
{
1931
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-cli.md",
20-
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-cli",
32+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
33+
"redirect_document_id": false
34+
},
35+
{
36+
"source_path_from_root": "/articles/container-registry/tutorial-artifact-cache.md",
37+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
2138
"redirect_document_id": false
2239
},
2340
{
2441
"source_path_from_root": "/articles/container-registry/tutorial-registry-cache.md",
25-
"redirect_url": "/azure/container-registry/tutorial-artifact-cache",
42+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
2643
"redirect_document_id": false
2744
},
2845
{
2946
"source_path_from_root": "/articles/container-registry/tutorial-troubleshoot-registry-cache.md",
30-
"redirect_url": "/azure/container-registry/tutorial-troubleshoot-artifact-cache",
47+
"redirect_url": "/azure/container-registry/troubleshoot-artifact-cache",
48+
"redirect_document_id": false
49+
},
50+
{
51+
"source_path_from_root": "/articles/container-registry/tutorial-troubleshoot-artifact-cache.md",
52+
"redirect_url": "/azure/container-registry/troubleshoot-artifact-cache",
3153
"redirect_document_id": false
3254
},
3355
{
@@ -60,6 +82,31 @@
6082
"redirect_url": "/azure/container-registry/troubleshoot-artifact-streaming",
6183
"redirect_document_id": false
6284
},
85+
{
86+
"source_path": "articles/container-registry/tutorial-enable-artifact-cache.md",
87+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
88+
"redirect_document_id": false
89+
},
90+
{
91+
"source_path": "articles/container-registry/tutorial-enable-artifact-cache-cli.md",
92+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
93+
"redirect_document_id": false
94+
},
95+
{
96+
"source_path": "articles/container-registry/tutorial-enable-artifact-cache-auth.md",
97+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
98+
"redirect_document_id": false
99+
},
100+
{
101+
"source_path": "articles/container-registry/tutorial-enable-artifact-cache-auth-cli.md",
102+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
103+
"redirect_document_id": false
104+
},
105+
{
106+
"source_path": "articles/container-registry/tutorial-artifact-cache-troubleshoot.md",
107+
"redirect_url": "/azure/container-registry/troubleshoot-artifact-cache",
108+
"redirect_document_id": false
109+
},
63110
{
64111
"source_path": "articles/container-registry/container-registry-diagnostics-audit-logs.md",
65112
"redirect_url": "/azure/container-registry/monitor-service"

.openpublishing.redirection.json

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4060,9 +4060,19 @@
40604060
},
40614061
{
40624062
"source_path_from_root":"/articles/cosmos-db/high-availability.md",
4063-
"redirect_url":"/azure/reliability/reliability-cosmos-db-nosql.md",
4063+
"redirect_url":"/azure/reliability/reliability-cosmos-db-nosql",
40644064
"redirect_document_id":false
40654065
},
4066+
{
4067+
"source_path_from_root": "/articles/copilot/limited-access.md",
4068+
"redirect_url": "/azure/copilot/manage-access",
4069+
"redirect_document_id": false
4070+
},
4071+
{
4072+
"source_path_from_root": "/articles/azure-portal/mobile-app/microsoft-copilot-for-azure.md",
4073+
"redirect_url": "/azure/azure-portal/mobile-app/microsoft-copilot-in-azure",
4074+
"redirect_document_id": false
4075+
},
40664076
{
40674077
"source_path_from_root":"/articles/migrate/how-to-assess.md",
40684078
"redirect_url":"/azure/migrate/whats-new#update-april-2024",
@@ -4072,6 +4082,11 @@
40724082
"source_path_from_root":"/articles/migrate/prepare-isv-movere.md",
40734083
"redirect_url":"/azure/migrate/whats-new#update-april-2024",
40744084
"redirect_document_id":false
4085+
},
4086+
{
4087+
"source_path_from_root":"/articles/aks/troubleshoot-udp-packet-drops.md",
4088+
"redirect_url":"/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
4089+
"redirect_document_id":false
40754090
}
40764091
]
40774092
}

.openpublishing.redirection.operator-5g-core.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,6 @@
1515
"redirect_url": "/azure/operator-5g-core/how-to-deploy-observability",
1616
"redirect_document_id": false
1717
},
18-
{
19-
"source_path_from_root": "/articles/operator-5g-core/quickstart-complete-prerequisites-deploy-azure-kubernetes-service.md",
20-
"redirect_url": "/azure/operator-5g-core/quickstart-complete-prerequisites-deploy-nexus-azure-kubernetes-service",
21-
"redirect_document_id": false
22-
},
2318
{
2419
"source_path_from_root": "/articles/operator-5g-core/how-to-complete-prerequisites-deploy-nexus-azure-kubernetes-service.md",
2520
"redirect_url": "/azure/operator-5g-core/quickstart-complete-prerequisites-deploy-nexus-azure-kubernetes-service",

articles/active-directory-b2c/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ An *access token* contains claims that you can use in Azure Active Directory B2C
2323
This article shows you how to request an access token for a web application and web API. For more information about tokens in Azure AD B2C, see the [overview of tokens in Azure Active Directory B2C](tokens-overview.md).
2424

2525
> [!NOTE]
26-
> **Web API chains (On-Behalf-Of) is not supported by Azure AD B2C** - Many architectures include a web API that needs to call another downstream web API, both secured by Azure AD B2C. This scenario is common in clients that have a web API back end, which in turn calls a another service. This chained web API scenario can be supported by using the OAuth 2.0 JWT Bearer Credential grant, otherwise known as the On-Behalf-Of flow. However, the On-Behalf-Of flow is not currently implemented in Azure AD B2C. Although On-Behalf-Of works for applications registered in Microsoft Entra ID, it does not work for applications registered in Azure AD B2C, regardless of the tenant (Microsoft Entra ID or Azure AD B2C) that is issuing the tokens.
26+
> **Web API chains (On-Behalf-Of) is not supported by Azure AD B2C** - Many architectures include a web API that needs to call another downstream web API, both secured by Azure AD B2C. This scenario is common in clients that have a web API back end, which in turn calls another service. This chained web API scenario can be supported by using the OAuth 2.0 JWT Bearer Credential grant, otherwise known as the On-Behalf-Of flow. However, the On-Behalf-Of flow is not currently implemented in Azure AD B2C. Although On-Behalf-Of works for applications registered in Microsoft Entra ID, it does not work for applications registered in Azure AD B2C, regardless of the tenant (Microsoft Entra ID or Azure AD B2C) that is issuing the tokens.
2727
2828
## Prerequisites
2929

articles/active-directory-b2c/azure-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -316,7 +316,7 @@ Use the following instructions to create a new Azure Alert, which will send an [
316316
- Alert logic: Set **Number of results** **Greater than** **0**.
317317
- Evaluation based on: Select **120** for Period (in minutes) and **5** for Frequency (in minutes)
318318

319-
![Create a alert rule condition](./media/azure-monitor/alert-create-rule-condition.png)
319+
![Create an alert rule condition](./media/azure-monitor/alert-create-rule-condition.png)
320320

321321
After the alert is created, go to **Log Analytics workspace** and select **Alerts**. This page displays all the alerts that have been triggered in the duration set by **Time range** option.
322322

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ In this article, you learn how to write an Azure Active Directory B2C (Azure AD
3131

3232
Azure AD B2C uses OpenID Connect authentication protocol to verify user credentials. In Azure AD B2C, you send the user credentials alongside other information to a secure endpoint, which then determines if the credentials are valid or not. In a nutshell, when you use Azure AD B2C's implementation of OpenID Connect, you can outsource sign-up, sign in, and other identity management experiences in your web applications to Microsoft Entra ID.
3333

34-
Azure AD B2C custom policy provides a OpenID Connect technical profile, which you use to make a call to a secure Microsoft endpoint. Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).
34+
Azure AD B2C custom policy provides an OpenID Connect technical profile, which you use to make a call to a secure Microsoft endpoint. Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).
3535

3636
## Prerequisites
3737

@@ -331,4 +331,4 @@ You can sign in by entering the **Email Address** and **Password** of an existin
331331

332332
- Learn how to [Remove the sign-up link](add-sign-in-policy.md), so users can just sign in.
333333

334-
- Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).
334+
- Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).

0 commit comments

Comments
 (0)