Skip to content

Commit 13a5501

Browse files
committed
updated links and suggested guidance for configuring DNS
2 parents 212f510 + 7d4d8c0 commit 13a5501

File tree

3,674 files changed

+33091
-21586
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,674 files changed

+33091
-21586
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1204,6 +1204,7 @@
12041204
"articles/ai-services/.openpublishing.redirection.applied-ai-old.json",
12051205
"articles/ai-services/.openpublishing.redirection.applied-ai-services.json",
12061206
"articles/ai-services/.openpublishing.redirection.cognitive-services.json",
1207+
"articles/energy-data-services/.openpublishing.redirection.energy-data-services.json",
12071208
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
12081209
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
12091210
"articles/azure-relay/.openpublishing.redirection.relay.json",

.openpublishing.redirection.azure-monitor.json

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1185,6 +1185,11 @@
11851185
"redirect_url": "/azure/azure-monitor/agents/agents-overview",
11861186
"redirect_document_id": true
11871187
},
1188+
{
1189+
"source_path_from_root": "/articles/azure-monitor/agents/use-azure-monitor-agent-troubleshooter.md",
1190+
"redirect_url": "/azure/azure-monitor/agents/troubleshooter-ama-windows",
1191+
"redirect_document_id": true
1192+
},
11881193
{
11891194
"source_path_from_root": "/azure/azure-monitor/agents/agents-overview.md#log-analytics-agent",
11901195
"redirect_url": "/azure/azure-monitor/agents/log-analytics-agent",
@@ -6468,6 +6473,12 @@
64686473
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-configure-workspace.md",
64696474
"redirect_url": "/azure/azure-monitor/vm/vminsights-enable-overview",
64706475
"redirect_document_id": false
6476+
},
6477+
{
6478+
"source_path_from_root": "/articles/azure-monitor/logs/data-collection-rule-sample-custom-logs.md",
6479+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-samples",
6480+
"redirect_document_id": false
64716481
}
6482+
64726483
]
64736484
}

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -588,7 +588,7 @@
588588
{
589589
"source_path_from_root": "/articles/security-center/managing-and-responding-alerts.md",
590590
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
591-
"redirect_document_id": true
591+
"redirect_document_id": false
592592
},
593593
{
594594
"source_path_from_root": "/articles/security-center/os-coverage.md",
@@ -702,8 +702,8 @@
702702
},
703703
{
704704
"source_path_from_root": "/articles/security-center/tutorial-security-incident.md",
705-
"redirect_url": "/azure/defender-for-cloud/tutorial-security-incident",
706-
"redirect_document_id": true
705+
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
706+
"redirect_document_id": false
707707
},
708708
{
709709
"source_path_from_root": "/articles/security-center/tutorial-security-policy.md",
@@ -904,6 +904,16 @@
904904
"source_path_from_root": "/articles/defender-for-cloud/attack-path-reference.md",
905905
"redirect_url": "/azure/defender-for-cloud/how-to-manage-attack-path",
906906
"redirect_document_id": true
907+
},
908+
{
909+
"source_path_from_root": "/articles/defender-for-cloud/integration-overview.md",
910+
"redirect_url": "/azure/defender-for-cloud/integration-servicenow",
911+
"redirect_document_id": true
912+
},
913+
{
914+
"source_path_from_root": "/articles/defender-for-cloud/tutorial-security-incident.md",
915+
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
916+
"redirect_document_id": true
907917
}
908918
]
909919
}

.openpublishing.redirection.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1080,6 +1080,46 @@
10801080
"redirect_url": "/azure/site-recovery/azure-to-azure-autoupdate",
10811081
"redirect_document_id": false
10821082
},
1083+
{
1084+
"source_path": "articles/site-recovery/vmware-azure-tutorial.md",
1085+
"redirect_url": "/azure/site-recovery/azure-to-azure-tutorial-enable-replication",
1086+
"redirect_document_id": false
1087+
},
1088+
{
1089+
"source_path": "articles/site-recovery/vmware-azure-tutorial-failover-failback.md",
1090+
"redirect_url": "/azure/site-recovery/azure-to-azure-tutorial-enable-replication",
1091+
"redirect_document_id": false
1092+
},
1093+
{
1094+
"source_path": "articles/site-recovery/physical-azure-architecture.md",
1095+
"redirect_url": "/azure/site-recovery/physical-server-azure-architecture-modernized",
1096+
"redirect_document_id": false
1097+
},
1098+
{
1099+
"source_path": "articles/site-recovery/vmware-azure-configuration-server-requirements.md",
1100+
"redirect_url": "/azure/site-recovery/vmware-physical-azure-classic-deprecation",
1101+
"redirect_document_id": false
1102+
},
1103+
{
1104+
"source_path": "articles/site-recovery/vmware-physical-azure-config-process-server-overview.md",
1105+
"redirect_url": "/azure/site-recovery/deploy-vmware-azure-replication-appliance-modernized",
1106+
"redirect_document_id": false
1107+
},
1108+
{
1109+
"source_path": "articles/site-recovery/vmware-azure-about-disaster-recovery.md",
1110+
"redirect_url": "/azure/site-recovery/site-recovery-overview",
1111+
"redirect_document_id": false
1112+
},
1113+
{
1114+
"source_path": "articles/site-recovery/vmware-physical-secondary-architecture.md",
1115+
"redirect_url": "/azure/site-recovery/transport-layer-security",
1116+
"redirect_document_id": false
1117+
},
1118+
{
1119+
"source_path": "articles/site-recovery/hyper-v-vmm-architecture.md",
1120+
"redirect_url": "/azure/site-recovery/transport-layer-security",
1121+
"redirect_document_id": false
1122+
},
10831123
{
10841124
"source_path": "articles/container-registry/container-registry-customer-managed-keys.md",
10851125
"redirect_url": "/azure/container-registry/tutorial-customer-managed-keys",

.openpublishing.redirection.sql-database.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2560,6 +2560,11 @@
25602560
"source_path_from_root": "/articles/sql-database/sql-database-customer-implementations.md",
25612561
"redirect_url": "https://customers.microsoft.com",
25622562
"redirect_document_id": false
2563+
},
2564+
{
2565+
"source_path_from_root": "/articles/sql-database/scripts/sql-database-import-purview-labels.md",
2566+
"redirect_url": "/purview/register-scan-azure-sql-database",
2567+
"redirect_document_id": false
25632568
}
25642569
]
25652570
}

articles/active-directory-b2c/azure-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -349,7 +349,7 @@ To stop collecting logs to your Log Analytics workspace, delete the diagnostic s
349349
1. Sign in to the [Azure portal](https://portal.azure.com).
350350
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra ID tenant from the **Directories + subscriptions** menu.
351351
1. Choose the resource group that contains the Log Analytics workspace. This example uses a resource group named _azure-ad-b2c-monitor_ and a Log Analytics workspace named `AzureAdB2C`.
352-
1. [Delete the Logs Analytics workspace](../azure-monitor/logs/delete-workspace.md#azure-portal).
352+
1. [Delete the Logs Analytics workspace](../azure-monitor/logs/delete-workspace.md).
353353
1. Select the **Delete** button to delete the resource group.
354354
## Next steps
355355

articles/active-directory-b2c/integrate-with-app-code-samples.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ The following tables provide links to samples for applications including iOS, An
2626
| [dotnetcore-webapp-msal-api](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/4-WebApp-your-API/4-2-B2C) | An ASP.NET Core web application that can sign in a user using Azure AD B2C, get an access token using MSAL.NET and call an API. |
2727
| [auth-code-flow-nodejs](https://github.com/Azure-Samples/active-directory-b2c-msal-node-sign-in-sign-out-webapp) | A Node.js app that shows how to enable authentication (sign in, sign out and profile edit) in a Node.js web application using Azure Active Directory B2C. The web app uses MSAL-node.|
2828
| [javascript-nodejs-webapi](https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi) | A small Node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using passport.js. |
29-
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/main/README_B2C.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
29+
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/main/README.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
3030

3131
## Single page apps
3232

articles/active-directory-b2c/user-profile-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kengaderdus
55
manager: CelesteDG
66
ms.service: active-directory
77
ms.topic: conceptual
8-
ms.date: 11/20/2023
8+
ms.date: 01/08/2024
99
ms.author: kengaderdus
1010
ms.subservice: B2C
1111
ms.custom: b2c-support
@@ -48,7 +48,7 @@ Azure AD B2C directory user profile supports the [user resource type](/graph/api
4848
|creationType |String|If the user account was created as a local account for an Azure Active Directory B2C tenant, the value is LocalAccount or nameCoexistence. Read only.|No|No|Persisted, Output|
4949
|dateOfBirth |Date|Date of birth.|No|No|Persisted, Output|
5050
|department |String|The name for the department in which the user works. Max length 64.|Yes|No|Persisted, Output|
51-
|displayName |String|The display name for the user. Max length 256. \< \> characters aren't allowed. | Yes|Yes|Persisted, Output|
51+
|displayName |String|The display name for the user. Max length 256. | Yes|Yes|Persisted, Output|
5252
|facsimileTelephoneNumber<sup>1</sup>|String|The telephone number of the user's business fax machine.|Yes|No|Persisted, Output|
5353
|givenName |String|The given name (first name) of the user. Max length 64.|Yes|Yes|Persisted, Output|
5454
|jobTitle |String|The user's job title. Max length 128.|Yes|Yes|Persisted, Output|

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 10 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 12/01/2023
4+
ms.date: 01/05/2024
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,15 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
1717

18+
## December 2023
19+
20+
### Updated articles
21+
22+
- [Set up a resource owner password credentials flow in Azure Active Directory B2C](add-ropc-policy.md) - Updated ROPC flow limitations
23+
- [Add user attributes and customize user input in Azure Active Directory B2C](configure-user-input.md) - Updated instructional steps
24+
- [Set up sign-up and sign-in with a Google account using Azure Active Directory B2C](identity-provider-google.md) - Editorial updates
25+
- [Localization string IDs](localization-string-ids.md) - Updated the localization string IDs
26+
1827
## November 2023
1928

2029
### Updated articles
@@ -41,25 +50,5 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
4150
- [Azure AD B2C: Frequently asked questions (FAQ)](faq.yml) - Editorial updates
4251
- [Enable JavaScript and page layout versions in Azure Active Directory B2C](javascript-and-page-layout.md) - Added breaking change on script tags
4352

44-
## September 2023
45-
46-
### Updated articles
47-
48-
- [Supported Microsoft Entra ID features](supported-azure-ad-features.md) - Editorial updates
49-
- [Publish your Azure Active Directory B2C app to the Microsoft Entra app gallery](publish-app-to-azure-ad-app-gallery.md) - Editorial updates
50-
- [Secure your API used an API connector in Azure AD B2C](secure-rest-api.md) - Editorial updates
51-
- [Azure AD B2C: Frequently asked questions (FAQ)'](faq.yml) - Editorial updates
52-
- [Define an ID token hint technical profile in an Azure Active Directory B2C custom policy](id-token-hint.md) - Editorial updates
53-
- [Set up sign-in for multitenant Microsoft Entra ID using custom policies in Azure Active Directory B2C](identity-provider-azure-ad-multi-tenant.md) - Editorial updates
54-
- [Set up sign-in for a specific Microsoft Entra organization in Azure Active Directory B2C](identity-provider-azure-ad-single-tenant.md) - Editorial updates
55-
- [Localization string IDs](localization-string-ids.md) - Editorial updates
56-
- [Define a Microsoft Entra ID multifactor authentication technical profile in an Azure AD B2C custom policy](multi-factor-auth-technical-profile.md) - Editorial updates
57-
- [Define a Microsoft Entra ID SSPR technical profile in an Azure AD B2C custom policy](aad-sspr-technical-profile.md) - Editorial updates
58-
- [Define a Microsoft Entra technical profile in an Azure Active Directory B2C custom policy](active-directory-technical-profile.md) - Editorial updates
59-
- [Monitor Azure AD B2C with Azure Monitor](azure-monitor.md) - Editorial updates
60-
- [Billing model for Azure Active Directory B2C](billing.md) - Editorial updates
61-
- [Enable custom domains for Azure Active Directory B2C](custom-domain.md) - Editorial updates
62-
- [Set up a sign-up and sign-in flow with a social account by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in-federation.md) - Editorial updates
63-
- [Create and read a user account by using Azure Active Directory B2C custom policy](custom-policies-series-store-user.md) - Editorial updates
6453

6554

0 commit comments

Comments
 (0)