Skip to content

Commit 1c92635

Browse files
author
RoseHJM
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into mdb-update-create-dev-box-qs
2 parents 663c32c + a878187 commit 1c92635

File tree

996 files changed

+8011
-3983
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

996 files changed

+8011
-3983
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1039,6 +1039,12 @@
10391039
"url": "https://github.com/Azure/Azure-Proactive-Resiliency-Library",
10401040
"branch": "main",
10411041
"branch_mapping": {}
1042+
},
1043+
{
1044+
"path_to_root": "azure-reference-other-repo",
1045+
"url": "https://github.com/MicrosoftDocs/azure-reference-other-pr",
1046+
"branch": "main",
1047+
"branch_mapping": {}
10421048
}
10431049
],
10441050
"branch_target_mapping": {
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-auth.md",
5+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-auth",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-auth-cli.md",
10+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-auth-cli",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache.md",
15+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-cli.md",
20+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-cli",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/container-registry/tutorial-registry-cache.md",
25+
"redirect_url": "/azure/container-registry/tutorial-artifact-cache",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/container-registry/tutorial-troubleshoot-registry-cache.md",
30+
"redirect_url": "/azure/container-registry/tutorial-troubleshoot-artifact-cache",
31+
"redirect_document_id": false
32+
}
33+
34+
35+
]
36+
}

articles/active-directory-b2c/TOC.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -64,19 +64,19 @@
6464
- name: Concepts
6565
items:
6666
- name: Compare solutions for External Identities
67-
href: ../active-directory/external-identities/external-identities-overview.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
67+
href: ../active-directory/external-identities/external-identities-overview.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
6868
- name: Supported Azure AD features
6969
href: supported-azure-ad-features.md
7070
- name: Learn authentication basics
7171
items:
7272
- name: Authentication and authorization
73-
href: ../active-directory/develop/authentication-vs-authorization.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
73+
href: ../active-directory/develop/authentication-vs-authorization.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
7474
- name: Tokens
75-
href: ../active-directory/develop/security-tokens.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
75+
href: ../active-directory/develop/security-tokens.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
7676
- name: Application authentication request
77-
href: ../active-directory/develop/v2-app-types.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
77+
href: ../active-directory/develop/v2-app-types.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
7878
- name: Authentication library
79-
href: ../active-directory/develop/msal-overview.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
79+
href: ../active-directory/develop/msal-overview.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
8080
displayName: MSAL, client library, Microsoft Authentication Library
8181
- name: Azure AD B2C global identity framework
8282
items:
@@ -308,7 +308,7 @@
308308
- name: Daemon or service (client credentials flow)
309309
href: client-credentials-grant-flow.md
310310
- name: Microsoft Power Apps
311-
href: /powerapps/maker/portals/configure/configure-azure-ad-b2c-provider
311+
href: /power-pages/security/authentication/azure-ad-b2c-provider
312312
- name: SAML application
313313
items:
314314
- name: Configure a SAML application
@@ -798,15 +798,15 @@
798798
- name: Build for resilience
799799
items:
800800
- name: Azure AD B2C introduction to resilience
801-
href: ../active-directory/fundamentals/resilience-b2c.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
801+
href: ../active-directory/architecture/resilience-b2c.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
802802
- name: End-user experience
803-
href: ../active-directory/fundamentals/resilient-end-user-experience.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
803+
href: ../active-directory/architecture/resilient-end-user-experience.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
804804
- name: Interfaces with external processes
805-
href: ../active-directory/fundamentals/resilient-external-processes.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
805+
href: ../active-directory/architecture/resilient-external-processes.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
806806
- name: Azure AD B2C developer best practices
807-
href: ../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
807+
href: ../active-directory/architecture/resilience-b2c-developer-best-practices.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
808808
- name: Monitoring and analytics
809-
href: ../active-directory/fundamentals/resilience-with-monitoring-alerting.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
809+
href: ../active-directory/architecture/resilience-with-monitoring-alerting.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
810810
displayName: security
811811
- name: User flow versions
812812
href: user-flow-versions.md
@@ -835,4 +835,4 @@
835835
href: find-help-open-support-ticket.md
836836
displayName: technical
837837
- name: Videos
838-
href: azure-ad-external-identities-videos.md
838+
href: ./external-identities-videos.md

articles/active-directory-b2c/api-connectors-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -273,5 +273,5 @@ See the following articles for examples of using a RESTful technical profile:
273273

274274
::: zone-end
275275

276-
- Learn how to build resilience when [Interfacing with external processes](../active-directory/fundamentals/resilient-external-processes.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json)
277-
- Learn how to build [Resilience through developer best practices](../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json).
276+
- Learn how to build resilience when [Interfacing with external processes](../active-directory/architecture/resilient-external-processes.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json)
277+
- Learn how to build [Resilience through developer best practices](../active-directory/architecture/resilience-b2c-developer-best-practices.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json).

articles/active-directory-b2c/app-registrations-training-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The new experience shows all Azure AD B2C app registrations and Azure AD app reg
2525

2626
You can reach the new experience by navigating to **App registrations** in an Azure AD B2C tenant from both the **Azure AD B2C** or the **Azure Active Directory** services in the Azure portal.
2727

28-
The Azure AD B2C App registrations experience is based on the general [App Registration experience](https://developer.microsoft.com/identity/blogs/new-app-registrations-experience-is-now-generally-available/) for any Azure AD tenant, but is tailored for Azure AD B2C tenants.
28+
The Azure AD B2C App registrations experience is based on the general [App Registration experience](https://devblogs.microsoft.com/microsoft365dev/new-app-registrations-experience-is-now-generally-available/) for any Azure AD tenant, but is tailored for Azure AD B2C tenants.
2929

3030
## What's not changing?
3131
- Your applications and related configurations can be found as-is in the new experience. You do not need to register the applications again and users of your applications will not need to sign-in again.
@@ -72,7 +72,7 @@ You might not see all Microsoft Graph permissions, because many of these permiss
7272

7373
The **openid** scope is necessary so that Azure AD B2C can sign users in to an app. The **offline_access** scope is needed to issue refresh tokens for a user. These scopes were previously added and given admin consent by default. Now, you can easily add permissions for these scopes during the creation process by ensuring the **Grant admin consent to openid and offline_access permissions** option is selected. Else, the Microsoft Graph permissions can be added with admin consent in the **API permissions** settings for an existing app.
7474

75-
Learn more about [permissions and consent](../active-directory/develop/v2-permissions-and-consent.md).
75+
Learn more about [permissions and consent](../active-directory/develop/permissions-consent-overview.md).
7676

7777
## Platforms/Authentication: Reply URLs/redirect URIs
7878
In the legacy experience, the various platform types were managed under **Properties** as reply URLs for web apps/APIs and Redirect URI for Native clients. "Native clients" are also known as "Public clients" and include apps for iOS, macOS, Android, and other mobile and desktop application types.

articles/active-directory-b2c/azure-monitor.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Watch this video to learn how to configure monitoring for Azure AD B2C using Azu
3838
3939
## Deployment overview
4040

41-
Azure AD B2C uses [Azure Active Directory monitoring](../active-directory/reports-monitoring/overview-monitoring.md). Unlike Azure AD tenants, an Azure AD B2C tenant can't have a subscription associated with it. So, we need to take extra steps to enable the integration between Azure AD B2C and Log Analytics, which is where we send the logs.
41+
Azure AD B2C uses [Azure Active Directory monitoring](../active-directory/reports-monitoring/overview-monitoring-health.md). Unlike Azure AD tenants, an Azure AD B2C tenant can't have a subscription associated with it. So, we need to take extra steps to enable the integration between Azure AD B2C and Log Analytics, which is where we send the logs.
4242
To enable _Diagnostic settings_ in Azure Active Directory within your Azure AD B2C tenant, you use [Azure Lighthouse](../lighthouse/overview.md) to [delegate a resource](../lighthouse/concepts/architecture.md), which allows your Azure AD B2C (the **Service Provider**) to manage an Azure AD (the **Customer**) resource.
4343

4444
> [!TIP]
@@ -101,9 +101,9 @@ Now select an Azure AD B2C group or user to which you want to give permission to
101101
To make management easier, we recommend using Azure AD user _groups_ for each role, allowing you to add or remove individual users to the group rather than assigning permissions directly to that user. In this walkthrough, we'll add a security group.
102102

103103
> [!IMPORTANT]
104-
> In order to add permissions for an Azure AD group, the **Group type** must be set to **Security**. This option is selected when the group is created. For more information, see [Create a basic group and add members using Azure Active Directory](../active-directory/fundamentals/active-directory-groups-create-azure-portal.md).
104+
> In order to add permissions for an Azure AD group, the **Group type** must be set to **Security**. This option is selected when the group is created. For more information, see [Create a basic group and add members using Azure Active Directory](../active-directory/fundamentals/how-to-manage-groups.md).
105105
106-
1. With **Azure Active Directory** still selected in your **Azure AD B2C** directory, select **Groups**, and then select a group. If you don't have an existing group, create a **Security** group, then add members. For more information, follow the procedure [Create a basic group and add members using Azure Active Directory](../active-directory/fundamentals/active-directory-groups-create-azure-portal.md).
106+
1. With **Azure Active Directory** still selected in your **Azure AD B2C** directory, select **Groups**, and then select a group. If you don't have an existing group, create a **Security** group, then add members. For more information, follow the procedure [Create a basic group and add members using Azure Active Directory](../active-directory/fundamentals/how-to-manage-groups.md).
107107
1. Select **Overview**, and record the group's **Object ID**.
108108

109109
### 3.3 Create an Azure Resource Manager template
@@ -169,7 +169,7 @@ In this example, we use the Log Analytics workspace to create a dashboard.
169169

170170
### 5.1 Create diagnostic settings
171171

172-
You're ready to [create diagnostic settings](../active-directory/reports-monitoring/overview-monitoring.md) in the Azure portal.
172+
You're ready to [create diagnostic settings](../active-directory/reports-monitoring/overview-monitoring-health.md) in the Azure portal.
173173

174174
To configure monitoring settings for Azure AD B2C activity logs:
175175

@@ -196,7 +196,7 @@ To configure monitoring settings for Azure AD B2C activity logs:
196196
1. Select **Save**.
197197

198198
> [!NOTE]
199-
> It can take up to 15 minutes after an event is emitted for it to [appear in a Log Analytics workspace](../azure-monitor/logs/data-ingestion-time.md). Also, learn more about [Active Directory reporting latencies](../active-directory/reports-monitoring/reference-reports-latencies.md), which can impact the staleness of data and play an important role in reporting.
199+
> It can take up to 15 minutes after an event is emitted for it to [appear in a Log Analytics workspace](../azure-monitor/logs/data-ingestion-time.md). Also, learn more about [Active Directory reporting latencies](../active-directory/reports-monitoring/reference-azure-ad-sla-performance.md), which can impact the staleness of data and play an important role in reporting.
200200
201201
If you see the error message, _To set up Diagnostic settings to use Azure Monitor for your Azure AD B2C directory, you need to set up delegated resource management_, make sure you sign in with a user who is a member of the [security group](#32-select-a-security-group) and [select your subscription](#4-select-your-subscription).
202202

@@ -287,7 +287,7 @@ The workbook will display reports in the form of a dashboard.
287287

288288
## Create alerts
289289

290-
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events occur. You can also create alerts on absence of an event, or when a number of events occur within a particular time window. For example, alerts can be used to notify you when average number of sign-ins exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-log.md).
290+
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events occur. You can also create alerts on absence of an event, or when a number of events occur within a particular time window. For example, alerts can be used to notify you when average number of sign-ins exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-create-new-alert-rule.md).
291291

292292
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md) whenever there's a 25% drop in the **Total Requests** compared to previous period. Alert will run every 5 minutes and look for the drop in the last hour compared to the hour before it. The alerts are created using Kusto query language.
293293

articles/active-directory-b2c/b2c-global-identity-proof-of-concept-funnel.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,6 @@ Write users region to global lookup table.
181181

182182
- [Azure AD B2C global identity solutions](b2c-global-identity-solutions.md)
183183

184-
- [Build a global identity solution with funnel-based approach](azure-ad-b2c-global-identity-funnel-based-design.md)
185-
186-
- [Build a global identity solution with region-based approach](azure-ad-b2c-global-identity-funnel-based-design.md)
184+
- [Build a global identity solution with funnel-based approach](./b2c-global-identity-funnel-based-design.md)
187185

186+
- [Build a global identity solution with region-based approach](./b2c-global-identity-funnel-based-design.md)

articles/active-directory-b2c/b2c-global-identity-region-based-design.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -282,7 +282,7 @@ This scenario demonstrates how users will be able to perform account linking wh
282282

283283
- [Azure AD B2C global identity solutions](b2c-global-identity-solutions.md)
284284

285-
- [Build a global identity solution with funnel-based approach](azure-ad-b2c-global-identity-funnel-based-design.md)
285+
- [Build a global identity solution with funnel-based approach](./b2c-global-identity-funnel-based-design.md)
286286

287287
- [Azure AD B2C global identity proof of concept regional-based configuration](b2c-global-identity-proof-of-concept-regional.md)
288288

articles/active-directory-b2c/b2c-global-identity-solutions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.subservice: B2C
1818

1919
[Azure Active Directory B2C](overview.md) is a customer identity access management (CIAM) solution capable of supporting millions of users and billions of authentications per day. It takes care of the scaling and safety of the authentication platform, monitoring, and automatically handling threats like denial-of-service, password spray, or brute force attacks.
2020

21-
Azure Active Directory B2C (Azure AD B2C) is a separate service from [Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md). It's built on the same technology as Azure AD but for a different purpose. It allows businesses to build customer facing applications, and then allows self-service sign-up to applications.
21+
Azure Active Directory B2C (Azure AD B2C) is a separate service from [Azure Active Directory (Azure AD)](../active-directory/fundamentals/whatis.md). It's built on the same technology as Azure AD but for a different purpose. It allows businesses to build customer facing applications, and then allows self-service sign-up to applications.
2222

2323
Azure AD B2C is a globally distributed service made up of several components:
2424

0 commit comments

Comments
 (0)