Skip to content

Commit 203d559

Browse files
authored
Merge branch 'MicrosoftDocs:main' into docs-editor/vminsights-log-query-1694638221
2 parents cd89da1 + ff36e0b commit 203d559

File tree

4,633 files changed

+66088
-57408
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,633 files changed

+66088
-57408
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1185,6 +1185,11 @@
11851185
"redirect_url": "/azure/role-based-access-control/change-history-report",
11861186
"redirect_document_id": true
11871187
},
1188+
{
1189+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-mfa-get-started.md",
1190+
"redirect_url": "/azure/active-directory/authentication/concept-mfa-licensing",
1191+
"redirect_document_id": true
1192+
},
11881193
{
11891194
"source_path_from_root": "/articles/active-directory/conditional-access-azure-management.md",
11901195
"redirect_url": "/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps",
@@ -5285,6 +5290,11 @@
52855290
"redirect_url": "/azure/active-directory/reports-monitoring/howto-customize-filter-logs",
52865291
"redirect_document_id": true
52875292
},
5293+
{
5294+
"source_path_from_root": "/articles/active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md",
5295+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5296+
"redirect_document_id": false
5297+
},
52885298
{
52895299
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-basic-info-sign-in-logs.md",
52905300
"redirect_url": "/azure/active-directory/reports-monitoring/concept-sign-in-log-activity-details",

.openpublishing.redirection.azure-kubernetes-service.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,11 @@
1919
"source_path_from_root": "/articles/aks/aks-planned-maintenance-weekly-releases.md",
2020
"redirect_url": "/azure/aks/planned-maintenance",
2121
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/aks/create-k8s-cluster-with-aks-application-gateway-ingress.md",
25+
"redirect_url": "/azure/application-gateway/for-containers/overview",
26+
"redirect_document_id": false
2227
}
2328
]
2429
}

.openpublishing.redirection.json

Lines changed: 91 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/azure-resource-manager/bicep/bicep-import-providers.md",
5+
"redirect_URL": "bicep-import",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/migrate/tutorial-assess-webapps-physical.md",
510
"redirect_URL": "tutorial-assess-webapps",
@@ -49,7 +54,7 @@
4954
"source_path": "articles/storsimple/storsimple-virtual-array-update-11-release-notes.md",
5055
"redirect_url": "/azure/storsimple/storsimple-overview",
5156
"redirect_document_id": false
52-
},
57+
},
5358
{
5459
"source_path": "articles/storsimple/storsimple-ova-overview.md",
5560
"redirect_url": "/azure/storsimple/storsimple-overview",
@@ -70,7 +75,7 @@
7075
"redirect_url": "/azure/storsimple/storsimple-overview",
7176
"redirect_document_id": false
7277
},
73-
{
78+
{
7479
"source_path": "articles/storsimple/storsimple-virtual-array-deploy1-portal-prep.md",
7580
"redirect_url": "/azure/storsimple/storsimple-overview",
7681
"redirect_document_id": false
@@ -8767,6 +8772,11 @@
87678772
"redirect_url": "/azure/developer/mobile-apps/azure-maps",
87688773
"redirect_document_id": false
87698774
},
8775+
{
8776+
"source_path_from_root": "/articles/azure-maps/choose-pricing-tier.md",
8777+
"redirect_url": "/azure/azure-maps/how-to-manage-pricing-tier",
8778+
"redirect_document_id": true
8779+
},
87708780
{
87718781
"source_path_from_root": "/articles/azure-maps/how-to-request-real-time-data.md",
87728782
"redirect_url": "/azure/azure-maps",
@@ -9981,7 +9991,7 @@
99819991
"source_path_from_root": "/articles/container-instances/container-instances-quotas.md",
99829992
"redirect_url": "/azure/container-instances/container-instances-resource-and-quota-limits",
99839993
"redirect_document_id": false
9984-
},
9994+
},
99859995
{
99869996
"source_path_from_root": "/articles/container-registry/container-registry-managed-get-started-azure-cli.md",
99879997
"redirect_url": "/azure/container-registry/container-registry-get-started-azure-cli",
@@ -13432,6 +13442,26 @@
1343213442
"redirect_url": "/azure/governance/policy/samples/rbi-itf-nbfc-2017",
1343313443
"redirect_document_id": false
1343413444
},
13445+
{
13446+
"source_path_from_root": "/articles/governance/policy/samples/gov-dod-impact-level-4.md",
13447+
"redirect_url": "/azure/governance/policy/samples",
13448+
"redirect_document_id": false
13449+
},
13450+
{
13451+
"source_path_from_root": "/articles/governance/policy/samples/gov-dod-impact-level-5.md",
13452+
"redirect_url": "/azure/governance/policy/samples",
13453+
"redirect_document_id": false
13454+
},
13455+
{
13456+
"source_path_from_root": "/articles/governance/policy/samples/swift-cscf-v2021.md",
13457+
"redirect_url": "/azure/governance/policy/samples/swift-csp-cscf-2021",
13458+
"redirect_document_id": false
13459+
},
13460+
{
13461+
"source_path_from_root": "/articles/governance/policy/samples/azure-security-benchmarkv1.md",
13462+
"redirect_url": "/azure/governance/policy/samples/azure-security-benchmark",
13463+
"redirect_document_id": false
13464+
},
1343513465
{
1343613466
"source_path_from_root": "/articles/azure-policy/create-manage-policy.md",
1343713467
"redirect_url": "/azure/governance/policy/tutorials/create-and-manage",
@@ -14170,17 +14200,17 @@
1417014200
{
1417114201
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-linux-cli-load-balance-multiple-websites-vm.md",
1417214202
"redirect_url": "/azure/load-balancer/load-balancer-multiple-ip",
14173-
"redirect_document_id": false
14203+
"redirect_document_id": false
1417414204
},
1417514205
{
1417614206
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-linux-cli-sample-nlb.md",
1417714207
"redirect_url": "/azure/load-balancer/tutorial-multi-availability-sets-portal",
14178-
"redirect_document_id": false
14208+
"redirect_document_id": false
1417914209
},
1418014210
{
1418114211
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-linux-cli-sample-zonal-frontend.md",
1418214212
"redirect_url": "/azure/load-balancer/tutorial-load-balancer-standard-public-zonal-portal",
14183-
"redirect_document_id": false
14213+
"redirect_document_id": false
1418414214
},
1418514215
{
1418614216
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-windows-powershell-sample-nlb.md",
@@ -14671,7 +14701,7 @@
1467114701
"source_path_from_root": "/articles/notification-hubs/cross-region-recovery.md",
1467214702
"redirect_url": "/azure/notification-hubs/notification-hubs-high-availability",
1467314703
"redirect_document_id": false
14674-
},
14704+
},
1467514705
{
1467614706
"source_path_from_root": "/articles/open-datasets/service/how-to-create-dataset-from-open-dataset.md",
1467714707
"redirect_url": "/azure/open-datasets/how-to-create-azure-machine-learning-dataset-from-open-dataset",
@@ -22332,6 +22362,11 @@
2233222362
"redirect_url": "/azure/communication-services/how-tos/calling-sdk/lobby",
2233322363
"redirect_document_id": false
2233422364
},
22365+
{
22366+
"source_path_from_root": "/articles/communication-services/tutorials/widgets/click-to-call-widget.md",
22367+
"redirect_url": "/azure/communication-services/tutorials/calling-widget/calling-widget-overview",
22368+
"redirect_document_id": false
22369+
},
2233522370
{
2233622371
"source_path_from_root": "/articles/load-balancer/tutorial-load-balancer-standard-manage-portal.md",
2233722372
"redirect_url": "/azure/load-balancer/quickstart-load-balancer-standard-public-portal",
@@ -23561,8 +23596,27 @@
2356123596
"source_path_from_root": "/articles/devtest-labs/how-to-move-schedule-to-new-region.md",
2356223597
"redirect_url": "/azure/devtest-labs/how-to-move-labs",
2356323598
"redirect_document_id": false
23599+
},
23600+
{
23601+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-prescriptive-adoption.md",
23602+
"redirect_url": "/azure/devtest-labs/deliver-proof-of-concept",
23603+
"redirect_document_id": false
23604+
},
23605+
{
23606+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-governance-cost-ownership.md",
23607+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-governance-resources",
23608+
"redirect_document_id": false
23609+
},
23610+
{
23611+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-governance-policy-compliance.md",
23612+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-governance-resources",
23613+
"redirect_document_id": false
2356423614
},
2356523615
{
23616+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-governance-application-migration-integration.md",
23617+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-governance-resources",
23618+
"redirect_document_id": false
23619+
}, {
2356623620
"source_path_from_root": "/articles/azure/virtual-desktop/azure-advisor.md",
2356723621
"redirect_url": "/azure/advisor/advisor-overview",
2356823622
"redirect_document_id": false
@@ -23932,7 +23986,7 @@
2393223986
"redirect_url": "/previous-versions/azure/virtual-machines/linux/openshift-container-platform-3x",
2393323987
"redirect_document_id": false
2393423988
},
23935-
{
23989+
{
2393623990
"source_path": "articles/orbital/orbital-preview.md",
2393723991
"redirect_url": "/azure/orbital/overview",
2393823992
"redirect_document_id": false
@@ -23941,7 +23995,7 @@
2394123995
"source_path": "articles/private-multi-access-edge-compute-mec/metaswitch-fusion-core-overview.md",
2394223996
"redirect_URL": "/azure/private-5g-core",
2394323997
"redirect_document_id": false
23944-
},
23998+
},
2394523999
{
2394624000
"source_path": "articles/private-5g-core/modify-site-plan.md",
2394724001
"redirect_URL": "/azure/private-5g-core/modify-service-plan",
@@ -24141,12 +24195,12 @@
2414124195
"source_path_from_root": "/articles/azure-functions/create-function-app-linux-app-service-plan.md",
2414224196
"redirect_url": "/azure/azure-functions/functions-create-function-app-portal",
2414324197
"redirect_document_id": false
24144-
},
24198+
},
2414524199
{
2414624200
"source_path_from_root": "/articles/azure-functions/create-premium-plan-function-app-portal.md",
2414724201
"redirect_url": "/azure/azure-functions/functions-create-function-app-portal",
2414824202
"redirect_document_id": false
24149-
},
24203+
},
2415024204
{
2415124205
"source_path_from_root": "/articles/sentinel/data-connectors/windows-firewall-events-via-ama.md",
2415224206
"redirect_url": "/azure/sentinel/data-connectors-reference",
@@ -24337,6 +24391,26 @@
2433724391
"redirect_url": "/azure/networking/manage-apps/connectivity-interoperability-data-plane",
2433824392
"redirect_document_id": false
2433924393
},
24394+
{
24395+
"source_path_from_root": "/articles/networking/manage-apps/connectivty-interoperability-preface.md",
24396+
"redirect_url": "/azure/networking/connectivity-interoperability-preface",
24397+
"redirect_document_id": false
24398+
},
24399+
{
24400+
"source_path_from_root": "/articles/networking/manage-apps/connectivty-interoperability-configuration.md",
24401+
"redirect_url": "/azure/networking/connectivity-interoperability-configuration",
24402+
"redirect_document_id": false
24403+
},
24404+
{
24405+
"source_path_from_root": "/articles/networking/manage-apps/connectivty-interoperability-control-plane.md",
24406+
"redirect_url": "/azure/networking/connectivity-interoperability-control-plane",
24407+
"redirect_document_id": false
24408+
},
24409+
{
24410+
"source_path_from_root": "/articles/networking/manage-apps/connectivty-interoperability-data-plane.md",
24411+
"redirect_url": "/azure/networking/connectivity-interoperability-data-plane",
24412+
"redirect_document_id": false
24413+
},
2434024414
{
2434124415
"source_path_from_root": "/articles/operator-nexus/howto-hybrid-aks.md",
2434224416
"redirect_url": "/azure/operator-nexus/howto-kubernetes-cluster-agent-pools",
@@ -24420,7 +24494,7 @@
2442024494
{
2442124495
"source_path_from_root": "/articles/virtual-machines/image-builder-reliability.md",
2442224496
"redirect_url": "/azure/reliability/reliability-image-builder.md",
24423-
"redirect_document_id": false
24497+
"redirect_document_id": false
2442424498
},
2442524499
{
2442624500
"source_path_from_root": "/articles/bastion/bastion-connect-vm-rdp-linux.md",
@@ -24436,6 +24510,11 @@
2443624510
"source_path_from_root": "/articles/private-link/tutorial-private-endpoint-cosmosdb-portal.md",
2443724511
"redirect_url": "/azure/cosmos-db/how-to-configure-private-endpoints",
2443824512
"redirect_document_id": false
24513+
},
24514+
{
24515+
"source_path_from_root": "/articles/aks/command-invoke.md",
24516+
"redirect_url": "/azure/aks/access-private-cluster",
24517+
"redirect_document_id": false
2443924518
}
2444024519
]
2444124520
}
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/managed-grafana/how-to-sync-teams-with-aad-groups.md",
5+
"redirect_url": "/azure/managed-grafana/how-to-sync-teams-with-azure-ad-groups",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

articles/active-directory-b2c/deploy-custom-policies-github-action.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ For the GitHub Action to access data in Microsoft Graph, grant the registered ap
4848

4949
GitHub secrets are encrypted environment variables that you create in an organization, repository, or repository environment. In this step, you store the application secret for the application you registered earlier in the [Register an MS Graph application](#register-a-microsoft-graph-application) step.
5050

51-
The GitHub Action for deploying Azure AD B2C custom policies uses the secret to acquire an access token that is used to interact with the Microsoft Graph API. For more information, see [Creating encrypted secrets for a repository](https://docs.github.com/en/actions/security-guides/using-secrets-in-github-actions#creating-encrypted-secrets-for-a-repository).
51+
The GitHub Action for deploying Azure AD B2C custom policies uses the secret to acquire an access token that is used to interact with the Microsoft Graph API. For more information, see [Creating encrypted secrets for a repository](https://docs.github.com/actions/security-guides/using-secrets-in-github-actions#creating-encrypted-secrets-for-a-repository).
5252

5353
To create a GitHub secret, follow these steps:
5454

@@ -141,9 +141,9 @@ To test the workflow you created, **Push** the changes of your custom policy. On
141141

142142
## Optional: Schedule your workflow
143143

144-
The workflow you created is triggered by the [push](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#push) event. If you prefer, you can choose another event to trigger the workflow, for example a [pull request](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#pull_request).
144+
The workflow you created is triggered by the [push](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows#push) event. If you prefer, you can choose another event to trigger the workflow, for example a [pull request](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows#pull_request).
145145

146-
You can also schedule a workflow to run at specific UTC times using [POSIX cron syntax](https://pubs.opengroup.org/onlinepubs/9699919799/utilities/crontab.html#tag_20_25_07). The schedule event allows you to trigger a workflow at a scheduled time. For more information, see [Scheduled events](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#scheduled-events).
146+
You can also schedule a workflow to run at specific UTC times using [POSIX cron syntax](https://pubs.opengroup.org/onlinepubs/9699919799/utilities/crontab.html#tag_20_25_07). The schedule event allows you to trigger a workflow at a scheduled time. For more information, see [Scheduled events](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows#scheduled-events).
147147

148148
The following example triggers the workflow every day at 5:30 and 17:30 UTC:
149149

@@ -170,4 +170,4 @@ To edit your workflow:
170170

171171
## Next steps
172172

173-
- Learn how to configure [Events that trigger workflows](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows)
173+
- Learn how to configure [Events that trigger workflows](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows)

articles/active-directory-b2c/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -217,10 +217,10 @@ conceptualContent:
217217
url: custom-domain.md
218218
itemType: how-to-guide
219219
- text: Customize user experiences using custom policies
220-
url: add-sign-up-and-sign-in-policy.md?pivots=b2c-custom-policy
220+
url: add-sign-up-and-sign-in-policy.md?pivots=b2c-custom-policy
221221
itemType: how-to-guide
222222
- text: Custom policy how-to guide series
223-
url: custom-policies-series-overview.md
223+
url: custom-policies-series-overview.md
224224
itemType: how-to-guide
225225
# - text: Use API connectors
226226
# url: add-api-connector.md?pivots=b2c-user-flow

articles/active-directory-b2c/partner-f5.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -234,12 +234,12 @@ The BIG-IP has required Azure AD B2C requests in its preconfigured request set.
234234

235235
| Parameter | Parameter name | Parameter value|
236236
|----|---|---|
237-
| client-id | client-id |N/A |
237+
| client_id | client_id |N/A |
238238
| nonce | nonce| N/A|
239-
| redirect-uri | redirect-uri | N/A|
239+
| redirect_uri | redirect_uri | N/A|
240240
| scope | scope | N/A|
241-
| response-type | response-type | N/A|
242-
| client-secret | client-secret |N/A |
241+
| response_type | response_type | N/A|
242+
| client_secret | client_secret |N/A |
243243
| custom | grant_type | authorization_code |
244244

245245
**Auth redirect request: Enabled**
@@ -254,9 +254,9 @@ The BIG-IP has required Azure AD B2C requests in its preconfigured request set.
254254

255255
| Parameter | Parameter name | Parameter value|
256256
|---|---|----|
257-
| client-id | client-id | N/A|
258-
| redirect-uri | redirect-uri |N/A |
259-
| response-type |response-type |N/A |
257+
| client_id | client_id | N/A|
258+
| redirect_uri | redirect_uri |N/A |
259+
| response_type |response_type |N/A |
260260
| scope | scope | N/A|
261261
| nonce | nonce | N/A|
262262

articles/active-directory-domain-services/alert-ldaps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: troubleshooting
13-
ms.date: 01/29/2023
13+
ms.date: 09/15/2023
1414
ms.author: justinha
1515

1616
---
@@ -30,7 +30,7 @@ This article helps you understand and resolve common alerts with secure LDAP acc
3030

3131
When you enable secure LDAP, it's recommended to create additional rules that restrict inbound LDAPS access to specific IP addresses. These rules protect the managed domain from brute force attacks. To update the network security group to restrict TCP port 636 access for secure LDAP, complete the following steps:
3232

33-
1. In the Azure portal, search for and select **Network security groups**.
33+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Network security groups**.
3434
1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*, then select **Inbound security rules**
3535
1. Select **+ Add** to create a rule for TCP port 636. If needed, select **Advanced** in the window to create a rule.
3636
1. For the **Source**, choose *IP Addresses* from the drop-down menu. Enter the source IP addresses that you want to grant access for secure LDAP traffic.

0 commit comments

Comments
 (0)