Skip to content

Commit 2078d90

Browse files
committed
fix merge conflict
2 parents c9dafdd + ae624e0 commit 2078d90

File tree

762 files changed

+9341
-4307
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

762 files changed

+9341
-4307
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -365,6 +365,46 @@
365365
"source_path_from_root": "/articles/azure-monitor/insights/redis-cache-insights-overview.md" ,
366366
"redirect_url": "/azure/azure-cache-for-redis/redis-cache-insights-overview",
367367
"redirect_document_id": false
368+
},
369+
{
370+
"source_path_from_root": "/articles/azure-monitor/logs/ingestion-time-transformations.md" ,
371+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-transformations",
372+
"redirect_document_id": false
373+
},
374+
{
375+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-ingestion-time-transformations.md" ,
376+
"redirect_url": "/azure/azure-monitor/logs/tutorial-workspace-transformations-portal",
377+
"redirect_document_id": false
378+
},
379+
{
380+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-ingestion-time-transformations-api.md" ,
381+
"redirect_url": "/azure/azure-monitor/logs/tutorial-workspace-transformations-api",
382+
"redirect_document_id": false
383+
},
384+
{
385+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-custom-logs.md" ,
386+
"redirect_url": "/azure/azure-monitor/logs/tutorial-logs-ingestion-portal",
387+
"redirect_document_id": false
388+
},
389+
{
390+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-custom-logs-api.md" ,
391+
"redirect_url": "/azure/azure-monitor/logs/tutorial-logs-ingestion-api",
392+
"redirect_document_id": false
393+
},
394+
{
395+
"source_path_from_root": "/articles/azure-monitor/agents/data-sources.md" ,
396+
"redirect_url": "/azure/azure-monitor/essentials/data-sources",
397+
"redirect_document_id": false
398+
},
399+
{
400+
"source_path_from_root": "/articles/azure-monitor/essentials/data-collection-rule-transformations.md" ,
401+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-transformations-structure",
402+
"redirect_document_id": false
403+
},
404+
{
405+
"source_path_from_root": "/articles/azure-monitor/logs/custom-logs-overview.md" ,
406+
"redirect_url": "/azure/azure-monitor/logs/logs-ingestion-api-overview",
407+
"redirect_document_id": false
368408
}
369409
]
370410
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/api-management/zone-redundancy.md",
5+
"redirect_url": "/azure/availability-zones/migrate-api-mgt",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/virtual-machines/linux/find-unattached-nics.md",
510
"redirect_url": "/previous-versions/azure/virtual-machines/linux/find-unattached-nics",

articles/active-directory-b2c/configure-authentication-in-azure-web-app-file-based.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App configuration file by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](/azure/app-service/configure-authentication-file-based) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](../app-service/configure-authentication-file-based.md) article.
1919

2020
## Overview
2121

@@ -141,6 +141,5 @@ From your server code, the provider-specific tokens are injected into the reques
141141

142142
## Next steps
143143

144-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
145-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
146-
144+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](../app-service/configure-authentication-user-identities.md).
145+
* Learn how to [Work with OAuth tokens in Azure App Service authentication](../app-service/configure-authentication-oauth-tokens.md).

articles/active-directory-b2c/configure-authentication-in-azure-web-app.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](/azure/app-service/configure-authentication-provider-openid-connect) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](../app-service/configure-authentication-provider-openid-connect.md) article.
1919

2020
## Overview
2121

@@ -94,7 +94,7 @@ To register your application, follow these steps:
9494
1. For the **Client Secret** provide the Web App (client) secret from [step 2.2](#step-22-create-a-client-secret).
9595
9696
> [!TIP]
97-
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](/azure/app-service/app-service-key-vault-references) if you wish to manage the secret in Azure Key Vault.
97+
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](../app-service/app-service-key-vault-references.md) if you wish to manage the secret in Azure Key Vault.
9898
9999
1. Keep the rest of the settings with the default values.
100100
1. Press the **Add** button to finish setting up the identity provider.
@@ -119,6 +119,5 @@ From your server code, the provider-specific tokens are injected into the reques
119119
120120
## Next steps
121121
122-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
123-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
124-
122+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](../app-service/configure-authentication-user-identities.md).
123+
* Learn how to [Work with OAuth tokens in Azure App Service authentication](../app-service/configure-authentication-oauth-tokens.md).

articles/active-directory-b2c/enable-authentication-python-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -416,7 +416,7 @@ if __name__ == "__main__":
416416
417417
## Step 6: Run your web app
418418
419-
In the Terminal, run the app by entering the following command, which runs the Flask development server. The development server looks for `app.py` by default. Then, open your browser and navigate to the web app URL: <http://localhost:5000>.
419+
In the Terminal, run the app by entering the following command, which runs the Flask development server. The development server looks for `app.py` by default. Then, open your browser and navigate to the web app URL: `http://localhost:5000`.
420420
421421
# [Linux](#tab/linux)
422422

articles/active-directory-b2c/error-codes.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/16/2021
12+
ms.date: 07/18/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -20,6 +20,7 @@ The following errors can be returned by the Azure Active Directory B2C service.
2020

2121
| Error code | Message | Notes |
2222
| ---------- | ------- | ----- |
23+
| `AADB2C90001` | This user already exists, and profile '{0}' does not allow the same user to be created again. | [Sign-up flow](add-sign-up-and-sign-in-policy.md) |
2324
| `AADB2C90002` | The CORS resource '{0}' returned a 404 not found. | [Hosting the page content](customize-ui-with-html.md#hosting-the-page-content) |
2425
| `AADB2C90006` | The redirect URI '{0}' provided in the request is not registered for the client ID '{1}'. | [Register a web application](tutorial-register-applications.md), [Sending authentication requests](openid-connect.md#send-authentication-requests) |
2526
| `AADB2C90007` | The application associated with client ID '{0}' has no registered redirect URIs. | [Register a web application](tutorial-register-applications.md), [Sending authentication requests](openid-connect.md#send-authentication-requests) |

articles/active-directory-b2c/page-layout.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/12/2022
12+
ms.date: 07/18/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -26,7 +26,7 @@ Page layout packages are periodically updated to include fixes and improvements
2626

2727
Azure AD B2C page layout uses the following versions of the [jQuery library](https://jquery.com/) and the [Handlebars templates](https://handlebarsjs.com/):
2828

29-
|Element |Page layout version range |jQuery version |Handlebars Runtime version |Handlebars Compliler version |
29+
|Element |Page layout version range |jQuery version |Handlebars Runtime version |Handlebars Compiler version |
3030
|---------|---------|------|--------|----------|
3131
|multifactor |>= 1.2.4 | 3.5.1 | 4.7.6 |4.7.7 |
3232
| |< 1.2.4 | 3.4.1 |4.0.12 |2.0.1 |
@@ -52,6 +52,9 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
5252

5353
## Self-asserted page (selfasserted)
5454

55+
**2.1.14**
56+
- Fixed WCAG 2.1 accessibility bug for the TOTP multifactor authentication screens.
57+
5558
**2.1.10**
5659

5760
- Correcting to the tab index
@@ -83,7 +86,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
8386
- Fixed an accessibility bug to show inline error messages only on form submission.
8487

8588
**2.1.6**
86-
- Fixed password error get cleared when typing too quickly on a different field.
89+
- Fixed *password error gets cleared when typing too quickly on a different field*.
8790

8891
**2.1.5**
8992
- Fixed cursor jumps issue on iOS when editing in the middle of the text.
@@ -100,7 +103,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
100103

101104
**2.1.1**
102105

103-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
106+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This message is hidden by default.
104107
- Added support for saving passwords to iCloud Keychain.
105108
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
106109
- Added disclaimers on self-asserted page.
@@ -143,7 +146,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
143146

144147
- Initial release
145148

146-
## Unified sign-in sign-up page with password reset link (unifiedssp)
149+
## Unified sign-in and sign-up page with password reset link (unifiedssp)
147150

148151
> [!TIP]
149152
> If you localize your page to support multiple locales, or languages in a user flow. The [localization IDs](localization-string-ids.md) article provides the list of localization IDs that you can use for the page version you select.
@@ -159,7 +162,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
159162
- Updates to the UI elements and CSS classes
160163

161164
**2.1.5**
162-
- Fixed an issue on tab order when idp selector template is used on sign in page.
165+
- Fixed an issue on tab order when idp selector template is used on sign-in page.
163166
- Fixed an encoding issue on sign-in link text.
164167

165168
**2.1.4**
@@ -175,7 +178,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
175178
- Allowing the "forgot password" link to use as claims exchange. For more information, see [Self-service password reset](add-password-reset-policy.md#self-service-password-reset-recommended).
176179

177180
**2.1.1**
178-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
181+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This message is hidden by default.
179182
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
180183
- Added support for saving passwords to iCloud Keychain.
181184
- Focus is now placed on the first error field when multiple fields have errors.
@@ -187,7 +190,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
187190

188191
- Added support for multiple sign-up links.
189192
- Added support for user input validation according to the predicate rules defined in the policy.
190-
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your sign in name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
193+
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your sign-in name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
191194

192195
**1.2.0**
193196

@@ -225,7 +228,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
225228
**1.2.2**
226229
- Fixed an issue with auto-filling the verification code when using iOS.
227230
- Fixed an issue with redirecting a token to the relying party from Android Webview.
228-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
231+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This messages is hidden by default.
229232
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
230233

231234
**1.2.1**
@@ -246,7 +249,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
246249

247250
- 'Confirm Code' button removed
248251
- The input field for the code now only takes input up to six (6) characters
249-
- The page will automatically attempt to verify the code entered when a 6-digit code is entered, without any button having to be clicked
252+
- The page will automatically attempt to verify the code entered when a six-digit code is entered, without any button having to be clicked
250253
- If the code is wrong, the input field is automatically cleared
251254
- After three (3) attempts with an incorrect code, B2C sends an error back to the relying party
252255
- Accessibility fixes
@@ -274,7 +277,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
274277
**1.1.0**
275278

276279
- Accessibility fix
277-
- Removed the default message when there is no contact from the policy
280+
- Removed the default message when there's no contact from the policy
278281
- Default CSS removed
279282

280283
**1.0.0**
41.2 KB
Loading
26.8 KB
Loading

articles/active-directory/app-provisioning/partner-driven-integrations.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: rkarlin
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 07/08/2022
10+
ms.date: 07/18/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -22,12 +22,16 @@ Popular third party applications, such as Dropbox, Snowflake, and Workplace by F
2222
**Option 2 - Implement a SCIM compliant API for your application:**
2323
If your line-of-business application supports the [SCIM](https://aka.ms/scimoverview) standard, it can easily be integrated with the [Azure AD SCIM client](use-scim-to-provision-users-and-groups.md).
2424

25+
[![Diagram showing implementation of a SCIM compliant API for your application.](media/partner-driven-integrations/scim-compliant-api-1.png)](media/partner-driven-integrations/scim-compliant-api-1.png#lightbox)
26+
2527
**Option 3 - Use Microsoft Graph:**
2628
Many new applications use Microsoft Graph to retrieve users, groups and other resources from Azure Active Directory. You can learn more about what scenarios to use [SCIM and Graph](scim-graph-scenarios.md) in.
2729

2830
**Option 4 - Use partner-driven connectors:**
2931
In cases where an application doesn't support SCIM, partners have built gateways between the Azure AD SCIM client and target applications. **This document serves as a place for partners to attest to integrations that are compatible with Azure Active Directory, and for customers to discover these partner-driven integrations.** These gateways are built, maintained, and owned by the third-party vendor.
3032

33+
[![Diagram showing gateways between the Azure AD SCIM client and target applications.](media/partner-driven-integrations/partner-driven-connectors-1.png)](media/partner-driven-integrations/partner-driven-connectors-1.png#lightbox)
34+
3135
## Available partner-driven integrations
3236
The descriptions and lists of applications below are provided by the partners themselves. You can use the lists of applications supported to identify a partner that you may want to contact and learn more about.
3337

0 commit comments

Comments
 (0)