Skip to content

Commit 230c249

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/azure-docs-pr into 0729-linter-artifacts-parameters
2 parents 686009c + 15ee0c5 commit 230c249

File tree

1,995 files changed

+26978
-18268
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,995 files changed

+26978
-18268
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -978,6 +978,7 @@
978978
".openpublishing.redirection.app-service.json",
979979
".openpublishing.redirection.key-vault.json",
980980
".openpublishing.redirection.sql-database.json",
981+
".openpublishing.redirection.machine-configuration.json",
981982
".openpublishing.redirection.security-benchmark.json",
982983
"articles/synapse-analytics/.openpublishing.redirection.synapse-analytics.json",
983984
".openpublishing.redirection.azure-web-pubsub.json",

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,11 @@
5555
"redirect_url": "/azure/active-directory/authentication/how-to-mfa-registration-campaign",
5656
"redirect_document_id": false
5757
},
58+
{
59+
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-create-trust-github.md",
60+
"redirect_url":"/azure/active-directory/develop/workload-identity-federation-create-trust",
61+
"redirect_document_id": false
62+
},
5863
{
5964
"source_path_from_root": "/articles/active-directory/develop/active-directory-v2-limitations.md",
6065
"redirect_url": "/azure/active-directory/azuread-dev/azure-ad-endpoint-comparison",

.openpublishing.redirection.azure-monitor.json

Lines changed: 33 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -233,27 +233,27 @@
233233
},
234234
{
235235
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-examples.md",
236-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
236+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
237237
"redirect_document_id": false
238238
},
239239
{
240240
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-options.md",
241-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
241+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
242242
"redirect_document_id": false
243243
},
244244
{
245245
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-overview.md",
246-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
246+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
247247
"redirect_document_id": false
248248
},
249249
{
250250
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-tasks.md",
251-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
251+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
252252
"redirect_document_id": false
253253
},
254254
{
255255
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-tiles.md",
256-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
256+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
257257
"redirect_document_id": false
258258
},
259259
{
@@ -268,7 +268,7 @@
268268
},
269269
{
270270
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-add-text.md",
271-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-add-workbook-elements",
271+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-create-workbook",
272272
"redirect_document_id": false
273273
},
274274
{
@@ -301,14 +301,34 @@
301301
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
302302
"redirect_document_id": false
303303
},
304+
{
305+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-page.md" ,
306+
"redirect_url": "/azure/azure-monitor/alerts/alerts-manage-alert-instances",
307+
"redirect_document_id": false
308+
},
304309
{
305310
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-instances.md" ,
306-
"redirect_url": "/azure/azure-monitor/alerts/alerts-page",
311+
"redirect_url": "/azure/azure-monitor/alerts/alerts-manage-alert-instances",
307312
"redirect_document_id": false
308313
},
309314
{
310315
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-states.md" ,
311-
"redirect_url": "/azure/azure-monitor/alerts/alerts-page",
316+
"redirect_url": "/azure/azure-monitor/alerts/alerts-manage-alert-instances",
317+
"redirect_document_id": false
318+
},
319+
{
320+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-metric.md" ,
321+
"redirect_url": "/azure/azure-monitor/alerts/alerts-create-new-alert-rule",
322+
"redirect_document_id": false
323+
},
324+
{
325+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-log.md" ,
326+
"redirect_url": "/azure/azure-monitor/alerts/alerts-create-new-alert-rule",
327+
"redirect_document_id": false
328+
},
329+
{
330+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-activity-log.md" ,
331+
"redirect_url": "/azure/azure-monitor/alerts/alerts-create-new-alert-rule",
312332
"redirect_document_id": false
313333
},
314334
{
@@ -341,6 +361,11 @@
341361
"redirect_url": "/azure/data-explorer/data-explorer-insights",
342362
"redirect_document_id": false
343363
},
364+
{
365+
"source_path_from_root": "/articles/azure-monitor/insights/troubleshoot-workbooks.md" ,
366+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
367+
"redirect_document_id": false
368+
},
344369
{
345370
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-ga-release-faq.md" ,
346371
"redirect_url": "/azure/azure-monitor/faq#vm-insights",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7641,6 +7641,16 @@
76417641
"redirect_url": "/azure/azure-monitor/app/overview-dashboard",
76427642
"redirect_document_id": true
76437643
},
7644+
{
7645+
"source_path_from_root": "/articles/azure-monitor/agents/azure-monitor-agent-overview.md",
7646+
"redirect_url": "/azure/azure-monitor/agents/agents-overview",
7647+
"redirect_document_id": true
7648+
},
7649+
{
7650+
"source_path_from_root": "/azure/azure-monitor/agents/agents-overview.md#log-analytics-agent",
7651+
"redirect_url": "/azure/azure-monitor/agents/log-analytics-agent",
7652+
"redirect_document_id": true
7653+
},
76447654
{
76457655
"source_path_from_root": "/articles/cognitive-services/Computer-vision/deploy-computer-vision-on-container-instances.md",
76467656
"redirect_url": "/azure/cognitive-services/containers/azure-container-instance-recipe",
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/governance/policy/concepts/guest-configuration.md",
5+
"redirect_url": "/azure/governance/machine-configuration/overview",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/governance/policy/concepts/guest-configuration-policy-effects.md",
10+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-policy-effects",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-desired-state-configuration-extension-migration.md",
15+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-dsc-extension-migration",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/governance/policy/concepts/guest-configuration-custom.md",
20+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-custom",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create.md",
25+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-create",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create-test.md",
30+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-create-test",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create-signing.md",
35+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-create-signing",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create-setup.md",
40+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-create-setup",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create-publish.md",
45+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-create-publish",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create-definition.md",
50+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-create-definition",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create-assignment.md",
55+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-create-assignment",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-azure-automation-migration.md",
60+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-azure-automation-migration",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path_from_root": "/articles/governance/policy/concepts/guest-configuration-assignments.md",
65+
"redirect_url": "/azure/governance/machine-configuration/machine-configuration-assignments",
66+
"redirect_document_id": false
67+
},
68+
]
69+
}

.whatsnew/.azure-monitor.json

Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
{
2+
"$schema": "https://whatsnewapi.azurewebsites.net/schema",
3+
"docSetProductName": "Azure Monitor",
4+
"rootDirectory": "articles/azure-monitor/",
5+
"docLinkSettings": {
6+
"linkFormat": "relative",
7+
"relativeLinkPrefix": "/azure/azure-monitor/"
8+
},
9+
"inclusionCriteria": {
10+
"labels": [
11+
"label:whats-new"
12+
],
13+
"minAdditionsToFile": 1
14+
},
15+
"areas": [
16+
{
17+
"names": ["."],
18+
"heading": "General"
19+
},
20+
{
21+
"names":["agents"],
22+
"heading": "Agents"
23+
},
24+
{
25+
"names":["alters"],
26+
"heading": "Alerts"
27+
},
28+
{
29+
"names":["app"],
30+
"heading": "Application Insights"
31+
},
32+
{
33+
"names":["autoscale"],
34+
"heading": "Autoscale"
35+
},
36+
{
37+
"names":["change"],
38+
"heading": "Change Analysis"
39+
},
40+
{
41+
"names":["containers"],
42+
"heading": "Containers"
43+
},
44+
{
45+
"names":["essentials"],
46+
"heading": "Essentials"
47+
},
48+
{
49+
"names":["insights"],
50+
"heading": "Insights"
51+
},
52+
{
53+
"names":["logs"],
54+
"heading": "Logs"
55+
},
56+
{
57+
"names":["media"],
58+
"heading": "Media"
59+
},
60+
{
61+
"names":["profiler"],
62+
"heading": "Profiler"
63+
},
64+
{
65+
"names":["snapshot-debugger"],
66+
"heading": "Snapshot Debugger"
67+
},
68+
{
69+
"names":["visualize"],
70+
"heading": "Visualize"
71+
},
72+
{
73+
"names":["vm"],
74+
"heading": "VMs"
75+
}
76+
]
77+
}

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -162,19 +162,19 @@ The following example shows the content definition identifiers and the correspon
162162
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:providerselection:1.2.1</DataUri>
163163
</ContentDefinition>
164164
<ContentDefinition Id="api.signuporsignin">
165-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:unifiedssp:2.1.5</DataUri>
165+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:unifiedssp:2.1.7</DataUri>
166166
</ContentDefinition>
167167
<ContentDefinition Id="api.selfasserted">
168-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.7</DataUri>
168+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.14</DataUri>
169169
</ContentDefinition>
170170
<ContentDefinition Id="api.selfasserted.profileupdate">
171-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.7</DataUri>
171+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.14</DataUri>
172172
</ContentDefinition>
173173
<ContentDefinition Id="api.localaccountsignup">
174-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.7</DataUri>
174+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.14</DataUri>
175175
</ContentDefinition>
176176
<ContentDefinition Id="api.localaccountpasswordreset">
177-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.7</DataUri>
177+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.14</DataUri>
178178
</ContentDefinition>
179179
<ContentDefinition Id="api.phonefactor">
180180
<RecoveryUri>~/common/default_page_error.html</RecoveryUri>

articles/active-directory-b2c/extensions-app.md

Lines changed: 25 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -31,15 +31,33 @@ To verify that the b2c-extensions-app is present:
3131

3232
## Recover the extensions app
3333

34-
If you accidentally deleted the b2c-extensions-app, you have 30 days to recover it. You can restore the app using the Graph API:
34+
If you accidentally deleted the `b2c-extensions-app`, you have 30 days to recover it.
3535

36+
> [!NOTE]
37+
> An application can only be restored if it has been deleted within the last 30 days. If it has been more than 30 days, data will be permanently lost. For more assistance, file a support ticket.
38+
39+
### Recover the extensions app using the Azure portal
40+
41+
1. Sign in to your Azure AD B2C tenant.
42+
2. Search for and open **App registrations**.
43+
1. Select the **Deleted applications** tab and identify the `b2c-extensions-app` from the list of recently deleted applications.
44+
1. Select **Restore app registration**.
45+
46+
You should now be able to [see the restored app](#verifying-that-the-extensions-app-is-present) in the Azure portal.
47+
48+
### Recover the extensions app using Microsoft Graph
49+
To restore the app using Microsoft Graph, you must restore both the application and the service principal.
50+
51+
To restore the application:
3652
1. Browse to [https://developer.microsoft.com/en-us/graph/graph-explorer](https://developer.microsoft.com/en-us/graph/graph-explorer).
3753
1. Log in to the site as a global administrator for the Azure AD B2C directory that you want to restore the deleted app for. This global administrator must have an email address similar to the following: `username@{yourTenant}.onmicrosoft.com`.
38-
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/beta/directory/deleteditems/microsoft.graph.application`. This operation will list all of the applications that have been deleted within the past 30 days.
39-
1. Find the application in the list where the name begins with 'b2c-extensions-app and copy its `objectid` property value.
40-
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/beta/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `objectid` from the previous step.
54+
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.application`. This operation will list all of the applications that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.application?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
55+
1. Find the application in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
56+
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.]
4157

42-
You should now be able to [see the restored app](#verifying-that-the-extensions-app-is-present) in the Azure portal.
58+
To restore the service principal:
59+
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.servicePrincipal`. This operation will list all of the service principals that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
60+
1. Find the service principal in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
61+
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.
4362

44-
> [!NOTE]
45-
> An application can only be restored if it has been deleted within the last 30 days. If it has been more than 30 days, data will be permanently lost. For more assistance, file a support ticket.
63+
You should now be able to [see the restored app](#verifying-that-the-extensions-app-is-present) in the Azure portal.

articles/active-directory-b2c/force-password-reset.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 01/24/2022
12+
ms.date: 08/04/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -98,15 +98,18 @@ Get the example of the force password reset policy on [GitHub](https://github.co
9898

9999
## Force password reset on next login
100100

101-
To force reset the password on next login, update the account password profile using MS Graph [Update user](/graph/api/user-update) operation. The following example updates the password profile [forceChangePasswordNextSignIn](user-profile-attributes.md#password-profile-property) attribute to `true`, which forces the user to reset the password on next login.
101+
To force reset the password on next login, update the account password profile using MS Graph [Update user](/graph/api/user-update) operation. To do this, you need to assign your [Microsoft Graph application](microsoft-graph-get-started.md) the [User administrator](../active-directory/roles/permissions-reference.md#user-administrator) role. Follow the steps in [Grant user administrator role](microsoft-graph-get-started.md?tabs=app-reg-ga#optional-grant-user-administrator-role) to assign your Microsoft Graph application a User administrator role.
102+
103+
The following example updates the password profile [forceChangePasswordNextSignIn](user-profile-attributes.md#password-profile-property) attribute to `true`, which forces the user to reset the password on next login.
102104

103105
```http
104106
PATCH https://graph.microsoft.com/v1.0/users/<user-object-ID>
105107
Content-type: application/json
106108
107109
{
108-
"passwordProfile": {
109-
"forceChangePasswordNextSignIn": true
110+
"passwordProfile": {
111+
"forceChangePasswordNextSignIn": true
112+
}
110113
}
111114
```
112115

articles/active-directory-b2c/json-transformations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ The following example generates a JSON string based on the claim value of "email
6868
<InputClaims>
6969
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.to.0.email" />
7070
<InputClaim ClaimTypeReferenceId="otp" TransformationClaimType="personalizations.0.dynamic_template_data.otp" />
71+
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
7172
</InputClaims>
7273
<InputParameters>
7374
<InputParameter Id="template_id" DataType="string" Value="d-4c56ffb40fa648b1aa6822283df94f60"/>
@@ -464,4 +465,4 @@ Output claim:
464465

465466
## Next steps
466467

467-
- Find more [claims transformation samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/json) on the Azure AD B2C community GitHub repo
468+
- Find more [claims transformation samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/json) on the Azure AD B2C community GitHub repo

0 commit comments

Comments
 (0)