Skip to content

Commit 249d7ae

Browse files
committed
Merge branch 'main' of https://github.com/seesharprun/azure-docs-pr into cosmos-quickstarts-refresh
2 parents 1e775f2 + c6955c9 commit 249d7ae

File tree

2,649 files changed

+27324
-18723
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,649 files changed

+27324
-18723
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1228,6 +1228,7 @@
12281228
"articles/ai-services/.openpublishing.redirection.applied-ai-old.json",
12291229
"articles/ai-services/.openpublishing.redirection.applied-ai-services.json",
12301230
"articles/ai-services/.openpublishing.redirection.cognitive-services.json",
1231+
"articles/energy-data-services/.openpublishing.redirection.energy-data-services.json",
12311232
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
12321233
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
12331234
"articles/azure-relay/.openpublishing.redirection.relay.json",

.openpublishing.redirection.azure-monitor.json

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -430,6 +430,11 @@
430430
"redirect_url": "/previous-versions/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
431431
"redirect_document_id": false
432432
},
433+
{
434+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-retrieve-legacy-workbooks.md",
435+
"redirect_url": "/previous-versions/azure/azure-monitor/visualize/workbooks-retrieve-legacy-workbooks",
436+
"redirect_document_id": false
437+
},
433438
{
434439
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-view-designer-conversions.md",
435440
"redirect_url": "/previous-versions/azure/azure-monitor/visualize/workbooks-view-designer-conversions",
@@ -1185,6 +1190,11 @@
11851190
"redirect_url": "/azure/azure-monitor/agents/agents-overview",
11861191
"redirect_document_id": true
11871192
},
1193+
{
1194+
"source_path_from_root": "/articles/azure-monitor/agents/use-azure-monitor-agent-troubleshooter.md",
1195+
"redirect_url": "/azure/azure-monitor/agents/troubleshooter-ama-windows",
1196+
"redirect_document_id": true
1197+
},
11881198
{
11891199
"source_path_from_root": "/azure/azure-monitor/agents/agents-overview.md#log-analytics-agent",
11901200
"redirect_url": "/azure/azure-monitor/agents/log-analytics-agent",
@@ -6051,7 +6061,7 @@
60516061
},
60526062
{
60536063
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-using-migration-tool.md",
6054-
"redirect_url": "previous-versions/azure/azure-monitor/alerts/alerts-using-migration-tool",
6064+
"redirect_url": "/previous-versions/azure/azure-monitor/alerts/alerts-using-migration-tool",
60556065
"redirect_document_id": false
60566066
},
60576067
{
@@ -6074,6 +6084,21 @@
60746084
"redirect_url": "/previous-versions/azure/azure-monitor/visualize/view-designer-filters",
60756085
"redirect_document_id": false
60766086
},
6087+
{
6088+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-configurations.md",
6089+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-manage",
6090+
"redirect_document_id": false
6091+
},
6092+
{
6093+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-getting-started.md",
6094+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
6095+
"redirect_document_id": false
6096+
},
6097+
{
6098+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-commonly-used-components.md",
6099+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-visualizations",
6100+
"redirect_document_id": false
6101+
},
60776102
{
60786103
"source_path_from_root": "/articles/azure-monitor/app/export-telemetry.md",
60796104
"redirect_url": "/previous-versions/azure/azure-monitor/app/export-telemetry",
@@ -6468,6 +6493,12 @@
64686493
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-configure-workspace.md",
64696494
"redirect_url": "/azure/azure-monitor/vm/vminsights-enable-overview",
64706495
"redirect_document_id": false
6496+
},
6497+
{
6498+
"source_path_from_root": "/articles/azure-monitor/logs/data-collection-rule-sample-custom-logs.md",
6499+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-samples",
6500+
"redirect_document_id": false
64716501
}
6502+
64726503
]
64736504
}

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -588,7 +588,7 @@
588588
{
589589
"source_path_from_root": "/articles/security-center/managing-and-responding-alerts.md",
590590
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
591-
"redirect_document_id": true
591+
"redirect_document_id": false
592592
},
593593
{
594594
"source_path_from_root": "/articles/security-center/os-coverage.md",
@@ -702,8 +702,8 @@
702702
},
703703
{
704704
"source_path_from_root": "/articles/security-center/tutorial-security-incident.md",
705-
"redirect_url": "/azure/defender-for-cloud/tutorial-security-incident",
706-
"redirect_document_id": true
705+
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
706+
"redirect_document_id": false
707707
},
708708
{
709709
"source_path_from_root": "/articles/security-center/tutorial-security-policy.md",
@@ -904,6 +904,16 @@
904904
"source_path_from_root": "/articles/defender-for-cloud/attack-path-reference.md",
905905
"redirect_url": "/azure/defender-for-cloud/how-to-manage-attack-path",
906906
"redirect_document_id": true
907+
},
908+
{
909+
"source_path_from_root": "/articles/defender-for-cloud/integration-overview.md",
910+
"redirect_url": "/azure/defender-for-cloud/integration-servicenow",
911+
"redirect_document_id": true
912+
},
913+
{
914+
"source_path_from_root": "/articles/defender-for-cloud/tutorial-security-incident.md",
915+
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
916+
"redirect_document_id": true
907917
}
908918
]
909919
}

.openpublishing.redirection.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1080,6 +1080,46 @@
10801080
"redirect_url": "/azure/site-recovery/azure-to-azure-autoupdate",
10811081
"redirect_document_id": false
10821082
},
1083+
{
1084+
"source_path": "articles/site-recovery/vmware-azure-tutorial.md",
1085+
"redirect_url": "/azure/site-recovery/azure-to-azure-tutorial-enable-replication",
1086+
"redirect_document_id": false
1087+
},
1088+
{
1089+
"source_path": "articles/site-recovery/vmware-azure-tutorial-failover-failback.md",
1090+
"redirect_url": "/azure/site-recovery/azure-to-azure-tutorial-enable-replication",
1091+
"redirect_document_id": false
1092+
},
1093+
{
1094+
"source_path": "articles/site-recovery/physical-azure-architecture.md",
1095+
"redirect_url": "/azure/site-recovery/physical-server-azure-architecture-modernized",
1096+
"redirect_document_id": false
1097+
},
1098+
{
1099+
"source_path": "articles/site-recovery/vmware-azure-configuration-server-requirements.md",
1100+
"redirect_url": "/azure/site-recovery/vmware-physical-azure-classic-deprecation",
1101+
"redirect_document_id": false
1102+
},
1103+
{
1104+
"source_path": "articles/site-recovery/vmware-physical-azure-config-process-server-overview.md",
1105+
"redirect_url": "/azure/site-recovery/deploy-vmware-azure-replication-appliance-modernized",
1106+
"redirect_document_id": false
1107+
},
1108+
{
1109+
"source_path": "articles/site-recovery/vmware-azure-about-disaster-recovery.md",
1110+
"redirect_url": "/azure/site-recovery/site-recovery-overview",
1111+
"redirect_document_id": false
1112+
},
1113+
{
1114+
"source_path": "articles/site-recovery/vmware-physical-secondary-architecture.md",
1115+
"redirect_url": "/azure/site-recovery/transport-layer-security",
1116+
"redirect_document_id": false
1117+
},
1118+
{
1119+
"source_path": "articles/site-recovery/hyper-v-vmm-architecture.md",
1120+
"redirect_url": "/azure/site-recovery/transport-layer-security",
1121+
"redirect_document_id": false
1122+
},
10831123
{
10841124
"source_path": "articles/container-registry/container-registry-customer-managed-keys.md",
10851125
"redirect_url": "/azure/container-registry/tutorial-customer-managed-keys",

.openpublishing.redirection.sql-database.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2560,6 +2560,11 @@
25602560
"source_path_from_root": "/articles/sql-database/sql-database-customer-implementations.md",
25612561
"redirect_url": "https://customers.microsoft.com",
25622562
"redirect_document_id": false
2563+
},
2564+
{
2565+
"source_path_from_root": "/articles/sql-database/scripts/sql-database-import-purview-labels.md",
2566+
"redirect_url": "/purview/register-scan-azure-sql-database",
2567+
"redirect_document_id": false
25632568
}
25642569
]
25652570
}

articles/active-directory-b2c/azure-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -349,7 +349,7 @@ To stop collecting logs to your Log Analytics workspace, delete the diagnostic s
349349
1. Sign in to the [Azure portal](https://portal.azure.com).
350350
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra ID tenant from the **Directories + subscriptions** menu.
351351
1. Choose the resource group that contains the Log Analytics workspace. This example uses a resource group named _azure-ad-b2c-monitor_ and a Log Analytics workspace named `AzureAdB2C`.
352-
1. [Delete the Logs Analytics workspace](../azure-monitor/logs/delete-workspace.md#azure-portal).
352+
1. [Delete the Logs Analytics workspace](../azure-monitor/logs/delete-workspace.md).
353353
1. Select the **Delete** button to delete the resource group.
354354
## Next steps
355355

articles/active-directory-b2c/integrate-with-app-code-samples.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ The following tables provide links to samples for applications including iOS, An
2626
| [dotnetcore-webapp-msal-api](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/4-WebApp-your-API/4-2-B2C) | An ASP.NET Core web application that can sign in a user using Azure AD B2C, get an access token using MSAL.NET and call an API. |
2727
| [auth-code-flow-nodejs](https://github.com/Azure-Samples/active-directory-b2c-msal-node-sign-in-sign-out-webapp) | A Node.js app that shows how to enable authentication (sign in, sign out and profile edit) in a Node.js web application using Azure Active Directory B2C. The web app uses MSAL-node.|
2828
| [javascript-nodejs-webapi](https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi) | A small Node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using passport.js. |
29-
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/main/README_B2C.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
29+
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/main/README.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
3030

3131
## Single page apps
3232

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: reference
12-
ms.date: 06/22/2023
12+
ms.date: 01/08/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -55,7 +55,7 @@ All types of technical profiles share the same concept. They start by reading th
5555
- Calls a REST API while sending parameters as InputClaims and getting information back as OutputClaims.
5656
- Creates or updates the user account.
5757
- Sends and verifies the multifactor authentication text message.
58-
1. **Validation technical profiles**: A [self-asserted technical profile](self-asserted-technical-profile.md) can call [validation technical profiles](validation-technical-profile.md) to validate the data profiled by the user.
58+
1. **Validation technical profiles**: A [self-asserted technical profile](self-asserted-technical-profile.md) can call [validation technical profiles](validation-technical-profile.md) to validate the data profiled by the user. Only self-asserted technical profiles can use validation technical profiles.
5959
1. **Output claims**: Claims are returned back to the claims bag. You can use those claims in the next orchestrations step or output claims transformations.
6060
1. **Output claims transformations**: After the technical profile is completed, Azure AD B2C runs output [claims transformations](claimstransformations.md).
6161
1. **SSO session management**: Persists the technical profile's data to the session by using [SSO session management](custom-policy-reference-sso.md).

articles/active-directory-b2c/user-profile-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kengaderdus
55
manager: CelesteDG
66
ms.service: active-directory
77
ms.topic: conceptual
8-
ms.date: 11/20/2023
8+
ms.date: 01/08/2024
99
ms.author: kengaderdus
1010
ms.subservice: B2C
1111
ms.custom: b2c-support
@@ -48,7 +48,7 @@ Azure AD B2C directory user profile supports the [user resource type](/graph/api
4848
|creationType |String|If the user account was created as a local account for an Azure Active Directory B2C tenant, the value is LocalAccount or nameCoexistence. Read only.|No|No|Persisted, Output|
4949
|dateOfBirth |Date|Date of birth.|No|No|Persisted, Output|
5050
|department |String|The name for the department in which the user works. Max length 64.|Yes|No|Persisted, Output|
51-
|displayName |String|The display name for the user. Max length 256. \< \> characters aren't allowed. | Yes|Yes|Persisted, Output|
51+
|displayName |String|The display name for the user. Max length 256. | Yes|Yes|Persisted, Output|
5252
|facsimileTelephoneNumber<sup>1</sup>|String|The telephone number of the user's business fax machine.|Yes|No|Persisted, Output|
5353
|givenName |String|The given name (first name) of the user. Max length 64.|Yes|Yes|Persisted, Output|
5454
|jobTitle |String|The user's job title. Max length 128.|Yes|Yes|Persisted, Output|

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 10 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 12/01/2023
4+
ms.date: 01/05/2024
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,15 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
1717

18+
## December 2023
19+
20+
### Updated articles
21+
22+
- [Set up a resource owner password credentials flow in Azure Active Directory B2C](add-ropc-policy.md) - Updated ROPC flow limitations
23+
- [Add user attributes and customize user input in Azure Active Directory B2C](configure-user-input.md) - Updated instructional steps
24+
- [Set up sign-up and sign-in with a Google account using Azure Active Directory B2C](identity-provider-google.md) - Editorial updates
25+
- [Localization string IDs](localization-string-ids.md) - Updated the localization string IDs
26+
1827
## November 2023
1928

2029
### Updated articles
@@ -41,25 +50,5 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
4150
- [Azure AD B2C: Frequently asked questions (FAQ)](faq.yml) - Editorial updates
4251
- [Enable JavaScript and page layout versions in Azure Active Directory B2C](javascript-and-page-layout.md) - Added breaking change on script tags
4352

44-
## September 2023
45-
46-
### Updated articles
47-
48-
- [Supported Microsoft Entra ID features](supported-azure-ad-features.md) - Editorial updates
49-
- [Publish your Azure Active Directory B2C app to the Microsoft Entra app gallery](publish-app-to-azure-ad-app-gallery.md) - Editorial updates
50-
- [Secure your API used an API connector in Azure AD B2C](secure-rest-api.md) - Editorial updates
51-
- [Azure AD B2C: Frequently asked questions (FAQ)'](faq.yml) - Editorial updates
52-
- [Define an ID token hint technical profile in an Azure Active Directory B2C custom policy](id-token-hint.md) - Editorial updates
53-
- [Set up sign-in for multitenant Microsoft Entra ID using custom policies in Azure Active Directory B2C](identity-provider-azure-ad-multi-tenant.md) - Editorial updates
54-
- [Set up sign-in for a specific Microsoft Entra organization in Azure Active Directory B2C](identity-provider-azure-ad-single-tenant.md) - Editorial updates
55-
- [Localization string IDs](localization-string-ids.md) - Editorial updates
56-
- [Define a Microsoft Entra ID multifactor authentication technical profile in an Azure AD B2C custom policy](multi-factor-auth-technical-profile.md) - Editorial updates
57-
- [Define a Microsoft Entra ID SSPR technical profile in an Azure AD B2C custom policy](aad-sspr-technical-profile.md) - Editorial updates
58-
- [Define a Microsoft Entra technical profile in an Azure Active Directory B2C custom policy](active-directory-technical-profile.md) - Editorial updates
59-
- [Monitor Azure AD B2C with Azure Monitor](azure-monitor.md) - Editorial updates
60-
- [Billing model for Azure Active Directory B2C](billing.md) - Editorial updates
61-
- [Enable custom domains for Azure Active Directory B2C](custom-domain.md) - Editorial updates
62-
- [Set up a sign-up and sign-in flow with a social account by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in-federation.md) - Editorial updates
63-
- [Create and read a user account by using Azure Active Directory B2C custom policy](custom-policies-series-store-user.md) - Editorial updates
6453

6554

0 commit comments

Comments
 (0)