Skip to content

Commit 260a8f2

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-aadroles-roles-microsoft-hardware-warranty
2 parents 47283a6 + 129bd7a commit 260a8f2

File tree

1,950 files changed

+18017
-11446
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,950 files changed

+18017
-11446
lines changed

.openpublishing.publish.config.json

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -849,9 +849,15 @@
849849
"branch_mapping": {}
850850
},
851851
{
852-
"path_to_root": "azure-cosmos-dotnet-v3",
853-
"url": "https://github.com/Azure-Samples/cosmos-db-sql-api-dotnet-samples",
854-
"branch": "v3",
852+
"path_to_root": "cosmos-db-nosql-dotnet-samples",
853+
"url": "https://github.com/azure-samples/cosmos-db-nosql-dotnet-samples",
854+
"branch": "main",
855+
"branch_mapping": {}
856+
},
857+
{
858+
"path_to_root": "cosmos-db-nosql-python-samples",
859+
"url": "https://github.com/azure-samples/cosmos-db-nosql-python-samples",
860+
"branch": "main",
855861
"branch_mapping": {}
856862
},
857863
{

.openpublishing.redirection.azure-productivity.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,11 @@
2929
"source_path_from_root": "/articles/devtest-labs/scripts/set-allowed-vm-sizes-in-lab.md",
3030
"redirect_url": "/azure/devtest-labs/samples-powershell",
3131
"redirect_document_id": false
32-
}
32+
},
33+
{
34+
"source_path": "articles/dev-box/tutorial-connect-to-dev-box-with-remote-desktop-app.md",
35+
"redirect_url": "/azure/dev-box/quickstart-connect-to-dev-box-with-remote-desktop-app",
36+
"redirect_document_id": false
37+
}
3338
]
3439
}

.openpublishing.redirection.communication-services.json

Lines changed: 0 additions & 9 deletions
This file was deleted.

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -798,6 +798,16 @@
798798
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
799799
"redirect_document_id": false
800800
},
801+
{
802+
"source_path_from_root": "/articles/aks/dapr-troubleshooting.md",
803+
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
804+
"redirect_document_id": false
805+
},
806+
{
807+
"source_path_from_root": "/articles/aks/csi-secrets-store-troubleshooting.md",
808+
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
809+
"redirect_document_id": false
810+
},
801811
{
802812
"source_path_from_root": "/articles/cdn/index.yml",
803813
"redirect_url": "/azure/frontdoor",
@@ -29363,6 +29373,11 @@
2936329373
"source_path_from_root": "/articles/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6.md",
2936429374
"redirect_url": "/azure/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6-powershell",
2936529375
"redirect_document_id": false
29376+
},
29377+
{
29378+
"source_path_from_root": "/articles/cloud-shell/example-terraform-bash.md",
29379+
"redirect_url": "/azure/developer/terraform/quickstart-configure",
29380+
"redirect_document_id": false
2936629381
}
2936729382
]
2936829383
}

articles/active-directory-b2c/api-connector-samples.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kengaderdus
66
manager: CelesteDG
77

88
ms.author: kengaderdus
9-
ms.date: 07/16/2021
9+
ms.date: 11/03/2022
1010
ms.custom: mvc
1111
ms.topic: sample
1212
ms.service: active-directory

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
8181
1. Select **Add optional claim**.
8282
1. For the **Token type**, select **ID**.
8383
1. Select the optional claims to add, `family_name` and `given_name`.
84-
1. Select **Add**. If **Turn on the Microsoft Graph email permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
84+
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
8585
8686
## [Optional] Verify your app authenticity
8787

articles/active-directory-b2c/sign-in-options.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
22
title: Sign-in options supported by Azure AD B2C
33
titleSuffix: Azure AD B2C
4-
description: Learn about the options for sign-up and sign-in you can use with Azure Active Directory B2C, including username and password, email, phone, or federation with social or external identity providers.
4+
description: Learn about the sign-up and sign-in options you can use with Azure Active Directory B2C, including username and password, email, phone, or federation with social or external identity providers.
55
services: active-directory-b2c
66
author: kengaderdus
77
manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 05/10/2021
12+
ms.date: 11/03/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

articles/active-directory-b2c/user-flow-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 04/08/2021
12+
ms.date: 11/03/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -23,7 +23,7 @@ In Azure AD B2C, there are two ways to provide identity user experiences:
2323

2424
* **User flows** are predefined, built-in, configurable policies that we provide so you can create sign-up, sign-in, and policy editing experiences in minutes.
2525

26-
* **Custom policies** enable you to create your own user journeys for complex identity experience scenarios.
26+
* **Custom policies** enable you to create your own user journeys for complex identity experience scenarios that are not supported by user flows. Azure AD B2C uses custom policies to provide extensibility.
2727

2828
The following screenshot shows the user flow settings UI, versus custom policy configuration files.
2929

@@ -64,7 +64,7 @@ Each user journey is defined by a policy. You can build as many or as few polici
6464

6565
![Diagram showing an example of a complex user journey enabled by IEF](media/user-flow-overview/custom-policy-diagram.png)
6666

67-
A custom policy is defined by several XML files that refer to each other in a hierarchical chain. The XML elements define the claims schema, claims transformations, content definitions, claims providers, technical profiles, user journey orchestration steps, and other aspects of the identity experience.
67+
A custom policy is defined by multiple XML files that refer to each other in a hierarchical chain. The XML elements define the claims schema, claims transformations, content definitions, claims providers, technical profiles, user journey orchestration steps, and other aspects of the identity experience.
6868

6969
The powerful flexibility of custom policies is most appropriate for when you need to build complex identity scenarios. Developers configuring custom policies must define the trusted relationships in careful detail to include metadata endpoints, exact claims exchange definitions, and configure secrets, keys, and certificates as needed by each identity provider.
7070

articles/active-directory-b2c/user-migration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/27/2021
12+
ms.date: 11/03/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -64,7 +64,7 @@ After pre migration of the accounts is complete, your custom policy and REST API
6464

6565
To see an example custom policy and REST API, see the [seamless user migration sample](https://aka.ms/b2c-account-seamless-migration) on GitHub.
6666

67-
![Flowchart diagram of the seamless migration approach to user migration](./media/user-migration/diagram-01-seamless-migration.png)<br />*Diagram: Seamless migration flow*
67+
:::image type="content" source="./media/user-migration/diagram-01-seamless-migration.png" alt-text="Flowchart diagram of the seamless migration approach to user migration":::
6868

6969
## Security
7070

@@ -76,10 +76,10 @@ The seamless migration approach uses your own custom REST API to validate a user
7676

7777
Not all information in the legacy identity provider should be migrated to your Azure AD B2C directory. Identify the appropriate set of user attributes to store in Azure AD B2C before migrating.
7878

79-
- **DO** store in Azure AD B2C
79+
- **DO** store in Azure AD B2C:
8080
- Username, password, email addresses, phone numbers, membership numbers/identifiers.
8181
- Consent markers for privacy policy and end-user license agreements.
82-
- **DO NOT** store in Azure AD B2C
82+
- **DON'T** store in Azure AD B2C:
8383
- Sensitive data like credit card numbers, social security numbers (SSN), medical records, or other data regulated by government or industry compliance bodies.
8484
- Marketing or communication preferences, user behaviors, and insights.
8585

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 09/12/2022
4+
ms.date: 11/04/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

0 commit comments

Comments
 (0)