Skip to content

Commit 26a97e4

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into afdplsw
2 parents 39ee207 + 4d827b2 commit 26a97e4

File tree

147 files changed

+2130
-1617
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

147 files changed

+2130
-1617
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -804,6 +804,11 @@
804804
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-servers.md",
805805
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-servers",
806806
"redirect_document_id": true
807+
},
808+
{
809+
"source_path_from_root": "/articles/defender-for-cloud/faq-azure-monitor-logs.yml",
810+
"redirect_url": "/azure/defender-for-cloud/faq-data-collection-agents",
811+
"redirect_document_id": true
807812
}
808813
]
809814
}

.openpublishing.redirection.defender-for-iot.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-work-with-device-notifications.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map#manage-device-notifications-from-an-ot-sensor-device-map",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-view-information-per-zone.md",
10+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map#view-a-device-map-for-a-specific-zone",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-training-sessions.md",
515
"redirect_url": "https://techcommunity.microsoft.com/t5/microsoft-defender-for-iot-blog/microsoft-defender-for-iot-ninja-training/ba-p/2428899",

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 03/01/2023
4+
ms.date: 03/06/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -30,6 +30,20 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
3030

3131
- [Migrate applications using header-based authentication to Azure Active Directory B2C with Grit's app proxy](partner-grit-app-proxy.md)
3232
- [Configure Grit's biometric authentication with Azure Active Directory B2C](partner-grit-authentication.md)
33+
- [Create and run your own custom policies in Azure Active Directory B2C](custom-policies-series-overview.md)
34+
- [Write your first Azure Active Directory B2C custom policy - Hello World!](custom-policies-series-hello-world.md)
35+
- [Collect and manipulate user inputs by using Azure AD B2C custom policy](custom-policies-series-collect-user-input.md)
36+
- [Validate user inputs by using Azure Active Directory B2C custom policy](custom-policies-series-validate-user-input.md)
37+
- [Create branching in user journey by using Azure Active Directory B2C custom policy](custom-policies-series-branch-user-journey.md)
38+
- [Validate custom policy files by using TrustFrameworkPolicy schema](custom-policies-series-install-xml-extensions.md)
39+
- [Call a REST API by using Azure Active Directory B2C custom policy](custom-policies-series-call-rest-api.md)
40+
- [Create and read a user account by using Azure Active Directory B2C custom policy](custom-policies-series-store-user.md)
41+
- [Set up a sign-up and sign-in flow by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in.md)
42+
- [Set up a sign-up and sign-in flow with a social account by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in-federation.md)
43+
- [Manage administrator accounts in Azure Active Directory B2C](tenant-management-manage-administrator.md)
44+
- [Manage emergency access accounts in Azure Active Directory B2C](tenant-management-emergency-access-account.md)
45+
- [Review tenant creation permission in Azure Active Directory B2C](tenant-management-check-tenant-creation-permission.md)
46+
- [Find tenant name and tenant ID in Azure Active Directory B2C](tenant-management-read-tenant-name.md)
3347

3448
### Updated articles
3549

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Ensure that your client meets the following requirements:
107107
- TCP connectivity from the client to either the public or private IP address of the VM. (ProxyCommand or SSH forwarding to a machine with connectivity also works.)
108108

109109
> [!IMPORTANT]
110-
> SSH clients based on PuTTY don't support OpenSSH certificates and can't be used to log in with Azure AD OpenSSH certificate-based authentication.
110+
> SSH clients based on PuTTY now supports OpenSSH certificates and can be used to log in with Azure AD OpenSSH certificate-based authentication.
111111
112112
## Enable Azure AD login for a Linux VM in Azure
113113

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure-graph.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ author: rolyon
66
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
9-
ms.subservice: multi-tenant-organizations
109
ms.topic: how-to
1110
ms.date: 02/27/2023
1211
ms.author: rolyon

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ author: rolyon
66
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
9-
ms.subservice: multi-tenant-organizations
109
ms.topic: how-to
1110
ms.date: 02/06/2023
1211
ms.author: rolyon

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ author: rolyon
66
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
9-
ms.subservice: multi-tenant-organizations
109
ms.topic: overview
1110
ms.date: 02/22/2023
1211
ms.author: rolyon

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-topology.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ author: rolyon
66
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
9-
ms.subservice: multi-tenant-organizations
109
ms.topic: conceptual
1110
ms.date: 01/23/2023
1211
ms.author: rolyon

articles/active-directory/multi-tenant-organizations/overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ author: rolyon
66
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
9-
ms.subservice: multi-tenant-organizations
109
ms.topic: overview
1110
ms.date: 01/23/2023
1211
ms.author: rolyon

articles/active-directory/saas-apps/oracle-idcs-for-peoplesoft-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,4 +105,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
105105

106106
## Next steps
107107

108-
Once you configure Oracle IDCS for PeopleSoft you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
108+
Once you configure Oracle IDCS for PeopleSoft you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)