Skip to content

Commit 3268119

Browse files
committed
Merge branch 'main' of github.com:MicrosoftDocs/azure-docs-pr into 201167-vulnerability
2 parents 6301f1b + 6ed9406 commit 3268119

File tree

6,811 files changed

+48676
-32193
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

6,811 files changed

+48676
-32193
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1215,16 +1215,18 @@
12151215
".openpublishing.redirection.container-service.json",
12161216
".openpublishing.redirection.defender-for-cloud.json",
12171217
".openpublishing.redirection.defender-for-iot.json",
1218+
".openpublishing.redirection.devops-project.json",
1219+
".openpublishing.redirection.guidance.json",
12181220
".openpublishing.redirection.iot-hub-device-update.json",
12191221
".openpublishing.redirection.key-vault.json",
12201222
".openpublishing.redirection.machine-configuration.json",
12211223
".openpublishing.redirection.marketplace.json",
12221224
".openpublishing.redirection.openshift.json",
12231225
".openpublishing.redirection.security-benchmark.json",
1226+
".openpublishing.redirection.sentinel.json",
1227+
".openpublishing.redirection.spring-cloud.json",
12241228
".openpublishing.redirection.sql-database.json",
12251229
".openpublishing.redirection.virtual-desktop.json",
1226-
".openpublishing.redirection.devops-project.json",
1227-
".openpublishing.redirection.sentinel.json",
12281230
"articles/active-directory-b2c/.openpublishing.redirection.active-directory-b2c.json",
12291231
"articles/ai-services/.openpublishing.redirection.ai-services-from-applied.json",
12301232
"articles/ai-services/.openpublishing.redirection.ai-services-from-cog.json",
@@ -1233,6 +1235,7 @@
12331235
"articles/ai-services/.openpublishing.redirection.cognitive-services.json",
12341236
"articles/ai-studio/.openpublishing.redirection.ai-studio.json",
12351237
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
1238+
"articles/azure-functions/.openpublishing.redirection.azure-functions.json",
12361239
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
12371240
"articles/azure-relay/.openpublishing.redirection.relay.json",
12381241
"articles/azure-video-analyzer/.openpublishing.redirection.azure-video-analyzer.json",
@@ -1288,7 +1291,6 @@
12881291
"articles/site-recovery/.openpublishing.redirection.site-recovery.json",
12891292
"articles/spatial-anchors/.openpublishing.redirection.spatial-anchors.json",
12901293
"articles/spring-apps/.openpublishing.redirection.spring-apps.json",
1291-
"articles/spring-cloud/.openpublishing.redirection.spring-cloud.json",
12921294
"articles/static-web-apps/.openpublishing.redirection.static-web-apps.json",
12931295
"articles/storsimple/.openpublishing.redirection.storsimple.json",
12941296
"articles/stream-analytics/.openpublishing.redirection.stream-analytics.json",

.openpublishing.redirection.azure-monitor.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5146,7 +5146,7 @@
51465146
},
51475147
{
51485148
"source_path_from_root": "/articles/azure-monitor/platform/partners.md",
5149-
"redirect_url": "/azure/azure-monitor//partners",
5149+
"redirect_url": "/azure/azure-monitor/overview#integrate",
51505150
"redirect_document_id": false
51515151
},
51525152
{
@@ -6599,6 +6599,11 @@
65996599
"redirect_url": "/azure/azure-monitor/app/java-get-started-supplemental",
66006600
"redirect_document_id": true
66016601
},
6602+
{
6603+
"source_path_from_root": "/articles/azure-monitor/partners.md",
6604+
"redirect_url": "/azure/azure-monitor/overview#integrate",
6605+
"redirect_document_id": false
6606+
},
66026607
{
66036608
"source_path_from_root": "/articles/azure-monitor/monitor-reference.md",
66046609
"redirect_url": "/azure/azure-monitor/overview",

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -920,6 +920,21 @@
920920
"redirect_url": "/azure/defender-for-cloud/multicloud",
921921
"redirect_document_id": false
922922
},
923+
{
924+
"source_path_from_root": "/articles/defender-for-cloud/concept-aws-connector.md",
925+
"redirect_url": "/azure/defender-for-cloud/quickstart-onboard-aws",
926+
"redirect_document_id": false
927+
},
928+
{
929+
"source_path_from_root": "/articles/defender-for-cloud/concept-gcp-connector.md",
930+
"redirect_url": "/azure/defender-for-cloud/quickstart-onboard-gcp",
931+
"redirect_document_id": false
932+
},
933+
{
934+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-elastic.md",
935+
"redirect_url": "/azure/defender-for-cloud/agentless-vulnerability-assessment-aws",
936+
"redirect_document_id": true
937+
},
923938
{
924939
"source_path_from_root": "/articles/defender-for-cloud/how-to-migrate-to-built-in.md",
925940
"redirect_url": "/azure/defender-for-cloud/how-to-transition-to-built-in",

.openpublishing.redirection.guidance.json

Lines changed: 419 additions & 0 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.json

Lines changed: 276 additions & 1195 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.machine-configuration.json

Lines changed: 144 additions & 79 deletions
Large diffs are not rendered by default.

articles/spring-cloud/.openpublishing.redirection.spring-cloud.json renamed to .openpublishing.redirection.spring-cloud.json

Lines changed: 187 additions & 187 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/best-practices.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: conceptual
12-
ms.date: 01/11/2024
12+
ms.date: 02/05/2024
1313
ms.subservice: B2C
1414

1515

@@ -25,6 +25,7 @@ The following best practices and recommendations cover some of the primary aspec
2525

2626
| Best practice | Description |
2727
|--|--|
28+
| Create emergency access account | This emergency access account helps you gain access to your Azure AD B2C tenant in circumstances such as the only administrator is unreachable when the credential is needed. [Learn how to create an emergency access account](tenant-management-emergency-access-account.md#create-emergency-access-account) |
2829
| Choose user flows for most scenarios | The Identity Experience Framework of Azure AD B2C is the core strength of the service. Policies fully describe identity experiences such as sign-up, sign-in, or profile editing. To help you set up the most common identity tasks, the Azure AD B2C portal includes predefined, configurable policies called user flows. With user flows, you can create great user experiences in minutes, with just a few clicks. [Learn when to use user flows vs. custom policies](user-flow-overview.md#comparing-user-flows-and-custom-policies).|
2930
| App registrations | Every application (web, native) and API that is being secured must be registered in Azure AD B2C. If an app has both a web and native version of iOS and Android, you can register them as one application in Azure AD B2C with the same client ID. Learn how to [register OIDC, SAML, web, and native apps](./tutorial-register-applications.md?tabs=applications). Learn more about [application types that can be used in Azure AD B2C](./application-types.md). |
3031
| Move to monthly active users billing | Azure AD B2C has moved from monthly active authentications to monthly active users (MAU) billing. Most customers will find this model cost-effective. [Learn more about monthly active users billing](https://azure.microsoft.com/updates/mau-billing/). |

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,7 @@ The following table lists the claim resolvers with information about the OpenID
108108
| {OIDC:Resource} |The `resource` query string parameter. | N/A |
109109
| {OIDC:Scope} |The `scope` query string parameter. | openid |
110110
| {OIDC:Username}| The [resource owner password credentials flow](add-ropc-policy.md) user's username.| [email protected]|
111+
| {OIDC:IdToken} | The `id token` query string parameter. | N/A |
111112

112113
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#openid-connect-relying-party-application) of the OpenID Connect claim resolvers.
113114

articles/active-directory-b2c/custom-policies-series-validate-user-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -379,7 +379,7 @@ Follow the steps in [Upload custom policy file](custom-policies-series-hello-wor
379379

380380
## Step 7 - Validate user input by using validation technical profiles
381381

382-
The validation techniques we've used in step 1, step 2 and step 3 aren't applicable for all scenarios. If your business rules are complex to be defined at claim declaration level, you can configure a [Validation Technical](validation-technical-profile.md), and then call it from a [Self-Asserted Technical Profile](self-asserted-technical-profile.md).
382+
The validation techniques we've used in step 1, step 2 and step 3 aren't applicable for all scenarios. If your business rules are too complex to be defined at claim declaration level, you can configure a [Validation Technical](validation-technical-profile.md), and then call it from a [Self-Asserted Technical Profile](self-asserted-technical-profile.md).
383383

384384
> [!NOTE]
385385
> Only self-asserted technical profiles can use validation technical profiles. Learn more about [validation technical profile](validation-technical-profile.md)

0 commit comments

Comments
 (0)