Skip to content

Commit 354b72e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into tsk261306-dks-3
2 parents ec73c4d + 9afb389 commit 354b72e

File tree

3,655 files changed

+31535
-18253
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,655 files changed

+31535
-18253
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,11 @@
1010
"redirect_url": "/azure/azure-monitor/vm/scom-managed-instance-overview",
1111
"redirect_document_id": false
1212
},
13+
{
14+
"source_path_from_root": "/articles/azure-monitor/scom-manage-instance/common-questions.md",
15+
"redirect_url": "/azure/azure-monitor/scom-manage-instance/scom-managed-instance-faq",
16+
"redirect_document_id": false
17+
},
1318
{
1419
"source_path_from_root": "/articles/azure-monitor/vm/scom-managed-instance-overview.md",
1520
"redirect_url": "/azure/azure-monitor/scom-manage-instance/overview",
@@ -5504,6 +5509,11 @@
55045509
"redirect_url": "/azure/azure-monitor/logs/resource-manager-workspace",
55055510
"redirect_document_id": false
55065511
},
5512+
{
5513+
"source_path_from_root": "/articles/azure-monitor/logs/resource-manager-cluster.md",
5514+
"redirect_url": "/azure/azure-monitor/logs/logs-dedicated-clusters",
5515+
"redirect_document_id": false
5516+
},
55075517
{
55085518
"source_path_from_root": "/articles/azure-monitor/visualize/powerbi.md",
55095519
"redirect_url": "/azure/azure-monitor/logs/log-powerbi",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -640,6 +640,11 @@
640640
"redirect_url": "/azure/azure-maps/supported-languages",
641641
"redirect_document_id": true
642642
},
643+
{
644+
"source_path_from_root": "/articles/azure-maps/tutorial-geofence.md",
645+
"redirect_url": "/azure/azure-maps/",
646+
"redirect_document_id": true
647+
},
643648
{
644649
"source_path_from_root": "/articles/azure-maps/search-categories.md",
645650
"redirect_url": "/azure/azure-maps/supported-search-categories",

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -429,6 +429,11 @@
429429
"source_path_from_root": "/articles/virtual-desktop/host-pool-load-balancing.md",
430430
"redirect_url": "/azure/virtual-desktop/configure-host-pool-load-balancing",
431431
"redirect_document_id": false
432+
},
433+
{
434+
"source_path_from_root": "/articles/virtual-desktop/configure-rdp-shortpath-limit-ports-public-networks.md",
435+
"redirect_url": "/azure/virtual-desktop/configure-rdp-shortpath",
436+
"redirect_document_id": true
432437
}
433438
]
434439
}

articles/active-directory-b2c/configure-authentication-sample-python-web-app.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Configure authentication in a sample Python web application by using Azure Active Directory B2C
2+
title: Configure authentication in a sample Python web app by using Azure AD B2C
33
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Python web application.
44

55
author: kengaderdus
6-
manager: CelesteDG
6+
manager: mwongerapk
77
ms.service: active-directory
88

99
ms.topic: reference
10-
ms.date: 01/11/2024
10+
ms.date: 06/04/2024
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: b2c-support, devx-track-python
1414

1515

16-
#Customer intent: As a Python web app developer, I want to configure Azure AD B2C authentication in my web application, so that I can securely sign users in and add authentication and authorization support to my app.
16+
#Customer intent: As a Python web app developer, I want to configure Azure AD B2C authentication in a sample web app by using my own tenant, so that I can securely sign customer users.
1717

1818
---
1919

@@ -37,7 +37,7 @@ The sign-in flow involves the following steps:
3737

3838
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3939
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
40-
- [Python 3.7+](https://www.python.org/downloads/)
40+
- [Python 3.8+](https://www.python.org/downloads/)
4141

4242
## Step 1: Configure your user flow
4343

@@ -222,4 +222,4 @@ You can add and modify redirect URIs in your registered applications at any time
222222
* The redirect URL is case-sensitive. Its case must match the case of the URL path of your running application.
223223
224224
## Next steps
225-
* Learn how to [Configure authentication options in a Python web app by using Azure AD B2C](enable-authentication-python-web-app-options.md).
225+
* Learn how to [Configure authentication options in a Python web app by using Azure AD B2C](enable-authentication-python-web-app-options.md).

articles/active-directory-b2c/custom-policies-series-store-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 05/11/2024
13+
ms.date: 06/21/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: B2C
@@ -263,7 +263,7 @@ Follow the steps in [Test the custom policy](custom-policies-series-validate-use
263263

264264
After the policy finishes execution, and you receive your ID token, check that the user record has been created:
265265

266-
1. Sign in to the [Azure portal](https://portal.azure.com/) with Global Administrator or Privileged Role Administrator permissions.
266+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least Privileged Role Administrator.
267267

268268
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
269269

articles/active-directory-b2c/enable-authentication-spa-app.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -105,12 +105,6 @@ The resources referenced by the *index.html* file are detailed in the following
105105
|---|---|
106106
|MSAL.js library| MSAL.js authentication JavaScript library [CDN path](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/cdn-usage.md).|
107107
|[Bootstrap stylesheet](https://getbootstrap.com/) | A free front-end framework for faster and easier web development. The framework includes HTML-based and CSS-based design templates. |
108-
|[`policies.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/policies.js) | Contains the Azure AD B2C custom policies and user flows. |
109-
|[`authConfig.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/authConfig.js) | Contains authentication configuration parameters.|
110-
|[`authRedirect.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/authRedirect.js) | Contains the authentication logic. |
111-
|[`apiConfig.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/apiConfig.js) | Contains web API scopes and the API endpoint location. |
112-
|[`api.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/api.js) | Defines the method to use to call your API and handle its response.|
113-
|[`ui.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/ui.js) | Controls the UI elements. |
114108
| | |
115109

116110
To render the SPA index file, in the *myApp* folder, create a file named *index.html*, which contains the following HTML snippet:

articles/active-directory-b2c/index-service.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ landingContent:
2121
- linkListType: sample
2222
links:
2323
- text: Node console application
24-
url: https://github.com/Azure-Samples/ms-identity-b2c-javascript-nodejs-management/tree/main/Chapter2
24+
url: https://github.com/Azure-Samples/ms-identity-docs-code-javascript
2525
- text: .NET Core console application
2626
url: https://github.com/Azure-Samples/ms-identity-dotnetcore-b2c-account-management
2727

articles/active-directory-b2c/integrate-with-app-code-samples.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,10 +35,8 @@ The following tables provide links to samples for applications including iOS, An
3535

3636
| Sample | Description |
3737
|--------| ----------- |
38-
| [ms-identity-javascript-angular-tutorial](https://github.com/Azure-Samples/ms-identity-javascript-angular-tutorial/tree/main/3-Authorization-II/2-call-api-b2c) | An Angular single page application (SPA) calling a web API. Authentication is done with Azure AD B2C by using MSAL Angular. This sample uses the authorization code flow with PKCE. |
3938
| [ms-identity-javascript-react-tutorial](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/tree/main/3-Authorization-II/2-call-api-b2c) | A React single page application (SPA) calling a web API. Authentication is done with Azure AD B2C by using MSAL React. This sample uses the authorization code flow with PKCE. |
4039
| [ms-identity-b2c-javascript-spa](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa) | A VanillaJS single page application (SPA) calling a web API. Authentication is done with Azure AD B2C by using MSAL.js. This sample uses the authorization code flow with PKCE. |
41-
| [javascript-nodejs-management](https://github.com/Azure-Samples/ms-identity-b2c-javascript-nodejs-management/tree/main/Chapter1) | A VanillaJS single page application (SPA) calling Microsoft Graph to manage users in a B2C directory. Authentication is done with Azure AD B2C by using MSAL.js. This sample uses the authorization code flow with PKCE.|
4240

4341
## Mobile and desktop apps
4442

@@ -55,7 +53,6 @@ The following tables provide links to samples for applications including iOS, An
5553

5654
| Sample | Description |
5755
|--------| ----------- |
58-
| [javascript-nodejs-management](https://github.com/Azure-Samples/ms-identity-b2c-javascript-nodejs-management/tree/main/Chapter2) | A Node.js and express console daemon application calling Microsoft Graph with its own identity to manage users in a B2C directory. Authentication is done with Azure AD B2C by using MSAL Node. This sample uses the authorization code flow.|
5956
| [dotnetcore-b2c-account-management](https://github.com/Azure-Samples/ms-identity-dotnetcore-b2c-account-management) | A .NET Core console application calling Microsoft Graph with its own identity to manage users in a B2C directory. Authentication is done with Azure AD B2C by using MSAL.NET. This sample uses the authorization code flow.|
6057

6158
## SAML test application

articles/active-directory-b2c/manage-user-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.custom: fasttrack-edit
2222

2323
This article discusses how you can manage the user data in Azure Active Directory B2C (Azure AD B2C) by using the operations that are provided by the [Microsoft Graph API](/graph/use-the-api). Managing user data includes deleting or exporting data from audit logs.
2424

25-
[!INCLUDE [gdpr-intro-sentence.md](../../includes/gdpr-intro-sentence.md)]
25+
[!INCLUDE [gdpr-intro-sentence.md](~/reusable-content/ce-skilling/azure/includes/gdpr-intro-sentence.md)]
2626

2727
## Delete user data
2828

articles/active-directory-b2c/partner-asignio.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 06/21/2024
1010
ms.author: gasinh
1111
ms.reviewer: kengaderdus
1212
ms.subservice: B2C
@@ -103,7 +103,7 @@ Complete [Tutorial: Register a web application in Azure Active Directory B2C](tu
103103

104104
For the following instructions, use the Microsoft Entra tenant with the Azure subscription.
105105

106-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as the Global Administrator of the Azure AD B2C tenant.
106+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
107107
2. In the Azure portal toolbar, select **Directories + subscriptions**.
108108
3. On **Portal settings | Directories + subscriptions**, in the **Directory name** list, locate your Microsoft Entra directory.
109109
4. Select **Switch**.
@@ -130,7 +130,7 @@ For the following instructions, use the Microsoft Entra tenant with the Azure su
130130
25. For **Emai**l, use **email**.
131131
26. Select **Save**.
132132

133-
## SCreate a user flow policy
133+
## Create a user flow policy
134134

135135
1. In your Azure AD B2C tenant, under **Policies**, select **User flows**.
136136
2. Select **New user flow**.

0 commit comments

Comments
 (0)