Skip to content

Commit 39a363e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into chaos-landing-page
2 parents d75e7a6 + 1c07bbf commit 39a363e

File tree

2,748 files changed

+19857
-19445
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,748 files changed

+19857
-19445
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -941,11 +941,6 @@
941941
"redirect_url": "/azure/site-recovery/hyper-v-azure-support-matrix",
942942
"redirect_document_id": false
943943
},
944-
{
945-
"source_path": "articles/site-recovery/unregister-vmm-server-script.md",
946-
"redirect_url": "/azure/site-recovery/azure-to-azure-autoupdate",
947-
"redirect_document_id": false
948-
},
949944
{
950945
"source_path": "articles/site-recovery/hyper-v-vmm-secondary-support-matrix.md",
951946
"redirect_url": "/azure/site-recovery/azure-to-azure-autoupdate",
@@ -1001,6 +996,26 @@
1001996
"redirect_url": "/azure/container-registry/container-registry-configure-conditional-access.md",
1002997
"redirect_document_id": false
1003998
},
999+
{
1000+
"source_path": "articles/container-registry/tutorial-artifact-streaming.md",
1001+
"redirect_url": "/azure/container-registry/container-registry-artifact-streaming",
1002+
"redirect_document_id": false
1003+
},
1004+
{
1005+
"source_path": "articles/container-registry/tutorial-artifact-streaming-cli.md",
1006+
"redirect_url": "/azure/container-registry/container-registry-artifact-streaming",
1007+
"redirect_document_id": false
1008+
},
1009+
{
1010+
"source_path": "articles/container-registry/tutorial-artifact-streaming-portal.md",
1011+
"redirect_url": "/azure/container-registry/container-registry-artifact-streaming",
1012+
"redirect_document_id": false
1013+
},
1014+
{
1015+
"source_path": "articles/container-registry/tutorial-artifact-streaming-troubleshoot.md",
1016+
"redirect_url": "/azure/container-registry/troubleshoot-artifact-streaming",
1017+
"redirect_document_id": false
1018+
},
10041019
{
10051020
"source_path": "articles/site-recovery/vmware-physical-secondary-disaster-recovery.md",
10061021
"redirect_url": "/azure/site-recovery/vmware-physical-secondary-architecture",
@@ -22531,6 +22546,11 @@
2253122546
"source_path_from_root": "/articles/virtual-network/ip-services/virtual-networks-static-private-ip-classic-ps.md",
2253222547
"redirect_url": "/updates/azure-classic-resource-providers-will-be-retired-on-31-august-2024/",
2253322548
"redirect_document_id": false
22549+
},
22550+
{
22551+
"source_path_from_root": "/articles/orbital/overview-analytics.md",
22552+
"redirect_url": "/azure/orbital/overview",
22553+
"redirect_document_id": false
2253422554
}
2253522555
]
2253622556
}

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,10 @@
11
---
22
title: Token enrichment - Azure Active Directory B2C
33
description: Enrich tokens with claims from external identity data sources using APIs or outbound webhooks.
4-
54
author: garrodonnell
65
manager: CelesteDG
7-
86
ms.service: active-directory
9-
10-
ms.custom:
117
ms.topic: how-to
12-
138
ms.date: 01/17/2023
149
ms.author: godonnell
1510
ms.subservice: B2C

articles/active-directory-b2c/conditional-access-identity-protection-overview.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,15 @@
11
---
22
title: Identity Protection and Conditional Access in Azure AD B2C
33
description: Learn how Identity Protection gives you visibility into risky sign-ins and risk detections. Find out how and Conditional Access lets you enforce organizational policies based on risk events in your Azure AD B2C tenants.
4-
54
ms.service: active-directory
65
ms.subservice: conditional-access
76
ms.topic: overview
87
ms.date: 01/11/2024
9-
108
ms.author: kengaderdus
119
author: kengaderdus
1210
manager: CelesteDG
13-
1411
ms.collection: M365-identity-device-management
1512

16-
1713
#Customer intent: As an Azure AD B2C application owner, I want to enhance the security of my applications by using Identity Protection and Conditional Access, so that I can detect and respond to risky authentications and enforce organizational policies.
1814

1915
---

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Configure authentication in a sample Node.js web application by using Azure Active Directory B2C (Azure AD B2C)
3-
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Node.js web application.
3+
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Node.js web application.
44
titleSuffix: Azure AD B2C
55

66
author: kengaderdus
77
manager: CelesteDG
88
ms.service: active-directory
99

10-
ms.custom: devx-track-js, devx-track-linux
10+
ms.custom: devx-track-js, linux-related-content
1111
ms.topic: how-to
1212
ms.date: 01/11/2024
1313
ms.author: kengaderdus
@@ -20,14 +20,14 @@ ms.subservice: B2C
2020

2121
# Configure authentication in a sample Node.js web application by using Azure Active Directory B2C
2222

23-
This sample article uses a sample Node.js application to show how to add Azure Active Directory B2C (Azure AD B2C) authentication to a Node.js web application. The sample application enables users to sign in, sign out, update profile and reset password using Azure AD B2C user flows. The sample web application uses [Microsoft Authentication Library (MSAL) for Node](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node) to handle authentication and authorization.
23+
This sample article uses a sample Node.js application to show how to add Azure Active Directory B2C (Azure AD B2C) authentication to a Node.js web application. The sample application enables users to sign in, sign out, update profile and reset password using Azure AD B2C user flows. The sample web application uses [Microsoft Authentication Library (MSAL) for Node](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node) to handle authentication and authorization.
2424

2525
In this article, you’ll do the following tasks:
2626

2727
- Register a web application in the Azure portal.
2828
- Create combined **Sign in and sign up**, **Profile editing**, and **Password reset** user flows for the app in the Azure portal.
2929
- Update a sample Node application to use your own Azure AD B2C application and user flows.
30-
- Test the sample application.
30+
- Test the sample application.
3131

3232
## Prerequisites
3333

@@ -37,15 +37,15 @@ In this article, you’ll do the following tasks:
3737

3838
## Step 1: Configure your user flows
3939

40-
[!INCLUDE [active-directory-b2c-app-integration-add-user-flow](../../includes/active-directory-b2c-app-integration-add-user-flow.md)]
40+
[!INCLUDE [active-directory-b2c-app-integration-add-user-flow](../../includes/active-directory-b2c-app-integration-add-user-flow.md)]
4141

4242
## Step 2: Register a web application
4343

44-
To enable your application sign in with Azure AD B2C, register your app in the Azure AD B2C directory. The app registration establishes a trust relationship between the app and Azure AD B2C.
44+
To enable your application sign in with Azure AD B2C, register your app in the Azure AD B2C directory. The app registration establishes a trust relationship between the app and Azure AD B2C.
4545

46-
During app registration, you'll specify the *Redirect URI*. The redirect URI is the endpoint to which the user is redirected by Azure AD B2C after they authenticate with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, that uniquely identifies your app. After your app is registered, Azure AD B2C uses both the application ID, and the redirect URI to create authentication requests.
46+
During app registration, you'll specify the *Redirect URI*. The redirect URI is the endpoint to which the user is redirected by Azure AD B2C after they authenticate with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, that uniquely identifies your app. After your app is registered, Azure AD B2C uses both the application ID, and the redirect URI to create authentication requests.
4747

48-
### Step 2.1: Register the app
48+
### Step 2.1: Register the app
4949

5050
To register the web app, follow these steps:
5151

@@ -54,7 +54,7 @@ To register the web app, follow these steps:
5454
1. In the Azure portal, search for and select **Azure AD B2C**.
5555
1. Select **App registrations**, and then select **New registration**.
5656
1. Under **Name**, enter a name for the application (for example, *webapp1*).
57-
1. Under **Supported account types**, select **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**.
57+
1. Under **Supported account types**, select **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**.
5858
1. Under **Redirect URI**, select **Web** and then, in the URL box, enter `http://localhost:3000/redirect`.
5959
1. Under **Permissions**, select the **Grant admin consent to openid and offline_access permissions** checkbox.
6060
1. Select **Register**.
@@ -106,7 +106,7 @@ The `views` folder contains Handlebars files for the application's user interfac
106106

107107
## Step 5: Configure the sample web app
108108

109-
Open your web app in a code editor such as Visual Studio Code. Under the project root folder, open the *.env* file. This file contains information about your Azure AD B2C identity provider. Update the following app settings properties:
109+
Open your web app in a code editor such as Visual Studio Code. Under the project root folder, open the *.env* file. This file contains information about your Azure AD B2C identity provider. Update the following app settings properties:
110110

111111
|Key |Value |
112112
|---------|---------|
@@ -129,7 +129,7 @@ Your final configuration file should look like the following sample:
129129
You can now test the sample app. You need to start the Node server and access it through your browser on `http://localhost:3000`.
130130

131131
1. In your terminal, run the following code to start the Node.js web server:
132-
132+
133133
```bash
134134
node index.js
135135
```
@@ -147,19 +147,19 @@ You can now test the sample app. You need to start the Node server and access it
147147

148148
### Test profile editing
149149

150-
1. After you sign in, select **Edit profile**.
151-
1. Enter new changes as required, and then select **Continue**. You should see the page with sign-in status with the new changes, such as **Given Name**.
150+
1. After you sign in, select **Edit profile**.
151+
1. Enter new changes as required, and then select **Continue**. You should see the page with sign-in status with the new changes, such as **Given Name**.
152152

153153
### Test password reset
154154

155-
1. After you sign in, select **Reset password**.
155+
1. After you sign in, select **Reset password**.
156156
1. In the next dialog that appears, you can cancel the operation by selecting **Cancel**. Alternatively, enter your email address, and then select **Send verification code**. You'll receive a verification code to your email account. Copy the verification code in your email, enter it into the password reset dialog, and then select **Verify code**.
157157
1. Select **Continue**.
158158
1. Enter your new password, confirm it, and then select **Continue**. You should see the page that shows sign-in status.
159159
160160
### Test sign-out
161161
162-
After you sign in, select **Sign out**. You should see the page that has a **Sign in** button.
162+
After you sign in, select **Sign out**. You should see the page that has a **Sign in** button.
163163
164164
## Next steps
165165

articles/active-directory-b2c/configure-tokens.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,10 @@ manager: CelesteDG
66
ms.service: active-directory
77
ms.topic: how-to
88
ms.date: 01/11/2024
9-
ms.custom:
109
ms.author: kengaderdus
1110
ms.subservice: B2C
1211
zone_pivot_groups: b2c-policy-type
1312

14-
1513
#Customer intent: As a developer configuring token lifetimes in Azure Active Directory B2C, I want to understand the options and settings available for token lifetime and compatibility, so that I can customize them to fit the needs of my application and ensure secure access to resources.
1614

1715
---

articles/active-directory-b2c/configure-user-input.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,11 @@
22
title: Add user attributes and customize user input
33
titleSuffix: Azure AD B2C
44
description: Learn how to customize user input and add user attributes to the sign-up or sign-in journey in Azure Active Directory B2C.
5-
65
author: garrodonnell
76
manager: CelesteDG
8-
97
ms.service: active-directory
10-
118
ms.topic: how-to
129
ms.date: 12/13/2023
13-
ms.custom:
1410
ms.author: godonnell
1511
ms.subservice: B2C
1612
zone_pivot_groups: b2c-policy-type

articles/active-directory-b2c/enable-authentication-python-web-app.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Enable authentication in your own Python web application using Azure Active Directory B2C
3-
description: This article explains how to enable authentication in your own Python web application using Azure AD B2C
3+
description: This article explains how to enable authentication in your own Python web application using Azure AD B2C
44
titleSuffix: Azure AD B2C
55

66
author: kengaderdus
77
manager: CelesteDG
88
ms.service: active-directory
99

10-
ms.custom: devx-track-python, devx-track-linux
10+
ms.custom: devx-track-python, linux-related-content
1111
ms.topic: how-to
1212
ms.date: 01/11/2024
1313
ms.author: kengaderdus
@@ -38,24 +38,24 @@ This article uses [Python 3.9+](https://www.python.org/) and [Flask 2.1](https:/
3838
1. On your file system, create a project folder for this tutorial, such as `my-python-web-app`.
3939
1. In your terminal, change directory into your Python app folder, such as `cd my-python-web-app`.
4040
1. Run the following command to create and activate a virtual environment named `.venv` based on your current interpreter.
41-
42-
# [Linux](#tab/linux)
43-
41+
42+
# [Linux](#tab/linux)
43+
4444
```bash
4545
sudo apt-get install python3-venv # If needed
4646
python3 -m venv .venv
4747
source .venv/bin/activate
4848
```
4949

5050
# [macOS](#tab/macos)
51-
51+
5252
```zsh
5353
python3 -m venv .venv
5454
source .venv/bin/activate
5555
```
56-
56+
5757
# [Windows](#tab/windows)
58-
58+
5959
```cmd
6060
py -3 -m venv .venv
6161
.venv\scripts\activate
@@ -66,24 +66,24 @@ This article uses [Python 3.9+](https://www.python.org/) and [Flask 2.1](https:/
6666

6767
```
6868
python -m pip install --upgrade pip
69-
```
69+
```
7070

7171
1. To enable the Flask debug features, switch Flask to the development environment to `development` mode. For more information about debugging Flask apps, check out the [Flask documentation](https://flask.palletsprojects.com/en/2.1.x/config/#environment-and-debug-features).
7272

73-
# [Linux](#tab/linux)
74-
73+
# [Linux](#tab/linux)
74+
7575
```bash
7676
export FLASK_ENV=development
7777
```
7878

7979
# [macOS](#tab/macos)
80-
80+
8181
```zsh
8282
export FLASK_ENV=development
8383
```
84-
84+
8585
# [Windows](#tab/windows)
86-
86+
8787
```cmd
8888
set FLASK_ENV=development
8989
```
@@ -108,7 +108,7 @@ msal>=1.7,<2
108108

109109
In your terminal, install the dependencies by running the following commands:
110110

111-
# [Linux](#tab/linux)
111+
# [Linux](#tab/linux)
112112

113113
```bash
114114
python -m pip install -r requirements.txt
@@ -128,9 +128,9 @@ py -m pip install -r requirements.txt
128128

129129
---
130130

131-
## Step 3: Build app UI components
131+
## Step 3: Build app UI components
132132

133-
Flask is a lightweight Python framework for web applications that provides the basics for URL routing and page rendering. It leverages Jinja2 as its template engine to render the content of your app. For more information, check out the [template designer documentation](https://jinja.palletsprojects.com/en/3.1.x/templates/). In this section, you add the required templates that provide the basic functionality of your web app.
133+
Flask is a lightweight Python framework for web applications that provides the basics for URL routing and page rendering. It leverages Jinja2 as its template engine to render the content of your app. For more information, check out the [template designer documentation](https://jinja.palletsprojects.com/en/3.1.x/templates/). In this section, you add the required templates that provide the basic functionality of your web app.
134134

135135
### Step 3.1 Create a base template
136136

@@ -200,28 +200,28 @@ Add the following templates under the templates folder. These templates extend t
200200
{% extends "base.html" %}
201201
{% block title %}Home{% endblock %}
202202
{% block content %}
203-
203+
204204
<h1>Microsoft Identity Python Web App</h1>
205-
205+
206206
{% if user %}
207207
<h2>Claims:</h2>
208208
<pre>{{ user |tojson(indent=4) }}</pre>
209-
210-
209+
210+
211211
{% if config.get("ENDPOINT") %}
212212
<li><a href='/graphcall'>Call Microsoft Graph API</a></li>
213213
{% endif %}
214-
214+
215215
{% if config.get("B2C_PROFILE_AUTHORITY") %}
216216
<li><a href='{{_build_auth_code_flow(authority=config["B2C_PROFILE_AUTHORITY"])["auth_uri"]}}'>Edit Profile</a></li>
217217
{% endif %}
218-
218+
219219
<li><a href="/logout">Logout</a></li>
220-
220+
221221
{% else %}
222222
<li><a href='{{ auth_url }}'>Sign In</a></li>
223223
{% endif %}
224-
224+
225225
{% endblock %}
226226
```
227227
@@ -243,22 +243,22 @@ Add the following templates under the templates folder. These templates extend t
243243
```html
244244
{% extends "base.html" %}
245245
{% block title%}Error{% endblock%}
246-
246+
247247
{% block metadata %}
248248
{% if config.get("B2C_RESET_PASSWORD_AUTHORITY") and "AADB2C90118" in result.get("error_description") %}
249249
<!-- See also https://learn.microsoft.com/azure/active-directory-b2c/active-directory-b2c-reference-policies#linking-user-flows -->
250250
<meta http-equiv="refresh"
251251
content='0;{{_build_auth_code_flow(authority=config["B2C_RESET_PASSWORD_AUTHORITY"])["auth_uri"]}}'>
252252
{% endif %}
253253
{% endblock %}
254-
254+
255255
{% block content %}
256256
<h2>Login Failure</h2>
257257
<dl>
258258
<dt>{{ result.get("error") }}</dt>
259259
<dd>{{ result.get("error_description") }}</dd>
260260
</dl>
261-
261+
262262
<a href="{{ url_for('index') }}">Homepage</a>
263263
{% endblock %}
264264
```
@@ -290,7 +290,7 @@ B2C_PROFILE_AUTHORITY = authority_template.format(
290290
B2C_RESET_PASSWORD_AUTHORITY = authority_template.format(
291291
tenant=b2c_tenant, user_flow=resetpassword_user_flow)
292292
293-
REDIRECT_PATH = "/getAToken"
293+
REDIRECT_PATH = "/getAToken"
294294
295295
# This is the API resource endpoint
296296
ENDPOINT = '' # Application ID URI of app registration in Azure portal
@@ -423,7 +423,7 @@ if __name__ == "__main__":
423423
424424
In the Terminal, run the app by entering the following command, which runs the Flask development server. The development server looks for `app.py` by default. Then, open your browser and navigate to the web app URL: `http://localhost:5000`.
425425
426-
# [Linux](#tab/linux)
426+
# [Linux](#tab/linux)
427427
428428
```bash
429429
python -m flask run --host localhost --port 5000

0 commit comments

Comments
 (0)