Skip to content

Commit 3e1282b

Browse files
author
Mike Ray (Microsoft)
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into 20221228-validated-versions
2 parents 2a69018 + cbcde2a commit 3e1282b

File tree

2,036 files changed

+29963
-18394
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,036 files changed

+29963
-18394
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -755,7 +755,7 @@
755755
{
756756
"path_to_root": "azure-spring-apps-reference-architecture",
757757
"url": "https://github.com/Azure/azure-spring-apps-reference-architecture",
758-
"branch": "main",
758+
"branch": "reference-architecture",
759759
"branch_mapping": {}
760760
},
761761
{

.openpublishing.redirection.defender-for-iot.json

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,19 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-training-sessions.md",
5+
"redirect_url": "https://techcommunity.microsoft.com/t5/microsoft-defender-for-iot-blog/microsoft-defender-for-iot-ninja-training/ba-p/2428899",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-manage-the-alert-event.md",
10+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-view-alerts",
11+
"redirect_document_id": false
12+
},
13+
{ "source_path_from_root": "/articles/defender-for-iot/organizations/how-to-install-software.md",
14+
"redirect_url": "/azure/defender-for-iot/organizations/ot-deploy/install-software-ot-sensor",
15+
"redirect_document_id": false
16+
},
317
{
418
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-create-and-manage-users.md",
519
"redirect_url": "/azure/defender-for-iot/organizations/manage-users-overview",
@@ -117,7 +131,7 @@
117131
},
118132
{
119133
"source_path_from_root": "/articles/defender-for-iot/how-to-install-software.md",
120-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-install-software",
134+
"redirect_url": "/azure/defender-for-iot/organizations/ot-deploy/install-software-ot-sensor",
121135
"redirect_document_id": false
122136
},
123137
{

.openpublishing.redirection.healthcare-apis.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -633,6 +633,10 @@
633633
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-iotjsonpathcontenttemplate-mappings",
634634
"redirect_document_id": false
635635
},
636+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-new-button.md",
637+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-arm",
638+
"redirect_document_id": false
639+
},
636640
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
637641
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
638642
"redirect_document_id": false

.openpublishing.redirection.json

Lines changed: 81 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5988,6 +5988,11 @@
59885988
"redirect_url": "/azure/automation/create-azure-automation-account-portal",
59895989
"redirect_document_id": false
59905990
},
5991+
{
5992+
"source_path_from_root": "/articles/automation/automation-solution-vm-management-enable.md",
5993+
"redirect_url": "/azure/automation/automation-solution-vm-management",
5994+
"redirect_document_id": false
5995+
},
59915996
{
59925997
"source_path_from_root": "/articles/update-center/enable-machines.md",
59935998
"redirect_url": "/azure/update-center/updates-maintenance-schedules",
@@ -14758,6 +14763,12 @@
1475814763
"redirect_url": "/azure/load-balancer/load-balancer-security-controls",
1475914764
"redirect_document_id": false
1476014765
},
14766+
{
14767+
"source_path_from_root": "/articles/load-balancer/update-load-balancer-with-vm-scale-set.md",
14768+
"redirect_url": "/azure/load-balancer/configure-inbound-nat-rules-vm-scale-set",
14769+
"redirect_document_id": false
14770+
},
14771+
1476114772
{
1476214773
"source_path_from_root": "/articles/load-balancer/load-balancer-get-started-internet-arm-cli.md",
1476314774
"redirect_url": "/azure/load-balancer/quickstart-create-basic-load-balancer-cli",
@@ -18333,6 +18344,11 @@
1833318344
"redirect_url": "/azure/sentinel/normalization-schema-dns",
1833418345
"redirect_document_id": true
1833518346
},
18347+
{
18348+
"source_path_from_root": "/articles/sentinel/file-event-normalization-schema.md",
18349+
"redirect_url": "/azure/sentinel/normalization-schema-file-event",
18350+
"redirect_document_id": true
18351+
},
1833618352
{
1833718353
"source_path_from_root": "/articles/service-bus/index.md",
1833818354
"redirect_url": "/azure/service-bus-messaging/index",
@@ -27757,7 +27773,72 @@
2775727773
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_sapase.md",
2775827774
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sapase",
2775927775
"redirect_document_id": false
27776+
},
27777+
{
27778+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_general.md",
27779+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-general",
27780+
"redirect_document_id": false
2776027781
},
27782+
{
27783+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_ibm.md",
27784+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-ibm",
27785+
"redirect_document_id": false
27786+
},
27787+
{
27788+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_maxdb.md",
27789+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-maxdb",
27790+
"redirect_document_id": false
27791+
},
27792+
{
27793+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_oracle.md",
27794+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-oracle",
27795+
"redirect_document_id": false
27796+
},
27797+
{
27798+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_sqlserver.md",
27799+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sqlserver",
27800+
"redirect_document_id": false
27801+
},
27802+
{
27803+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-supported-product-on-azure.md",
27804+
"redirect_url": "/azure/virtual-machines/workloads/sap/supported-product-on-azure",
27805+
"redirect_document_id": false
27806+
},
27807+
{
27808+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-rise-integration.md",
27809+
"redirect_url": "/azure/virtual-machines/workloads/sap/rise-integration",
27810+
"redirect_document_id": false
27811+
},
27812+
{
27813+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-proximity-placement-scenarios.md",
27814+
"redirect_url": "/azure/virtual-machines/workloads/sap/proximity-placement-scenarios",
27815+
"redirect_document_id": false
27816+
},
27817+
{
27818+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-planning-supported-configurations.md",
27819+
"redirect_url": "/azure/virtual-machines/workloads/sap/planning-supported-configurations",
27820+
"redirect_document_id": false
27821+
},
27822+
{
27823+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-iq-deployment-guide.md",
27824+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sapiq",
27825+
"redirect_document_id": false
27826+
},
27827+
{
27828+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-certifications.md",
27829+
"redirect_url": "/azure/virtual-machines/workloads/sap/certifications",
27830+
"redirect_document_id": false
27831+
},
27832+
{
27833+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-ha-availability-zones.md",
27834+
"redirect_url": "/azure/virtual-machines/workloads/sap/high-availability-zones",
27835+
"redirect_document_id": false
27836+
},
27837+
{
27838+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-deployment-checklist.md",
27839+
"redirect_url": "/azure/virtual-machines/workloads/sap/deployment-checklist",
27840+
"redirect_document_id": false
27841+
},
2776127842
{
2776227843
"source_path_from_root": "/articles/migrate/how-to-scale-assessment.md",
2776327844
"redirect_url": "scale-hyper-v-assessment",

articles/active-directory-b2c/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,13 +70,13 @@
7070
items:
7171
- name: Global identity solutions
7272
href: azure-ad-b2c-global-identity-solutions.md
73-
- name: Funnel-based design considerations
73+
- name: Funnel-based design
7474
href: azure-ad-b2c-global-identity-funnel-based-design.md
75-
- name: Region-based design considerations
75+
- name: Region-based design
7676
href: azure-ad-b2c-global-identity-region-based-design.md
7777
- name: Funnel-based proof of concept
7878
href: azure-ad-b2c-global-identity-proof-of-concept-funnel.md
79-
- name: Regional-based proof of concept
79+
- name: Region-based proof of concept
8080
href: azure-ad-b2c-global-identity-proof-of-concept-regional.md
8181
- name: Azure AD B2C best practices
8282
href: best-practices.md

articles/active-directory-b2c/azure-ad-b2c-global-identity-funnel-based-design.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,14 @@ The designs account for:
2222

2323
* Local Account sign up and sign in
2424
* Federated account sign up and sign in
25-
* Authenticating local accounts for users signing in from outside their registered region, supported by cross tenant API based authentication.
25+
* Authenticating local accounts for users signing in from outside their registered region, supported by cross tenant API based authentication
2626
* Authenticating federated accounts for users signing in from outside their registered region, supported by cross tenant API based look up
2727
* Prevents sign up from multiple different regions
2828
* Applications in each region have a single endpoint to connect with
2929

3030
## Local account sign-in use cases
3131

32-
The following use cases are typical in a global Azure AD B2C environment. The local account use cases also cover accounts where the user travels. Each provides a diagram and workflow steps for each use case.
32+
The following use cases are typical in a global Azure AD B2C environment. The local account use cases also cover accounts where the user travels. We provide a diagram and workflow steps for each use case.
3333

3434
### Local user sign-up
3535

@@ -99,8 +99,7 @@ This use case demonstrates how a user can travel across regions and maintain the
9999

100100
1. The EMEA Azure AD B2C tenant performs an Azure AD ROPC flow against the NOAM Azure AD B2C tenant to verify credentials.
101101
>[!NOTE]
102-
>This call will also fetch a token for the user to perform a Graph API call.
103-
The EMEA Azure AD B2C tenant performs a Graph API call to the NOAM Azure AD B2C tenant to fetch the user's profile. This call is authenticated by the access token for Graph API acquired in the last step.
102+
>This call will also fetch a token for the user to perform a Graph API call. The EMEA Azure AD B2C tenant performs a Graph API call to the NOAM Azure AD B2C tenant to fetch the user's profile. This call is authenticated by the access token for Graph API acquired in the last step.
104103
105104
1. The regional tenant issues a token back to the funnel tenant.
106105

@@ -312,6 +311,6 @@ This use case demonstrates how non-local users are able to perform account linki
312311

313312
- [Build a global identity solution with region-based approach](azure-ad-b2c-global-identity-region-based-design.md)
314313

315-
- [Azure AD B2C global identity proof of concept regional-based configuration](azure-ad-b2c-global-identity-proof-of-concept-regional.md)
314+
- [Azure AD B2C global identity proof of concept region-based configuration](azure-ad-b2c-global-identity-proof-of-concept-regional.md)
316315

317316
- [Azure AD B2C global identity proof of concept funnel-based configuration](azure-ad-b2c-global-identity-proof-of-concept-funnel.md)

articles/active-directory-b2c/azure-ad-b2c-global-identity-proof-of-concept-regional.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure Active Directory B2C global identity framework proof of concept for regional based configuration
2+
title: Azure Active Directory B2C global identity framework proof of concept for region-based configuration
33
description: Learn how to create a proof of concept regional based approach for Azure AD B2C to provide customer identity and access management for global customers.
44
services: active-directory-b2c
55
author: gargi-sinha
@@ -13,11 +13,11 @@ ms.author: gasinh
1313
ms.subservice: B2C
1414
---
1515

16-
# Azure Active Directory B2C global identity framework proof of concept regional based configuration
16+
# Azure Active Directory B2C global identity framework proof of concept for region-based configuration
1717

18-
The following section describes how to create proof of concept implementations for regional-based orchestration. The completed Azure Active Directory B2C (Azure AD B2C) custom policies can be found [here](https://github.com/azure-ad-b2c/samples/tree/master/policies/global-architecture-model/region-based-approach).
18+
The following section describes how to create proof of concept implementations for region-based orchestration. The completed Azure Active Directory B2C (Azure AD B2C) custom policies can be found [here](https://github.com/azure-ad-b2c/samples/tree/master/policies/global-architecture-model/region-based-approach).
1919

20-
## Regional-based approach
20+
## Region-based approach
2121

2222
Each regional Azure AD B2C tenant will require an Azure AD B2C Custom policy, which contains the following capabilities:
2323

articles/active-directory-b2c/azure-ad-b2c-global-identity-region-based-design.md

Lines changed: 8 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -108,9 +108,7 @@ This use case demonstrates how a user can reset their password when they are wit
108108

109109
![Screenshot shows the local user forgot password flow.](media/azure-ad-b2c-global-identity-regional-design/local-user-forgot-password.png)
110110

111-
1. User from EMEA attempts to sign in at **myapp.fr**.
112-
113-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
111+
1. User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
114112

115113
1. The user arrives at the EMEA Azure AD B2C tenant and selects **forgot password**. The user enters and verifies their email.
116114

@@ -128,9 +126,7 @@ This use case demonstrates how a user can reset their password when they're trav
128126

129127
![Screenshot shows the traveling user forgot password flow.](media/azure-ad-b2c-global-identity-regional-design/traveling-user-forgot-password.png)
130128

131-
1. User from NOAM attempts to sign in at **myapp.fr**, since they are on holiday in France.
132-
133-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
129+
1. User from NOAM attempts to sign in at **myapp.fr**, since they are on holiday in France. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
134130

135131
1. The user arrives at the EMEA Azure AD B2C tenant and selects **forgot password**. The user enters and verifies their email.
136132

@@ -204,9 +200,7 @@ This use case demonstrates how a user from their local region signs into the ser
204200

205201
![Screenshot shows the sign in flow.](media/azure-ad-b2c-global-identity-regional-design/social-account-sign-in.png)
206202

207-
1. User from EMEA attempts to sign in at **myapp.fr**.
208-
209-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
203+
1. User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
210204

211205
1. User lands at the EMEA tenant.
212206

@@ -222,15 +216,13 @@ This scenario demonstrates how a user located away from the region in which they
222216

223217
![Screenshot shows the sign in for traveling user flow.](media/azure-ad-b2c-global-identity-regional-design/traveling-user-social-account-sign-in.png)
224218

225-
1. User from NOAM attempts to sign in at **myapp.fr**.
226-
227-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
219+
1. User from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
228220

229221
1. User lands at the EMEA tenant.
230222

231223
1. User selects to sign in with a federated identity provider.
232224

233-
>[!NOTE]
225+
>[!NOTE]
234226
>Use the same App Id from the App Registration at the Social IdP across all Azure AD B2C regional tenants. This ensures that the ID coming back from the Social IdP is always the same.
235227
236228
1. Perform a lookup into the global lookup table and determine the user's federated ID is registered in NOAM.
@@ -245,9 +237,7 @@ This scenario demonstrates how users will be able to perform account linking whe
245237

246238
![Screenshot shows the merge/link accounts flow.](media/azure-ad-b2c-global-identity-regional-design/merge-link-account.png)
247239

248-
1. User from EMEA attempts to sign in at **myapp.fr**.
249-
250-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
240+
1. User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
251241

252242
1. User lands at the EMEA tenant.
253243

@@ -269,15 +259,13 @@ This scenario demonstrates how users will be able to perform account linking wh
269259

270260
![Screenshot shows the traveling user merge/link accounts flow.](media/azure-ad-b2c-global-identity-regional-design/traveling-user-merge-link-account.png)
271261

272-
1. User from NOAM attempts to sign in at **myapp.fr**.
273-
274-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
262+
1. User from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
275263

276264
1. User lands at the EMEA tenant.
277265

278266
1. User selects to sign in with a federated identity provider/social IdP.
279267

280-
1. A lookup is performed into the global lookup table for the ID returned from the federated IdP.
268+
1. A lookup is performed into the global lookup table for the ID returned from the federated IdP.
281269

282270
1. Where the ID doesn't exist, and the email from the federated IdP exists in another region, it's a traveling user account linking scenario.
283271

articles/active-directory-b2c/claimsschema.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ The following example configures an **email** claim with regular expression inpu
224224
<UserHelpText>Email address that can be used to contact you.</UserHelpText>
225225
<UserInputType>TextBox</UserInputType>
226226
<Restriction>
227-
<Pattern RegularExpression="^[a-zA-Z0-9.+!#$%&amp;'^_`{}~-]+@[a-zA-Z0-9-]+(?:\.[a-zA-Z0-9-]+)*$" HelpText="Please enter a valid email address." />
227+
<Pattern RegularExpression="^[a-zA-Z0-9.+!#$%&amp;'+^_`{}~-]+(?:\.[a-zA-Z0-9!#$%&amp;'+^_`{}~-]+)*@(?:[a-zA-Z0-9](?:[a-zA-Z0-9-]*[a-zA-Z0-9])?\.)+[a-zA-Z0-9](?:[a-zA-Z0-9-]*[a-zA-Z0-9])?$" HelpText="Please enter a valid email address." />
228228
</Restriction>
229229
</ClaimType>
230230
```

articles/active-directory-b2c/configure-authentication-sample-python-web-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ Open the *app_config.py* file. This file contains information about your Azure A
216216

217217
|Key |Value |
218218
|---------|---------|
219-
|`ENDPOINT`| The URI of your web API (for example, `https://localhost:44332/hello`).|
219+
|`ENDPOINT`| The URI of your web API (for example, `https://localhost:5000/getAToken`).|
220220
|`SCOPE`| The web API [scopes](#step-62-configure-scopes) that you created.|
221221
| | |
222222

@@ -238,7 +238,7 @@ CLIENT_SECRET = "xxxxxxxxxxxxxxxxxxxxxxxx" # Placeholder - for use ONLY during t
238238
### More code here
239239

240240
# This is the API resource endpoint
241-
ENDPOINT = 'https://localhost:44332'
241+
ENDPOINT = 'https://localhost:5000'
242242

243243

244244
SCOPE = ["https://contoso.onmicrosoft.com/api/demo.read", "https://contoso.onmicrosoft.com/api/demo.write"]

0 commit comments

Comments
 (0)