Skip to content

Commit 4121d05

Browse files
authored
Merge pull request #183511 from MicrosoftDocs/master
12/22 AM Publishing
2 parents 6dff8b1 + 2bac806 commit 4121d05

File tree

108 files changed

+623
-151
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

108 files changed

+623
-151
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44508,6 +44508,11 @@
4450844508
"redirect_url": "/azure/communication-services/concepts/telephony/port-phone-number",
4450944509
"redirect_document_id": false
4451044510
},
44511+
{
44512+
"source_path_from_root": "/articles/communication-services/quickstarts/voice-video-calling/pstn-call.md",
44513+
"redirect_url": "/azure/communication-services/quickstarts/telephony/pstn-call",
44514+
"redirect_document_id": false
44515+
},
4451144516
{
4451244517
"source_path_from_root": "/articles/communication-services/concepts/telephony-sms/concepts.md",
4451344518
"redirect_url": "/azure/communication-services/concepts/sms/concepts",

articles/active-directory-b2c/service-limits.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 12/21/2021
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -38,13 +38,13 @@ The frequency of requests made to Azure AD B2C endpoints determine the overall t
3838

3939
|Endpoint |Endpoint type |Requests consumed |
4040
|-----------------------------|---------|------------------|
41-
|/oauth2/v2.0/authorize |Dynamic |Varies<sup>1</sup>|
41+
|/oauth2/v2.0/authorize |Dynamic |Varies <sup>1</sup>|
4242
|/oauth2/v2.0/token |Static |1 |
4343
|/openid/v2.0/userinfo |Static |1 |
4444
|/.well-known/openid-config |Static |1 |
4545
|/discovery/v2.0/keys |Static |1 |
4646
|/oauth2/v2.0/logout |Static |1 |
47-
|/samlp/sso/login |Dynamic |Varies<sup>1</sup>|
47+
|/samlp/sso/login |Dynamic |Varies <sup>1</sup>|
4848
|/samlp/sso/logout |Static |1 |
4949

5050
::: zone pivot="b2c-user-flow"
@@ -97,11 +97,13 @@ The token issuance rate of a Custom Policy is dependent on the number of request
9797
|Starter Pack |Scenario |User journey ID |Requests consumed|
9898
|---------|---------|---------|---------|
9999
|LocalAccounts| Sign-in| SignUpOrSignIn |2|
100+
|LocalAccounts SocialAndLocalAccounts | Sign-up| SignUpOrSignIn |6|
100101
|LocalAccounts|Profile edit| ProfileEdit |2|
101-
|LocalAccounts SocialAndLocalAccounts| PasswordReset| Password reset| 6|
102+
|LocalAccounts SocialAndLocalAccounts SocialAndLocalAccountsWithMfa| Password reset| PasswordReset| 6|
102103
|SocialAndLocalAccounts| Federated account sign-in|SignUpOrSignIn| 4|
103104
|SocialAndLocalAccounts| Federated account sign-up|SignUpOrSignIn| 6|
104105
|SocialAndLocalAccountsWithMfa| Local account sign-in with MFA|SignUpOrSignIn |6|
106+
|SocialAndLocalAccountsWithMfa| Local account sign-up with MFA|SignUpOrSignIn |10|
105107
|SocialAndLocalAccountsWithMfa| Federated account sign-in with MFA|SignUpOrSignIn| 8|
106108
|SocialAndLocalAccountsWithMfa| Federated account sign-up with MFA|SignUpOrSignIn |10|
107109

@@ -115,9 +117,9 @@ To obtain the token issuance rate per second for a particular user journey:
115117
Tokens/sec = 200/requests-consumed
116118
```
117119

118-
## Calculate the token issuance capability of your Custom Policy
120+
## Calculate the token issuance rate of your Custom Policy
119121

120-
When you create your own Custom Policy, the number of requests consumed at the dynamic endpoint depends on which features a user traverses through. The below table shows how many requests are consumed for each feature in your Custom Policy.
122+
You can craete your own Custom Policy to provide a unique authentication experience for your application. The number of requests consumed at the dynamic endpoint depends on which features a user traverses through your Custom Policy. The below table shows how many requests are consumed for each feature in a Custom Policy.
121123

122124
|Feature |Requests consumed|
123125
|-------------------------------------------------|-----------------|

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -58,13 +58,6 @@ Required permissions | For permissions required to apply an update, see [account
5858
>
5959
> Please follow this link to read more about [auto upgrade](how-to-connect-install-automatic-upgrade.md).
6060
61-
## 2.0.89.0
62-
63-
### Release status
64-
12/21/2021: Released for download only, not available for auto upgrade.
65-
66-
### Bug fixes
67-
- We fixed a bug in version 2.0.88.0 where, under certain conditions, linked mailboxes of disabled users were getting deleted.
6861

6962
## 2.0.88.0
7063
> [!NOTE]

articles/api-management/api-management-log-to-eventhub-sample.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.assetid: c528cf6f-5f16-4a06-beea-fa1207541a47
1212
ms.service: api-management
1313
ms.workload: mobile
1414
ms.tgt_pltfrm: na
15-
ms.devlang: dotnet
15+
ms.devlang: csharp
1616
ms.custom: devx-track-csharp
1717
ms.topic: article
1818
ms.date: 01/23/2018

articles/api-management/api-management-sample-cache-by-key.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,6 @@ editor: ''
99

1010
ms.assetid: 772bc8dd-5cda-41c4-95bf-b9f6f052bc85
1111
ms.service: api-management
12-
ms.devlang: dotnet
13-
ms.custom: devx-track-csharp
1412
ms.topic: article
1513
ms.tgt_pltfrm: na
1614
ms.workload: na

articles/api-management/api-management-sample-flexible-throttling.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,6 @@ editor: ''
99

1010
ms.assetid: fc813a65-7793-4c17-8bb9-e387838193ae
1111
ms.service: api-management
12-
ms.devlang: dotnet
13-
ms.custom: devx-track-csharp
1412
ms.topic: article
1513
ms.tgt_pltfrm: na
1614
ms.workload: na

articles/api-management/api-management-sample-send-request.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,6 @@ editor: ''
99

1010
ms.assetid: 4539c0fa-21ef-4b1c-a1d4-d89a38c242fa
1111
ms.service: api-management
12-
ms.devlang: dotnet
13-
ms.custom: devx-track-csharp
1412
ms.topic: article
1513
ms.tgt_pltfrm: na
1614
ms.workload: na

articles/app-service/configure-authentication-customize-sign-in-out.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -125,13 +125,22 @@ az webapp config appsettings set --name <app_name> --resource-group <group_name>
125125

126126
Both Microsoft Account and Azure Active Directory lets you sign in from multiple domains. For example, Microsoft Account allows _outlook.com_, _live.com_, and _hotmail.com_ accounts. Azure AD allows any number of custom domains for the sign-in accounts. However, you may want to accelerate your users straight to your own branded Azure AD sign-in page (such as `contoso.com`). To suggest the domain name of the sign-in accounts, follow these steps.
127127

128-
In [https://resources.azure.com](https://resources.azure.com), navigate to **subscriptions** > **_\<subscription\_name_** > **resourceGroups** > **_\<resource\_group\_name>_** > **providers** > **Microsoft.Web** > **sites** > **_\<app\_name>_** > **config** > **authsettings**.
129-
130-
Click **Edit**, modify the following property, and then click **Put**. Be sure to replace _\<domain\_name>_ with the domain you want.
128+
1. In [https://resources.azure.com](https://resources.azure.com), At the top of the page, select **Read/Write**.
129+
2. In the left browser, navigate to **subscriptions** > **_\<subscription-name_** > **resourceGroups** > **_\<resource-group-name>_** > **providers** > **Microsoft.Web** > **sites** > **_\<app-name>_** > **config** > **authsettingsV2**.
130+
3. Click **Edit**.
131+
4. Add a `loginParameters` array with a `domain_hint` item.
132+
133+
```json
134+
"identityProviders": {
135+
"azureActiveDirectory": {
136+
"login": {
137+
"loginParameters": ["domain_hint=<domain-name>"],
138+
}
139+
}
140+
}
141+
```
131142

132-
```json
133-
"additionalLoginParams": ["domain_hint=<domain_name>"]
134-
```
143+
5. Click **Put**.
135144

136145
This setting appends the `domain_hint` query string parameter to the login redirect URL.
137146

articles/app-service/deploy-zip.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -174,19 +174,19 @@ The CLI command uses the [Kudu publish API](#kudu-publish-api-reference) to depl
174174
### Deploy a startup script
175175

176176
```bash
177-
az webapp deploy --resource group <group-name> --name <app-name> --src-path scripts/startup.sh --type=startup
177+
az webapp deploy --resource-group <group-name> --name <app-name> --src-path scripts/startup.sh --type=startup
178178
```
179179

180180
### Deploy a library file
181181

182182
```bash
183-
az webapp deploy --resource group <group-name> --name <app-name> --src-path driver.jar --type=lib
183+
az webapp deploy --resource-group <group-name> --name <app-name> --src-path driver.jar --type=lib
184184
```
185185

186186
### Deploy a static file
187187

188188
```bash
189-
az webapp deploy --resource group <group-name> --name <app-name> --src-path config.json --type=static
189+
az webapp deploy --resource-group <group-name> --name <app-name> --src-path config.json --type=static
190190
```
191191

192192
# [Azure PowerShell](#tab/powershell)

articles/app-service/resources-kudu.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,8 @@ Kudu is the engine behind a number of features in [Azure App Service](overview.m
1212
Anytime you create an app, App Service creates a companion app for it that's secured by HTTPS. This Kudu app is accessible at:
1313

1414
- App not in Isolated tier: `https://<app-name>.scm.azurewebsites.net`
15-
- App in Isolated tier (App Service Environment): `https://<app-name>.scm.<ase-name>.p.azurewebsites.net`
15+
- Internet-facing app in Isolated tier (App Service Environment): `https://<app-name>.scm.<ase-name>.p.azurewebsites.net`
16+
- Internal app in Isolated tier (ILB App Service Environment): `https://<app-name>.scm.<ase-name>.appserviceenvironment.net`
1617

1718
For more information, see [Accessing the kudu service](https://github.com/projectkudu/kudu/wiki/Accessing-the-kudu-service).
1819

0 commit comments

Comments
 (0)