Skip to content

Commit 4a53ba7

Browse files
committed
merge conflicts
2 parents 25c8e86 + 922428a commit 4a53ba7

File tree

3,989 files changed

+46265
-25009
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,989 files changed

+46265
-25009
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -884,6 +884,12 @@
884884
"branch": "main",
885885
"branch_mapping": {}
886886
},
887+
{
888+
"path_to_root": "azure-cosmos-tableapi-dotnet",
889+
"url": "https://github.com/Azure-Samples/cosmos-db-table-api-dotnet-samples",
890+
"branch": "v12",
891+
"branch_mapping": {}
892+
},
887893
{
888894
"path_to_root": "msdocs-django-postgresql-sample-app",
889895
"url": "https://github.com/Azure-Samples/msdocs-django-postgresql-sample-app",

.openpublishing.redirection.azure-monitor.json

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -360,6 +360,51 @@
360360
"source_path_from_root": "/articles/azure-monitor/insights/azure-cli-application-insights-component.md" ,
361361
"redirect_url": "/cli/azure/monitor/app-insights",
362362
"redirect_document_id": false
363+
},
364+
{
365+
"source_path_from_root": "/articles/azure-monitor/insights/redis-cache-insights-overview.md" ,
366+
"redirect_url": "/azure/azure-cache-for-redis/redis-cache-insights-overview",
367+
"redirect_document_id": false
368+
},
369+
{
370+
"source_path_from_root": "/articles/azure-monitor/logs/ingestion-time-transformations.md" ,
371+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-transformations",
372+
"redirect_document_id": false
373+
},
374+
{
375+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-ingestion-time-transformations.md" ,
376+
"redirect_url": "/azure/azure-monitor/logs/tutorial-workspace-transformations-portal",
377+
"redirect_document_id": false
378+
},
379+
{
380+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-ingestion-time-transformations-api.md" ,
381+
"redirect_url": "/azure/azure-monitor/logs/tutorial-workspace-transformations-api",
382+
"redirect_document_id": false
383+
},
384+
{
385+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-custom-logs.md" ,
386+
"redirect_url": "/azure/azure-monitor/logs/tutorial-logs-ingestion-portal",
387+
"redirect_document_id": false
388+
},
389+
{
390+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-custom-logs-api.md" ,
391+
"redirect_url": "/azure/azure-monitor/logs/tutorial-logs-ingestion-api",
392+
"redirect_document_id": false
393+
},
394+
{
395+
"source_path_from_root": "/articles/azure-monitor/agents/data-sources.md" ,
396+
"redirect_url": "/azure/azure-monitor/essentials/data-sources",
397+
"redirect_document_id": false
398+
},
399+
{
400+
"source_path_from_root": "/articles/azure-monitor/essentials/data-collection-rule-transformations.md" ,
401+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-transformations-structure",
402+
"redirect_document_id": false
403+
},
404+
{
405+
"source_path_from_root": "/articles/azure-monitor/logs/custom-logs-overview.md" ,
406+
"redirect_url": "/azure/azure-monitor/logs/logs-ingestion-api-overview",
407+
"redirect_document_id": false
363408
}
364409
]
365410
}

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/api-management/zone-redundancy.md",
5+
"redirect_url": "/azure/availability-zones/migrate-api-mgt",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/virtual-machines/linux/find-unattached-nics.md",
510
"redirect_url": "/previous-versions/azure/virtual-machines/linux/find-unattached-nics",
@@ -5906,6 +5911,11 @@
59065911
"redirect_url": "source-control-integration",
59075912
"redirect_document_id": false
59085913
},
5914+
{
5915+
"source_path_from_root": "/articles/automation/manage-runas-account.md",
5916+
"redirect_url": "/azure/automation/manage-run-as-account",
5917+
"redirect_document_id": false
5918+
},
59095919
{
59105920
"source_path_from_root": "/articles/best-practices-availability-paired-regions.md",
59115921
"redirect_url": "/azure/availability-zones/cross-region-replication-azure",
@@ -6911,6 +6921,11 @@
69116921
"redirect_url": "/azure/azure-functions/functions-bindings-event-hubs-output",
69126922
"redirect_document_id": false
69136923
},
6924+
{
6925+
"source_path_from_root": "/articles/azure-functions/monitor-metrics.md",
6926+
"redirect_url": "/azure/azure-functions/monitor-functions",
6927+
"redirect_document_id": false
6928+
},
69146929
{
69156930
"source_path_from_root": "/articles/azure-functions/functions-bindings-errors.md",
69166931
"redirect_url": "/azure/azure-functions/functions-bindings-error-pages",

articles/active-directory-b2c/azure-monitor.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.topic: how-to
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
14-
ms.date: 06/03/2022
14+
ms.date: 07/12/2022
1515
---
1616

1717
# Monitor Azure AD B2C with Azure Monitor
@@ -124,7 +124,7 @@ To create the custom authorization and delegation in Azure Lighthouse, we use an
124124
| Region | Select the region where the resource will be deployed. |
125125
| Msp Offer Name | A name describing this definition. For example, _Azure AD B2C Monitoring_. It's the name that will be displayed in Azure Lighthouse. The **MSP Offer Name** must be unique in your Azure AD. To monitor multiple Azure AD B2C tenants, use different names. |
126126
| Msp Offer Description | A brief description of your offer. For example, _Enables Azure Monitor in Azure AD B2C_. |
127-
| Managed By Tenant Id | The **Tenant ID** of your Azure AD B2C tenant (also known as the directory ID). |
127+
| Managed By Tenant ID | The **Tenant ID** of your Azure AD B2C tenant (also known as the directory ID). |
128128
| Authorizations | Specify a JSON array of objects that include the Azure AD `principalId`, `principalIdDisplayName`, and Azure `roleDefinitionId`. The `principalId` is the **Object ID** of the B2C group or user that will have access to resources in this Azure subscription. For this walkthrough, specify the group's Object ID that you recorded earlier. For the `roleDefinitionId`, use the [built-in role](../role-based-access-control/built-in-roles.md) value for the _Contributor role_, `b24988ac-6180-42a0-ab88-20f7382dd24c`. |
129129
| Rg Name | The name of the resource group you create earlier in your Azure AD tenant. For example, _azure-ad-b2c-monitor_. |
130130

@@ -173,18 +173,21 @@ You're ready to [create diagnostic settings](../active-directory/reports-monitor
173173
To configure monitoring settings for Azure AD B2C activity logs:
174174

175175
1. Sign in to the [Azure portal](https://portal.azure.com/) with your Azure AD B2C administrative account. This account must be a member of the security group you specified in the [Select a security group](#32-select-a-security-group) step.
176-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
177-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
176+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
177+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
178+
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
178179
1. Select **Azure Active Directory**
179180
1. Under **Monitoring**, select **Diagnostic settings**.
180-
1. If there are existing settings for the resource, you'll see a list of settings already configured. Either select **Add diagnostic setting** to add a new setting, or select **Edit** to edit an existing setting. Each setting can have no more than one of each of the destination types.
181+
1. If there are existing settings for the resource, you'll see a list of settings already configured. Either select **Add diagnostic setting** to add a new setting, or select **Edit settings** to edit an existing setting. Each setting can have no more than one of each of the destination types.
181182

182-
![Diagnostics settings pane in Azure portal](./media/azure-monitor/azure-monitor-portal-05-diagnostic-settings-pane-enabled.png)
183+
![Screenshot of the diagnostics settings pane in Azure portal.](./media/azure-monitor/azure-monitor-portal-05-diagnostic-settings-pane-enabled.png)
183184

184185
1. Give your setting a name if it doesn't already have one.
185-
1. Check the box for each destination to send the logs. Select **Configure** to specify their settings **as described in the following table**.
186-
1. Select **Send to Log Analytics**, and then select the **Name of workspace** you created earlier (`AzureAdB2C`).
187186
1. Select **AuditLogs** and **SignInLogs**.
187+
1. Select **Send to Log Analytics Workspace**, and then:
188+
1. Under **Subscription**, select your subscription.
189+
2. Under **Log Analytics Workspace**, select the name of the workspace you created earlier such as `AzureAdB2C`.
190+
188191

189192
> [!NOTE]
190193
> Only the **AuditLogs** and **SignInLogs** diagnostic settings are currently supported for Azure AD B2C tenants.
@@ -204,7 +207,7 @@ Now you can configure your Log Analytics workspace to visualize your data and co
204207

205208
Log queries help you to fully use the value of the data collected in Azure Monitor Logs. A powerful query language allows you to join data from multiple tables, aggregate large sets of data, and perform complex operations with minimal code. Virtually any question can be answered and analysis performed as long as the supporting data has been collected, and you understand how to construct the right query. For more information, see [Get started with log queries in Azure Monitor](../azure-monitor/logs/get-started-queries.md).
206209

207-
1. From **Log Analytics workspace**, select **Logs**
210+
1. From **Log Analytics workspace** window, select **Logs**
208211
1. In the query editor, paste the following [Kusto Query Language](/azure/data-explorer/kusto/query/) query. This query shows policy usage by operation over the past x days. The default duration is set to 90 days (90d). Notice that the query is focused only on the operation where a token/code is issued by policy.
209212

210213
```kusto
@@ -253,7 +256,7 @@ Workbooks provide a flexible canvas for data analysis and the creation of rich v
253256

254257
Follow the instructions below to create a new workbook using a JSON Gallery Template. This workbook provides a **User Insights** and **Authentication** dashboard for Azure AD B2C tenant.
255258

256-
1. From the **Log Analytics workspace**, select **Workbooks**.
259+
1. From the **Log Analytics workspace** window, select **Workbooks**.
257260
1. From the toolbar, select **+ New** option to create a new workbook.
258261
1. On the **New workbook** page, select the **Advanced Editor** using the **</>** option on the toolbar.
259262

@@ -279,7 +282,7 @@ The workbook will display reports in the form of a dashboard.
279282

280283
## Create alerts
281284

282-
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events occur. You can also create alerts on absence of an event, or a number of events are occur within a particular time window. For example, alerts can be used to notify you when average number of sign in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-log.md).
285+
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events occur. You can also create alerts on absence of an event, or a number of events occur within a particular time window. For example, alerts can be used to notify you when average number of sign in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-log.md).
283286

284287
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md#configure-notifications) whenever there's a 25% drop in the **Total Requests** compared to previous period. Alert will run every 5 minutes and look for the drop in the last hour compared to the hour before it. The alerts are created using Kusto query language.
285288

articles/active-directory-b2c/configure-authentication-in-azure-web-app-file-based.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App configuration file by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](/azure/app-service/configure-authentication-file-based) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](../app-service/configure-authentication-file-based.md) article.
1919

2020
## Overview
2121

@@ -141,6 +141,5 @@ From your server code, the provider-specific tokens are injected into the reques
141141

142142
## Next steps
143143

144-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
145-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
146-
144+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](../app-service/configure-authentication-user-identities.md).
145+
* Learn how to [Work with OAuth tokens in Azure App Service authentication](../app-service/configure-authentication-oauth-tokens.md).

articles/active-directory-b2c/configure-authentication-in-azure-web-app.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](/azure/app-service/configure-authentication-provider-openid-connect) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](../app-service/configure-authentication-provider-openid-connect.md) article.
1919

2020
## Overview
2121

@@ -94,7 +94,7 @@ To register your application, follow these steps:
9494
1. For the **Client Secret** provide the Web App (client) secret from [step 2.2](#step-22-create-a-client-secret).
9595
9696
> [!TIP]
97-
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](/azure/app-service/app-service-key-vault-references) if you wish to manage the secret in Azure Key Vault.
97+
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](../app-service/app-service-key-vault-references.md) if you wish to manage the secret in Azure Key Vault.
9898
9999
1. Keep the rest of the settings with the default values.
100100
1. Press the **Add** button to finish setting up the identity provider.
@@ -119,6 +119,5 @@ From your server code, the provider-specific tokens are injected into the reques
119119
120120
## Next steps
121121
122-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
123-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
124-
122+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](../app-service/configure-authentication-user-identities.md).
123+
* Learn how to [Work with OAuth tokens in Azure App Service authentication](../app-service/configure-authentication-oauth-tokens.md).

articles/active-directory-b2c/display-control-time-based-one-time-password.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 07/20/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -116,4 +116,8 @@ The following screenshot illustrates a TOTP verification page.
116116

117117
## Next steps
118118

119-
- Learn how to validate a TOTP code in [Define an Azure AD MFA technical profile](multi-factor-auth-technical-profile.md).
119+
- Learn more about multifactor authentication in [Enable multifactor authentication in Azure Active Directory B2C](multi-factor-authentication.md?pivots=b2c-custom-policy)
120+
121+
- Learn how to validate a TOTP code in [Define an Azure AD MFA technical profile](multi-factor-auth-technical-profile.md).
122+
123+
- Explore a sample [Azure AD B2C MFA with TOTP using any Authenticator app custom policy in GitHub](https://github.com/azure-ad-b2c/samples/tree/master/policies/totp).

articles/active-directory-b2c/enable-authentication-python-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -416,7 +416,7 @@ if __name__ == "__main__":
416416
417417
## Step 6: Run your web app
418418
419-
In the Terminal, run the app by entering the following command, which runs the Flask development server. The development server looks for `app.py` by default. Then, open your browser and navigate to the web app URL: <http://localhost:5000>.
419+
In the Terminal, run the app by entering the following command, which runs the Flask development server. The development server looks for `app.py` by default. Then, open your browser and navigate to the web app URL: `http://localhost:5000`.
420420
421421
# [Linux](#tab/linux)
422422

0 commit comments

Comments
 (0)