Skip to content

Commit 4fcde63

Browse files
committed
Fix merge conflict
2 parents 0f1799b + 50c1d03 commit 4fcde63

File tree

5,374 files changed

+62259
-60017
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

5,374 files changed

+62259
-60017
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -986,6 +986,12 @@
986986
"branch": "main",
987987
"branch_mapping": {}
988988
},
989+
{
990+
"path_to_root": "msdocs-app-service-sqldb-dotnetcore",
991+
"url": "https://github.com/Azure-Samples/msdocs-app-service-sqldb-dotnetcore",
992+
"branch": "main",
993+
"branch_mapping": {}
994+
},
989995
{
990996
"path_to_root": "azuresignalr-samples",
991997
"url": "https://github.com/aspnet/AzureSignalR-samples",

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5509,6 +5509,11 @@
55095509
"redirect_url": "/azure/azure-monitor/logs/resource-manager-workspace",
55105510
"redirect_document_id": false
55115511
},
5512+
{
5513+
"source_path_from_root": "/articles/azure-monitor/logs/resource-manager-cluster.md",
5514+
"redirect_url": "/azure/azure-monitor/logs/logs-dedicated-clusters",
5515+
"redirect_document_id": false
5516+
},
55125517
{
55135518
"source_path_from_root": "/articles/azure-monitor/visualize/powerbi.md",
55145519
"redirect_url": "/azure/azure-monitor/logs/log-powerbi",

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,25 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-cloud/recommendations-reference.md",
5+
"redirect_url": "/azure/defender-for-cloud/security-policy-concept",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/defender-for-cloud/recommendations-reference-gcp.md",
10+
"redirect_url": "/azure/defender-for-cloud/security-policy-concept",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/defender-for-cloud/recommendations-reference-aws.md",
15+
"redirect_url": "/azure/defender-for-cloud/security-policy-concept",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/defender-for-cloud/upcoming-changes.md",
20+
"redirect_url": "/azure/defender-for-cloud/release-notes",
21+
"redirect_document_id": false
22+
},
323
{
424
"source_path_from_root": "/articles/defender-for-cloud/secret-scanning.md",
525
"redirect_url": "/azure/defender-for-cloud/secrets-scanning-servers",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/education-hub/custom-tenant-set-up-classroom.md",
5+
"redirect_url": "/articles/education-hub/about-education-hub.md",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

.openpublishing.redirection.json

Lines changed: 618 additions & 31 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.sentinel.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1624,6 +1624,16 @@
16241624
"source_path_from_root": "/articles/sentinel/data-connectors/fortinet.md",
16251625
"redirect_url": "/azure/sentinel/data-connectors/deprecated-fortinet-via-legacy-agent",
16261626
"redirect_document_id": true
1627+
},
1628+
{
1629+
"source_path_from_root": "/articles/sentinel/data-connectors/cisco-stealthwatch.md",
1630+
"redirect_url": "/azure/sentinel/data-connectors-reference",
1631+
"redirect_document_id": false
1632+
},
1633+
{
1634+
"source_path_from_root": "/articles/sentinel/data-connectors/hyas-protect.md",
1635+
"redirect_url": "/azure/sentinel/data-connectors-reference",
1636+
"redirect_document_id": false
16271637
}
16281638
]
16291639
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -429,6 +429,16 @@
429429
"source_path_from_root": "/articles/virtual-desktop/host-pool-load-balancing.md",
430430
"redirect_url": "/azure/virtual-desktop/configure-host-pool-load-balancing",
431431
"redirect_document_id": false
432+
},
433+
{
434+
"source_path_from_root": "/articles/virtual-desktop/configure-rdp-shortpath-limit-ports-public-networks.md",
435+
"redirect_url": "/azure/virtual-desktop/configure-rdp-shortpath",
436+
"redirect_document_id": true
437+
},
438+
{
439+
"source_path_from_root": "/articles/virtual-desktop/disaster-recovery.md",
440+
"redirect_url": "/azure/virtual-desktop/disaster-recovery-concepts",
441+
"redirect_document_id": true
432442
}
433443
]
434444
}

articles/active-directory-b2c/configure-authentication-sample-python-web-app.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Configure authentication in a sample Python web application by using Azure Active Directory B2C
2+
title: Configure authentication in a sample Python web app by using Azure AD B2C
33
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Python web application.
44

55
author: kengaderdus
6-
manager: CelesteDG
6+
manager: mwongerapk
77
ms.service: active-directory
88

99
ms.topic: reference
10-
ms.date: 01/11/2024
10+
ms.date: 06/04/2024
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: b2c-support, devx-track-python
1414

1515

16-
#Customer intent: As a Python web app developer, I want to configure Azure AD B2C authentication in my web application, so that I can securely sign users in and add authentication and authorization support to my app.
16+
#Customer intent: As a Python web app developer, I want to configure Azure AD B2C authentication in a sample web app by using my own tenant, so that I can securely sign customer users.
1717

1818
---
1919

@@ -37,7 +37,7 @@ The sign-in flow involves the following steps:
3737

3838
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3939
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
40-
- [Python 3.7+](https://www.python.org/downloads/)
40+
- [Python 3.8+](https://www.python.org/downloads/)
4141

4242
## Step 1: Configure your user flow
4343

@@ -222,4 +222,4 @@ You can add and modify redirect URIs in your registered applications at any time
222222
* The redirect URL is case-sensitive. Its case must match the case of the URL path of your running application.
223223
224224
## Next steps
225-
* Learn how to [Configure authentication options in a Python web app by using Azure AD B2C](enable-authentication-python-web-app-options.md).
225+
* Learn how to [Configure authentication options in a Python web app by using Azure AD B2C](enable-authentication-python-web-app-options.md).

articles/active-directory-b2c/custom-policies-series-store-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 05/11/2024
13+
ms.date: 06/21/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: B2C
@@ -263,7 +263,7 @@ Follow the steps in [Test the custom policy](custom-policies-series-validate-use
263263

264264
After the policy finishes execution, and you receive your ID token, check that the user record has been created:
265265

266-
1. Sign in to the [Azure portal](https://portal.azure.com/) with Global Administrator or Privileged Role Administrator permissions.
266+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least Privileged Role Administrator.
267267

268268
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
269269

articles/active-directory-b2c/enable-authentication-spa-app.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -105,12 +105,6 @@ The resources referenced by the *index.html* file are detailed in the following
105105
|---|---|
106106
|MSAL.js library| MSAL.js authentication JavaScript library [CDN path](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/cdn-usage.md).|
107107
|[Bootstrap stylesheet](https://getbootstrap.com/) | A free front-end framework for faster and easier web development. The framework includes HTML-based and CSS-based design templates. |
108-
|[`policies.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/policies.js) | Contains the Azure AD B2C custom policies and user flows. |
109-
|[`authConfig.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/authConfig.js) | Contains authentication configuration parameters.|
110-
|[`authRedirect.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/authRedirect.js) | Contains the authentication logic. |
111-
|[`apiConfig.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/apiConfig.js) | Contains web API scopes and the API endpoint location. |
112-
|[`api.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/api.js) | Defines the method to use to call your API and handle its response.|
113-
|[`ui.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/ui.js) | Controls the UI elements. |
114108
| | |
115109

116110
To render the SPA index file, in the *myApp* folder, create a file named *index.html*, which contains the following HTML snippet:

0 commit comments

Comments
 (0)