Skip to content

Commit 540d161

Browse files
authored
Merge pull request #292885 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST, 1/10
2 parents 602bb72 + c1477ca commit 540d161

File tree

67 files changed

+95
-713
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+95
-713
lines changed

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4725,6 +4725,36 @@
47254725
"redirect_url": "/azure/sentinel/data-connectors/threat-intelligence-upload-api",
47264726
"redirect_document_id": false
47274727
},
4728+
{
4729+
"source_path_from_root": "/articles/app-spaces/how-to-add-components.md",
4730+
"redirect_url": "/azure/container-apps/",
4731+
"redirect_document_id": false
4732+
},
4733+
{
4734+
"source_path_from_root": "/articles/app-spaces/how-to-manage-components.md",
4735+
"redirect_url": "/azure/container-apps/",
4736+
"redirect_document_id": false
4737+
},
4738+
{
4739+
"source_path_from_root": "/articles/app-spaces/index.yml",
4740+
"redirect_url": "/azure/container-apps/",
4741+
"redirect_document_id": false
4742+
},
4743+
{
4744+
"source_path_from_root": "/articles/app-spaces/overview.md",
4745+
"redirect_url": "/azure/container-apps/",
4746+
"redirect_document_id": false
4747+
},
4748+
{
4749+
"source_path_from_root": "/articles/app-spaces/quickstart-deploy-starter-app.md",
4750+
"redirect_url": "/azure/container-apps/",
4751+
"redirect_document_id": false
4752+
},
4753+
{
4754+
"source_path_from_root": "/articles/app-spaces/quickstart-deploy-your-app.md",
4755+
"redirect_url": "/azure/container-apps/",
4756+
"redirect_document_id": false
4757+
},
47284758
{
47294759
"source_path_from_root": "/articles/virtual-network/create-vm-accelerated-networking-cli.md",
47304760
"redirect_url": "/azure/virtual-network/create-virtual-machine-accelerated-networking",

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77
ms.service: azure-active-directory
88
ms.topic: how-to
9-
ms.date: 11/27/2023
9+
ms.date: 11/27/2024
1010
ms.author: godonnell
1111
ms.subservice: b2c
1212
zone_pivot_groups: b2c-policy-type

articles/active-directory-b2c/add-sign-up-and-sign-in-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77
ms.service: azure-active-directory
88
ms.topic: how-to
9-
ms.date: 03/22/2024
9+
ms.date: 01/10/2025
1010
ms.author: godonnell
1111
ms.subservice: b2c
1212
ms.custom: "b2c-support"

articles/active-directory-b2c/configure-user-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77
ms.service: azure-active-directory
88
ms.topic: how-to
9-
ms.date: 12/13/2023
9+
ms.date: 12/13/2024
1010
ms.author: godonnell
1111
ms.subservice: b2c
1212
zone_pivot_groups: b2c-policy-type

articles/active-directory-b2c/faq.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ metadata:
88
ms.service: azure-active-directory
99

1010
ms.topic: faq
11-
ms.date: 10/31/2023
11+
ms.date: 10/01/2024
1212
ms.author: godonnell
1313
ms.subservice: b2c
1414
ms.custom: b2c-support, has-azure-ad-ps-ref,azure-ad-ref-level-one-done
@@ -32,7 +32,7 @@ sections:
3232
- question: |
3333
Why can't I access the Azure AD B2C extension in the Azure portal?
3434
answer: |
35-
There are two common reasons for why the Microsoft Entra extension isn't working for you. Azure AD B2C requires your user role in the directory to be a global administrator. Contact your administrator if you think you should have access. If you have global administrator privileges, make sure that you are in an Azure AD B2C directory and not a Microsoft Entra directory. You can see instructions for [creating an Azure AD B2C tenant](tutorial-create-tenant.md).
35+
There are two common reasons for why the Microsoft Entra extension isn't working for you. Azure AD B2C requires your user role in the directory to be a Global administrator. Contact your administrator if you think you should have access. If you have Global administrator privileges, make sure that you are in an Azure AD B2C directory and not a Microsoft Entra directory. You can see instructions for [creating an Azure AD B2C tenant](tutorial-create-tenant.md).
3636
3737
- question: |
3838
Can I use Azure AD B2C features in my existing, employee-based Microsoft Entra tenant?
@@ -92,7 +92,7 @@ sections:
9292
- question: |
9393
Why am I unable to create an Azure AD B2C tenant?
9494
answer: |
95-
You might not have permission to create an Azure AD B2C tenant. Only users with **Global administrator** or **Tenant Creator** roles can create the tenant. You need to contact your **Global administrator**.
95+
You might not have permission to create an Azure AD B2C tenant. Only users with at least **Tenant Creator** roles can create the tenant.
9696
9797
- question: |
9898
How do I customize verification emails (the content and the "From:" field) sent by Azure AD B2C?

articles/active-directory-b2c/identity-protection-investigate-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to investigate risky users, and detections in Azure AD B2
44
ms.service: entra-id
55
ms.subservice: conditional-access
66
ms.topic: overview
7-
ms.date: 01/24/2024
7+
ms.date: 01/24/2025
88
ms.author: godonnell
99
author: garrodonnell
1010
manager: CelesteDG

articles/active-directory-b2c/identity-provider-adfs-saml.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77
ms.service: azure-active-directory
88
ms.topic: how-to
9-
ms.date: 01/24/2024
9+
ms.date: 01/24/2025
1010
ms.author: godonnell
1111
ms.subservice: b2c
1212
zone_pivot_groups: b2c-policy-type

articles/active-directory-b2c/identity-provider-adfs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: garrodonnell
66
manager: CelesteDG
77
ms.service: azure-active-directory
88
ms.topic: how-to
9-
ms.date: 01/24/2024
9+
ms.date: 01/24/2025
1010
ms.author: godonnell
1111
ms.subservice: b2c
1212
zone_pivot_groups: b2c-policy-type
@@ -73,7 +73,7 @@ In this step, configure the claims AD FS application returns to Azure AD B2C.
7373

7474
## Configure AD FS as an identity provider
7575

76-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
76+
1. Sign in to the [Azure portal](https://portal.azure.com/) with an account that has at least [External Identity Provider Administrator](/entra/identity/role-based-access-control/permissions-reference#external-identity-provider-administrator) privileges.
7777
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
7878
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
7979
1. Select **Identity providers**, and then select **New OpenID Connect provider**.

articles/active-directory-b2c/identity-provider-amazon.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ To enable sign-in for users with an Amazon account in Azure Active Directory B2C
4949

5050
## Configure Amazon as an identity provider
5151

52-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
52+
1. Sign in to the [Azure portal](https://portal.azure.com/) with an account that has at least [External Identity Provider Administrator](/entra/identity/role-based-access-control/permissions-reference#external-identity-provider-administrator) privileges.
5353
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
5454
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
5555
1. Select **Identity providers**, then select **Amazon**.

articles/active-directory-b2c/identity-provider-apple-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ To enable sign-in for users with an Apple ID in Azure Active Directory B2C (Azur
7272

7373
## Configure Apple as an identity provider
7474

75-
1. Sign in to the [Azure portal](https://portal.azure.com/) as a global administrator of your Azure AD B2C tenant.
75+
1. Sign in to the [Azure portal](https://portal.azure.com/) with an account that has at least [External Identity Provider Administrator](/entra/identity/role-based-access-control/permissions-reference#external-identity-provider-administrator) privileges.
7676
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
7777
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.
7878
1. Select **Identity providers**, then select **Apple**.

0 commit comments

Comments
 (0)