Skip to content

Commit 578f766

Browse files
committed
edit
2 parents aa8d685 + 502ec85 commit 578f766

File tree

3,631 files changed

+33393
-30876
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,631 files changed

+33393
-30876
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -986,6 +986,12 @@
986986
"branch": "main",
987987
"branch_mapping": {}
988988
},
989+
{
990+
"path_to_root": "msdocs-app-service-sqldb-dotnetcore",
991+
"url": "https://github.com/Azure-Samples/msdocs-app-service-sqldb-dotnetcore",
992+
"branch": "main",
993+
"branch_mapping": {}
994+
},
989995
{
990996
"path_to_root": "azuresignalr-samples",
991997
"url": "https://github.com/aspnet/AzureSignalR-samples",

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5509,6 +5509,11 @@
55095509
"redirect_url": "/azure/azure-monitor/logs/resource-manager-workspace",
55105510
"redirect_document_id": false
55115511
},
5512+
{
5513+
"source_path_from_root": "/articles/azure-monitor/logs/resource-manager-cluster.md",
5514+
"redirect_url": "/azure/azure-monitor/logs/logs-dedicated-clusters",
5515+
"redirect_document_id": false
5516+
},
55125517
{
55135518
"source_path_from_root": "/articles/azure-monitor/visualize/powerbi.md",
55145519
"redirect_url": "/azure/azure-monitor/logs/log-powerbi",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/education-hub/custom-tenant-set-up-classroom.md",
5+
"redirect_url": "/articles/education-hub/about-education-hub.md",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

.openpublishing.redirection.json

Lines changed: 84 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -640,6 +640,11 @@
640640
"redirect_url": "/azure/azure-maps/supported-languages",
641641
"redirect_document_id": true
642642
},
643+
{
644+
"source_path_from_root": "/articles/azure-maps/tutorial-geofence.md",
645+
"redirect_url": "/azure/azure-maps/",
646+
"redirect_document_id": true
647+
},
643648
{
644649
"source_path_from_root": "/articles/azure-maps/search-categories.md",
645650
"redirect_url": "/azure/azure-maps/supported-search-categories",
@@ -1939,8 +1944,13 @@
19391944
"redirect_document_id": false
19401945
},
19411946
{
1942-
"source_path_from_root": "/articles/dms/tutorial-sql-server-azure-sql-online.md",
1943-
"redirect_url": "/azure/dms/tutorial-sql-server-to-azure-sql",
1947+
"source_path_from_root": "/articles/dms/howto-sql-server-to-azure-sql-mi-powershell.md",
1948+
"redirect_url": "/azure/dms/howto-sql-server-to-azure-sql-managed-instance-powershell-offline",
1949+
"redirect_document_id": true
1950+
},
1951+
{
1952+
"source_path_from_root": "/articles/dms/known-issues-azure-mysql-online.md",
1953+
"redirect_url": "/azure/dms/",
19441954
"redirect_document_id": false
19451955
},
19461956
{
@@ -1949,15 +1959,70 @@
19491959
"redirect_document_id": false
19501960
},
19511961
{
1952-
"source_path_from_root": "/articles/dms/howto-sql-server-to-azure-sql-mi-powershell.md",
1953-
"redirect_url": "/azure/dms/howto-sql-server-to-azure-sql-managed-instance-powershell-offline",
1954-
"redirect_document_id": true
1962+
"source_path_from_root": "/articles/dms/resource-custom-roles-sql-database-ads.md",
1963+
"redirect_url": "/data-migration/sql-server/database/custom-roles",
1964+
"redirect_document_id": false
1965+
},
1966+
{
1967+
"source_path_from_root": "/articles/dms/resource-custom-roles-sql-db-managed-instance-ads.md",
1968+
"redirect_url": "/data-migration/sql-server/managed-instance/custom-roles",
1969+
"redirect_document_id": false
1970+
},
1971+
{
1972+
"source_path_from_root": "/articles/dms/resource-custom-roles-sql-db-virtual-machine-ads.md",
1973+
"redirect_url": "/data-migration/sql-server/virtual-machines/custom-roles",
1974+
"redirect_document_id": false
1975+
},
1976+
{
1977+
"source_path_from_root": "/articles/dms/tutorial-mysql-azure-mysql-online.md",
1978+
"redirect_url": "/azure/dms/tutorial-mysql-azure-mysql-offline-portal",
1979+
"redirect_document_id": false
1980+
},
1981+
{
1982+
"source_path_from_root": "/articles/dms/tutorial-rds-mysql-server-azure-db-for-mysql-online.md",
1983+
"redirect_url": "/azure/dms/tutorial-mysql-azure-mysql-offline-portal",
1984+
"redirect_document_id": false
19551985
},
19561986
{
19571987
"source_path_from_root": "/articles/dms/tutorial-rds-sql-server-azure-sql-and-managed-instance-online.md",
19581988
"redirect_url": "/azure/dms/",
19591989
"redirect_document_id": false
19601990
},
1991+
{
1992+
"source_path_from_root": "/articles/dms/tutorial-sql-server-azure-sql-database-offline.md",
1993+
"redirect_url": "/data-migration/sql-server/database/database-migration-service",
1994+
"redirect_document_id": false
1995+
},
1996+
{
1997+
"source_path_from_root": "/articles/dms/tutorial-sql-server-azure-sql-database-offline-ads.md",
1998+
"redirect_url": "/data-migration/sql-server/database/database-migration-service",
1999+
"redirect_document_id": false
2000+
},
2001+
{
2002+
"source_path_from_root": "/articles/dms/tutorial-sql-server-azure-sql-online.md",
2003+
"redirect_url": "/azure/dms/tutorial-sql-server-to-azure-sql",
2004+
"redirect_document_id": false
2005+
},
2006+
{
2007+
"source_path_from_root": "/articles/dms/tutorial-sql-server-managed-instance-offline-ads.md",
2008+
"redirect_url": "/data-migration/sql-server/managed-instance/database-migration-service",
2009+
"redirect_document_id": false
2010+
},
2011+
{
2012+
"source_path_from_root": "/articles/dms/tutorial-sql-server-managed-instance-online-ads.md",
2013+
"redirect_url": "/data-migration/sql-server/managed-instance/database-migration-service",
2014+
"redirect_document_id": false
2015+
},
2016+
{
2017+
"source_path_from_root": "/articles/dms/tutorial-sql-server-to-virtual-machine-offline-ads.md",
2018+
"redirect_url": "/data-migration/sql-server/virtual-machines/database-migration-service",
2019+
"redirect_document_id": false
2020+
},
2021+
{
2022+
"source_path_from_root": "/articles/dms/tutorial-sql-server-to-virtual-machine-online-ads.md",
2023+
"redirect_url": "/data-migration/sql-server/virtual-machines/database-migration-service",
2024+
"redirect_document_id": false
2025+
},
19612026
{
19622027
"source_path_from_root": "/articles/notebooks/use-machine-learning-services-jupyter-notebooks.md",
19632028
"redirect_url": "/azure/machine-learning/samples-notebooks",
@@ -3543,21 +3608,6 @@
35433608
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs",
35443609
"redirect_document_id": false
35453610
},
3546-
{
3547-
"source_path_from_root": "/articles/dms/known-issues-azure-mysql-online.md",
3548-
"redirect_url": "/azure/dms/",
3549-
"redirect_document_id": false
3550-
},
3551-
{
3552-
"source_path_from_root": "/articles/dms/tutorial-mysql-azure-mysql-online.md",
3553-
"redirect_url": "/azure/dms/tutorial-mysql-azure-mysql-offline-portal",
3554-
"redirect_document_id": false
3555-
},
3556-
{
3557-
"source_path_from_root": "/articles/dms/tutorial-rds-mysql-server-azure-db-for-mysql-online.md",
3558-
"redirect_url": "/azure/dms/tutorial-mysql-azure-mysql-offline-portal",
3559-
"redirect_document_id": false
3560-
},
35613611
{
35623612
"source_path_from_root": "/articles/sentinel/tutorial-investigate-cases.md",
35633613
"redirect_url": "/azure/sentinel/investigate-cases",
@@ -3898,11 +3948,6 @@
38983948
"redirect_url": "/azure/cosmos-db/how-to-configure-private-endpoints",
38993949
"redirect_document_id": false
39003950
},
3901-
{
3902-
"source_path_from_root": "/articles/dms/tutorial-sql-server-azure-sql-database-offline-ads.md",
3903-
"redirect_url": "/azure/dms/tutorial-sql-server-azure-sql-database-offline",
3904-
"redirect_document_id": true
3905-
},
39063951
{
39073952
"source_path_from_root": "/articles/orbital/space-partner-program-overview.md",
39083953
"redirect_url": "/azure/orbital/overview",
@@ -4149,10 +4194,22 @@
41494194
"redirect_document_id": false
41504195
},
41514196
{
4197+
41524198
"source_path_from_root": "/articles/cosmos-db/how-to-move-regions.md",
4153-
"redirect_url": "/azure/operational-excellence/relocation-cosmos-db",
4199+
"redirect_url": "/azure/operational-excellence/relocation-cosmos-db",
4200+
"redirect_document_id": false
4201+
4202+
},
4203+
{
4204+
"source_path_from_root": "/articles/site-recovery/move-vaults-across-regions.md",
4205+
"redirect_url": "/azure/operational-excellence/relocation-site-recovery",
4206+
"redirect_document_id": false
4207+
},
4208+
{
4209+
"source_path_from_root": "/articles/defender-for-iot/organizations/tutorial-clearpass.md",
4210+
"redirect_url": "/azure/defender-for-iot/organizations/integrate-overview",
41544211
"redirect_document_id": false
41554212
}
4156-
4213+
41574214
]
41584215
}

.openpublishing.redirection.sentinel.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1624,6 +1624,16 @@
16241624
"source_path_from_root": "/articles/sentinel/data-connectors/fortinet.md",
16251625
"redirect_url": "/azure/sentinel/data-connectors/deprecated-fortinet-via-legacy-agent",
16261626
"redirect_document_id": true
1627+
},
1628+
{
1629+
"source_path_from_root": "/articles/sentinel/data-connectors/cisco-stealthwatch.md",
1630+
"redirect_url": "/azure/sentinel/data-connectors-reference",
1631+
"redirect_document_id": false
1632+
},
1633+
{
1634+
"source_path_from_root": "/articles/sentinel/data-connectors/hyas-protect.md",
1635+
"redirect_url": "/azure/sentinel/data-connectors-reference",
1636+
"redirect_document_id": false
16271637
}
16281638
]
16291639
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -429,6 +429,16 @@
429429
"source_path_from_root": "/articles/virtual-desktop/host-pool-load-balancing.md",
430430
"redirect_url": "/azure/virtual-desktop/configure-host-pool-load-balancing",
431431
"redirect_document_id": false
432+
},
433+
{
434+
"source_path_from_root": "/articles/virtual-desktop/configure-rdp-shortpath-limit-ports-public-networks.md",
435+
"redirect_url": "/azure/virtual-desktop/configure-rdp-shortpath",
436+
"redirect_document_id": true
437+
},
438+
{
439+
"source_path_from_root": "/articles/virtual-desktop/disaster-recovery.md",
440+
"redirect_url": "/azure/virtual-desktop/disaster-recovery-concepts",
441+
"redirect_document_id": true
432442
}
433443
]
434444
}

articles/active-directory-b2c/configure-authentication-sample-python-web-app.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Configure authentication in a sample Python web application by using Azure Active Directory B2C
2+
title: Configure authentication in a sample Python web app by using Azure AD B2C
33
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Python web application.
44

55
author: kengaderdus
6-
manager: CelesteDG
6+
manager: mwongerapk
77
ms.service: active-directory
88

99
ms.topic: reference
10-
ms.date: 01/11/2024
10+
ms.date: 06/04/2024
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: b2c-support, devx-track-python
1414

1515

16-
#Customer intent: As a Python web app developer, I want to configure Azure AD B2C authentication in my web application, so that I can securely sign users in and add authentication and authorization support to my app.
16+
#Customer intent: As a Python web app developer, I want to configure Azure AD B2C authentication in a sample web app by using my own tenant, so that I can securely sign customer users.
1717

1818
---
1919

@@ -37,7 +37,7 @@ The sign-in flow involves the following steps:
3737

3838
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3939
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
40-
- [Python 3.7+](https://www.python.org/downloads/)
40+
- [Python 3.8+](https://www.python.org/downloads/)
4141

4242
## Step 1: Configure your user flow
4343

@@ -222,4 +222,4 @@ You can add and modify redirect URIs in your registered applications at any time
222222
* The redirect URL is case-sensitive. Its case must match the case of the URL path of your running application.
223223
224224
## Next steps
225-
* Learn how to [Configure authentication options in a Python web app by using Azure AD B2C](enable-authentication-python-web-app-options.md).
225+
* Learn how to [Configure authentication options in a Python web app by using Azure AD B2C](enable-authentication-python-web-app-options.md).

articles/active-directory-b2c/custom-policies-series-store-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 05/11/2024
13+
ms.date: 06/21/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: B2C
@@ -263,7 +263,7 @@ Follow the steps in [Test the custom policy](custom-policies-series-validate-use
263263

264264
After the policy finishes execution, and you receive your ID token, check that the user record has been created:
265265

266-
1. Sign in to the [Azure portal](https://portal.azure.com/) with Global Administrator or Privileged Role Administrator permissions.
266+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least Privileged Role Administrator.
267267

268268
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
269269

articles/active-directory-b2c/manage-user-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.custom: fasttrack-edit
2222

2323
This article discusses how you can manage the user data in Azure Active Directory B2C (Azure AD B2C) by using the operations that are provided by the [Microsoft Graph API](/graph/use-the-api). Managing user data includes deleting or exporting data from audit logs.
2424

25-
[!INCLUDE [gdpr-intro-sentence.md](../../includes/gdpr-intro-sentence.md)]
25+
[!INCLUDE [gdpr-intro-sentence.md](~/reusable-content/ce-skilling/azure/includes/gdpr-intro-sentence.md)]
2626

2727
## Delete user data
2828

articles/active-directory-b2c/partner-asignio.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 06/21/2024
1010
ms.author: gasinh
1111
ms.reviewer: kengaderdus
1212
ms.subservice: B2C
@@ -103,7 +103,7 @@ Complete [Tutorial: Register a web application in Azure Active Directory B2C](tu
103103

104104
For the following instructions, use the Microsoft Entra tenant with the Azure subscription.
105105

106-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as the Global Administrator of the Azure AD B2C tenant.
106+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
107107
2. In the Azure portal toolbar, select **Directories + subscriptions**.
108108
3. On **Portal settings | Directories + subscriptions**, in the **Directory name** list, locate your Microsoft Entra directory.
109109
4. Select **Switch**.
@@ -130,7 +130,7 @@ For the following instructions, use the Microsoft Entra tenant with the Azure su
130130
25. For **Emai**l, use **email**.
131131
26. Select **Save**.
132132

133-
## SCreate a user flow policy
133+
## Create a user flow policy
134134

135135
1. In your Azure AD B2C tenant, under **Policies**, select **User flows**.
136136
2. Select **New user flow**.

0 commit comments

Comments
 (0)