Skip to content

Commit 5ba9d4a

Browse files
committed
acrolinx, formatting fixes
2 parents f611f52 + 67fb7ba commit 5ba9d4a

File tree

1,895 files changed

+19152
-39594
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,895 files changed

+19152
-39594
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4256,6 +4256,11 @@
42564256
"redirect_url": "/azure/active-directory/external-identities/user-token",
42574257
"redirect_document_id": true
42584258
},
4259+
{
4260+
"source_path_from_root": "/articles/active-directory/fundamentals/certificate-authorities.md",
4261+
"redirect_url": "/azure/security/fundamentals/azure-CA-details",
4262+
"redirect_document_id": true
4263+
},
42594264
{
42604265
"source_path_from_root": "/articles/active-directory/b2b/what-is-b2b.md",
42614266
"redirect_url": "/azure/active-directory/external-identities/what-is-b2b",

.openpublishing.redirection.azure-monitor.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -72,12 +72,12 @@
7272
},
7373
{
7474
"source_path_from_root": "/articles/azure-monitor/app/correlation.md",
75-
"redirect_url": "/previous-versions/azure/azure-monitor/app/distributed-tracing-telemetry-correlation",
75+
"redirect_url": "/azure/azure-monitor/app/distributed-tracing-telemetry-correlation",
7676
"redirect_document_id": false
7777
},
7878
{
7979
"source_path_from_root": "/articles/azure-monitor/app/distributed-tracing.md",
80-
"redirect_url": "/previous-versions/azure/azure-monitor/app/distributed-tracing-telemetry-correlation",
80+
"redirect_url": "/azure/azure-monitor/app/distributed-tracing-telemetry-correlation",
8181
"redirect_document_id": false
8282
},
8383
{
@@ -6135,7 +6135,12 @@
61356135
"source_path_from_root": "/articles/azure-monitor/app/data-model-context.md",
61366136
"redirect_url": "/azure/azure-monitor/app/data-model-complete",
61376137
"redirect_document_id": false
6138+
},
6139+
{
6140+
"source_path_from_root": "/articles/azure-monitor/logs/dashboard-upgrade.md",
6141+
"redirect_url": "/azure/azure-monitor/visualize/tutorial-logs-dashboards",
6142+
"redirect_document_id": false
61386143
}
6139-
6144+
61406145
]
61416146
}

.openpublishing.redirection.json

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -965,6 +965,11 @@
965965
"redirect_url": "/azure/aks/workload-identity-migrate-from-pod-identity",
966966
"redirect_document_id": false
967967
},
968+
{
969+
"source_path_from_root": "/articles/aks/managed-aad.md",
970+
"redirect_url": "/azure/aks/managed-azure-ad",
971+
"redirect_document_id": false
972+
},
968973
{
969974
"source_path": "articles/germany/germany-developer-guide.md",
970975
"redirect_url": "/previous-versions/azure/germany/germany-developer-guide",
@@ -22538,6 +22543,11 @@
2253822543
"redirect_url": "/azure/communication-services/concepts/call-automation/call-recording/bring-your-own-storage",
2253922544
"redirect_document_id": false
2254022545
},
22546+
{
22547+
"source_path_from_root": "/articles/openshift/howto-configure-ovn-kubernetes.md",
22548+
"redirect_url": "/azure/openshift/concepts-ovn-kubernetes",
22549+
"redirect_document_id": false
22550+
},
2254122551
{
2254222552
"source_path_from_root": "/articles/sentinel/data-connectors/microsoft-defender-threat-intelligence.md",
2254322553
"redirect_url": "/azure/sentinel/understand-threat-intelligence",
@@ -22547,6 +22557,11 @@
2254722557
"source_path_from_root": "/articles/principles-for-ai-generated-content.md",
2254822558
"redirect_url": "https://aka.ms/ai-content-principles",
2254922559
"redirect_document_id": false
22550-
}
22560+
},
22561+
{
22562+
"source_path_from_root": "/articles/azure-monitor/app/java-standalone-arguments.md",
22563+
"redirect_url": "/azure/azure-monitor/app/java-get-started-supplemental",
22564+
"redirect_document_id": true
22565+
}
2255122566
]
2255222567
}

articles/active-directory-b2c/configure-authentication-sample-react-spa-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 11/17/2022
10+
ms.date: 04/24/2023
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -213,7 +213,7 @@ You're now ready to test the React scoped access to the API. In this step, run b
213213

214214
```console
215215
npm install && npm update
216-
node index.js
216+
npm start
217217
```
218218

219219
The console window displays the port number where the application is hosted:

articles/active-directory-b2c/enable-authentication-react-spa-app.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 07/07/2022
10+
ms.date: 04/24/2023
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -31,7 +31,6 @@ You can use an existing React app, or [create a new React App](https://reactjs.o
3131
```
3232
npx create-react-app my-app
3333
cd my-app
34-
npm start
3534
```
3635

3736
## Step 2: Install the dependencies

articles/active-directory-b2c/enable-authentication-web-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ Azure AD B2C identity provider settings are stored in the *appsettings.json* fil
260260
"Instance": "https://<your-tenant-name>.b2clogin.com",
261261
"ClientId": "<web-app-application-id>",
262262
"Domain": "<your-b2c-domain>",
263-
"SignedOutCallbackPath": "/signout/<your-sign-up-in-policy>",
263+
"SignedOutCallbackPath": "/signout-oidc
264264
"SignUpSignInPolicyId": "<your-sign-up-in-policy>"
265265
}
266266
```

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ For user flows, these extension properties are [managed by using the Azure porta
167167
Use the [Get organization details](/graph/api/organization-get) API to get your directory size quota. You need to add the `$select` query parameter as shown in the following HTTP request:
168168

169169
```http
170-
GET https://graph.microsoft.com/v1.0/organization/organization-id?$select=directorySizeQuota
170+
GET https://graph.microsoft.com/v1.0/organization/organization-id?$select=directorySizeQuota
171171
```
172172
Replace `organization-id` with your organization or tenant ID.
173173

articles/active-directory-b2c/saml-service-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/16/2022
12+
ms.date: 04/24/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit
@@ -327,7 +327,7 @@ The following example shows the `entityID` value in the SAML metadata:
327327
The `identifierUris` property will accept URLs only on the domain `tenant-name.onmicrosoft.com`.
328328

329329
```json
330-
"identifierUris":"https://tenant-name.onmicrosoft.com",
330+
"identifierUris":"https://tenant-name.onmicrosoft.com/app-name",
331331
```
332332

333333
#### Share the application's metadata with Azure AD B2C

articles/active-directory-b2c/tokens-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/09/2023
11+
ms.date: 04/24/2023
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: b2c-support
@@ -24,7 +24,7 @@ Azure AD B2C supports the [OAuth 2.0 and OpenID Connect protocols](protocols-ove
2424

2525
The following tokens are used in communication with Azure AD B2C:
2626

27-
- **ID token** - A JWT that contains claims that you can use to identify users in your application. This token is securely sent in HTTP requests for communication between two components of the same application or service. You can use the claims in an ID token as you see fit. They're commonly used to display account information or to make access control decisions in an application. ID tokens are signed, but they're not encrypted. When your application or API receives an ID token, it must validate the signature to prove that the token is authentic. Your application or API must also validate a few claims in the token to prove that it's valid. Depending on the scenario requirements, the claims validated by an application can vary, but your application must perform some common claim validations in every scenario.
27+
- **ID token** - A JWT that contains claims that you can use to identify users in your application. This token is securely sent in HTTP requests for communication between two components of the same application or service. You can use the claims in an ID token as you see fit. They're commonly used to display account information or to make access control decisions in an application. The ID tokens issued by Azure AD B2C are signed, but they're not encrypted. When your application or API receives an ID token, it must validate the signature to prove that the token is authentic. Your application or API must also validate a few claims in the token to prove that it's valid. Depending on the scenario requirements, the claims validated by an application can vary, but your application must perform some common claim validations in every scenario.
2828

2929
- **Access token** - A JWT that contains claims that you can use to identify the granted permissions to your APIs. Access tokens are signed, but they aren't encrypted. Access tokens are used to provide access to APIs and resource servers. When your API receives an access token, it must validate the signature to prove that the token is authentic. Your API must also validate a few claims in the token to prove that it's valid. Depending on the scenario requirements, the claims validated by an application can vary, but your application must perform some common claim validations in every scenario.
3030

articles/active-directory-b2c/user-profile-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ Extension attributes in the Graph API are named by using the convention `extensi
189189
Note that the **Application (client) ID** as it's represented in the extension attribute name includes no hyphens. For example:
190190

191191
```json
192-
"extension_831374b3bd5041bfaa54263ec9e050fc_loyaltyNumber": "212342"
192+
"extension_831374b3bd5041bfaa54263ec9e050fc_loyaltyNumber": "212342"
193193
```
194194

195195
The following data types are supported when defining an attribute in a schema extension:

0 commit comments

Comments
 (0)