Skip to content

Commit 5beb9cf

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into apicimport
2 parents 836b4ca + 1f43733 commit 5beb9cf

File tree

515 files changed

+5541
-3155
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

515 files changed

+5541
-3155
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,11 @@
4040
"redirect_url": "/azure/azure-monitor/app/javascript-sdk",
4141
"redirect_document_id": false
4242
},
43+
{
44+
"source_path_from_root": "/articles/azure-monitor/app/ip-addresses.md",
45+
"redirect_url": "/azure/azure-monitor/ip-addresses",
46+
"redirect_document_id": false
47+
},
4348
{
4449
"source_path_from_root": "/articles/azure-monitor/app/source-map-support.md",
4550
"redirect_url": "/azure/azure-monitor/app/javascript-sdk-advanced",

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -915,6 +915,11 @@
915915
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
916916
"redirect_document_id": true
917917
},
918+
{
919+
"source_path_from_root": "/articles/defender-for-cloud/how-to-use-the-classic-connector.md",
920+
"redirect_url": "/azure/defender-for-cloud/multicloud",
921+
"redirect_document_id": false
922+
},
918923
{
919924
"source_path_from_root": "/articles/defender-for-cloud/how-to-migrate-to-built-in.md",
920925
"redirect_url": "/azure/defender-for-cloud/how-to-transition-to-built-in",

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9194,11 +9194,6 @@
91949194
"redirect_url": "/azure/governance/",
91959195
"redirect_document_id": false
91969196
},
9197-
{
9198-
"source_path_from_root": "/articles/governance/policy/samples/new-zealand-ism.md",
9199-
"redirect_url": "/azure/governance/",
9200-
"redirect_document_id": false
9201-
},
92029197
{
92039198
"source_path_from_root": "/articles/governance/blueprints/samples/azure-security-benchmark/control-mapping.md",
92049199
"redirect_url": "/azure/governance/blueprints/samples/azure-security-benchmark",

CODEOWNERS

Lines changed: 0 additions & 9 deletions
This file was deleted.

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.topic: how-to
1111

12-
ms.date: 01/11/2024
12+
ms.date: 01/26/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -38,6 +38,8 @@ In Azure Active Directory B2C (Azure AD B2C), you can send event data directly t
3838
- Measure performance.
3939
- Create notifications from Application Insights.
4040

41+
[!INCLUDE [active-directory-b2c-limited-to-custom-policy](../../includes/active-directory-b2c-public-preview.md)]
42+
4143
## Overview
4244

4345
To enable custom event logs, add an Application Insights technical profile. In the technical profile, you define the Application Insights instrumentation key, the event name, and the claims to record. To post an event, add the technical profile as an orchestration step in a [user journey](userjourneys.md).
@@ -183,11 +185,13 @@ Open the *TrustFrameworkExtensions.xml* file from the starter pack. Add the tech
183185
184186
## Add the technical profiles as orchestration steps
185187

186-
Add new orchestration steps that refer to the technical profiles.
188+
Add new orchestration steps that refer to the technical profiles.
187189

188190
> [!IMPORTANT]
189191
> After you add the new orchestration steps, renumber the steps sequentially without skipping any integers from 1 to N.
190192
193+
1. Identify the policy file that contains your user journey, such as `SocialAndLocalAccounts/SignUpOrSignin.xml`, then open it.
194+
191195
1. Call `AppInsights-SignInRequest` as the second orchestration step. This step tracks that a sign-up or sign-in request has been received.
192196

193197
```xml
@@ -199,10 +203,12 @@ Add new orchestration steps that refer to the technical profiles.
199203
</OrchestrationStep>
200204
```
201205

202-
1. Before the `SendClaims` orchestration step, add a new step that calls `AppInsights-UserSignup`. It's triggered when the user selects the sign-up button in a sign-up or sign-in journey.
206+
1. Before the `SendClaims` orchestration step, add a new step that calls `AppInsights-UserSignup`. It's triggered when the user selects the sign-up button in a sign-up or sign-in journey. You may need to update the orchestration step, `Order="8"`,to make sure you don't skip any integer from the first to the last orchestration step.
203207

204208
```xml
205-
<!-- Handles the user selecting the sign-up link in the local account sign-in page -->
209+
<!-- Handles the user selecting the sign-up link in the local account sign-in page
210+
The `SendClaims` orchestration step comes after this one,
211+
-->
206212
<OrchestrationStep Order="8" Type="ClaimsExchange">
207213
<Preconditions>
208214
<Precondition Type="ClaimsExist" ExecuteActionsIf="false">
@@ -221,10 +227,12 @@ Add new orchestration steps that refer to the technical profiles.
221227
</OrchestrationStep>
222228
```
223229

224-
1. After the `SendClaims` orchestration step, call `AppInsights-SignInComplete`. This step shows a successfully completed journey.
230+
1. After the `SendClaims` orchestration step, call `AppInsights-SignInComplete`. This step shows a successfully completed journey. You may need to update the orchestration step, `Order="10"`, to make sure you don't skip any integer from the first to the last orchestration step.
225231

226232
```xml
227-
<!-- Track that we have successfully sent a token -->
233+
<!-- Track that we have successfully sent a token
234+
The `SendClaims` orchestration step come before this one,
235+
-->
228236
<OrchestrationStep Order="10" Type="ClaimsExchange">
229237
<ClaimsExchanges>
230238
<ClaimsExchange Id="TrackSignInComplete" TechnicalProfileReferenceId="AppInsights-SignInComplete" />

articles/active-directory-b2c/b2c-global-identity-funnel-based-design.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,15 @@
22
title: Build a global identity solution with funnel-based approach
33
titleSuffix: Azure AD B2C
44
description: Learn the funnel-based design consideration for Azure AD B2C to provide customer identity management for global customers.
5-
65
author: gargi-sinha
76
manager: martinco
8-
97
ms.service: active-directory
10-
118
ms.topic: conceptual
12-
ms.date: 12/15/2022
9+
ms.date: 01/26/2024
1310
ms.author: gasinh
1411
ms.subservice: B2C
12+
13+
#customer intent: I'm a developer, and I need to understand how to build a global identity solution using a funnel-based approach, so I can implement it in my organization's Azure AD B2C environment.
1514
---
1615

1716
# Build a global identity solution with funnel-based approach

articles/active-directory-b2c/b2c-global-identity-proof-of-concept-funnel.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,11 @@ manager: martinco
88
ms.service: active-directory
99

1010
ms.topic: conceptual
11-
ms.date: 12/15/2022
11+
ms.date: 01/26/2024
1212
ms.author: gasinh
1313
ms.subservice: B2C
14+
15+
#customer intent: As a developer, I want to understand how to build a global identity solution using a funnel-based approach, so I can implement it in my organization's Azure AD B2C environment.
1416
---
1517

1618
# Azure Active Directory B2C global identity framework proof of concept for funnel-based configuration

articles/active-directory-b2c/b2c-global-identity-proof-of-concept-regional.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,15 @@
11
---
22
title: Azure Active Directory B2C global identity framework proof of concept for region-based configuration
33
description: Learn how to create a proof of concept regional based approach for Azure AD B2C to provide customer identity and access management for global customers.
4-
54
author: gargi-sinha
65
manager: martinco
7-
86
ms.service: active-directory
9-
107
ms.topic: conceptual
11-
ms.date: 12/15/2022
8+
ms.date: 01/24/2024
129
ms.author: gasinh
1310
ms.subservice: B2C
11+
12+
#customer intent: I'm a developer implementing Azure Active Directory B2C, and I want to configure region-based sign-up, sign-in, and password reset journeys. My goal is for users to be directed to the correct region and their data managed accordingly.
1413
---
1514

1615
# Azure Active Directory B2C global identity framework proof of concept for region-based configuration

articles/active-directory-b2c/b2c-global-identity-region-based-design.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,15 @@
22
title: Build a global identity solution with region-based approach
33
titleSuffix: Azure AD B2C
44
description: Learn the region-based design consideration for Azure AD B2C to provide customer identity management for global customers.
5-
65
author: gargi-sinha
76
manager: martinco
8-
97
ms.service: active-directory
10-
118
ms.topic: conceptual
12-
ms.date: 12/15/2022
9+
ms.date: 01/26/2024
1310
ms.author: gasinh
1411
ms.subservice: B2C
12+
13+
#customer intent: I'm a developer implementing a global identity solution. I need to understand the different scenarios and workflows for region-based design approach in Azure AD B2C. My goal is to design and implement the authentication and sign-up processes effectively for users from different regions.
1514
---
1615

1716
# Build a global identity solution with region-based approach

articles/active-directory-b2c/b2c-global-identity-solutions.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,15 @@
22
title: Azure Active Directory B2C global identity framework
33
titleSuffix: Azure AD B2C
44
description: Learn how to configure Azure AD B2C to provide customer identity and access management for global customers.
5-
65
author: gargi-sinha
76
manager: martinco
8-
97
ms.service: active-directory
10-
118
ms.topic: conceptual
12-
ms.date: 12/15/2022
9+
ms.date: 01/26/2024
1310
ms.author: gasinh
1411
ms.subservice: B2C
12+
13+
#customer intent: I'm a developer building a customer-facing application. I need to understand the different approaches to implement an identity platform using Azure AD B2C tenants for a globally operating business model. I want to make an informed decision about the architecture that best suits my application's requirements.
1514
---
1615

1716
# Azure Active Directory B2C global identity framework

0 commit comments

Comments
 (0)