Skip to content

Commit 5ced56e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into fwlog
2 parents c21cc5a + e39f831 commit 5ced56e

File tree

1,496 files changed

+34834
-11090
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,496 files changed

+34834
-11090
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -950,6 +950,7 @@
950950
"articles/iot-accelerators/.openpublishing.redirection.iot-accelerators.json",
951951
"articles/iot-develop/.openpublishing.redirection.iot-develop.json",
952952
"articles/iot-edge/.openpublishing.redirection.iot-edge.json",
953+
"articles/iot-fundamentals/.openpublishing.redirection.iot-fundamentals.json",
953954
"articles/mariadb/.openpublishing.redirection.mariadb.json",
954955
"articles/marketplace/.openpublishing.redirection.marketplace.json",
955956
"articles/mysql/.openpublishing.redirection.mysql.json",
@@ -977,6 +978,7 @@
977978
"articles/cognitive-services/.openpublishing.redirection.cognitive-services.json",
978979
".openpublishing.redirection.baremetal-infrastructure.json",
979980
"articles/iot-dps/.openpublishing.redirection.iot-dps.json",
980-
"articles/cloud-shell/.openpublishing.redirection.cloud-shell.json"
981+
"articles/cloud-shell/.openpublishing.redirection.cloud-shell.json",
982+
".openpublishing.redirection.azure-vmware.json"
981983
]
982984
}

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,11 @@
4545
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
4646
"redirect_document_id": false
4747
},
48+
{
49+
"source_path_from_root": "/articles/active-directory/saas-apps/iauditor-tutorial.md",
50+
"redirect_url": "/azure/active-directory/saas-apps/safety-culture-tutorial",
51+
"redirect_document_id": false
52+
},
4853
{
4954
"source_path_from_root": "/articles/active-directory/saas-apps/icertisicm-tutorial.md",
5055
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",

.openpublishing.redirection.azure-monitor.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5541,6 +5541,46 @@
55415541
"source_path_from_root": "/articles/azure-monitor/logs/api/authentication-authorization.md",
55425542
"redirect_url": "/azure/azure-monitor/logs/api/access-api",
55435543
"redirect_document_id": false
5544+
},
5545+
{
5546+
"source_path_from_root": "/articles/azure-monitor/app/java-2x-get-started.md",
5547+
"redirect_url": "/azure/azure-monitor/app/deprecated-java-2x",
5548+
"redirect_document_id": false
5549+
},
5550+
{
5551+
"source_path_from_root": "/articles/azure-monitor/app/java-2x-trace-logs.md",
5552+
"redirect_url": "/azure/azure-monitor/app/deprecated-java-2x",
5553+
"redirect_document_id": false
5554+
},
5555+
{
5556+
"source_path_from_root": "/articles/azure-monitor/app/java-2x-agent.md",
5557+
"redirect_url": "/azure/azure-monitor/app/deprecated-java-2x",
5558+
"redirect_document_id": false
5559+
},
5560+
{
5561+
"source_path_from_root": "/articles/azure-monitor/app/java-2x-filter-telemetry.md",
5562+
"redirect_url": "/azure/azure-monitor/app/deprecated-java-2x",
5563+
"redirect_document_id": false
5564+
},
5565+
{
5566+
"source_path_from_root": "/articles/azure-monitor/app/java-2x-collectd.md",
5567+
"redirect_url": "/azure/azure-monitor/app/deprecated-java-2x",
5568+
"redirect_document_id": false
5569+
},
5570+
{
5571+
"source_path_from_root": "/articles/azure-monitor/app/java-2x-micrometer.md",
5572+
"redirect_url": "/azure/azure-monitor/app/deprecated-java-2x",
5573+
"redirect_document_id": false
5574+
},
5575+
{
5576+
"source_path_from_root": "/articles/azure-monitor/vm/tutorial-monitor-vm-alert.md",
5577+
"redirect_url": "/azure/azure-monitor/vm/tutorial-monitor-vm-alert-availability",
5578+
"redirect_document_id": false
5579+
},
5580+
{
5581+
"source_path_from_root": "/articles/azure-monitor/vm/tutorial-monitor-vm-enable.md",
5582+
"redirect_url": "/azure/azure-monitor/vm/tutorial-monitor-vm-enable-insights",
5583+
"redirect_document_id": false
55445584
}
55455585
]
55465586
}
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/azure-vmware/send-logs-to-log-analytics.md",
5+
"redirect_url": "/azure/azure-vmware/configure-vmware-syslogs",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -764,6 +764,11 @@
764764
"source_path_from_root": "/articles/defender-for-cloud/plan-multicloud-security-other-resources.md",
765765
"redirect_url": "/azure/defender-for-cloud/multicloud",
766766
"redirect_document_id": true
767+
},
768+
{
769+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-servers-introduction.md",
770+
"redirect_url": "/azure/defender-for-cloud/plan-defender-for-servers",
771+
"redirect_document_id": true
767772
}
768773
]
769774
}

.openpublishing.redirection.healthcare-apis.json

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -194,8 +194,8 @@
194194
},
195195
{
196196
"source_path_from_root": "/articles/healthcare-apis/use-smart-on-fhir-proxy.md",
197-
"redirect_url": "/azure/healthcare-apis/fhir/use-smart-on-fhir-proxy",
198-
"redirect_document_id": true
197+
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/smart-on-fhir",
198+
"redirect_document_id": false
199199
},
200200
{
201201
"source_path_from_root": "/articles/healthcare-apis/fhir/use-custom-headers.md",
@@ -357,11 +357,6 @@
357357
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/tutorial-web-app-write-web-app",
358358
"redirect_document_id": true
359359
},
360-
{
361-
"source_path_from_root": "/articles/healthcare-apis/fhir/use-smart-on-fhir-proxy.md",
362-
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/use-smart-on-fhir-proxy",
363-
"redirect_document_id": true
364-
},
365360
{
366361
"source_path_from_root": "/articles/healthcare-apis/data-transformation/de-identified-export.md",
367362
"redirect_url": "/azure/healthcare-apis/fhir/de-identified-export",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/storage/queues/storage-quickstart-queues-dotnet-legacy.md",
5+
"redirect_url": "/azure/storage/queues/storage-quickstart-queues-dotnet",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/sentinel/iot-solution.md",
510
"redirect_url": "/azure/defender-for-iot/organizations/iot-solution",

articles/active-directory-b2c/TOC.yml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,6 @@
99
- name: Technical overview
1010
href: technical-overview.md
1111
displayName: Azure AD B2C architecture, SLA, Azure AD B2C high availability, Azure AD B2C SLA, HA
12-
# Add learn module
13-
- name: 'Authenticate users: NodeJs quick course'
14-
href: /learn/modules/authenticate-users-node-web-app-use-azure-active-directory-b2c/
1512
- name: What's new in docs?
1613
href: whats-new-docs.md
1714
# Node Quickstarts

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/07/2022
13-
ms.custom: project-no-code
12+
ms.date: 10/25/2022
13+
ms.custom: project-no-code, engagement-fy23
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
1616
zone_pivot_groups: b2c-policy-type
@@ -28,13 +28,19 @@ The password reset flow involves the following steps:
2828
1. In the next dialog that appears, the user enters their email address, and then selects **Send verification code**. Azure AD B2C sends a verification code to the user's email account. The user copies the verification code from the email, enters the code in the Azure AD B2C password reset dialog, and then selects **Verify code**.
2929
1. The user can then enter a new password. (After the email is verified, the user can still select the **Change e-mail** button; see [Hide the change email button](#hide-the-change-email-button).)
3030

31-
![Diagram that shows three dialogs in the password reset flow.](./media/add-password-reset-policy/password-reset-flow.png)
31+
:::image type="content" source="./media/add-password-reset-policy/password-reset-flow.png" alt-text="Diagram that shows three dialogs in the password reset flow." lightbox="./media/add-password-reset-policy/password-reset-flow.png":::
3232

3333
> [!TIP]
34-
> A user can change their password by using the self-service password reset flow if they forget their password and want to reset it. Choose one of these user flow options:
34+
> A user can change their password by using the self-service password reset flow if they forget their password and want to reset it. You can also choose one of the following user flow options:
3535
> - If a user knows their password and wants to change it, use a [password change flow](add-password-change-policy.md).
3636
> - If you want to force a user to reset their password (for example, when they sign in for the first time, when their passwords have been reset by an admin, or after they've been migrated to Azure AD B2C with random passwords), use a [force password reset](force-password-reset.md) flow.
3737
38+
The default name of the **Change email** button in *selfAsserted.html* is **changeclaims**. To find the button name, on the sign-up page, inspect the page source by using a browser tool such as _Inspect_.
39+
40+
## Prerequisites
41+
42+
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
43+
3844
### Hide the change email button
3945

4046
After the email is verified, the user can still select **Change email**, enter another email address, and then repeat email verification. If you'd prefer to hide the **Change email** button, you can modify the CSS to hide the associated HTML elements in the dialog. For example, you can add the following CSS entry to selfAsserted.html and [customize the user interface by using HTML templates](customize-ui-with-html.md):
@@ -48,12 +54,6 @@ After the email is verified, the user can still select **Change email**, enter a
4854
</style>
4955
```
5056

51-
The default name of the **Change email** button in *selfAsserted.html* is **changeclaims**. To find the button name, on the sign-up page, inspect the page source by using a browser tool like Inspect.
52-
53-
## Prerequisites
54-
55-
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
56-
5757
## Self-service password reset (recommended)
5858

5959
The new password reset experience is now part of the sign-up or sign-in policy. When the user selects the **Forgot your password?** link, they are immediately sent to the Forgot Password experience. Your application no longer needs to handle the [AADB2C90118 error code](#password-reset-policy-legacy), and you don't need a separate policy for password reset.
@@ -204,7 +204,7 @@ The sub journey is called from the user journey and performs the specific steps
204204

205205
### Prepare your user journey
206206

207-
Next, connect the **Forgot your password?** link to the Forgot Password sub journey. Reference the Forgot Password sub journey ID in the **ClaimsProviderSelection** element of the **CombinedSignInAndSignUp** step.
207+
Next, to connect the **Forgot your password?** link to the **Forgot Password** sub journey you will need to reference the **Forgot Password** sub journey ID in the **ClaimsProviderSelection** element of the **CombinedSignInAndSignUp** step.
208208

209209
If you don't have your own custom user journey that has a **CombinedSignInAndSignUp** step, complete the following steps to duplicate an existing sign-up or sign-in user journey. Otherwise, continue to the next section.
210210

@@ -287,9 +287,10 @@ Your application might need to detect whether the user signed in by using the Fo
287287
1. In the **Portal settings | Directories + subscriptions** pane, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
288288
1. In the Azure portal, search for and select **Azure AD B2C**.
289289
1. In the menu under **Policies**, select **Identity Experience Framework**.
290-
1. Select **Upload custom policy**. In the following order, upload the two policy files that you changed:
291-
1. The extension policy, for example, *SocialAndLocalAccounts/TrustFrameworkExtensions.xml*.
292-
1. The relying party policy, for example, *SocialAndLocalAccounts/SignUpOrSignin.xml*.
290+
1. Select **Upload custom policy**. In the following order, upload the policy files that you changed:
291+
1. The base file of your policy, for example *TrustFrameworkBase.xml*.
292+
1. The extension policy, for example, *TrustFrameworkExtensions.xml*.
293+
1. The relying party policy, for example, *SignUpSignIn.xml*.
293294

294295
::: zone-end
295296

@@ -341,8 +342,8 @@ To let your application users reset their passwords, create a password reset use
341342
To test the user flow:
342343

343344
1. Select the user flow you created. On the user flow overview page, select **Run user flow**.
344-
1. For **Application**, select the web application named *webapp1* that you registered earlier. The **Reply URL** should be `https://jwt.ms`.
345-
1. Select **Run user flow**, verify the email address of the account you created earlier, and then select **Continue**.
345+
1. For **Application**, select the web application you wish to test, such as the one named *webapp1* if you registered that earlier. The **Reply URL** should be `https://jwt.ms`.
346+
1. Select **Run user flow**, verify the email address of the account that you want to reset the password for, and then select **Continue**.
346347
1. Change the password, and then select **Continue**. The token is returned to `https://jwt.ms` and the browser displays it.
347348

348349
::: zone-end

articles/active-directory-b2c/configure-authentication-sample-web-app.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,7 @@ To create the web app registration, use the following steps:
7575
1. Under **Name**, enter a name for the application (for example, *webapp1*).
7676
1. Under **Supported account types**, select **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**.
7777
1. Under **Redirect URI**, select **Web** and then, in the URL box, enter `https://localhost:44316/signin-oidc`.
78+
1. Under **Implicit grant and hybrid flows**, select the **ID tokens (used for implicit and hybrid flows)** checkbox.
7879
1. Under **Permissions**, select the **Grant admin consent to openid and offline access permissions** checkbox.
7980
1. Select **Register**.
8081
1. Select **Overview**.

0 commit comments

Comments
 (0)