Skip to content

Commit 5d49df7

Browse files
committed
resolving toc merge conflict
2 parents d472359 + 88b1004 commit 5d49df7

File tree

3,750 files changed

+54148
-33587
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,750 files changed

+54148
-33587
lines changed

.openpublishing.publish.config.json

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -528,7 +528,7 @@
528528
{
529529
"path_to_root": "azure-sdk-for-go-samples",
530530
"url": "https://github.com/Azure-Samples/azure-sdk-for-go-samples",
531-
"branch": "master",
531+
"branch": "main",
532532
"branch_mapping": {}
533533
},
534534
{
@@ -830,6 +830,30 @@
830830
"url": "https://github.com/Azure-Samples/msdocs-nodejs-mongodb-azure-sample-app",
831831
"branch": "main",
832832
"branch_mapping": {}
833+
},
834+
{
835+
"path_to_root": "msdocs-django-postgresql-sample-app",
836+
"url": "https://github.com/Azure-Samples/msdocs-django-postgresql-sample-app",
837+
"branch": "main",
838+
"branch_mapping": {}
839+
},
840+
{
841+
"path_to_root": "msdocs-flask-postgresql-sample-app",
842+
"url": "https://github.com/Azure-Samples/msdocs-flask-postgresql-sample-app",
843+
"branch": "main",
844+
"branch_mapping": {}
845+
},
846+
{
847+
"path_to_root": "azure-signalr-samples",
848+
"url": "https://github.com/aspnet/AzureSignalR-samples",
849+
"branch": "main",
850+
"branch_mapping": {}
851+
},
852+
{
853+
"path_to_root": "azure-webpubsub-samples",
854+
"url": "https://github.com/Azure/azure-webpubsub",
855+
"branch": "main",
856+
"branch_mapping": {}
833857
}
834858
],
835859
"branch_target_mapping": {

.openpublishing.redirection.active-directory.json

Lines changed: 10778 additions & 10775 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@
6262
},
6363
{
6464
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds.md",
65-
"redirect_url": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
65+
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
6666
"redirect_document_id": false
6767
},
6868
{

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14968,6 +14968,11 @@
1496814968
"redirect_url": "/azure/defender-for-iot/organizations/tutorial-qradar",
1496914969
"redirect_document_id": false
1497014970
},
14971+
{
14972+
"source_path_from_root": "/articles/iot-edge/how-to-devops-starter.md",
14973+
"redirect_url": "/azure/iot-edge/how-to-continuous-integration-continuous-deployment-classic/",
14974+
"redirect_document_id": false
14975+
},
1497114976
{
1497214977
"source_path_from_root": "/articles/ansible/index.yml",
1497314978
"redirect_url": "/azure/developer/ansible/",
@@ -25208,6 +25213,11 @@
2520825213
"redirect_url": "/azure/azure-sql/managed-instance/scripts/create-configure-managed-instance-cli",
2520925214
"redirect_document_id": false
2521025215
},
25216+
{
25217+
"source_path_from_root": "/articles/azure-sql/managed-instance/azure-app-sync-network-configuration.md",
25218+
"redirect_url": "/azure/azure-sql/managed-instance/",
25219+
"redirect_document_id": false
25220+
},
2521125221
{
2521225222
"source_path_from_root": "/articles/sql-database/scripts/sql-database-copy-database-to-new-server-cli.md",
2521325223
"redirect_url": "/azure/azure-sql/database/scripts/copy-database-to-new-server-cli",
@@ -26203,6 +26213,11 @@
2620326213
"redirect_url": "/azure/vs-azure-tools-storage-explorer-files",
2620426214
"redirect_document_id": false
2620526215
},
26216+
{
26217+
"source_path_from_root": "/articles/storage/files/storage-files-how-to-create-nfs-shares.md",
26218+
"redirect_url": "/azure/storage/files/storage-files-quick-create-use-linux",
26219+
"redirect_document_id": false
26220+
},
2620626221
{
2620726222
"source_path_from_root": "/articles/storage/files/storage-how-to-use-files-powershell.md",
2620826223
"redirect_url": "/azure/storage/files/storage-how-to-use-files-portal",

appgw-waf-metrics-1-expanded.png

108 KB
Loading

appgw-waf-metrics-2-expanded.png

93.5 KB
Loading

appgw-waf-metrics-2.png

55.6 KB
Loading

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/03/2022
11+
ms.date: 03/31/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -49,7 +49,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
4949
&response_type=code
5050
&redirect_uri=urn%3Aietf%3Awg%3Aoauth%3A2.0%3Aoob
5151
&response_mode=query
52-
&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6%20offline_access
52+
&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6%20offline_access%20https://{tenant-name}/{app-id-uri}/{scope}
5353
&state=arbitrary_data_you_can_receive_in_the_response
5454
&code_challenge=YTFjNjI1OWYzMzA3MTI4ZDY2Njg5M2RkNmVjNDE5YmEyZGRhOGYyM2IzNjdmZWFhMTQ1ODg3NDcxY2Nl
5555
&code_challenge_method=S256

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/03/2022
11+
ms.date: 03/31/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -114,12 +114,12 @@ Open your web app in a code editor such as Visual Studio Code. Under the project
114114
|---------|---------|
115115
|`APP_CLIENT_ID`|The **Application (client) ID** for the web app you registered in [step 2.1](#step-2-register-a-web-application). |
116116
|`APP_CLIENT_SECRET`|The client secret for the web app you created in [step 2.2](#step-22-create-a-web-app-client-secret) |
117-
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi_node_app`. Learn how to [Get your tenant name](tenant-management.md#get-your-tenant-name). |
117+
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`. Learn how to [Get your tenant name](tenant-management.md#get-your-tenant-name). |
118118
|`RESET_PASSWORD_POLICY_AUTHORITY`| The **Reset password** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<reset-password-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<reset-password-user-flow-name>` with the name of your Reset password user flow such as `B2C_1_reset_password_node_app`.|
119119
|`EDIT_PROFILE_POLICY_AUTHORITY`|The **Profile editing** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<profile-edit-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<reset-password-user-flow-name>` with the name of your reset password user flow such as `B2C_1_edit_profile_node_app`. |
120120
|`AUTHORITY_DOMAIN`| The Azure AD B2C authority domain such as `https://<your-tenant-name>.b2clogin.com`. Replace `<your-tenant-name>` with the name of your tenant.|
121121
|`APP_REDIRECT_URI`| The application redirect URI where Azure AD B2C will return authentication responses (tokens). It matches the **Redirect URI** you set while registering your app in Azure portal, and it must be publicly accessible. Leave the value as is.|
122-
|`LOGOUT_ENDPOINT`| The Azure AD B2C sign out endpoint such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>/oauth2/v2.0/logout?post_logout_redirect_uri=http://localhost:3000`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi_node_app`.|
122+
|`LOGOUT_ENDPOINT`| The Azure AD B2C sign out endpoint such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>/oauth2/v2.0/logout?post_logout_redirect_uri=http://localhost:3000`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`.|
123123

124124
Your final configuration file should look like the following sample:
125125

@@ -142,7 +142,7 @@ You can now test the sample app. You need to start the Node server and access it
142142

143143
### Test sign in
144144

145-
1. After the page with the **Sign in** button finishes loading, select **Sign in**. You're prompted to sign in.
145+
1. After the page with the **Sign in** button completes loading, select **Sign in**. You're prompted to sign in.
146146
1. Enter your sign-in credentials, such as email address and password. If you don't have an account, select **Sign up now** to create an account. After you successfully sign in or sign up, you should see the following page that shows sign-in status.
147147

148148
:::image type="content" source="./media/configure-a-sample-node-web-app/tutorial-dashboard-page.png" alt-text="Screenshot shows web app sign-in status.":::

articles/active-directory-b2c/configure-authentication-sample-web-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 09/15/2021
10+
ms.date: 03/11/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -134,13 +134,13 @@ Your final configuration file should look like the following JSON:
134134
1. Go to `https://localhost:44316`.
135135
1. Select **Sign Up/In**.
136136

137-
![Screenshot of the "Sign Up/In" button on the project Welcome page.](./media/configure-authentication-sample-web-app/web-app-sign-in.png)
137+
:::image type="content" source="./media/configure-authentication-sample-web-app/web-app-sign-in.png" alt-text="Screenshot of the sign in and sign up button on the project Welcome page.":::
138138

139139
1. Complete the sign-up or sign-in process.
140140

141141
After successful authentication, you'll see your display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, select **Claims**.
142142

143-
![Screenshot of the web app token claims.](./media/configure-authentication-sample-web-app/web-app-token-claims.png)
143+
:::image type="content" source="./media/configure-authentication-sample-web-app/web-app-token-claims.png" alt-text="Screenshot of the web app token claims.":::
144144

145145
## Deploy your application
146146

0 commit comments

Comments
 (0)