Skip to content

Commit 5ec15ce

Browse files
authored
Merge pull request #241138 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 6/11
2 parents 135db1e + dfff992 commit 5ec15ce

File tree

126 files changed

+932
-3297
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

126 files changed

+932
-3297
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2515,6 +2515,16 @@
25152515
"redirect_url": "/azure/active-directory/develop/active-directory-authentication-protocols",
25162516
"redirect_document_id": false
25172517
},
2518+
{
2519+
"source_path_from_root": "/articles/active-directory/develop/active-directory-authentication-protocols.md",
2520+
"redirect_url": "/azure/active-directory/develop/authentication-protocols",
2521+
"redirect_document_id": false
2522+
},
2523+
{
2524+
"source_path_from_root": "/articles/active-directory/develop/active-directory-certificate-credentials.md",
2525+
"redirect_url": "/azure/active-directory/develop/certificate-credentials",
2526+
"redirect_document_id": false
2527+
},
25182528
{
25192529
"source_path_from_root": "/articles/active-directory/active-directory-authentication-scenarios.md",
25202530
"redirect_url": "/azure/active-directory/develop/active-directory-authentication-scenarios",
@@ -2734,6 +2744,16 @@
27342744
"redirect_url": "/azure/active-directory/develop/active-directory-saml-protocol-reference",
27352745
"redirect_document_id": false
27362746
},
2747+
{
2748+
"source_path_from_root": "/articles/active-directory/develop/active-directory-saml-protocol-reference.md",
2749+
"redirect_url": "/azure/active-directory/develop/saml-protocol-reference",
2750+
"redirect_document_id": false
2751+
},
2752+
{
2753+
"source_path_from_root": "/articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md",
2754+
"redirect_url": "/azure/active-directory/develop/howto-add-app-roles-in-apps",
2755+
"redirect_document_id": false
2756+
},
27372757
{
27382758
"source_path_from_root": "/articles/active-directory/active-directory-signing-key-rollover.md",
27392759
"redirect_url": "/azure/active-directory/develop/signing-key-rollover",

.openpublishing.redirection.azure-kubernetes-service.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,11 @@
44
"source_path_from_root": "/articles/aks/stop-api-upgrade.md",
55
"redirect_url": "/azure/aks/upgrade-cluster",
66
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/aks/cilium-enterprise-marketplace.md",
10+
"redirect_url": "/azure/aks/azure-cni-powered-by-cilium",
11+
"redirect_document_id": false
712
}
813
]
914
}

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13928,6 +13928,26 @@
1392813928
"redirect_url": "/previous-versions/azure/search/search-how-to-index-power-query-data-sources",
1392913929
"redirect_document_id": false
1393013930
},
13931+
{
13932+
"source_path_from_root": "/articles/search/search-get-started-dotnet.md",
13933+
"redirect_url": "/azure/search/search-get-started-text",
13934+
"redirect_document_id": true
13935+
},
13936+
{
13937+
"source_path_from_root": "/articles/search/search-get-started-python.md",
13938+
"redirect_url": "/azure/search/search-get-started-text",
13939+
"redirect_document_id": false
13940+
},
13941+
{
13942+
"source_path_from_root": "/articles/search/search-get-started-java.md",
13943+
"redirect_url": "/azure/search/search-get-started-text",
13944+
"redirect_document_id": false
13945+
},
13946+
{
13947+
"source_path_from_root": "/articles/search/search-get-started-javascript.md",
13948+
"redirect_url": "/azure/search/search-get-started-text",
13949+
"redirect_document_id": false
13950+
},
1393113951
{
1393213952
"source_path_from_root": "/articles/search/search-performance-optimization.md",
1393313953
"redirect_url": "/azure/search/search-reliability",

articles/active-directory/develop/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -445,7 +445,7 @@
445445
- name: Restrict your app to a set of users
446446
href: howto-restrict-your-app-to-a-set-of-users.md
447447
- name: Add app roles in your application
448-
href: howto-add-app-roles-in-azure-ad-apps.md
448+
href: howto-add-app-roles-in-apps.md
449449
- name: Implement RBAC in your application
450450
href: howto-implement-rbac-for-apps.md
451451
- name: Support FIDO2 authentication
@@ -822,15 +822,15 @@
822822
displayName: App types, OAuth
823823
href: v2-app-types.md
824824
- name: Certificate credentials
825-
href: active-directory-certificate-credentials.md
825+
href: certificate-credentials.md
826826
- name: Signing key rollover
827827
href: signing-key-rollover.md
828828
- name: UserInfo endpoint (OIDC)
829829
href: userinfo.md
830830
- name: SAML 2.0
831831
items:
832832
- name: How Azure AD uses the SAML protocol
833-
href: active-directory-saml-protocol-reference.md
833+
href: saml-protocol-reference.md
834834
- name: SAML single sign-on (SSO)
835835
displayName: SSO
836836
href: single-sign-on-saml-protocol.md

articles/active-directory/develop/active-directory-v2-protocols.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Knowing about OAuth or OpenID Connect (OIDC) at the protocol level isn't require
2222

2323
Four parties are generally involved in an OAuth 2.0 and OpenID Connect authentication and authorization exchange. These exchanges are often called *authentication flows* or *auth flows*.
2424

25-
![Diagram showing the OAuth 2.0 roles](./media/active-directory-v2-flows/protocols-roles.svg)
25+
![Diagram showing the OAuth 2.0 roles](./media/v2-flows/protocols-roles.svg)
2626

2727
* **Authorization server** - The identity platform is the authorization server. Also called an *identity provider* or *IdP*, it securely handles the end-user's information, their access, and the trust relationships between the parties in the auth flow. The authorization server issues the security tokens your apps and APIs use for granting, denying, or revoking access to resources (authorization) after the user has signed in (authenticated).
2828

articles/active-directory/develop/enterprise-app-role-management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Use the following steps to locate the enterprise application:
3737
1. Enter the name of the existing application in the search box, and then select the application from the search results.
3838
1. After the application is selected, copy the object ID from the overview pane.
3939

40-
:::image type="content" source="media/active-directory-enterprise-app-role-management/record-objectid.png" alt-text="Screenshot that shows how to locate and record the object identifier for the application.":::
40+
:::image type="content" source="media/enterprise-app-role-management/record-objectid.png" alt-text="Screenshot that shows how to locate and record the object identifier for the application.":::
4141

4242
## Add roles
4343

@@ -119,7 +119,7 @@ Update the attributes to define the role claim that is included in the token.
119119
1. From the **Source attribute** list, select **user.assignedroles**.
120120
1. Select **Save**. The new **Role Name** attribute should now appear in the **Attributes & Claims** section. The claim should now be included in the access token when signing into the application.
121121

122-
:::image type="content" source="media/active-directory-enterprise-app-role-management/attributes-summary.png" alt-text="Screenshot that shows a display of the list of attributes and claims defined for the application.":::
122+
:::image type="content" source="media/enterprise-app-role-management/attributes-summary.png" alt-text="Screenshot that shows a display of the list of attributes and claims defined for the application.":::
123123

124124
## Assign roles
125125

@@ -131,7 +131,7 @@ After the service principal is patched with more roles, you can assign users to
131131
1. Select **None Selected**, select the role from the list, and then select **Select**.
132132
1. Select **Assign** to assign the role to the user.
133133

134-
:::image type="content" source="media/active-directory-enterprise-app-role-management/assign-role.png" alt-text="Screenshot that shows how to assign a role to a user of an application.":::
134+
:::image type="content" source="media/enterprise-app-role-management/assign-role.png" alt-text="Screenshot that shows how to assign a role to a user of an application.":::
135135

136136
## Update roles
137137

articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md renamed to articles/active-directory/develop/howto-add-app-roles-in-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,11 +43,11 @@ To create an app role by using the Azure portal's user interface:
4343
1. Under **Manage**, select **App registrations**, and then select the application you want to define app roles in.
4444
1. Select **App roles**, and then select **Create app role**.
4545

46-
:::image type="content" source="media/howto-add-app-roles-in-azure-ad-apps/app-roles-overview-pane.png" alt-text="An app registration's app roles pane in the Azure portal":::
46+
:::image type="content" source="media/howto-add-app-roles-in-apps/app-roles-overview-pane.png" alt-text="An app registration's app roles pane in the Azure portal":::
4747

4848
1. In the **Create app role** pane, enter the settings for the role. The table following the image describes each setting and their parameters.
4949

50-
:::image type="content" source="media/howto-add-app-roles-in-azure-ad-apps/app-roles-create-context-pane.png" alt-text="An app registration's app roles create context pane in the Azure portal":::
50+
:::image type="content" source="media/howto-add-app-roles-in-apps/app-roles-create-context-pane.png" alt-text="An app registration's app roles create context pane in the Azure portal":::
5151

5252
| Field | Description | Example |
5353
| ---------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------- |

articles/active-directory/develop/howto-convert-app-to-be-multi-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ To learn more about making API calls to Azure AD and Microsoft 365 services like
183183
[MSFT-Graph-permission-scopes]: /graph/permissions-reference
184184

185185
<!--Image references-->
186-
[AAD-Sign-In]: ./media/active-directory-devhowto-multi-tenant-overview/sign-in-with-microsoft-light.png
186+
[AAD-Sign-In]: ./media/devhowto-multi-tenant-overview/sign-in-with-microsoft-light.png
187187
[Consent-Single-Tier]: ./media/howto-convert-app-to-be-multi-tenant/consent-flow-single-tier.svg
188188
[Consent-Multi-Tier-Known-Client]: ./media/howto-convert-app-to-be-multi-tenant/consent-flow-multi-tier-known-clients.svg
189189
[Consent-Multi-Tier-Multi-Party]: ./media/howto-convert-app-to-be-multi-tenant/consent-flow-multi-tier-multi-party.svg

0 commit comments

Comments
 (0)