Skip to content

Commit 5f70236

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into wi237040-change-in-assessment
2 parents bb5a1fd + b9dfea7 commit 5f70236

File tree

5,492 files changed

+44905
-37650
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

5,492 files changed

+44905
-37650
lines changed
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
name: "📄 Azure Kubernetes Services - Feedback control template"
2+
title: "Feedback"
3+
description: >-
4+
🛈 FYI - This issue template is intended for use by the feedback control on the bottom of Azure Kubernetes Services pages on the
5+
https://learn.microsoft.com/azure/aks site.
6+
labels:
7+
- "azure-kubernetes-services/svc"
8+
body:
9+
- type: markdown
10+
attributes:
11+
value: "## Enter your feedback"
12+
- type: markdown
13+
attributes:
14+
value: Select the issue type, and describe the issue in the text box below. Add as much detail as needed to help us resolve the issue.
15+
- type: dropdown
16+
id: issue-type
17+
attributes:
18+
label: Type of issue
19+
options:
20+
- Typo
21+
- Code doesn't work
22+
- Missing information
23+
- Outdated article
24+
- Other (describe below)
25+
validations:
26+
required: true
27+
- type: textarea
28+
id: userfeedback
29+
validations:
30+
required: true
31+
attributes:
32+
label: Feedback
33+
description: >-
34+
If possible, please provide extended details that will add context and help the team update
35+
the documentation. Additional details may not be useful for typos, grammar, formatting, etc.
36+
For technical or factual errors, please include code snippets and output to show how the
37+
documentation is incorrect.
38+
- type: markdown
39+
attributes:
40+
value: "## 🚧 Article information 🚧"
41+
- type: markdown
42+
attributes:
43+
value: "*Don't modify the following fields*. They are automatically filled in for you. Doing so will disconnect your issue from the affected article. *Don't edit them*."
44+
- type: input
45+
id: pageUrl
46+
validations:
47+
required: true
48+
attributes:
49+
label: Page URL
50+
- type: input
51+
id: contentSourceUrl
52+
validations:
53+
required: true
54+
attributes:
55+
label: Content source URL
56+
- type: input
57+
id: author
58+
validations:
59+
required: true
60+
attributes:
61+
label: Author
62+
description: GitHub Id of the author
63+
- type: input
64+
id: documentVersionIndependentId
65+
validations:
66+
required: true
67+
attributes:
68+
label: Document Id
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/azure-arc/system-center-virtual-machine-manager/enable-group-management.md",
5+
"redirect_url": "enable-guest-management-at-scale",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,16 @@
1010
"redirect_url": "/azure/azure-monitor/vm/scom-managed-instance-overview",
1111
"redirect_document_id": false
1212
},
13+
{
14+
"source_path_from_root": "/articles/azure-monitor/scom-manage-instance/common-questions.md",
15+
"redirect_url": "/azure/azure-monitor/scom-manage-instance/scom-managed-instance-faq",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/azure-monitor/vm/scom-managed-instance-overview.md",
20+
"redirect_url": "/azure/azure-monitor/scom-manage-instance/overview",
21+
"redirect_document_id": false
22+
},
1323
{
1424
"source_path_from_root": "/articles/azure-monitor/best-practices.md",
1525
"redirect_url": "/azure/azure-monitor/getting-started",
@@ -6733,9 +6743,11 @@
67336743
"source_path_from_root": "/articles/azure-monitor/essentials/pipeline-overview.md",
67346744
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-overview",
67356745
"redirect_document_id": false
6736-
}
6737-
6738-
6739-
6746+
},
6747+
{
6748+
"source_path_from_root": "/articles/azure-monitor/agents/azure-monitor-agent-migration-tools.md",
6749+
"redirect_url": "/azure/azure-monitor/agents/azure-monitor-agent-migration",
6750+
"redirect_document_id": false
6751+
}
67406752
]
67416753
}

.openpublishing.redirection.json

Lines changed: 56 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/firewall-manager/multiple-public-ip-powershell.md",
5+
"redirect_url": "/previous-versions/azure/firewall-manager/multiple-public-ip-powershell",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/application-gateway/scripts/create-vmss-waf-cli.md",
510
"redirect_url": "/previous-versions/azure/application-gateway/scripts/create-vmss-waf-cli",
@@ -265,6 +270,26 @@
265270
"redirect_url": "/azure/advisor/advisor-alerts-portal",
266271
"redirect_document_id": false
267272
},
273+
{
274+
"source_path_from_root": "/articles/advisor/advisor-operational-excellence-recommendations.md",
275+
"redirect_url": "/azure/advisor/advisor-reference-operational-excellence-recommendations",
276+
"redirect_document_id": false
277+
},
278+
{
279+
"source_path_from_root": "/articles/advisor/advisor-performance-recommendations.md",
280+
"redirect_url": "/azure/advisor/advisor-reference-performance-recommendations",
281+
"redirect_document_id": false
282+
},
283+
{
284+
"source_path_from_root": "/articles/advisor/advisor-cost-recommendations.md",
285+
"redirect_url": "/azure/advisor/advisor-reference-cost-recommendations",
286+
"redirect_document_id": false
287+
},
288+
{
289+
"source_path_from_root": "/articles/advisor/advisor-high-availability-recommendations.md",
290+
"redirect_url": "/azure/advisor/advisor-reference-reliability-recommendations",
291+
"redirect_document_id": false
292+
},
268293
{
269294
"source_path_from_root": "/articles/network-functions-manager/index.yml",
270295
"redirect_url": "/azure/network-function-manager",
@@ -1135,6 +1160,11 @@
11351160
"redirect_url": "/azure/container-instances/container-instances-multi-container-group",
11361161
"redirect_document_id": false
11371162
},
1163+
{
1164+
"source_path_from_root": "/articles/container-instances/container-instances-monitor.md",
1165+
"redirect_url": "/azure/container-instances/monitor-azure-container-instances",
1166+
"redirect_document_id": false
1167+
},
11381168
{
11391169
"source_path_from_root": "/articles/cassandra-managed-instance/compare-cosmosdb-managed-instance.md",
11401170
"redirect_url": "/azure/managed-instance-apache-cassandra/compare-cosmosdb-managed-instance",
@@ -3043,6 +3073,11 @@
30433073
"redirect_url": "/sql/sql-server/stretch-database/stretch-database-databases-and-tables-stretch-database-advisor",
30443074
"redirect_document_id": false
30453075
},
3076+
{
3077+
"source_path_from_root": "/articles/dms/tutorial-azure-postgresql-to-azure-postgresql-online-portal.md",
3078+
"redirect_url": "/azure/postgresql/migrate/migration-service/tutorial-migration-service-single-to-flexible",
3079+
"redirect_document_id": false
3080+
},
30463081
{
30473082
"source_path_from_root": "/articles/vs-azure-tools-access-private-azure-clouds-with-visual-studio.md",
30483083
"redirect_url": "/visualstudio/azure/vs-azure-tools-access-private-azure-clouds-with-visual-studio",
@@ -4089,7 +4124,27 @@
40894124
"redirect_document_id": false
40904125
},
40914126
{
4092-
"source_path_from_root": "/articles/data-factory/continuous-integration-delivery-automate-github-actions.md",
4127+
"source_path_from_root": "/articles/openshift/tutorial-create-cluster.md",
4128+
"redirect_url": "/azure/openshift/create-cluster",
4129+
"redirect_document_id": false
4130+
},
4131+
{
4132+
"source_path_from_root": "/articles/openshift/tutorial-connect-cluster.md",
4133+
"redirect_url": "/azure/openshift/connect-cluster",
4134+
"redirect_document_id": false
4135+
},
4136+
{
4137+
"source_path_from_root": "/articles/openshift/tutorial-delete-cluster.md",
4138+
"redirect_url": "/azure/openshift/delete-cluster",
4139+
"redirect_document_id": false
4140+
},
4141+
{
4142+
"source_path_from_root": "/articles/openshift/quickstart-portal.md",
4143+
"redirect_url": "/azure/openshift/create-cluster",
4144+
"redirect_document_id": false
4145+
},
4146+
{
4147+
"source_path_from_root": "/articles/data-factory/continuous-integration-delivery-automate-github-actions.md",
40934148
"redirect_url": "/azure",
40944149
"redirect_document_id": false
40954150
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -424,6 +424,11 @@
424424
"source_path_from_root": "/articles/virtual-desktop/fslogix-containers-azure-files.md",
425425
"redirect_url": "/azure/virtual-desktop/fslogix-profile-containers",
426426
"redirect_document_id": true
427+
},
428+
{
429+
"source_path_from_root": "/articles/virtual-desktop/host-pool-load-balancing.md",
430+
"redirect_url": "/azure/virtual-desktop/configure-host-pool-load-balancing",
431+
"redirect_document_id": false
427432
}
428433
]
429434
}

articles/active-directory-b2c/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -824,8 +824,6 @@
824824
href: user-flow-versions-legacy.md
825825
- name: Resources
826826
items:
827-
- name: Azure Roadmap
828-
href: https://azure.microsoft.com/updates/?status=nowavailable,inpreview,indevelopment&category=identity,security&query=b2c
829827
- name: Frequently asked questions
830828
href: ./faq.yml
831829
displayName: FAQ

articles/active-directory-b2c/enable-authentication-spa-app.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -105,12 +105,6 @@ The resources referenced by the *index.html* file are detailed in the following
105105
|---|---|
106106
|MSAL.js library| MSAL.js authentication JavaScript library [CDN path](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/cdn-usage.md).|
107107
|[Bootstrap stylesheet](https://getbootstrap.com/) | A free front-end framework for faster and easier web development. The framework includes HTML-based and CSS-based design templates. |
108-
|[`policies.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/policies.js) | Contains the Azure AD B2C custom policies and user flows. |
109-
|[`authConfig.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/authConfig.js) | Contains authentication configuration parameters.|
110-
|[`authRedirect.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/authRedirect.js) | Contains the authentication logic. |
111-
|[`apiConfig.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/apiConfig.js) | Contains web API scopes and the API endpoint location. |
112-
|[`api.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/api.js) | Defines the method to use to call your API and handle its response.|
113-
|[`ui.js`](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa/blob/main/App/ui.js) | Controls the UI elements. |
114108
| | |
115109

116110
To render the SPA index file, in the *myApp* folder, create a file named *index.html*, which contains the following HTML snippet:

articles/active-directory-b2c/identity-provider-wechat.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,18 +25,21 @@ zone_pivot_groups: b2c-policy-type
2525
## Prerequisites
2626

2727
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
28+
* Get an approved Weixin Open Platform account at [https://kf.qq.com](https://kf.qq.com/faq/161220Brem2Q161220uUjERB.html).
29+
* Get an approved application on Weixin Open Platform.
2830

2931
## Create a WeChat application
3032

31-
To enable sign-in for users with a WeChat account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in [WeChat management center](https://open.weixin.qq.com/). If you don't already have a WeChat account, you can get information at [https://kf.qq.com](https://kf.qq.com/faq/161220Brem2Q161220uUjERB.html).
33+
To enable sign-in for users with a WeChat account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in [WeChat management center](https://open.weixin.qq.com/). If you don't already have a Weixin Open Platform account, you can get information at [https://kf.qq.com](https://kf.qq.com/faq/161220Brem2Q161220uUjERB.html). The Weixin Open Platform account and application must be approved to link WeChat as an identity provider to your user flow.
3234

3335
### Register a WeChat application
3436

3537
1. Sign in to [https://open.weixin.qq.com/](https://open.weixin.qq.com/) with your WeChat credentials.
3638
1. Select **管理中心** (management center).
3739
1. Follow the steps to register a new application.
38-
1. For the **授权回调域** (callback URL), enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
39-
1. Copy the **APP ID** and **APP KEY**. You need both of them to configure the identity provider to your tenant.
40+
1. In the **Development information** section, set the "Authorization callback domain" to `your-tenant-name.b2clogin.com`.
41+
1. Ensure that the application status is "Approved".
42+
1. At the top of **Application details**, copy the **APP ID** and **APP KEY**. You need both of them to configure the identity provider to your tenant.
4043

4144
::: zone pivot="b2c-user-flow"
4245

@@ -51,12 +54,17 @@ To enable sign-in for users with a WeChat account in Azure Active Directory B2C
5154
1. For the **Client secret**, enter the APP KEY that you recorded.
5255
1. Select **Save**.
5356

57+
:::image type="content" source="media/identity-provider-azure-ad-b2c/wechat-client-configuration.png" alt-text="Screenshot that shows the Configure social identity provider window, with completed form fields for social identity provider name, WeChat client ID, and app secret." lightbox="media/identity-provider-azure-ad-b2c/wechat-client-configuration.png":::
58+
5459
## Add WeChat identity provider to a user flow
5560

5661
1. In your Azure AD B2C tenant, select **User flows**.
5762
1. Click the user flow that you want to add the WeChat identity provider.
5863
1. Under the **Social identity providers**, select **WeChat**.
5964
1. Select **Save**.
65+
66+
:::image type="content" source="media/identity-provider-azure-ad-b2c/link-wechat-identity-provider.png" alt-text="Screenshot showing WeChat as a selected identity provider in the Identity Providers section." lightbox="media/identity-provider-azure-ad-b2c/link-wechat-identity-provider.png":::
67+
6068
1. To test your policy, select **Run user flow**.
6169
1. For **Application**, select the web application named *testapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
6270
1. Select the **Run user flow** button.

articles/active-directory-b2c/index-service.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ landingContent:
2121
- linkListType: sample
2222
links:
2323
- text: Node console application
24-
url: https://github.com/Azure-Samples/ms-identity-b2c-javascript-nodejs-management/tree/main/Chapter2
24+
url: https://github.com/Azure-Samples/ms-identity-docs-code-javascript
2525
- text: .NET Core console application
2626
url: https://github.com/Azure-Samples/ms-identity-dotnetcore-b2c-account-management
2727

articles/active-directory-b2c/integrate-with-app-code-samples.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,10 +35,8 @@ The following tables provide links to samples for applications including iOS, An
3535

3636
| Sample | Description |
3737
|--------| ----------- |
38-
| [ms-identity-javascript-angular-tutorial](https://github.com/Azure-Samples/ms-identity-javascript-angular-tutorial/tree/main/3-Authorization-II/2-call-api-b2c) | An Angular single page application (SPA) calling a web API. Authentication is done with Azure AD B2C by using MSAL Angular. This sample uses the authorization code flow with PKCE. |
3938
| [ms-identity-javascript-react-tutorial](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/tree/main/3-Authorization-II/2-call-api-b2c) | A React single page application (SPA) calling a web API. Authentication is done with Azure AD B2C by using MSAL React. This sample uses the authorization code flow with PKCE. |
4039
| [ms-identity-b2c-javascript-spa](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa) | A VanillaJS single page application (SPA) calling a web API. Authentication is done with Azure AD B2C by using MSAL.js. This sample uses the authorization code flow with PKCE. |
41-
| [javascript-nodejs-management](https://github.com/Azure-Samples/ms-identity-b2c-javascript-nodejs-management/tree/main/Chapter1) | A VanillaJS single page application (SPA) calling Microsoft Graph to manage users in a B2C directory. Authentication is done with Azure AD B2C by using MSAL.js. This sample uses the authorization code flow with PKCE.|
4240

4341
## Mobile and desktop apps
4442

@@ -55,7 +53,6 @@ The following tables provide links to samples for applications including iOS, An
5553

5654
| Sample | Description |
5755
|--------| ----------- |
58-
| [javascript-nodejs-management](https://github.com/Azure-Samples/ms-identity-b2c-javascript-nodejs-management/tree/main/Chapter2) | A Node.js and express console daemon application calling Microsoft Graph with its own identity to manage users in a B2C directory. Authentication is done with Azure AD B2C by using MSAL Node. This sample uses the authorization code flow.|
5956
| [dotnetcore-b2c-account-management](https://github.com/Azure-Samples/ms-identity-dotnetcore-b2c-account-management) | A .NET Core console application calling Microsoft Graph with its own identity to manage users in a B2C directory. Authentication is done with Azure AD B2C by using MSAL.NET. This sample uses the authorization code flow.|
6057

6158
## SAML test application

0 commit comments

Comments
 (0)