Skip to content

Commit 6223f15

Browse files
2 parents 07e9dd1 + e636bb7 commit 6223f15

File tree

4,211 files changed

+105039
-70106
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,211 files changed

+105039
-70106
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -946,6 +946,7 @@
946946
"articles/machine-learning/.openpublishing.redirection.machine-learning.json",
947947
"articles/static-web-apps/.openpublishing.redirection.static-web-apps.json",
948948
".openpublishing.redirection.virtual-desktop.json",
949+
".openpublishing.redirection.deployment-environments.json",
949950
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-services.json",
950951
"articles/applied-ai-services/.openpublishing.archived.json",
951952
"articles/cognitive-services/.openpublishing.redirection.cognitive-services.json",

.openpublishing.redirection.azure-monitor.json

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -361,11 +361,6 @@
361361
"redirect_url": "/azure/data-explorer/data-explorer-insights",
362362
"redirect_document_id": false
363363
},
364-
{
365-
"source_path_from_root": "/articles/azure-monitor/insights/troubleshoot-workbooks.md" ,
366-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
367-
"redirect_document_id": false
368-
},
369364
{
370365
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-ga-release-faq.md" ,
371366
"redirect_url": "/azure/azure-monitor/faq#vm-insights",
@@ -5440,6 +5435,26 @@
54405435
"source_path_from_root": "/articles/azure-monitor/insights/sql-insights-troubleshoot.md",
54415436
"redirect_url": "/azure/azure-sql/database/sql-insights-troubleshoot",
54425437
"redirect_document_id": false
5438+
},
5439+
{
5440+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-prometheus-integration.md",
5441+
"redirect_url": "/azure/azure-monitor/containers/container-insights-prometheus",
5442+
"redirect_document_id": false
5443+
},
5444+
{
5445+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-enable-existing-clusters.md",
5446+
"redirect_url": "/azure/azure-monitor/containers/container-insights-enable-aks",
5447+
"redirect_document_id": false
5448+
},
5449+
{
5450+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-enable-new-cluster.md",
5451+
"redirect_url": "/azure/azure-monitor/containers/container-insights-enable-aks",
5452+
"redirect_document_id": false
5453+
},
5454+
{
5455+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-update-metrics.md",
5456+
"redirect_url": "/azure/azure-monitor/containers/container-insights-custom-metrics",
5457+
"redirect_document_id": false
54435458
}
54445459
,
54455460
{

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -710,6 +710,16 @@
710710
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-usage",
711711
"redirect_document_id": true
712712
},
713+
{
714+
"source_path_from_root": "/articles/defender-for-cloud/enable-data-collection.md",
715+
"redirect_url": "/azure/defender-for-cloud/monitoring-components",
716+
"redirect_document_id": true
717+
},
718+
{
719+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-containers-usage.md",
720+
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-va-acr",
721+
"redirect_document_id": true
722+
},
713723
{
714724
"source_path_from_root": "/articles/defender-for-cloud/file-integrity-monitoring-usage.md",
715725
"redirect_url": "/azure/defender-for-cloud/file-integrity-monitoring-enable-log-analytics",
@@ -720,5 +730,6 @@
720730
"redirect_url": "/azure/defender-for-cloud/release-notes#azure-monitor-agent-integration-now-in-preview",
721731
"redirect_document_id": true
722732
}
733+
723734
]
724735
}
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/deployment-environments/how-to-configure-environment-types.md",
5+
"redirect_url": "/azure/deployment-environments/how-to-configure-project-environment-types",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/deployment-environments/tutorial-create-and-configure-devcenter.md",
10+
"redirect_url": "/azure/deployment-environments/quickstart-create-and-configure-devcenter",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/deployment-environments/tutorial-create-and-configure-projects.md",
15+
"redirect_url": "/azure/deployment-environments/quickstart-create-and-configure-projects",
16+
"redirect_document_id": false
17+
}
18+
]
19+
}

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,20 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/backup/sap-hana-db-manage.md",
5+
"redirect_url": "/azure/backup/sap-hana-database-manage",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/backup/sap-hana-db-restore.md",
10+
"redirect_url": "/azure/backup/sap-hana-database-restore",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/backup/sap-hana-db-about.md",
15+
"redirect_url": "/azure/backup/sap-hana-database-about",
16+
"redirect_document_id": false
17+
},
318
{
419
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-dotnet-legacy.md",
520
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet",
@@ -11318,6 +11333,11 @@
1131811333
"redirect_url": "/azure/ddos-protection/telemetry",
1131911334
"redirect_document_id": false
1132011335
},
11336+
{
11337+
"source_path_from_root": "/articles/ddos-protection/ddos-protection-standard-features.md",
11338+
"redirect_url": "/azure/ddos-protection/ddos-protection-features",
11339+
"redirect_document_id": false
11340+
},
1132111341
{
1132211342
"source_path_from_root": "/articles/asc-for-iot/index.yml",
1132311343
"redirect_url": "/azure/defender-for-iot/",

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -496,6 +496,10 @@
496496
href: partner-lexisnexis.md
497497
- name: Onfido
498498
href: partner-onfido.md
499+
- name: Identity verification tools
500+
items:
501+
- name: Grit IEF editor
502+
href: partner-grit-editor.md
499503
- name: Domain name
500504
items:
501505
- name: b2clogin.com overview

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 23 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 08/24/2021
12+
ms.date: 10/07/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -114,6 +114,7 @@ Declare your claims in the [claims schema](claimsschema.md). Open the extensions
114114

115115
[Page layout version](contentdefinitions.md#migrating-to-page-layout) 2.1.2 is required to enable the self-service password reset flow in the sign-up or sign-in journey. To upgrade the page layout version:
116116

117+
1. Open the base file of your policy, for example, *SocialAndLocalAccounts/TrustFrameworkBase.xml*.
117118
1. Search for the [BuildingBlocks](buildingblocks.md) element. If the element doesn't exist, add it.
118119
1. Locate the [ContentDefinitions](contentdefinitions.md) element. If the element doesn't exist, add it.
119120
1. Modify the **DataURI** element within the **ContentDefinition** element to have the ID `api.signuporsignin`:
@@ -131,7 +132,10 @@ Declare your claims in the [claims schema](claimsschema.md). Open the extensions
131132
```
132133

133134
### Add the technical profiles
134-
A claims transformation technical profile accesses the `isForgotPassword` claim. The technical profile is referenced later. When it's invoked, it sets the value of the `isForgotPassword` claim to `true`. Find the **ClaimsProviders** element (if the element doesn't exist, create it), and then add the following claims provider:
135+
A claims transformation technical profile accesses the `isForgotPassword` claim. The technical profile is referenced later. When it's invoked, it sets the value of the `isForgotPassword` claim to `true`.
136+
137+
1. Open the extensions file of your policy, for example, in *SocialAndLocalAccounts/TrustFrameworkExtensions.xml*.
138+
1. Find the **ClaimsProviders** element (if the element doesn't exist, create it), and then add the following claims provider:
135139

136140
```xml
137141
<!--
@@ -171,7 +175,8 @@ The user can now sign in, sign up, and perform password reset in your user journ
171175

172176
The sub journey is called from the user journey and performs the specific steps that deliver the password reset experience to the user. Use the `Call` type sub journey so that when the sub journey is finished, control is returned to the orchestration step that initiated the sub journey.
173177

174-
Find the **SubJourneys** element. If the element doesn't exist, add it after the **User Journeys** element. Then, add the following sub journey:
178+
1. Open the extensions file of your policy, such as *SocialAndLocalAccounts/TrustFrameworkExtensions.xml*.
179+
1. Find the **SubJourneys** element. If the element doesn't exist, add it after the **User Journeys** element. Then, add the following sub journey:
175180

176181
```xml
177182
<!--
@@ -203,23 +208,25 @@ Next, connect the **Forgot your password?** link to the Forgot Password sub jour
203208

204209
If you don't have your own custom user journey that has a **CombinedSignInAndSignUp** step, complete the following steps to duplicate an existing sign-up or sign-in user journey. Otherwise, continue to the next section.
205210

206-
1. In the starter pack, open the *TrustFrameworkBase.xml* file.
211+
1. In the starter pack, open the *TrustFrameworkBase.xml* file such as *SocialAndLocalAccounts/TrustFrameworkBase.xml*.
207212
1. Find and copy the entire contents of the **UserJourney** element that includes `Id="SignUpOrSignIn"`.
208-
1. Open *TrustFrameworkExtensions.xml* and find the **UserJourneys** element. If the element doesn't exist, add one.
213+
1. Open *TrustFrameworkExtensions.xml* file, such as *SocialAndLocalAccounts/TrustFrameworkExtensions.xml*, and find the **UserJourneys** element. If the element doesn't exist, create it.
209214
1. Create a child element of the **UserJourneys** element by pasting the entire contents of the **UserJourney** element you copied in step 2.
210215
1. Rename the ID of the user journey. For example, `Id="CustomSignUpSignIn"`.
211216

212217
### Connect the Forgot Password link to the Forgot Password sub journey
213218

214-
In your user journey, you can represent the Forgot Password sub journey as a **ClaimsProviderSelection**. Adding this element connects the **Forgot your password?** link to the Forgot Password sub journey.
219+
In your user journey, you can represent the Forgot Password sub journey as a **ClaimsProviderSelection**. By adding this element, you connect the **Forgot your password?** link to the Forgot Password sub journey.
220+
221+
1. Open the *TrustFrameworkExtensions.xml* file, such as *SocialAndLocalAccounts/TrustFrameworkExtensions.xml*.
215222

216223
1. In the user journey, find the orchestration step element that includes `Type="CombinedSignInAndSignUp"` or `Type="ClaimsProviderSelection"`. It's usually the first orchestration step. The **ClaimsProviderSelections** element contains a list of identity providers that a user can use to sign in. Add the following line:
217224

218225
```xml
219226
<ClaimsProviderSelection TargetClaimsExchangeId="ForgotPasswordExchange" />
220227
```
221228

222-
1. In the next orchestration step, add a **ClaimsExchange** element. Add the following line:
229+
1. In the next orchestration step, add a **ClaimsExchange** element by adding the following line:
223230

224231
```xml
225232
<ClaimsExchange Id="ForgotPasswordExchange" TechnicalProfileReferenceId="ForgotPassword" />
@@ -245,7 +252,13 @@ In your user journey, you can represent the Forgot Password sub journey as a **C
245252

246253
### Set the user journey to be executed
247254

248-
Now that you've modified or created a user journey, in the **Relying Party** section, specify the journey that Azure AD B2C will execute for this custom policy. In the [RelyingParty](relyingparty.md) element, find the **DefaultUserJourney** element. Update the **DefaultUserJourney ReferenceId** to match the ID of the user journey in which you added the **ClaimsProviderSelections**.
255+
Now that you've modified or created a user journey, in the **Relying Party** section, specify the journey that Azure AD B2C will execute for this custom policy.
256+
257+
1. Open the file that has the **Relying Party** element, such as *SocialAndLocalAccounts/SignUpOrSignin.xml*.
258+
259+
1. In the [RelyingParty](relyingparty.md) element, find the **DefaultUserJourney** element.
260+
261+
1. Update the **DefaultUserJourney ReferenceId** to match the ID of the user journey in which you added the **ClaimsProviderSelections**.
249262

250263
```xml
251264
<RelyingParty>
@@ -275,8 +288,8 @@ Your application might need to detect whether the user signed in by using the Fo
275288
1. In the Azure portal, search for and select **Azure AD B2C**.
276289
1. In the menu under **Policies**, select **Identity Experience Framework**.
277290
1. Select **Upload custom policy**. In the following order, upload the two policy files that you changed:
278-
1. The extension policy, for example, *TrustFrameworkExtensions.xml*.
279-
1. The relying party policy, for example, *SignUpSignIn.xml*.
291+
1. The extension policy, for example, *SocialAndLocalAccounts/TrustFrameworkExtensions.xml*.
292+
1. The relying party policy, for example, *SocialAndLocalAccounts/SignUpOrSignin.xml*.
280293

281294
::: zone-end
282295

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/08/2022
12+
ms.date: 10/11/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit, project-no-code
@@ -45,10 +45,12 @@ As of November 2020, new application registrations show up as unverified in the
4545
To enable sign-in for users with an Azure AD account from a specific Azure AD organization, in Azure Active Directory B2C (Azure AD B2C), you need to create an application in [Azure portal](https://portal.azure.com). For more information, see [Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
4646

4747
1. Sign in to the [Azure portal](https://portal.azure.com).
48-
1. Make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso). Select the **Directories + subscriptions** icon in the portal toolbar.
49-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
50-
1. Under **Azure services**, select **App registrations** or search for and select **App registrations**.
51-
1. Select **New registration**.
48+
1. Make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
49+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
50+
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
51+
1. In the Azure portal, search for and select **Azure Active Directory**.
52+
1. In the left menu, under **Manage**, select **App registrations**.
53+
1. Select **+ New registration**.
5254
1. Enter a **Name** for your application. For example, `Azure AD B2C App`.
5355
1. Accept the default selection of **Accounts in this organizational directory only (Default Directory only - Single tenant)** for this application.
5456
1. For the **Redirect URI**, accept the value of **Web**, and enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant.
@@ -69,9 +71,12 @@ To enable sign-in for users with an Azure AD account from a specific Azure AD or
6971
7072
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
7173
72-
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Search for and select **Azure Active Directory**.
73-
1. From the **Manage** section, select **App registrations**.
74-
1. Select the application you want to configure optional claims for in the list.
74+
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
75+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
76+
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
77+
1. In the Azure portal, search for and select **Azure Active Directory**.
78+
1. In the left menu, under **Manage**, select **App registrations**.
79+
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
7580
1. From the **Manage** section, select **Token configuration**.
7681
1. Select **Add optional claim**.
7782
1. For the **Token type**, select **ID**.
46.9 KB
Loading

articles/active-directory-b2c/partner-gallery.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,13 @@ Microsoft partners with the following ISVs for Web Application Firewall (WAF).
102102
| ![Screenshot of Azure WAF logo](./media/partner-gallery/azure-web-application-firewall-logo.png) | [Azure WAF](./partner-azure-web-application-firewall.md) provides centralized protection of your web applications from common exploits and vulnerabilities. |
103103
![Screenshot of Cloudflare logo](./media/partner-gallery/cloudflare-logo.png) | [Cloudflare](./partner-cloudflare.md) is a WAF provider that helps organizations protect against malicious attacks that aim to exploit vulnerabilities such as SQLi, and XSS. |
104104

105+
## Identity verification tools
106+
107+
Microsoft partners with the following ISVs for tools that can help with implementation of your authentication solution.
108+
109+
| ISV partner | Description and integration walkthroughs |
110+
|:-------------------------|:--------------|
111+
| ![Screenshot of a grit ief editor logo.](./media/partner-gallery/grit-logo.png) | [Grit Visual Identity Experience Framework Editor](./partner-grit-editor.md) is a tool that saves time during authentication deployment. It supports multiple languages without the need to write code. It also has a no code debugger for user journeys.|
105112

106113
## Additional information
107114

0 commit comments

Comments
 (0)