Skip to content

Commit 643f477

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-ios-nov23
2 parents 7b98679 + 8c4ddae commit 643f477

File tree

2,420 files changed

+22924
-48111
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,420 files changed

+22924
-48111
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,12 @@
230230
"branch": "master",
231231
"branch_mapping": {}
232232
},
233+
{
234+
"path_to_root": "function-app-arm-templates",
235+
"url": "https://github.com/Azure-Samples/function-app-arm-templates",
236+
"branch": "main",
237+
"branch_mapping": {}
238+
},
233239
{
234240
"path_to_root": "functions-azure-product",
235241
"url": "https://github.com/Azure/Azure-Functions",

.openpublishing.redirection.defender-for-iot.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/faqs-eiot.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/concept-enterprise#frequently-asked-questions",
6+
"redirect_document_id": false
7+
},
8+
39
{
410
"source_path_from_root": "/articles/defender-for-iot/organizations/best-practices/plan-network-monitoring.md",
511
"redirect_url": "/azure/defender-for-iot/organizations/best-practices/plan-prepare-deploy",

.openpublishing.redirection.json

Lines changed: 860 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -258,8 +258,7 @@ Repeat this step for the **ProfileEdit.xml**, and **PasswordReset.xml** user jou
258258
Save the files you changed: *TrustFrameworkBase.xml*, and *TrustFrameworkExtensions.xml*, *SignUpOrSignin.xml*, *ProfileEdit.xml*, and *PasswordReset.xml*.
259259
## Test the custom policy
260260
1. Sign in to the [Azure portal](https://portal.azure.com).
261-
1. Make sure you're using the directory that contains your Microsoft Entra tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
262-
1. On the **Portal settings | Directories + subscriptions** page, find your Microsoft Entra directory in the **Directory name** list, and then select **Switch**.
261+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
263262
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
264263
1. Select **Identity Experience Framework**.
265264
1. Select **Upload Custom Policy**, and then upload the policy files that you changed: *TrustFrameworkBase.xml*, and *TrustFrameworkExtensions.xml*, *SignUpOrSignin.xml*, *ProfileEdit.xml*, and *PasswordReset.xml*.

articles/active-directory-b2c/add-api-connector.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -574,8 +574,7 @@ To return the promo code claim back to the relying party application, add an out
574574
## Test the custom policy
575575

576576
1. Sign in to the [Azure portal](https://portal.azure.com).
577-
1. Make sure you're using the directory that contains your Microsoft Entra tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
578-
1. On the **Portal settings | Directories + subscriptions** page, find your Microsoft Entra directory in the **Directory name** list, and then select **Switch**.
577+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra ID tenant from the **Directories + subscriptions** menu.
579578
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
580579
1. Select **Identity Experience Framework**.
581580
1. Select **Upload Custom Policy**, and then upload the policy files that you changed: *TrustFrameworkExtensions.xml*, and *SignUpOrSignin.xml*.

articles/active-directory-b2c/add-password-change-policy.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -147,8 +147,7 @@ The password change flow involves the following steps:
147147
## Upload and test the policy
148148

149149
1. Sign in to the [Azure portal](https://portal.azure.com/).
150-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
151-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
150+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
152151
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
153152
1. Select **Identity Experience Framework**.
154153
1. In **Custom Policies**, select **Upload Policy**.

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -65,8 +65,7 @@ The self-service password reset experience can be configured for the Sign in (Re
6565
To set up self-service password reset for the sign-up or sign-in user flow:
6666

6767
1. Sign in to the [Azure portal](https://portal.azure.com).
68-
1. In the portal toolbar, select the **Directories + Subscriptions** icon.
69-
1. In the **Portal settings | Directories + subscriptions** pane, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
68+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
7069
1. In the Azure portal, search for and select **Azure AD B2C**.
7170
1. Select **User flows**.
7271
1. Select a sign-up or sign-in user flow (of type **Recommended**) that you want to customize.
@@ -283,8 +282,7 @@ Your application might need to detect whether the user signed in by using the Fo
283282
### Upload the custom policy
284283

285284
1. Sign in to the [Azure portal](https://portal.azure.com).
286-
1. In the portal toolbar, select the **Directories + Subscriptions** icon.
287-
1. In the **Portal settings | Directories + subscriptions** pane, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
285+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to the Azure AD B2C tenant from the **Directories + subscriptions** menu.
288286
1. In the Azure portal, search for and select **Azure AD B2C**.
289287
1. In the menu under **Policies**, select **Identity Experience Framework**.
290288
1. Select **Upload custom policy**. In the following order, upload the policy files that you changed:

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,9 +54,7 @@ When using the ROPC flow, consider the following:
5454
## Create a resource owner user flow
5555

5656
1. Sign in to the [Azure portal](https://portal.azure.com) as the **global administrator** of your Azure AD B2C tenant.
57-
2. Make sure you're using the directory that contains your Azure AD B2C tenant:
58-
1. Select the **Directories + subscriptions** icon in the portal toolbar.
59-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
57+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
6058
1. In the Azure portal, search for and select **Azure AD B2C**.
6159
1. Select **User flows**, and select **New user flow**.
6260
1. Select **Sign in using resource owner password credentials (ROPC)**.

articles/active-directory-b2c/add-sign-in-policy.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,7 @@ The sign-in policy lets users:
4343
To add sign-in policy:
4444

4545
1. Sign in to the [Azure portal](https://portal.azure.com).
46-
1. Select the **Directories + Subscriptions** icon in the portal toolbar.
47-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
46+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
4847
1. In the Azure portal, search for and select **Azure AD B2C**.
4948
1. Under **Policies**, select **User flows**, and then select **New user flow**.
5049
1. On the **Create a user flow** page, select the **Sign in** user flow.
@@ -114,8 +113,7 @@ The **SelfAsserted-LocalAccountSignin-Email** technical profile is a [self-asser
114113
## Update and test your policy
115114

116115
1. Sign in to the [Azure portal](https://portal.azure.com).
117-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
118-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
116+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
119117
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
120118
1. Select **Identity Experience Framework**.
121119
1. Select **Upload Custom Policy**, and then upload the policy file that you changed, *TrustFrameworkExtensions.xml*.

articles/active-directory-b2c/add-sign-up-and-sign-in-policy.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,7 @@ Watch this video to learn how the user sign-up and sign-in policy works.
4747
The sign-up and sign-in user flow handles both sign-up and sign-in experiences with a single configuration. Users of your application are led down the right path depending on the context.
4848

4949
1. Sign in to the [Azure portal](https://portal.azure.com).
50-
1. Select the **Directories + Subscriptions** icon in the portal toolbar.
51-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
50+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
5251
1. In the Azure portal, search for and select **Azure AD B2C**.
5352
1. Under **Policies**, select **User flows**, and then select **New user flow**.
5453

0 commit comments

Comments
 (0)