Skip to content

Commit 6867f6c

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into normesta-monitor-7
2 parents ffb7e81 + 50660af commit 6867f6c

File tree

233 files changed

+3101
-1312
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

233 files changed

+3101
-1312
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -419,6 +419,16 @@
419419
"redirect_document_id": false
420420
},
421421
{
422+
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-rule-set-match-conditions.md",
423+
"redirect_url": "/azure/frontdoor/rules-match-conditions",
424+
"redirect_document_id": false
425+
},
426+
{
427+
"source_path_from_root": "/articles/frontdoor/front-door-rules-engine-match-conditions.md",
428+
"redirect_url": "/azure/frontdoor/rules-match-conditions",
429+
"redirect_document_id": false
430+
},
431+
{
422432
"source_path_from_root": "/articles/frontdoor/standard-premium/geo-filtering.md",
423433
"redirect_url": "/articles/frontdoor/front-door-geo-filtering",
424434
"redirect_document_id": false
@@ -748,6 +758,16 @@
748758
"redirect_url": "/azure",
749759
"redirect_document_id": false
750760
},
761+
{
762+
"source_path_from_root": "/articles/azure-sql/virtual-machines/windows/availability-group-manually-configure-prerequisites-tutorial.md",
763+
"redirect_url": "/azure/azure-sql/virtual-machines/windows/availability-group-manually-configure-prerequisites-tutorial-single-subnet",
764+
"redirect_document_id": true
765+
},
766+
{
767+
"source_path_from_root": "/articles/azure-sql/virtual-machines/windows/availability-group-manually-configure-tutorial.md",
768+
"redirect_url": "/azure/azure-sql/virtual-machines/windows/availability-group-manually-configure-tutorial-single-subnet",
769+
"redirect_document_id": true
770+
},
751771
{
752772
"source_path_from_root": "/articles/active-directory-b2c/active-directory-b2c-landing-custom.md",
753773
"redirect_url": "/azure/active-directory-b2c",

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 08/29/2021
11+
ms.date: 11/09/2021
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
zone_pivot_groups: b2c-policy-type
@@ -248,7 +248,7 @@ After you deploy your REST API, set the metadata of the `REST-GetProfile` techni
248248
- **ServiceUrl**. Set the URL of the REST API endpoint.
249249
- **SendClaimsIn**. Specify how the input claims are sent to the RESTful claims provider.
250250
- **AuthenticationType**. Set the type of authentication being performed by the RESTful claims provider such as `Basic` or `ClientCertificate`
251-
- **AllowInsecureAuthInProduction**. In a production environment, make sure to set this metadata to `false`
251+
- **AllowInsecureAuthInProduction**. In a production environment, make sure to set this metadata to `false`.
252252

253253
See the [RESTful technical profile metadata](restful-technical-profile.md#metadata) for more configurations.
254254

articles/active-directory-b2c/custom-email-mailjet.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/15/2021
12+
ms.date: 11/10/2021
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -174,6 +174,8 @@ With a Mailjet account created and the Mailjet API key stored in an Azure AD B2C
174174
1. From the right-top select **Save & Publish**, and then **Yes, publish changes**
175175
1. Record the **Template ID** of template you created for use in a later step. You specify this ID when you [add the claims transformation](#add-the-claims-transformation).
176176

177+
[!INCLUDE [active-directory-b2c-important-for-custom-email-provider](../../includes/active-directory-b2c-important-for-custom-email-provider.md)]
178+
177179
## Add Azure AD B2C claim types
178180

179181
In your policy, add the following claim types to the `<ClaimsSchema>` element within `<BuildingBlocks>`.
@@ -397,7 +399,7 @@ As with the OTP technical profiles, add the following technical profiles to the
397399

398400
## Make a reference to the DisplayControl
399401

400-
In the final step, add a reference to the DisplayControl you created. Replace your existing `LocalAccountSignUpWithLogonEmail` and `LocalAccountDiscoveryUsingEmailAddress` self-asserted technical profiles with the following. If you used an earlier version of Azure AD B2C policy. These technical profiles use `DisplayClaims` with a reference to the DisplayControl..
402+
In the final step, add a reference to the DisplayControl you created. Override your existing `LocalAccountSignUpWithLogonEmail` and `LocalAccountDiscoveryUsingEmailAddress` self-asserted technical profiles that are configured in the base policy with the following XML snippet. If you used an earlier version of Azure AD B2C policy, these technical profiles use `DisplayClaims` with a reference to the `DisplayControl`.
401403

402404
For more information, see [Self-asserted technical profile](restful-technical-profile.md) and [DisplayControl](display-controls.md).
403405

@@ -472,7 +474,7 @@ To localize the email, you must send localized strings to Mailjet, or your email
472474
<!--
473475
<BuildingBlocks> -->
474476
<Localization Enabled="true">
475-
<SupportedLanguages DefaultLanguage="en" MergeBehavior="Append">
477+
<SupportedLanguages DefaultLanguage="en" MergeBehavior="ReplaceAll">
476478
<SupportedLanguage>en</SupportedLanguage>
477479
<SupportedLanguage>es</SupportedLanguage>
478480
</SupportedLanguages>
@@ -567,9 +569,7 @@ The Localization element allows you to support multiple locales or languages in
567569

568570
## Next steps
569571

570-
You can find an example of a custom email verification policy on GitHub:
571-
572-
- [Custom email verification - DisplayControls](https://github.com/azure-ad-b2c/samples/tree/master/policies/custom-email-verifcation-displaycontrol)
572+
- You can find an example of a [Custom email verification - DisplayControls](https://github.com/azure-ad-b2c/samples/tree/master/policies/custom-email-verifcation-displaycontrol/policy/Mailjet) custom policy on GitHub.
573573
- For information about using a custom REST API or any HTTP-based SMTP email provider, see [Define a RESTful technical profile in an Azure AD B2C custom policy](restful-technical-profile.md).
574574

575575
::: zone-end

articles/active-directory-b2c/custom-email-sendgrid.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/15/2021
12+
ms.date: 11/10/2021
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -164,6 +164,9 @@ With a SendGrid account created and SendGrid API key stored in an Azure AD B2C p
164164
1. Return to the **Transactional Templates** page by selecting the back arrow.
165165
1. Record the **ID** of template you created for use in a later step. For example, `d-989077fbba9746e89f3f6411f596fb96`. You specify this ID when you [add the claims transformation](#add-the-claims-transformation).
166166

167+
168+
[!INCLUDE [active-directory-b2c-important-for-custom-email-provider](../../includes/active-directory-b2c-important-for-custom-email-provider.md)]
169+
167170
## Add Azure AD B2C claim types
168171

169172
In your policy, add the following claim types to the `<ClaimsSchema>` element within `<BuildingBlocks>`.
@@ -384,7 +387,7 @@ As with the OTP technical profiles, add the following technical profiles to the
384387

385388
## Make a reference to the DisplayControl
386389

387-
In the final step, add a reference to the DisplayControl you created. Replace your existing `LocalAccountSignUpWithLogonEmail` and `LocalAccountDiscoveryUsingEmailAddress` self-asserted technical profiles with the following. If you used an earlier version of Azure AD B2C policy. These technical profiles use `DisplayClaims` with a reference to the DisplayControl.
390+
In the final step, add a reference to the DisplayControl you created. Override your existing `LocalAccountSignUpWithLogonEmail` and `LocalAccountDiscoveryUsingEmailAddress` self-asserted technical profiles that are configured in the base policy with the following XML snippet. If you used an earlier version of Azure AD B2C policy, these technical profiles use `DisplayClaims` with a reference to the `DisplayControl`.
388391

389392
For more information, see [Self-asserted technical profile](restful-technical-profile.md) and [DisplayControl](display-controls.md).
390393

@@ -455,7 +458,7 @@ To localize the email, you must send localized strings to SendGrid, or your emai
455458
<!--
456459
<BuildingBlocks> -->
457460
<Localization Enabled="true">
458-
<SupportedLanguages DefaultLanguage="en" MergeBehavior="Append">
461+
<SupportedLanguages DefaultLanguage="en" MergeBehavior="ReplaceAll">
459462
<SupportedLanguage>en</SupportedLanguage>
460463
<SupportedLanguage>es</SupportedLanguage>
461464
</SupportedLanguages>
@@ -552,9 +555,7 @@ The Localization element allows you to support multiple locales or languages in
552555

553556
## Next steps
554557

555-
You can find an example of a custom email verification policy on GitHub:
556-
557-
- [Custom email verification - DisplayControls](https://github.com/azure-ad-b2c/samples/tree/master/policies/custom-email-verifcation-displaycontrol)
558+
- You can find an example of [Custom email verification - DisplayControls custom policy](https://github.com/azure-ad-b2c/samples/tree/master/policies/custom-email-verifcation-displaycontrol/policy/SendGrid) on GitHub.
558559
- For information about using a custom REST API or any HTTP-based SMTP email provider, see [Define a RESTful technical profile in an Azure AD B2C custom policy](restful-technical-profile.md).
559560

560561
::: zone-end

articles/active-directory-b2c/enable-authentication-web-app-with-api.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 06/25/2021
10+
ms.date: 11/10/2021
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -57,6 +57,8 @@ Install-Package Microsoft.Identity.Web
5757
Install-Package Microsoft.Identity.Web.UI
5858
```
5959

60+
---
61+
6062
## Step 3: Initiate the authentication libraries
6163

6264
The Microsoft Identity Web middleware uses a startup class that runs when the hosting process starts. In this step, you add the necessary code to initiate the authentication libraries.

articles/active-directory-b2c/saml-service-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/05/2021
12+
ms.date: 11/12/2021
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit

articles/active-directory/devices/azuread-joined-devices-frx.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 06/28/2019
1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: karenhoran
14-
ms.reviewer: jairoc
14+
ms.reviewer: ravenn
1515

1616
#Customer intent: As a user, I want to join my corporate device during a first-run so that I can access my corporate resources
1717

@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
With device management in Azure Active Directory (Azure AD), you can ensure that your users are accessing your resources from devices that meet your standards for security and compliance. For more information, see the [introduction to device management in Azure Active Directory](overview.md).
2323

24-
With Windows 10, You can join a new device to Azure AD during the first-run experience (FRX).
24+
With Windows 10, You can join a new device to Azure AD during the first-run out-of-box experience (OOBE).
2525
This enables you to distribute shrink-wrapped devices to your employees or students.
2626

2727
If you have either Windows 10 Professional or Windows 10 Enterprise installed on a device, the experience defaults to the setup process for company-owned devices.
@@ -47,16 +47,16 @@ In addition, if your tenant is federated, your Identity provider MUST support WS
4747
1. When you turn on your new device and start the setup process, you should see the **Getting Ready** message. Follow the prompts to set up your device.
4848
1. Start by customizing your region and language. Then accept the Microsoft Software License Terms.
4949

50-
![Customize for your region](./media/azuread-joined-devices-frx/01.png)
50+
<!--![Customize for your region](./media/azuread-joined-devices-frx/01.png)-->
5151

5252
1. Select the network you want to use for connecting to the Internet.
5353
1. Click **This device belongs to my organization**.
5454

55-
![Who owns this PC screen](./media/azuread-joined-devices-frx/02.png)
55+
<!--![Who owns this PC screen](./media/azuread-joined-devices-frx/02.png)-->
5656

5757
1. Enter the credentials that were provided to you by your organization, and then click **Sign in**.
5858

59-
![Sign-in screen](./media/azuread-joined-devices-frx/03.png)
59+
<!--![Sign-in screen](./media/azuread-joined-devices-frx/03.png)-->
6060

6161
1. Your device locates a matching tenant in Azure AD. If you are in a federated domain, you are redirected to your on-premises Secure Token Service (STS) server, for example, Active Directory Federation Services (AD FS).
6262
1. If you are a user in a non-federated domain, enter your credentials directly on the Azure AD-hosted page.

0 commit comments

Comments
 (0)