Skip to content

Commit 69ce9e0

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into raicli0224
2 parents 70779c6 + 8a18df2 commit 69ce9e0

File tree

1,228 files changed

+16580
-18235
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,228 files changed

+16580
-18235
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1200,6 +1200,7 @@
12001200
".openpublishing.redirection.azure-arc-data.json",
12011201
".openpublishing.redirection.azure-attestation.json",
12021202
".openpublishing.redirection.azure-app-configuration.json",
1203+
".openpublishing.redirection.azure-datalake-storage-gen1.json",
12031204
".openpublishing.redirection.azure-australia.json",
12041205
".openpublishing.redirection.azure-databricks.json",
12051206
".openpublishing.redirection.azure-hpc.json",
@@ -1222,6 +1223,7 @@
12221223
".openpublishing.redirection.machine-configuration.json",
12231224
".openpublishing.redirection.marketplace.json",
12241225
".openpublishing.redirection.openshift.json",
1226+
".openpublishing.redirection.purview.json",
12251227
".openpublishing.redirection.security-benchmark.json",
12261228
".openpublishing.redirection.sentinel.json",
12271229
".openpublishing.redirection.spring-cloud.json",
@@ -1283,7 +1285,6 @@
12831285
"articles/operator-nexus/.openpublishing.redirection.operator-nexus.json",
12841286
"articles/peering-service/.openpublishing.redirection.peering-service.json",
12851287
"articles/postgresql/.openpublishing.redirection.postgresql.json",
1286-
"articles/purview/.openpublishing.redirection.purview.json",
12871288
"articles/route-server/.openpublishing.redirection.route-server.json",
12881289
"articles/sap/.openpublishing.redirection.sap.json",
12891290
"articles/security/.openpublishing.redirection.security.json",

.openpublishing.redirection.azure-datalake-storage-gen1.json

Lines changed: 305 additions & 0 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.azure-kubernetes-service.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -461,11 +461,6 @@
461461
"source_path_from_root": "/articles/aks/command-invoke.md",
462462
"redirect_url": "/azure/aks/access-private-cluster",
463463
"redirect_document_id": false
464-
},
465-
{
466-
"source_path_from_root": "/articles/aks/ai-toolchain-operator.md",
467-
"redirect_url": "https://azure.microsoft.com/updates/preview-ai-toolchain-operator-addon-for-aks/",
468-
"redirect_document_id": false
469464
}
470465
]
471466
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6264,6 +6264,11 @@
62646264
"redirect_url": "/azure/azure-monitor/reference/supported-metrics/metrics-index",
62656265
"redirect_document_id": false
62666266
},
6267+
{
6268+
"source_path_from_root": "/articles/azure-monitor/essentials/platform-logs-overview.md",
6269+
"redirect_url": "/azure/azure-monitor/data-sources",
6270+
"redirect_document_id": false
6271+
},
62676272
{
62686273
"source_path_from_root": "/articles/azure-monitor/essentials/resource-logs-categories.md",
62696274
"redirect_url": "/azure/azure-monitor/reference/supported-logs/logs-index",

.openpublishing.redirection.certification.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,21 @@
7474
"source_path_from_root": "/articles/certification/how-to-indirectly-connected-devices.md",
7575
"redirect_url": "/azure/certification/overview",
7676
"redirect_document_id": false
77+
},
78+
{
79+
"source_path_from_root": "/articles/certification/program-requirements-pnp.md",
80+
"redirect_url": "/azure/certification/overview",
81+
"redirect_document_id": false
82+
},
83+
{
84+
"source_path_from_root": "/articles/certification/how-to-troubleshoot-pnp.md",
85+
"redirect_url": "/azure/certification/overview",
86+
"redirect_document_id": false
87+
},
88+
{
89+
"source_path_from_root": "/articles/certification/how-to-test-pnp.md",
90+
"redirect_url": "/azure/certification/overview",
91+
"redirect_document_id": false
7792
}
7893
]
7994
}

.openpublishing.redirection.json

Lines changed: 52 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,25 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/batch/batch-pool-no-public-ip-address.md",
5+
"redirect_url": "/previous-versions/azure/batch/articles/batch/batch-pool-no-public-ip-address",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/batch/batch-rendering-applications.md",
10+
"redirect_url": "/previous-versions/azure/batch/articles/batch/batch-rendering-applications",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/batch/batch-rendering-using.md",
15+
"redirect_url": "/previous-versions/azure/batch/articles/batch/batch-rendering-using",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/batch/batch-rendering-application-reference.md",
20+
"redirect_url": "/previous-versions/aure/batch/articles/batch/batch-rendering-application-reference",
21+
"redirect_document_id": false
22+
},
323
{
424
"source_path": "articles/cosmos-db/nosql/sdk-java-spark-v2.md",
525
"redirect_url": "/previous-versions/azure/cosmos-db/nosql/sdk-java-spark-v2",
@@ -980,6 +1000,11 @@
9801000
"redirect_url": "/analysis-services/tabular-models/compatibility-level-for-tabular-models-in-analysis-services",
9811001
"redirect_document_id": false
9821002
},
1003+
{
1004+
"source_path_from_root": "/articles/analysis-services/analysis-services-monitor.md",
1005+
"redirect_url": "/azure/analysis-services/monitor-analysis-services",
1006+
"redirect_document_id": false
1007+
},
9831008
{
9841009
"source_path_from_root": "/articles/frontdoor/front-door-whats-new.md",
9851010
"redirect_url": "https://azure.microsoft.com/updates/?category=networking\u0026query=Azure%20Front%20Door",
@@ -10881,9 +10906,10 @@
1088110906
{
1088210907
"source_path_from_root": "/articles/reliability/disaster-recovery-guidance-overview.md",
1088310908
"redirect_url": "/azure/reliability/reliability-guidance-overview",
10884-
"redirect_document_id": false
10909+
"redirect_document_id": false
1088510910
},
1088610911
{
10912+
1088710913
"source_path_from_root": "/articles/orbital/overview-analytics.md",
1088810914
"redirect_url": "/azure/orbital/overview",
1088910915
"redirect_document_id": false
@@ -10913,6 +10939,31 @@
1091310939
"source_path_from_root": "/articles/networking/disaster-recovery-dns-traffic-manager.md",
1091410940
"redirect_url": "/azure/reliability/reliability-traffic-manager",
1091510941
"redirect_document_id": false
10942+
},
10943+
{
10944+
"source_path_from_root": "/articles/event-hubs/move-across-regions.md",
10945+
"redirect_url": "/azure/operational-excellence/relocation-event-hub",
10946+
"redirect_document_id": false
10947+
},
10948+
{
10949+
"source_path_from_root": "/articles/azure-monitor/logs/move-workspace-region.md",
10950+
"redirect_url": "/azure/operational-excellence/relocation-log-analytics",
10951+
"redirect_document_id": false
10952+
},
10953+
{
10954+
"source_path_from_root": "/articles/key-vault/general/move-region.md",
10955+
"redirect_url": "/azure/operational-excellence/relocation-key-vault",
10956+
"redirect_document_id": false
10957+
},
10958+
{
10959+
"source_path_from_root": "/articles/event-hubs/move-cluster-across-regions.md",
10960+
"redirect_url": "/azure/operational-excellence/relocation-event-hub-cluster",
10961+
"redirect_document_id": false
10962+
},
10963+
{
10964+
"source_path_from_root": "/articles/storage/common/storage-account-move.md",
10965+
"redirect_url": "/azure/operational-excellence/relocation-storage-account",
10966+
"redirect_document_id": false
1091610967
}
1091710968

1091810969
]

articles/active-directory-b2c/add-captcha.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kengaderdus
55
manager: mwongerapk
66
ms.service: active-directory
77
ms.topic: how-to
8-
ms.date: 01/17/2024
8+
ms.date: 03/01/2024
99
ms.custom: project-no-code
1010
ms.author: kengaderdus
1111
ms.subservice: B2C
@@ -19,7 +19,7 @@ zone_pivot_groups: b2c-policy-type
1919

2020
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2121

22-
Azure Active Directory B2C (Azure AD B2C) allows you to enable CAPTCHA prevent to automated attacks on your consumer-facing applications. Azure AD B2C’s CAPTCHA supports both audio and visual CAPTCHA challenges. You can enable this security feature in both sign-up and sign-in flows for your local accounts. CAPTCHA isn't applicable for social identity providers' sign-in.
22+
Azure Active Directory B2C (Azure AD B2C) allows you to enable CAPTCHA to prevent automated attacks on your consumer-facing applications. Azure AD B2C’s CAPTCHA supports both audio and visual CAPTCHA challenges. You can enable this security feature in both sign-up and sign-in flows for your local accounts. CAPTCHA isn't applicable for social identity providers' sign-in.
2323

2424
> [!NOTE]
2525
> This feature is in public preview
@@ -314,22 +314,20 @@ To enable CAPTCHA in MFA flow, you need to make an update in two technical profi
314314
...
315315
</TechnicalProfile>
316316
```
317-
::: zone-end
318-
319-
> [!NOTE]
320-
> - You can't add CAPTCHA to an MFA step in a sign-up only user flow.
321-
> - In an MFA flow, CAPTCHA is applicable where the MFA method you select is SMS or phone call, SMS only or Phone call only.
322-
323-
::: zone pivot="b2c-user-flow"
324317
## Upload the custom policy files
325318

326319
Use the steps in [Upload the policies](tutorial-create-user-flows.md?pivots=b2c-custom-policy&branch=pr-en-us-260336#upload-the-policies) to upload your custom policy files.
327320

328321
## Test the custom policy
329322

330323
Use the steps in [Test the custom policy](tutorial-create-user-flows.md?pivots=b2c-custom-policy#test-the-custom-policy) to test and confirm that CAPTCHA is enabled for your chosen flow. You should be prompted to enter the characters you see or hear depending on the CAPTCHA type, visual or audio, you choose.
324+
331325
::: zone-end
332326

327+
> [!NOTE]
328+
> - You can't add CAPTCHA to an MFA step in a sign-up only user flow.
329+
> - In an MFA flow, CAPTCHA is applicable where the MFA method you select is SMS or phone call, SMS only or Phone call only.
330+
333331
## Next steps
334332

335333
- Learn how to [Define a CAPTCHA technical profile](captcha-technical-profile.md).

articles/active-directory-b2c/custom-domain.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kengaderdus
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 02/14/2024
9+
ms.date: 03/01/2024
1010
ms.author: kengaderdus
1111
ms.subservice: B2C
1212
ms.custom: "b2c-support"
@@ -52,7 +52,7 @@ When using custom domains, consider the following:
5252

5353
- You can set up multiple custom domains. For the maximum number of supported custom domains, see [Microsoft Entra service limits and restrictions](/entra/identity/users/directory-service-limits-restrictions) for Azure AD B2C and [Azure subscription and service limits, quotas, and constraints](/azure/azure-resource-manager/management/azure-subscription-service-limits#azure-front-door-classic-limits) for Azure Front Door.
5454
- Azure Front Door is a separate Azure service, so extra charges will be incurred. For more information, see [Front Door pricing](https://azure.microsoft.com/pricing/details/frontdoor).
55-
- If you've multiple applications, migrate all oft them to the custom domain because the browser stores the Azure AD B2C session under the domain name currently being used.
55+
- If you've multiple applications, migrate all of them to the custom domain because the browser stores the Azure AD B2C session under the domain name currently being used.
5656
- After you configure custom domains, users will still be able to access the Azure AD B2C default domain name *&lt;tenant-name&gt;.b2clogin.com*. You need to block access to the default domain so that attackers can't use it to access your apps or run distributed denial-of-service (DDoS) attacks. [Submit a support ticket](find-help-open-support-ticket.md) to request for the blocking of access to the default domain.
5757

5858
> [!WARNING]

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in-federation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ Notice the claims transformations we defined in [step 3.2](#step-32---define-cla
225225

226226
Just like in sign-in with a local account, you need to configure the [Microsoft Entra Technical Profiles](active-directory-technical-profile.md), which you use to connect to Microsoft Entra ID storage, to store or read a user social account.
227227

228-
1. In the `ContosoCustomPolicy.XML` file, locate the `AAD-UserUpdate` technical profile and then add a new technical profile by using the following code:
228+
1. In the `ContosoCustomPolicy.XML` file, locate the `AAD-UserRead` technical profile and then add a new technical profile by using the following code:
229229

230230
```xml
231231
<TechnicalProfile Id="AAD-UserWriteUsingAlternativeSecurityId">

0 commit comments

Comments
 (0)