Skip to content

Commit 6b09fab

Browse files
committed
Merge remote-tracking branch 'upstream/main' into minor-updates
2 parents fdc9c41 + 2a1fd51 commit 6b09fab

File tree

1,836 files changed

+23859
-10302
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,836 files changed

+23859
-10302
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -510,6 +510,11 @@
510510
"source_path_from_root": "/articles/azure-monitor/logs/workspace-design-service-providers.md" ,
511511
"redirect_url": "/azure/azure-monitor/logs/workspace-design",
512512
"redirect_document_id": false
513+
},
514+
{
515+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-transition-hybrid.md" ,
516+
"redirect_url": "/azure/azure-monitor/containers/container-insights-onboard",
517+
"redirect_document_id": false
513518
}
514519
]
515520
}

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,15 @@
11
{
22
"redirections": [
3-
{
3+
{
44
"source_path": "articles/api-management/zone-redundancy.md",
55
"redirect_url": "/azure/availability-zones/migrate-api-mgt",
66
"redirect_document_id": false
77
},
8+
{
9+
"source_path": "articles/api-management/developer-portal-implement-widgets.md",
10+
"redirect_url": "/azure/api-management/developer-portal-extend-custom-functionality",
11+
"redirect_document_id": false
12+
},
813
{
914
"source_path": "articles/virtual-machines/linux/find-unattached-nics.md",
1015
"redirect_url": "/previous-versions/azure/virtual-machines/linux/find-unattached-nics",
@@ -22348,6 +22353,11 @@
2234822353
"redirect_url": "/azure/storage/common/customer-managed-keys-configure-key-vault",
2234922354
"redirect_document_id": false
2235022355
},
22356+
{
22357+
"source_path_from_root": "/articles/storage/common/customer-managed-keys-configure-key-vault.md",
22358+
"redirect_url": "/azure/storage/common/customer-managed-keys-configure-existing-account",
22359+
"redirect_document_id": false
22360+
},
2235122361
{
2235222362
"source_path_from_root": "/articles/storage/common/encryption-customer-managed-keys.md",
2235322363
"redirect_url": "/azure/storage/common/customer-managed-keys-overview",

articles/active-directory-b2c/configure-authentication-sample-react-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ Your final configuration file should look like the following JSON:
182182
```json
183183
{
184184
"credentials": {
185-
"tenantName": "<your-tenant-name>",
185+
"tenantName": "<your-tenant-name>.ommicrosoft.com",
186186
"clientID": "<your-webapi-application-ID>",
187187
"issuer": "https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/"
188188
},

articles/active-directory-b2c/index.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ landingContent:
2929
- text: What is Azure AD B2C?
3030
url: overview.md
3131
- text: Compare solutions for External Identities
32-
url: ../active-directory/external-identities/external-identities-overview.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
32+
url: ../active-directory/external-identities/external-identities-overview.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
3333
- text: Get started with Azure AD B2C
3434
url: tutorial-create-tenant.md
3535
- text: Technical and feature overview
@@ -43,13 +43,13 @@ landingContent:
4343
- linkListType: learn
4444
links:
4545
- text: Authentication and authorization
46-
url: ../active-directory/develop/authentication-vs-authorization.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
46+
url: ../active-directory/develop/authentication-vs-authorization.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
4747
- text: Tokens
48-
url: ../active-directory/develop/security-tokens.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
48+
url: ../active-directory/develop/security-tokens.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
4949
- text: Protocols
50-
url: ../active-directory/develop/v2-app-types.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
50+
url: ../active-directory/develop/v2-app-types.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
5151
- text: Authentication library
52-
url: ../active-directory/develop/msal-overview.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
52+
url: ../active-directory/develop/msal-overview.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
5353
- text: 'Build a web site: HTML, CSS, JavaScript'
5454
url: /learn/modules/build-simple-website/
5555

Binary file not shown.
61.8 KB
Loading

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ Note, the [list](/graph/api/authentication-list-phonemethods) operation returns
6060

6161
An email address that can be used by a [username sign-in account](sign-in-options.md#username-sign-in) to reset the password. For more information, see [Azure AD authentication methods API](/graph/api/resources/emailauthenticationmethod).
6262

63-
- [Add](/graph/api/emailauthenticationmethod-post)
64-
- [List](/graph/api/emailauthenticationmethod-list)
63+
- [Add](/graph/api/authentication-post-emailmethods)
64+
- [List](/graph/api/authentication-list-emailmethods)
6565
- [Get](/graph/api/emailauthenticationmethod-get)
6666
- [Update](/graph/api/emailauthenticationmethod-update)
6767
- [Delete](/graph/api/emailauthenticationmethod-delete)

articles/active-directory-b2c/partner-deduce.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ In order to collect the user_agent from client-side, create your own `**ContentD
129129
To customize the user interface, you specify a URL in the `ContentDefinition` element with customized HTML content. In the self-asserted technical profile or orchestration step, you point to that ContentDefinition identifier.
130130

131131

132-
1. Open the `TrustFrameworksExtension.xml` and define a new **ContentDefinition** to customize the [self-asserted technical profile](https://docs.microsoft.com/azure/active-directory-b2c/self-asserted-technical-profile).
132+
1. Open the `TrustFrameworksExtension.xml` and define a new **ContentDefinition** to customize the [self-asserted technical profile](/azure/active-directory-b2c/self-asserted-technical-profile).
133133

134134
1. Find the `BuildingBlocks` element and add the `**api.selfassertedDeduce**` ContentDefinition:
135135

@@ -434,11 +434,11 @@ The **ClaimsSchema** element defines the claim types that can be referenced as p
434434

435435
### Step 6: Add Deduce ClaimsProvider
436436

437-
A **claims provider** is an interface to communicate with different types of parties via its [technical profiles](https://docs.microsoft.com/azure/active-directory-b2c/technicalprofiles).
437+
A **claims provider** is an interface to communicate with different types of parties via its [technical profiles](/azure/active-directory-b2c/technicalprofiles).
438438

439439
- `SelfAsserted-UserAgent` self-asserted technical profile is used to collect user_agent from client-side.
440440

441-
- `deduce_insight_api` technical profile sends data to the Deduce RESTful service in an input claims collection and receives data back in an output claims collection. For more information, see [integrate REST API claims exchanges in your Azure AD B2C custom policy](https://docs.microsoft.com/azure/active-directory-b2c/api-connectors-overview?pivots=b2c-custom-policy)
441+
- `deduce_insight_api` technical profile sends data to the Deduce RESTful service in an input claims collection and receives data back in an output claims collection. For more information, see [integrate REST API claims exchanges in your Azure AD B2C custom policy](/azure/active-directory-b2c/api-connectors-overview?pivots=b2c-custom-policy)
442442

443443
You can define Deduce as a claims provider by adding it to the **ClaimsProvider** element in the extension file of your policy.
444444

articles/active-directory-b2c/partner-dynamics-365-fraud-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,14 @@ ms.reviewer: kengaderdus
1010
ms.service: active-directory
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 5/12/2021
13+
ms.date: 08/28/2022
1414
ms.author: gasinh
1515
ms.subservice: B2C
1616
---
1717

1818
# Tutorial: Configure Microsoft Dynamics 365 Fraud Protection with Azure Active Directory B2C
1919

20-
In this sample tutorial, learn how to integrate [Microsoft Dynamics 365 Fraud Protection](/dynamics365/fraud-protection/overview) (DFP) with Azure Active Directory (AD) B2C.
20+
In this sample tutorial, learn how to integrate [Microsoft Dynamics 365 Fraud Protection](/dynamics365/fraud-protection/ap-overview) (DFP) with Azure Active Directory (AD) B2C.
2121

2222
Microsoft DFP provides organizations with the capability to assess the risk of attempts to create fraudulent accounts and log-ins. Microsoft DFP assessment can be used by the customer to block or challenge suspicious attempts to create new fake accounts or to compromise existing accounts.
2323

articles/active-directory-b2c/tutorial-delete-tenant.md

Lines changed: 49 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 09/20/2021
11+
ms.date: 08/30/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
1515

1616
# Clean up resources and delete the tenant
1717

18-
When you've finished the Azure AD B2C tutorials, you can delete the tenant you used for testing or training. To delete the tenant, you'll first need to delete all tenant resources. In this article, you'll:
18+
When you've finished the Azure Active Directory B2C (Azure AD B2C) tutorials, you can delete the tenant you used for testing or training. To delete the tenant, you'll first need to delete all tenant resources. In this article, you'll:
1919

2020
> [!div class="checklist"]
2121
> * Use the **Delete tenant** option to identify cleanup tasks
@@ -25,62 +25,83 @@ When you've finished the Azure AD B2C tutorials, you can delete the tenant you u
2525
## Identify cleanup tasks
2626

2727
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
28-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
29-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
30-
1. Select the **Azure Active Directory** service.
31-
1. Under **Manage**, select **Properties**.
28+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
29+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
30+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch** button next to it.
31+
1. In the Azure portal, search for and select the **Azure Active Directory** service.
32+
1. In the left menu, under **Manage**, select **Properties**.
3233
1. Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
33-
1. Sign out of the Azure portal and then sign back in to refresh your access. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
34-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
35-
1. Select the **Azure Active Directory** service.
36-
1. On the **Overview** page, select **Delete tenant**. The **Required action** column indicates the resources you'll need to remove before you can delete the tenant.
34+
1. Sign out of the Azure portal and then sign back in to refresh your access.
35+
1. Repeat step two to make sure you're using the directory that contains your Azure AD B2C tenant.
36+
1. In the Azure portal, search for and select the **Azure Active Directory** service
37+
1. On the **Overview** page, select **Manage tenants**.
38+
1. On the **Manage tenants** page, select (by check marking) the tenant you want to delete, and then, at the top of the page, select the **Delete** button. The **Required action** column indicates the resources you need to remove before you can delete the tenant.
3739

3840
![Delete tenant tasks](media/tutorial-delete-tenant/delete-tenant-tasks.png)
3941

4042
## Delete tenant resources
4143

42-
If you have the confirmation page open from the previous section, you can use the links in the **Required action** column to open the Azure portal pages where you can remove these resources. Or, you can remove tenant resources from within the Azure AD B2C service using the following steps.
44+
If you've the confirmation page open from the previous section, you can use the links in the **Required action** column to open the Azure portal pages where you can remove these resources. Or, you can remove tenant resources from within the Azure AD B2C service using the following steps.
4345

4446
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
45-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
46-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
47-
1. Select the **Azure AD B2C** service. Or use the search box to find and select **Azure AD B2C**.
48-
1. Delete all users *except* the admin account you're currently signed in as: Under **Manage**, select **Users**. On the **All users** page, select the checkbox next to each user (except the admin account you're currently signed in as). Select **Delete**, and then select **Yes** when prompted.
47+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
48+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
49+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch** button next to it.
50+
1. In the Azure portal, select the **Azure AD B2C** service, or search for and select **Azure AD B2C**.
51+
1. Delete all users *except* the admin account you're currently signed in as:
52+
1. Under **Manage**, select **Users**.
53+
1. On the **All users** page, select the checkbox next to each user (except the admin account you're currently signed in as).
54+
1. At the top of the page, select **Delete user**, and then select **Yes** when prompted.
4955

5056
![Delete users](media/tutorial-delete-tenant/delete-users.png)
5157

52-
1. Delete app registrations and the *b2c-extensions-app*: Under **Manage**, select **App registrations**. Select the **All applications** tab. Select an application, and then select **Delete**. Repeat for all applications, including the **b2c-extensions-app** application.
58+
1. Delete app registrations and the *b2c-extensions-app*:
59+
1. Under **Manage**, select **App registrations**.
60+
1. Select the **All applications** tab.
61+
1. Select an application to open it, and then select **Delete** button. Repeat for all applications, including the **b2c-extensions-app** application.
5362

5463
![Delete application](media/tutorial-delete-tenant/delete-applications.png)
5564

56-
1. Delete any identity providers you configured: Under **Manage**, select **Identity providers**. Select an identity provider you configured, and then select **Remove**.
65+
1. Delete any identity providers you configured:
66+
1. Under **Manage**, select **Identity providers**.
67+
1. Select an identity provider you configured, and then select **Remove**.
5768

5869
![Delete identity provider](media/tutorial-delete-tenant/identity-providers.png)
5970

60-
1. Delete user flows: Under **Policies**, select **User flows**. Next to each user flow, select the ellipses (...) and then select **Delete**.
71+
1. Delete user flows:
72+
1. Under **Policies**, select **User flows**.
73+
1. Next to each user flow, select the ellipses (...) and then select **Delete**.
6174

6275
![Delete user flows](media/tutorial-delete-tenant/user-flow.png)
6376

64-
1. Delete policy keys: Under **Policies**, select **Identity Experience Framework**, and then select **Policy keys**. Next to each policy key, select the ellipses (...) and then select **Delete**.
77+
1. Delete policy keys:
78+
1. Under **Policies**, select **Identity Experience Framework**, and then select **Policy keys**.
79+
1. Next to each policy key, select the ellipses (...) and then select **Delete**.
6580

66-
1. Delete custom policies: Under **Policies**, select **Identity Experience Framework**, select **Custom policies**, and then delete all policies.
81+
1. Delete custom policies:
82+
1. Under **Policies**, select **Identity Experience Framework**, and then select **Custom policies**.
83+
1. Next to each Custom policy, select the ellipses (...) and then select **Delete**.
6784

6885
## Delete the tenant
6986

87+
Once you delete all the tenant resources, you can now delete the tenant itself:
88+
7089
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
71-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
72-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
73-
1. Select the **Azure Active Directory** service.
90+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
91+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
92+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch** button next to it.
93+
1. In the Azure portal, search for and select the **Azure Active Directory** service.
7494
1. If you haven't already granted yourself access management permissions, do the following:
7595

76-
* Under **Manage**, select **Properties**.
77-
* Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
78-
* Sign out of the Azure portal and then sign back in to refresh your access, and select the **Azure Active Directory** service.
96+
1. Under **Manage**, select **Properties**.
97+
1. Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
98+
1. Sign out of the Azure portal and then sign back in to refresh your access, and select the **Azure Active Directory** service.
7999

80-
1. On the **Overview** page, select **Delete tenant**.
100+
1. On the **Overview** page, select **Manage tenants**.
81101

82-
![Delete the tenant](media/tutorial-delete-tenant/delete-tenant.png)
102+
:::image type="content" source="media/tutorial-delete-tenant/manage-tenant.png" alt-text="Screenshot of how to manage tenant for deletion.":::
83103

104+
1. On the **Manage tenants** page, select (by check marking) the tenant you want to delete, and then, at the top of the page, select the **Delete** button
84105
1. Follow the on-screen instructions to complete the process.
85106

86107
## Next steps

0 commit comments

Comments
 (0)