Skip to content

Commit 6b54695

Browse files
committed
pull in upstream/main
2 parents 6fb090a + b34e126 commit 6b54695

File tree

1,409 files changed

+24768
-10867
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,409 files changed

+24768
-10867
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,11 @@
3535
"redirect_url": "/azure/azure-monitor/change/change-analysis-visualizations",
3636
"redirect_document_id": false
3737
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/azure-monitor-app-hub.yml",
40+
"redirect_url": "/azure/azure-monitor/",
41+
"redirect_document_id": false
42+
},
3843
{
3944
"source_path_from_root": "/articles/azure-monitor/app/troubleshoot-portal-connectivity.md",
4045
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/troubleshoot-portal-connectivity",

.openpublishing.redirection.json

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3277,7 +3277,7 @@
32773277
"source_path_from_root": "/articles/app-service/scenario-secure-app-clean-up-resources.md",
32783278
"redirect_url": "/azure/app-service/scenario-secure-app-access-storage#clean-up-resources",
32793279
"redirect_document_id": false
3280-
},
3280+
},
32813281
{
32823282
"source_path_from_root": "/articles/app-service/quickstart-nodejs-uiex.md",
32833283
"redirect_url": "/azure/app-service/quickstart-nodejs",
@@ -18094,7 +18094,7 @@
1809418094
"redirect_document_id": true
1809518095
},
1809618096
{
18097-
"source_path_from_root": "/articles/lab-services/classroom-labs/tutorial-setup-classroom-lab.md",
18097+
"source_path_from_root": "/articles/lab-services/classroom-labs/tutorial-setup-classroom-lab.md",
1809818098
"redirect_url": "/azure/lab-services/tutorial-setup-classroom-lab",
1809918099
"redirect_document_id": true
1810018100
},
@@ -23375,7 +23375,7 @@
2337523375
},
2337623376
{
2337723377
"source_path_from_root": "/articles/app-service-web/sendgrid-dotnet-how-to-send-email.md",
23378-
"redirect_url": "/azure/sendgrid-dotnet-how-to-send-email",
23378+
"redirect_url": "https://docs.sendgrid.com/for-developers/partners/microsoft-azure-2021#create-a-twilio-sendgrid-account",
2337923379
"redirect_document_id": false
2338023380
},
2338123381
{
@@ -27108,6 +27108,11 @@
2710827108
"redirect_url": "/azure/vpn-gateway/monitor-vpn-gateway",
2710927109
"redirect_document_id": false
2711027110
},
27111+
{
27112+
"source_path_from_root": "/articles/vpn-gateway/point-to-site-vpn-client-configuration-radius.md",
27113+
"redirect_url": "/azure/vpn-gateway/point-to-site-vpn-client-configuration-radius-certificate",
27114+
"redirect_document_id": false
27115+
},
2711127116
{
2711227117
"source_path_from_root": "/articles/vpn-gateway/vpn-gateway-point-to-site-gateway-public-ca.md",
2711327118
"redirect_url": "/azure/vpn-gateway/point-to-site-about",
@@ -37030,12 +37035,7 @@
3703037035
},
3703137036
{
3703237037
"source_path_from_root": "/articles/cognitive-services/Speech-Service/how-to-customize-speech-models.md",
37033-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-custom-speech-train-model",
37034-
"redirect_document_id": false
37035-
},
37036-
{
37037-
"source_path_from_root": "/articles/cognitive-services/speech-service/how-to-custom-speech-deploy-model.md",
37038-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-custom-speech-train-model",
37038+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-custom-speech-choose-model",
3703937039
"redirect_document_id": false
3704037040
},
3704137041
{
@@ -38487,7 +38487,7 @@
3848738487
"source_path": "articles/aks/security-hardened-vm-host-image.md",
3848838488
"redirect_url": "/azure/aks/cis-ubuntu",
3848938489
"redirect_document_id": false
38490-
},
38490+
},
3849138491
{
3849238492
"source_path_from_root": "/articles/azure-monitor/platform/alerts-metric-create-templates.md",
3849338493
"redirect_url": "/azure/azure-monitor/alerts/alerts-metric-create-templates",

articles/active-directory-b2c/custom-domain.md

Lines changed: 95 additions & 117 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/identity-provider-google.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,9 +43,10 @@ To enable sign-in for users with a Google account in Azure Active Directory B2C
4343
1. In the upper-left corner of the page, select the project list, and then select **New Project**.
4444
1. Enter a **Project Name**, select **Create**.
4545
1. Make sure you are using the new project by selecting the project drop-down in the top-left of the screen. Select your project by name, then select **Open**.
46-
1. In the left menu, select **OAuth consent screen**, select **External**, and then select **Create**.
46+
1. In the left menu, select **APIs and services** and then **OAuth consent screen**. Select **External** and then select **Create**.
4747
1. Enter a **Name** for your application.
4848
1. Select a **User support email**.
49+
1. In the **App domain** section, enter a link to your **Application home page**, a link to your **Application privacy policy**, and a link to your **Application terms of service**.
4950
1. In the **Authorized domains** section, enter *b2clogin.com*.
5051
1. In the **Developer contact information** section, enter comma separated emails for Google to notify you about any changes to your project.
5152
1. Select **Save**.
@@ -199,4 +200,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
199200
- Check out the Google federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#google), and how to pass Google access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#google-with-access-token)
200201

201202

202-
::: zone-end
203+
::: zone-end
139 KB
Loading
139 KB
Loading

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 03/08/2022
4+
ms.date: 05/11/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/conditional-access/howto-conditional-access-apis.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,9 @@ Many of the following examples use tools like [Managed Identities](../managed-id
3131

3232
### PowerShell
3333

34+
> [!IMPORTANT]
35+
> Due to the planned deprecation of PowerShell modules (MSOL & AAD) after December 2022, no further updates are planned for these modules to support new Conditional Access features. See recent announcements for more information: https://aka.ms/AzureADPowerShellDeprecation. New Conditional Access features may not be available or may not be functional within these PowerShell modules as a result of this announcement. Please consider [migrating to Microsoft Graph PowerShell](https://aka.ms/MigrateMicrosoftGraphPowerShell). Additional guidance and examples will be released soon.
36+
3437
For many administrators, PowerShell is already an understood scripting tool. The following example shows how to use the [Azure AD PowerShell module](https://www.powershellgallery.com/packages/AzureAD) to manage Conditional Access policies.
3538

3639
- [Configure Conditional Access policies with Azure AD PowerShell commands](https://github.com/Azure-Samples/azure-ad-conditional-access-apis/tree/main/01-configure/powershell)

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,8 +77,8 @@ These claims are always included in v1.0 Azure AD tokens, but not included in v2
7777
|---------------|---------------------------------|-------------|-------|
7878
| `ipaddr` | IP Address | The IP address the client logged in from. | |
7979
| `onprem_sid` | On-Premises Security Identifier | | |
80-
| `pwd_exp` | Password Expiration Time | The datetime at which the password expires. | |
81-
| `pwd_url` | Change Password URL | A URL that the user can visit to change their password. | |
80+
| `pwd_exp` | Password Expiration Time | The number of seconds after the time in the iat claim at which the password expires. This claim is only included when the password is expiring soon (as defined by "notification days" in the password policy). | |
81+
| `pwd_url` | Change Password URL | A URL that the user can visit to change their password. This claim is only included when the password is expiring soon (as defined by "notification days" in the password policy). | |
8282
| `in_corp` | Inside Corporate Network | Signals if the client is logging in from the corporate network. If they're not, the claim isn't included. | Based off of the [trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips) settings in MFA. |
8383
| `family_name` | Last Name | Provides the last name, surname, or family name of the user as defined in the user object. <br>"family_name":"Miller" | Supported in MSA and Azure AD. Requires the `profile` scope. |
8484
| `given_name` | First name | Provides the first or "given" name of the user, as set on the user object.<br>"given_name": "Frank" | Supported in MSA and Azure AD. Requires the `profile` scope. |

articles/active-directory/develop/index-web-app.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,14 +42,20 @@ landingContent:
4242
url: tutorial-blazor-webassembly.md
4343
- text: Node.js with Express
4444
url: tutorial-v2-nodejs-webapp-msal.md
45-
- title: "Scenarios in depth"
45+
- title: "Web apps in depth"
4646
linkLists:
4747
- linkListType: how-to-guide
4848
links:
4949
- text: Web app that signs in users
5050
url: scenario-web-app-sign-user-overview.md
5151
- text: Web app that calls a web API
5252
url: scenario-web-app-call-api-overview.md
53+
- title: "Scenarios in depth"
54+
linkLists:
55+
- linkListType: tutorial
56+
links:
57+
- text: Secure web app accesses storage and Microsoft Graph
58+
url: multi-service-web-app-overview.md
5359
## ROW ################################################### ROW 2 ##
5460
# - title: $CARD_TITLE
5561
# linkLists:

0 commit comments

Comments
 (0)