Skip to content

Commit 6b6cb2a

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ipv6ds-add-portal
2 parents 34bfed7 + 6d7ad79 commit 6b6cb2a

File tree

3,267 files changed

+28377
-16402
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,267 files changed

+28377
-16402
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -990,6 +990,7 @@
990990
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
991991
"articles/azure-relay/.openpublishing.redirection.relay.json",
992992
"articles/communication-services/.openpublishing.redirection.communication-services.json",
993+
"articles/confidential-computing/.openpublishing.redirection.json",
993994
"articles/cosmos-db/.openpublishing.redirection.cosmos-db.json",
994995
"articles/cost-management-billing/.openpublishing.redirection.cost-management-billing.json",
995996
"articles/data-catalog/.openpublishing.redirection.data-catalog.json",

.openpublishing.redirection.active-directory.json

Lines changed: 24 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,16 @@
3030
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path_from_root": "/articles/active-directory/saas-apps/facebook-work-accounts-tutorial.md",
35+
"redirect_url": "/azure/active-directory/saas-apps/meta-work-accounts-tutorial",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/active-directory/saas-apps/netmotion-mobility-tutorial.md",
40+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
41+
"redirect_document_id": false
42+
},
3343
{
3444
"source_path_from_root": "/articles/active-directory/fundamentals/whats-new-microsoft-365-government.md",
3545
"redirect_url": "/azure/active-directory/fundamentals/whats-new",
@@ -57,7 +67,7 @@
5767
},
5868
{
5969
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-create-trust-github.md",
60-
"redirect_url":"/azure/active-directory/develop/workload-identity-federation-create-trust",
70+
"redirect_url": "/azure/active-directory/develop/workload-identity-federation-create-trust",
6171
"redirect_document_id": false
6272
},
6373
{
@@ -2038,7 +2048,7 @@
20382048
{
20392049
"source_path_from_root": "/articles/active-directory/conditional-access/conditional-access-for-exo-and-spo.md",
20402050
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
2041-
"redirect_document_id": true
2051+
"redirect_document_id": false
20422052
},
20432053
{
20442054
"source_path_from_root": "/articles/active-directory/conditional-access/baseline-protection.md",
@@ -2800,7 +2810,7 @@
28002810
"redirect_url": "/azure/active-directory/develop/howto-authenticate-service-principal-powershell",
28012811
"redirect_document_id": false
28022812
},
2803-
2813+
28042814
{
28052815
"source_path_from_root": "/articles/active-directory/develop/active-directory-devhowto-multi-tenant-overview.md",
28062816
"redirect_url": "/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant",
@@ -4253,7 +4263,12 @@
42534263
},
42544264
{
42554265
"source_path_from_root": "/articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md",
4256-
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication",
4266+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
4267+
"redirect_document_id": false
4268+
},
4269+
{
4270+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication.md",
4271+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
42574272
"redirect_document_id": true
42584273
},
42594274
{
@@ -10835,6 +10850,11 @@
1083510850
"source_path_from_root": "/articles/active-directory/manage-apps/recover-deleted-apps-faq.md",
1083610851
"redirect_url": "/azure/active-directory/manage-apps/delete-recover-faq",
1083710852
"redirect_document_id": false
10853+
},
10854+
{
10855+
"source_path_from_root": "/articles/azure-percept/voice-control-your-inventory-then-visualize-with-power-bi-dashboard.md",
10856+
"redirect_url": "/azure-docs/articles/azure-percept/index.yml",
10857+
"redirect_document_id": false
1083810858
}
1083910859

1084010860

.openpublishing.redirection.json

Lines changed: 35 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,11 @@
3030
"redirect_url": "/previous-versions/azure/germany/germany-get-started-connect-with-ps",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path": "articles/security/fundamentals/azure-disk-encryption-vms-vmss.md",
35+
"redirect_url": "/azure/virtual-machines/disk-encryption-overview",
36+
"redirect_document_id": false
37+
},
3338
{
3439
"source_path": "articles/germany/germany-get-started-connect-with-vs.md",
3540
"redirect_url": "/previous-versions/azure/germany/germany-get-started-connect-with-vs",
@@ -6808,6 +6813,11 @@
68086813
"redirect_url": "/azure/azure-functions/functions-bindings-error-pages",
68096814
"redirect_document_id": false
68106815
},
6816+
{
6817+
"source_path_from_root": "/articles/azure-functions/functions-debug-event-grid-trigger-local.md",
6818+
"redirect_url": "/azure/azure-functions/functions-event-grid-blob-trigger",
6819+
"redirect_document_id": false
6820+
},
68116821
{
68126822
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
68136823
"redirect_url": "/azure/azure-government",
@@ -12848,6 +12858,16 @@
1284812858
"redirect_url": "/azure/cloudfoundry/cloudfoundry-deploy-your-first-app",
1284912859
"redirect_document_id": true
1285012860
},
12861+
{
12862+
"source_path_from_root": "/articles/virtual-machines/linux/overview.md",
12863+
"redirect_url": "/azure/virtual-machines/overview",
12864+
"redirect_document_id": true
12865+
},
12866+
{
12867+
"source_path_from_root": "/articles/virtual-machines/windows/overview.md",
12868+
"redirect_url": "/azure/virtual-machines/overview",
12869+
"redirect_document_id": false
12870+
},
1285112871
{
1285212872
"source_path_from_root": "/articles/virtual-machines/linux/cloudfoundry-get-started.md",
1285312873
"redirect_url": "/azure/cloudfoundry/cloudfoundry-get-started",
@@ -18304,14 +18324,19 @@
1830418324
"redirect_document_id": false
1830518325
},
1830618326
{
18307-
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
18327+
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
1830818328
"redirect_url": "/connectors/bingsearch",
18309-
"redirect_document_id": false
18329+
"redirect_document_id": false
1831018330
},
1831118331
{
18312-
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18313-
"redirect_url": "/connectors/twilio",
18314-
"redirect_document_id": false
18332+
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18333+
"redirect_url": "/connectors/twilio",
18334+
"redirect_document_id": false
18335+
},
18336+
{
18337+
"source_path_from_root": "/articles/connectors/connectors-create-api-sendgrid.md",
18338+
"redirect_url": "/connectors/sendgrid",
18339+
"redirect_document_id": false
1831518340
},
1831618341
{
1831718342
"source_path_from_root": "/articles/connectors/connectors-schema-migration.md",
@@ -34202,6 +34227,11 @@
3420234227
"source_path_from_root": "/articles/virtual-machines/windows/winrm.md",
3420334228
"redirect_url": "/azure/virtual-machines/windows/connect-winrm",
3420434229
"redirect_document_id": false
34230+
},
34231+
{
34232+
"source_path_from_root": "/articles/virtual-machines/linux/copy-files-to-linux-vm-using-scp.md",
34233+
"redirect_url": "/azure/virtual-machines/copy-files-to-vm-using-scp",
34234+
"redirect_document_id": false
3420534235
}
3420634236
]
3420734237
}

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@
355355
items:
356356
- name: Multi-factor authentication
357357
href: multi-factor-authentication.md
358-
displayName: TOTP, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
358+
displayName: TOTP, multi-factor, multifactor, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
359359
- name: Partner integration
360360
items:
361361
- name: Asignio

articles/active-directory-b2c/configure-authentication-in-azure-static-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 06/28/2022
10+
ms.date: 08/22/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -30,7 +30,7 @@ OpenID Connect (OIDC) is an authentication protocol that's built on OAuth 2.0. U
3030
When the access token expires or the app session is invalidated, Azure Static Web App initiates a new authentication request and redirects users to Azure AD B2C. If the Azure AD B2C [SSO session](session-behavior.md) is active, Azure AD B2C issues an access token without prompting users to sign in again. If the Azure AD B2C session expires or becomes invalid, users are prompted to sign in again.
3131

3232
## Prerequisites
33-
33+
- A premium Azure subscription.
3434
- If you haven't created an app yet, follow the guidance how to create an [Azure Static Web App](../static-web-apps/overview.md).
3535
- Familiarize yourself with the Azure Static Web App [staticwebapp.config.json](../static-web-apps/configuration.md) configuration file.
3636
- Familiarize yourself with the Azure Static Web App [App Settings](../static-web-apps/application-settings.md).

articles/active-directory-b2c/json-transformations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ The following example generates a JSON string based on the claim value of "email
152152
<InputClaims>
153153
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.to.0.email" />
154154
<InputClaim ClaimTypeReferenceId="otp" TransformationClaimType="personalizations.0.dynamic_template_data.otp" />
155-
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
155+
<InputClaim ClaimTypeReferenceId="copiedEmail" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
156156
</InputClaims>
157157
<InputParameters>
158158
<InputParameter Id="template_id" DataType="string" Value="d-4c56ffb40fa648b1aa6822283df94f60"/>
@@ -169,6 +169,7 @@ The following claims transformation outputs a JSON string claim that will be the
169169

170170
- Input claims:
171171
- **email**, transformation claim type **personalizations.0.to.0.email**: "[email protected]"
172+
- **copiedEmail**, transformation claim type **personalizations.0.dynamic_template_data.verify-email**: "[email protected]"
172173
- **otp**, transformation claim type **personalizations.0.dynamic_template_data.otp** "346349"
173174
- Input parameter:
174175
- **template_id**: "d-4c56ffb40fa648b1aa6822283df94f60"

articles/active-directory-b2c/openid-connect.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/12/2022
11+
ms.date: 08/12/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -43,7 +43,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
4343
&response_type=code+id_token
4444
&redirect_uri=https%3A%2F%2Fjwt.ms%2F
4545
&response_mode=fragment
46-
&scope=&scope=openid%20offline_access%20{application-id-uri}/{scope-name}
46+
&scope=openid%20offline_access%20{application-id-uri}/{scope-name}
4747
&state=arbitrary_data_you_can_receive_in_the_response
4848
&nonce=12345
4949
```

articles/active-directory-b2c/user-flow-custom-attributes.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,12 @@ You can create these attributes by using the portal UI before or after you use t
143143

144144
|Name |Used in |
145145
|---------|---------|
146-
|`extension_loyaltyId` | Custom policy|
146+
|`extension_loyaltyId` | Custom policy|
147147
|`extension_<b2c-extensions-app-guid>_loyaltyId` | [Microsoft Graph API](microsoft-graph-operations.md#application-extension-directory-extension-properties)|
148148

149+
> [!NOTE]
150+
> When using a custom attribute in custom policies, you must prefix the claim type ID with `extension_` to allow the correct data mapping to take place within the Azure AD B2C directory.
151+
149152
The following example demonstrates the use of custom attributes in an Azure AD B2C custom policy claim definition.
150153

151154
```xml

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,8 @@
8383
href: manage-dns.md
8484
- name: Check health status
8585
href: check-health.md
86+
- name: Fleet metrics
87+
href: fleet-metrics.md
8688
- name: Configure email notifications
8789
href: notifications.md
8890
- name: Delete a managed domain

articles/active-directory-domain-services/administration-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Management concepts for Azure AD Domain Services | Microsoft Docs
33
description: Learn about how to administer an Azure Active Directory Domain Services managed domain and the behavior of user accounts and passwords
44
services: active-directory-ds
55
author: justinha
6-
manager: karenhoran
6+
manager: amycolannino
77

88
ms.service: active-directory
99
ms.subservice: domain-services

0 commit comments

Comments
 (0)