Skip to content

Commit 6ddd6d1

Browse files
committed
Resolved conflict
2 parents a813c02 + 6aded2a commit 6ddd6d1

File tree

3,631 files changed

+30752
-16926
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,631 files changed

+30752
-16926
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,11 @@
3030
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path_from_root": "/articles/active-directory/saas-apps/netmotion-mobility-tutorial.md",
35+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
36+
"redirect_document_id": false
37+
},
3338
{
3439
"source_path_from_root": "/articles/active-directory/fundamentals/whats-new-microsoft-365-government.md",
3540
"redirect_url": "/azure/active-directory/fundamentals/whats-new",
@@ -57,7 +62,7 @@
5762
},
5863
{
5964
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-create-trust-github.md",
60-
"redirect_url":"/azure/active-directory/develop/workload-identity-federation-create-trust",
65+
"redirect_url": "/azure/active-directory/develop/workload-identity-federation-create-trust",
6166
"redirect_document_id": false
6267
},
6368
{
@@ -2038,7 +2043,7 @@
20382043
{
20392044
"source_path_from_root": "/articles/active-directory/conditional-access/conditional-access-for-exo-and-spo.md",
20402045
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
2041-
"redirect_document_id": true
2046+
"redirect_document_id": false
20422047
},
20432048
{
20442049
"source_path_from_root": "/articles/active-directory/conditional-access/baseline-protection.md",
@@ -2800,7 +2805,7 @@
28002805
"redirect_url": "/azure/active-directory/develop/howto-authenticate-service-principal-powershell",
28012806
"redirect_document_id": false
28022807
},
2803-
2808+
28042809
{
28052810
"source_path_from_root": "/articles/active-directory/develop/active-directory-devhowto-multi-tenant-overview.md",
28062811
"redirect_url": "/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant",
@@ -4253,7 +4258,12 @@
42534258
},
42544259
{
42554260
"source_path_from_root": "/articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md",
4256-
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication",
4261+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
4262+
"redirect_document_id": false
4263+
},
4264+
{
4265+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication.md",
4266+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
42574267
"redirect_document_id": true
42584268
},
42594269
{

.openpublishing.redirection.json

Lines changed: 42 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,11 @@
3030
"redirect_url": "/previous-versions/azure/germany/germany-get-started-connect-with-ps",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path": "articles/security/fundamentals/azure-disk-encryption-vms-vmss.md",
35+
"redirect_url": "/azure/virtual-machines/disk-encryption-overview",
36+
"redirect_document_id": false
37+
},
3338
{
3439
"source_path": "articles/germany/germany-get-started-connect-with-vs.md",
3540
"redirect_url": "/previous-versions/azure/germany/germany-get-started-connect-with-vs",
@@ -5788,6 +5793,11 @@
57885793
"redirect_url": "/azure/automation/manage-run-as-account",
57895794
"redirect_document_id": false
57905795
},
5796+
{
5797+
"source_path_from_root": "/articles/automation/quickstarts/create-account-portal.md",
5798+
"redirect_url": "/azure/automation/create-azure-automation-account-portal",
5799+
"redirect_document_id": false
5800+
},
57915801
{
57925802
"source_path_from_root": "/articles/best-practices-availability-paired-regions.md",
57935803
"redirect_url": "/azure/availability-zones/cross-region-replication-azure",
@@ -12843,6 +12853,16 @@
1284312853
"redirect_url": "/azure/cloudfoundry/cloudfoundry-deploy-your-first-app",
1284412854
"redirect_document_id": true
1284512855
},
12856+
{
12857+
"source_path_from_root": "/articles/virtual-machines/linux/overview.md",
12858+
"redirect_url": "/azure/virtual-machines/overview",
12859+
"redirect_document_id": true
12860+
},
12861+
{
12862+
"source_path_from_root": "/articles/virtual-machines/windows/overview.md",
12863+
"redirect_url": "/azure/virtual-machines/overview",
12864+
"redirect_document_id": false
12865+
},
1284612866
{
1284712867
"source_path_from_root": "/articles/virtual-machines/linux/cloudfoundry-get-started.md",
1284812868
"redirect_url": "/azure/cloudfoundry/cloudfoundry-get-started",
@@ -18299,9 +18319,24 @@
1829918319
"redirect_document_id": false
1830018320
},
1830118321
{
18302-
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
18322+
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
1830318323
"redirect_url": "/connectors/bingsearch",
18304-
"redirect_document_id": false
18324+
"redirect_document_id": false
18325+
},
18326+
{
18327+
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18328+
"redirect_url": "/connectors/twilio",
18329+
"redirect_document_id": false
18330+
},
18331+
{
18332+
"source_path_from_root": "/articles/connectors/connectors-create-api-sendgrid.md",
18333+
"redirect_url": "/connectors/sendgrid",
18334+
"redirect_document_id": false
18335+
},
18336+
{
18337+
"source_path_from_root": "/articles/connectors/connectors-schema-migration.md",
18338+
"redirect_url": "/azure/logic-apps/update-consumption-workflow-schema",
18339+
"redirect_document_id": false
1830518340
},
1830618341
{
1830718342
"source_path_from_root": "/articles/logic-apps/logic-apps-scenario-error-and-exception-handling.md",
@@ -34187,6 +34222,11 @@
3418734222
"source_path_from_root": "/articles/virtual-machines/windows/winrm.md",
3418834223
"redirect_url": "/azure/virtual-machines/windows/connect-winrm",
3418934224
"redirect_document_id": false
34225+
},
34226+
{
34227+
"source_path_from_root": "/articles/virtual-machines/linux/copy-files-to-linux-vm-using-scp.md",
34228+
"redirect_url": "/azure/virtual-machines/copy-files-to-vm-using-scp",
34229+
"redirect_document_id": false
3419034230
}
3419134231
]
3419234232
}

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@
355355
items:
356356
- name: Multi-factor authentication
357357
href: multi-factor-authentication.md
358-
displayName: TOTP, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
358+
displayName: TOTP, multi-factor, multifactor, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
359359
- name: Partner integration
360360
items:
361361
- name: Asignio

articles/active-directory-b2c/configure-authentication-in-azure-static-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 06/28/2022
10+
ms.date: 08/22/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -30,7 +30,7 @@ OpenID Connect (OIDC) is an authentication protocol that's built on OAuth 2.0. U
3030
When the access token expires or the app session is invalidated, Azure Static Web App initiates a new authentication request and redirects users to Azure AD B2C. If the Azure AD B2C [SSO session](session-behavior.md) is active, Azure AD B2C issues an access token without prompting users to sign in again. If the Azure AD B2C session expires or becomes invalid, users are prompted to sign in again.
3131

3232
## Prerequisites
33-
33+
- A premium Azure subscription.
3434
- If you haven't created an app yet, follow the guidance how to create an [Azure Static Web App](../static-web-apps/overview.md).
3535
- Familiarize yourself with the Azure Static Web App [staticwebapp.config.json](../static-web-apps/configuration.md) configuration file.
3636
- Familiarize yourself with the Azure Static Web App [App Settings](../static-web-apps/application-settings.md).

articles/active-directory-b2c/json-transformations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ The following example generates a JSON string based on the claim value of "email
152152
<InputClaims>
153153
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.to.0.email" />
154154
<InputClaim ClaimTypeReferenceId="otp" TransformationClaimType="personalizations.0.dynamic_template_data.otp" />
155-
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
155+
<InputClaim ClaimTypeReferenceId="copiedEmail" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
156156
</InputClaims>
157157
<InputParameters>
158158
<InputParameter Id="template_id" DataType="string" Value="d-4c56ffb40fa648b1aa6822283df94f60"/>
@@ -169,6 +169,7 @@ The following claims transformation outputs a JSON string claim that will be the
169169

170170
- Input claims:
171171
- **email**, transformation claim type **personalizations.0.to.0.email**: "[email protected]"
172+
- **copiedEmail**, transformation claim type **personalizations.0.dynamic_template_data.verify-email**: "[email protected]"
172173
- **otp**, transformation claim type **personalizations.0.dynamic_template_data.otp** "346349"
173174
- Input parameter:
174175
- **template_id**: "d-4c56ffb40fa648b1aa6822283df94f60"

articles/active-directory-b2c/openid-connect.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/12/2022
11+
ms.date: 08/12/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -43,7 +43,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
4343
&response_type=code+id_token
4444
&redirect_uri=https%3A%2F%2Fjwt.ms%2F
4545
&response_mode=fragment
46-
&scope=&scope=openid%20offline_access%20{application-id-uri}/{scope-name}
46+
&scope=openid%20offline_access%20{application-id-uri}/{scope-name}
4747
&state=arbitrary_data_you_can_receive_in_the_response
4848
&nonce=12345
4949
```

articles/active-directory-b2c/user-flow-custom-attributes.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,12 @@ You can create these attributes by using the portal UI before or after you use t
143143

144144
|Name |Used in |
145145
|---------|---------|
146-
|`extension_loyaltyId` | Custom policy|
146+
|`extension_loyaltyId` | Custom policy|
147147
|`extension_<b2c-extensions-app-guid>_loyaltyId` | [Microsoft Graph API](microsoft-graph-operations.md#application-extension-directory-extension-properties)|
148148

149+
> [!NOTE]
150+
> When using a custom attribute in custom policies, you must prefix the claim type ID with `extension_` to allow the correct data mapping to take place within the Azure AD B2C directory.
151+
149152
The following example demonstrates the use of custom attributes in an Azure AD B2C custom policy claim definition.
150153

151154
```xml

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,8 @@
8383
href: manage-dns.md
8484
- name: Check health status
8585
href: check-health.md
86+
- name: Fleet metrics
87+
href: fleet-metrics.md
8688
- name: Configure email notifications
8789
href: notifications.md
8890
- name: Delete a managed domain

articles/active-directory-domain-services/concepts-migration-benefits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 05/26/2020
12+
ms.date: 08/17/2022
1313
ms.author: justinha
1414
---
1515

articles/active-directory-domain-services/concepts-replica-sets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/30/2021
12+
ms.date: 08/17/2022
1313
ms.author: justinha
1414
---
1515

0 commit comments

Comments
 (0)