Skip to content

Commit 7474d13

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into cmk-update
2 parents 689ce17 + e5d005c commit 7474d13

File tree

349 files changed

+2591
-1987
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

349 files changed

+2591
-1987
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -537,8 +537,6 @@
537537
href: partner-nok-nok.md
538538
- name: Transmit Security for passwordless
539539
href: partner-bindid.md
540-
- name: Transmit Security for risk detection
541-
href: partner-transmit-security.md
542540
- name: Trusona
543541
href: partner-trusona.md
544542
- name: Twilio
@@ -571,6 +569,8 @@
571569
- name: Microsoft Dynamics 365 Fraud Protection
572570
href: partner-dynamics-365-fraud-protection.md
573571
displayName: m365 dynamics, dynamics fraud protection, fraud, 365 protection
572+
- name: Transmit Security
573+
href: partner-transmit-security.md
574574
- name: Investigate risk with Identity Protection
575575
href: identity-protection-investigate-risk.md
576576
- name: Configure Conditional Access

articles/active-directory-b2c/identity-provider-generic-saml-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -422,7 +422,7 @@ Upon an application sign-out request, Azure AD B2C attempts to sign out from you
422422

423423
## Debug SAML protocol
424424

425-
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Microsoft Edge or IE Developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
425+
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Microsoft Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
426426

427427
Using these tools, you can check the integration between Azure AD B2C and your SAML identity provider. For example:
428428

articles/active-directory-b2c/page-layout.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
179179
- Added support for [display controls](display-controls.md) in custom policies.
180180

181181
**1.2.0**
182-
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer (IE) to properly save this information.
182+
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer to properly save this information.
183183
- Added a configurable user input validation delay for improved user experience.
184184
- Accessibility fixes
185185
- Fix an accessibility issue so that error messages are read by Narrator.
@@ -273,7 +273,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
273273
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your sign-in name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
274274

275275
**1.2.0**
276-
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer (IE) to properly save this information.
276+
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer to properly save this information.
277277
- Accessibility fixes
278278
- You can now add the `data-preload="true"` attribute [in your HTML tags](customize-ui-with-html.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
279279
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
@@ -313,7 +313,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
313313

314314
**1.2.7**
315315
- Fixed accessibility issue on label for retries code.
316-
- Fixed issue caused by incompatibility of default parameter on IE 11.
316+
- Fixed issue caused by incompatibility of default parameter on Internet Explorer 11.
317317
- Set up `H1` heading and enable by default.
318318
- Updated HandlebarJS version to 4.7.7.
319319

articles/active-directory-b2c/partner-transmit-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: yoelh
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 05/13/2024
9+
ms.date: 06/04/2024
1010
ms.author: yoelh
1111
ms.reviewer: kengaderdus
1212
ms.subservice: B2C
@@ -16,7 +16,7 @@ zone_pivot_groups: b2c-policy-type
1616
---
1717

1818

19-
# Configure Transmit Security with Azure Active Directory B2C for risk detection and prevention
19+
# Configure Transmit Security with Azure Active Directory B2C for Fraud Prevention
2020

2121
In this tutorial, learn to integrate Azure Active Directory B2C (Azure AD B2C) authentication with [Transmit Security's Detection and Response Services (DRS)](https://transmitsecurity.com/platform/detection-and-response). Transmit Security allows you to detect risk in customer interactions on digital channels, and to enable informed identity and trust decisions across the consumer experience.
2222

articles/active-directory-b2c/troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Use **Run now** and `https://jwt.ms` to test your policies independently of your
165165

166166
## Troubleshoot SAML protocol
167167

168-
To help configure and debug the integration with your service provider, you can use a browser extension for the SAML protocol, for example, [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Edge or IE Developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
168+
To help configure and debug the integration with your service provider, you can use a browser extension for the SAML protocol, for example, [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
169169

170170
The following screenshot demonstrates how the SAML DevTools extension presents the SAML request Azure AD B2C sends to the identity provider, and the SAML response.
171171

articles/ai-services/Anomaly-Detector/How-to/deploy-anomaly-detection-on-container-instances.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Learn how to deploy the Azure AI services [Anomaly Detector](../anomaly-detector
2424

2525
[!INCLUDE [Create an Anomaly Detector container on Azure Container Instances](../../containers/includes/create-container-instances-resource-from-azure-cli.md)]
2626

27-
[!INCLUDE [API documentation](../../../../includes/cognitive-services-containers-api-documentation.md)]
27+
[!INCLUDE [API documentation](../../includes/cognitive-services-containers-api-documentation.md)]
2828

2929
## Next steps
3030

articles/ai-services/Anomaly-Detector/How-to/deploy-anomaly-detection-on-iot-edge.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ There are several ways to validate that the module is running. Locate the *Exter
8484
| `http://<your-edge-device-ipaddress>:5000/status` | Also requested with GET, this verifies if the api-key used to start the container is valid without causing an endpoint query. This request can be used for Kubernetes [liveness and readiness probes](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/). |
8585
| `http://<your-edge-device-ipaddress>:5000/swagger` | The container provides a full set of documentation for the endpoints and a **Try it out** feature. With this feature, you can enter your settings into a web-based HTML form and make the query without having to write any code. After the query returns, an example CURL command is provided to demonstrate the HTTP headers and body format that's required. |
8686

87-
![Container's home page](../../../../includes/media/cognitive-services-containers-api-documentation/container-webpage.png)
87+
![Container's home page](../../media/container-webpage.png)
8888

8989
## Next steps
9090

articles/ai-services/Anomaly-Detector/anomaly-detector-container-configuration.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This setting can be found in the following place:
4545

4646
## ApplicationInsights setting
4747

48-
[!INCLUDE [Container shared configuration ApplicationInsights settings](../../../includes/cognitive-services-containers-configuration-shared-settings-application-insights.md)]
48+
[!INCLUDE [Container shared configuration ApplicationInsights settings](../includes/cognitive-services-containers-configuration-shared-settings-application-insights.md)]
4949

5050
## Billing configuration setting
5151

@@ -61,19 +61,19 @@ This setting can be found in the following place:
6161

6262
## Eula setting
6363

64-
[!INCLUDE [Container shared configuration eula settings](../../../includes/cognitive-services-containers-configuration-shared-settings-eula.md)]
64+
[!INCLUDE [Container shared configuration eula settings](../includes/cognitive-services-containers-configuration-shared-settings-eula.md)]
6565

6666
## Fluentd settings
6767

68-
[!INCLUDE [Container shared configuration fluentd settings](../../../includes/cognitive-services-containers-configuration-shared-settings-fluentd.md)]
68+
[!INCLUDE [Container shared configuration fluentd settings](../includes/cognitive-services-containers-configuration-shared-settings-fluentd.md)]
6969

7070
## Http proxy credentials settings
7171

72-
[!INCLUDE [Container shared configuration fluentd settings](../../../includes/cognitive-services-containers-configuration-shared-settings-http-proxy.md)]
72+
[!INCLUDE [Container shared configuration fluentd settings](../includes/cognitive-services-containers-configuration-shared-settings-http-proxy.md)]
7373

7474
## Logging settings
7575

76-
[!INCLUDE [Container shared configuration logging settings](../../../includes/cognitive-services-containers-configuration-shared-settings-logging.md)]
76+
[!INCLUDE [Container shared configuration logging settings](../includes/cognitive-services-containers-configuration-shared-settings-logging.md)]
7777

7878

7979
## Mount settings
@@ -103,7 +103,7 @@ Replace value in brackets, `{}`, with your own values:
103103
| **{API_KEY}** | The endpoint key of the `Anomaly Detector` resource on the Azure `Anomaly Detector` Keys page. | `xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx` |
104104
| **{ENDPOINT_URI}** | The billing endpoint value is available on the Azure `Anomaly Detector` Overview page.| See [gather required parameters](anomaly-detector-container-howto.md#gather-required-parameters) for explicit examples. |
105105

106-
[!INCLUDE [subdomains-note](../../../includes/cognitive-services-custom-subdomains-note.md)]
106+
[!INCLUDE [subdomains-note](../includes/cognitive-services-custom-subdomains-note.md)]
107107

108108
> [!IMPORTANT]
109109
> The `Eula`, `Billing`, and `ApiKey` options must be specified to run the container; otherwise, the container won't start. For more information, see [Billing](anomaly-detector-container-howto.md#billing).

articles/ai-services/Anomaly-Detector/anomaly-detector-container-howto.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ You must meet the following prerequisites before using Anomaly Detector containe
4646

4747
## The host computer
4848

49-
[!INCLUDE [Host Computer requirements](../../../includes/cognitive-services-containers-host-computer.md)]
49+
[!INCLUDE [Host Computer requirements](../includes/cognitive-services-containers-host-computer.md)]
5050

5151
<!--* [Azure IoT Edge](../../iot-edge/index.yml). For instructions of deploying Anomaly Detector module in IoT Edge, see [How to deploy Anomaly Detector module in IoT Edge](how-to-deploy-anomaly-detector-module-in-iot-edge.md).-->
5252

@@ -81,7 +81,7 @@ Use the [`docker pull`](https://docs.docker.com/engine/reference/commandline/pul
8181
<!--
8282
For a full description of available tags, such as `latest` used in the preceding command, see [anomaly-detector](https://go.microsoft.com/fwlink/?linkid=2083827&clcid=0x409) on Docker Hub.
8383
-->
84-
[!INCLUDE [Tip for using docker list](../../../includes/cognitive-services-containers-docker-list-tip.md)]
84+
[!INCLUDE [Tip for using docker list](../includes/cognitive-services-containers-docker-list-tip.md)]
8585

8686
### Docker pull for the Anomaly Detector container
8787

@@ -157,11 +157,11 @@ Use the host, http://localhost:5000, for container APIs.
157157

158158
<!-- ## Validate container is running -->
159159

160-
[!INCLUDE [Container API documentation](../../../includes/cognitive-services-containers-api-documentation.md)]
160+
[!INCLUDE [Container API documentation](../includes/cognitive-services-containers-api-documentation.md)]
161161

162162
## Stop the container
163163

164-
[!INCLUDE [How to stop the container](../../../includes/cognitive-services-containers-stop.md)]
164+
[!INCLUDE [How to stop the container](../includes/cognitive-services-containers-stop.md)]
165165

166166
## Troubleshooting
167167

@@ -176,7 +176,7 @@ If you run the container with an output [mount](anomaly-detector-container-confi
176176

177177
The Anomaly Detector containers send billing information to Azure, using an _Anomaly Detector_ resource on your Azure account.
178178

179-
[!INCLUDE [Container's Billing Settings](../../../includes/cognitive-services-containers-how-to-billing-info.md)]
179+
[!INCLUDE [Container's Billing Settings](../includes/cognitive-services-containers-how-to-billing-info.md)]
180180

181181
For more information about these options, see [Configure containers](anomaly-detector-container-configuration.md).
182182

articles/ai-services/Anomaly-Detector/tutorials/batch-anomaly-detection-powerbi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ In this tutorial, you'll learn how to:
3131
* Once you have your Azure subscription, <a href="https://portal.azure.com/#create/Microsoft.CognitiveServicesAnomalyDetector" title="Create an Anomaly Detector resource" target="_blank">create an Anomaly Detector resource </a> in the Azure portal to get your key and endpoint.
3232
* You will need the key and endpoint from the resource you create to connect your application to the Anomaly Detector API. You'll do this later in the quickstart.
3333

34-
[!INCLUDE [cognitive-services-anomaly-detector-data-requirements](../../../../includes/cognitive-services-anomaly-detector-data-requirements.md)]
34+
[!INCLUDE [cognitive-services-anomaly-detector-data-requirements](../../includes/cognitive-services-anomaly-detector-data-requirements.md)]
3535

3636
## Load and format the time series data
3737

0 commit comments

Comments
 (0)