Skip to content

Commit 789ee29

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into davidbel-37836863-passwordless-preview
2 parents 628af37 + b9bfa3a commit 789ee29

File tree

1,258 files changed

+13457
-8249
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,258 files changed

+13457
-8249
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -990,6 +990,7 @@
990990
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
991991
"articles/azure-relay/.openpublishing.redirection.relay.json",
992992
"articles/communication-services/.openpublishing.redirection.communication-services.json",
993+
"articles/confidential-computing/.openpublishing.redirection.json",
993994
"articles/cosmos-db/.openpublishing.redirection.cosmos-db.json",
994995
"articles/cost-management-billing/.openpublishing.redirection.cost-management-billing.json",
995996
"articles/data-catalog/.openpublishing.redirection.data-catalog.json",

.openpublishing.redirection.active-directory.json

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,11 @@
3030
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path_from_root": "/articles/active-directory/saas-apps/facebook-work-accounts-tutorial.md",
35+
"redirect_url": "/azure/active-directory/saas-apps/meta-work-accounts-tutorial",
36+
"redirect_document_id": false
37+
},
3338
{
3439
"source_path_from_root": "/articles/active-directory/saas-apps/netmotion-mobility-tutorial.md",
3540
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
@@ -2043,7 +2048,7 @@
20432048
{
20442049
"source_path_from_root": "/articles/active-directory/conditional-access/conditional-access-for-exo-and-spo.md",
20452050
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
2046-
"redirect_document_id": true
2051+
"redirect_document_id": false
20472052
},
20482053
{
20492054
"source_path_from_root": "/articles/active-directory/conditional-access/baseline-protection.md",
@@ -4258,7 +4263,12 @@
42584263
},
42594264
{
42604265
"source_path_from_root": "/articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md",
4261-
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication",
4266+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
4267+
"redirect_document_id": false
4268+
},
4269+
{
4270+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication.md",
4271+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
42624272
"redirect_document_id": true
42634273
},
42644274
{
@@ -10840,6 +10850,11 @@
1084010850
"source_path_from_root": "/articles/active-directory/manage-apps/recover-deleted-apps-faq.md",
1084110851
"redirect_url": "/azure/active-directory/manage-apps/delete-recover-faq",
1084210852
"redirect_document_id": false
10853+
},
10854+
{
10855+
"source_path_from_root": "/articles/azure-percept/voice-control-your-inventory-then-visualize-with-power-bi-dashboard.md",
10856+
"redirect_url": "/azure-docs/articles/azure-percept/index.yml",
10857+
"redirect_document_id": false
1084310858
}
1084410859

1084510860

.openpublishing.redirection.json

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6813,6 +6813,11 @@
68136813
"redirect_url": "/azure/azure-functions/functions-bindings-error-pages",
68146814
"redirect_document_id": false
68156815
},
6816+
{
6817+
"source_path_from_root": "/articles/azure-functions/functions-debug-event-grid-trigger-local.md",
6818+
"redirect_url": "/azure/azure-functions/functions-event-grid-blob-trigger",
6819+
"redirect_document_id": false
6820+
},
68166821
{
68176822
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
68186823
"redirect_url": "/azure/azure-government",
@@ -18319,14 +18324,19 @@
1831918324
"redirect_document_id": false
1832018325
},
1832118326
{
18322-
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
18327+
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
1832318328
"redirect_url": "/connectors/bingsearch",
18324-
"redirect_document_id": false
18329+
"redirect_document_id": false
1832518330
},
1832618331
{
18327-
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18328-
"redirect_url": "/connectors/twilio",
18329-
"redirect_document_id": false
18332+
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18333+
"redirect_url": "/connectors/twilio",
18334+
"redirect_document_id": false
18335+
},
18336+
{
18337+
"source_path_from_root": "/articles/connectors/connectors-create-api-sendgrid.md",
18338+
"redirect_url": "/connectors/sendgrid",
18339+
"redirect_document_id": false
1833018340
},
1833118341
{
1833218342
"source_path_from_root": "/articles/connectors/connectors-schema-migration.md",

articles/active-directory-b2c/configure-authentication-in-azure-static-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 06/28/2022
10+
ms.date: 08/22/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -30,7 +30,7 @@ OpenID Connect (OIDC) is an authentication protocol that's built on OAuth 2.0. U
3030
When the access token expires or the app session is invalidated, Azure Static Web App initiates a new authentication request and redirects users to Azure AD B2C. If the Azure AD B2C [SSO session](session-behavior.md) is active, Azure AD B2C issues an access token without prompting users to sign in again. If the Azure AD B2C session expires or becomes invalid, users are prompted to sign in again.
3131

3232
## Prerequisites
33-
33+
- A premium Azure subscription.
3434
- If you haven't created an app yet, follow the guidance how to create an [Azure Static Web App](../static-web-apps/overview.md).
3535
- Familiarize yourself with the Azure Static Web App [staticwebapp.config.json](../static-web-apps/configuration.md) configuration file.
3636
- Familiarize yourself with the Azure Static Web App [App Settings](../static-web-apps/application-settings.md).

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,8 @@
8383
href: manage-dns.md
8484
- name: Check health status
8585
href: check-health.md
86+
- name: Fleet metrics
87+
href: fleet-metrics.md
8688
- name: Configure email notifications
8789
href: notifications.md
8890
- name: Delete a managed domain

articles/active-directory-domain-services/administration-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Management concepts for Azure AD Domain Services | Microsoft Docs
33
description: Learn about how to administer an Azure Active Directory Domain Services managed domain and the behavior of user accounts and passwords
44
services: active-directory-ds
55
author: justinha
6-
manager: karenhoran
6+
manager: amycolannino
77

88
ms.service: active-directory
99
ms.subservice: domain-services

articles/active-directory-domain-services/alert-ldaps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Resolve secure LDAP alerts in Azure AD Domain Services | Microsoft Docs
33
description: Learn how to troubleshoot and resolve common alerts with secure LDAP for Azure Active Directory Domain Services.
44
services: active-directory-ds
55
author: justinha
6-
manager: karenhoran
6+
manager: amycolannino
77

88
ms.assetid: 81208c0b-8d41-4f65-be15-42119b1b5957
99
ms.service: active-directory

articles/active-directory-domain-services/alert-nsg.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Resolve network security group alerts in Azure AD DS | Microsoft Docs
33
description: Learn how to troubleshoot and resolve network security group configuration alerts for Azure Active Directory Domain Services
44
services: active-directory-ds
55
author: justinha
6-
manager: karenhoran
6+
manager: amycolannino
77

88
ms.assetid: 95f970a7-5867-4108-a87e-471fa0910b8c
99
ms.service: active-directory

articles/active-directory-domain-services/alert-service-principal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Resolve service principal alerts in Azure AD Domain Services | Microsoft
33
description: Learn how to troubleshoot service principal configuration alerts for Azure Active Directory Domain Services
44
services: active-directory-ds
55
author: justinha
6-
manager: karenhoran
6+
manager: amycolannino
77

88
ms.assetid: f168870c-b43a-4dd6-a13f-5cfadc5edf2c
99
ms.service: active-directory

articles/active-directory-domain-services/change-sku.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Change the SKU for an Azure AD Domain Services | Microsoft Docs
33
description: Learn how to the SKU tier for an Azure AD Domain Services managed domain if your business requirements change
44
services: active-directory-ds
55
author: justinha
6-
manager: karenhoran
6+
manager: amycolannino
77

88
ms.service: active-directory
99
ms.subservice: domain-services

0 commit comments

Comments
 (0)