Skip to content

Commit 7951384

Browse files
committed
merge
2 parents 3f5c3bd + 054eaa3 commit 7951384

File tree

1,511 files changed

+22522
-8454
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,511 files changed

+22522
-8454
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -884,6 +884,7 @@
884884
"articles/azure-video-analyzer/.openpublishing.redirection.azure-video-analyzer.json",
885885
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
886886
"articles/virtual-machine-scale-sets/.openpublishing.redirection.virtual-machine-scale-sets.json",
887-
"articles/mysql/.openpublishing.redirection.mysql.json"
887+
"articles/mysql/.openpublishing.redirection.mysql.json",
888+
"articles/container-apps/.openpublishing.redirection.container-apps.json"
888889
]
889890
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,11 @@
1919
"source_path_from_root": "/articles/azure-monitor/insights/service-bus-insights.md",
2020
"redirect_url": "/azure/service-bus-messaging/service-bus-insights",
2121
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/azure-monitor/agents/data-collection-rule-overview.md",
25+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-overview",
26+
"redirect_document_id": false
2227
}
2328
]
2429
}

.openpublishing.redirection.defender-for-iot.json

Lines changed: 24 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,5 @@
11
{
22
"redirections": [
3-
{
4-
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-configure-with-sentinel.md",
5-
"redirect_url": "/azure/sentinel/iot-solution",
6-
"redirect_document_id": false
7-
},
83
{
94
"source_path_from_root": "/articles/defender-for-iot/device-builders/quickstart-building-the-defender-micro-agent-from-source.md",
105
"redirect_url": "/azure/defender-for-iot/device-builders/overview",
@@ -240,11 +235,6 @@
240235
"redirect_url": "/azure/defender-for-iot/organizations/how-to-track-sensor-activity",
241236
"redirect_document_id": false
242237
},
243-
{
244-
"source_path_from_root": "/articles/defender-for-iot/how-to-configure-with-sentinel.md",
245-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-configure-with-sentinel",
246-
"redirect_document_id": false
247-
},
248238
{
249239
"source_path_from_root": "/articles/defender-for-iot/how-to-troubleshoot-the-sensor-and-on-premises-management-console.md",
250240
"redirect_url": "/azure/defender-for-iot/organizations/how-to-troubleshoot-the-sensor-and-on-premises-management-console",
@@ -574,6 +564,29 @@
574564
"source_path_from_root": "/articles/defender-for-iot/organizations/references-horizon-sdk.md",
575565
"redirect_url": "/azure/defender-for-iot/organizations",
576566
"redirect_document_id": false
567+
},
568+
{
569+
"source_path_from_root": "/articles/device-builders/how-to-configure-with-sentinel.md",
570+
"redirect_url": "/azure/sentinel/iot-solution?toc=%2Fazure%2Fdefender-for-iot%2Forganizations%2Ftoc.json&bc=%2Fazure%2Fdefender-for-iot%2Fbreadcrumb%2Ftoc.json&tabs=use-out-of-the-box-analytics-rules-recommended",
571+
"redirect_document_id": false
572+
},
573+
{
574+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-configure-with-sentinel.md",
575+
"redirect_url": "/azure/sentinel/iot-solution?toc=%2Fazure%2Fdefender-for-iot%2Forganizations%2Ftoc.json&bc=%2Fazure%2Fdefender-for-iot%2Fbreadcrumb%2Ftoc.json&tabs=use-out-of-the-box-analytics-rules-recommended",
576+
"redirect_document_id": false
577+
},
578+
{
579+
"source_path_from_root": "/articles/defender-for-iot/how-to-configure-with-sentinel.md",
580+
"redirect_url": "/azure/sentinel/iot-solution?toc=%2Fazure%2Fdefender-for-iot%2Forganizations%2Ftoc.json&bc=%2Fazure%2Fdefender-for-iot%2Fbreadcrumb%2Ftoc.json&tabs=use-out-of-the-box-analytics-rules-recommended",
581+
"redirect_document_id": false
582+
},
583+
{
584+
"source_path_from_root": "/articles/defender-for-iot/device-builders/concept-security-agent-authentication.md",
585+
"redirect_url": "/azure/defender-for-iot/device-builders/tutorial-standalone-agent-binary-installation",
586+
"redirect_document_id": false
577587
}
578588
]
579-
}
589+
}
590+
591+
592+

.openpublishing.redirection.json

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -19830,9 +19830,9 @@
1983019830
"redirect_document_id": false
1983119831
},
1983219832
{
19833-
"source_path_from_root": "/articles/machine-learning/service/how-to-deploy-app-service.md",
19834-
"redirect_url": "/azure/machine-learning/how-to-deploy-app-service",
19835-
"redirect_document_id": true
19833+
"source_path_from_root": "/articles/machine-learning/how-to-deploy-app-service.md",
19834+
"redirect_url": "/azure/machine-learning/how-to-deploy-managed-online-endpoints",
19835+
"redirect_document_id": false
1983619836
},
1983719837
{
1983819838
"source_path_from_root": "/articles/machine-learning/service/how-to-deploy-azure-container-instance.md",
@@ -19859,6 +19859,11 @@
1985919859
"redirect_url": "/azure/machine-learning/how-to-deploy-and-where",
1986019860
"redirect_document_id": false
1986119861
},
19862+
{
19863+
"source_path_from_root": "/articles/machine-learning/how-to-homomorphic-encryption-seal.md",
19864+
"redirect_url": "/azure/machine-learning/",
19865+
"redirect_document_id": false
19866+
},
1986219867
{
1986319868
"source_path_from_root": "/articles/machine-learning/service/concept-accelerate-with-fpgas.md",
1986419869
"redirect_url": "/azure/machine-learning/how-to-deploy-fpga-web-service",
@@ -19870,9 +19875,14 @@
1987019875
"redirect_document_id": true
1987119876
},
1987219877
{
19873-
"source_path_from_root": "/articles/machine-learning/service/how-to-deploy-functions.md",
19874-
"redirect_url": "/azure/machine-learning/how-to-deploy-functions",
19875-
"redirect_document_id": true
19878+
"source_path_from_root": "/articles/machine-learning/how-to-deploy-functions.md",
19879+
"redirect_url": "/azure/machine-learning/how-to-deploy-managed-online-endpoints",
19880+
"redirect_document_id": false
19881+
},
19882+
{
19883+
"source_path_from_root": "/articles/machine-learning/how-to-deploy-no-code-deployment.md",
19884+
"redirect_url": "/azure/machine-learning/how-to-deploy-mlflow-models-online-endpoints",
19885+
"redirect_document_id": false
1987619886
},
1987719887
{
1987819888
"source_path_from_root": "/articles/machine-learning/service/concept-accelerate-inferencing-with-gpus.md",
@@ -39484,11 +39494,6 @@
3948439494
"redirect_url": "/azure/azure-monitor/agents/data-sources-windows-events",
3948539495
"redirect_document_id": false
3948639496
},
39487-
{
39488-
"source_path_from_root": "/articles/azure-monitor/platform/data-collection-rule-overview.md",
39489-
"redirect_url": "/azure/azure-monitor/agents/data-collection-rule-overview",
39490-
"redirect_document_id": false
39491-
},
3949239497
{
3949339498
"source_path_from_root": "/articles/azure-monitor/platform/data-sources.md",
3949439499
"redirect_url": "/azure/azure-monitor/agents/data-sources",

.openpublishing.redirection.media-services.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -629,6 +629,11 @@
629629
"source_path_from_root": "/articles/media-services/latest/asset-create-asset-upload-portal-quickstart.md",
630630
"redirect_url": "/azure/media-services/latest/video-on-demand-simple-portal-quickstart",
631631
"redirect_document_id": true
632+
},
633+
{
634+
"source_path_from_root": "/articles/media-services/latest/architecture-design-multi-drm-system.md",
635+
"redirect_url": "/azure/media-services/latest/drm-content-protection-concept",
636+
"redirect_document_id": true
632637
},
633638
{
634639
"source_path_from_root": "/articles/media-services/latest/latest/questions-collection.md",

CONTRIBUTING.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Thank you for taking the time to contribute to the Microsoft Azure documentation.
44

5-
This guide covers some general topics related to contribution and refers to the [contributors guide](/contribute) for more detailed explanations when required.
5+
This guide covers some general topics related to contribution and refers to the [contributors guide](https://docs.microsoft.com/contribute) for more detailed explanations when required.
66

77
## Code of Conduct
88

@@ -25,4 +25,4 @@ Follow the guidance for [Quick edits to existing documents](/contribute/#quick-e
2525

2626
### Pull Request
2727

28-
Review the guidance for [Pull Requests](/contribute/how-to-write-workflows-major#pull-request-processing) in our contributors guide.
28+
Review the guidance for [Pull Requests](/contribute/how-to-write-workflows-major#pull-request-processing) in our contributors guide.

articles/active-directory-b2c/customize-ui-with-html.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/14/2021
12+
ms.date: 02/23/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -55,13 +55,15 @@ Instead of creating your custom page content from scratch, you can customize Azu
5555

5656
The following table lists the default page content provided by Azure AD B2C. Download the files and use them as a starting point for creating your own custom pages.
5757

58-
| Default page | Description | Content definition ID<br/>(custom policy only) |
58+
| Page | Description | Templates |
5959
|:-----------------------|:--------|-------------|
60-
| [exception.html](https://login.microsoftonline.com/static/tenant/default/exception.cshtml) | **Error page**. This page is displayed when an exception or an error is encountered. | *api.error* |
61-
| [selfasserted.html](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Self-Asserted page**. Use this file as a custom page content for a social account sign-up page, a local account sign-up page, a local account sign-in page, password reset, and more. The form can contain various input controls, such as: a text input box, a password entry box, a radio button, single-select drop-down boxes, and multi-select check boxes. | *api.localaccountsignin*, *api.localaccountsignup*, *api.localaccountpasswordreset*, *api.selfasserted* |
62-
| [multifactor-1.0.0.html](https://login.microsoftonline.com/static/tenant/default/multifactor-1.0.0.cshtml) | **Multi-factor authentication page**. On this page, users can verify their phone numbers (by using text or voice) during sign-up or sign-in. | *api.phonefactor* |
63-
| [updateprofile.html](https://login.microsoftonline.com/static/tenant/default/updateProfile.cshtml) | **Profile update page**. This page contains a form that users can access to update their profile. This page is similar to the social account sign-up page, except for the password entry fields. | *api.selfasserted.profileupdate* |
64-
| [unified.html](https://login.microsoftonline.com/static/tenant/default/unified.cshtml) | **Unified sign-up or sign-in page**. This page handles the user sign-up and sign-in process. Users can use enterprise identity providers, social identity providers such as Facebook or Google+, or local accounts. | *api.signuporsignin* |
60+
| Unified sign-up or sign-in | This page handles the user sign-up and sign-in process. Users can use enterprise identity providers, social identity providers such as Facebook, Microsoft account, or local accounts. | [Classic](https://login.microsoftonline.com/static/tenant/default/unified.cshtml), [Ocean Blue](https://login.microsoftonline.com/static/tenant/templates/AzureBlue/unified.cshtml), and [Slate Gray](https://login.microsoftonline.com/static/tenant/templates/MSA/unified.cshtml). |
61+
| Sign-in (only)| The sign-in page is also known as the *Identity provider selection*. It handles the user sign-in with local account, or federated identity providers. Use this page to allow sign-in without the ability to sign-up. For example before user can edit their profile. | [Classic](https://login.microsoftonline.com/static/tenant/default/idpSelector.cshtml), [Ocean Blue](https://login.microsoftonline.com/static/tenant/templates/AzureBlue/idpSelector.cshtml), and [Slate Gray](https://login.microsoftonline.com/static/tenant/templates/MSA/idpSelector.cshtml).
62+
| Self-Asserted | Most interactions in Azure AD B2C where the user is expected to provide input are self-asserted. For example, a sign-up page, sign-in page, or password reset page. Use this template as a custom page content for a social account sign-up page, a local account sign-up page, a local account sign-in page, password reset, edit profile, block page and more. The self-asserted page can contain various input controls, such as: a text input box, a password entry box, a radio button, single-select drop-down boxes, and multi-select check boxes. | [Classic](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml), [Ocean Blue](https://login.microsoftonline.com/static/tenant/templates/AzureBlue/selfAsserted.cshtml), and [Slate Gray](https://login.microsoftonline.com/static/tenant/templates/MSA/selfAsserted.cshtml). |
63+
| Multi-factor authentication | On this page, users can verify their phone numbers (by using text or voice) during sign-up or sign-in. | [Classic](https://login.microsoftonline.com/static/tenant/default/multifactor-1.0.0.cshtml), [Ocean Blue](https://login.microsoftonline.com/static/tenant/templates/AzureBlue/multifactor-1.0.0.cshtml), and [Slate Gray](https://login.microsoftonline.com/static/tenant/templates/MSA/multifactor-1.0.0.cshtml). |
64+
| Error | This page is displayed when an exception or an error is encountered. | [Classic](https://login.microsoftonline.com/static/tenant/default/exception.cshtml), [Ocean Blue](https://login.microsoftonline.com/static/tenant/templates/AzureBlue/exception.cshtml), and [Slate Gray](https://login.microsoftonline.com/static/tenant/templates/MSA/exception.cshtml). |
65+
66+
6567

6668
## Hosting the page content
6769

@@ -89,7 +91,7 @@ When using your own HTML and CSS files to customize the UI, host your UI content
8991

9092
You localize your HTML content by enabling [language customization](language-customization.md) in your Azure AD B2C tenant. Enabling this feature allows Azure AD B2C to set the HTML page language attribute and pass the OpenID Connect parameter `ui_locales` to your endpoint.
9193

92-
#### Single-template approach
94+
### Single-template approach
9395

9496
During page load, Azure AD B2C sets the HTML page language attribute with the current language. For example, `<html lang="en">`. To render different styles per the current language, use the CSS `:lang` selector along with your CSS definition.
9597

@@ -223,6 +225,7 @@ To host your HTML content in Blob storage, perform the following steps:
223225
1. **Redundancy** can remain **Geo-redundant storage (GRS)**
224226
1. Select **Review + create** and wait a few seconds for Azure AD to run a validation.
225227
1. Select **Create** to create the storage account. After the deployment is completed, the storage account page opens automatically or select **Go to resource**.
228+
226229
#### 2.1 Create a container
227230

228231
To create a public container in Blob storage, perform the following steps:
@@ -445,4 +448,4 @@ To use [company branding](customize-ui.md#configure-company-branding) assets in
445448

446449
## Next steps
447450

448-
Learn how to enable [client-side JavaScript code](javascript-and-page-layout.md).
451+
Learn how to enable [client-side JavaScript code](javascript-and-page-layout.md).

articles/active-directory-b2c/partner-dynamics-365-fraud-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ In the provided [custom policies](https://github.com/azure-ad-b2c/partner-integr
168168

169169
For additional information, review the following articles:
170170

171-
- [Microsoft DFP samples](https://github.com/Microsoft/Dynamics-365-Fraud-Protection-Samples)
171+
- [Microsoft DFP samples](https://github.com/azure-ad-b2c/partner-integrations/tree/master/samples/Dynamics-Fraud-Protection)
172172

173173
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
174174

articles/active-directory-b2c/partner-f5.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -379,7 +379,7 @@ The next attempt at connecting to the application should take you straight to th
379379

380380
Failure to access the protected application could be down to any number of potential factors, including a misconfiguration.
381381

382-
- BIG-IP logs are a great source of information for isolating all authentication and SSO issues. If troubleshooting you should increase the log verbosity level.
382+
BIG-IP logs are a great source of information for isolating all authentication and SSO issues. If troubleshooting you should increase the log verbosity level.
383383

384384
1. Go to **Access Policy** > **Overview** > **Event Logs** > **Settings**.
385385

@@ -424,6 +424,6 @@ Exact root cause is still being investigated by F5 engineering, but issue appear
424424

425425
You should now see the Key (JWT) field populated with the key ID (KID) of the token signing certificate provided through the OpenID URI metadata.
426426

427-
5. Finally, select the yellow **Apply Access Policy** option in the top left-hand corner, located next to the F5 logo. Apply those settings and select **Apply** again to refresh the access profile list.
427+
5. Finally, select the yellow **Apply Access Policy** option in the top left-hand corner, located next to the F5 logo. Then select **Apply** again to refresh the access profile list.
428428

429429
See F5’s guidance for more [OAuth client and resource server troubleshooting tips](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-sso-13-0-0/37.html#GUID-774384BC-CF63-469D-A589-1595D0DDFBA2)

articles/active-directory-domain-services/faqs.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,9 +85,9 @@ sections:
8585
No. A managed domain resource forest supports up to five one-way outbound forest trusts to on-premises forests.
8686
8787
- question: |
88-
Why can't I see the **Trusts** menu?
88+
Why can't I see the Trusts menu?
8989
answer: |
90-
If you don't see the **Trusts** menu option, check under **Properties** for the *Forest type*. Only *Resource* forests can create trusts. If the forest type is *User*, you can't create trusts. There's currently no way to change the forest type of a managed domain. You need to delete and recreate the managed domain as a resource forest.
90+
If you don't see the **Trusts** menu option, check under **Properties** for the **Forest type**. Only **Resource** forests can create trusts. If the forest type is **User**, you can't create trusts. There's currently no way to change the forest type of a managed domain. You need to delete and recreate the managed domain as a resource forest.
9191
9292
- question: |
9393
Can I move a managed domain?

0 commit comments

Comments
 (0)