Skip to content

Commit 7d66919

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into 2023-05-Performance-Benchmark-Large-Vol-Linux
2 parents d282cdc + 8d2022b commit 7d66919

File tree

1,756 files changed

+12659
-7835
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,756 files changed

+12659
-7835
lines changed

.openpublishing.redirection.azure-kubernetes-service.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -461,6 +461,11 @@
461461
"source_path_from_root": "/articles/aks/command-invoke.md",
462462
"redirect_url": "/azure/aks/access-private-cluster",
463463
"redirect_document_id": false
464+
},
465+
{
466+
"source_path_from_root": "/articles/aks/operator-best-practices-run-at-scale.md",
467+
"redirect_url": "/azure/aks/best-practices-performance-scale-large",
468+
"redirect_document_id": false
464469
}
465470
]
466471
}

.openpublishing.redirection.json

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,50 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/internet-analyzer/internet-analyzer-cli.md",
5+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-cli",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/internet-analyzer/internet-analyzer-create-test-portal.md",
10+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-create-test-portal",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/internet-analyzer/internet-analyzer-custom-endpoint.md",
15+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-custom-endpoint",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/internet-analyzer/internet-analyzer-embed-client.md",
20+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-embed-client",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/internet-analyzer/internet-analyzer-faq.md",
25+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-faq",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/internet-analyzer/internet-analyzer-overview.md",
30+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-overview",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/internet-analyzer/internet-analyzer-scorecard.md",
35+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-scorecard",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/internet-analyzer/troubleshoot.md",
40+
"redirect_url": "/previous-versions/azure/internet-analyzer/troubleshoot",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "articles/internet-analyzer/index.yml",
45+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-overview",
46+
"redirect_document_id": false
47+
},
348
{
449
"source_path": "articles/batch/batch-pool-no-public-ip-address.md",
550
"redirect_url": "/previous-versions/azure/batch/articles/batch/batch-pool-no-public-ip-address",
@@ -6765,6 +6810,11 @@
67656810
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
67666811
"redirect_document_id": false
67676812
},
6813+
{
6814+
"source_path_from_root": "/articles/search/search-get-started-retrieval-augmented-generation.md",
6815+
"redirect_url": "/azure/ai-services/openai/use-your-data-quickstart",
6816+
"redirect_document_id": false
6817+
},
67686818
{
67696819
"source_path_from_root": "/articles/search/cognitive-search-tutorial-blob-python.md",
67706820
"redirect_url": "/azure/search/samples-python",

articles/active-directory-b2c/conditional-access-identity-protection-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Identity Protection and Conditional Access in Azure AD B2C
33
description: Learn how Identity Protection gives you visibility into risky sign-ins and risk detections. Find out how and Conditional Access lets you enforce organizational policies based on risk events in your Azure AD B2C tenants.
44
ms.service: active-directory
5-
ms.subservice: conditional-access
5+
ms.subservice: B2C
66
ms.topic: overview
77
ms.date: 01/11/2024
88
ms.author: kengaderdus
@@ -29,7 +29,7 @@ If you're already familiar with [Identity Protection](../active-directory/identi
2929

3030
By pairing Conditional Access policies with Identity Protection risk detection, you can respond to risky authentications with the appropriate policy action.
3131

32-
- **Gain a new level of visibility into the authentication risks for your apps and your customer base**. With signals from billions of monthly authentications across Microsoft Entra ID and Microsoft Account, the risk detection algorithms will now flag authentications as low, medium, or high risk for your local consumer or citizen authentications.
32+
- **Gain a new level of visibility into the authentication risks for your apps and your customer base**. With signals from billions of monthly authentications across Microsoft Entra ID and Microsoft Account, the risk detection algorithms flag authentications as low, medium, or high risk for your local consumer or citizen authentications.
3333
- **Automatically address risks by configuring your own adaptive authentication**. For specified applications, you can require a specific set of users to provide a second authentication factor, as in multi-factor authentication (MFA). Or you can block access based on the risk level detected. As with other Azure AD B2C experiences, you can customize resulting end-user experience with your organization’s voice, style, and brand. You can also display mitigation alternatives if the user isn't able to gain access.
3434
- **Control access based on location, groups, and apps**.  Conditional Access can also be used to control non-risk based situations. For example, you can require MFA for customers accessing a specific app, or block access from specified geographies.
3535
- **Integrate with Azure AD B2C user flows and Identity Experience Framework custom policies**. Use your existing customized experiences and add the controls you need to interface with Conditional Access. You can also implement advanced scenarios for granting access, such as knowledge-based access or your own preferred MFA provider.

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Add Conditional Access to a user flow in Azure AD B2C
33
description: Learn how to add Conditional Access to your Azure AD B2C user flows. Configure multifactor authentication (MFA) settings and Conditional Access policies in your user flows to enforce policies and remediate risky sign-ins.
44

55
ms.service: active-directory
6-
ms.subservice: conditional-access
6+
ms.subservice: B2C
77
ms.topic: overview
88
ms.date: 01/11/2024
99
ms.author: kengaderdus
@@ -40,13 +40,13 @@ The following example shows a Conditional Access technical profile that is used
4040
</TechnicalProfile>
4141
```
4242

43-
To ensure that Identity Protection signals are evaluated properly, you'll want to call the `ConditionalAccessEvaluation` technical profile for all users, including both [local and social accounts](technical-overview.md#consumer-accounts). Otherwise, Identity Protection will indicate an incorrect degree of risk associated with users.
43+
To ensure that Identity Protection signals are evaluated properly, you'll want to call the `ConditionalAccessEvaluation` technical profile for all users, including both [local and social accounts](technical-overview.md#consumer-accounts). Otherwise, Identity Protection indicates an incorrect degree of risk associated with users.
4444
::: zone-end
4545
In the *Remediation* phase that follows, the user is challenged with MFA. Once complete, Azure AD B2C informs Identity Protection that the identified sign-in threat has been remediated and by which method. In this example, Azure AD B2C signals that the user has successfully completed the multifactor authentication challenge.
4646
The remediation may also happen through other channels. For example, when the account's password is reset, either by the administrator or by the user. You can check the user *Risk state* in the [risky users report](identity-protection-investigate-risk.md#navigating-the-risky-users-report).
4747
::: zone pivot="b2c-custom-policy"
4848
> [!IMPORTANT]
49-
> To remediate the risk successfully within the journey, make sure the *Remediation* technical profile is called after the *Evaluation* technical profile is executed. If *Evaluation* is invoked without *Remediation*, the risk state will be *At risk*.
49+
> To remediate the risk successfully within the journey, make sure the *Remediation* technical profile is called after the *Evaluation* technical profile is executed. If *Evaluation* is invoked without *Remediation*, the risk state indicates as *At risk*.
5050
When the *Evaluation* technical profile recommendation returns `Block`, the call to the *Evaluation* technical profile is not required. The risk state is set to *At risk*.
5151
The following example shows a Conditional Access technical profile used to remediate the identified threat:
5252

@@ -122,7 +122,7 @@ To add a Conditional Access policy:
122122

123123
| Include |License | Notes|
124124
|---|---|---|
125-
|**All users** | P1, P2 | This policy will affect all of your users. To be sure not to lock yourself out, exclude your administrative account by choosing **Exclude**, selecting **Directory roles**, and then selecting **Global Administrator** in the list. You can also select **Users and Groups** and then select your account in the **Select excluded users** list. |
125+
|**All users** | P1, P2 | This policy affects all of your users. To be sure not to lock yourself out, exclude your administrative account by choosing **Exclude**, selecting **Directory roles**, and then selecting **Global Administrator** in the list. You can also select **Users and Groups** and then select your account in the **Select excluded users** list. |
126126

127127
1. Select **Cloud apps or actions**, and then **Select apps**. Browse for your [relying party application](tutorial-register-applications.md).
128128
1. Select **Conditions**, and then select from the following conditions. For example, select **Sign-in risk** and **High**, **Medium**, and **Low** risk levels.
@@ -228,7 +228,7 @@ To configure your user based conditional access:
228228
7. Under **Conditions** > **User risk**, set **Configure** to **Yes**. Under **Configure user risk levels needed for policy to be enforced**
229229
1. Select **High** and **Medium**.
230230
2. Select **Done**.
231-
8. Under **Access controls** > **Grant**, select **Grant access**, **Require password change**, and select **Select**. **Require multi-factor authentication** will also be required by default.
231+
8. Under **Access controls** > **Grant**, select **Grant access**, **Require password change**, and select **Select**. **Require multi-factor authentication** is also be required by default.
232232
9. Confirm your settings and set **Enable policy** to **On**.
233233
10. Select **Create** to create to enable your policy.
234234

@@ -345,7 +345,7 @@ The following template can be used to create a Conditional Access policy with di
345345
## Add Conditional Access to a user flow
346346

347347
After you've added the Microsoft Entra Conditional Access policy, enable Conditional Access in your user flow or custom policy. When you enable Conditional Access, you don't need to specify a policy name.
348-
Multiple Conditional Access policies may apply to an individual user at any time. In this case, the most strict access control policy takes precedence. For example, if one policy requires MFA while the other blocks access, the user will be blocked.
348+
Multiple Conditional Access policies may apply to an individual user at any time. In this case, the most strict access control policy takes precedence. For example, if one policy requires MFA while the other blocks access, the user is blocked.
349349

350350
## Enable multifactor authentication (optional)
351351

@@ -386,7 +386,7 @@ To enable Conditional Access for a user flow, make sure the version supports Con
386386
### Configure claim other than phone number to be used for MFA
387387

388388
In the Conditional Access policy above, the `DoesClaimExist` claim transformation method checks if a claim contains a value, for example if the `strongAuthenticationPhoneNumber` claim contains a phone number.
389-
The claims transformation isn't limited to the `strongAuthenticationPhoneNumber` claim. Depending on the scenario, you can use any other claim. In the following XML snippet, the `strongAuthenticationEmailAddress` claim is checked instead. The claim you choose must have a valid value, otherwise the `IsMfaRegistered` claim will be set to `False`. When set to `False`, the Conditional Access policy evaluation returns a `Block` grant type, preventing the user from completing user flow.
389+
The claims transformation isn't limited to the `strongAuthenticationPhoneNumber` claim. Depending on the scenario, you can use any other claim. In the following XML snippet, the `strongAuthenticationEmailAddress` claim is checked instead. The claim you choose must have a valid value, otherwise the `IsMfaRegistered` claim is set to `False`. When set to `False`, the Conditional Access policy evaluation returns a `Block` grant type, preventing the user from completing user flow.
390390

391391
```xml
392392
<ClaimsTransformation Id="IsMfaRegisteredCT" TransformationMethod="DoesClaimExist">

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,12 @@ titleSuffix: Azure AD B2C
66
author: kengaderdus
77
manager: CelesteDG
88
ms.service: active-directory
9-
10-
ms.custom: devx-track-js, linux-related-content
9+
ms.custom: devx-track-js
1110
ms.topic: how-to
1211
ms.date: 01/11/2024
1312
ms.author: kengaderdus
1413
ms.subservice: B2C
15-
16-
1714
#Customer intent: As a developer, I want to configure authentication in a Node.js web application using Azure Active Directory B2C, so that I can enable users to sign in, sign out, update profile, and reset password using Azure AD B2C user flows.
18-
1915
---
2016

2117
# Configure authentication in a sample Node.js web application by using Azure Active Directory B2C

articles/active-directory-b2c/enable-authentication-python-web-app.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,12 @@ titleSuffix: Azure AD B2C
66
author: kengaderdus
77
manager: CelesteDG
88
ms.service: active-directory
9-
10-
ms.custom: devx-track-python, linux-related-content
9+
ms.custom: devx-track-python
1110
ms.topic: how-to
1211
ms.date: 01/11/2024
1312
ms.author: kengaderdus
1413
ms.subservice: B2C
15-
16-
1714
#Customer intent: As a Python web application developer, I want to enable Azure Active Directory B2C authentication in my application, so that users can sign in, sign out, update their profile, and reset their password using Azure AD B2C user flows.
18-
1915
---
2016

2117
# Enable authentication in your own Python web application using Azure Active Directory B2C

articles/active-directory-b2c/partner-strata.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.subservice: B2C
1818
# Tutorial to configure Azure Active Directory B2C with Strata
1919

2020
> [!CAUTION]
21-
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
21+
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly. For more information, see the [CentOS End Of Life guidance](~/articles/virtual-machines/workloads/centos/centos-end-of-life.md).
2222
2323
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with Strata [Maverics Identity Orchestrator](https://www.strata.io/), which helps protect on-premises applications. It connects to identity systems, migrates users and credentials, synchronizes policies and configurations, and abstracts authentication and session management. Use Strata to transition from legacy, to Azure AD B2C, without rewriting applications.
2424

articles/advisor/advisor-reference-cost-recommendations.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -488,10 +488,7 @@ Learn more about [App Service plans](../app-service/overview-hosting-plans.md).
488488

489489
### Unused/Empty App Service plans
490490

491-
Your App Service plan has no apps running for at least three days. Consider deleting the resource to save costs or add new apps under it.
492-
493-
> [!NOTE]
494-
> It might take up to 48 hours for this recommendation to refresh after you take an action.
491+
Your App Service plan does not have any running applications associated with it. Consider deleting the resource to reduce expenses, or add new applications under it to utilize its capabilities.
495492

496493
Learn more about [App Service plans](../app-service/overview-hosting-plans.md).
497494

articles/advisor/advisor-resiliency-reviews.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -85,8 +85,8 @@ Select **Manage** > **Reviews (Preview)** in the left navigation pane. A list of
8585

8686
At the top of the reviews page, use **Feedback** to tell us about your experience. Use the **Refresh** button to refresh the page as needed.
8787

88-
[!NOTE]
89-
If you have no reviews, the **Reviews** menu item in the left navigation is greyed out.
88+
> [!NOTE]
89+
> If you have no reviews, the **Reviews** menu item in the left navigation is greyed out.
9090
9191
### Review recommendations
9292

@@ -133,8 +133,8 @@ From a review recommendations details page:
133133
1. You can reject multiple recommendations at a time using the checkbox control, and the same reason for rejection is applied to all selected recommendations. If you need to select a different reason, reject one recommendation at a time.
134134
1. If you reject a recommendation by mistake, select **Reset** to move it back to the pending state and tab.
135135

136-
[!NOTE]
137-
The reason for the rejection is visible to your account team. It helps them understand workload context and your business priorities better. Additionally, Microsoft uses this information to improve the quality of recommendations.
136+
> [!NOTE]
137+
> The reason for the rejection is visible to your account team. It helps them understand workload context and your business priorities better. Additionally, Microsoft uses this information to improve the quality of recommendations.
138138
139139
## Implement recommendations
140140

@@ -155,8 +155,8 @@ The recommendations are grouped by type:
155155
* **Reviews**: These recommendations are part of a review for a selected workload.
156156
* **Automated**: These recommendations are the standard Advisor recommendations for the selected subscriptions.
157157

158-
[!NOTE]
159-
If none of your resiliency review recommendations are in the *Accepted* state, the **Reviews** tab is hidden.
158+
> [!NOTE]
159+
> If none of your resiliency review recommendations are in the *Accepted* state, the **Reviews** tab is hidden.
160160
161161
:::image type="content" source="./media/resiliency-reviews/resiliency-review-recommendation-list-accepted.png" alt-text="Screenshot of the Azure Advisor Resiliency Reviews recommendations page of accepted recommendations." lightbox="./media/resiliency-reviews/resiliency-review-recommendation-list-accepted.png":::
162162

articles/advisor/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,8 @@
4444
items:
4545
- name: Use Azure Well Architected Framework Assessments
4646
href: advisor-assessments.md
47+
- name: Use Azure Advisor resiliency reviews
48+
href: advisor-resiliency-reviews.md
4749
- name: Optimize virtual machine spend by resizing or shutting down underutilized instances
4850
href: advisor-cost-recommendations.md
4951
- name: Optimize your Azure costs using the cost optimization workbook

0 commit comments

Comments
 (0)