Skip to content

Commit 7ec6fc4

Browse files
author
gitName
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into wenyu
2 parents 3a428f0 + 67fc9a1 commit 7ec6fc4

File tree

2,120 files changed

+24492
-17339
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,120 files changed

+24492
-17339
lines changed

.openpublishing.redirection.json

Lines changed: 71 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,50 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/cdn/edgio-retirement-faq.md",
5+
"redirect_url": "/previous-versions/azure/cdn/edgio-retirement-faq",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/cdn/cdn-edge-performance.md",
10+
"redirect_url": "/previous-versions/azure/cdn/cdn-edge-performance",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/cdn/migrate-cdn-to-front-door-retain-edge-domain.md",
15+
"redirect_url": "/previous-versions/azure/cdn/migrate-cdn-to-front-door-retain-edge-domain",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/internet-peering/howto-subscription-association-powershell.md",
20+
"redirect_url": "/previous-versions/azure/internet-peering/howto-subscription-association-powershell",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/internet-peering/howto-peering-service-powershell.md",
25+
"redirect_url": "/previous-versions/azure/internet-peering/howto-peering-service-powershell",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/internet-peering/howto-direct-powershell.md",
30+
"redirect_url": "/previous-versions/azure/internet-peering/howto-direct-powershell",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/internet-peering/howto-legacy-direct-powershell.md",
35+
"redirect_url": "/previous-versions/azure/internet-peering/howto-legacy-direct-powershell",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/internet-peering/howto-exchange-powershell.md",
40+
"redirect_url": "/previous-versions/azure/internet-peering/howto-exchange-powershell",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "articles/internet-peering/howto-legacy-exchange-powershell.md",
45+
"redirect_url": "/previous-versions/azure/internet-peering/howto-legacy-exchange-powershell",
46+
"redirect_document_id": false
47+
},
348
{
449
"source_path": "articles/databox-online/azure-stack-edge-overview.md",
550
"redirect_url": "/previous-versions/azure/databox-online/azure-stack-edge-overview",
@@ -3364,6 +3409,16 @@
33643409
"redirect_url": "/azure/databox/data-box-quickstart-export?pivots=dbx-ng",
33653410
"redirect_document_id": false
33663411
},
3412+
{
3413+
"source_path_from_root": "/articles/databox/data-box-next-gen-safety.md",
3414+
"redirect_url": "/azure/databox/data-box-safety?pivots=dbx-ng",
3415+
"redirect_document_id": false
3416+
},
3417+
{
3418+
"source_path_from_root": "/articles/databox/data-box-next-gen-security.md",
3419+
"redirect_url": "/azure/databox/data-box-security?pivots=dbx-ng",
3420+
"redirect_document_id": false
3421+
},
33673422
{
33683423
"source_path_from_root": "/articles/ddos-protection/ddos-disaster-recovery-guidance.md",
33693424
"redirect_url": "../reliability/reliability-ddos.md",
@@ -6294,10 +6349,15 @@
62946349
"redirect_url": "/azure/virtual-network/vnet-integration-for-azure-services",
62956350
"redirect_document_id": false
62966351
},
6352+
{
6353+
"source_path_from_root": "/articles/reliability/availability-zones-region-support.md",
6354+
"redirect_url": "/azure/reliability/regions-list",
6355+
"redirect_document_id": false
6356+
},
62976357
{
62986358
"source_path_from_root": "/articles/cyclecloud/how-to/ccws/cleanup-roles.md",
62996359
"redirect_url": "/azure/cyclecloud/how-to/ccws/deploy-with-cli",
6300-
"redirect_document_id": false
6360+
"redirect_document_id": false
63016361
},
63026362
{
63036363
"source_path": "articles/cloud-services/applications-dont-support-tls-1-2.md",
@@ -6633,6 +6693,16 @@
66336693
"source_path": "articles/operational-excellence/relocation-managed-identity.md",
66346694
"redirect_url": "/entra/identity/managed-identities-azure-resources/how-to-managed-identity-regional-move",
66356695
"redirect_document_id": false
6696+
},
6697+
{
6698+
"source_path": "articles/notification-hubs/xamarin-notification-hubs-ios-push-notification-apns-get-started.md",
6699+
"redirect_url": "/dotnet/maui/data-cloud/push-notifications",
6700+
"redirect_document_id": false
6701+
},
6702+
{
6703+
"source_path": "articles/notification-hubs/xamarin-notification-hubs-push-notifications-android-gcm.md",
6704+
"redirect_url": "/dotnet/maui/data-cloud/push-notifications",
6705+
"redirect_document_id": false
66366706
}
66376707
]
66386708
}

articles/active-directory-b2c/api-connectors-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ A null value in a database is used when the value in a column is unknown or miss
165165
When an element is null, either:
166166

167167
- Omit the key-value pair from the JSON.
168-
- Return a value that corresponds to the Azure AD B2C claim data type. For example, for a `string` data type, return empty string `""`. For an `integer` data type, return a zero value `0`. For a `dateTime` data type, return a minimum value `1970-00-00T00:00:00.0000000Z`.
168+
- Return a value that corresponds to the Azure AD B2C claim data type. For example, for a `string` data type, return empty string `""`. For an `integer` data type, return a zero value `0`. For a `dateTime` data type, return a minimum value `0001-01-01T00:00:00.0000000Z`.
169169

170170
The following example demonstrates how to handle a null value. The email is omitted from the JSON:
171171

articles/active-directory-b2c/claimsschema.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: "ClaimsSchema: Azure Active Directory B2C"
3-
description: Specify the ClaimsSchema element of a custom policy in Azure Active Directory B2C.
3+
description: Specify the ClaimsSchema element of a custom policy in Azure AD B2C. Define and manage claim types for user attributes and input controls.
44

55
author: kengaderdus
66
manager: CelesteDG
77

88
ms.service: azure-active-directory
99

1010
ms.topic: reference
11-
ms.date: 01/11/2024
11+
ms.date: 03/21/2025
1212
ms.author: kengaderdus
1313
ms.subservice: b2c
1414
ms.custom: "b2c-support"

articles/active-directory-b2c/custom-policies-series-branch-user-journey.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Create branching in user journey by using Azure AD B2C custom policy
33
titleSuffix: Azure AD B2C
4-
description: Learn how to enable or disable Technical Profiles based on claims values. Learn how to branch in user journeys by enabling and disabling Azure AD B2C custom policy technical profiles.
4+
description: Learn how to create branching in user journeys using Azure AD B2C custom policies. Enable or disable technical profiles based on claim values.
55

66
author: kengaderdus
77
manager: CelesteDG
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 10/11/2024
13+
ms.date: 03/21/2025
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -233,12 +233,12 @@ Follow the steps in [Test the custom policy](custom-policies-series-validate-use
233233
1. Repeat step 5, but this time, select **Account Type**, select **Contoso Employee Account**, and then follow the prompts.
234234

235235

236-
## Next steps
236+
## Related content
237237

238238
In [step 3](#step-3---configure-or-update-technical-profiles), we enable or disable the technical profile by using the `EnabledForUserJourneys` element. Alternatively, you can use [Preconditions](userjourneys.md#preconditions) inside the user journey orchestration steps to execute or skip an orchestration step as we learn later in this series.
239239

240240
Next, learn:
241241

242242
- About [User Journey Orchestration Steps Preconditions](userjourneys.md#preconditions).
243243

244-
- How to [Use the TrustFrameworkPolicy schema file to validate Azure AD B2C policy files](custom-policies-series-install-xml-extensions.md).
244+
- How to [Use the TrustFrameworkPolicy schema file to validate Azure AD B2C policy files](custom-policies-series-install-xml-extensions.md).

articles/active-directory-b2c/custom-policies-series-call-rest-api.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Call a REST API by using Azure Active Directory B2C custom policy
2+
title: Call a REST API by using Azure AD B2C custom policy
33
titleSuffix: Azure AD B2C
4-
description: Learn how to make an HTTP call to external API by using Azure Active Directory B2C custom policy.
4+
description: Learn how to call a REST API using Azure AD B2C custom policy. Make HTTP calls to external APIs to send and receive data from external services.
55

66
author: kengaderdus
77
manager: CelesteDG
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements, devx-track-js
13-
ms.date: 10/11/2024
13+
ms.date: 03/21/2025
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -313,7 +313,7 @@ If your REST API returns data, which you want to include as claims in your polic
313313
314314
Use the steps in [Receiving data](api-connectors-overview.md?pivots=b2c-custom-policy#receiving-data) to learn how to format the data the custom policy expects, how to handle nulls values, and how to parse REST the API's nested JSON body.
315315

316-
## Next steps
316+
## Related content
317317

318318
Next, learn:
319319

articles/active-directory-b2c/custom-policies-series-collect-user-input.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 10/11/2024
13+
ms.date: 03/21/2025
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -504,10 +504,10 @@ After the policy finishes execution, you're redirected to `https://jwt.ms`, and
504504
}.[Signature]
505505
```
506506

507-
## Next steps
507+
## Related content
508508

509509
Next, learn:
510510

511511
- About the [types of Technical Profiles](technicalprofiles.md#types-of-technical-profiles) in Azure AD B2C's custom policies.
512512

513-
- How to [Validate user inputs by using custom policy](custom-policies-series-validate-user-input.md).
513+
- How to [Validate user inputs by using custom policy](custom-policies-series-validate-user-input.md).

articles/active-directory-b2c/custom-policies-series-hello-world.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Write your first Azure AD B2C custom policy - Hello World!
33
titleSuffix: Azure AD B2C
4-
description: Learn how to write your first custom policy. A custom that shows of returns Hello World message.
4+
description: Learn how to write your first Azure AD B2C custom policy. Configure keys, build the policy file, upload it to Azure, and test the custom policy.
55

66
author: kengaderdus
77
manager: CelesteDG
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 10/11/2024
13+
ms.date: 03/21/2025
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -286,7 +286,7 @@ After the policy finishes execution, you're redirected to `https://jwt.ms`, and
286286

287287
Notice the `message` and `sub` claims, which we set as [output claims](relyingparty.md#outputclaims) in the `RelyingParty` section.
288288

289-
## Next steps
289+
## Related content
290290

291291
In this article, you learned and used four sections that are included in an Azure AD B2C custom policy. These sections are added as child elements the `TrustFrameworkPolicy` root element:
292292

articles/active-directory-b2c/custom-policies-series-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Create and run your own custom policies in Azure Active Directory B2C
2+
title: Create and run your own custom policies in Azure AD B2C
33
titleSuffix: Azure AD B2C
4-
description: Learn how to create and run your own custom policies in Azure Active Directory B2C. Learn how to create Azure Active Directory B2C custom policies from scratch in a how-to guide series.
4+
description: Learn how to create and run custom policies in Azure AD B2C. Follow a how-to guide series to build custom policies from scratch for complex user journeys.
55

66
author: kengaderdus
77
manager: CelesteDG
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 10/11/2024
13+
ms.date: 03/21/2025
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -48,7 +48,7 @@ This how-to guide series consists of multiple articles. We recommend that you st
4848
|[Set up a sign-up and sign-in flow by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in.md). | Learn how to configure a sign-up and sign-in flow for a local account(using email and password) by using Azure Active Directory B2C custom policy. You show a user a sign-in interface for them to sign in by using their existing account, but they can create a new account if they don't already have one.|
4949
| [Set up a sign-up and sign-in flow with a social account by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in-federation.md) | Learn how to configure a sign-up and sign-in flow for a social account, Facebook. You also learn to combine local and social sign-up and sign-in flow.|
5050

51-
## Next steps
51+
## Related content
5252

5353
- Learn about [Azure AD B2C TrustFrameworkPolicy BuildingBlocks](buildingblocks.md)
5454

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in-federation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Set up a sign-up and sign-in flow with a social account by using Azure Active Directory B2C custom policy
2+
title: Set up a sign-in flow with a social account in Azure AD B2C custom policy
33
titleSuffix: Azure AD B2C
44
description: Learn how to configure a sign-up and sign-in flow for a social account, Facebook, by using Azure Active Directory B2C custom policy.
55

@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 10/11/2024
13+
ms.date: 03/21/2025
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -691,6 +691,6 @@ Use the following steps to add a combined local and social account:
691691

692692
You can observe that a user can sign up or sign in by using either a local account or a social account.
693693

694-
## Next steps
694+
## Related content
695695

696696
- Learn more about how to [Define an OAuth2 technical profile in an Azure Active Directory B2C custom policy](oauth2-technical-profile.md).

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 11/27/2024
13+
ms.date: 03/21/2025
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -325,7 +325,7 @@ Follow the steps in [Test the custom policy](custom-policies-series-validate-use
325325

326326
You can sign in by entering the **Email Address** and **Password** of an existing account. If you don't already have an account, you need to select the **Sign up now** link to create a new user account.
327327

328-
## Next steps
328+
## Related content
329329

330330
- Learn how to [Set up a sign-up and sign-in flow with a social account by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in-federation.md).
331331

0 commit comments

Comments
 (0)