Skip to content

Commit 8c847e2

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents a757743 + e02a34a commit 8c847e2

File tree

776 files changed

+11601
-2878
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

776 files changed

+11601
-2878
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -835,6 +835,11 @@
835835
"redirect_url": "/azure/defender-for-cloud/connect-azure-subscription",
836836
"redirect_document_id": true
837837
},
838+
{
839+
"source_path_from_root": "/articles/defender-for-cloud/enable-vulnerability-assessment-agentless.md",
840+
"redirect_url": "/azure/defender-for-cloud/enable-agentless-scanning-vms",
841+
"redirect_document_id": true
842+
},
838843
{
839844
"source_path_from_root": "/articles/defender-for-cloud/defender-for-storage-exclude.md",
840845
"redirect_url": "/azure/defender-for-cloud/defender-for-storage-classic-enable#exclude-a-storage-account-from-a-protected-subscription-in-the-per-transaction-plan",

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24050,7 +24050,12 @@
2405024050
},
2405124051
{
2405224052
"source_path_from_root": "/articles/virtual-machines/virtual-machines-reliability.md",
24053-
"redirect_url": "/azure/virtual-machines/reliability-virtual-machines",
24053+
"redirect_url": "/azure/reliability/reliability-virtual-machines",
24054+
"redirect_document_id": false
24055+
},
24056+
{
24057+
"source_path_from_root": "/articles/virtual-machines/reliability-virtual-machines.md",
24058+
"redirect_url": "/azure/reliability/reliability-virtual-machines",
2405424059
"redirect_document_id": false
2405524060
},
2405624061
{

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ You can create an API endpoint using one of our [samples](api-connector-samples.
3434

3535
To use an [API connector](api-connectors-overview.md), you first create the API connector and then enable it in a user flow.
3636

37-
1. Sign in to the [Azure portal](https://portal.azure.com/).
37+
1. Sign in to the [Azure portal](https://portal.azure.com).
3838
1. Under **Azure services**, select **Azure AD B2C**.
3939
1. Select **API connectors**, and then select **New API connector**.
4040

@@ -52,7 +52,7 @@ To use an [API connector](api-connectors-overview.md), you first create the API
5252

5353
Follow these steps to add an API connector to a sign-up user flow.
5454

55-
1. Sign in to the [Azure portal](https://portal.azure.com/).
55+
1. Sign in to the [Azure portal](https://portal.azure.com).
5656
1. Under **Azure services**, select **Azure AD B2C**.
5757
1. Select **User flows**, and then select the user flow you want to add the API connector to.
5858
1. Select **API connectors**, and then select the API endpoint you want to invoke at the **Before sending the token (preview)** step in the user flow:

articles/active-directory-b2c/add-sign-in-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The sign-in policy lets users:
2727
* Sign in with an Azure AD B2C Local Account
2828
* Users can sign-in with a social account
2929
* Password reset
30-
* Users cannot sign up for an Azure AD B2C Local Account. To create an account, an administrator can use [Azure portal](manage-users-portal.md#create-a-consumer-user), or [MS Graph API](microsoft-graph-operations.md).
30+
* Users cannot sign up for an Azure AD B2C Local Account. To create an account, an administrator can use the [Azure portal](manage-users-portal.md#create-a-consumer-user), or [Microsoft Graph API](microsoft-graph-operations.md).
3131

3232
![Profile editing flow](./media/add-sign-in-policy/sign-in-user-flow.png)
3333

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ Azure AD B2C **Premium P2** is required to create risky sign-in policies. **Prem
8888

8989
To add a Conditional Access policy, disable security defaults:
9090

91-
1. Sign in to the [Azure portal](https://portal.azure.com/).
91+
1. Sign in to the [Azure portal](https://portal.azure.com).
9292
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
9393
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
9494
1. Under **Azure services**, select **Azure Active Directory**. Or use the search box to find and select **Azure Active Directory**.
@@ -421,7 +421,7 @@ The claims transformation isn't limited to the `strongAuthenticationPhoneNumber`
421421

422422
To review the result of a Conditional Access event:
423423

424-
1. Sign in to the [Azure portal](https://portal.azure.com/).
424+
1. Sign in to the [Azure portal](https://portal.azure.com).
425425
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
426426
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
427427
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.

articles/active-directory-b2c/configure-security-analytics-sentinel.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ After you configure your Azure AD B2C instance to send logs to Azure Monitor, en
5555
>[!IMPORTANT]
5656
>To enable Microsoft Sentinel, obtain Contributor permissions to the subscription in which the Microsoft Sentinel workspace resides. To use Microsoft Sentinel, use Contributor or Reader permissions on the resource group to which the workspace belongs.
5757
58-
1. Go to the [Azure portal](https://portal.azure.com).
58+
1. Sign in to the [Azure portal](https://portal.azure.com).
5959
2. Select the subscription where the Log Analytics workspace is created.
6060
3. Search for and select **Microsoft Sentinel**.
6161

articles/active-directory-b2c/configure-user-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ In this article, you collect a new attribute during your sign-up journey in Azur
3232

3333
## Add user attributes your user flow
3434

35-
1. Sign in to the [Azure portal](https://portal.azure.com/).
35+
1. Sign in to the [Azure portal](https://portal.azure.com).
3636
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
3737
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
3838
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.

articles/active-directory-b2c/custom-email-mailjet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ If you don't already have one, start by setting up a Mailjet account (Azure cust
4646

4747
Next, store the Mailjet API key in an Azure AD B2C policy key for your policies to reference.
4848

49-
1. Sign in to the [Azure portal](https://portal.azure.com/).
49+
1. Sign in to the [Azure portal](https://portal.azure.com).
5050
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
5151
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
5252
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.

articles/active-directory-b2c/custom-email-sendgrid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Be sure to complete the section in which you [create a SendGrid API key](https:/
4444

4545
Next, store the SendGrid API key in an Azure AD B2C policy key for your policies to reference.
4646

47-
1. Sign in to the [Azure portal](https://portal.azure.com/).
47+
1. Sign in to the [Azure portal](https://portal.azure.com).
4848
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
4949
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
5050
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.

articles/active-directory-b2c/disable-email-verification.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Some application developers prefer to skip email verification during the sign-up
3636

3737
Follow these steps to disable email verification:
3838

39-
1. Sign in to the [Azure portal](https://portal.azure.com)
39+
1. Sign in to the [Azure portal](https://portal.azure.com).
4040
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
4141
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
4242
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
@@ -75,7 +75,7 @@ The **LocalAccountSignUpWithLogonEmail** technical profile is a [self-asserted](
7575

7676
## Test your policy
7777

78-
1. Sign in to the [Azure portal](https://portal.azure.com)
78+
1. Sign in to the [Azure portal](https://portal.azure.com).
7979
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
8080
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
8181
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.

0 commit comments

Comments
 (0)