Skip to content

Commit 91b1a00

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into sap-reduce-fp
2 parents c7fa2eb + 594eb0d commit 91b1a00

File tree

3,343 files changed

+25998
-22592
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,343 files changed

+25998
-22592
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6573,7 +6573,11 @@
65736573
"source_path_from_root": "/articles/azure-monitor/logs/data-collection-rule-sample-custom-logs.md",
65746574
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-samples",
65756575
"redirect_document_id": false
6576-
}
6577-
6576+
},
6577+
{
6578+
"source_path_from_root": "/articles/azure-monitor/agents/data-collection-rule-sample-agent.md",
6579+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-samples",
6580+
"redirect_document_id": false
6581+
}
65786582
]
65796583
}

.openpublishing.redirection.json

Lines changed: 25 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -941,11 +941,6 @@
941941
"redirect_url": "/azure/site-recovery/hyper-v-azure-support-matrix",
942942
"redirect_document_id": false
943943
},
944-
{
945-
"source_path": "articles/site-recovery/unregister-vmm-server-script.md",
946-
"redirect_url": "/azure/site-recovery/azure-to-azure-autoupdate",
947-
"redirect_document_id": false
948-
},
949944
{
950945
"source_path": "articles/site-recovery/hyper-v-vmm-secondary-support-matrix.md",
951946
"redirect_url": "/azure/site-recovery/azure-to-azure-autoupdate",
@@ -1001,6 +996,26 @@
1001996
"redirect_url": "/azure/container-registry/container-registry-configure-conditional-access.md",
1002997
"redirect_document_id": false
1003998
},
999+
{
1000+
"source_path": "articles/container-registry/tutorial-artifact-streaming.md",
1001+
"redirect_url": "/azure/container-registry/container-registry-artifact-streaming",
1002+
"redirect_document_id": false
1003+
},
1004+
{
1005+
"source_path": "articles/container-registry/tutorial-artifact-streaming-cli.md",
1006+
"redirect_url": "/azure/container-registry/container-registry-artifact-streaming",
1007+
"redirect_document_id": false
1008+
},
1009+
{
1010+
"source_path": "articles/container-registry/tutorial-artifact-streaming-portal.md",
1011+
"redirect_url": "/azure/container-registry/container-registry-artifact-streaming",
1012+
"redirect_document_id": false
1013+
},
1014+
{
1015+
"source_path": "articles/container-registry/tutorial-artifact-streaming-troubleshoot.md",
1016+
"redirect_url": "/azure/container-registry/troubleshoot-artifact-streaming",
1017+
"redirect_document_id": false
1018+
},
10041019
{
10051020
"source_path": "articles/site-recovery/vmware-physical-secondary-disaster-recovery.md",
10061021
"redirect_url": "/azure/site-recovery/vmware-physical-secondary-architecture",
@@ -22531,6 +22546,11 @@
2253122546
"source_path_from_root": "/articles/virtual-network/ip-services/virtual-networks-static-private-ip-classic-ps.md",
2253222547
"redirect_url": "/updates/azure-classic-resource-providers-will-be-retired-on-31-august-2024/",
2253322548
"redirect_document_id": false
22549+
},
22550+
{
22551+
"source_path_from_root": "/articles/orbital/overview-analytics.md",
22552+
"redirect_url": "/azure/orbital/overview",
22553+
"redirect_document_id": false
2253422554
}
2253522555
]
2253622556
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -369,6 +369,11 @@
369369
"source_path_from_root": "/articles/virtual-desktop/publish-applications.md",
370370
"redirect_url": "/azure/virtual-desktop/publish-applications-stream-remoteapp",
371371
"redirect_document_id": false
372+
},
373+
{
374+
"source_path_from_root": "/articles/virtual-desktop/autoscale-new-existing-host-pool.md",
375+
"redirect_url": "/azure/virtual-desktop/autoscale-scaling-plan",
376+
"redirect_document_id": true
372377
}
373378
]
374379
}

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,13 @@ manager: CelesteDG
88

99
ms.service: active-directory
1010

11-
ms.custom:
1211
ms.topic: reference
13-
ms.date: 11/08/2022
12+
ms.date: 01/11/2024
1413
ms.author: kengaderdus
1514
ms.subservice: B2C
15+
16+
17+
#Customer intent: As a developer using Azure AD B2C, I want to define a Microsoft Entra ID self-service password reset technical profile.
1618
---
1719

1820
# Define a Microsoft Entra ID SSPR technical profile in an Azure AD B2C custom policy

articles/active-directory-b2c/access-tokens.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@ manager: CelesteDG
88
ms.service: active-directory
99

1010
ms.topic: conceptual
11-
ms.date: 03/09/2023
12-
ms.custom:
11+
ms.date: 01/11/2024
1312
ms.author: kengaderdus
1413
ms.subservice: B2C
14+
15+
16+
#Customer intent: As a developer integrating Azure Active Directory B2C with a web application and web API, I want to understand how to request an access token, so that I can authenticate and authorize users to access my APIs securely.
17+
1518
---
1619
# Request an access token in Azure Active Directory B2C
1720

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,15 @@ manager: CelesteDG
88

99
ms.service: active-directory
1010

11-
ms.custom:
1211
ms.topic: reference
13-
ms.date: 11/06/2023
12+
ms.date: 01/11/2024
1413
ms.author: kengaderdus
1514
ms.reviewer: yoelhor
1615
ms.subservice: B2C
16+
17+
18+
#Customer intent: As a developer using Azure Active Directory B2C, I want to define a technical profile for Microsoft Entra user management, so that I can interact with a claims provider that supports the standardized protocol and perform operations like reading, writing, and deleting user accounts.
19+
1720
---
1821

1922
# Define a Microsoft Entra technical profile in an Azure Active Directory B2C custom policy

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,10 @@
11
---
22
title: Token enrichment - Azure Active Directory B2C
33
description: Enrich tokens with claims from external identity data sources using APIs or outbound webhooks.
4-
54
author: garrodonnell
65
manager: CelesteDG
7-
86
ms.service: active-directory
9-
10-
ms.custom:
117
ms.topic: how-to
12-
138
ms.date: 01/17/2023
149
ms.author: godonnell
1510
ms.subservice: B2C

articles/active-directory-b2c/add-native-application.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,15 @@ author: kengaderdus
66
manager: CelesteDG
77

88
ms.author: kengaderdus
9-
ms.date: 02/04/2019
9+
ms.date: 01/11/2024
1010
ms.custom: mvc
1111
ms.topic: how-to
1212
ms.service: active-directory
1313
ms.subservice: B2C
14+
15+
16+
#Customer intent: As a developer integrating Azure Active Directory B2C with a native client application, I want to register the client resources in my tenant, so that my application can communicate with Azure Active Directory B2C.
17+
1418
---
1519

1620
# Add a native client application to your Azure Active Directory B2C tenant

articles/active-directory-b2c/add-password-change-policy.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,15 @@ manager: CelesteDG
88

99
ms.service: active-directory
1010

11-
ms.custom:
1211
ms.topic: how-to
13-
ms.date: 08/24/2021
12+
ms.date: 01/11/2024
1413
ms.author: kengaderdus
1514
ms.subservice: B2C
1615
zone_pivot_groups: b2c-policy-type
16+
17+
18+
#Customer intent: As an Azure AD B2C administrator, I want to set up a password change flow using custom policies, so that users can change their passwords without email verification, improving the user experience and security.
19+
1720
---
1821

1922
# Set up password change by using custom policies in Azure Active Directory B2C

articles/active-directory-b2c/add-profile-editing-policy.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,14 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: how-to
12-
ms.date: 06/07/2021
13-
ms.custom:
12+
ms.date: 01/11/2024
1413
ms.author: kengaderdus
1514
ms.subservice: B2C
1615
zone_pivot_groups: b2c-policy-type
16+
17+
18+
#Customer intent: As a developer integrating Azure Active Directory B2C into my application, I want to set up a profile editing flow, so that users can manage their profile attributes such as display name, surname, given name, and city.
19+
1720
---
1821

1922
# Set up a profile editing flow in Azure Active Directory B2C

0 commit comments

Comments
 (0)