Skip to content

Commit 98358cb

Browse files
AppGw portal
2 parents 7b81d5a + 255abb6 commit 98358cb

File tree

667 files changed

+12328
-7151
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

667 files changed

+12328
-7151
lines changed

.openpublishing.redirection.json

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,30 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/partner-solutions/logzio/create.md",
5+
"redirect_url": "/previous-versions/azure/partner-solutions/logzio/create",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/partner-solutions/logzio/manage.md",
10+
"redirect_url": "/previous-versions/azure/partner-solutions/logzio/manage",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/partner-solutions/logzio/overview.md",
15+
"redirect_url": "/previous-versions/azure/partner-solutions/logzio/overview",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/partner-solutions/logzio/setup-sso.md",
20+
"redirect_url": "/previous-versions/azure/partner-solutions/logzio/setup-sso",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/partner-solutions/logzio/troubleshoot.md",
25+
"redirect_url": "/previous-versions/azure/partner-solutions/logzio/troubleshoot",
26+
"redirect_document_id": false
27+
},
328
{
429
"source_path": "articles/hdinsight-aks/cluster-storage.md",
530
"redirect_url": "/previous-versions/azure/hdinsight-aks/cluster-storage",
@@ -1020,6 +1045,11 @@
10201045
"redirect_url": "/azure/migrate/discover-and-assess-using-private-endpoints",
10211046
"redirect_document_id": false
10221047
},
1048+
{
1049+
"source_path": "articles/operator-call-protection/index.yml",
1050+
"redirect_url": "https://learn.microsoft.com",
1051+
"redirect_document_id": false
1052+
},
10231053
{
10241054
"source_path": "articles/operator-5g-core/index.yml",
10251055
"redirect_url": "https://learn.microsoft.com",
@@ -1810,6 +1840,11 @@
18101840
"redirect_url": "/azure/azure-app-configuration/howto-variant-feature-flags-aspnet-core",
18111841
"redirect_document_id": false
18121842
},
1843+
{
1844+
"source_path_from_root": "/articles/azure-app-configuration/use-feature-flags-dotnet-core.md",
1845+
"redirect_url": "/azure/azure-app-configuration/feature-management-dotnet-reference",
1846+
"redirect_document_id": false
1847+
},
18131848
{
18141849
"source_path_from_root": "/articles/public-multi-access-edge-compute-mec/considerations-for-deployment.md",
18151850
"redirect_url": "/previous-versions/azure/public-multi-access-edge-compute-mec/considerations-for-deployment",
@@ -1975,6 +2010,21 @@
19752010
"redirect_url": "./azure-resource-manager/management/deployment-models",
19762011
"redirect_document_id": false
19772012
},
2013+
{
2014+
"source_path_from_root": "/articles/azure-functions/functions-add-output-binding-storage-queue-java.md",
2015+
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-cli?pivots=programming-language-java",
2016+
"redirect_document_id": false
2017+
},
2018+
{
2019+
"source_path_from_root": "/articles/azure-functions/create-first-function-arc-custom-container.md",
2020+
"redirect_url": "/azure/azure-functions/functions-how-to-custom-container?pivots=azure-arc",
2021+
"redirect_document_id": false
2022+
},
2023+
{
2024+
"source_path_from_root": "/articles/azure-functions/create-first-function-arc-cli.md",
2025+
"redirect_url": "/azure/azure-functions/functions-how-to-custom-container?pivots=azure-arc",
2026+
"redirect_document_id": false
2027+
},
19782028
{
19792029
"source_path_from_root": "/articles/azure-functions/create-first-function-vs-code-web.md",
19802030
"redirect_url": "/azure/azure-functions",
@@ -5154,6 +5204,11 @@
51545204
"redirect_url": "/azure/virtual-wan/global-hub-profile",
51555205
"redirect_document_id": false
51565206
},
5207+
{
5208+
"source_path_from_root": "/articles/virtual-wan/howto-openvpn-clients.md",
5209+
"redirect_url": "/azure/virtual-wan/point-to-site-vpn-client-certificate-windows-openvpn-client-version-3",
5210+
"redirect_document_id": false
5211+
},
51575212
{
51585213
"source_path_from_root": "/articles/virtual-wan/logs-metrics.md",
51595214
"redirect_url": "/azure/virtual-wan/monitor-virtual-wan",

articles/active-directory-b2c/add-captcha.md

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,21 @@ You need more claims to enable CAPTCHA in your custom policy:
118118
<DisplayName>Flag indicating that the captcha was successfully solved</DisplayName>
119119
<DataType>boolean</DataType>
120120
</ClaimType>
121+
122+
<ClaimType Id="mfaCaptchaEnabled">
123+
<DisplayName>flag used to control captcha enabled in MFA</DisplayName>
124+
<DataType>string</DataType>
125+
</ClaimType>
126+
127+
<ClaimType Id="signupCaptchaEnabled">
128+
<DisplayName>flag used to control captcha enabled during signup</DisplayName>
129+
<DataType>string</DataType>
130+
</ClaimType>
131+
132+
<ClaimType Id="signinCaptchaEnabled">
133+
<DisplayName>flag used to control captcha enabled during signin</DisplayName>
134+
<DataType>string</DataType>
135+
</ClaimType>
121136
...
122137
<!--<ClaimsSchema>-->
123138
```
@@ -314,6 +329,58 @@ To enable CAPTCHA in MFA flow, you need to make an update in two technical profi
314329
...
315330
</TechnicalProfile>
316331
```
332+
333+
### Enable CAPTCHA feature flag
334+
335+
To enforce CAPTCHA during sign-up, sign-in, or MFA, you need to add a technical profile that enables a feature flag for each scenario, then call the technical profile in the user journey.
336+
337+
1. In the *TrustFrameworkBase.XML* file, locate the `ClaimsProviders` element and add the claims provider by using the following code:
338+
339+
```xml
340+
<!--<ClaimsProvider>-->
341+
...
342+
<ClaimsProvider>
343+
344+
<DisplayName>Set Feature Flags</DisplayName>
345+
346+
<TechnicalProfiles>
347+
348+
<TechnicalProfile Id="SetFeatureDefaultValue">
349+
<DisplayName>Set Feature Flags</DisplayName>
350+
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.ClaimsTransformationProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
351+
<OutputClaims>
352+
<OutputClaim ClaimTypeReferenceId="signupCaptchaEnabled" DefaultValue="true" />
353+
<OutputClaim ClaimTypeReferenceId="signinCaptchaEnabled" DefaultValue="true" />
354+
<OutputClaim ClaimTypeReferenceId="mfaCaptchaEnabled" DefaultValue="true" />
355+
</OutputClaims>
356+
</TechnicalProfile>
357+
</TechnicalProfiles>
358+
</ClaimsProvider>
359+
...
360+
<!--<ClaimsProviders>-->
361+
```
362+
363+
2. Set `DefaultValue` to true or false depending on the CAPTCHA scenario
364+
365+
3. Add the feature flags technical profile to the user journey then update the order of the rest of the orchestration steps.
366+
367+
```xml
368+
<!--<UserJourneys>-->
369+
...
370+
<UserJourney Id="SignUpOrSignIn">
371+
<OrchestrationSteps>
372+
373+
<!--Add this orchestration step-->
374+
<OrchestrationStep Order="1" Type="ClaimsExchange">
375+
<ClaimsExchanges>
376+
<ClaimsExchange Id="SetFeatureDefaultValue" TechnicalProfileReferenceId="SetFeatureDefaultValue" />
377+
</ClaimsExchanges>
378+
</OrchestrationStep>
379+
...
380+
<!--<UserJourneys>-->
381+
```
382+
383+
317384
## Upload the custom policy files
318385

319386
Use the steps in [Upload the policies](tutorial-create-user-flows.md?pivots=b2c-custom-policy&branch=pr-en-us-260336#upload-the-policies) to upload your custom policy files.

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -210,9 +210,9 @@ Next, specify that the application should be treated as a public client:
210210
1. In the left menu, under **Manage**, select **Authentication**.
211211
1. Under **Advanced settings**, in the **Allow public client flows** section, set **Enable the following mobile and desktop flows** to **Yes**.
212212
1. Select **Save**.
213-
1. Ensure that **"allowPublicClient": true** is set in the application manifest:
213+
1. Ensure that **"isFallbackPublicClient": true** is set in the application manifest:
214214
1. In the left menu, under **Manage**, select **Manifest** to open application manifest.
215-
1. Find **allowPublicClient** key and ensure its value is set to **true**.
215+
1. Find **isFallbackPublicClient** key and ensure its value is set to **true**.
216216

217217
Now, grant permissions to the API scope you exposed earlier in the *IdentityExperienceFramework* registration:
218218

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 01/10/2025
4+
ms.date: 02/04/2025
55
ms.service: azure-active-directory
66
ms.subservice: b2c
77
ms.topic: whats-new
@@ -17,6 +17,12 @@ manager: CelesteDG
1717

1818
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new and significantly updated docs from the past three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
1919

20+
## January 2025
21+
22+
### Updated articles
23+
24+
- [Azure Active Directory B2C service limits and restrictions](service-limits.md) - Updated limits
25+
2026
## December 2024
2127

2228
### Updated articles
@@ -29,12 +35,3 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
2935

3036
- [Azure Active Directory B2C: Region availability & data residency](data-residency.md) - Updated data residency location
3137

32-
## October 2024
33-
34-
### Updated articles
35-
36-
- [Secure APIs used for API connectors in Azure AD B2C](secure-rest-api.md) - Flow updates
37-
- [Application types that can be used in Active Directory B2C](application-types.md) - Implicit grant flow updates
38-
- [Configure authentication in a sample single-page application by using Azure AD B2C](configure-authentication-sample-spa-app.md) - Implicit grant flow updates
39-
- [Single-page application sign-in using the OAuth 2.0 implicit flow in Azure Active Directory B2C](implicit-flow-single-page-application.md) - Implicit grant flow updates
40-
- [Register a single-page application in Azure Active Directory B2C](tutorial-register-spa.md) - Implicit grant flow updates

articles/api-management/api-management-configuration-repository-git.md

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,9 @@ ms.author: danlep
1313

1414
[!INCLUDE [premium-dev-standard-basic.md](../../includes/api-management-availability-premium-dev-standard-basic.md)]
1515

16+
> [!IMPORTANT]
17+
> Starting March 15, 2025, Azure API Management will [retire](breaking-changes/git-configuration-retirement-march-2025.md) the ability to manage the configuration of your service instance using the built-in Git repository. If you plan to continue using a Git repository to manage the configuration of your service instance after the retirement date, update your configuration management to use a different solution such as APIOps and your own Git repository implementation.
18+
1619
Each API Management service instance maintains a configuration database that contains information about the configuration and metadata for the service instance. Changes can be made to the service instance by changing a setting in the Azure portal, using Azure tools such as Azure PowerShell or the Azure CLI, or making a REST API call. In addition to these methods, you can manage your service instance configuration using Git, enabling scenarios such as:
1720

1821
* **Configuration versioning** - Download and store different versions of your service configuration
@@ -42,7 +45,7 @@ This article describes how to enable and use Git to manage your service configur
4245

4346
1. Navigate to your API Management instance in the [Azure portal](https://portal.azure.com/).
4447

45-
1. In the left menu, under **Deployment and infrastructure**, select **Repository**.
48+
1. In the left menu, under **Deployment + infrastructure**, select **Repository**.
4649

4750
:::image type="content" source="media/api-management-configuration-repository-git/api-management-enable-git.png" alt-text="Screenshot showing how to access Git configuration for API Management.":::
4851

@@ -67,7 +70,10 @@ For information on saving the service configuration using the REST API, see [Ten
6770

6871
## Get access credentials
6972

70-
To clone a repository, in addition to the URL to your repository, your need a username and a password.
73+
To clone a repository, in addition to the URL to your repository, you need a username and a password.
74+
75+
> [!CAUTION]
76+
> Using username and password credentials with a Git repository can pose security risks. Store your password securely and rotate it regularly. Don't store your credentials in plain text in code or configuration files.
7177
7278
1. On the **Repository** page, select **Access credentials** near the top of the page.
7379

@@ -91,19 +97,19 @@ git clone https://{name}.scm.azure-api.net/
9197

9298
Provide the username and password when prompted.
9399

94-
If you receive any errors, try modifying your `git clone` command to include the user name and password, as shown in the following example.
100+
If you receive any errors, try modifying your `git clone` command to include the username, as shown in the following example. Provide the password when prompted.
95101

96102
```
97-
git clone https://username:password@{name}.scm.azure-api.net/
103+
git clone https://username@{name}.scm.azure-api.net/
98104
```
99105

100-
If this provides an error, try URL encoding the password portion of the command. One quick way to do this is to open Visual Studio, and issue the following command in the **Immediate Window**. To open the **Immediate Window**, open any solution or project in Visual Studio (or create a new empty console application), and choose **Windows**, **Immediate** from the **Debug** menu.
106+
If this provides an error, try URL encoding the password and pass it in the command. One quick way to do this is to open Visual Studio, and issue the following command in the **Immediate Window**. To open the **Immediate Window**, open any solution or project in Visual Studio (or create a new empty console application), and choose **Windows**, **Immediate** from the **Debug** menu.
101107

102108
```
103109
?System.Net.WebUtility.UrlEncode("password from the Azure portal")
104110
```
105111

106-
Use the encoded password along with your user name and repository location to construct the git command.
112+
Use the encoded password along with your username and repository location to construct the git command.
107113

108114
```
109115
git clone https://username:url encoded password@{name}.scm.azure-api.net/
@@ -205,7 +211,7 @@ These files can be created, deleted, edited, and managed on your local file syst
205211
> * [Subscriptions](/rest/api/apimanagement/current-ga/subscription)
206212
> * Named values
207213
> * Developer portal entities other than styles and templates
208-
> * Policy Fragments
214+
> * Policy fragments
209215
>
210216
211217
### Root api-management folder
@@ -305,7 +311,8 @@ The `templates` folder contains configuration for the [email templates](api-mana
305311
* `<template name>\configuration.json` - Configuration for the email template.
306312
* `<template name>\body.html` - Body of the email template.
307313

308-
## Next steps
314+
## Related content
315+
309316
For information on other ways to manage your service instance, see:
310317

311318
* [Azure PowerShell cmdlet reference](/powershell/module/az.apimanagement)

0 commit comments

Comments
 (0)