Skip to content

Commit 9b37391

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-ddobric
2 parents 1001be9 + eedbf58 commit 9b37391

File tree

4,178 files changed

+62772
-33414
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,178 files changed

+62772
-33414
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -990,6 +990,7 @@
990990
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
991991
"articles/azure-relay/.openpublishing.redirection.relay.json",
992992
"articles/communication-services/.openpublishing.redirection.communication-services.json",
993+
"articles/confidential-computing/.openpublishing.redirection.json",
993994
"articles/cosmos-db/.openpublishing.redirection.cosmos-db.json",
994995
"articles/cost-management-billing/.openpublishing.redirection.cost-management-billing.json",
995996
"articles/data-catalog/.openpublishing.redirection.data-catalog.json",

.openpublishing.redirection.active-directory.json

Lines changed: 18 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,6 @@
3030
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
3131
"redirect_document_id": false
3232
},
33-
{
34-
"source_path_from_root": "/articles/active-directory/saas-apps/netmotion-mobility-tutorial.md",
35-
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
36-
"redirect_document_id": false
37-
},
3833
{
3934
"source_path_from_root": "/articles/active-directory/fundamentals/whats-new-microsoft-365-government.md",
4035
"redirect_url": "/azure/active-directory/fundamentals/whats-new",
@@ -2043,7 +2038,7 @@
20432038
{
20442039
"source_path_from_root": "/articles/active-directory/conditional-access/conditional-access-for-exo-and-spo.md",
20452040
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
2046-
"redirect_document_id": true
2041+
"redirect_document_id": false
20472042
},
20482043
{
20492044
"source_path_from_root": "/articles/active-directory/conditional-access/baseline-protection.md",
@@ -4258,7 +4253,12 @@
42584253
},
42594254
{
42604255
"source_path_from_root": "/articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md",
4261-
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication",
4256+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
4257+
"redirect_document_id": false
4258+
},
4259+
{
4260+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication.md",
4261+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
42624262
"redirect_document_id": true
42634263
},
42644264
{
@@ -10837,11 +10837,20 @@
1083710837
"redirect_document_id": true
1083810838
},
1083910839
{
10840-
"source_path_from_root": "/articles/active-directory/manage-apps/recover-deleted-apps-faq.md",
10840+
"source_path": "articles/active-directory/manage-apps/recover-deleted-apps-faq.md",
1084110841
"redirect_url": "/azure/active-directory/manage-apps/delete-recover-faq",
1084210842
"redirect_document_id": false
10843+
},
10844+
{
10845+
"source_path": "articles/azure-percept/voice-control-your-inventory-then-visualize-with-power-bi-dashboard.md",
10846+
"redirect_url": "/azure/azure-percept/index",
10847+
"redirect_document_id": false
10848+
},
10849+
{
10850+
"source_path_from_root": "/articles/active-directory/fundamentals/keep-me-signed-in.md",
10851+
"redirect_url": "/azure/active-directory/fundamentals/customize-branding",
10852+
"redirect_document_id": false
1084310853
}
1084410854

10845-
1084610855
]
1084710856
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -510,6 +510,11 @@
510510
"source_path_from_root": "/articles/azure-monitor/logs/workspace-design-service-providers.md" ,
511511
"redirect_url": "/azure/azure-monitor/logs/workspace-design",
512512
"redirect_document_id": false
513+
},
514+
{
515+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-transition-hybrid.md" ,
516+
"redirect_url": "/azure/azure-monitor/containers/container-insights-onboard",
517+
"redirect_document_id": false
513518
}
514519
]
515520
}

.openpublishing.redirection.azure-percept.json

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,28 @@
44
"source_path_from_root": "/articles/azure-percept/how-to-select-update-package.md",
55
"redirect_url": "/azure/azure-percept/how-to-determine-your-update-strategy",
66
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/azure-percept/deepstream/azure-percept-for-deepstream-overview.md",
10+
"redirect_url": "/azure/azure-percept/index",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/azure-percept/hci/azure-percept-on-azure-stack-hci-overview.md",
15+
"redirect_url": "/azure/azure-percept/index",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/azure-percept/studio/azure-percept-studio-overview.md",
20+
"redirect_url": "/azure/azure-percept/index",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/azure-percept/open-source/azure-percept-open-source-project-overview.md",
25+
"redirect_url": "/azure/azure-percept/index",
26+
"redirect_document_id": false
727
}
28+
829
]
930
}
31+

.openpublishing.redirection.json

Lines changed: 36 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,15 @@
11
{
22
"redirections": [
3-
{
3+
{
44
"source_path": "articles/api-management/zone-redundancy.md",
55
"redirect_url": "/azure/availability-zones/migrate-api-mgt",
66
"redirect_document_id": false
77
},
8+
{
9+
"source_path": "articles/api-management/developer-portal-implement-widgets.md",
10+
"redirect_url": "/azure/api-management/developer-portal-extend-custom-functionality",
11+
"redirect_document_id": false
12+
},
813
{
914
"source_path": "articles/virtual-machines/linux/find-unattached-nics.md",
1015
"redirect_url": "/previous-versions/azure/virtual-machines/linux/find-unattached-nics",
@@ -533,6 +538,11 @@
533538
"redirect_url": "/azure/frontdoor/front-door-geo-filtering",
534539
"redirect_document_id": false
535540
},
541+
{
542+
"source_path_from_root": "/articles/frontdoor/front-door-geo-filtering.md",
543+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-geo-filtering",
544+
"redirect_document_id": false
545+
},
536546
{
537547
"source_path_from_root": "/articles/frontdoor/standard-premium/edge-locations.md",
538548
"redirect_url": "/azure/frontdoor/edge-locations-by-region",
@@ -6813,6 +6823,11 @@
68136823
"redirect_url": "/azure/azure-functions/functions-bindings-error-pages",
68146824
"redirect_document_id": false
68156825
},
6826+
{
6827+
"source_path_from_root": "/articles/azure-functions/functions-debug-event-grid-trigger-local.md",
6828+
"redirect_url": "/azure/azure-functions/functions-event-grid-blob-trigger",
6829+
"redirect_document_id": false
6830+
},
68166831
{
68176832
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
68186833
"redirect_url": "/azure/azure-government",
@@ -6913,6 +6928,11 @@
69136928
"redirect_url": "/azure/azure-government/compare-azure-government-global-azure",
69146929
"redirect_document_id": false
69156930
},
6931+
{
6932+
"source_path_from_root": "/articles/azure-government/documentation-government-overview.md",
6933+
"redirect_url": "/azure/azure-government/documentation-government-plan-security",
6934+
"redirect_document_id": false
6935+
},
69166936
{
69176937
"source_path_from_root": "/articles/security/compliance/azure-services-in-fedramp-auditscope.md",
69186938
"redirect_url": "/azure/azure-government/compliance/azure-services-in-fedramp-auditscope",
@@ -18319,14 +18339,19 @@
1831918339
"redirect_document_id": false
1832018340
},
1832118341
{
18322-
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
18342+
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
1832318343
"redirect_url": "/connectors/bingsearch",
18324-
"redirect_document_id": false
18344+
"redirect_document_id": false
1832518345
},
1832618346
{
18327-
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18328-
"redirect_url": "/connectors/twilio",
18329-
"redirect_document_id": false
18347+
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18348+
"redirect_url": "/connectors/twilio",
18349+
"redirect_document_id": false
18350+
},
18351+
{
18352+
"source_path_from_root": "/articles/connectors/connectors-create-api-sendgrid.md",
18353+
"redirect_url": "/connectors/sendgrid",
18354+
"redirect_document_id": false
1833018355
},
1833118356
{
1833218357
"source_path_from_root": "/articles/connectors/connectors-schema-migration.md",
@@ -22333,6 +22358,11 @@
2233322358
"redirect_url": "/azure/storage/common/customer-managed-keys-configure-key-vault",
2233422359
"redirect_document_id": false
2233522360
},
22361+
{
22362+
"source_path_from_root": "/articles/storage/common/customer-managed-keys-configure-key-vault.md",
22363+
"redirect_url": "/azure/storage/common/customer-managed-keys-configure-existing-account",
22364+
"redirect_document_id": false
22365+
},
2233622366
{
2233722367
"source_path_from_root": "/articles/storage/common/encryption-customer-managed-keys.md",
2233822368
"redirect_url": "/azure/storage/common/customer-managed-keys-overview",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -482,6 +482,8 @@
482482
- name: Identity verification and proofing partners
483483
href: identity-verification-proofing.md
484484
displayName: id verify, id verification, azure ad b2c proofing, id proofing
485+
- name: Deduce
486+
href: partner-deduce.md
485487
- name: eID-Me
486488
href: partner-eid-me.md
487489
- name: Experian

articles/active-directory-b2c/configure-authentication-in-azure-static-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 06/28/2022
10+
ms.date: 08/22/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -30,7 +30,7 @@ OpenID Connect (OIDC) is an authentication protocol that's built on OAuth 2.0. U
3030
When the access token expires or the app session is invalidated, Azure Static Web App initiates a new authentication request and redirects users to Azure AD B2C. If the Azure AD B2C [SSO session](session-behavior.md) is active, Azure AD B2C issues an access token without prompting users to sign in again. If the Azure AD B2C session expires or becomes invalid, users are prompted to sign in again.
3131

3232
## Prerequisites
33-
33+
- A premium Azure subscription.
3434
- If you haven't created an app yet, follow the guidance how to create an [Azure Static Web App](../static-web-apps/overview.md).
3535
- Familiarize yourself with the Azure Static Web App [staticwebapp.config.json](../static-web-apps/configuration.md) configuration file.
3636
- Familiarize yourself with the Azure Static Web App [App Settings](../static-web-apps/application-settings.md).

articles/active-directory-b2c/configure-authentication-sample-react-spa-app.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,15 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 07/07/2022
10+
ms.date: 08/25/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
1414
---
1515

1616
# Configure authentication in a sample React single-page application by using Azure Active Directory B2C
1717

18-
This article uses a sample React single-page application (SPA) to illustrate how to add Azure Active Directory B2C (Azure AD B2C) authentication to your React apps.
18+
This article uses a sample React single-page application (SPA) to illustrate how to add Azure Active Directory B2C (Azure AD B2C) authentication to your React apps. The React SPA also calls an API that's protected by Azure AD B2C itself.
1919

2020
## Overview
2121

@@ -121,7 +121,7 @@ Now that you've obtained the SPA sample, update the code with your Azure AD B2C
121121
| b2cPolicies | authorities | Replace `your-tenant-name` with your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). For example, use `contoso.onmicrosoft.com`. Then, replace the policy name with the user flow or custom policy that you created in [step 1](#step-1-configure-your-user-flow). For example: `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<your-sign-in-sign-up-policy>`. |
122122
| b2cPolicies | authorityDomain|Your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). For example: `contoso.onmicrosoft.com`. |
123123
| Configuration | clientId | The React application ID from [step 2.3](#23-register-the-react-app). |
124-
| protectedResources| endpoint| The URL of the web API: `http://localhost:5000/api/todolist`. |
124+
| protectedResources| endpoint| The URL of the web API: `http://localhost:5000/hello`. |
125125
| protectedResources| scopes| The web API scopes that you created in [step 2.2](#22-configure-scopes). For example: `b2cScopes: ["https://<your-tenant-name>.onmicrosoft.com/tasks-api/tasks.read"]`. |
126126

127127
Your resulting *src/authConfig.js* code should look similar to the following sample:
@@ -156,7 +156,7 @@ export const msalConfig: Configuration = {
156156

157157
export const protectedResources = {
158158
todoListApi: {
159-
endpoint: "http://localhost:5000/api/todolist",
159+
endpoint: "http://localhost:5000/hello",
160160
scopes: ["https://your-tenant-namee.onmicrosoft.com/tasks-api/tasks.read"],
161161
},
162162
}
@@ -171,7 +171,7 @@ In the sample folder, open the *config.json* file. This file contains informatio
171171

172172
|Section |Key |Value |
173173
|---------|---------|---------|
174-
|credentials|tenantName| The first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). For example: `contoso`.|
174+
|credentials|tenantName| Your Azure AD B2C [domain/tenant name](tenant-management.md#get-your-tenant-name). For example: `contoso.ommicrosoft.com`.|
175175
|credentials|clientID| The web API application ID from step [2.1](#21-register-the-web-api-application). In the [earlier diagram](#app-registration), it's the application with **App ID: 2**.|
176176
|credentials| issuer| (Optional) The token issuer `iss` claim value. Azure AD B2C by default returns the token in the following format: `https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/`. Replace `<your-tenant-name>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). Replace `<your-tenant-ID>` with your [Azure AD B2C tenant ID](tenant-management.md#get-your-tenant-id). |
177177
|policies|policyName|The user flow or custom policy that you created in [step 1](#step-1-configure-your-user-flow). If your application uses multiple user flows or custom policies, specify only one. For example, use the sign-up or sign-in user flow.|
@@ -182,7 +182,7 @@ Your final configuration file should look like the following JSON:
182182
```json
183183
{
184184
"credentials": {
185-
"tenantName": "<your-tenant-name>",
185+
"tenantName": "<your-tenant-name>.ommicrosoft.com",
186186
"clientID": "<your-webapi-application-ID>",
187187
"issuer": "https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/"
188188
},
@@ -201,7 +201,7 @@ Your final configuration file should look like the following JSON:
201201

202202
## Step 5: Run the React SPA and web API
203203

204-
You're now ready to test the React scoped access to the API. In this step, run both the web API and the sample React application on your local machine. Then, sign in to the React application, and select the **TodoList** button to start a request to the protected API.
204+
You're now ready to test the React scoped access to the API. In this step, run both the web API and the sample React application on your local machine. Then, sign in to the React application, and select the **HelloAPI** button to start a request to the protected API.
205205

206206
### Run the web API
207207

@@ -251,11 +251,13 @@ You're now ready to test the React scoped access to the API. In this step, run b
251251
![Screenshot that shows the React sample app with the login link.](./media/configure-authentication-sample-react-spa-app/sample-app-sign-in.png)
252252

253253
1. Choose **Sign in using Popup**, or **Sign in using Redirect**.
254-
1. Complete the sign-up or sign in process. Upon successful sign in, you should see your profile.
255-
1. From the menu, select **Hello API**.
256-
1. Check out the result of the REST API call. The following screenshot shows the React sample REST API return value.
257-
254+
1. Complete the sign-up or sign in process. Upon successful sign-in, you should see a page with three buttons, **HelloAPI**, **Edit Profile** and **Sign Out**.
258255
![Screenshot that shows the React sample app with the user profile, and the call to the A P I.](./media/configure-authentication-sample-react-spa-app/sample-app-call-api.png)
256+
1. From the menu, select **HelloAPI** button.
257+
1. Check out the result of the REST API call. The following screenshot shows the React sample REST API return value:
258+
259+
:::image type="content" source="./media/configure-authentication-sample-react-spa-app/sample-app-call-api-result.png" alt-text="Screenshot of the React sample app with the user profile, and the result of calling the web A P I.":::
260+
259261

260262
## Deploy your application
261263

articles/active-directory-b2c/enable-authentication-web-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -443,7 +443,7 @@ Under the project root folder, create a *config.json* file, and then add to it t
443443
```json
444444
{
445445
"credentials": {
446-
"tenantName": "<your-tenant-name>",
446+
"tenantName": "<your-tenant-name>.onmicrosoft.com",
447447
"clientID": "<your-webapi-application-ID>",
448448
"issuer": "https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/"
449449
},
@@ -470,7 +470,7 @@ In the *config.json* file, update the following properties:
470470

471471
|Section |Key |Value |
472472
|---------|---------|---------|
473-
| credentials | tenantName | The first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `contoso`).|
473+
| credentials | tenantName | Your Azure AD B2C [tenant name/domain name](tenant-management.md#get-your-tenant-name) (for example, `contoso.onmicrosoft.com`).|
474474
| credentials |clientID | The web API application ID. In the [preceding diagram](#app-registration-overview), it's the application with *App ID: 2*. To learn how to get your web API application registration ID, see [Prerequisites](#prerequisites). |
475475
| credentials | issuer| The token issuer `iss` claim value. By default, Azure AD B2C returns the token in the following format: `https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/`. Replace `<your-tenant-name>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). Replace `<your-tenant-ID>` with your [Azure AD B2C tenant ID](tenant-management.md#get-your-tenant-id). |
476476
| policies | policyName | The user flows, or custom policy. To learn how to get your user flow or policy, see [Prerequisites](#prerequisites).|

articles/active-directory-b2c/identity-verification-proofing.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ Microsoft partners with the following ISV partners.
2727

2828
| ISV partner | Description and integration walkthroughs |
2929
|:-------------------------|:--------------|
30+
| ![Screenshot of a deduce logo.](./media/partner-gallery/deduce-logo.png) | [Deduce](./partner-deduce.md) is an identity verification and proofing provider focused on stopping account takeover and registration fraud. It helps combat identity fraud and creates a trusted user experience. |
3031
| ![Screenshot of a eid-me logo](./media/partner-gallery/eid-me-logo.png) | [eID-Me](./partner-eid-me.md) is an identity verification and decentralized digital identity solution for Canadian citizens. It enables organizations to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |
3132
|![Screenshot of an Experian logo.](./media/partner-gallery/experian-logo.png) | [Experian](./partner-experian.md) is an Identity verification and proofing provider that performs risk assessments based on user attributes to prevent fraud. |
3233
|![Screenshot of an IDology logo.](./media/partner-gallery/idology-logo.png) | [IDology](./partner-idology.md) is an Identity verification and proofing provider with ID verification solutions, fraud prevention solutions, compliance solutions, and others.|

0 commit comments

Comments
 (0)