Skip to content

Commit 9ef31aa

Browse files
authored
Merge branch 'main' into repo_sync_working_branch
2 parents 2c1a104 + f2d0597 commit 9ef31aa

File tree

580 files changed

+5048
-2864
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

580 files changed

+5048
-2864
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -883,6 +883,12 @@
883883
"url": "https://github.com/MicrosoftDocs/reusable-content",
884884
"branch": "main",
885885
"branch_mapping": {}
886+
},
887+
{
888+
"path_to_root": "azure-cosmos-db-mongodb-python-getting-started",
889+
"url": "https://github.com/Azure-Samples/azure-cosmos-db-mongodb-python-getting-started",
890+
"branch": "main",
891+
"branch_mapping": {}
886892
}
887893
],
888894
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5963,11 +5963,6 @@
59635963
"redirect_url": "/azure/reliability/cross-region-replication-azure",
59645964
"redirect_document_id": true
59655965
},
5966-
{
5967-
"source_path_from_root": "/articles/partner-solutions/index.md",
5968-
"redirect_url": "/azure/partner-solutions/overview",
5969-
"redirect_document_id": false
5970-
},
59715966
{
59725967
"source_path_from_root": "/articles/fxt-edge-filer/fxt-add-nodes.md",
59735968
"redirect_url": "/azure/fxt-edge-filer/add-nodes",
@@ -6358,6 +6353,11 @@
63586353
"redirect_url": "/azure/azure-cache-for-redis/scripts/create-manage-cache",
63596354
"redirect_document_id": false
63606355
},
6356+
{
6357+
"source_path_from_root": "/articles/storage/blobs/anonymous-read-access-client.md",
6358+
"redirect_url": "/azure/storage/blobs/anonymous-read-access-prevent",
6359+
"redirect_document_id": false
6360+
},
63616361
{
63626362
"source_path_from_root": "/articles/storage/common/storage-auth-abac-attributes.md",
63636363
"redirect_url": "/azure/storage/blobs/storage-auth-abac-attributes",
@@ -29356,12 +29356,12 @@
2935629356
},
2935729357
{
2935829358
"source_path_from_root": "/articles/availability-zones/az-overview.md",
29359-
"redirect_url": "/azure/reliablity/availability-zones-overview.md",
29359+
"redirect_url": "/azure/reliability/availability-zones-overview",
2936029360
"redirect_document_id": false
2936129361
},
2936229362
{
29363-
"source_path_from_root": "/articles/availability-zones/index.md",
29364-
"redirect_url": "/azure/reliablity/index.md",
29363+
"source_path_from_root": "/articles/availability-zones/index.yml",
29364+
"redirect_url": "/azure/reliability/index",
2936529365
"redirect_document_id": false
2936629366
},
2936729367
{

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ To use MS Graph API, and interact with resources in your Azure AD B2C tenant, yo
3939
- [Update a user](/graph/api/user-update)
4040
- [Delete a user](/graph/api/user-delete)
4141

42-
## User phone number management (beta)
42+
## User phone number management
4343

4444
A phone number that can be used by a user to sign-in using [SMS or voice calls](sign-in-options.md#phone-sign-in), or [multifactor authentication](multi-factor-authentication.md). For more information, see [Azure AD authentication methods API](/graph/api/resources/phoneauthenticationmethod).
4545

@@ -54,9 +54,9 @@ Note, the [list](/graph/api/authentication-list-phonemethods) operation returns
5454
![Enable phone sign-in](./media/microsoft-graph-operations/enable-phone-sign-in.png)
5555

5656
> [!NOTE]
57-
> In the current beta version, this API works only if the phone number is stored with a space between the country code and the phone number. The Azure AD B2C service doesn't currently add this space by default.
57+
> A correctly represented phone number is stored with a space between the country code and the phone number. The Azure AD B2C service doesn't currently add this space by default.
5858
59-
## Self-service password reset email address (beta)
59+
## Self-service password reset email address
6060

6161
An email address that can be used by a [username sign-in account](sign-in-options.md#username-sign-in) to reset the password. For more information, see [Azure AD authentication methods API](/graph/api/resources/emailauthenticationmethod).
6262

@@ -66,7 +66,7 @@ An email address that can be used by a [username sign-in account](sign-in-option
6666
- [Update](/graph/api/emailauthenticationmethod-update)
6767
- [Delete](/graph/api/emailauthenticationmethod-delete)
6868

69-
## Software OATH token authentication method (beta)
69+
## Software OATH token authentication method
7070

7171
A software OATH token is a software-based number generator that uses the OATH time-based one-time password (TOTP) standard for multifactor authentication via an authenticator app. Use the Microsoft Graph API to manage a software OATH token registered to a user:
7272

@@ -78,13 +78,14 @@ An email address that can be used by a [username sign-in account](sign-in-option
7878

7979
Manage the [identity providers](add-identity-provider.md) available to your user flows in your Azure AD B2C tenant.
8080

81-
- [List identity providers registered in the Azure AD B2C tenant](/graph/api/identityprovider-list)
82-
- [Create an identity provider](/graph/api/identityprovider-post-identityproviders)
83-
- [Get an identity provider](/graph/api/identityprovider-get)
84-
- [Update identity provider](/graph/api/identityprovider-update)
85-
- [Delete an identity provider](/graph/api/identityprovider-delete)
81+
- [List identity providers available in the Azure AD B2C tenant](/graph/api/identityproviderbase-availableprovidertypes)
82+
- [List identity providers configured in the Azure AD B2C tenant](/graph/api/iidentitycontainer-list-identityproviders)
83+
- [Create an identity provider](/graph/api/identitycontainer-post-identityproviders)
84+
- [Get an identity provider](/graph/api/identityproviderbase-get)
85+
- [Update identity provider](/graph/api/identityproviderbase-update)
86+
- [Delete an identity provider](/graph/api/identityproviderbase-delete)
8687

87-
## User flow
88+
## User flow (beta)
8889

8990
Configure pre-built policies for sign-up, sign-in, combined sign-up and sign-in, password reset, and profile update.
9091

@@ -100,7 +101,7 @@ Choose a mechanism for letting users register via local accounts. Local accounts
100101
- [Get](/graph/api/b2cauthenticationmethodspolicy-get)
101102
- [Update](/graph/api/b2cauthenticationmethodspolicy-update)
102103

103-
## Custom policies
104+
## Custom policies (beta)
104105

105106
The following operations allow you to manage your Azure AD B2C Trust Framework policies, known as [custom policies](custom-policy-overview.md).
106107

@@ -110,7 +111,7 @@ The following operations allow you to manage your Azure AD B2C Trust Framework p
110111
- [Update or create trust framework policy.](/graph/api/trustframework-put-trustframeworkpolicy)
111112
- [Delete an existing trust framework policy](/graph/api/trustframeworkpolicy-delete)
112113

113-
## Policy keys
114+
## Policy keys (beta)
114115

115116
The Identity Experience Framework stores the secrets referenced in a custom policy to establish trust between components. These secrets can be symmetric or asymmetric keys/values. In the Azure portal, these entities are shown as **Policy keys**.
116117

@@ -169,15 +170,16 @@ For more information about accessing Azure AD B2C audit logs, see [Accessing Azu
169170

170171
## Conditional Access
171172

172-
- [List all of the Conditional Access policies](/graph/api/conditionalaccessroot-list-policies?tabs=http)
173+
- [List the built-in templates for Conditional Access policy scenarios](/graph/api/conditionalaccessroot-list-templates)
174+
- [List all of the Conditional Access policies](/graph/api/conditionalaccessroot-list-policies)
173175
- [Read properties and relationships of a Conditional Access policy](/graph/api/conditionalaccesspolicy-get)
174176
- [Create a new Conditional Access policy](/graph/api/resources/application)
175177
- [Update a Conditional Access policy](/graph/api/conditionalaccesspolicy-update)
176178
- [Delete a Conditional Access policy](/graph/api/conditionalaccesspolicy-delete)
177179

178180
## Retrieve or restore deleted users and applications
179181

180-
Deleted items can only be restored if they were deleted within the last 30 days.
182+
Deleted users and apps can only be restored if they were deleted within the last 30 days.
181183

182184
- [List deleted items](/graph/api/directory-deleteditems-list)
183185
- [Get a deleted item](/graph/api/directory-deleteditems-get)

articles/active-directory/app-proxy/application-proxy-configure-native-client-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,6 @@ After you edit the MSAL code with these parameters, your users can authenticate
112112

113113
## Next steps
114114

115-
For more information about the native application flow, see [Native apps in Azure Active Directory](../azuread-dev/native-app.md).
115+
For more information about the native application flow, see [mobile](../develop/authentication-flows-app-scenarios.md#mobile-app-that-calls-a-web-api-on-behalf-of-an-interactive-user) and [desktop](../develop/authentication-flows-app-scenarios.md#desktop-app-that-calls-a-web-api-on-behalf-of-a-signed-in-user) apps in Azure Active Directory.
116116

117117
Learn about setting up [Single sign-on to applications in Azure Active Directory](../manage-apps/sso-options.md#choosing-a-single-sign-on-method).

articles/active-directory/authentication/concept-certificate-based-authentication-smartcard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/05/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: justinha
1212
author: vimrang
@@ -77,7 +77,7 @@ The Windows smart card sign-in works with the latest preview build of Windows 11
7777
7878
## Restrictions and caveats
7979

80-
- Azure AD CBA is supported on Windows Hybrid or Azure AD Joined.
80+
- Azure AD CBA is supported on Windows devices that are hybrid or Azure AD joined.
8181
- Users must be in a managed domain or using Staged Rollout and can't use a federated authentication model.
8282

8383
## Next steps

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ Users with a Temporary Access Pass can navigate the setup process on Windows 10
147147
For Azure AD Joined devices:
148148
- During the Azure AD Join setup process, users can authenticate with a TAP (no password required) to join the device and register Windows Hello for Business.
149149
- On already joined devices, users must first authenticate with another method such as a password, smartcard or FIDO2 key, before using TAP to set up Windows Hello for Business.
150-
- If the [Web sign-in](https://learn.microsoft.com/windows/client-management/mdm/policy-csp-authentication#authentication-enablewebsignin) feature on Windows is also enabled, the user can use TAP to sign into the device. This is intended only for completing initial device setup, or recovery when the user does not know or have a password.
150+
- If the [Web sign-in](/windows/client-management/mdm/policy-csp-authentication#authentication-enablewebsignin) feature on Windows is also enabled, the user can use TAP to sign into the device. This is intended only for completing initial device setup, or recovery when the user does not know or have a password.
151151

152152
For Hybrid Azure AD Joined devices:
153153
- Users must first authenticate with another method such as a password, smartcard or FIDO2 key, before using TAP to set up Windows Hello for Business.

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ With the policy applied, it can take up to 1 hour to propagate and for users to
153153
### PowerShell
154154

155155
> [!NOTE]
156-
> This configuration option uses HRD policy. For more information, see [homeRealmDiscoveryPolicy resource type](/graph/api/resources/homeRealmDiscoveryPolicy?view=graph-rest-1.0).
156+
> This configuration option uses HRD policy. For more information, see [homeRealmDiscoveryPolicy resource type](/graph/api/resources/homeRealmDiscoveryPolicy?view=graph-rest-1.0&preserve-view=true).
157157
158158
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign-in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
159159

articles/active-directory/azuread-dev/azure-ad-endpoint-comparison.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
99
ms.subservice: azuread-dev
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/17/2020
12+
ms.date: 11/09/2022
1313
ms.author: ryanwi
14-
ms.reviewer: marsma, ludwignick
14+
ms.reviewer: ludwignick
1515
ms.custom: aaddev
1616
ROBOTS: NOINDEX
1717
---
20.9 KB
Loading
94.9 KB
Loading

0 commit comments

Comments
 (0)