Skip to content

Commit 9faaeb8

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into yelevin/sentinel-entities
2 parents b366c46 + 9d54c77 commit 9faaeb8

File tree

1,851 files changed

+16072
-10994
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,851 files changed

+16072
-10994
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10805,6 +10805,11 @@
1080510805
"source_path": "articles/active-directory/manage-apps/manage-certificates-for-federated-single-sign-on.md",
1080610806
"redirect_url": "/azure/active-directory/manage-apps/tutorial-manage-certificates-for-federated-single-sign-on",
1080710807
"redirect_document_id": false
10808+
},
10809+
{
10810+
"source_path": "articles/active-directory/manage-apps/howto-enforce-signed-saml-authentication.md",
10811+
"redirect_url": "/azure/active-directory/manage-apps/howto-saml-token-encryption",
10812+
"redirect_document_id": true
1080810813
}
1080910814

1081010815
]

.openpublishing.redirection.azure-monitor.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -216,6 +216,11 @@
216216
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
217217
"redirect_document_id": false
218218
},
219+
{
220+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-sample-links.md",
221+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-samples",
222+
"redirect_document_id": false
223+
},
219224
{
220225
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-access.md",
221226
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
@@ -321,6 +326,11 @@
321326
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
322327
"redirect_document_id": false
323328
},
329+
{
330+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-action-rules.md" ,
331+
"redirect_url": "/azure/azure-monitor/alerts/alerts-processing-rules",
332+
"redirect_document_id": false
333+
},
324334
{
325335
"source_path_from_root": "/articles/azure-monitor/insights/data-explorer.md" ,
326336
"redirect_url": "/azure/data-explorer/data-explorer-insights",

.openpublishing.redirection.json

Lines changed: 52 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -621,22 +621,22 @@
621621
},
622622
{
623623
"source_path_from_root": "/articles/load-balancer/azure-media-player/components-limitations.md",
624-
"redirect_url": "/articles/load-balancer/concepts",
624+
"redirect_url": "/azure/load-balancer/concepts",
625625
"redirect_document_id": false
626626
},
627627
{
628628
"source_path_from_root": "/articles/frontdoor/standard-premium/resource-manager-template-samples.md",
629-
"redirect_url": "/articles/frontdoor/front-door-quickstart-template-samples",
629+
"redirect_url": "/azure/frontdoor/front-door-quickstart-template-samples",
630630
"redirect_document_id": false
631631
},
632632
{
633633
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-health-probes.md",
634-
"redirect_url": "/articles/frontdoor/front-door-health-probes",
634+
"redirect_url": "/azure/frontdoor/front-door-health-probes",
635635
"redirect_document_id": false
636636
},
637637
{
638638
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-ddos.md",
639-
"redirect_url": "/articles/frontdoor/front-door-ddos",
639+
"redirect_url": "/azure/frontdoor/front-door-ddos",
640640
"redirect_document_id": false
641641
},
642642
{
@@ -651,7 +651,7 @@
651651
},
652652
{
653653
"source_path_from_root": "/articles/frontdoor/standard-premium/geo-filtering.md",
654-
"redirect_url": "/articles/frontdoor/front-door-geo-filtering",
654+
"redirect_url": "/azure/frontdoor/front-door-geo-filtering",
655655
"redirect_document_id": false
656656
},
657657
{
@@ -6311,6 +6311,46 @@
63116311
"redirect_url": "/azure/azure-cache-for-redis/scripts/create-manage-cache",
63126312
"redirect_document_id": false
63136313
},
6314+
{
6315+
"source_path_from_root": "/articles/storage/storage-client-side-encryption.md",
6316+
"redirect_url": "/azure/storage/common/storage-client-side-encryption",
6317+
"redirect_document_id": true
6318+
},
6319+
{
6320+
"source_path_from_root": "/articles/storage/common/storage-client-side-encryption.md",
6321+
"redirect_url": "/azure/storage/blobs/client-side-encryption",
6322+
"redirect_document_id": true
6323+
},
6324+
{
6325+
"source_path_from_root": "/articles/storage/storage-client-side-encryption-java.md",
6326+
"redirect_url": "/azure/storage/common/storage-client-side-encryption-java",
6327+
"redirect_document_id": true
6328+
},
6329+
{
6330+
"source_path_from_root": "/articles/storage/common/storage-client-side-encryption-java.md",
6331+
"redirect_url": "/azure/storage/blobs/client-side-encryption",
6332+
"redirect_document_id": false
6333+
},
6334+
{
6335+
"source_path_from_root": "/articles/storage/storage-client-side-encryption-python.md",
6336+
"redirect_url": "/azure/storage/common/storage-client-side-encryption-python",
6337+
"redirect_document_id": true
6338+
},
6339+
{
6340+
"source_path_from_root": "/articles/storage/common/storage-client-side-encryption-python.md",
6341+
"redirect_url": "/azure/storage/blobs/client-side-encryption",
6342+
"redirect_document_id": false
6343+
},
6344+
{
6345+
"source_path_from_root": "/articles/storage/storage-encrypt-decrypt-blobs-key-vault.md",
6346+
"redirect_url": "/azure/storage/blobs/storage-encrypt-decrypt-blobs-key-vault",
6347+
"redirect_document_id": false
6348+
},
6349+
{
6350+
"source_path_from_root": "/articles/storage/blobs/storage-encrypt-decrypt-blobs-key-vault.md",
6351+
"redirect_url": "/azure/storage/blobs/client-side-encryption",
6352+
"redirect_document_id": false
6353+
},
63146354
{
63156355
"source_path_from_root": "/articles/storage/blobs/Storage-blob-performance-tiers.md",
63166356
"redirect_url": "/azure/storage/common/storage-account-overview",
@@ -22251,6 +22291,11 @@
2225122291
"redirect_url": "/azure/sql-data-warehouse/create-data-warehouse-portal",
2225222292
"redirect_document_id": false
2225322293
},
22294+
{
22295+
"source_path_from_root": "/articles/virtual-machine-scale-sets/flexible-virtual-machine-scale-sets.md",
22296+
"redirect_url": "/azure/virtual-machine-scale-sets/overview",
22297+
"redirect_document_id": false
22298+
},
2225422299
{
2225522300
"source_path_from_root": "/articles/sql-data-warehouse/sql-data-warehouse-get-started-provision-powershell.md",
2225622301
"redirect_url": "/azure/sql-data-warehouse/create-data-warehouse-powershell",
@@ -22861,11 +22906,6 @@
2286122906
"redirect_url": "/azure/storage/blobs/storage-dotnet-shared-access-signature-part-2",
2286222907
"redirect_document_id": true
2286322908
},
22864-
{
22865-
"source_path_from_root": "/articles/storage/storage-encrypt-decrypt-blobs-key-vault.md",
22866-
"redirect_url": "/azure/storage/blobs/storage-encrypt-decrypt-blobs-key-vault",
22867-
"redirect_document_id": true
22868-
},
2286922909
{
2287022910
"source_path_from_root": "/articles/storage/storage-https-custom-domain-cdn.md",
2287122911
"redirect_url": "/azure/storage/blobs/storage-https-custom-domain-cdn",
@@ -23262,21 +23302,6 @@
2326223302
"redirect_url": "/azure/storage/common/storage-choose-data-transfer-solution",
2326323303
"redirect_document_id": true
2326423304
},
23265-
{
23266-
"source_path_from_root": "/articles/storage/storage-client-side-encryption.md",
23267-
"redirect_url": "/azure/storage/common/storage-client-side-encryption",
23268-
"redirect_document_id": true
23269-
},
23270-
{
23271-
"source_path_from_root": "/articles/storage/storage-client-side-encryption-java.md",
23272-
"redirect_url": "/azure/storage/common/storage-client-side-encryption-java",
23273-
"redirect_document_id": true
23274-
},
23275-
{
23276-
"source_path_from_root": "/articles/storage/storage-client-side-encryption-python.md",
23277-
"redirect_url": "/azure/storage/common/storage-client-side-encryption-python",
23278-
"redirect_document_id": true
23279-
},
2328023305
{
2328123306
"source_path_from_root": "/articles/storage/storage-concurrency.md",
2328223307
"redirect_url": "/azure/storage/common/storage-concurrency",
@@ -37362,16 +37387,6 @@
3736237387
"redirect_url": "/azure/event-grid/event-schema-communication-services",
3736337388
"redirect_document_id": false
3736437389
},
37365-
{
37366-
"source_path_from_root": "/articles/azure-monitor/app/change-analysis.md#visualizations-for-application-change-analysis",
37367-
"redirect_url": "/articles/azure-monitor/app/change-analysis-visualizations",
37368-
"redirect_document_id": false
37369-
},
37370-
{
37371-
"source_path_from_root": "/articles/azure-monitor/app/change-analysis.md#troubleshoot",
37372-
"redirect_url": "/articles/azure-monitor/app/change-analysis-troubleshoot",
37373-
"redirect_document_id": false
37374-
},
3737537390
{
3737637391
"source_path_from_root": "/articles/cognitive-services/personalizer/personalizer-encryption-of-data-at-rest.md",
3737737392
"redirect_url": "/azure/cognitive-services/personalizer/encrypt-data-at-rest",
@@ -40240,12 +40255,12 @@
4024040255
},
4024140256
{
4024240257
"source_path_from_root": "/articles/virtual-machines/windows/connect-logon.md",
40243-
"redirect_url": "/articles/virtual-machines/windows/connect-rdp",
40258+
"redirect_url": "/azure/virtual-machines/windows/connect-rdp",
4024440259
"redirect_document_id": false
4024540260
},
4024640261
{
4024740262
"source_path_from_root": "/articles/virtual-machines/windows/winrm.md",
40248-
"redirect_url": "/articles/virtual-machines/windows/connect-winrm",
40263+
"redirect_url": "/azure/virtual-machines/windows/connect-winrm",
4024940264
"redirect_document_id": false
4025040265
}
4025140266
]

articles/active-directory-b2c/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -168,6 +168,14 @@
168168
href: enable-authentication-angular-spa-app.md
169169
- name: Authentication options
170170
href: enable-authentication-angular-spa-app-options.md
171+
- name: React single-page application
172+
items:
173+
- name: Configure a sample React app
174+
href: configure-authentication-sample-react-spa-app.md
175+
- name: Enable authentication in your React app
176+
href: enable-authentication-react-spa-app.md
177+
- name: Authentication options
178+
href: enable-authentication-react-spa-app-options.md
171179
- name: Android mobile app
172180
items:
173181
- name: Configure a sample Android app

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/08/2022
11+
ms.date: 07/07/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -32,19 +32,13 @@ In this article, you’ll do the following tasks:
3232

3333
## Step 1: Configure your user flows
3434

35-
[!INCLUDE [active-directory-b2c-app-integration-add-user-flow](../../includes/active-directory-b2c-app-integration-add-user-flow.md)] Repeat the steps to create three separate user flows as follows:
36-
37-
- A combined **Sign in and sign up** user flow, such as `susi`. This user flow also supports the **Forgot your password** experience.
38-
- A **Profile editing** user flow, such as `edit_profile`.
39-
- A **Password reset** user flow, such as `reset_password`.
40-
41-
Azure AD B2C prepends `B2C_1_` to the user flow name. For example, `susi` becomes `B2C_1_susi`.
35+
[!INCLUDE [active-directory-b2c-app-integration-add-user-flow](../../includes/active-directory-b2c-app-integration-add-user-flow.md)]
4236

4337
## Step 2: Register a web application
4438

4539
To enable your application sign in with Azure AD B2C, register your app in the Azure AD B2C directory. The app registration establishes a trust relationship between the app and Azure AD B2C.
4640

47-
During app registration, you'll specify the *Redirect URI*. The redirect URI is the endpoint to which the user is redirected by Azure AD B2C after they authenticate with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, that uniquely identifies your app. After your app is registered, Azure AD B2C uses both the application ID and the redirect URI to create authentication requests.
41+
During app registration, you'll specify the *Redirect URI*. The redirect URI is the endpoint to which the user is redirected by Azure AD B2C after they authenticate with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, that uniquely identifies your app. After your app is registered, Azure AD B2C uses both the application ID, and the redirect URI to create authentication requests.
4842

4943
### Step 2.1: Register the app
5044

@@ -119,7 +113,7 @@ Open your web app in a code editor such as Visual Studio Code. Under the project
119113
|`EDIT_PROFILE_POLICY_AUTHORITY`|The **Profile editing** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<profile-edit-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<reset-password-user-flow-name>` with the name of your reset password user flow such as `B2C_1_edit_profile_node_app`. |
120114
|`AUTHORITY_DOMAIN`| The Azure AD B2C authority domain such as `https://<your-tenant-name>.b2clogin.com`. Replace `<your-tenant-name>` with the name of your tenant.|
121115
|`APP_REDIRECT_URI`| The application redirect URI where Azure AD B2C will return authentication responses (tokens). It matches the **Redirect URI** you set while registering your app in Azure portal, and it must be publicly accessible. Leave the value as is.|
122-
|`LOGOUT_ENDPOINT`| The Azure AD B2C sign out endpoint such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>/oauth2/v2.0/logout?post_logout_redirect_uri=http://localhost:3000`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`.|
116+
|`LOGOUT_ENDPOINT`| The Azure AD B2C sign-out endpoint such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>/oauth2/v2.0/logout?post_logout_redirect_uri=http://localhost:3000`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`.|
123117

124118
Your final configuration file should look like the following sample:
125119

articles/active-directory-b2c/configure-authentication-in-azure-static-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ Once you've added the app ID and secrete, use the following steps to add the Azu
127127

128128
1. Navigate to `/.auth/login/aadb2c`. The `/.auth/login` points the Azure Static app login endpoint. The `aadb2c` references to your [OpenID Connect identity provider](#31-add-an-openid-connect-identity-provider). The following URL demonstrates an Azure Static app login endpoint: `https://witty-island-11111111.azurestaticapps.net/.auth/login/aadb2c`.
129129
1. Complete the sign up or sign in process.
130-
1. In your browser debugger, [run the following JavaScript in the Console](/microsoft-edge/devtools-guide-chromium/console/console-javascript.md). The JavaScript code will present information about the sign in user.
130+
1. In your browser debugger, [run the following JavaScript in the Console](/microsoft-edge/devtools-guide-chromium/console/console-javascript). The JavaScript code will present information about the sign in user.
131131

132132
```javascript
133133
async function getUserInfo() {
@@ -147,4 +147,4 @@ Once you've added the app ID and secrete, use the following steps to add the Azu
147147
## Next steps
148148
149149
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out [Accessing user information in Azure Static Web Apps](../static-web-apps/user-information.md).
150-
* Learn how to [customize and enhance the Azure AD B2C authentication experience for your web app](enable-authentication-azure-static-app-options.md).
150+
* Learn how to [customize and enhance the Azure AD B2C authentication experience for your web app](enable-authentication-azure-static-app-options.md).

articles/active-directory-b2c/configure-authentication-in-azure-web-app-file-based.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App configuration file by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](/app-service/configure-authentication-file-based.md) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](/azure/app-service/configure-authentication-file-based) article.
1919

2020
## Overview
2121

@@ -141,6 +141,6 @@ From your server code, the provider-specific tokens are injected into the reques
141141

142142
## Next steps
143143

144-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/app-service/configure-authentication-user-identities).
145-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/app-service/configure-authentication-oauth-tokens).
144+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
145+
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
146146

articles/active-directory-b2c/configure-authentication-in-azure-web-app.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](/app-service/configure-authentication-provider-openid-connect.md) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](/azure/app-service/configure-authentication-provider-openid-connect) article.
1919

2020
## Overview
2121

@@ -94,7 +94,7 @@ To register your application, follow these steps:
9494
1. For the **Client Secret** provide the Web App (client) secret from [step 2.2](#step-22-create-a-client-secret).
9595
9696
> [!TIP]
97-
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](/app-service/app-service-key-vault-references.md) if you wish to manage the secret in Azure Key Vault.
97+
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](/azure/app-service/app-service-key-vault-references) if you wish to manage the secret in Azure Key Vault.
9898
9999
1. Keep the rest of the settings with the default values.
100100
1. Press the **Add** button to finish setting up the identity provider.
@@ -119,6 +119,6 @@ From your server code, the provider-specific tokens are injected into the reques
119119
120120
## Next steps
121121
122-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/app-service/configure-authentication-user-identities).
123-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/app-service/configure-authentication-oauth-tokens).
122+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
123+
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
124124

0 commit comments

Comments
 (0)