Skip to content

Commit a66d631

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into mrb_07_25_2024_gpt4o-mini
2 parents 8c9316b + d717c13 commit a66d631

File tree

1,763 files changed

+21276
-20662
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,763 files changed

+21276
-20662
lines changed

.openpublishing.publish.config.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -896,6 +896,12 @@
896896
"branch": "main",
897897
"branch_mapping": {}
898898
},
899+
{
900+
"path_to_root": "storage-mgmt-devguide-dotnet",
901+
"url": "https://github.com/Azure-Samples/storage-mgmt-devguide-dotnet",
902+
"branch": "main",
903+
"branch_mapping": {}
904+
},
899905
{
900906
"path_to_root": "azure-sdk-for-net",
901907
"url": "https://github.com/Azure/azure-sdk-for-net/",
@@ -986,6 +992,12 @@
986992
"branch": "main",
987993
"branch_mapping": {}
988994
},
995+
{
996+
"path_to_root": "msdocs-fastapi-postgresql-sample-app",
997+
"url": "https://github.com/Azure-Samples/msdocs-fastapi-postgresql-sample-app",
998+
"branch": "main",
999+
"branch_mapping": {}
1000+
},
9891001
{
9901002
"path_to_root": "msdocs-quarkus-postgresql-sample-app",
9911003
"url": "https://github.com/Azure-Samples/msdocs-quarkus-postgresql-sample-app",

.openpublishing.redirection.json

Lines changed: 53 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,7 @@
7878
{
7979
"source_path": "articles/expressroute/expressroute-howto-set-global-reach-cli.md",
8080
"redirect_url": "/previous-versions/azure/expressroute/expressroute-howto-set-global-reach-cli",
81+
"redirect_document_id": false
8182
},
8283
{
8384
"source_path": "articles/digital-twins/how-to-integrate-maps.md",
@@ -4402,6 +4403,11 @@
44024403
"redirect_url": "/azure/azure-functions",
44034404
"redirect_document_id": false
44044405
},
4406+
{
4407+
"source_path_from_root": "/articles/azure-functions/durable/durable-functions-create-first-csharp.md",
4408+
"redirect_url": "/azure/azure-functions/durable/durable-functions-isolated-create-first-csharp.md",
4409+
"redirect_document_id": false
4410+
},
44054411
{
44064412
"source_path_from_root": "/articles/twilio-dotnet-how-to-use-for-voice-sms.md",
44074413
"redirect_url": "https://www.twilio.com/docs/usage/tutorials/serverless-webhooks-azure-functions-and-csharp",
@@ -4868,6 +4874,11 @@
48684874
"redirect_document_id": false
48694875
},
48704876
{
4877+
"source_path_from_root": "/articles/azure-resource-manager/management/control-plane-metrics.md",
4878+
"redirect_url": "/azure/azure-resource-manager/management/monitor-resource-manager",
4879+
"redirect_document_id": false
4880+
},
4881+
{
48714882
"source_path_from_root": "/articles/expressroute/expressroute-monitoring-metrics-alerts.md",
48724883
"redirect_url": "/azure/expressroute/monitor-expressroute-reference",
48734884
"redirect_document_id": false
@@ -4899,6 +4910,11 @@
48994910
"redirect_url": "/azure/defender-for-iot/organizations/integrate-overview",
49004911
"redirect_document_id": false
49014912
},
4913+
{
4914+
"source_path_from_root": "/articles/app-service/manage-move-across-regions.md",
4915+
"redirect_url": "/azure/operational-excellence/relocation-app-service",
4916+
"redirect_document_id": false
4917+
},
49024918
{
49034919
"source_path_from_root": "/articles/event-grid/high-availability-disaster-recovery.md",
49044920
"redirect_url": "/azure/reliability/reliability-event-grid",
@@ -4933,7 +4949,42 @@
49334949
"source_path_from_root": "/articles/virtual-network/ip-services/create-vm-dual-stack-ipv6-powershell.md",
49344950
"redirect_url": "/azure/virtual-network/ip-services/create-vm-dual-stack-ipv6-portal",
49354951
"redirect_document_id": false
4936-
}
4937-
4952+
},
4953+
{
4954+
"source_path_from_root": "/articles/virtual-network/ip-services/create-custom-ip-address-prefix-cli.md",
4955+
"redirect_url": "/azure/virtual-network/ip-services/create-custom-ip-address-prefix-portal",
4956+
"redirect_document_id": false
4957+
},
4958+
{
4959+
"source_path_from_root": "/articles/virtual-network/ip-services/create-custom-ip-address-prefix-powershell.md",
4960+
"redirect_url": "/azure/virtual-network/ip-services/create-custom-ip-address-prefix-portal",
4961+
"redirect_document_id": false
4962+
},
4963+
{
4964+
"source_path_from_root": "/articles/virtual-network/ip-services/routing-preference-powershell.md",
4965+
"redirect_url": "/azure/virtual-network/ip-services/routing-preference-portal",
4966+
"redirect_document_id": false
4967+
},
4968+
{
4969+
"source_path_from_root": "/articles/virtual-network/ip-services/routing-preference-cli.md",
4970+
"redirect_url": "/azure/virtual-network/ip-services/routing-preference-portal",
4971+
"redirect_document_id": false
4972+
},
4973+
{
4974+
"source_path_from_root":"/articles/container-registry/manual-regional-move.md",
4975+
"redirect_url":"/azure/operational-excellence/relocation-container-registry",
4976+
"redirect_document_id":false
4977+
},
4978+
{
4979+
"source_path_from_root": "/articles/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6-powershell.md",
4980+
"redirect_url": "/azure/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6--portal",
4981+
"redirect_document_id": false
4982+
},
4983+
{
4984+
"source_path_from_root": "/articles/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6-cli.md",
4985+
"redirect_url": "/azure/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6--portal",
4986+
"redirect_document_id": false
4987+
}
4988+
49384989
]
49394990
}

.openpublishing.redirection.sentinel.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1635,5 +1635,11 @@
16351635
"redirect_url": "/azure/sentinel/data-connectors-reference",
16361636
"redirect_document_id": false
16371637
}
1638+
,
1639+
{
1640+
"source_path_from_root": "/articles/sentinel/data-connectors/tenable-io-vulnerability-management.md",
1641+
"redirect_url": "/azure/sentinel/data-connectors/tenable-vulnerability-management",
1642+
"redirect_document_id": false
1643+
}
16381644
]
16391645
}

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -378,12 +378,12 @@
378378
- name: SwissID
379379
href: identity-provider-swissid.md
380380
displayName: Swiss ID
381-
- name: Twitter
382-
href: identity-provider-twitter.md
383381
- name: WeChat
384382
href: identity-provider-wechat.md
385383
- name: Weibo
386384
href: identity-provider-weibo.md
385+
- name: X
386+
href: identity-provider-twitter.md
387387
- name: Pass through identity provider token
388388
href: idp-pass-through-user-flow.md
389389
- name: Manage tokens and session

articles/active-directory-b2c/add-identity-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: B2C
1717

1818
# Add an identity provider to your Azure Active Directory B2C tenant
1919

20-
You can configure Azure AD B2C to allow users to sign in to your application with credentials from external social or enterprise identity providers (IdP). Azure AD B2C supports external identity providers like Facebook, Microsoft account, Google, Twitter, and any identity provider that supports OAuth 1.0, OAuth 2.0, OpenID Connect, and SAML protocols.
20+
You can configure Azure AD B2C to allow users to sign in to your application with credentials from external social or enterprise identity providers (IdP). Azure AD B2C supports external identity providers like Facebook, Microsoft account, Google, X, and any identity provider that supports OAuth 1.0, OAuth 2.0, OpenID Connect, and SAML protocols.
2121

2222
With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.
2323

@@ -51,6 +51,6 @@ You typically use only one identity provider in your applications, but you have
5151
* [Salesforce](identity-provider-salesforce.md)
5252
* [Salesforce (SAML protocol)](identity-provider-salesforce-saml.md)
5353
* [SwissID](identity-provider-swissid.md)
54-
* [Twitter](identity-provider-twitter.md)
54+
* [X](identity-provider-twitter.md)
5555
* [WeChat](identity-provider-wechat.md)
5656
* [Weibo](identity-provider-weibo.md)

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The following flows aren't supported:
4343
When using the ROPC flow, consider the following limitations:
4444

4545
- ROPC doesn’t work when there's any interruption to the authentication flow that needs user interaction. For example, when a password expires or needs to be changed, [multifactor authentication](multi-factor-authentication.md) is required, or when more information needs to be collected during sign-in (for example, user consent).
46-
- ROPC supports local accounts only. Users can’t sign in with [federated identity providers](add-identity-provider.md) like Microsoft, Google+, Twitter, AD-FS, or Facebook.
46+
- ROPC supports local accounts only. Users can’t sign in with [federated identity providers](add-identity-provider.md) like Microsoft, Google+, X, AD-FS, or Facebook.
4747
- [Session Management](session-behavior.md), including [keep me signed-in (KMSI)](session-behavior.md#enable-keep-me-signed-in-kmsi), isn't applicable.
4848

4949

articles/active-directory-b2c/best-practices.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ The following best practices and recommendations cover some of the primary aspec
2929
| Choose user flows for most scenarios | The Identity Experience Framework of Azure AD B2C is the core strength of the service. Policies fully describe identity experiences such as sign-up, sign-in, or profile editing. To help you set up the most common identity tasks, the Azure AD B2C portal includes predefined, configurable policies called user flows. With user flows, you can create great user experiences in minutes, with just a few clicks. [Learn when to use user flows vs. custom policies](user-flow-overview.md#comparing-user-flows-and-custom-policies).|
3030
| App registrations | Every application (web, native) and API that is being secured must be registered in Azure AD B2C. If an app has both a web and native version of iOS and Android, you can register them as one application in Azure AD B2C with the same client ID. Learn how to [register OIDC, SAML, web, and native apps](./tutorial-register-applications.md?tabs=applications). Learn more about [application types that can be used in Azure AD B2C](./application-types.md). |
3131
| Move to monthly active users billing | Azure AD B2C has moved from monthly active authentications to monthly active users (MAU) billing. Most customers will find this model cost-effective. [Learn more about monthly active users billing](https://azure.microsoft.com/updates/mau-billing/). |
32+
| Follow Security best practices | There are continuous and evolving threats and attacks, and like all owned resources, your Azure AD B2C deployment should follow best practices for security, including guidance on implementing WAFs (defense against threats such as DDOS and Bots) and other defense in depth best guidance [B2C Security Architecture](/azure/active-directory-b2c/security-architecture). |
3233

3334
## Planning and design
3435

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -119,16 +119,16 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
119119
|[QQ](identity-provider-qq.md) | Preview | GA | |
120120
|[Salesforce](identity-provider-salesforce.md) | GA | GA | |
121121
|[Salesforce (SAML protocol)](identity-provider-salesforce-saml.md) | NA | GA | |
122-
|[Twitter](identity-provider-twitter.md) | GA | GA | |
123122
|[WeChat](identity-provider-wechat.md) | Preview | GA | Available in China cloud, but only for custom policies. |
124123
|[Weibo](identity-provider-weibo.md) | Preview | GA | |
124+
|[X](identity-provider-twitter.md) | GA | GA | |
125125

126126
## Generic identity providers
127127

128128
|Feature |User flow |Custom policy |Notes |
129129
|---------|:---------:|:---------:|---------|
130130
|[OAuth2](oauth2-technical-profile.md) | NA | GA | For example, [Google](identity-provider-google.md), [GitHub](identity-provider-github.md), and [Facebook](identity-provider-facebook.md).|
131-
|[OAuth1](oauth1-technical-profile.md) | NA | GA | For example, [Twitter](identity-provider-twitter.md). |
131+
|[OAuth1](oauth1-technical-profile.md) | NA | GA | For example, [X](identity-provider-twitter.md). |
132132
|[OpenID Connect](openid-connect-technical-profile.md) | GA | GA | For example, [Microsoft Entra ID](identity-provider-azure-ad-single-tenant.md). |
133133
|[SAML2](identity-provider-generic-saml.md) | NA | GA | For example, [Salesforce](identity-provider-salesforce-saml.md) and [AD-FS](identity-provider-adfs.md). |
134134
| WSFED | NA | NA | |

articles/active-directory-b2c/direct-signin.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,9 +69,9 @@ The domain hint query string parameter can set to one of the following domains:
6969
- linkedin.com
7070
- microsoft.com
7171
- qq.com
72-
- twitter.com
7372
- wechat.com
7473
- weibo.com
74+
- x.com
7575
- For [Generic OpenID Connect](identity-provider-generic-openid-connect.md), see [Domain hint](identity-provider-generic-openid-connect.md#response-mode).
7676

7777
::: zone-end
@@ -89,4 +89,4 @@ To support domain hint parameter, you can configure the domain name using the `<
8989
...
9090
```
9191

92-
::: zone-end
92+
::: zone-end

articles/active-directory-b2c/faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ sections:
6363
- question: |
6464
Which social identity providers do you support now? Which ones do you plan to support in the future?
6565
answer: |
66-
We currently support several social identity providers including Amazon, Facebook, GitHub (preview), Google, LinkedIn, Microsoft Account (MSA), QQ (preview), Twitter, WeChat (preview), and Weibo (preview). We evaluate adding support for other popular social identity providers based on customer demand.
66+
We currently support several social identity providers including Amazon, Facebook, GitHub (preview), Google, LinkedIn, Microsoft Account (MSA), QQ (preview), X, WeChat (preview), and Weibo (preview). We evaluate adding support for other popular social identity providers based on customer demand.
6767
6868
Azure AD B2C also supports [custom policies](custom-policy-overview.md). Custom policies allow you to create your own policy for any identity provider that supports [OpenID Connect](https://openid.net/specs/openid-connect-core-1_0.html) or SAML. Get started with custom policies by checking out our [custom policy starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack).
6969

0 commit comments

Comments
 (0)