Skip to content

Commit aaabcb3

Browse files
authored
Merge branch 'main' into 2-18-22-wht-new-srch-rst
2 parents caceae4 + b4c3a97 commit aaabcb3

File tree

3,082 files changed

+73650
-21912
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,082 files changed

+73650
-21912
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -800,6 +800,11 @@
800800
"redirect_url": "/azure/active-directory/external-identities/external-identities-overview",
801801
"redirect_document_id": false
802802
},
803+
{
804+
"source_path_from_root": "/articles/active-directory/external-identities/o365-external-user.md",
805+
"redirect_url": "/azure/active-directory/external-identities/what-is-b2b",
806+
"redirect_document_id": false
807+
},
803808
{
804809
"source_path_from_root": "/articles/active-directory/active-directory-b2b-current-preview-limitations.md",
805810
"redirect_url": "/azure/active-directory/active-directory-b2b-current-limitations",
@@ -7910,6 +7915,11 @@
79107915
"redirect_url": "/azure/active-directory/saas-apps/cisco-webex-provisioning-tutorial",
79117916
"redirect_document_id": false
79127917
},
7918+
{
7919+
"source_path_from_root": "/articles/active-directory/saas-apps/active-and-thriving-perth-airport-tutorial.md",
7920+
"redirect_url": "/azure/active-directory/saas-apps/active-and-thriving-tutorial",
7921+
"redirect_document_id": false
7922+
},
79137923
{
79147924
"source_path_from_root": "/articles/active-directory/active-directory-saas-cisco-webex-tutorial.md",
79157925
"redirect_url": "/azure/active-directory/saas-apps/cisco-webex-tutorial",

.openpublishing.redirection.defender-for-iot.json

Lines changed: 35 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,5 @@
11
{
22
"redirections": [
3-
{
4-
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-configure-with-sentinel.md",
5-
"redirect_url": "/azure/sentinel/iot-solution",
6-
"redirect_document_id": false
7-
},
83
{
94
"source_path_from_root": "/articles/defender-for-iot/device-builders/quickstart-building-the-defender-micro-agent-from-source.md",
105
"redirect_url": "/azure/defender-for-iot/device-builders/overview",
@@ -30,7 +25,17 @@
3025
"redirect_url": "/azure/defender-for-iot/organizations/getting-started",
3126
"redirect_document_id": false
3227
},
33-
{
28+
{
29+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-view-information-provided-in-alerts.md",
30+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-view-alerts",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-work-with-alerts-on-your-sensor.md",
35+
"redirect_url": "/azure/defender-for-iot/organizations/concept-key-concepts#analytics-and-self-learning-engines",
36+
"redirect_document_id": false
37+
},
38+
{
3439
"source_path_from_root": "/azure/defender-for-iot/organizations/quickstart-system-prerequisites.md",
3540
"redirect_url": "/azure/defender-for-iot/organizations/getting-started",
3641
"redirect_document_id": false
@@ -230,11 +235,6 @@
230235
"redirect_url": "/azure/defender-for-iot/organizations/how-to-track-sensor-activity",
231236
"redirect_document_id": false
232237
},
233-
{
234-
"source_path_from_root": "/articles/defender-for-iot/how-to-configure-with-sentinel.md",
235-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-configure-with-sentinel",
236-
"redirect_document_id": false
237-
},
238238
{
239239
"source_path_from_root": "/articles/defender-for-iot/how-to-troubleshoot-the-sensor-and-on-premises-management-console.md",
240240
"redirect_url": "/azure/defender-for-iot/organizations/how-to-troubleshoot-the-sensor-and-on-premises-management-console",
@@ -564,6 +564,29 @@
564564
"source_path_from_root": "/articles/defender-for-iot/organizations/references-horizon-sdk.md",
565565
"redirect_url": "/azure/defender-for-iot/organizations",
566566
"redirect_document_id": false
567+
},
568+
{
569+
"source_path_from_root": "/articles/device-builders/how-to-configure-with-sentinel.md",
570+
"redirect_url": "/azure/sentinel/iot-solution?toc=%2Fazure%2Fdefender-for-iot%2Forganizations%2Ftoc.json&bc=%2Fazure%2Fdefender-for-iot%2Fbreadcrumb%2Ftoc.json&tabs=use-out-of-the-box-analytics-rules-recommended",
571+
"redirect_document_id": false
572+
},
573+
{
574+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-configure-with-sentinel.md",
575+
"redirect_url": "/azure/sentinel/iot-solution?toc=%2Fazure%2Fdefender-for-iot%2Forganizations%2Ftoc.json&bc=%2Fazure%2Fdefender-for-iot%2Fbreadcrumb%2Ftoc.json&tabs=use-out-of-the-box-analytics-rules-recommended",
576+
"redirect_document_id": false
577+
},
578+
{
579+
"source_path_from_root": "/articles/defender-for-iot/how-to-configure-with-sentinel.md",
580+
"redirect_url": "/azure/sentinel/iot-solution?toc=%2Fazure%2Fdefender-for-iot%2Forganizations%2Ftoc.json&bc=%2Fazure%2Fdefender-for-iot%2Fbreadcrumb%2Ftoc.json&tabs=use-out-of-the-box-analytics-rules-recommended",
581+
"redirect_document_id": false
582+
},
583+
{
584+
"source_path_from_root": "/articles/defender-for-iot/device-builders/concept-security-agent-authentication.md",
585+
"redirect_url": "/azure/defender-for-iot/device-builders/tutorial-standalone-agent-binary-installation",
586+
"redirect_document_id": false
567587
}
568588
]
569-
}
589+
}
590+
591+
592+

.openpublishing.redirection.json

Lines changed: 77 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15901,8 +15901,13 @@
1590115901
},
1590215902
{
1590315903
"source_path_from_root": "/articles/lab-services/devtest-lab-developer-lab.md",
15904-
"redirect_url": "/azure/devtest-labs/devtest-lab-developer-lab",
15905-
"redirect_document_id": true
15904+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-get-started",
15905+
"redirect_document_id": false
15906+
},
15907+
{
15908+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-developer-lab.md",
15909+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-get-started",
15910+
"redirect_document_id": false
1590615911
},
1590715912
{
1590815913
"source_path_from_root": "/articles/lab-services/devtest-lab-dev-ops.md",
@@ -16036,13 +16041,23 @@
1603616041
},
1603716042
{
1603816043
"source_path_from_root": "/articles/lab-services/devtest-lab-test-env.md",
16039-
"redirect_url": "/azure/devtest-labs/devtest-lab-test-env",
16040-
"redirect_document_id": true
16044+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-get-started",
16045+
"redirect_document_id": false
1604116046
},
1604216047
{
1604316048
"source_path_from_root": "/articles/lab-services/devtest-lab-training-lab.md",
16044-
"redirect_url": "/azure/devtest-labs/devtest-lab-training-lab",
16045-
"redirect_document_id": true
16049+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-get-started",
16050+
"redirect_document_id": false
16051+
},
16052+
{
16053+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-test-env.md",
16054+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-get-started",
16055+
"redirect_document_id": false
16056+
},
16057+
{
16058+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-training-lab.md",
16059+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-get-started",
16060+
"redirect_document_id": false
1604616061
},
1604716062
{
1604816063
"source_path_from_root": "/articles/lab-services/devtest-lab-troubleshoot-apply-artifacts.md",
@@ -22629,6 +22644,46 @@
2262922644
"redirect_url": "/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps",
2263022645
"redirect_document_id": true
2263122646
},
22647+
{
22648+
"source_path_from_root": "/articles/scheduler/scheduler-intro.md",
22649+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
22650+
"redirect_document_id": ""
22651+
},
22652+
{
22653+
"source_path_from_root": "/articles/scheduler/scheduler-advanced-complexity.md",
22654+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
22655+
"redirect_document_id": ""
22656+
},
22657+
{
22658+
"source_path_from_root": "/articles/scheduler/scheduler-concepts-terms.md",
22659+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
22660+
"redirect_document_id": ""
22661+
},
22662+
{
22663+
"source_path_from_root": "/articles/scheduler/scheduler-powershell-reference.md",
22664+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
22665+
"redirect_document_id": ""
22666+
},
22667+
{
22668+
"source_path_from_root": "/articles/scheduler/scheduler-plans-billing.md",
22669+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
22670+
"redirect_document_id": ""
22671+
},
22672+
{
22673+
"source_path_from_root": "/articles/scheduler/scheduler-limits-defaults-errors.md",
22674+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
22675+
"redirect_document_id": ""
22676+
},
22677+
{
22678+
"source_path_from_root": "/articles/scheduler/scheduler-high-availability-reliability.md",
22679+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
22680+
"redirect_document_id": ""
22681+
},
22682+
{
22683+
"source_path_from_root": "/articles/scheduler/scheduler-outbound-authentication.md",
22684+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
22685+
"redirect_document_id": ""
22686+
},
2263222687
{
2263322688
"source_path_from_root": "/articles/scheduler/get-started-portal.md",
2263422689
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
@@ -26254,9 +26309,19 @@
2625426309
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs",
2625526310
"redirect_document_id": false
2625626311
},
26312+
{
26313+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-legacy.md",
26314+
"redirect_url": "/azure/storage/blobs/quickstart-blobs-javascript-browser",
26315+
"redirect_document_id": false
26316+
},
26317+
{
26318+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-nodejs-legacy.md",
26319+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs",
26320+
"redirect_document_id": false
26321+
},
2625726322
{
2625826323
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-nodejs-v10.md",
26259-
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs-legacy",
26324+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs",
2626026325
"redirect_document_id": false
2626126326
},
2626226327
{
@@ -44154,6 +44219,11 @@
4415444219
"redirect_url": "/azure/azure-monitor/agents/azure-monitor-agent-manage",
4415544220
"redirect_document_id": true
4415644221
},
44222+
{
44223+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/managed-identity-byos.md",
44224+
"redirect_url": "/azure/applied-ai-services/form-recognizer/managed-identities",
44225+
"redirect_document_id": false
44226+
},
4415744227
{
4415844228
"source_path_from_root": "/articles/azure/virtual-desktop/azure-advisor.md",
4415944229
"redirect_url": "/azure/advisor/advisor-overview",

.openpublishing.redirection.media-services.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -624,6 +624,11 @@
624624
"source_path_from_root": "/articles/media-services/latest/security-private-link-how-to.md",
625625
"redirect_url": "/azure/media-services/latest/security-private-link-arm-how-to",
626626
"redirect_document_id": false
627+
},
628+
{
629+
"source_path_from_root": "/articles/media-services/latest/asset-create-asset-upload-portal-quickstart.md",
630+
"redirect_url": "/azure/media-services/latest/video-on-demand-simple-portal-quickstart",
631+
"redirect_document_id": true
627632
},
628633
{
629634
"source_path_from_root": "/articles/media-services/latest/latest/questions-collection.md",

CODEOWNERS

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -24,13 +24,6 @@ articles/azure-monitor/vm @bwren
2424
articles/advisor @rboucher
2525
articles/service-health @rboucher
2626

27-
28-
# Azure Active Directory
29-
/articles/active-directory-b2c/ @msmimart @yoelhor
30-
/articles/active-directory/app-provisioning/ @CelesteDG
31-
/articles/active-directory/develop/ @mmacy
32-
/articles/active-directory/manage-apps/ @CelesteDG
33-
3427
# Azure Synapse Analytics
3528
/articles/synapse-analytics/ @julieMSFT @ryanmajidi @saveenr
3629
/articles/synapse-analytics/backuprestore/ @joannapea @julieMSFT

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 01/17/2022
12+
ms.date: 02/16/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -20,7 +20,7 @@ This article provides examples for using the boolean claims transformations of t
2020

2121
## AndClaims
2222

23-
Computes an `And` operation of two boolean input claims, and sets the output claim with result of the operation.
23+
Computes an `And` operation of two boolean input claims, and sets the output claim with result of the operation. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean#andclaims) of this claims transformation.
2424

2525
| Element | TransformationClaimType | Data Type | Notes |
2626
|-------| ------------------------ | ---------- | ----- |
@@ -54,7 +54,7 @@ The following claims transformation demonstrates how to `And` two boolean claims
5454

5555
## AssertBooleanClaimIsEqualToValue
5656

57-
Checks that boolean values of two claims are equal, and throws an exception if they are not.
57+
Checks that boolean values of two claims are equal, and throws an exception if they aren't. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean#assertbooleanclaimisequaltovalue) of this claims transformation.
5858

5959
| Element | TransformationClaimType | Data Type | Notes |
6060
| ---- | ------------------------ | ---------- | ----- |
@@ -63,7 +63,7 @@ Checks that boolean values of two claims are equal, and throws an exception if t
6363

6464
The **AssertBooleanClaimIsEqualToValue** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationBooleanValueIsNotEqual** self-asserted technical profile metadata controls the error message that the technical profile presents to the user. The error messages can be [localized](localization-string-ids.md#claims-transformations-error-messages).
6565

66-
![AssertStringClaimsAreEqual execution](./media/boolean-transformations/assert-execution.png)
66+
![Diagram shows how to use the AssertStringClaimsAreEqual claims transformation.](./media/boolean-transformations/assert-execution.png)
6767

6868
### Example of AssertBooleanClaimIsEqualToValue
6969

@@ -122,7 +122,7 @@ The self-asserted technical profile calls the validation `Example-AssertBoolean`
122122

123123
## CompareBooleanClaimToValue
124124

125-
Checks that boolean value of a claim is equal to `true` or `false`, and return the result of the compression.
125+
Checks that boolean value of a claim is equal to `true` or `false`, and return the result of the compression. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean#comparebooleanclaimtovalue) of this claims transformation.
126126

127127
| Element | TransformationClaimType | Data Type | Notes |
128128
| ---- | ------------------------ | ---------- | ----- |
@@ -157,7 +157,7 @@ The following claims transformation demonstrates how to check the value of a boo
157157

158158
## NotClaims
159159

160-
Computes a `Not` operation of the boolean input claim and sets the output claim with result of the operation.
160+
Computes a `Not` operation of the boolean input claim and sets the output claim with result of the operation. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean#notclaims) of this claims transformation.
161161

162162
| Element | TransformationClaimType | Data Type | Notes |
163163
| ---- | ----------------------- | --------- | ----- |
@@ -186,7 +186,7 @@ The following claims transformation demonstrates how to perform logical negation
186186

187187
## OrClaims
188188

189-
Computes an `Or` of two boolean claims and sets the output claim with result of the operation.
189+
Computes an `Or` of two boolean claims and sets the output claim with result of the operation. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean#orclaims) of this claims transformation.
190190

191191
| Element | TransformationClaimType | Data Type | Notes |
192192
| ---- | ----------------------- | --------- | ----- |
@@ -218,4 +218,4 @@ The following claims transformation demonstrates how to `Or` two boolean claims.
218218

219219
## Next steps
220220

221-
- Find more [claims transformation samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation) on the Azure AD B2C community GitHub repo
221+
- Find more [claims transformation samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/boolean) on the Azure AD B2C community GitHub repo

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 1/11/2022
12+
ms.date: 02/16/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -47,6 +47,8 @@ The following table lists the claim resolvers with information about the languag
4747
| {Culture:RegionName} | The two letter ISO code for the region. | US |
4848
| {Culture:RFC5646} | The RFC5646 language code. | en-US |
4949

50+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#culture) of the culture claim resolvers.
51+
5052
## Policy
5153

5254
The following table lists the claim resolvers with information about the policy used in the authorization request:
@@ -58,6 +60,7 @@ The following table lists the claim resolvers with information about the policy
5860
| {Policy:TenantObjectId} | The tenant object ID of the relying party policy. | 00000000-0000-0000-0000-000000000000 |
5961
| {Policy:TrustFrameworkTenantId} | The tenant ID of the trust framework. | your-tenant.onmicrosoft.com |
6062

63+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#policy) of the policy claim resolvers.
6164

6265
## Context
6366

@@ -73,6 +76,8 @@ The following table lists the contextual claim resolvers of the authorization re
7376
| {Context:IPAddress} | The user IP address. | 11.111.111.11 |
7477
| {Context:KMSI} | Indicates whether [Keep me signed in](session-behavior.md?pivots=b2c-custom-policy#enable-keep-me-signed-in-kmsi) checkbox is selected. | true |
7578

79+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#context) of the context claim resolvers.
80+
7681
## Claims
7782

7883
This section describes how to get a claim value as a claim resolver.
@@ -100,6 +105,8 @@ The following table lists the claim resolvers with information about the OpenID
100105
| {OIDC:Scope} |The `scope` query string parameter. | openid |
101106
| {OIDC:Username}| The [resource owner password credentials flow](add-ropc-policy.md) user's username.| [email protected]|
102107

108+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#openid-connect-relying-party-application) of the OpenID Connect claim resolvers.
109+
103110
## OAuth2 key-value parameters
104111

105112
Any parameter name included as part of an OIDC or OAuth2 request can be mapped to a claim in the user journey. For example, the request from the application might include a query string parameter with a name of `app_session`, `loyalty_number`, or any custom query string.
@@ -127,6 +134,8 @@ The following table lists the claim resolvers with information about the SAML a
127134
| {SAML:Subject} | The `Subject` from the NameId element of the SAML AuthN request.|
128135
| {SAML:Binding} | The `ProtocolBinding` attribute value, from the `AuthnRequest` element of the SAML request. | urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST |
129136

137+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#saml-service-provider) of the SAML claim resolvers.
138+
130139
## OAuth2 identity provider
131140

132141
The following table lists the [OAuth2 identity provider](oauth2-technical-profile.md) claim resolvers:
@@ -157,7 +166,6 @@ To use the OAuth2 identity provider claim resolvers, set the output claim's `Par
157166
</ClaimsProvider>
158167
```
159168

160-
161169
## Using claim resolvers
162170

163171
You can use claims resolvers with the following elements:
@@ -287,3 +295,7 @@ In a [Relying party](relyingparty.md) policy technical profile, you may want to
287295
</TechnicalProfile>
288296
</RelyingParty>
289297
```
298+
299+
## Next steps
300+
301+
- Find more [claims resolvers samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver) on the Azure AD B2C community GitHub repo

0 commit comments

Comments
 (0)