Skip to content

Commit b07e56c

Browse files
committed
2 parents e15ea3f + 351b433 commit b07e56c

File tree

2,812 files changed

+20778
-12717
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,812 files changed

+20778
-12717
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -813,8 +813,8 @@
813813
"branch_mapping": {}
814814
},
815815
{
816-
"path_to_root": "azure-spring-cloud-reference-architecture",
817-
"url": "https://github.com/Azure/azure-spring-cloud-reference-architecture",
816+
"path_to_root": "azure-spring-apps-reference-architecture",
817+
"url": "https://github.com/Azure/azure-spring-apps-reference-architecture",
818818
"branch": "main",
819819
"branch_mapping": {}
820820
},
@@ -1016,6 +1016,7 @@
10161016
"articles/mysql/.openpublishing.redirection.mysql.json",
10171017
"articles/container-apps/.openpublishing.redirection.container-apps.json",
10181018
"articles/spring-cloud/.openpublishing.redirection.spring-cloud.json",
1019+
"articles/spring-apps/.openpublishing.redirection.spring-apps.json",
10191020
"articles/load-testing/.openpublishing.redirection.azure-load-testing.json",
10201021
"articles/azure-video-indexer/.openpublishing.redirection.azure-video-indexer.json",
10211022
"articles/machine-learning/.openpublishing.redirection.machine-learning.json",

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,11 @@
3030
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path_from_root": "/articles/active-directory/fundamentals/whats-new-microsoft-365-government.md",
35+
"redirect_url": "/azure/active-directory/fundamentals/whats-new",
36+
"redirect_document_id": true
37+
},
3338
{
3439
"source_path_from_root": "/articles/active-directory/manage-apps/common-scenarios.md",
3540
"redirect_url": "/azure/active-directory/manage-apps/what-is-application-management",

.openpublishing.redirection.azure-monitor.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -346,6 +346,11 @@
346346
"redirect_url": "/azure/azure-monitor/faq#vm-insights",
347347
"redirect_document_id": false
348348
},
349+
{
350+
"source_path_from_root": "/articles/azure-monitor/app/proactive-cloud-services.md" ,
351+
"redirect_url": "https://docs.microsoft.com/azure/azure-monitor/alerts/alerts-overview",
352+
"redirect_document_id": false
353+
},
349354
{
350355
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-log-search.md" ,
351356
"redirect_url": "/azure/azure-monitor/alerts/vminsights-log-query",
@@ -410,6 +415,26 @@
410415
"source_path_from_root": "/articles/azure-monitor/logs/custom-logs-overview.md" ,
411416
"redirect_url": "/azure/azure-monitor/logs/logs-ingestion-api-overview",
412417
"redirect_document_id": false
418+
},
419+
{
420+
"source_path_from_root": "/articles/azure-monitor/insights/cosmosdb-insights-overview.md" ,
421+
"redirect_url": "/azure/cosmos-db/cosmosdb-insights-overview",
422+
"redirect_document_id": false
423+
},
424+
{
425+
"source_path_from_root": "/articles/azure-monitor/insights/network-insights-overview.md" ,
426+
"redirect_url": "/azure/network-watcher/network-insights-overview",
427+
"redirect_document_id": false
428+
},
429+
{
430+
"source_path_from_root": "/articles/azure-monitor/insights/key-vault-insights-overview.md" ,
431+
"redirect_url": "/azure/key-vault/key-vault-insights-overview",
432+
"redirect_document_id": false
433+
},
434+
{
435+
"source_path_from_root": "/articles/azure-monitor/app/cloudservices.md" ,
436+
"redirect_url": "/azure/azure-monitor/app/azure-web-apps-net-core",
437+
"redirect_document_id": false
413438
}
414439
]
415440
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40312,6 +40312,11 @@
4031240312
"source_path_from_root": "/articles/virtual-machines/windows/winrm.md",
4031340313
"redirect_url": "/azure/virtual-machines/windows/connect-winrm",
4031440314
"redirect_document_id": false
40315+
},
40316+
{
40317+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/tutorial-ai-builder.md",
40318+
"redirect_url": "https://docs.microsoft.com/ai-builder/create-form-processing-model",
40319+
"redirect_document_id": false
4031540320
}
4031640321
]
4031740322
}

CODEOWNERS

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,17 +25,17 @@ articles/advisor @rboucher
2525
articles/service-health @rboucher
2626

2727
# Azure Synapse Analytics
28-
/articles/synapse-analytics/ @julieMSFT @ryanmajidi @saveenr
29-
/articles/synapse-analytics/backuprestore/ @joannapea @julieMSFT
28+
/articles/synapse-analytics/ @SnehaGunda @WilliamDAssafMSFT @ryanmajidi @saveenr
29+
/articles/synapse-analytics/backuprestore/ @joannapea @WilliamDAssafMSFT
3030
/articles/synapse-analytics/catalog-governance/@djpmsft @chanuengg
31-
/articles/synapse-analytics/ccid/ @liudan66 @julieMSFT
31+
/articles/synapse-analytics/ccid/ @liudan66
3232
/articles/synapse-analytics/data-integration/ @kromerm @jonburchel
3333
/articles/synapse-analytics/machine-learning/ @garyericson @NelGson @midesa
34-
/articles/synapse-analytics/metadata/@MikeRys @julieMSFT @jocaplan
35-
/articles/synapse-analytics/security/ @RonyMSFT @nanditavalsan @meenalsri @julieMSFT
34+
/articles/synapse-analytics/metadata/@MikeRys @jocaplan
35+
/articles/synapse-analytics/security/ @RonyMSFT @meenalsri
3636
/articles/synapse-analytics/spark/ @euangms @mlee3gsd @midesa
37-
/articles/synapse-analytics/sql/ @filippopovic @azaricstefan @anumjs @WilliamDAssafMSFT @jovanpop-msft
38-
/articles/synapse-analytics/sql-data-warehouse/ @anumjs @ronortloff @julieMSFT
37+
/articles/synapse-analytics/sql/ @filippopovic @azaricstefan @WilliamDAssafMSFT @jovanpop-msft
38+
/articles/synapse-analytics/sql-data-warehouse/ @SnehaGunda @WilliamDAssafMSFT
3939
/articles/synapse-analytics/synapse-link/ @Rodrigossz @SnehaGunda @jovanpop-msft
4040

4141
# Cognitive Services

articles/active-directory-b2c/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,4 +87,4 @@ Stay up to date with the state of the service and find support options.
8787
|--|--|
8888
| [Service updates](https://azure.microsoft.com/updates/?product=active-directory-b2c) | Stay up to date with Azure AD B2C product updates and announcements. |
8989
| [Microsoft Support](support-options.md) | File a support request for Azure AD B2C technical issues. Billing and subscription management support is provided at no cost. |
90-
| [Azure status](https://status.azure.com/status) | View the current health status of all Azure services. |
90+
| [Azure status](https://azure.status.microsoft/status) | View the current health status of all Azure services. |

articles/active-directory-b2c/custom-domain.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 05/13/2022
12+
ms.date: 07/26/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
ms.custom: "b2c-support"
@@ -116,13 +116,21 @@ Follow these steps to create an Azure Front Door:
116116
|Tier| Select either Standard or Premium tier. Standard tier is content delivery optimized. Premium tier builds on Standard tier and is focused on security. See [Tier Comparison](../frontdoor/standard-premium/tier-comparison.md).|
117117
|Endpoint name| Enter a globally unique name for your endpoint, such as `b2cazurefrontdoor`. The **Endpoint hostname** is generated automatically. |
118118
|Origin type| Select `Custom`.|
119-
|Origin host name| Enter `<tenant-name>.b2clogin.com`. Replace `<tenant-name>` with the [name of your Azure AD B2C tenant](tenant-management.md#get-your-tenant-name).|
119+
|Origin host name| Enter `<tenant-name>.b2clogin.com`. Replace `<tenant-name>` with the [name of your Azure AD B2C tenant](tenant-management.md#get-your-tenant-name) such as `contoso.b2clogin.com`.|
120120

121121
Leave the **Caching** and **WAF policy** empty.
122122

123123
124124
1. Once the Azure Front Door resource is created, select **Overview**, and copy the **Endpoint hostname**. It looks something like `b2cazurefrontdoor-ab123e.z01.azurefd.net`.
125125

126+
1. Make sure the **Host name** and **Origin host header** of your origin have the same value:
127+
1. Under **Settings**, select **Origin groups**.
128+
1. Select your origin group from the list, such as **default-origin-group**.
129+
1. On the right pane, select your **Origin host name** such as `contoso.b2clogin.com`.
130+
1. On the **Update origin** pane, update the **Host name** and **Origin host header** to have the same value.
131+
132+
:::image type="content" source="./media/custom-domain/azure-front-door-custom-domain-origins.png" alt-text="Screenshot of how to update custom domain origins.":::
133+
126134

127135
## Step 3. Set up your custom domain on Azure Front Door
128136

108 KB
Loading

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -192,6 +192,9 @@ The validation technical profile can be any technical profile in the policy, suc
192192

193193
You can also call a REST API technical profile with your business logic, overwrite input claims, or enrich user data by further integrating with corporate line-of-business application. For more information, see [Validation technical profile](validation-technical-profile.md)
194194

195+
> [!NOTE]
196+
> A validation technical profile is only triggered when there's an input from the user. You can't create an _empty_ self-asserted technical profile to call a validation technical profile just to take advantage of the **ContinueOnError** attribute of a **ValidationTechnicalProfile** element. You can only call a validation technical profile from a self-asserted technical profile that requests an input from the user, or from an orchestration step in a user journey.
197+
195198
## Metadata
196199

197200
| Attribute | Required | Description |

articles/active-directory-b2c/threat-management.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ The smart lockout feature uses many factors to determine when an account should
5555
- Passwords such as 12456! and 1234567! (or newAccount1234 and newaccount1234) are so similar that the algorithm interprets them as human error and counts them as a single try.
5656
- Larger variations in pattern, such as 12456! and ABCD2!, are counted as separate tries.
5757

58-
When testing the smart lockout feature, use a distinctive pattern for each password you enter. Consider using password generation web apps, such as [https://passwordsgenerator.net/](https://passwordsgenerator.net/).
58+
When testing the smart lockout feature, use a distinctive pattern for each password you enter. Consider using password generation web apps, such as `https://passwordsgenerator.net/`.
5959

6060
When the smart lockout threshold is reached, you'll see the following message while the account is locked: **Your account is temporarily locked to prevent unauthorized use. Try again later**. The error messages can be [localized](localization-string-ids.md#sign-up-or-sign-in-error-messages).
6161

@@ -69,4 +69,3 @@ To obtain information about locked-out accounts, you can check the Active Direct
6969
![Section of Azure AD sign-in report showing locked-out account](./media/threat-management/portal-01-locked-account.png)
7070

7171
To learn about viewing the sign-in activity report in Azure Active Directory, see [Sign-in activity report error codes](../active-directory/reports-monitoring/concept-sign-ins.md).
72-

0 commit comments

Comments
 (0)