Skip to content

Commit b3a2b8b

Browse files
author
David Curwin
committed
changes from tomer
2 parents fe72843 + 96bd592 commit b3a2b8b

File tree

4,121 files changed

+28165
-67544
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,121 files changed

+28165
-67544
lines changed

.markdownlint.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,6 @@
4444
"names": [
4545
".NET",
4646
"ASP.NET",
47-
"Azure",
4847
"JavaScript",
4948
"NuGet",
5049
"PowerShell",
@@ -56,5 +55,11 @@
5655
"MD045": false,
5756
"MD046": false,
5857
"MD047": false,
59-
"MD048": true
58+
"MD048": true,
59+
"MD049": true,
60+
"MD050": true,
61+
"MD051": false,
62+
"MD052": true,
63+
"MD053": true
6064
}
65+

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -835,6 +835,11 @@
835835
"redirect_url": "/azure/defender-for-cloud/connect-azure-subscription",
836836
"redirect_document_id": true
837837
},
838+
{
839+
"source_path_from_root": "/articles/defender-for-cloud/enable-vulnerability-assessment-agentless.md",
840+
"redirect_url": "/azure/defender-for-cloud/enable-agentless-scanning-vms",
841+
"redirect_document_id": true
842+
},
838843
{
839844
"source_path_from_root": "/articles/defender-for-cloud/defender-for-storage-exclude.md",
840845
"redirect_url": "/azure/defender-for-cloud/defender-for-storage-classic-enable#exclude-a-storage-account-from-a-protected-subscription-in-the-per-transaction-plan",

.openpublishing.redirection.json

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13338,6 +13338,16 @@
1333813338
"redirect_url": "/azure/governance/policy/samples/index",
1333913339
"redirect_document_id": false
1334013340
},
13341+
{
13342+
"source_path_from_root": "/articles/governance/policy/samples/PCIv3_2_1_2018_audit.md",
13343+
"redirect_url": "/azure/governance/policy/samples/pci-dss-3-2-1",
13344+
"redirect_document_id": false
13345+
},
13346+
{
13347+
"source_path_from_root": "/articles/governance/policy/samples/pci_dss_v4.0.md",
13348+
"redirect_url": "/azure/governance/policy/samples/pci-dss-4-0",
13349+
"redirect_document_id": false
13350+
},
1334113351
{
1334213352
"source_path_from_root": "/articles/azure-policy/create-manage-policy.md",
1334313353
"redirect_url": "/azure/governance/policy/tutorials/create-and-manage",
@@ -24040,7 +24050,12 @@
2404024050
},
2404124051
{
2404224052
"source_path_from_root": "/articles/virtual-machines/virtual-machines-reliability.md",
24043-
"redirect_url": "/azure/virtual-machines/reliability-virtual-machines",
24053+
"redirect_url": "/azure/reliability/reliability-virtual-machines",
24054+
"redirect_document_id": false
24055+
},
24056+
{
24057+
"source_path_from_root": "/articles/virtual-machines/reliability-virtual-machines.md",
24058+
"redirect_url": "/azure/reliability/reliability-virtual-machines",
2404424059
"redirect_document_id": false
2404524060
},
2404624061
{

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ You can create an API endpoint using one of our [samples](api-connector-samples.
3434

3535
To use an [API connector](api-connectors-overview.md), you first create the API connector and then enable it in a user flow.
3636

37-
1. Sign in to the [Azure portal](https://portal.azure.com/).
37+
1. Sign in to the [Azure portal](https://portal.azure.com).
3838
1. Under **Azure services**, select **Azure AD B2C**.
3939
1. Select **API connectors**, and then select **New API connector**.
4040

@@ -52,7 +52,7 @@ To use an [API connector](api-connectors-overview.md), you first create the API
5252

5353
Follow these steps to add an API connector to a sign-up user flow.
5454

55-
1. Sign in to the [Azure portal](https://portal.azure.com/).
55+
1. Sign in to the [Azure portal](https://portal.azure.com).
5656
1. Under **Azure services**, select **Azure AD B2C**.
5757
1. Select **User flows**, and then select the user flow you want to add the API connector to.
5858
1. Select **API connectors**, and then select the API endpoint you want to invoke at the **Before sending the token (preview)** step in the user flow:

articles/active-directory-b2c/add-sign-in-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The sign-in policy lets users:
2727
* Sign in with an Azure AD B2C Local Account
2828
* Users can sign-in with a social account
2929
* Password reset
30-
* Users cannot sign up for an Azure AD B2C Local Account. To create an account, an administrator can use [Azure portal](manage-users-portal.md#create-a-consumer-user), or [MS Graph API](microsoft-graph-operations.md).
30+
* Users cannot sign up for an Azure AD B2C Local Account. To create an account, an administrator can use the [Azure portal](manage-users-portal.md#create-a-consumer-user), or [Microsoft Graph API](microsoft-graph-operations.md).
3131

3232
![Profile editing flow](./media/add-sign-in-policy/sign-in-user-flow.png)
3333

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&sco
124124
| client_id |Required |The application ID assigned to your app in the [Azure portal](https://portal.azure.com).|
125125
| client_secret | Yes, in Web Apps | The application secret that was generated in the [Azure portal](https://portal.azure.com/). Client secrets are used in this flow for Web App scenarios, where the client can securely store a client secret. For Native App (public client) scenarios, client secrets cannot be securely stored, and therefore are not used in this call. If you use a client secret, please change it on a periodic basis. |
126126
| grant_type |Required |The type of grant. For the authorization code flow, the grant type must be `authorization_code`. |
127-
| scope |Required |A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app needs a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
127+
| scope |Recommended |A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app needs a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
128128
| code |Required |The authorization code that you acquired in from the `/authorize` endpoint. |
129129
| redirect_uri |Required |The redirect URI of the application where you received the authorization code. |
130130
| code_verifier | recommended | The same `code_verifier` used to obtain the authorization code. Required if PKCE was used in the authorization code grant request. For more information, see the [PKCE RFC](https://tools.ietf.org/html/rfc7636). |

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ Azure AD B2C **Premium P2** is required to create risky sign-in policies. **Prem
8888

8989
To add a Conditional Access policy, disable security defaults:
9090

91-
1. Sign in to the [Azure portal](https://portal.azure.com/).
91+
1. Sign in to the [Azure portal](https://portal.azure.com).
9292
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
9393
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
9494
1. Under **Azure services**, select **Azure Active Directory**. Or use the search box to find and select **Azure Active Directory**.
@@ -421,7 +421,7 @@ The claims transformation isn't limited to the `strongAuthenticationPhoneNumber`
421421

422422
To review the result of a Conditional Access event:
423423

424-
1. Sign in to the [Azure portal](https://portal.azure.com/).
424+
1. Sign in to the [Azure portal](https://portal.azure.com).
425425
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
426426
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
427427
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: kengaderdus
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
10-
ms.custom: devx-track-js
10+
ms.custom: devx-track-js, devx-track-linux
1111
ms.topic: how-to
1212
ms.date: 07/07/2022
1313
ms.author: kengaderdus

articles/active-directory-b2c/configure-security-analytics-sentinel.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ After you configure your Azure AD B2C instance to send logs to Azure Monitor, en
5555
>[!IMPORTANT]
5656
>To enable Microsoft Sentinel, obtain Contributor permissions to the subscription in which the Microsoft Sentinel workspace resides. To use Microsoft Sentinel, use Contributor or Reader permissions on the resource group to which the workspace belongs.
5757
58-
1. Go to the [Azure portal](https://portal.azure.com).
58+
1. Sign in to the [Azure portal](https://portal.azure.com).
5959
2. Select the subscription where the Log Analytics workspace is created.
6060
3. Search for and select **Microsoft Sentinel**.
6161

articles/active-directory-b2c/configure-user-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ In this article, you collect a new attribute during your sign-up journey in Azur
3232

3333
## Add user attributes your user flow
3434

35-
1. Sign in to the [Azure portal](https://portal.azure.com/).
35+
1. Sign in to the [Azure portal](https://portal.azure.com).
3636
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
3737
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
3838
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.

0 commit comments

Comments
 (0)