Skip to content

Commit b9a4871

Browse files
authored
Merge branch 'MicrosoftDocs:main' into docs-editor/map-data-fields-to-entities-1689594566
2 parents d79110a + 3e48b53 commit b9a4871

File tree

10,443 files changed

+140052
-185146
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

10,443 files changed

+140052
-185146
lines changed

.openpublishing.publish.config.json

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1015,7 +1015,13 @@
10151015
"url": "https://github.com/Azure/actions-workflow-samples",
10161016
"branch": "master",
10171017
"branch_mapping": {}
1018-
}
1018+
},
1019+
{
1020+
"path_to_root": "azure-proactive-resiliency-library",
1021+
"url": "https://github.com/Azure/Azure-Proactive-Resiliency-Library",
1022+
"branch": "main",
1023+
"branch_mapping": {}
1024+
}
10191025
],
10201026
"branch_target_mapping": {
10211027
"live": ["Publish", "PDF"],
@@ -1060,15 +1066,17 @@
10601066
".openpublishing.redirection.sql-database.json",
10611067
".openpublishing.redirection.virtual-desktop.json",
10621068
".openpublishing.redirection.devops-project.json",
1063-
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-old.json",
1064-
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-services.json",
1069+
"articles/ai-services/.openpublishing.redirection.ai-services-from-applied.json",
1070+
"articles/ai-services/.openpublishing.redirection.ai-services-from-cog.json",
1071+
"articles/ai-services/.openpublishing.redirection.applied-ai-old.json",
1072+
"articles/ai-services/.openpublishing.redirection.applied-ai-services.json",
1073+
"articles/ai-services/.openpublishing.redirection.cognitive-services.json",
10651074
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
10661075
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
10671076
"articles/azure-relay/.openpublishing.redirection.relay.json",
10681077
"articles/azure-video-analyzer/.openpublishing.redirection.azure-video-analyzer.json",
10691078
"articles/azure-video-indexer/.openpublishing.redirection.azure-video-indexer.json",
10701079
"articles/cloud-shell/.openpublishing.redirection.cloud-shell.json",
1071-
"articles/cognitive-services/.openpublishing.redirection.cognitive-services.json",
10721080
"articles/communication-services/.openpublishing.redirection.communication-services.json",
10731081
"articles/confidential-computing/.openpublishing.redirection.json",
10741082
"articles/container-apps/.openpublishing.redirection.container-apps.json",

.openpublishing.redirection.azure-monitor.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6176,7 +6176,7 @@
61766176
"redirect_url": "/azure/azure-monitor/app/javascript-sdk-configuration",
61776177
"redirect_document_id": false
61786178
},
6179-
{
6179+
{
61806180
"source_path_from_root": "/articles/azure-monitor/agents/data-collection-firewall.md",
61816181
"redirect_url": "/azure/azure-monitor/agents/data-collection-rule-azure-monitor-agent",
61826182
"redirect_document_id": false
@@ -6185,6 +6185,16 @@
61856185
"source_path_from_root": "/articles/azure-monitor/autoscale/tutorial-autoscale-performance-schedule.md",
61866186
"redirect_url": "/previous-versions/azure/azure-monitor/autoscale/tutorial-autoscale-performance-schedule",
61876187
"redirect_document_id": false
6188+
},
6189+
{
6190+
"source_path_from_root": "/articles/azure-monitor/essentials/metrics-supported.md",
6191+
"redirect_url": "/azure/azure-monitor/reference/supported-metrics/metrics-index",
6192+
"redirect_document_id": false
6193+
},
6194+
{
6195+
"source_path_from_root": "/articles/azure-monitor/essentials/resource-logs-categories.md",
6196+
"redirect_url": "/azure/azure-monitor/reference/supported-logs/logs-index",
6197+
"redirect_document_id": false
61886198
}
61896199
]
61906200
}

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -835,6 +835,11 @@
835835
"redirect_url": "/azure/defender-for-cloud/connect-azure-subscription",
836836
"redirect_document_id": true
837837
},
838+
{
839+
"source_path_from_root": "/articles/defender-for-cloud/enable-vulnerability-assessment-agentless.md",
840+
"redirect_url": "/azure/defender-for-cloud/enable-agentless-scanning-vms",
841+
"redirect_document_id": true
842+
},
838843
{
839844
"source_path_from_root": "/articles/defender-for-cloud/defender-for-storage-exclude.md",
840845
"redirect_url": "/azure/defender-for-cloud/defender-for-storage-classic-enable#exclude-a-storage-account-from-a-protected-subscription-in-the-per-transaction-plan",

.openpublishing.redirection.json

Lines changed: 53 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1790,6 +1790,21 @@
17901790
"redirect_url": "/azure/automanage/index",
17911791
"redirect_document_id": false
17921792
},
1793+
{
1794+
"source_path": "articles/automanage/windows-server-azure-edition-vnext.md",
1795+
"redirect_URL": "/windows-server/get-started/azure-edition",
1796+
"redirect_document_id": false
1797+
},
1798+
{
1799+
"source_path": "articles/automanage/automanage-hotpatch.md",
1800+
"redirect_URL": "/windows-server/get-started/hotpatch",
1801+
"redirect_document_id": false
1802+
},
1803+
{
1804+
"source_path": "articles/automanage/automanage-windows-server-services-overview.md",
1805+
"redirect_URL": "/windows-server/get-started/azure-edition",
1806+
"redirect_document_id": false
1807+
},
17931808
{
17941809
"source_path_from_root": "/articles/aks/view-metrics.md",
17951810
"redirect_url": "/azure/aks/monitor-aks",
@@ -13318,6 +13333,21 @@
1331813333
"redirect_url": "/azure/governance/policy/samples/index",
1331913334
"redirect_document_id": false
1332013335
},
13336+
{
13337+
"source_path_from_root": "/articles/governance/policy/samples/PCIv3_2_1_2018_audit.md pci-dss-3-2-1.md",
13338+
"redirect_url": "/azure/governance/policy/samples/index",
13339+
"redirect_document_id": false
13340+
},
13341+
{
13342+
"source_path_from_root": "/articles/governance/policy/samples/PCIv3_2_1_2018_audit.md",
13343+
"redirect_url": "/azure/governance/policy/samples/pci-dss-3-2-1",
13344+
"redirect_document_id": false
13345+
},
13346+
{
13347+
"source_path_from_root": "/articles/governance/policy/samples/pci_dss_v4.0.md",
13348+
"redirect_url": "/azure/governance/policy/samples/pci-dss-4-0",
13349+
"redirect_document_id": false
13350+
},
1332113351
{
1332213352
"source_path_from_root": "/articles/azure-policy/create-manage-policy.md",
1332313353
"redirect_url": "/azure/governance/policy/tutorials/create-and-manage",
@@ -22075,67 +22105,67 @@
2207522105
},
2207622106
{
2207722107
"source_path_from_root": "/articles/labs/anomaly-finder/apiref.md",
22078-
"redirect_url": "/azure/cognitive-services/anomaly-detector/",
22108+
"redirect_url": "/azure/ai-services/anomaly-detector/",
2207922109
"redirect_document_id": false
2208022110
},
2208122111
{
2208222112
"source_path_from_root": "/articles/labs/anomaly-finder/overview.md",
22083-
"redirect_url": "/azure/cognitive-services/anomaly-detector/overview",
22113+
"redirect_url": "/azure/ai-services/anomaly-detector/overview",
2208422114
"redirect_document_id": false
2208522115
},
2208622116
{
2208722117
"source_path_from_root": "/articles/labs/anomaly-finder/quickstart/csharp.md",
22088-
"redirect_url": "/azure/cognitive-services/anomaly-detector/quickstarts/detect-data-anomalies-csharp",
22118+
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-csharp",
2208922119
"redirect_document_id": false
2209022120
},
2209122121
{
2209222122
"source_path_from_root": "/articles/labs/anomaly-finder/quickstart/csharp-tutorial.md",
22093-
"redirect_url": "/azure/cognitive-services/anomaly-detector/quickstarts/detect-data-anomalies-csharp",
22123+
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-csharp",
2209422124
"redirect_document_id": false
2209522125
},
2209622126
{
2209722127
"source_path_from_root": "/articles/labs/anomaly-finder/quickstart/curl.md",
22098-
"redirect_url": "/azure/cognitive-services/anomaly-detector/quickstarts/detect-data-anomalies-csharp",
22128+
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-csharp",
2209922129
"redirect_document_id": false
2210022130
},
2210122131
{
2210222132
"source_path_from_root": "/articles/labs/anomaly-finder/quickstart/java.md",
22103-
"redirect_url": "/azure/cognitive-services/anomaly-detector/quickstarts/detect-data-anomalies-java",
22133+
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-java",
2210422134
"redirect_document_id": false
2210522135
},
2210622136
{
2210722137
"source_path_from_root": "/articles/labs/anomaly-finder/quickstart/java-tutorial.md",
22108-
"redirect_url": "/azure/cognitive-services/anomaly-detector/quickstarts/detect-data-anomalies-java",
22138+
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-java",
2210922139
"redirect_document_id": false
2211022140
},
2211122141
{
2211222142
"source_path_from_root": "/articles/labs/anomaly-finder/quickstart/javascript.md",
22113-
"redirect_url": "/azure/cognitive-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
22143+
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
2211422144
"redirect_document_id": false
2211522145
},
2211622146
{
2211722147
"source_path_from_root": "/articles/labs/anomaly-finder/quickstart/javascript-tutorial.md",
22118-
"redirect_url": "/azure/cognitive-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
22148+
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
2211922149
"redirect_document_id": false
2212022150
},
2212122151
{
2212222152
"source_path_from_root": "/articles/labs/anomaly-finder/quickstart/php.md",
22123-
"redirect_url": "/azure/cognitive-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
22153+
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
2212422154
"redirect_document_id": false
2212522155
},
2212622156
{
2212722157
"source_path_from_root": "/articles/labs/anomaly-finder/quickstart/python.md",
22128-
"redirect_url": "/azure/cognitive-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
22158+
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
2212922159
"redirect_document_id": false
2213022160
},
2213122161
{
2213222162
"source_path_from_root": "/articles/labs/anomaly-finder/quickstart/python-tutorial.md",
22133-
"redirect_url": "/azure/cognitive-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
22163+
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
2213422164
"redirect_document_id": false
2213522165
},
2213622166
{
2213722167
"source_path_from_root": "/articles/labs/anomaly-finder/quickstart/ruby.md",
22138-
"redirect_url": "/azure/cognitive-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
22168+
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
2213922169
"redirect_document_id": false
2214022170
},
2214122171
{
@@ -24017,6 +24047,16 @@
2401724047
"source_path_from_root": "/articles/container-registry/github-action-scan.md",
2401824048
"redirect_url": "/azure/developer/github/",
2401924049
"redirect_document_id": false
24050+
},
24051+
{
24052+
"source_path_from_root": "/articles/virtual-machines/virtual-machines-reliability.md",
24053+
"redirect_url": "/azure/virtual-machines/reliability-virtual-machines",
24054+
"redirect_document_id": false
24055+
},
24056+
{
24057+
"source_path_from_root": "/articles/private-link/tutorial-private-endpoint-webapp-portal.md",
24058+
"redirect_url": "/azure/private-link/create-private-endpoint-portal",
24059+
"redirect_document_id": false
2402024060
}
2402124061
]
2402224062
}

CODEOWNERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ articles/service-health @rboucher
3939
/articles/synapse-analytics/synapse-link/ @Rodrigossz @SnehaGunda @jovanpop-msft
4040

4141
# Cognitive Services
42-
/articles/cognitive-services/ @aahill @patrickfarley @nitinme @mrbullwinkle @laujan @eric-urban @jboback
42+
/articles/ai-services/ @aahill @patrickfarley @nitinme @mrbullwinkle @laujan @eric-urban @jboback
4343

4444
# DevOps
4545
/articles/ansible/ @TomArcherMsft

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ You can create an API endpoint using one of our [samples](api-connector-samples.
3434

3535
To use an [API connector](api-connectors-overview.md), you first create the API connector and then enable it in a user flow.
3636

37-
1. Sign in to the [Azure portal](https://portal.azure.com/).
37+
1. Sign in to the [Azure portal](https://portal.azure.com).
3838
1. Under **Azure services**, select **Azure AD B2C**.
3939
1. Select **API connectors**, and then select **New API connector**.
4040

@@ -52,7 +52,7 @@ To use an [API connector](api-connectors-overview.md), you first create the API
5252

5353
Follow these steps to add an API connector to a sign-up user flow.
5454

55-
1. Sign in to the [Azure portal](https://portal.azure.com/).
55+
1. Sign in to the [Azure portal](https://portal.azure.com).
5656
1. Under **Azure services**, select **Azure AD B2C**.
5757
1. Select **User flows**, and then select the user flow you want to add the API connector to.
5858
1. Select **API connectors**, and then select the API endpoint you want to invoke at the **Before sending the token (preview)** step in the user flow:

articles/active-directory-b2c/add-sign-in-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The sign-in policy lets users:
2727
* Sign in with an Azure AD B2C Local Account
2828
* Users can sign-in with a social account
2929
* Password reset
30-
* Users cannot sign up for an Azure AD B2C Local Account. To create an account, an administrator can use [Azure portal](manage-users-portal.md#create-a-consumer-user), or [MS Graph API](microsoft-graph-operations.md).
30+
* Users cannot sign up for an Azure AD B2C Local Account. To create an account, an administrator can use the [Azure portal](manage-users-portal.md#create-a-consumer-user), or [Microsoft Graph API](microsoft-graph-operations.md).
3131

3232
![Profile editing flow](./media/add-sign-in-policy/sign-in-user-flow.png)
3333

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&sco
124124
| client_id |Required |The application ID assigned to your app in the [Azure portal](https://portal.azure.com).|
125125
| client_secret | Yes, in Web Apps | The application secret that was generated in the [Azure portal](https://portal.azure.com/). Client secrets are used in this flow for Web App scenarios, where the client can securely store a client secret. For Native App (public client) scenarios, client secrets cannot be securely stored, and therefore are not used in this call. If you use a client secret, please change it on a periodic basis. |
126126
| grant_type |Required |The type of grant. For the authorization code flow, the grant type must be `authorization_code`. |
127-
| scope |Required |A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app needs a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
127+
| scope |Recommended |A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app needs a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
128128
| code |Required |The authorization code that you acquired in from the `/authorize` endpoint. |
129129
| redirect_uri |Required |The redirect URI of the application where you received the authorization code. |
130130
| code_verifier | recommended | The same `code_verifier` used to obtain the authorization code. Required if PKCE was used in the authorization code grant request. For more information, see the [PKCE RFC](https://tools.ietf.org/html/rfc7636). |

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ Azure AD B2C **Premium P2** is required to create risky sign-in policies. **Prem
8888

8989
To add a Conditional Access policy, disable security defaults:
9090

91-
1. Sign in to the [Azure portal](https://portal.azure.com/).
91+
1. Sign in to the [Azure portal](https://portal.azure.com).
9292
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
9393
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
9494
1. Under **Azure services**, select **Azure Active Directory**. Or use the search box to find and select **Azure Active Directory**.
@@ -421,7 +421,7 @@ The claims transformation isn't limited to the `strongAuthenticationPhoneNumber`
421421

422422
To review the result of a Conditional Access event:
423423

424-
1. Sign in to the [Azure portal](https://portal.azure.com/).
424+
1. Sign in to the [Azure portal](https://portal.azure.com).
425425
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
426426
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
427427
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: kengaderdus
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
10-
ms.custom: devx-track-js
10+
ms.custom: devx-track-js, devx-track-linux
1111
ms.topic: how-to
1212
ms.date: 07/07/2022
1313
ms.author: kengaderdus

0 commit comments

Comments
 (0)