Skip to content

Commit bb244f3

Browse files
committed
2 parents c37a6fb + affbd3f commit bb244f3

File tree

2,680 files changed

+36093
-18336
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,680 files changed

+36093
-18336
lines changed

.gitattributes

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,9 @@
66
*.c text
77
*.h text
88

9+
# Include Markdown in the GitHub language breakdown statistics
10+
*.md linguist-detectable
11+
912
# Denote all files that are truly binary and should not be modified.
1013
*.gif binary
1114
*.ico binary

.openpublishing.publish.config.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -410,6 +410,12 @@
410410
"branch": "main",
411411
"branch_mapping": {}
412412
},
413+
{
414+
"path_to_root": "azureml-examples-batch-pup",
415+
"url": "https://github.com/azure/azureml-examples",
416+
"branch": "santiagxf/batch-pup",
417+
"branch_mapping": {}
418+
},
413419
{
414420
"path_to_root": "azureml-examples-mavaisma-r-azureml",
415421
"url": "https://github.com/azure/azureml-examples",
@@ -905,7 +911,7 @@
905911
{
906912
"path_to_root": "ms-identity-python-webapp-tutorial",
907913
"url": "https://github.com/Azure-Samples/ms-identity-python-webapp",
908-
"branch": "0.5.0",
914+
"branch": "0.6.0",
909915
"branch_mapping": {}
910916
},
911917
{

.openpublishing.redirection.active-directory.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12450,6 +12450,31 @@
1245012450
"source_path_from_root": "/articles/active-directory/hybrid/whatis-phs.md",
1245112451
"redirect_url": "/azure/active-directory/hybrid/connect/whatis-phs",
1245212452
"redirect_document_id": false
12453+
},
12454+
12455+
{
12456+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/azure-ad-pim-approval-workflow.md",
12457+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-approval-workflow",
12458+
"redirect_document_id": false
12459+
},
12460+
12461+
{
12462+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md",
12463+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-create-roles-and-resource-roles-review",
12464+
"redirect_document_id": false
12465+
},
12466+
12467+
{
12468+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md",
12469+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-perform-roles-and-resource-roles-review",
12470+
"redirect_document_id": false
12471+
},
12472+
12473+
{
12474+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/pim-complete-azure-ad-roles-and-resource-roles-review.md",
12475+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-complete-roles-and-resource-roles-review",
12476+
"redirect_document_id": false
1245312477
}
12478+
1245412479
]
1245512480
}

.openpublishing.redirection.api-management.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,12 @@
159159
"source_path_from_root": "/articles/api-management/authorizations-reference.md",
160160
"redirect_url": "/azure/api-management/authorizations-configure-common-providers",
161161
"redirect_document_id": false
162+
},
163+
{
164+
"source_path_from_root": "/articles/api-management/policies/use-google-as-oauth-token-provider.md",
165+
"redirect_url": "/azure/api-management/policies",
166+
"redirect_document_id": false
162167
}
168+
163169
]
164170
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -451,6 +451,16 @@
451451
"redirect_url": "/azure/azure-monitor/alerts/itsmc-overview",
452452
"redirect_document_id": false
453453
},
454+
{
455+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-rate-limiting.md" ,
456+
"redirect_url": "/azure/azure-monitor/alerts/action-groups",
457+
"redirect_document_id": false
458+
},
459+
{
460+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-sms-behavior.md" ,
461+
"redirect_url": "/azure/azure-monitor/alerts/action-groups",
462+
"redirect_document_id": false
463+
},
454464
{
455465
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-azure-redhat-setup.md" ,
456466
"redirect_url": "/azure/azure-monitor/containers/container-insights-transition-hybrid",

.openpublishing.redirection.json

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1593,6 +1593,12 @@
15931593
"redirect_url": "/azure/frontdoor/how-to-configure-origin",
15941594
"redirect_document_id": false
15951595
},
1596+
{
1597+
"source_path_from_root": "/articles/frontdoor/front-door-application-security.md",
1598+
"redirect_url": "/azure/frontdoor/web-application-firewall",
1599+
"redirect_document_id": false
1600+
},
1601+
15961602
{
15971603
"source_path_from_root": "/articles/aks/aks-resource-health.md",
15981604
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
@@ -7843,6 +7849,11 @@
78437849
"redirect_url": "/azure/azure-maps/how-to-creator-feature-stateset",
78447850
"redirect_document_id": false
78457851
},
7852+
{
7853+
"source_path_from_root": "/articles/azure-maps/how-to-request-elevation-data.md",
7854+
"redirect_url": "https://azure.microsoft.com/updates/azure-maps-elevation-apis-and-render-v2-dem-tiles-will-be-retired-on-5-may-2023",
7855+
"redirect_document_id": false
7856+
},
78467857
{
78477858
"source_path_from_root": "/articles/azure-portal/resource-group-portal-linked-resources.md",
78487859
"redirect_url": "/azure/azure-portal/azure-portal-dashboards",
@@ -17418,6 +17429,11 @@
1741817429
"redirect_url": "/azure/virtual-network/virtual-networks-using-network-configuration-file",
1741917430
"redirect_document_id": false
1742017431
},
17432+
{
17433+
"source_path_from_root": "/articles/virtual-network-manager/how-to-exclude-elements.md",
17434+
"redirect_url": "/azure/virtual-network-manager/how-to-define-network-group-membership-azure-policy",
17435+
"redirect_document_id": false
17436+
},
1742117437
{
1742217438
"source_path_from_root": "/articles/networking/virtual-network-test-latency.md",
1742317439
"redirect_url": "/azure/virtual-network/virtual-network-test-latency",
@@ -22722,6 +22738,11 @@
2272222738
"source_path_from_root": "/articles/synapse-analytics/synapse-link/troubleshoot/troubleshoot-sql-snapshot-primary-key-column-order.md",
2272322739
"redirect_url": "/azure/synapse-analytics/synapse-link/synapse-link-for-sql-known-issues",
2272422740
"redirect_document_id": false
22741+
},
22742+
{
22743+
"source_path_from_root": "/articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md",
22744+
"redirect_url": "/azure/active-directory/authentication/how-to-migrate-mfa-server-to-mfa-user-authentication",
22745+
"redirect_document_id": true
2272522746
}
2272622747

2272722748
]

.openpublishing.redirection.virtual-desktop.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,16 @@
174174
"source_path_from_root": "/articles/virtual-desktop/environment-setup.md",
175175
"redirect_url": "/azure/virtual-desktop/terminology",
176176
"redirect_document_id": false
177+
},
178+
{
179+
"source_path_from_root": "/articles/virtual-desktop/app-attach-image-prep.md",
180+
"redirect_url": "/azure/virtual-desktop/msix-app-attach-create-msix-image",
181+
"redirect_document_id": true
182+
},
183+
{
184+
"source_path_from_root": "/articles/virtual-desktop/app-attach-msixmgr.md",
185+
"redirect_url": "/azure/virtual-desktop/msix-app-attach-create-msix-image",
186+
"redirect_document_id": false
177187
}
178188
]
179189
}

articles/active-directory-b2c/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -500,6 +500,9 @@
500500
# Secure
501501
- name: Secure
502502
items:
503+
- name: Security overview
504+
href: security-architecture.md
505+
displayName: azure ad b2c security best practices
503506
- name: Enable MFA
504507
items:
505508
- name: Multi-factor authentication

articles/active-directory-b2c/azure-monitor.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Watch this video to learn how to configure monitoring for Azure AD B2C using Azu
3737
3838
## Deployment overview
3939

40-
Azure AD B2C uses [Azure Active Directory monitoring](../active-directory/reports-monitoring/overview-monitoring.md). Unlike Azure AD tenants, an Azure AD B2C tenant can't have a subscription associated with it. So, we need to take extra steps to enable the integration between Azure AD B2C and Log Analytics, which is where we'll send the logs.
40+
Azure AD B2C uses [Azure Active Directory monitoring](../active-directory/reports-monitoring/overview-monitoring.md). Unlike Azure AD tenants, an Azure AD B2C tenant can't have a subscription associated with it. So, we need to take extra steps to enable the integration between Azure AD B2C and Log Analytics, which is where we send the logs.
4141
To enable _Diagnostic settings_ in Azure Active Directory within your Azure AD B2C tenant, you use [Azure Lighthouse](../lighthouse/overview.md) to [delegate a resource](../lighthouse/concepts/architecture.md), which allows your Azure AD B2C (the **Service Provider**) to manage an Azure AD (the **Customer**) resource.
4242

4343
> [!TIP]
@@ -55,7 +55,7 @@ During this deployment, you'll configure your Azure AD B2C tenant where logs are
5555

5656
In summary, you'll use Azure Lighthouse to allow a user or group in your Azure AD B2C tenant to manage a resource group in a subscription associated with a different tenant (the Azure AD tenant). After this authorization is completed, the subscription and log analytics workspace can be selected as a target in the Diagnostic settings in Azure AD B2C.
5757

58-
## Pre-requisites
58+
## Prerequisites
5959

6060
- An Azure AD B2C account with [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) role on the Azure AD B2C tenant.
6161

@@ -286,14 +286,14 @@ The workbook will display reports in the form of a dashboard.
286286

287287
## Create alerts
288288

289-
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events occur. You can also create alerts on absence of an event, or a number of events occur within a particular time window. For example, alerts can be used to notify you when average number of sign in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-log.md).
289+
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events occur. You can also create alerts on absence of an event, or when a number of events occur within a particular time window. For example, alerts can be used to notify you when average number of sign-ins exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-log.md).
290290

291-
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md#configure-notifications) whenever there's a 25% drop in the **Total Requests** compared to previous period. Alert will run every 5 minutes and look for the drop in the last hour compared to the hour before it. The alerts are created using Kusto query language.
291+
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md) whenever there's a 25% drop in the **Total Requests** compared to previous period. Alert will run every 5 minutes and look for the drop in the last hour compared to the hour before it. The alerts are created using Kusto query language.
292292

293293
1. Sign in to the [Azure portal](https://portal.azure.com).
294294
1. Make sure you're using the directory that contains your *Azure AD* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
295295
1. From **Log Analytics workspace**, select **Logs**.
296-
1. Create a new **Kusto query** by using the query below.
296+
1. Create a new **Kusto query** by using this query.
297297

298298
```kusto
299299
let start = ago(2h);
@@ -309,8 +309,8 @@ Use the following instructions to create a new Azure Alert, which will send an [
309309
| where PercentageChange <= threshold //Trigger's alert rule if matched.
310310
```
311311

312-
1. Select **Run**, to test the query. You should see the results if there is a drop of 25% or more in the total requests within the past hour.
313-
1. To create an alert rule based on the query above, use the **+ New alert rule** option available in the toolbar.
312+
1. Select **Run**, to test the query. You should see the results if there's a drop of 25% or more in the total requests within the past hour.
313+
1. To create an alert rule based on this query, use the **+ New alert rule** option available in the toolbar.
314314
1. On the **Create an alert rule** page, select **Condition name**
315315
1. On the **Configure signal logic** page, set following values and then use **Done** button to save the changes.
316316

articles/active-directory-b2c/configure-authentication-sample-python-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ To create the web app registration, follow these steps:
7171

7272
## Step 3: Get the web app sample
7373

74-
[Download the zip file](https://github.com/Azure-Samples/ms-identity-python-webapp/archive/master.zip), or clone the sample web application from GitHub.
74+
[Download the zip file](https://github.com/Azure-Samples/ms-identity-python-webapp/archive/main.zip), or clone the sample web application from GitHub.
7575

7676
```bash
7777
git clone https://github.com/Azure-Samples/ms-identity-python-webapp.git

0 commit comments

Comments
 (0)