Skip to content

Commit bccacfe

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into WI147804-mdc-m365
2 parents fd24ba4 + 5d376f2 commit bccacfe

File tree

1,983 files changed

+19218
-14610
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,983 files changed

+19218
-14610
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,12 @@
230230
"branch": "master",
231231
"branch_mapping": {}
232232
},
233+
{
234+
"path_to_root": "function-app-arm-templates",
235+
"url": "https://github.com/Azure-Samples/function-app-arm-templates",
236+
"branch": "main",
237+
"branch_mapping": {}
238+
},
233239
{
234240
"path_to_root": "functions-azure-product",
235241
"url": "https://github.com/Azure/Azure-Functions",

.openpublishing.redirection.defender-for-iot.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/faqs-eiot.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/concept-enterprise#frequently-asked-questions",
6+
"redirect_document_id": false
7+
},
8+
39
{
410
"source_path_from_root": "/articles/defender-for-iot/organizations/best-practices/plan-network-monitoring.md",
511
"redirect_url": "/azure/defender-for-iot/organizations/best-practices/plan-prepare-deploy",

.openpublishing.redirection.json

Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -555,6 +555,11 @@
555555
"redirect_url": "/previous-versions/azure/cognitive-services/Bing-Web-Search/hit-highlighting",
556556
"redirect_document_id": false
557557
},
558+
{
559+
"source_path": "articles/cognitive-services/Bing-Web-Search/index.yml",
560+
"redirect_url": "/previous-versions/azure/cognitive-services/Bing-Web-Search/overview",
561+
"redirect_document_id": false
562+
},
558563
{
559564
"source_path": "articles/cognitive-services/Bing-Web-Search/language-support.md",
560565
"redirect_url": "/previous-versions/azure/cognitive-services/Bing-Web-Search/language-support",
@@ -778,6 +783,76 @@
778783
{
779784
"source_path": "articles/cognitive-services/bing-visual-search/quickstarts/ruby.md",
780785
"redirect_url": "/previous-versions/azure/cognitive-services/bing-visual-search/quickstarts/ruby",
786+
"redirect_document_id": false,
787+
},
788+
{
789+
"source_path": "articles/api-management/api-management-api-templates.md",
790+
"redirect_url": "/previous-versions/azure/api-management/api-management-api-templates",
791+
"redirect_document_id": false
792+
},
793+
{
794+
"source_path": "articles/api-management/api-management-application-templates.md",
795+
"redirect_url": "/previous-versions/azure/api-management/api-management-application-templates",
796+
"redirect_document_id": false
797+
},
798+
{
799+
"source_path": "articles/api-management/api-management-customize-styles.md",
800+
"redirect_url": "/previous-versions/azure/api-management/api-management-customize-styles",
801+
"redirect_document_id": false
802+
},
803+
{
804+
"source_path": "articles/api-management/api-management-developer-portal-templates-reference.md",
805+
"redirect_url": "/previous-versions/azure/api-management/api-management-developer-portal-templates-reference",
806+
"redirect_document_id": false
807+
},
808+
{
809+
"source_path": "articles/api-management/api-management-developer-portal-templates.md",
810+
"redirect_url": "/previous-versions/azure/api-management/api-management-developer-portal-templates",
811+
"redirect_document_id": false
812+
},
813+
{
814+
"source_path": "articles/api-management/api-management-issue-templates.md",
815+
"redirect_url": "/previous-versions/azure/api-management/api-management-issue-templates",
816+
"redirect_document_id": false
817+
},
818+
{
819+
"source_path": "articles/api-management/api-management-modify-content-layout.md",
820+
"redirect_url": "/previous-versions/azure/api-management/api-management-modify-content-layout",
821+
"redirect_document_id": false
822+
},
823+
{
824+
"source_path": "articles/api-management/api-management-page-controls.md",
825+
"redirect_url": "/previous-versions/azure/api-management/api-management-page-controls",
826+
"redirect_document_id": false
827+
},
828+
{
829+
"source_path": "articles/api-management/api-management-page-templates.md",
830+
"redirect_url": "/previous-versions/azure/api-management/api-management-page-templates",
831+
"redirect_document_id": false
832+
},
833+
{
834+
"source_path": "articles/api-management/api-management-product-templates.md",
835+
"redirect_url": "/previous-versions/azure/api-management/api-management-product-templates",
836+
"redirect_document_id": false
837+
},
838+
{
839+
"source_path": "articles/api-management/api-management-template-data-model-reference.md",
840+
"redirect_url": "/previous-versions/azure/api-management/api-management-template-data-model-reference",
841+
"redirect_document_id": false
842+
},
843+
{
844+
"source_path": "articles/api-management/api-management-template-resources.md",
845+
"redirect_url": "/previous-versions/azure/api-management/api-management-template-resources",
846+
"redirect_document_id": false
847+
},
848+
{
849+
"source_path": "articles/api-management/api-management-user-profile-templates.md",
850+
"redirect_url": "/previous-versions/azure/api-management/api-management-user-profile-templates",
851+
"redirect_document_id": false
852+
},
853+
{
854+
"source_path": "articles/api-management/developer-portal-deprecated-migration.md",
855+
"redirect_url": "/previous-versions/azure/api-management/developer-portal-deprecated-migration",
781856
"redirect_document_id": false
782857
},
783858
{
@@ -790,6 +865,11 @@
790865
"redirect_url": "/previous-versions/azure/active-directory/azuread-dev/active-directory-acs-migration",
791866
"redirect_document_id": false
792867
},
868+
{
869+
"source_path": "articles/azure-arc/vmware-vsphere/switch-to-new-preview-version.md",
870+
"redirect_url": "/azure/azure-arc/vmware-vsphere/switch-to-new-version-vmware",
871+
"redirect_document_id": false
872+
},
793873
{
794874
"source_path": "articles/active-directory/azuread-dev/active-directory-authentication-libraries.md",
795875
"redirect_url": "/previous-versions/azure/active-directory/azuread-dev/active-directory-authentication-libraries",

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -258,8 +258,7 @@ Repeat this step for the **ProfileEdit.xml**, and **PasswordReset.xml** user jou
258258
Save the files you changed: *TrustFrameworkBase.xml*, and *TrustFrameworkExtensions.xml*, *SignUpOrSignin.xml*, *ProfileEdit.xml*, and *PasswordReset.xml*.
259259
## Test the custom policy
260260
1. Sign in to the [Azure portal](https://portal.azure.com).
261-
1. Make sure you're using the directory that contains your Microsoft Entra tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
262-
1. On the **Portal settings | Directories + subscriptions** page, find your Microsoft Entra directory in the **Directory name** list, and then select **Switch**.
261+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
263262
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
264263
1. Select **Identity Experience Framework**.
265264
1. Select **Upload Custom Policy**, and then upload the policy files that you changed: *TrustFrameworkBase.xml*, and *TrustFrameworkExtensions.xml*, *SignUpOrSignin.xml*, *ProfileEdit.xml*, and *PasswordReset.xml*.

articles/active-directory-b2c/add-api-connector.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -574,8 +574,7 @@ To return the promo code claim back to the relying party application, add an out
574574
## Test the custom policy
575575

576576
1. Sign in to the [Azure portal](https://portal.azure.com).
577-
1. Make sure you're using the directory that contains your Microsoft Entra tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
578-
1. On the **Portal settings | Directories + subscriptions** page, find your Microsoft Entra directory in the **Directory name** list, and then select **Switch**.
577+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra ID tenant from the **Directories + subscriptions** menu.
579578
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
580579
1. Select **Identity Experience Framework**.
581580
1. Select **Upload Custom Policy**, and then upload the policy files that you changed: *TrustFrameworkExtensions.xml*, and *SignUpOrSignin.xml*.

articles/active-directory-b2c/add-password-change-policy.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -147,8 +147,7 @@ The password change flow involves the following steps:
147147
## Upload and test the policy
148148

149149
1. Sign in to the [Azure portal](https://portal.azure.com/).
150-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
151-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
150+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
152151
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
153152
1. Select **Identity Experience Framework**.
154153
1. In **Custom Policies**, select **Upload Policy**.

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -65,8 +65,7 @@ The self-service password reset experience can be configured for the Sign in (Re
6565
To set up self-service password reset for the sign-up or sign-in user flow:
6666

6767
1. Sign in to the [Azure portal](https://portal.azure.com).
68-
1. In the portal toolbar, select the **Directories + Subscriptions** icon.
69-
1. In the **Portal settings | Directories + subscriptions** pane, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
68+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
7069
1. In the Azure portal, search for and select **Azure AD B2C**.
7170
1. Select **User flows**.
7271
1. Select a sign-up or sign-in user flow (of type **Recommended**) that you want to customize.
@@ -283,8 +282,7 @@ Your application might need to detect whether the user signed in by using the Fo
283282
### Upload the custom policy
284283

285284
1. Sign in to the [Azure portal](https://portal.azure.com).
286-
1. In the portal toolbar, select the **Directories + Subscriptions** icon.
287-
1. In the **Portal settings | Directories + subscriptions** pane, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
285+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to the Azure AD B2C tenant from the **Directories + subscriptions** menu.
288286
1. In the Azure portal, search for and select **Azure AD B2C**.
289287
1. In the menu under **Policies**, select **Identity Experience Framework**.
290288
1. Select **Upload custom policy**. In the following order, upload the policy files that you changed:

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,9 +54,7 @@ When using the ROPC flow, consider the following:
5454
## Create a resource owner user flow
5555

5656
1. Sign in to the [Azure portal](https://portal.azure.com) as the **global administrator** of your Azure AD B2C tenant.
57-
2. Make sure you're using the directory that contains your Azure AD B2C tenant:
58-
1. Select the **Directories + subscriptions** icon in the portal toolbar.
59-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
57+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
6058
1. In the Azure portal, search for and select **Azure AD B2C**.
6159
1. Select **User flows**, and select **New user flow**.
6260
1. Select **Sign in using resource owner password credentials (ROPC)**.

articles/active-directory-b2c/add-sign-in-policy.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,7 @@ The sign-in policy lets users:
4343
To add sign-in policy:
4444

4545
1. Sign in to the [Azure portal](https://portal.azure.com).
46-
1. Select the **Directories + Subscriptions** icon in the portal toolbar.
47-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
46+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
4847
1. In the Azure portal, search for and select **Azure AD B2C**.
4948
1. Under **Policies**, select **User flows**, and then select **New user flow**.
5049
1. On the **Create a user flow** page, select the **Sign in** user flow.
@@ -114,8 +113,7 @@ The **SelfAsserted-LocalAccountSignin-Email** technical profile is a [self-asser
114113
## Update and test your policy
115114

116115
1. Sign in to the [Azure portal](https://portal.azure.com).
117-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
118-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
116+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
119117
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
120118
1. Select **Identity Experience Framework**.
121119
1. Select **Upload Custom Policy**, and then upload the policy file that you changed, *TrustFrameworkExtensions.xml*.

articles/active-directory-b2c/add-sign-up-and-sign-in-policy.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,7 @@ Watch this video to learn how the user sign-up and sign-in policy works.
4747
The sign-up and sign-in user flow handles both sign-up and sign-in experiences with a single configuration. Users of your application are led down the right path depending on the context.
4848

4949
1. Sign in to the [Azure portal](https://portal.azure.com).
50-
1. Select the **Directories + Subscriptions** icon in the portal toolbar.
51-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
50+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
5251
1. In the Azure portal, search for and select **Azure AD B2C**.
5352
1. Under **Policies**, select **User flows**, and then select **New user flow**.
5453

0 commit comments

Comments
 (0)