Skip to content

Commit bdf9a3c

Browse files
committed
Merge branch 'main' into release-preview-apim-skuv2
2 parents 7d0241d + 877645a commit bdf9a3c

File tree

173 files changed

+1667
-1221
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

173 files changed

+1667
-1221
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2502,8 +2502,7 @@
25022502
},
25032503
{
25042504
"source_path_from_root": "/articles/azure-monitor/platform/alerts-managing-nagios-zabbix-scom.md",
2505-
"redirect_url": "/azure/azure-monitor/platform/alert-management-solution",
2506-
"redirect_document_id": ""
2505+
"redirect_url": "/azure/azure-monitor/platform/alert-management-solution"
25072506
},
25082507
{
25092508
"source_path_from_root": "/articles/log-analytics/log-analytics-solution-alert-management.md",
@@ -6334,6 +6333,11 @@
63346333
"source_path_from_root": "/articles/azure-monitor/app/opencensus-python.md",
63356334
"redirect_url": "/previous-versions/azure/azure-monitor/app/opencensus-python",
63366335
"redirect_document_id": false
6336+
},
6337+
{
6338+
"source_path_from_root": "/articles/azure-monitor/app/remove-application-insights.md",
6339+
"redirect_url": "/azure/azure-monitor/app/asp-net-core#how-can-i-uninstall-the-sdk",
6340+
"redirect_document_id": false
63376341
}
63386342
]
63396343
}

.openpublishing.redirection.security-benchmark.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -544,6 +544,6 @@
544544
"source_path_from_root": "/articles/peering-service/security-baseline.md",
545545
"redirect_url": "/security/benchmark/azure/baselines/peering-service-desktop-security-baseline",
546546
"redirect_document_id": false
547-
},
547+
}
548548
]
549549
}

.openpublishing.redirection.sql-database.json

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2002,8 +2002,7 @@
20022002
},
20032003
{
20042004
"source_path_from_root": "/articles/sql-database/sql-database-features-index.yml",
2005-
"redirect_url": "/azure/sql-database/sql-database-features",
2006-
"redirect_document_id": ""
2005+
"redirect_url": "/azure/sql-database/sql-database-features"
20072006
},
20082007
{
20092008
"source_path_from_root": "/articles/sql-database/sql-database-general-limitations.md",
@@ -2132,8 +2131,7 @@
21322131
},
21332132
{
21342133
"source_path_from_root": "/articles/sql-database/sql-database-managed-instance-index.yml",
2135-
"redirect_url": "/azure/sql-database/sql-database-managed-instance",
2136-
"redirect_document_id": ""
2134+
"redirect_url": "/azure/sql-database/sql-database-managed-instance"
21372135
},
21382136
{
21392137
"source_path_from_root": "/articles/sql-database/sql-database-managed-instance-vnet-configuration.md",
@@ -2317,8 +2315,7 @@
23172315
},
23182316
{
23192317
"source_path_from_root": "/articles/sql-database/sql-database-scalability-index.yml",
2320-
"redirect_url": "/azure/sql-database/sql-database-scale-resources",
2321-
"redirect_document_id": ""
2318+
"redirect_url": "/azure/sql-database/sql-database-scale-resources"
23222319
},
23232320
{
23242321
"source_path_from_root": "/articles/sql-database/sql-database-helps-secures-and-protects.md",
@@ -2487,8 +2484,7 @@
24872484
},
24882485
{
24892486
"source_path_from_root": "/articles/sql-database/sql-database-paas-index.yml",
2490-
"redirect_url": "/azure/sql-database/sql-database-technical-overview",
2491-
"redirect_document_id": ""
2487+
"redirect_url": "/azure/sql-database/sql-database-technical-overview"
24922488
},
24932489
{
24942490
"source_path_from_root": "/articles/sql-database/sql-database-threat-detection-get-started.md",

articles/active-directory-b2c/javascript-and-page-layout.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155,6 +155,7 @@ Follow these guidelines when you customize the interface of your application usi
155155
- Azure AD B2C settings can be read by calling `window.SETTINGS`, `window.CONTENT` objects, such as the current UI language. Don’t change the value of these objects.
156156
- To customize the Azure AD B2C error message, use localization in a policy.
157157
- If anything can be achieved by using a policy, generally it's the recommended way.
158+
- We recommend that you use our existing UI controls, such as buttons, rather than hiding them and implementing click bindings on your own UI controls. This approach ensures that your user experience continues to function properly even when we release new page contract upgrades.
158159

159160
## JavaScript samples
160161

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -279,7 +279,7 @@ For information about compliant security keys, see [FIDO2 security keys](concept
279279

280280
### What can I do if I lose my security key?
281281

282-
To delete an enrolled security key, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com), and then go to the **Security info** page.
282+
To delete an enrolled security key, sign in to the [myaccount.microsoft.com](https://myaccount.microsoft.com/), and then go to the **Security info** page.
283283

284284
<a name='what-can-i-do-if-im-unable-to-use-the-fido-security-key-immediately-after-i-create-a-hybrid-azure-ad-joined-machine'></a>
285285

articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-quickstart-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ When you enabled Permissions Management in the Microsoft Entra tenant, an enterp
120120
2. Assign the *Reader* role to the CIEM application to allow Permissions management to read the Microsoft Entra subscriptions in your environment.
121121

122122
### Prerequisites
123-
- A user with ```Microsoft.Authorization/roleAssignments/write``` permissions at the subscription or management group scope.
123+
- A user with ```Microsoft.Authorization/roleAssignments/write``` permissions at the subscription or management group scope to assign roles to the CIEM application.
124124

125125
- To use **Automatic** or **Select** data collection modes, you must assign the *Reader* role at the Management group scope.
126126

articles/active-directory/develop/quickstart-single-page-app-angular-sign-in.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: quickstart
1010

11-
ms.date: 09/25/2023
11+
ms.date: 10/06/2023
1212
ms.author: henrymbugua
1313
ms.reviewer: j-mantu
1414
ms.custom: aaddev, "scenarios:getting-started", "languages:JavaScript", devx-track-js
@@ -54,18 +54,19 @@ To obtain the sample application, you can either clone it from GitHub or downloa
5454
```console
5555
git clone https://github.com/Azure-Samples/ms-identity-docs-code-javascript.git
5656
```
57+
5758
- [Download the .zip file](https://github.com/Azure-Samples/ms-identity-docs-code-javascript/archive/refs/heads/main.zip). Extract it to a file path where the length of the name is fewer than 260 characters.
5859

5960
## Configure the project
6061

6162
1. In your IDE, open the project folder, *ms-identity-docs-code-javascript/angular-spa*, containing the sample.
62-
1. Open *src/app/app.module.ts* and replace the file contents with the following snippet:
63+
1. Open *src/app/app.module.ts* and update the following values with the information recorded earlier in the admin center.
6364

64-
:::code language="csharp" source="~/ms-identity-docs-code-javascript/angular-spa/src/app/app.module.ts":::
65+
:::code language="JavaScript" source="~/ms-identity-docs-code-javascript/angular-spa/src/app/app.module.ts":::
6566

66-
* `TenantId` - The identifier of the tenant where the application is registered. Replace the text in quotes with the **Directory (tenant) ID** that was recorded earlier from the overview page of the registered application.
67-
* `ClientId` - The identifier of the application, also referred to as the client. Replace the text in quotes with the **Directory (tenant) ID** value that was recorded earlier from the overview page of the registered application.
68-
* `RedirectUri` - The **Redirect URI** of the application. If necessary, replace the text in quotes with the redirect URI that was recorded earlier from the overview page of the registered application.
67+
* `clientId` - The identifier of the application, also referred to as the client. Replace the text in quotes with the **Application (client) ID** value that was recorded earlier.
68+
* `authority` - The identifier of the tenant where the application is registered. Replace the text in quotes with the **Directory (tenant) ID** value that was recorded earlier.
69+
* `redirectUri` - The **Redirect URI** of the application. If necessary, replace the text in quotes with the redirect URI that was recorded earlier.
6970

7071
## Run the application and sign in
7172

@@ -77,18 +78,19 @@ Run the project with a web server by using Node.js:
7778
npm install
7879
npm start
7980
```
80-
1. Copy the https URL that appears in the terminal, for example, `https://localhost:4200`, and paste it into a browser. We recommend using a private or incognito browser session.
81+
82+
1. Copy the `https` URL that appears in the terminal, for example, `https://localhost:4200`, and paste it into a browser address bar. We recommend using a private or incognito browser session.
8183
1. Follow the steps and enter the necessary details to sign in with your Microsoft account. You'll be requested an email address so a one time passcode can be sent to you. Enter the code when prompted.
82-
1. The application will request permission to maintain access to data you have given it access to, and to sign you in and read your profile. Select **Accept**.
83-
1. The following screenshot appears, indicating that you have signed in to the application and have accessed your profile details from the Microsoft Graph API.
84+
1. The application will request permission to maintain access to data you have given it access to, and to sign you in and read your profile. Select **Accept**. The following screenshot appears, indicating that you have signed in to the application and have accessed your profile details from the Microsoft Graph API.
8485

8586
:::image type="content" source="./media/quickstarts/angular-spa/quickstart-angular-spa-sign-in.png" alt-text="Screenshot of JavaScript App depicting the results of the API call.":::
8687

8788
## Sign out from the application
8889

89-
1. Find the **Sign out** link in the top right corner of the page, and select it.
90+
1. Find the **Sign out** button in the top right corner of the page, and select it.
9091
1. You'll be prompted to pick an account to sign out from. Select the account you used to sign in.
91-
1. A message appears indicating that you have signed out.
92+
93+
A message appears indicating that you have signed out. You can now close the browser window.
9294

9395
## Related content
9496

articles/active-directory/develop/quickstart-single-page-app-javascript-sign-in.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: quickstart
1111
ms.workload: identity
12-
ms.date: 09/25/2023
12+
ms.date: 10/06/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: OwenRichards1
1515
ms.custom: aaddev, "scenarios:getting-started", "languages:JavaScript", devx-track-js
@@ -60,13 +60,13 @@ To obtain the sample application, you can either clone it from GitHub or downloa
6060
## Configure the project
6161

6262
1. In your IDE, open the project folder, *ms-identity-javascript-tutorial*, containing the sample.
63-
1. Open *1-Authentication/1-sign-in/App/authConfig.js* and replace the file contents with the following snippet:
63+
1. Open *1-Authentication/1-sign-in/App/authConfig.js* and update the following values with the information recorded earlier in the admin center.
6464

65-
:::code language="csharp" source="~/ms-identity-docs-code-javascript/js-spa/App/authConfig.js":::
65+
:::code language="JavaScript" source="~/ms-identity-docs-code-javascript/js-spa/App/authConfig.js":::
6666

67-
* `TenantId` - The identifier of the tenant where the application is registered. Replace the text in quotes with the **Directory (tenant) ID** that was recorded earlier from the overview page of the registered application.
68-
* `ClientId` - The identifier of the application, also referred to as the client. Replace the text in quotes with the **Directory (tenant) ID** value that was recorded earlier from the overview page of the registered application.
69-
* `RedirectUri` - The **Redirect URI** of the application. If necessary, replace the text in quotes with the redirect URI that was recorded earlier from the overview page of the registered application.
67+
* `clientId` - The identifier of the application, also referred to as the client. Replace the text in quotes with the **Application (client) ID** value that was recorded earlier.
68+
* `authority` - The identifier of the tenant where the application is registered. Replace the text in quotes with the **Directory (tenant) ID** value that was recorded earlier.
69+
* `redirectUri` - The **Redirect URI** of the application. If necessary, replace the text in quotes with the redirect URI that was recorded earlier.
7070

7171
## Run the application and sign in
7272

@@ -78,18 +78,19 @@ Run the project with a web server by using Node.js:
7878
npm install
7979
npm start
8080
```
81+
8182
1. Copy the `https` URL that appears in the terminal, for example, `https://localhost:3000`, and paste it into a browser. We recommend using a private or incognito browser session.
8283
1. Follow the steps and enter the necessary details to sign in with your Microsoft account. You'll be requested an email address so a one time passcode can be sent to you. Enter the code when prompted.
83-
1. The application will request permission to maintain access to data you have given it access to, and to sign you in and read your profile. Select **Accept**.
84-
1. The following screenshot appears, indicating that you have signed in to the application and have accessed your profile details from the Microsoft Graph API.
84+
1. The application will request permission to maintain access to data you have given it access to, and to sign you in and read your profile. Select **Accept**. The following screenshot appears, indicating that you have signed in to the application and have accessed your profile details from the Microsoft Graph API.
8585

8686
:::image type="content" source="./media/quickstarts/js-spa/quickstart-js-spa-sign-in.png" alt-text="Screenshot of JavaScript App depicting the results of the API call.":::
8787

8888
## Sign out from the application
8989

90-
1. Find the **Sign out** link in the top right corner of the page, and select it.
90+
1. Find the **Sign out** button in the top right corner of the page, and select it.
9191
1. You'll be prompted to pick an account to sign out from. Select the account you used to sign in.
92-
1. A message appears indicating that you have signed out.
92+
93+
A message appears indicating that you have signed out. You can now close the browser window.
9394

9495
## Related content
9596

articles/active-directory/develop/quickstart-single-page-app-react-sign-in.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: quickstart
1111
ms.workload: identity
12-
ms.date: 09/25/2023
12+
ms.date: 10/06/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: j-mantu
1515
ms.custom: aaddev, "scenarios:getting-started", "languages:JavaScript", devx-track-js
@@ -60,13 +60,13 @@ To obtain the sample application, you can either clone it from GitHub or downloa
6060
## Configure the project
6161

6262
1. In your IDE, open the project folder, *ms-identity-docs-code-javascript/react-spa*, containing the sample.
63-
1. Open *src/authConfig.js* and replace the file contents with the following snippet:
63+
1. Open *src/authConfig.js* and update the following values with the information recorded earlier in the admin center.
6464

65-
:::code language="csharp" source="~/ms-identity-docs-code-javascript/react-spa/src/authConfig.js":::
65+
:::code language="JavaScript" source="~/ms-identity-docs-code-javascript/react-spa/src/authConfig.js":::
6666

67-
* `TenantId` - The identifier of the tenant where the application is registered. Replace the text in quotes with the **Directory (tenant) ID** that was recorded earlier from the overview page of the registered application.
68-
* `ClientId` - The identifier of the application, also referred to as the client. Replace the text in quotes with the **Directory (tenant) ID** value that was recorded earlier from the overview page of the registered application.
69-
* `RedirectUri` - The **Redirect URI** of the application. If necessary, replace the text in quotes with the redirect URI that was recorded earlier from the overview page of the registered application.
67+
* `clientId` - The identifier of the application, also referred to as the client. Replace the text in quotes with the **Application (client) ID** value that was recorded earlier.
68+
* `authority` - The identifier of the tenant where the application is registered. Replace the text in quotes with the **Directory (tenant) ID** value that was recorded earlier.
69+
* `redirectUri` - The **Redirect URI** of the application. If necessary, replace the text in quotes with the redirect URI that was recorded earlier.
7070

7171
## Run the application and sign in
7272

@@ -78,18 +78,18 @@ Run the project with a web server by using Node.js:
7878
npm install
7979
npm start
8080
```
81-
1. Copy the https URL that appears in the terminal, for example, `https://localhost:3000`, and paste it into a browser. We recommend using a private or incognito browser session.
81+
1. Copy the `https` URL that appears in the terminal, for example, `https://localhost:3000`, and paste it into a browser. We recommend using a private or incognito browser session.
8282
1. Follow the steps and enter the necessary details to sign in with your Microsoft account. You'll be requested an email address so a one time passcode can be sent to you. Enter the code when prompted.
83-
1. The application will request permission to maintain access to data you have given it access to, and to sign you in and read your profile. Select **Accept**.
84-
1. The following screenshot appears, indicating that you have signed in to the application and have accessed your profile details from the Microsoft Graph API.
83+
1. The application will request permission to maintain access to data you have given it access to, and to sign you in and read your profile. Select **Accept**. The following screenshot appears, indicating that you have signed in to the application and have accessed your profile details from the Microsoft Graph API.
8584

8685
:::image type="content" source="./media/single-page-app-tutorial-04-call-api/display-api-call-results.png" alt-text="Screenshot of React App depicting the results of the API call.":::
8786

8887
## Sign out from the application
8988

90-
1. Find the **Sign out** link in the top right corner of the page, and select it.
89+
1. Find the **Sign out** button in the top right corner of the page, and select it.
9190
1. You'll be prompted to pick an account to sign out from. Select the account you used to sign in.
92-
1. A message appears indicating that you have signed out.
91+
92+
A message appears indicating that you have signed out. You can now close the browser window.
9393

9494
## Related content
9595

articles/active-directory/enterprise-users/clean-up-unmanaged-accounts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection: M365-identity-device-management
1616

1717
# Clean up unmanaged Microsoft Entra accounts
1818

19-
Prior to August 2022, Microsoft Entra B2B (Microsoft Entra B2B) supported self-service sign-up for email-verified users. With this feature, users create Microsoft Entra accounts, when they verify email ownership. These accounts were created in unmanaged (or viral) tenants: users created accounts with an organization domain, not under IT team management. Access persists after users leave the organization.
19+
Prior to August 2022, Microsoft Entra B2B supported self-service sign-up for email-verified users. With this feature, users create Microsoft Entra accounts, when they verify email ownership. These accounts were created in unmanaged (or viral) tenants: users created accounts with an organization domain, not under IT team management. Access persists after users leave the organization.
2020

2121
To learn more, see, [What is self-service sign-up for Microsoft Entra ID?](./directory-self-service-signup.md)
2222

0 commit comments

Comments
 (0)