Skip to content

Commit c672b1b

Browse files
authored
Merge branch 'main' into patch-37
2 parents ce458b1 + 5ff1be9 commit c672b1b

File tree

3,702 files changed

+19480
-66311
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,702 files changed

+19480
-66311
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -620,6 +620,12 @@
620620
"branch": "main",
621621
"branch_mapping": {}
622622
},
623+
{
624+
"path_to_root": "app-service-agentic-semantic-kernel-ai-foundry-agent",
625+
"url": "https://github.com/Azure-Samples/app-service-agentic-semantic-kernel-ai-foundry-agent",
626+
"branch": "main",
627+
"branch_mapping": {}
628+
},
623629
{
624630
"path_to_root": "playwright-testing-service",
625631
"url": "https://github.com/microsoft/playwright-testing-service",

.openpublishing.redirection.json

Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,90 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/fxt-edge-filer/add-nodes.md",
5+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/add-nodes",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/fxt-edge-filer/add-storage.md",
10+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/add-storage",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/fxt-edge-filer/additional-doc.md",
15+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/additional-doc",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/fxt-edge-filer/cluster-create.md",
20+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/cluster-create",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/fxt-edge-filer/configure-network.md",
25+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/configure-network",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/fxt-edge-filer/index.yml",
30+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/index",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/fxt-edge-filer/install.md",
35+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/install",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/fxt-edge-filer/monitor.md",
40+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/monitor",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "articles/fxt-edge-filer/mount-clients.md",
45+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/mount-clients",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "articles/fxt-edge-filer/network-power.md",
50+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/network-power",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "articles/fxt-edge-filer/node-password.md",
55+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/node-password",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "articles/fxt-edge-filer/overview.md",
60+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/overview",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "articles/fxt-edge-filer/port-list.md",
65+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/port-list",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "articles/fxt-edge-filer/power-off.md",
70+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/power-off",
71+
"redirect_document_id": false
72+
},
73+
{
74+
"source_path": "articles/fxt-edge-filer/specs.md",
75+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/specs",
76+
"redirect_document_id": false
77+
},
78+
{
79+
"source_path": "articles/fxt-edge-filer/support-ticket.md",
80+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/support-ticket",
81+
"redirect_document_id": false
82+
},
83+
{
84+
"source_path": "articles/fxt-edge-filer/supported-ciphers.md",
85+
"redirect_url": "/previous-versions/azure/fxt-edge-filer/supported-ciphers",
86+
"redirect_document_id": false
87+
},
388
{
489
"source_path": "articles/backup/azure-elastic-storage-area-network-backup-manage.md",
590
"redirect_url": "/azure/backup/azure-elastic-san-backup-manage",
78.3 KB
Loading

articles/active-directory-b2c/partner-cloudflare.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: azure-active-directory
99
ms.topic: how-to
10-
ms.date: 01/26/2024
10+
ms.date: 06/30/2025
1111
ms.author: gasinh
1212
ms.subservice: b2c
1313

@@ -21,20 +21,19 @@ In this article, you can learn how to configure the [Cloudflare Web Application
2121

2222
## Prerequisites
2323

24-
To get started, you'll need:
24+
To get started, you need:
2525

26-
- An Azure subscription
27-
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
28-
- [An Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription
29-
- A [Cloudflare](https://dash.cloudflare.com/sign-up) account
26+
- An Azure subscription. If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/).
27+
- [An Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription.
28+
- A [Cloudflare](https://dash.cloudflare.com/sign-up) account.
3029

3130
## Scenario description
3231

3332
Cloudflare WAF integration includes the following components:
3433

35-
- **Azure AD B2C tenant** – The authorization server that verifies user credentials using the custom policies defined in the tenant. It's known as the identity provider
34+
- **Azure AD B2C tenant** – The authorization server that verifies user credentials using the custom policies defined in the tenant, known as the identity provider.
3635
- [**Azure Front Door**](../frontdoor/front-door-overview.md) – Enables custom domains for Azure B2C tenant. Traffic from Cloudflare WAF is routed to Azure Front Door before arriving at Azure AD B2C tenant.
37-
- **Cloudflare** – The web application firewall that manages traffic sent to the authorization server
36+
- **Cloudflare** – The web application firewall that manages traffic sent to the authorization server.
3837

3938
## Integrate with Azure AD B2C
4039

@@ -58,6 +57,9 @@ The settings appear in the following image.
5857

5958
![Screenshot of proxied status.](./media/partner-cloudflare/select-proxied.png)
6059

60+
> [!NOTE]
61+
> Azure Front Door-managed certificates aren't automatically renewed if your custom domain’s CNAME record points to a DNS record other than the Azure Front Door endpoint’s domain (for example, when using a third-party DNS service like Cloudflare). To renew the certificate in such cases, follow the instructions in the [Renew Azure Front Door-managed certificates](../frontdoor/domain.md#renew-azure-front-door-managed-certificates) article.
62+
6163
### Configure the Web Application Firewall
6264

6365
Go to your Cloudflare settings, and use the Cloudflare content to [configure the WAF](https://www.cloudflare.com/application-services/products/waf/) and learn about other security tools.

articles/active-directory-b2c/partner-nok-nok.md

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To enable passkey authentication for your users, enable Nok Nok as an identity p
4040

4141
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for passkey authentication.
4242

43-
![Diagram of Nok Nok as IdP for Azure AD B2C using OpenID Connect (OIDC) for passkey authentication.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
43+
![Diagram for passkey authentication with Nok Nok as an IdP.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
4444

4545
### Scenario 1: Passkey registration
4646
1. The user navigates to the Nok Nok tutorial web app using the link provided by Nok Nok.
@@ -52,9 +52,11 @@ The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2
5252
### Scenario 2: Passkey authentication
5353
1. The user selects the sign-in with Nok Nok Cloud button on the Azure AD B2C sign-in page.
5454
2. Azure AD B2C redirects the user to the Nok Nok sign-in app.
55-
3. The user authenticates with their passkey.
56-
4. The Nok Nok server validates the passkey assertion and sends an OIDC authentication response to Azure AD B2C.
57-
5. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
55+
3. The user requests passkey authentication
56+
4. The user authenticates with their passkey.
57+
5. The Nok Nok Cloud validates the passkey assertion
58+
6. The Nok Nok Cloud sends an OIDC authentication response to Azure AD B2C.
59+
7. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
5860

5961
## Get started with Nok Nok
6062

@@ -125,6 +127,22 @@ For the following instructions, Nok Nok is a new OIDC IdP in the B2C identity pr
125127

126128
If the flow is incomplete, confirm the user is or isn't saved in the directory.
127129

130+
## Alternate flow for Authentication
131+
132+
The following diagram illustrates an alternate passkey sign in or sign up flow using the ID Token Hint feature of Azure AD B2C. With this approach, an Azure custom policy verifies the ID Token Hint produced by the Nok Nok Cloud. For more details, please refer to the article, [Define an ID token hint technical profile in an Azure Active Directory B2C custom policy](./id-token-hint.md). Please contact Nok Nok support for help with integrated the required Azure custom policy.
133+
134+
![Diagram for passkey authentication using ID Token Hint from Nok Nok.](./media/partner-nok-nok/nok-nok-id-token-hint-architecture-diagram.png)
135+
136+
The following are the steps
137+
1. The user selects the sign-in with Nok Nok Cloud button.
138+
2. The Nok Nok Cloud request passkey authentication.
139+
3. The user authenticates with their passkey.
140+
4. The Nok Nok Cloud validates the passkey assertion.
141+
5. The ID Token Hint is returned.
142+
6. The App posts an OIDC request with the ID Token Hint to Azure AD B2C.
143+
7. Azure AD B2C Custom Policy verifies the ID Token Hint.
144+
8. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
145+
128146
## Next steps
129147

130148
* [Azure AD B2C custom policy overview](./custom-policy-overview.md)

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 04/01/2025
4+
ms.date: 07/03/2025
55
ms.service: azure-active-directory
66
ms.subservice: b2c
77
ms.topic: whats-new
@@ -18,6 +18,15 @@ manager: CelesteDG
1818

1919
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new and significantly updated docs from the past three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
2020

21+
## June 2025
22+
23+
### Updated articles
24+
25+
- [Configure Cloudflare Web Application Firewall with Azure Active Directory B2C](partner-cloudflare.md) - Added a note about Azure Front Door-managed certificates
26+
- [Azure AD B2C: Frequently asked questions (FAQ)](faq.yml) - Updated the note in the Azure AD B2C end-of-sale section
27+
- [Page layout versions](page-layout.md) - Added updates related to CAPTCHA
28+
- [Securing phone-based multifactor authentication](phone-based-mfa.md) - Added information on preventing fraudulent sign-ups
29+
2130
## April 2025
2231

2332
### Updated articles
@@ -32,12 +41,3 @@ This month, we added an important note to our articles stating that starting May
3241
### Updated articles
3342
- [Error codes: Azure Active Directory B2C](error-codes.md) - Updated error messages
3443

35-
## February 2025
36-
37-
### Updated articles
38-
39-
- [Enable multifactor authentication in Azure Active Directory B2C](multi-factor-authentication.md) - Added SMS pricing
40-
- [Page layout versions](page-layout.md) - Updated the latest versions of the self-asserted and MFA pages
41-
- [Azure AD B2C: Frequently asked questions (FAQ)](faq.yml) - Added billing name change for SMS phone
42-
- [Enable CAPTCHA in Azure Active Directory B2C](add-captcha.md) - Added CAPTCHA feature flag
43-

articles/api-center/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@
2424
href: set-up-api-center-bicep.md
2525
- name: Create an API center - ARM template
2626
href: set-up-api-center-arm-template.md
27+
- name: Create an API center - Visual Studio Code
28+
href: set-up-api-center-vs-code-extension.md
2729
- name: Tutorials
2830
items:
2931
- name: 1 - Define custom metadata

articles/api-center/build-register-apis-vscode-extension.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ author: dlepow
55
ms.service: azure-api-center
66
ms.topic: how-to
77
ms.date: 05/28/2025
8+
ms.update-cycle: 180-days
89
ms.author: danlep
910
ms.collection: ce-skilling-ai-copilot
1011
ms.custom:
@@ -55,9 +56,6 @@ Learn more about setting up a [GitHub Actions workflow](register-apis-github-act
5556

5657
Use the power of [GitHub Copilot](https://marketplace.visualstudio.com/items?itemName=GitHub.copilot) with the Azure API Center extension for Visual Studio Code to create an OpenAPI specification file from your API code. Right-click on the API code, select **Copilot** from the options, and select **Generate API documentation**. GitHub Copilot creates an OpenAPI specification file.
5758

58-
> [!NOTE]
59-
> This feature is available in the pre-release version of the API Center extension.
60-
6159
:::image type="content" source="media/build-register-apis-vscode-extension/generate-api-documentation.gif" alt-text="Animation showing how to use GitHub Copilot to generate an OpenAPI spec from code." lightbox="media/build-register-apis-vscode-extension/generate-api-documentation.gif":::
6260

6361
You can also generate an OpenAPI specification from all of the files in your current project. Use the **Azure API Center: Generate OpenAPI Spec from Entire Project** command from the Command Palette.

articles/api-center/design-api-github-copilot-azure.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ author: dlepow
55
ms.service: azure-api-center
66
ms.topic: how-to
77
ms.date: 02/10/2025
8+
ms.update-cycle: 180-days
89
ms.author: danlep
910
ms.collection: ce-skilling-ai-copilot
1011
ms.custom:
@@ -15,9 +16,6 @@ ms.custom:
1516

1617
The API Center plugin for [GitHub Copilot for Azure](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-azure-github-copilot) (preview) accelerates design and development of new APIs starting from natural language prompts. With AI assistance available through the API Center plugin combined with the API Center VS Code extension, simply describe your API and quickly generate an OpenAPI spec for API development that complies with your organization's standards. After you generate a compliant spec, you can register the API with your [API center](overview.md).
1718

18-
> [!NOTE]
19-
> This feature is available in the pre-release version of the API Center extension.
20-
2119
[!INCLUDE [vscode-extension-basic-prerequisites](includes/vscode-extension-basic-prerequisites.md)]
2220
* [GitHub Copilot for Azure](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-azure-github-copilot) - to generate OpenAPI specification files using the Azure API Center Plugin for [GitHub Copilot for Azure](/azure/developer/github-copilot-azure/introduction) (preview)
2321

articles/api-center/enable-api-center-portal-vs-code-extension.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,6 @@ This article shows how to provide enterprise developers access to the Azure API
2828
### For app developers
2929

3030
* [Azure API Center extension for Visual Studio Code](https://marketplace.visualstudio.com/items?itemName=apidev.azure-api-center)
31-
32-
> [!NOTE]
33-
> Where noted, certain features are available only in the Azure API Center extension's pre-release version. [!INCLUDE [vscode-extension-prerelease-features](includes/vscode-extension-prerelease-features.md)]
3431

3532
The following Visual Studio Code extensions are optional:
3633

@@ -95,7 +92,7 @@ The API Center portal view helps enterprise developers discover API details and
9592

9693
## Use language model tools
9794

98-
In the pre-release version of the Azure API Center extension, developers with access to the API Center portal view can add API Center language model tools to use in GitHub Copilot's agent mode. [Learn more about using tools in agent mode](https://code.visualstudio.com/docs/copilot/chat/chat-agent-mode#_agent-mode-tools).
95+
Developers with access to the API Center portal view can add API Center language model tools to use in GitHub Copilot's agent mode. [Learn more about using tools in agent mode](https://code.visualstudio.com/docs/copilot/chat/chat-agent-mode#_agent-mode-tools).
9996

10097
The API Center tools can be used in agent mode to help search for APIs and API versions, API definitions and specifications, deployments, and more using natural language prompts.
10198

0 commit comments

Comments
 (0)