Skip to content

Commit c7b1358

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-vision
2 parents 8459c39 + 8f7d579 commit c7b1358

File tree

2,113 files changed

+13509
-9138
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,113 files changed

+13509
-9138
lines changed

.openpublishing.redirection.json

Lines changed: 37 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6875,9 +6875,44 @@
68756875
"redirect_document_id": false
68766876
},
68776877
{
6878-
"source_path": "articles/storage/files/storage-files-enable-soft-delete.md",
6878+
"source_path": "articles/storage/files/storage-files-enable-soft-delete.md",
68796879
"redirect_url": "/azure/storage/files/storage-files-prevent-file-share-deletion",
68806880
"redirect_document_id": false
6881-
}
6881+
},
6882+
{
6883+
"source_path": "articles/defender-for-iot/organizations/release-notes-archive.md",
6884+
"redirect_url": "/azure/defender-for-iot/organizations/release-notes-ot-monitoring-sensor-archive",
6885+
"redirect_document_id": false
6886+
},
6887+
{
6888+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-portal.md",
6889+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6890+
"redirect_document_id": false
6891+
},
6892+
{
6893+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-powershell.md",
6894+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6895+
"redirect_document_id": false
6896+
},
6897+
{
6898+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-cli.md",
6899+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6900+
"redirect_document_id": false
6901+
},
6902+
{
6903+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-template.md",
6904+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6905+
"redirect_document_id": false
6906+
},
6907+
{
6908+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-terraform.md",
6909+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6910+
"redirect_document_id": false
6911+
},
6912+
{
6913+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-bicep.md",
6914+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6915+
"redirect_document_id": false
6916+
}
68826917
]
68836918
}

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ ms.subservice: b2c
2121

2222
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2323

24+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
25+
2426
Azure Active Directory B2C (Azure AD B2C) provides support for verifying an email address for self-service password reset (SSPR). Use the Microsoft Entra ID SSPR technical profile to generate and send a code to an email address, and then verify the code. The Microsoft Entra ID SSPR technical profile may also return an error message. The validation technical profile validates the user-provided data before the user journey continues. With the validation technical profile, an error message displays on a self-asserted page.
2527

2628
This technical profile:

articles/active-directory-b2c/access-tokens.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ ms.subservice: b2c
1818
---
1919
# Request an access token in Azure Active Directory B2C
2020

21+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
22+
2123
An *access token* contains claims that you can use in Azure Active Directory B2C (Azure AD B2C) to identify the granted permissions to your APIs. To call a resource server, the HTTP request must include an access token. An access token is denoted as **access_token** in the responses from Azure AD B2C.
2224

2325
This article shows you how to request an access token for a web application and web API. For more information about tokens in Azure AD B2C, see the [overview of tokens in Azure Active Directory B2C](tokens-overview.md).

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ ms.subservice: b2c
2121

2222
# Define a Microsoft Entra technical profile in an Azure Active Directory B2C custom policy
2323

24+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
25+
2426
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2527

2628
<!-- docutune:ignored "AAD-" -->

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,9 @@ zone_pivot_groups: b2c-policy-type
1515
---
1616

1717
# Enrich tokens with claims from external sources using API connectors
18+
19+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
20+
1821
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
1922
Azure Active Directory B2C (Azure AD B2C) enables identity developers to integrate an interaction with a RESTful API into their user flow using [API connectors](api-connectors-overview.md). It enables developers to dynamically retrieve data from external identity sources. At the end of this walkthrough, you'll be able to create an Azure AD B2C user flow that interacts with APIs to enrich tokens with information from external sources.
2023
::: zone pivot="b2c-user-flow"

articles/active-directory-b2c/add-api-connector.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ zone_pivot_groups: b2c-policy-type
1818

1919
# Add an API connector to a sign-up user flow
2020

21+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
22+
2123
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2224

2325
As a developer or IT administrator, you can use API connectors to integrate your sign-up user flows with REST APIs to customize the sign-up experience and integrate with external systems. At the end of this walkthrough, you'll be able to create an Azure AD B2C user flow that interacts with [REST API services](api-connectors-overview.md) to modify your sign-up experiences.

articles/active-directory-b2c/add-captcha.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ zone_pivot_groups: b2c-policy-type
1717

1818
# Enable CAPTCHA in Azure Active Directory B2C
1919

20+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
21+
2022
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2123

2224
Azure Active Directory B2C (Azure AD B2C) allows you to enable CAPTCHA to prevent automated attacks on your consumer-facing applications. Azure AD B2C’s CAPTCHA supports both audio and visual CAPTCHA challenges. You can enable this security feature in both sign-up and sign-in flows for your local accounts. CAPTCHA isn't applicable for social identity providers' sign-in.

articles/active-directory-b2c/add-identity-provider.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to add an identity provider to your Active Directory B2C
55
author: garrodonnell
66
manager: CelesteDG
77
ms.author: godonnell
8-
ms.date: 03/22/2024
8+
ms.date: 01/05/2025
99
ms.custom: mvc
1010
ms.topic: how-to
1111
ms.service: azure-active-directory
@@ -17,6 +17,8 @@ ms.subservice: b2c
1717

1818
# Add an identity provider to your Azure Active Directory B2C tenant
1919

20+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
21+
2022
You can configure Azure AD B2C to allow users to sign in to your application with credentials from external social or enterprise identity providers (IdP). Azure AD B2C supports external identity providers like Facebook, Microsoft account, Google, X, and any identity provider that supports OAuth 1.0, OAuth 2.0, OpenID Connect, and SAML protocols.
2123

2224
With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.

articles/active-directory-b2c/add-native-application.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ ms.subservice: b2c
1919

2020
# Add a native client application to your Azure Active Directory B2C tenant
2121

22+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
23+
2224
Native client resources need to be registered in your tenant before your application can communicate with Azure Active Directory B2C.
2325

2426
[!INCLUDE [active-directory-b2c-appreg-native](../../includes/active-directory-b2c-appreg-native.md)]

articles/active-directory-b2c/add-password-change-policy.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,9 @@ zone_pivot_groups: b2c-policy-type
2020
---
2121

2222
# Set up password change by using custom policies in Azure Active Directory B2C
23-
23+
24+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
25+
2426
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2527

2628
You can configure Azure Active Directory B2C (Azure AD B2C) so that a user who is signed in with a local account can change their password without using email verification to prove their identity.

0 commit comments

Comments
 (0)