Skip to content

Commit ca46092

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/azure-docs-pr into iot8
2 parents 63d01d6 + 03f65a1 commit ca46092

File tree

479 files changed

+15173
-9714
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

479 files changed

+15173
-9714
lines changed

.openpublishing.redirection.json

Lines changed: 31 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/defender-for-iot/organizations/appliance-catalog/virtual-management-hyper-v.md",
5+
"redirect_url": "/previous-versions/azure/defender-for-iot/organizations/appliance-catalog/virtual-management-hyper-v",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/defender-for-iot/organizations/appliance-catalog/virtual-management-vmware.md",
10+
"redirect_url": "/previous-versions/azure/defender-for-iot/organizations/appliance-catalog/virtual-management-vmware",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "articles/defender-for-iot/organizations/api/management-alert-apis.md",
515
"redirect_url": "/previous-versions/azure/defender-for-iot/organizations/api/management-alert-apis",
@@ -105,84 +115,89 @@
105115
"redirect_url": "/azure/migrate/discover-and-assess-using-private-endpoints",
106116
"redirect_document_id": false
107117
},
118+
{
119+
"source_path": "articles/operator-5g-core/index.yml",
120+
"redirect_url": "https://learn.microsoft.com",
121+
"redirect_document_id": false
122+
},
108123
{
109124
"source_path": "articles/operator-5g-core/concept-centralized-lifecycle-management.md",
110-
"redirect_url": "/previous-versions/azure/operator-5g-core/concept-centralized-lifecycle-management",
125+
"redirect_url": "https://learn.microsoft.com",
111126
"redirect_document_id": false
112127
},
113128
{
114129
"source_path": "articles/operator-5g-core/concept-deployment-order.md",
115-
"redirect_url": "/previous-versions/azure/operator-5g-core/concept-deployment-order",
130+
"redirect_url": "https://learn.microsoft.com",
116131
"redirect_document_id": false
117132
},
118133
{
119134
"source_path": "articles/operator-5g-core/concept-observability-analytics.md",
120-
"redirect_url": "/previous-versions/azure/operator-5g-core/concept-observability-analytics",
135+
"redirect_url": "https://learn.microsoft.com",
121136
"redirect_document_id": false
122137
},
123138
{
124139
"source_path": "articles/operator-5g-core/concept-security.md",
125-
"redirect_url": "/previous-versions/azure/operator-5g-core/concept-security",
140+
"redirect_url": "https://learn.microsoft.com",
126141
"redirect_document_id": false
127142
},
128143
{
129144
"source_path": "articles/operator-5g-core/how-to-configure-network-function.md",
130-
"redirect_url": "/previous-versions/azure/operator-5g-core/how-to-configure-network-function",
145+
"redirect_url": "https://learn.microsoft.com",
131146
"redirect_document_id": false
132147
},
133148
{
134149
"source_path": "articles/operator-5g-core/how-to-delete-network-function-cluster.md",
135-
"redirect_url": "/previous-versions/azure/operator-5g-core/how-to-delete-network-function-cluster",
150+
"redirect_url": "https://learn.microsoft.com",
136151
"redirect_document_id": false
137152
},
138153
{
139154
"source_path": "articles/operator-5g-core/how-to-deploy-network-functions.md",
140-
"redirect_url": "/previous-versions/azure/operator-5g-core/how-to-deploy-network-functions",
155+
"redirect_url": "https://learn.microsoft.com",
141156
"redirect_document_id": false
142157
},
143158
{
144159
"source_path": "articles/operator-5g-core/how-to-deploy-observability.md",
145-
"redirect_url": "/previous-versions/azure/operator-5g-core/how-to-deploy-observability",
160+
"redirect_url": "https://learn.microsoft.com",
146161
"redirect_document_id": false
147162
},
148163
{
149164
"source_path": "articles/operator-5g-core/overview-product.md",
150-
"redirect_url": "/previous-versions/azure/operator-5g-core/overview-product",
165+
"redirect_url": "https://learn.microsoft.com",
151166
"redirect_document_id": false
152167
},
153168
{
154169
"source_path": "articles/operator-5g-core/quickstart-complete-prerequisites-deploy-azure-kubernetes-service.md",
155-
"redirect_url": "/previous-versions/azure/operator-5g-core/quickstart-complete-prerequisites-deploy-azure-kubernetes-service",
170+
"redirect_url": "https://learn.microsoft.com",
156171
"redirect_document_id": false
157172
},
158173
{
159174
"source_path": "articles/operator-5g-core/quickstart-complete-prerequisites-deploy-nexus-azure-kubernetes-service.md",
160-
"redirect_url": "/previous-versions/azure/operator-5g-core/quickstart-complete-prerequisites-deploy-nexus-azure-kubernetes-service",
175+
"redirect_url": "https://learn.microsoft.com",
161176
"redirect_document_id": false
162177
},
163178
{
164179
"source_path": "articles/operator-5g-core/quickstart-configure-extension-for-status-monitoring.md",
165-
"redirect_url": "/previous-versions/azure/operator-5g-core/quickstart-configure-extension-for-status-monitoring",
180+
"redirect_url": "https://learn.microsoft.com",
166181
"redirect_document_id": false
167182
},
168183
{
169184
"source_path": "articles/operator-5g-core/quickstart-deploy-5g-core.md",
170-
"redirect_url": "/previous-versions/azure/operator-5g-core/quickstart-deploy-5g-core",
185+
"redirect_url": "https://learn.microsoft.com",
171186
"redirect_document_id": false
172187
},
173188
{
174189
"source_path": "articles/operator-5g-core/quickstart-monitor-deployment-status.md",
175-
"redirect_url": "/previous-versions/azure/operator-5g-core/quickstart-monitor-deployment-status",
190+
"redirect_url": "https://learn.microsoft.com",
176191
"redirect_document_id": false
177192
},
178193
{
179194
"source_path": "articles/operator-5g-core/quickstart-subscription.md",
180-
"redirect_url": "/previous-versions/azure/operator-5g-core/quickstart-subscription",
195+
"redirect_url": "https://learn.microsoft.com",
181196
"redirect_document_id": false
182197
},
183198
{
184199
"source_path": "articles/operator-5g-core/tutorial-configure-network-function.md",
185-
"redirect_url": "/previous-versions/azure/operator-5g-core/tutorial-configure-network-function",
200+
"redirect_url": "https://learn.microsoft.com",
186201
"redirect_document_id": false
187202
},
188203
{

articles/active-directory-b2c/api-connectors-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,7 @@ If you reference a REST API technical profile directly from a user journey, the
244244

245245
## Development of your REST API
246246

247-
Your REST API can be developed on any platform and written in any programing language, as long as it's secure and can send and receive claims in JSON format.
247+
Your REST API can be developed on any platform and written in any programming language, as long as it's secure and can send and receive claims in JSON format.
248248

249249
The request to your REST API service comes from Azure AD B2C servers. The REST API service must be published to a publicly accessible HTTPS endpoint. The REST API call arrives from an Azure data center IP address.
250250

articles/active-directory-b2c/claimsschema.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -325,7 +325,7 @@ The **DateTimeDropdown** user input type is used to provide a set of drop-downs
325325

326326
The **RadioSingleSelect** user input type is used to provide a collection of radio buttons that allows the user to select one option.
327327

328-
![Using claim type with radiodsingleselect](./media/claimsschema/radiosingleselect.png)
328+
![Using claim type with radiosingleselect](./media/claimsschema/radiosingleselect.png)
329329

330330
```xml
331331
<ClaimType Id="color">

articles/active-directory-b2c/configure-authentication-sample-angular-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ Your final configuration file should look like the following JSON:
190190
```json
191191
{
192192
"credentials": {
193-
"tenantName": "<your-tenant-namee>",
193+
"tenantName": "<your-tenant-name>",
194194
"clientID": "<your-webapi-application-ID>",
195195
"issuer": "https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/"
196196
},

articles/active-directory-b2c/custom-policy-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ In the [Azure AD B2C samples GitHub repository](https://github.com/azure-ad-b2c/
4141

4242
### Claims
4343

44-
A claim provides temporary storage of data during an Azure AD B2C policy execution. Claims are more like variable in a programing language. It can store information about the user, such as first name, last name, or any other claim obtained from the user or other systems (claims exchanges). The [claims schema](claimsschema.md) is the place where you declare your claims.
44+
A claim provides temporary storage of data during an Azure AD B2C policy execution. Claims are more like variable in a programming language. It can store information about the user, such as first name, last name, or any other claim obtained from the user or other systems (claims exchanges). The [claims schema](claimsschema.md) is the place where you declare your claims.
4545

4646
When the policy runs, Azure AD B2C sends and receives claims to and from internal and external parties and then sends a subset of these claims to your relying party application as part of the token. Claims are used in these ways:
4747

articles/active-directory-b2c/custom-policy-reference-sso.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ To use a session provider in your technical profile:
7171

7272
```xml
7373
<TechnicalProfile Id="SM-AAD">
74-
<DisplayName>Session Mananagement Provider</DisplayName>
74+
<DisplayName>Session Management Provider</DisplayName>
7575
<Protocol Name="Proprietary" Handler="Web.TPEngine.SSO.DefaultSSOSessionProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
7676
<PersistedClaims>
7777
<PersistedClaim ClaimTypeReferenceId="objectId" />

articles/active-directory-b2c/json-transformations.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Create a JSON single element array from a claim value. Check out the [Live demo]
3636
The following example creates a JSON single array.
3737

3838
```xml
39-
<ClaimsTransformation Id="createlJsonPayload" TransformationMethod="CreateJsonArray">
39+
<ClaimsTransformation Id="CreateJsonPayload" TransformationMethod="CreateJsonArray">
4040
<InputClaims>
4141
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="inputClaim" />
4242
</InputClaims>
@@ -315,7 +315,7 @@ In the following example, the claims transformation extracted the `emailAddress`
315315
The GetClaimFromJson claims transformation gets a single element from a JSON data. In the preceding example, the emailAddress. To get the displayName, create another claims transformation. For example:
316316

317317
```xml
318-
<ClaimsTransformation Id="GetDispalyNameClaimFromJson" TransformationMethod="GetClaimFromJson">
318+
<ClaimsTransformation Id="GetDisplayNameClaimFromJson" TransformationMethod="GetClaimFromJson">
319319
<InputClaims>
320320
<InputClaim ClaimTypeReferenceId="customUserData" TransformationClaimType="inputJson" />
321321
</InputClaims>
@@ -593,7 +593,7 @@ In the following example, the claims transformation extracts the first element (
593593

594594
- Output claims:
595595
- **key**: givenName
596-
- **value**: Emilty
596+
- **value**: Emily
597597

598598

599599
## GetSingleValueFromJsonArray
@@ -637,7 +637,7 @@ Convert XML data to JSON format. Check out the [Live demo](https://github.com/az
637637
```xml
638638
<ClaimsTransformation Id="ConvertXmlToJson" TransformationMethod="XmlStringToJsonString">
639639
<InputClaims>
640-
<InputClaim ClaimTypeReferenceId="intpuXML" TransformationClaimType="xml" />
640+
<InputClaim ClaimTypeReferenceId="inputXML" TransformationClaimType="xml" />
641641
</InputClaims>
642642
<OutputClaims>
643643
<OutputClaim ClaimTypeReferenceId="outputJson" TransformationClaimType="json" />

articles/active-directory-b2c/jwt-issuer-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The following example shows a technical profile for `JwtIssuer`:
5050

5151
## Input, output, and persist claims
5252

53-
The **InputClaims**, **OutputClaims**, and **PersistClaims** elements are empty or absent. The **InutputClaimsTransformations** and **OutputClaimsTransformations** elements are also absent.
53+
The **InputClaims**, **OutputClaims**, and **PersistClaims** elements are empty or absent. The **InputClaimsTransformations** and **OutputClaimsTransformations** elements are also absent.
5454

5555
## Metadata
5656

articles/active-directory-b2c/localization.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ The ElementType reference to a claim type, a claim transformation, or a user int
161161
| Identity provider name |`ClaimsProvider`| | The ID of the ClaimsExchange element|
162162
| Claim type attributes|`ClaimType`|Name of the claim type| The attribute of the claim to be localized. Possible values: `AdminHelpText`, `DisplayName`, `PatternHelpText`, and `UserHelpText`.|
163163
|Error message|`ErrorMessage`||The ID of the error message |
164-
|Copies localized strings into claims|`GetLocalizedStringsTra nsformationClaimType`||The name of the output claim|
164+
|Copies localized strings into claims|`GetLocalizedStringsTransformationClaimType`||The name of the output claim|
165165
|Predicate user message|`Predicate`|The name of the predicate| The attribute of the predicate to be localized. Possible values: `HelpText`.|
166166
|Predicate group user message|`PredicateValidation`|The ID of the PredicateValidation element.|The ID of the PredicateGroup element. The predicate group must be a child of the predicate validation element as defined in the ElementId.|
167167
|User interface elements |`UxElement` | | The ID of the user interface element to be localized.|
@@ -246,7 +246,7 @@ The FormatLocalizedStringTransformationClaimType value is used to format claims
246246
<InputClaim ClaimTypeReferenceId="email" />
247247
</InputClaims>
248248
<InputParameters>
249-
<InputParameter Id="stringFormatId" DataType="string" Value="ResponseMessge_EmailExists" />
249+
<InputParameter Id="stringFormatId" DataType="string" Value="ResponseMessage_EmailExists" />
250250
</InputParameters>
251251
<OutputClaims>
252252
<OutputClaim ClaimTypeReferenceId="responseMsg" TransformationClaimType="outputClaim" />
@@ -257,7 +257,7 @@ The FormatLocalizedStringTransformationClaimType value is used to format claims
257257
The following example shows how to localize string format of the FormatLocalizedStringTransformationClaimType claims transformation.
258258

259259
```xml
260-
<LocalizedString ElementType="FormatLocalizedStringTransformationClaimType" StringId="ResponseMessge_EmailExists">The email '{0}' is already an account in this organization. Click Next to sign in with that account.</LocalizedString>
260+
<LocalizedString ElementType="FormatLocalizedStringTransformationClaimType" StringId="ResponseMessage_EmailExists">The email '{0}' is already an account in this organization. Click Next to sign in with that account.</LocalizedString>
261261
```
262262

263263
### GetLocalizedStringsTransformationClaimType

articles/active-directory-b2c/partner-cloudflare.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Tutorial to configure Azure Active Directory B2C with Cloudflare Web Application Firewall
2+
title: Configure Azure Active Directory B2C with Cloudflare Web Application Firewall
33
titleSuffix: Azure AD B2C
4-
description: Tutorial to configure Azure Active Directory B2C with Cloudflare Web application firewall and protect applications from malicious attacks
4+
description: Configure Azure Active Directory B2C with Cloudflare Web application firewall and protect applications from malicious attacks
55
author: gargi-sinha
66
manager: martinco
77
ms.reviewer: kengaderdus
@@ -13,9 +13,9 @@ ms.subservice: b2c
1313

1414
# Customer intent: I'm a developer configuring Azure AD B2C with Cloudflare WAF. I need to enable and configure the Web Application Firewall, so I can protect my application from malicious attacks such as SQL Injection and cross-site scripting (XSS).
1515
---
16-
# Tutorial: Configure Cloudflare Web Application Firewall with Azure Active Directory B2C
16+
# Configure Cloudflare Web Application Firewall with Azure Active Directory B2C
1717

18-
In this tutorial, you can learn how to configure the [Cloudflare Web Application Firewall (WAF)](https://www.cloudflare.com/application-services/products/waf/) solution for Azure Active Directory B2C (Azure AD B2C) tenant with custom domain. Use Cloudflare WAF to help protect organizations from malicious attacks that can exploit vulnerabilities such as SQL Injection, and cross-site scripting (XSS).
18+
In this article, you can learn how to configure the [Cloudflare Web Application Firewall (WAF)](https://www.cloudflare.com/application-services/products/waf/) solution for Azure Active Directory B2C (Azure AD B2C) tenant with custom domain. Use Cloudflare WAF to help protect organizations from malicious attacks that can exploit vulnerabilities such as SQL Injection, and cross-site scripting (XSS).
1919

2020
## Prerequisites
2121

0 commit comments

Comments
 (0)