Skip to content

Commit cc3a6d5

Browse files
authored
Merge pull request #100887 from bandersmsft/release-mvc-cost-mgt-billing
cost mgt billing - Dirty PR for release branch merge conflict with upstream master
2 parents c7dfc6c + aa62592 commit cc3a6d5

File tree

1,260 files changed

+13866
-6368
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,260 files changed

+13866
-6368
lines changed

.openpublishing.redirection.json

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48577,6 +48577,61 @@
4857748577
"redirect_url": "/azure/architecture/cloud-adoption-guide/subscription-governance",
4857848578
"redirect_document_id": true
4857948579
},
48580+
{
48581+
"source_path": "articles/azure-supportability/index.yml",
48582+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request",
48583+
"redirect_document_id": false
48584+
},
48585+
{
48586+
"source_path": "articles/azure-supportability/classic-deployment-model-quota-increase-requests.md",
48587+
"redirect_url": "/azure/azure-portal/supportability/classic-deployment-model-quota-increase-requests",
48588+
"redirect_document_id": true
48589+
},
48590+
{
48591+
"source_path": "articles/azure-supportability/create-manage-support-requests-using-access-control.md",
48592+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request#role-based-access-control",
48593+
"redirect_document_id": true
48594+
},
48595+
{
48596+
"source_path": "articles/azure-supportability/how-to-create-azure-support-request.md",
48597+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request",
48598+
"redirect_document_id": true
48599+
},
48600+
{
48601+
"source_path": "articles/azure-supportability/how-to-use-file-uploader.md",
48602+
"redirect_url": "/azure/azure-portal/supportability/how-to-use-file-uploader",
48603+
"redirect_document_id": true
48604+
},
48605+
{
48606+
"source_path": "articles/azure-supportability/low-priority-quota.md",
48607+
"redirect_url": "/azure/azure-portal/supportability/low-priority-quota",
48608+
"redirect_document_id": true
48609+
},
48610+
{
48611+
"source_path": "articles/azure-supportability/networking-quota-requests.md",
48612+
"redirect_url": "/azure/azure-portal/supportability/networking-quota-requests",
48613+
"redirect_document_id": true
48614+
},
48615+
{
48616+
"source_path": "articles/azure-supportability/per-vm-quota-requests.md",
48617+
"redirect_url": "/azure/azure-portal/supportability/per-vm-quota-requests",
48618+
"redirect_document_id": true
48619+
},
48620+
{
48621+
"source_path": "articles/azure-supportability/regional-quota-requests.md",
48622+
"redirect_url": "/azure/azure-portal/supportability/regional-quota-requests",
48623+
"redirect_document_id": true
48624+
},
48625+
{
48626+
"source_path": "articles/azure-supportability/resource-manager-core-quotas-request.md",
48627+
"redirect_url": "/azure/azure-portal/supportability/resource-manager-core-quotas-request",
48628+
"redirect_document_id": true
48629+
},
48630+
{
48631+
"source_path": "articles/azure-supportability/sku-series-unavailable.md",
48632+
"redirect_url": "/azure/azure-portal/supportability/sku-series-unavailable",
48633+
"redirect_document_id": true
48634+
},
4858048635
{
4858148636
"source_path": "articles/azure-toolkit-for-eclipse-debugging-azure-applications.md",
4858248637
"redirect_url": "/java/azure/eclipse/azure-toolkit-for-eclipse",
@@ -69252,6 +69307,16 @@
6925269307
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-java",
6925369308
"redirect_document_id": false
6925469309
},
69310+
{
69311+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-nodejs-v10.md",
69312+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs-legacy",
69313+
"redirect_document_id": false
69314+
},
69315+
{
69316+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-v10.md",
69317+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-legacy",
69318+
"redirect_document_id": false
69319+
},
6925569320
{
6925669321
"source_path": "articles/storage/blobs/storage-nodejs-how-to-use-blob-storage.md",
6925769322
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs",

CODEOWNERS

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,17 @@
11
# Testing the new code owners feature in GitHub. Please contact Cory Fowler if you have questions.
2-
# articles/storage/ @tamram @robinsh
3-
# articles/virtual-machines/ @iainfoulds @cynthn
4-
# articles/virtual-machines/linux/ @iainfoulds @cynthn
5-
# articles/virtual-machines/windows/ @iainfoulds @cynthn
6-
# articles/application-insights/ @SergeyKanzhelev
7-
# articles/cosmos-db/ @mimig1
8-
9-
# All Articles
10-
articles/ @apex-docs-pr-reviewers
11-
122
# Cognitive Services
133
articles/cognitive-services/ @diberry @erhopf, @nitinme
144

155
# DevOps
16-
176
articles/ansible/ @TomArcherMsft
187
articles/chef/ @TomArcherMsft
198
articles/jenkins/ @TomArcherMsft
209
articles/terraform/ @TomArcherMsft
2110

2211
# Governance
23-
2412
articles/governance/ @DCtheGeek
13+
14+
# Configuration
15+
*.json @SyntaxC4 @snoviking @arob98
16+
.acrolinx-config.edn @MonicaRush @arob98
17+
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking @arob98

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-basic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -298,7 +298,7 @@ After your RESTful service is protected by the client ID (username) and secret,
298298

299299
## Step 5: Upload the policy to your tenant
300300

301-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then open **Azure AD B2C**.
301+
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then open **Azure AD B2C**.
302302
303303
2. Select **Identity Experience Framework**.
304304

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-cert.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ To support client certificate authentication in your custom policy, change the t
9696

9797
## Step 4: Upload the policy to your tenant
9898

99-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then select **Azure AD B2C**.
99+
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then select **Azure AD B2C**.
100100

101101
2. Select **Identity Experience Framework**.
102102

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -333,7 +333,7 @@ After you add the new claim, the relying party code looks like this:
333333

334334
## Step 7: Upload the policy to your tenant
335335

336-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then open **Azure AD B2C**.
336+
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then open **Azure AD B2C**.
337337
338338
1. Select **Identity Experience Framework**.
339339

articles/active-directory-b2c/active-directory-b2c-how-to-enable-billing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ The management of Azure AD B2C using role-based access control is not affected b
130130

131131
Azure AD B2C tenants can be moved to another subscription if the source and destination subscriptions exist within the same Azure Active Directory tenant.
132132

133-
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/resource-group-move-resources.md).
133+
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
134134

135135
Before you initiate the move, be sure to read the entire article to fully understand the limitations and requirements for such a move. In addition to instructions for moving resources, it includes critical information like a pre-move checklist and how to validate the move operation.
136136

articles/active-directory-b2c/active-directory-b2c-ui-customization-custom-dynamic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -213,7 +213,7 @@ To configure `ContentDefinition`, do the following:
213213
![Example XML snippet with LoadUri element highlighted](media/active-directory-b2c-ui-customization-custom-dynamic/aadb2c-ief-ui-customization-content-definition.png)
214214

215215
## Step 6: Upload the policy to your tenant
216-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then select **Azure AD B2C**.
216+
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then select **Azure AD B2C**.
217217
218218
2. Select **Identity Experience Framework**.
219219

articles/active-directory-b2c/cookie-definitions.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ The following table lists the cookies used in Azure Active Directory B2C.
1919

2020
| Name | Domain | Expiration | Purpose |
2121
| ----------- | ------ | -------------------------- | --------- |
22-
| x-ms-cpim-admin | main.b2cadmin.ext.azure.com | End of [browser session](active-directory-b2c-token-session-sso.md) | Holds user membership data across tenants. The tenants a user is a member of and level of membership (Admin or User). |
23-
| x-ms-cpim-slice | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used to route requests to the appropriate production instance. |
24-
| x-ms-cpim-trans | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used for tracking the transactions (number of authentication requests to Azure AD B2C) and the current transaction. |
25-
| x-ms-cpim-sso:{Id} | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used for maintaining the SSO session. |
26-
| x-ms-cpim-cache:{id}_n | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md), successful authentication | Used for maintaining the request state. |
27-
| x-ms-cpim-csrf | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Cross-Site Request Forgery token used for CRSF protection. |
28-
| x-ms-cpim-dc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used for Azure AD B2C network routing. |
29-
| x-ms-cpim-ctx | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Context |
30-
| x-ms-cpim-rp | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used for storing membership data for the resource provider tenant. |
31-
| x-ms-cpim-rc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md) | Used for storing the relay cookie. |
22+
| x-ms-cpim-admin | main.b2cadmin.ext.azure.com | End of [browser session](session-behavior.md) | Holds user membership data across tenants. The tenants a user is a member of and level of membership (Admin or User). |
23+
| x-ms-cpim-slice | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used to route requests to the appropriate production instance. |
24+
| x-ms-cpim-trans | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used for tracking the transactions (number of authentication requests to Azure AD B2C) and the current transaction. |
25+
| x-ms-cpim-sso:{Id} | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used for maintaining the SSO session. |
26+
| x-ms-cpim-cache:{id}_n | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md), successful authentication | Used for maintaining the request state. |
27+
| x-ms-cpim-csrf | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Cross-Site Request Forgery token used for CRSF protection. |
28+
| x-ms-cpim-dc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used for Azure AD B2C network routing. |
29+
| x-ms-cpim-ctx | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Context |
30+
| x-ms-cpim-rp | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used for storing membership data for the resource provider tenant. |
31+
| x-ms-cpim-rc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md) | Used for storing the relay cookie. |
3232

articles/active-directory-b2c/relyingparty.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,7 @@ The **OutputClaim** element contains the following attributes:
204204
### SubjectNamingInfo
205205

206206
With the **SubjectNameingInfo** element, you control the value of the token subject:
207-
- **JWT token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](active-directory-b2c-token-session-sso.md).
207+
- **JWT token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](session-behavior.md).
208208
- **SAML token** - the `<Subject><NameID>` element which identifies the subject element.
209209

210210
The **SubjectNamingInfo** element contains the following attribute:

articles/active-directory-domain-services/join-windows-vm-template.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -139,6 +139,6 @@ In this article, you used the Azure portal to configure and deploy resources usi
139139
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
140140
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
141141
[create-azure-ad-ds-instance]: tutorial-create-instance.md
142-
[template-overview]: ../azure-resource-manager/template-deployment-overview.md
143-
[deploy-powershell]: ../azure-resource-manager/resource-group-template-deploy.md
144-
[deploy-cli]: ../azure-resource-manager/resource-group-template-deploy-cli.md
142+
[template-overview]: ../azure-resource-manager/templates/overview.md
143+
[deploy-powershell]: ../azure-resource-manager/templates/deploy-powershell.md
144+
[deploy-cli]: ../azure-resource-manager/templates/deploy-cli.md

0 commit comments

Comments
 (0)