Skip to content

Commit ccbdf07

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vnet-encryption-limited-ga
2 parents 5096b38 + 8915b7f commit ccbdf07

File tree

625 files changed

+7726
-4270
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

625 files changed

+7726
-4270
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1250,6 +1250,7 @@
12501250
"articles/event-grid/.openpublishing.redirection.event-grid.json",
12511251
"articles/event-hubs/.openpublishing.redirection.event-hubs.json",
12521252
"articles/governance/policy/.openpublishing.redirection.policy.json",
1253+
"articles/governance/policy/.openpublishing.redirection.resource-graph.json",
12531254
"articles/hdinsight/.openpublishing.redirection.hdinsight.json",
12541255
"articles/hdinsight-aks/.openpublishing.redirection.hdinsight-aks.json",
12551256
"articles/healthcare-apis/.openpublishing.redirection.healthcare-apis.json",

.openpublishing.redirection.azure-monitor.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6573,7 +6573,11 @@
65736573
"source_path_from_root": "/articles/azure-monitor/logs/data-collection-rule-sample-custom-logs.md",
65746574
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-samples",
65756575
"redirect_document_id": false
6576-
}
6577-
6576+
},
6577+
{
6578+
"source_path_from_root": "/articles/azure-monitor/agents/data-collection-rule-sample-agent.md",
6579+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-samples",
6580+
"redirect_document_id": false
6581+
}
65786582
]
65796583
}

.openpublishing.redirection.sentinel.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -215,11 +215,6 @@
215215
"redirect_url": "/azure/sentinel/data-connectors/rubrik-security-cloud-data-connector-using-azure-functions",
216216
"redirect_document_id": true
217217
},
218-
{
219-
"source_path": "articles/sentinel/data-connectors/cisco-asa-ftd-via-ama.md",
220-
"redirect_url": "/azure/sentinel/data-connectors-reference",
221-
"redirect_document_id": false
222-
},
223218
{
224219
"source_path": "articles/sentinel/data-connectors/okta-single-sign-on-using-azure-function.md",
225220
"redirect_url": "/azure/sentinel/data-connectors/okta-single-sign-on-using-azure-functions",
@@ -484,6 +479,11 @@
484479
"source_path": "articles/sentinel/data-connectors/cyberpion-security-logs.md",
485480
"redirect_url": "/azure/sentinel/data-connectors-reference",
486481
"redirect_document_id": false
487-
}
482+
},
483+
{
484+
"source_path": "articles/sentinel/data-connectors/azure-active-directory-identity-protection.md",
485+
"redirect_url": "/azure/sentinel/data-connectors/microsoft-entra-id-protection",
486+
"redirect_document_id": true
487+
}
488488
]
489489
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -369,6 +369,11 @@
369369
"source_path_from_root": "/articles/virtual-desktop/publish-applications.md",
370370
"redirect_url": "/azure/virtual-desktop/publish-applications-stream-remoteapp",
371371
"redirect_document_id": false
372+
},
373+
{
374+
"source_path_from_root": "/articles/virtual-desktop/autoscale-new-existing-host-pool.md",
375+
"redirect_url": "/azure/virtual-desktop/autoscale-scaling-plan",
376+
"redirect_document_id": true
372377
}
373378
]
374379
}

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,13 @@ manager: CelesteDG
88

99
ms.service: active-directory
1010

11-
ms.custom:
1211
ms.topic: reference
13-
ms.date: 11/08/2022
12+
ms.date: 01/11/2024
1413
ms.author: kengaderdus
1514
ms.subservice: B2C
15+
16+
17+
#Customer intent: As a developer using Azure AD B2C, I want to define a Microsoft Entra ID self-service password reset technical profile.
1618
---
1719

1820
# Define a Microsoft Entra ID SSPR technical profile in an Azure AD B2C custom policy

articles/active-directory-b2c/access-tokens.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@ manager: CelesteDG
88
ms.service: active-directory
99

1010
ms.topic: conceptual
11-
ms.date: 03/09/2023
12-
ms.custom:
11+
ms.date: 01/11/2024
1312
ms.author: kengaderdus
1413
ms.subservice: B2C
14+
15+
16+
#Customer intent: As a developer integrating Azure Active Directory B2C with a web application and web API, I want to understand how to request an access token, so that I can authenticate and authorize users to access my APIs securely.
17+
1518
---
1619
# Request an access token in Azure Active Directory B2C
1720

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,15 @@ manager: CelesteDG
88

99
ms.service: active-directory
1010

11-
ms.custom:
1211
ms.topic: reference
13-
ms.date: 11/06/2023
12+
ms.date: 01/11/2024
1413
ms.author: kengaderdus
1514
ms.reviewer: yoelhor
1615
ms.subservice: B2C
16+
17+
18+
#Customer intent: As a developer using Azure Active Directory B2C, I want to define a technical profile for Microsoft Entra user management, so that I can interact with a claims provider that supports the standardized protocol and perform operations like reading, writing, and deleting user accounts.
19+
1720
---
1821

1922
# Define a Microsoft Entra technical profile in an Azure Active Directory B2C custom policy

articles/active-directory-b2c/add-native-application.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,15 @@ author: kengaderdus
66
manager: CelesteDG
77

88
ms.author: kengaderdus
9-
ms.date: 02/04/2019
9+
ms.date: 01/11/2024
1010
ms.custom: mvc
1111
ms.topic: how-to
1212
ms.service: active-directory
1313
ms.subservice: B2C
14+
15+
16+
#Customer intent: As a developer integrating Azure Active Directory B2C with a native client application, I want to register the client resources in my tenant, so that my application can communicate with Azure Active Directory B2C.
17+
1418
---
1519

1620
# Add a native client application to your Azure Active Directory B2C tenant

articles/active-directory-b2c/add-password-change-policy.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,15 @@ manager: CelesteDG
88

99
ms.service: active-directory
1010

11-
ms.custom:
1211
ms.topic: how-to
13-
ms.date: 08/24/2021
12+
ms.date: 01/11/2024
1413
ms.author: kengaderdus
1514
ms.subservice: B2C
1615
zone_pivot_groups: b2c-policy-type
16+
17+
18+
#Customer intent: As an Azure AD B2C administrator, I want to set up a password change flow using custom policies, so that users can change their passwords without email verification, improving the user experience and security.
19+
1720
---
1821

1922
# Set up password change by using custom policies in Azure Active Directory B2C

articles/active-directory-b2c/add-profile-editing-policy.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,14 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: how-to
12-
ms.date: 06/07/2021
13-
ms.custom:
12+
ms.date: 01/11/2024
1413
ms.author: kengaderdus
1514
ms.subservice: B2C
1615
zone_pivot_groups: b2c-policy-type
16+
17+
18+
#Customer intent: As a developer integrating Azure Active Directory B2C into my application, I want to set up a profile editing flow, so that users can manage their profile attributes such as display name, surname, given name, and city.
19+
1720
---
1821

1922
# Set up a profile editing flow in Azure Active Directory B2C

0 commit comments

Comments
 (0)