Skip to content

Commit ccf8148

Browse files
committed
fix vault link
2 parents 7ff68c9 + 4bf8178 commit ccf8148

File tree

1,562 files changed

+24117
-8820
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,562 files changed

+24117
-8820
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -884,6 +884,7 @@
884884
"articles/azure-video-analyzer/.openpublishing.redirection.azure-video-analyzer.json",
885885
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
886886
"articles/virtual-machine-scale-sets/.openpublishing.redirection.virtual-machine-scale-sets.json",
887-
"articles/mysql/.openpublishing.redirection.mysql.json"
887+
"articles/mysql/.openpublishing.redirection.mysql.json",
888+
"articles/container-apps/.openpublishing.redirection.container-apps.json"
888889
]
889890
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,11 @@
1919
"source_path_from_root": "/articles/azure-monitor/insights/service-bus-insights.md",
2020
"redirect_url": "/azure/service-bus-messaging/service-bus-insights",
2121
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/azure-monitor/agents/data-collection-rule-overview.md",
25+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-overview",
26+
"redirect_document_id": false
2227
}
2328
]
2429
}

.openpublishing.redirection.json

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -19830,9 +19830,9 @@
1983019830
"redirect_document_id": false
1983119831
},
1983219832
{
19833-
"source_path_from_root": "/articles/machine-learning/service/how-to-deploy-app-service.md",
19834-
"redirect_url": "/azure/machine-learning/how-to-deploy-app-service",
19835-
"redirect_document_id": true
19833+
"source_path_from_root": "/articles/machine-learning/how-to-deploy-app-service.md",
19834+
"redirect_url": "/azure/machine-learning/how-to-deploy-managed-online-endpoints",
19835+
"redirect_document_id": false
1983619836
},
1983719837
{
1983819838
"source_path_from_root": "/articles/machine-learning/service/how-to-deploy-azure-container-instance.md",
@@ -19859,6 +19859,11 @@
1985919859
"redirect_url": "/azure/machine-learning/how-to-deploy-and-where",
1986019860
"redirect_document_id": false
1986119861
},
19862+
{
19863+
"source_path_from_root": "/articles/machine-learning/how-to-homomorphic-encryption-seal.md",
19864+
"redirect_url": "/azure/machine-learning/",
19865+
"redirect_document_id": false
19866+
},
1986219867
{
1986319868
"source_path_from_root": "/articles/machine-learning/service/concept-accelerate-with-fpgas.md",
1986419869
"redirect_url": "/azure/machine-learning/how-to-deploy-fpga-web-service",
@@ -19870,9 +19875,14 @@
1987019875
"redirect_document_id": true
1987119876
},
1987219877
{
19873-
"source_path_from_root": "/articles/machine-learning/service/how-to-deploy-functions.md",
19874-
"redirect_url": "/azure/machine-learning/how-to-deploy-functions",
19875-
"redirect_document_id": true
19878+
"source_path_from_root": "/articles/machine-learning/how-to-deploy-functions.md",
19879+
"redirect_url": "/azure/machine-learning/how-to-deploy-managed-online-endpoints",
19880+
"redirect_document_id": false
19881+
},
19882+
{
19883+
"source_path_from_root": "/articles/machine-learning/how-to-deploy-no-code-deployment.md",
19884+
"redirect_url": "/azure/machine-learning/how-to-deploy-mlflow-models-online-endpoints",
19885+
"redirect_document_id": false
1987619886
},
1987719887
{
1987819888
"source_path_from_root": "/articles/machine-learning/service/concept-accelerate-inferencing-with-gpus.md",
@@ -39484,11 +39494,6 @@
3948439494
"redirect_url": "/azure/azure-monitor/agents/data-sources-windows-events",
3948539495
"redirect_document_id": false
3948639496
},
39487-
{
39488-
"source_path_from_root": "/articles/azure-monitor/platform/data-collection-rule-overview.md",
39489-
"redirect_url": "/azure/azure-monitor/agents/data-collection-rule-overview",
39490-
"redirect_document_id": false
39491-
},
3949239497
{
3949339498
"source_path_from_root": "/articles/azure-monitor/platform/data-sources.md",
3949439499
"redirect_url": "/azure/azure-monitor/agents/data-sources",

.openpublishing.redirection.media-services.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -629,6 +629,11 @@
629629
"source_path_from_root": "/articles/media-services/latest/asset-create-asset-upload-portal-quickstart.md",
630630
"redirect_url": "/azure/media-services/latest/video-on-demand-simple-portal-quickstart",
631631
"redirect_document_id": true
632+
},
633+
{
634+
"source_path_from_root": "/articles/media-services/latest/architecture-design-multi-drm-system.md",
635+
"redirect_url": "/azure/media-services/latest/drm-content-protection-concept",
636+
"redirect_document_id": true
632637
},
633638
{
634639
"source_path_from_root": "/articles/media-services/latest/latest/questions-collection.md",

CONTRIBUTING.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Thank you for taking the time to contribute to the Microsoft Azure documentation.
44

5-
This guide covers some general topics related to contribution and refers to the [contributors guide](/contribute) for more detailed explanations when required.
5+
This guide covers some general topics related to contribution and refers to the [contributors guide](https://docs.microsoft.com/contribute) for more detailed explanations when required.
66

77
## Code of Conduct
88

@@ -25,4 +25,4 @@ Follow the guidance for [Quick edits to existing documents](/contribute/#quick-e
2525

2626
### Pull Request
2727

28-
Review the guidance for [Pull Requests](/contribute/how-to-write-workflows-major#pull-request-processing) in our contributors guide.
28+
Review the guidance for [Pull Requests](/contribute/how-to-write-workflows-major#pull-request-processing) in our contributors guide.

articles/active-directory-b2c/azure-monitor.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.topic: how-to
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
14-
ms.date: 02/09/2022
14+
ms.date: 02/23/2022
1515
---
1616

1717
# Monitor Azure AD B2C with Azure Monitor
@@ -147,7 +147,9 @@ After you've deployed the template and waited a few minutes for the resource pro
147147
1. Sign in to the [Azure portal](https://portal.azure.com) with your **Azure AD B2C** administrative account. This account must be a member of the security group you specified in the [Delegate resource management](#3-delegate-resource-management) step.
148148
1. Select the **Directories + subscriptions** icon in the portal toolbar.
149149
1. On the **Portal settings | Directories + subscriptions** page, in the **Directory name** list, find your Azure AD directory that contains the Azure subscription and the _azure-ad-b2c-monitor_ resource group you created, and then select **Switch**.
150-
1. Verify that you've selected the correct directory and subscription.
150+
1. Verify that you've selected the correct directory and your Azure subscription is listed and selected in the **Default subscription filter**.
151+
152+
![Screenshot of the default subscription filter](./media/azure-monitor/default-subscription-filter.png)
151153

152154
## 5. Configure diagnostic settings
153155

@@ -178,6 +180,10 @@ To configure monitoring settings for Azure AD B2C activity logs:
178180
1. Check the box for each destination to send the logs. Select **Configure** to specify their settings **as described in the following table**.
179181
1. Select **Send to Log Analytics**, and then select the **Name of workspace** you created earlier (`AzureAdB2C`).
180182
1. Select **AuditLogs** and **SignInLogs**.
183+
184+
> [!NOTE]
185+
> Only the **AuditLogs** and **SignInLogs** diagnostic settings are currently supported for Azure AD B2C tenants.
186+
181187
1. Select **Save**.
182188

183189
> [!NOTE]

articles/active-directory-b2c/customize-ui-with-html.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/14/2021
12+
ms.date: 02/23/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -55,13 +55,15 @@ Instead of creating your custom page content from scratch, you can customize Azu
5555

5656
The following table lists the default page content provided by Azure AD B2C. Download the files and use them as a starting point for creating your own custom pages.
5757

58-
| Default page | Description | Content definition ID<br/>(custom policy only) |
58+
| Page | Description | Templates |
5959
|:-----------------------|:--------|-------------|
60-
| [exception.html](https://login.microsoftonline.com/static/tenant/default/exception.cshtml) | **Error page**. This page is displayed when an exception or an error is encountered. | *api.error* |
61-
| [selfasserted.html](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Self-Asserted page**. Use this file as a custom page content for a social account sign-up page, a local account sign-up page, a local account sign-in page, password reset, and more. The form can contain various input controls, such as: a text input box, a password entry box, a radio button, single-select drop-down boxes, and multi-select check boxes. | *api.localaccountsignin*, *api.localaccountsignup*, *api.localaccountpasswordreset*, *api.selfasserted* |
62-
| [multifactor-1.0.0.html](https://login.microsoftonline.com/static/tenant/default/multifactor-1.0.0.cshtml) | **Multi-factor authentication page**. On this page, users can verify their phone numbers (by using text or voice) during sign-up or sign-in. | *api.phonefactor* |
63-
| [updateprofile.html](https://login.microsoftonline.com/static/tenant/default/updateProfile.cshtml) | **Profile update page**. This page contains a form that users can access to update their profile. This page is similar to the social account sign-up page, except for the password entry fields. | *api.selfasserted.profileupdate* |
64-
| [unified.html](https://login.microsoftonline.com/static/tenant/default/unified.cshtml) | **Unified sign-up or sign-in page**. This page handles the user sign-up and sign-in process. Users can use enterprise identity providers, social identity providers such as Facebook or Google+, or local accounts. | *api.signuporsignin* |
60+
| Unified sign-up or sign-in | This page handles the user sign-up and sign-in process. Users can use enterprise identity providers, social identity providers such as Facebook, Microsoft account, or local accounts. | [Classic](https://login.microsoftonline.com/static/tenant/default/unified.cshtml), [Ocean Blue](https://login.microsoftonline.com/static/tenant/templates/AzureBlue/unified.cshtml), and [Slate Gray](https://login.microsoftonline.com/static/tenant/templates/MSA/unified.cshtml). |
61+
| Sign-in (only)| The sign-in page is also known as the *Identity provider selection*. It handles the user sign-in with local account, or federated identity providers. Use this page to allow sign-in without the ability to sign-up. For example before user can edit their profile. | [Classic](https://login.microsoftonline.com/static/tenant/default/idpSelector.cshtml), [Ocean Blue](https://login.microsoftonline.com/static/tenant/templates/AzureBlue/idpSelector.cshtml), and [Slate Gray](https://login.microsoftonline.com/static/tenant/templates/MSA/idpSelector.cshtml).
62+
| Self-Asserted | Most interactions in Azure AD B2C where the user is expected to provide input are self-asserted. For example, a sign-up page, sign-in page, or password reset page. Use this template as a custom page content for a social account sign-up page, a local account sign-up page, a local account sign-in page, password reset, edit profile, block page and more. The self-asserted page can contain various input controls, such as: a text input box, a password entry box, a radio button, single-select drop-down boxes, and multi-select check boxes. | [Classic](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml), [Ocean Blue](https://login.microsoftonline.com/static/tenant/templates/AzureBlue/selfAsserted.cshtml), and [Slate Gray](https://login.microsoftonline.com/static/tenant/templates/MSA/selfAsserted.cshtml). |
63+
| Multi-factor authentication | On this page, users can verify their phone numbers (by using text or voice) during sign-up or sign-in. | [Classic](https://login.microsoftonline.com/static/tenant/default/multifactor-1.0.0.cshtml), [Ocean Blue](https://login.microsoftonline.com/static/tenant/templates/AzureBlue/multifactor-1.0.0.cshtml), and [Slate Gray](https://login.microsoftonline.com/static/tenant/templates/MSA/multifactor-1.0.0.cshtml). |
64+
| Error | This page is displayed when an exception or an error is encountered. | [Classic](https://login.microsoftonline.com/static/tenant/default/exception.cshtml), [Ocean Blue](https://login.microsoftonline.com/static/tenant/templates/AzureBlue/exception.cshtml), and [Slate Gray](https://login.microsoftonline.com/static/tenant/templates/MSA/exception.cshtml). |
65+
66+
6567

6668
## Hosting the page content
6769

@@ -89,7 +91,7 @@ When using your own HTML and CSS files to customize the UI, host your UI content
8991

9092
You localize your HTML content by enabling [language customization](language-customization.md) in your Azure AD B2C tenant. Enabling this feature allows Azure AD B2C to set the HTML page language attribute and pass the OpenID Connect parameter `ui_locales` to your endpoint.
9193

92-
#### Single-template approach
94+
### Single-template approach
9395

9496
During page load, Azure AD B2C sets the HTML page language attribute with the current language. For example, `<html lang="en">`. To render different styles per the current language, use the CSS `:lang` selector along with your CSS definition.
9597

@@ -223,6 +225,7 @@ To host your HTML content in Blob storage, perform the following steps:
223225
1. **Redundancy** can remain **Geo-redundant storage (GRS)**
224226
1. Select **Review + create** and wait a few seconds for Azure AD to run a validation.
225227
1. Select **Create** to create the storage account. After the deployment is completed, the storage account page opens automatically or select **Go to resource**.
228+
226229
#### 2.1 Create a container
227230

228231
To create a public container in Blob storage, perform the following steps:
@@ -445,4 +448,4 @@ To use [company branding](customize-ui.md#configure-company-branding) assets in
445448

446449
## Next steps
447450

448-
Learn how to enable [client-side JavaScript code](javascript-and-page-layout.md).
451+
Learn how to enable [client-side JavaScript code](javascript-and-page-layout.md).
35.5 KB
Loading

articles/active-directory-b2c/partner-dynamics-365-fraud-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ In the provided [custom policies](https://github.com/azure-ad-b2c/partner-integr
168168

169169
For additional information, review the following articles:
170170

171-
- [Microsoft DFP samples](https://github.com/Microsoft/Dynamics-365-Fraud-Protection-Samples)
171+
- [Microsoft DFP samples](https://github.com/azure-ad-b2c/partner-integrations/tree/master/samples/Dynamics-Fraud-Protection)
172172

173173
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
174174

articles/active-directory-b2c/partner-f5.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -379,7 +379,7 @@ The next attempt at connecting to the application should take you straight to th
379379

380380
Failure to access the protected application could be down to any number of potential factors, including a misconfiguration.
381381

382-
- BIG-IP logs are a great source of information for isolating all authentication and SSO issues. If troubleshooting you should increase the log verbosity level.
382+
BIG-IP logs are a great source of information for isolating all authentication and SSO issues. If troubleshooting you should increase the log verbosity level.
383383

384384
1. Go to **Access Policy** > **Overview** > **Event Logs** > **Settings**.
385385

@@ -424,6 +424,6 @@ Exact root cause is still being investigated by F5 engineering, but issue appear
424424

425425
You should now see the Key (JWT) field populated with the key ID (KID) of the token signing certificate provided through the OpenID URI metadata.
426426

427-
5. Finally, select the yellow **Apply Access Policy** option in the top left-hand corner, located next to the F5 logo. Apply those settings and select **Apply** again to refresh the access profile list.
427+
5. Finally, select the yellow **Apply Access Policy** option in the top left-hand corner, located next to the F5 logo. Then select **Apply** again to refresh the access profile list.
428428

429429
See F5’s guidance for more [OAuth client and resource server troubleshooting tips](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-sso-13-0-0/37.html#GUID-774384BC-CF63-469D-A589-1595D0DDFBA2)

0 commit comments

Comments
 (0)