Skip to content

Commit d0ca5bd

Browse files
author
RoseHJM
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into mdb-mhn-additions
2 parents 55b8222 + 9f61d7e commit d0ca5bd

File tree

1,955 files changed

+26668
-13561
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,955 files changed

+26668
-13561
lines changed

.github/policies/disallow-edits.yml

Lines changed: 124 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,124 @@
1+
name: GitOps.PullRequestIssueManagement
2+
description: GitOps.PullRequestIssueManagement primitive
3+
resource: repository
4+
5+
configuration:
6+
resourceManagementConfiguration:
7+
eventResponderTasks:
8+
- description: Close PRs that contain content for services that have been migrated out of the azure-docs-pr repository.
9+
if:
10+
- payloadType: Pull_Request
11+
- isAction:
12+
action: Opened
13+
- or:
14+
- filesMatchPattern:
15+
matchAny: true
16+
pattern: articles/aks/*
17+
- filesMatchPattern:
18+
matchAny: true
19+
pattern: articles/defender-for-cloud/*
20+
- filesMatchPattern:
21+
matchAny: true
22+
pattern: articles/attestation/*
23+
- filesMatchPattern:
24+
matchAny: true
25+
pattern: articles/confidential-ledger/*
26+
- filesMatchPattern:
27+
matchAny: true
28+
pattern: articles/dedicated-hsm/*
29+
- filesMatchPattern:
30+
matchAny: true
31+
pattern: articles/key-vault/*
32+
- filesMatchPattern:
33+
matchAny: true
34+
pattern: articles/payment-hsm/*
35+
- filesMatchPattern:
36+
matchAny: true
37+
pattern: articles/postgresql/*
38+
- filesMatchPattern:
39+
matchAny: true
40+
pattern: articles/cosmos-db/*
41+
- filesMatchPattern:
42+
matchAny: true
43+
pattern: articles/dms/*
44+
- filesMatchPattern:
45+
matchAny: true
46+
pattern: articles/mariadb/*
47+
- filesMatchPattern:
48+
matchAny: true
49+
pattern: articles/mysql/*
50+
- filesMatchPattern:
51+
matchAny: true
52+
pattern: articles/managed-instance-apache-cassandra/*
53+
- filesMatchPattern:
54+
matchAny: true
55+
pattern: articles/virtual-machines/*
56+
- filesMatchPattern:
57+
matchAny: true
58+
pattern: articles/virtual-machines-scale-sets/*
59+
- filesMatchPattern:
60+
matchAny: true
61+
pattern: articles/container-instances/*
62+
- filesMatchPattern:
63+
matchAny: true
64+
pattern: articles/service-fabric/*
65+
- filesMatchPattern:
66+
matchAny: true
67+
pattern: articles/machine-learning/*
68+
- filesMatchPattern:
69+
matchAny: true
70+
pattern: articles/ai-studio/*
71+
- filesMatchPattern:
72+
matchAny: true
73+
pattern: articles/ai-services/*
74+
- filesMatchPattern:
75+
matchAny: true
76+
pattern: articles/genomics/*
77+
- filesMatchPattern:
78+
matchAny: true
79+
pattern: articles/open-datasets/*
80+
- filesMatchPattern:
81+
matchAny: true
82+
pattern: articles/search/*
83+
- filesMatchPattern:
84+
matchAny: true
85+
pattern: articles/azure-monitor/*
86+
- filesMatchPattern:
87+
matchAny: true
88+
pattern: articles/advisor/*
89+
- filesMatchPattern:
90+
matchAny: true
91+
pattern: articles/chaos-studio/*
92+
- filesMatchPattern:
93+
matchAny: true
94+
pattern: articles/service-health/*
95+
- filesMatchPattern:
96+
matchAny: true
97+
pattern: articles/azure-arc/*
98+
- filesMatchPattern:
99+
matchAny: true
100+
pattern: articles/azure-linux/*
101+
- filesMatchPattern:
102+
matchAny: true
103+
pattern: articles/azure-portal/*
104+
- filesMatchPattern:
105+
matchAny: true
106+
pattern: articles/copilot/*
107+
- filesMatchPattern:
108+
matchAny: true
109+
pattern: articles/lighthouse/*
110+
- filesMatchPattern:
111+
matchAny: true
112+
pattern: articles/quotas/*
113+
- filesMatchPattern:
114+
matchAny: true
115+
pattern: articles/container-registry/*
116+
- filesMatchPattern:
117+
matchAny: true
118+
pattern: articles/kubernetes-fleet/*
119+
then:
120+
- addReply:
121+
reply: >-
122+
@${issueAuthor} - You tried to add content to a folder path that has been removed from this repository. Your pull request will be automatically closed. Submit your changes to the updated repository, which can be identified by clicking the Edit this Document link at the top of any published article for that product or service.
123+
- closePullRequest
124+

.openpublishing.publish.config.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -254,12 +254,6 @@
254254
"branch": "main",
255255
"branch_mapping": {}
256256
},
257-
{
258-
"path_to_root": "azure-reference-other-repo",
259-
"url": "https://github.com/MicrosoftDocs/azure-reference-other-pr",
260-
"branch": "main",
261-
"branch_mapping": {}
262-
},
263257
{
264258
"path_to_root": "azure-sdk-for-go-samples",
265259
"url": "https://github.com/Azure-Samples/azure-sdk-for-go-samples",

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/confidential-computing/virtual-machine-solutions.md",
5+
"redirect_url": "/azure/virtual-machines/",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/defender-for-iot/organizations/eiot-sensor.md",
10+
"redirect_url": "/previous-versions/azure/defender-for-iot/organizations/eiot-sensor",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "articles/application-gateway/powershell-samples.md",
515
"redirect_url": "/previous-versions/azure/application-gateway/powershell-samples",
@@ -4773,4 +4783,4 @@
47734783
"redirect_document_id": false
47744784
}
47754785
]
4776-
}
4786+
}

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ description: Custom policy reference for Microsoft Entra ID SSPR technical profi
66
author: kengaderdus
77
manager: CelesteDG
88

9-
ms.service: active-directory
9+
ms.service: azure-active-directory
1010

1111
ms.topic: reference
1212
ms.date: 01/11/2024
1313
ms.author: kengaderdus
14-
ms.subservice: B2C
14+
ms.subservice: b2c
1515

1616

1717
#Customer intent: As a developer using Azure AD B2C, I want to define a Microsoft Entra ID self-service password reset technical profile.

articles/active-directory-b2c/access-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,12 @@ description: Learn how to request an access token from Azure Active Directory B2
55
author: kengaderdus
66
manager: CelesteDG
77

8-
ms.service: active-directory
8+
ms.service: azure-active-directory
99

1010
ms.topic: concept-article
1111
ms.date: 01/11/2024
1212
ms.author: kengaderdus
13-
ms.subservice: B2C
13+
ms.subservice: b2c
1414

1515

1616
#Customer intent: As a developer integrating Azure Active Directory B2C with a web application and web API, I want to understand how to request an access token, so that I can authenticate and authorize users to access my APIs securely.

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@ description: Define a Microsoft Entra technical profile in a custom policy in Az
66
author: kengaderdus
77
manager: CelesteDG
88

9-
ms.service: active-directory
9+
ms.service: azure-active-directory
1010

1111
ms.topic: reference
1212
ms.date: 01/11/2024
1313
ms.author: kengaderdus
1414
ms.reviewer: yoelhor
15-
ms.subservice: B2C
15+
ms.subservice: b2c
1616

1717

1818
#Customer intent: As a developer using Azure Active Directory B2C, I want to define a technical profile for Microsoft Entra user management, so that I can interact with a claims provider that supports the standardized protocol and perform operations like reading, writing, and deleting user accounts.

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ title: Token enrichment - Azure Active Directory B2C
33
description: Enrich tokens with claims from external identity data sources using APIs or outbound webhooks.
44
author: garrodonnell
55
manager: CelesteDG
6-
ms.service: active-directory
6+
ms.service: azure-active-directory
77
ms.topic: how-to
88
ms.date: 01/17/2023
99
ms.author: godonnell
10-
ms.subservice: B2C
10+
ms.subservice: b2c
1111
zone_pivot_groups: b2c-policy-type
1212

1313
# Customer intent: I want to enrich tokens with claims from external identity data sources using APIs or outbound webhooks.

articles/active-directory-b2c/add-api-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Add API connectors to sign up user flows
33
description: Configure an API connector to be used in a sign-up user flow.
44

5-
ms.service: active-directory
6-
ms.subservice: B2C
5+
ms.service: azure-active-directory
6+
ms.subservice: b2c
77
ms.topic: how-to
88
ms.date: 01/24/2024
99
author: garrodonnell

articles/active-directory-b2c/add-captcha.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ title: Enable CAPTCHA in Azure Active Directory B2C
33
description: How to enable CAPTCHA for user flows and custom policies in Azure Active Directory B2C.
44
author: kengaderdus
55
manager: mwongerapk
6-
ms.service: active-directory
6+
ms.service: azure-active-directory
77
ms.topic: how-to
88
ms.date: 05/03/2024
99
ms.custom: project-no-code
1010
ms.author: kengaderdus
11-
ms.subservice: B2C
11+
ms.subservice: b2c
1212
zone_pivot_groups: b2c-policy-type
1313

1414
#Customer intent: As a developer, I want to enable CAPTCHA in consumer-facing application that is secured by Azure Active Directory B2C, so that I can protect my sign-in and sign-up flows from automated attacks.

articles/active-directory-b2c/add-identity-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@ ms.author: godonnell
88
ms.date: 03/22/2024
99
ms.custom: mvc
1010
ms.topic: how-to
11-
ms.service: active-directory
12-
ms.subservice: B2C
11+
ms.service: azure-active-directory
12+
ms.subservice: b2c
1313

1414
#Customer Intent: As a developer integrating Azure AD B2C into my application, I want to add an identity provider, so that users can sign in with their existing social or enterprise accounts without creating a new account.
1515

0 commit comments

Comments
 (0)