Skip to content

Commit dd4effb

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into sql-deprecation
2 parents acf08f5 + e262890 commit dd4effb

File tree

423 files changed

+4363
-3145
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

423 files changed

+4363
-3145
lines changed

.openpublishing.redirection.healthcare-apis.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -625,6 +625,14 @@
625625
"redirect_url": "/azure/healthcare-apis/iot/git-projects",
626626
"redirect_document_id": false
627627
},
628+
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-use-calculated-functions-mappings.md",
629+
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-calculatedcontenttemplate-mappings",
630+
"redirect_document_id": false
631+
},
632+
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-use-iot-jsonpath-content-mappings.md",
633+
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-iotjsonpathcontenttemplate-mappings",
634+
"redirect_document_id": false
635+
},
628636
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
629637
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
630638
"redirect_document_id": false

.openpublishing.redirection.json

Lines changed: 76 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18328,6 +18328,11 @@
1832818328
"redirect_url": "/azure/sentinel/enable-monitoring",
1832918329
"redirect_document_id": false
1833018330
},
18331+
{
18332+
"source_path_from_root": "/articles/sentinel/dns-normalization-schema.md",
18333+
"redirect_url": "/azure/sentinel/normalization-schema-dns",
18334+
"redirect_document_id": true
18335+
},
1833118336
{
1833218337
"source_path_from_root": "/articles/service-bus/index.md",
1833318338
"redirect_url": "/azure/service-bus-messaging/index",
@@ -27747,7 +27752,77 @@
2774727752
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-high-availability-multi-sid.md",
2774827753
"redirect_url": "/azure/virtual-machines/workloads/sap/sap-ascs-ha-multi-sid-wsfc-shared-disk",
2774927754
"redirect_document_id": false
27750-
},
27755+
},
27756+
{
27757+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_sapase.md",
27758+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sapase",
27759+
"redirect_document_id": false
27760+
},
27761+
{
27762+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_general.md",
27763+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-general",
27764+
"redirect_document_id": false
27765+
},
27766+
{
27767+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_ibm.md",
27768+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-ibm",
27769+
"redirect_document_id": false
27770+
},
27771+
{
27772+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_maxdb.md",
27773+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-maxdb",
27774+
"redirect_document_id": false
27775+
},
27776+
{
27777+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_oracle.md",
27778+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-oracle",
27779+
"redirect_document_id": false
27780+
},
27781+
{
27782+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_sqlserver.md",
27783+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sqlserver",
27784+
"redirect_document_id": false
27785+
},
27786+
{
27787+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-supported-product-on-azure.md",
27788+
"redirect_url": "/azure/virtual-machines/workloads/sap/supported-product-on-azure",
27789+
"redirect_document_id": false
27790+
},
27791+
{
27792+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-rise-integration.md",
27793+
"redirect_url": "/azure/virtual-machines/workloads/sap/rise-integration",
27794+
"redirect_document_id": false
27795+
},
27796+
{
27797+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-proximity-placement-scenarios.md",
27798+
"redirect_url": "/azure/virtual-machines/workloads/sap/proximity-placement-scenarios",
27799+
"redirect_document_id": false
27800+
},
27801+
{
27802+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-planning-supported-configurations.md",
27803+
"redirect_url": "/azure/virtual-machines/workloads/sap/planning-supported-configurations",
27804+
"redirect_document_id": false
27805+
},
27806+
{
27807+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-iq-deployment-guide.md",
27808+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sapiq",
27809+
"redirect_document_id": false
27810+
},
27811+
{
27812+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-certifications.md",
27813+
"redirect_url": "/azure/virtual-machines/workloads/sap/certifications",
27814+
"redirect_document_id": false
27815+
},
27816+
{
27817+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-ha-availability-zones.md",
27818+
"redirect_url": "/azure/virtual-machines/workloads/sap/high-availability-zones",
27819+
"redirect_document_id": false
27820+
},
27821+
{
27822+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-deployment-checklist.md",
27823+
"redirect_url": "/azure/virtual-machines/workloads/sap/deployment-checklist",
27824+
"redirect_document_id": false
27825+
},
2775127826
{
2775227827
"source_path_from_root": "/articles/migrate/how-to-scale-assessment.md",
2775327828
"redirect_url": "scale-hyper-v-assessment",

articles/active-directory-b2c/add-api-connector.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory-b2c
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: how-to
8-
ms.date: 11/09/2021
8+
ms.date: 12/20/2022
99

1010
ms.author: kengaderdus
1111
author: kengaderdus
@@ -16,6 +16,8 @@ zone_pivot_groups: b2c-policy-type
1616

1717
# Add an API connector to a sign-up user flow
1818

19+
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
20+
1921
As a developer or IT administrator, you can use API connectors to integrate your sign-up user flows with REST APIs to customize the sign-up experience and integrate with external systems. At the end of this walkthrough, you'll be able to create an Azure AD B2C user flow that interacts with [REST API services](api-connectors-overview.md) to modify your sign-up experiences.
2022

2123
::: zone pivot="b2c-user-flow"

articles/active-directory-b2c/configure-user-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/22/2021
12+
ms.date: 12/28/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C

articles/active-directory-b2c/identity-provider-generic-openid-connect.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,17 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/15/2021
12+
ms.date: 12/28/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
1616
---
1717

1818
# Set up sign-up and sign-in with generic OpenID Connect using Azure Active Directory B2C
1919

20+
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
21+
22+
2023
[OpenID Connect](openid-connect.md) is an authentication protocol built on top of OAuth 2.0 that can be used for secure user sign-in. Most identity providers that use this protocol are supported in Azure AD B2C.
2124

2225
This article explains how you can add custom OpenID Connect identity providers into your user flows.

articles/active-directory-b2c/language-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 09/16/2021
11+
ms.date: 12/28/2022
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C

articles/active-directory-b2c/user-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 10/22/2021
11+
ms.date: 12/28/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: b2c-support

articles/active-directory/app-provisioning/use-scim-to-build-users-and-groups-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Go to the [reference code](https://github.com/AzureAD/SCIMReferenceCode) from Gi
7575
7676
1. If not installed, add [Azure App Service for Visual Studio Code](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-azureappservice) extension.
7777
78-
1. To deploy the Microsoft.SCIM.WebHostSample app to Azure App Services, [create a new App Services](../../app-service/tutorial-dotnetcore-sqldb-app.md#2---create-the-app-service).
78+
1. To deploy the Microsoft.SCIM.WebHostSample app to Azure App Services, [create a new App Services](../../app-service/quickstart-dotnetcore.md?tabs=net60&pivots=development-environment-vscode#publish-your-web-app).
7979
8080
1. In the Visual Studio Code terminal, run the .NET CLI command below. This command generates a deployable publish folder for the app in the bin/debug/publish directory.
8181

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 3 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/29/2022
9+
ms.date: 12/13/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -24,7 +24,7 @@ Cloud-based Azure AD multifactor authentication and MFA Server process and store
2424

2525
The Azure AD multifactor authentication service has datacenters in the United States, Europe, and Asia Pacific. The following activities originate from the regional datacenters except where noted:
2626

27-
* Multifactor authentication phone calls originate from datacenters in the customer's region and are routed by global providers. Phone calls using custom greetings always originate from data centers in the United States.
27+
* Multifactor authentication SMS and phone calls originate from datacenters in the customer's region and are routed by global providers. Phone calls using custom greetings always originate from data centers in the United States.
2828
* General purpose user authentication requests from other regions are currently processed based on the user's location.
2929
* Push notifications that use the Microsoft Authenticator app are currently processed in regional datacenters based on the user's location. Vendor-specific device services, such as Apple Push Notification Service or Google Firebase Cloud Messaging, might be outside the user's location.
3030

@@ -102,22 +102,12 @@ Standard voice calls may failover to a different region.
102102
>[!NOTE]
103103
>The multifactor authentication activity reports contain personal data such as User Principal Name (UPN) and complete phone number.
104104
105-
### NPS extension and AD FS adapter
106-
107-
| Authentication method | Customer region | Activity report location | Service log location |
108-
|-----------------------------------------------------------------------------------|--------------------------------------|--------------------------|----------------------|
109-
| OATH software and hardware tokens | Australia and New Zealand | Australia/New Zealand | Cloud in-region |
110-
| OATH software and hardware tokens | Outside of Australia and New Zealand | United States | Cloud in-region |
111-
| Voice calls without custom greetings and all other authentication methods except OATH software and hardware tokens | Any | United States | Cloud in-region |
112-
| Voice calls with custom greetings | Any | United States | MFA backend in United States |
113-
114105
### MFA server and cloud-based MFA
115106

116107
| Component | Authentication method | Customer region | Activity report location | Service log location |
117108
|------------|------------------------------------------------|--------------------------------------|---------------------------------|------------------------------|
118109
| MFA server | All methods | Any | United States | MFA backend in United States |
119-
| Cloud MFA | Standard voice calls and all other methods | Any | Azure AD Sign-in logs in region | Cloud in-region |
120-
| Cloud MFA | Voice calls with custom greetings | Any | Azure AD Sign-in logs in region | MFA backend in United States |
110+
| Cloud MFA | All methods | Any | Azure AD Sign-in logs in region | Cloud in-region |
121111

122112
## Multifactor authentication activity reports for sovereign clouds
123113

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: how-to
10-
ms.date: 12/06/2022
10+
ms.date: 12/28/2022
1111

1212

1313
ms.author: justinha
@@ -32,17 +32,14 @@ People who enabled phone sign-in from Microsoft Authenticator see a message that
3232
1. Choose **Approve**.
3333
1. Provide their PIN or biometric.
3434

35-
## Multiple accounts on iOS (preview)
35+
## Multiple accounts on iOS
3636

3737
You can enable passwordless phone sign-in for multiple accounts in Microsoft Authenticator on any supported iOS device. Consultants, students, and others with multiple accounts in Azure AD can add each account to Microsoft Authenticator and use passwordless phone sign-in for all of them from the same iOS device.
3838

3939
Previously, admins might not require passwordless sign-in for users with multiple accounts because it requires them to carry more devices for sign-in. By removing the limitation of one user sign-in from a device, admins can more confidently encourage users to register passwordless phone sign-in and use it as their default sign-in method.
4040

4141
The Azure AD accounts can be in the same tenant or different tenants. Guest accounts aren't supported for multiple account sign-ins from one device.
4242

43-
>[!NOTE]
44-
>Multiple accounts on iOS is currently in public preview. Some features might not be supported or have limited capabilities. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
45-
4643
## Prerequisites
4744

4845
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:

0 commit comments

Comments
 (0)