Skip to content

Commit e002e99

Browse files
authored
Merge branch 'main' into patch-1
2 parents f748e11 + 865e9f5 commit e002e99

File tree

7,068 files changed

+129949
-104762
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

7,068 files changed

+129949
-104762
lines changed

.gitignore

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,4 +26,23 @@ AzureMigration.ps1
2626
*.pdn
2727

2828
# Pycharm
29-
.idea/*
29+
.idea/*
30+
articles/planetary-computer/doc-tree-generator.py
31+
.gitignore
32+
articles/planetary-computer/article_links_diagram.md
33+
articles/planetary-computer/index_helper.py
34+
articles/planetary-computer/metadata_index.csv
35+
articles/planetary-computer/broken_link_checker.py
36+
articles/planetary-computer/broken_links_external.csv
37+
articles/planetary-computer/broken_links.csv
38+
articles/planetary-computer/check_orphaned_docs.py
39+
40+
# Python cache files
41+
*.pyc
42+
__pycache__/
43+
articles/planetary-computer/interesting_stats.py
44+
articles/planetary-computer/locate_text.py
45+
articles/planetary-computer/image_syntax_checker.py
46+
articles/planetary-computer/image-file-fixer.py
47+
articles/planetary-computer/orphaned-media.py
48+
articles/planetary-computer/orphaned_media_files.txt

.openpublishing.publish.config.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,30 @@
140140
"branch": "main",
141141
"branch_mapping": {}
142142
},
143+
{
144+
"path_to_root": "remote-mcp-functions-dotnet",
145+
"url": "https://github.com/Azure-Samples/remote-mcp-functions-dotnet",
146+
"branch": "main",
147+
"branch_mapping": {}
148+
},
149+
{
150+
"path_to_root": "remote-mcp-functions-typescript",
151+
"url": "https://github.com/Azure-Samples/remote-mcp-functions-typescript",
152+
"branch": "main",
153+
"branch_mapping": {}
154+
},
155+
{
156+
"path_to_root": "remote-mcp-functions-python",
157+
"url": "https://github.com/Azure-Samples/remote-mcp-functions-python",
158+
"branch": "main",
159+
"branch_mapping": {}
160+
},
161+
{
162+
"path_to_root": "remote-mcp-functions-java",
163+
"url": "https://github.com/Azure-Samples/remote-mcp-functions-java",
164+
"branch": "main",
165+
"branch_mapping": {}
166+
},
143167
{
144168
"path_to_root": "azure-functions-durable-js",
145169
"url": "https://github.com/Azure/azure-functions-durable-js",
@@ -158,6 +182,12 @@
158182
"branch": "dev",
159183
"branch_mapping": {}
160184
},
185+
{
186+
"path_to_root": "azure-functions-mongodb-extension",
187+
"url": "https://github.com/Azure/Azure-functions-mongodb-extension",
188+
"branch": "main",
189+
"branch_mapping": {}
190+
},
161191
{
162192
"path_to_root": "azure-functions-nodejs-v4",
163193
"url": "https://github.com/Azure/azure-functions-nodejs-samples",

.openpublishing.redirection.json

Lines changed: 123 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,35 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/private-multi-access-edge-compute-mec/index.yml",
5+
"redirect_url": "/previous-versions/azure/private-multi-access-edge-compute-mec/index",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/site-recovery/shared-disks-common-questions.md",
10+
"redirect_url": "/azure/site-recovery/azure-to-azure-common-questions",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/network-watcher/traffic-analytics-schema-update.md",
15+
"redirect_url": "/previous-versions/azure/network-watcher/traffic-analytics-schema-update",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/network-watcher/network-watcher-visualize-nsg-flow-logs-open-source-tools.md",
20+
"redirect_url": "/previous-versions/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-open-source-tools",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/network-watcher/network-watcher-nsg-grafana.md",
25+
"redirect_url": "/previous-versions/azure/network-watcher/network-watcher-nsg-grafana",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/network-watcher/network-watcher-analyze-nsg-flow-logs-graylog.md",
30+
"redirect_url": "/previous-versions/azure/network-watcher/network-watcher-analyze-nsg-flow-logs-graylog",
31+
"redirect_document_id": false
32+
},
333
{
434
"source_path": "articles/api-management/migrate-stv1-to-stv2-no-vnet.md",
535
"redirect_url": "/previous-versions/azure/api-management/migrate-stv1-to-stv2-no-vnet",
@@ -227,7 +257,7 @@
227257
},
228258
{
229259
"source_path": "articles/databox-online/azure-stack-edge-2301-release-notes.md",
230-
"redirect_url": "/previous-versions/azure/databox-online/azure-stack-edge-2301-release-notes",
260+
"redirect_url": "/previous-versions/azure/databox-online/azure-stack-edge-2301-release-notes"
231261
},
232262
{
233263
"source_path": "articles/network-watcher/nsg-flow-logs-rest.md",
@@ -474,6 +504,11 @@
474504
"redirect_url": "/azure/security/fundamentals/azure-CA-details",
475505
"redirect_document_id": false
476506
},
507+
{
508+
"source_path": "articles/security/fundamentals/recover-from-identity-compromise.md",
509+
"redirect_url": "/azure/security/fundamentals/ransomware-detect-respond#road-to-recovery",
510+
"redirect_document_id": false
511+
},
477512
{
478513
"source_path": "articles/event-grid/event-schema-storage-actions.md",
479514
"redirect_url": "/azure/storage-actions/overview",
@@ -2393,7 +2428,12 @@
23932428
"source_path_from_root": "/articles/app-service/manage-disaster-recovery.md",
23942429
"redirect_url": "/azure/architecture/web-apps/guides/multi-region-app-service/multi-region-app-service",
23952430
"redirect_document_id": false
2396-
},
2431+
},
2432+
{
2433+
"source_path_from_root": "/articles/app-service/app-service-configure-premium-tier.md",
2434+
"redirect_url": "/azure/app-service/app-service-configure-premium-v4-tier",
2435+
"redirect_document_id": false
2436+
},
23972437
{
23982438
"source_path_from_root": "/articles/public-multi-access-edge-compute-mec/tutorial-create-vm-using-python-sdk.md",
23992439
"redirect_url": "/previous-versions/azure/public-multi-access-edge-compute-mec/tutorial-create-vm-using-python-sdk",
@@ -6851,7 +6891,27 @@
68516891
},
68526892
{
68536893
"source_path_from_root": "/articles/azure-functions/migration.md",
6854-
"redirect_url": "/azure/azure-functions/migration/migrate-lambda-workloads-overview",
6894+
"redirect_url": "/azure/azure-functions/migration/migrate-aws-lambda-to-azure-functions",
6895+
"redirect_document_id": false
6896+
},
6897+
{
6898+
"source_path": "articles/azure-functions/migration/migrate-lambda-workloads-overview.md",
6899+
"redirect_url": "/azure/azure-functions/migration/migrate-aws-lambda-to-azure-functions",
6900+
"redirect_document_id": false
6901+
},
6902+
{
6903+
"source_path": "articles/azure-functions/migration/discover-lambda-workloads.md",
6904+
"redirect_url": "/azure/azure-functions/migration/migrate-aws-lambda-to-azure-functions",
6905+
"redirect_document_id": false
6906+
},
6907+
{
6908+
"source_path": "articles/azure-functions/migration/assess-lambda-workloads.md",
6909+
"redirect_url": "/azure/azure-functions/migration/migrate-aws-lambda-to-azure-functions",
6910+
"redirect_document_id": false
6911+
},
6912+
{
6913+
"source_path": "articles/azure-functions/migration/migrate-lambda-workloads.md",
6914+
"redirect_url": "/azure/azure-functions/migration/migrate-aws-lambda-to-azure-functions",
68556915
"redirect_document_id": false
68566916
},
68576917
{
@@ -6878,6 +6938,66 @@
68786938
"source_path": "articles/storage/files/storage-files-enable-soft-delete.md",
68796939
"redirect_url": "/azure/storage/files/storage-files-prevent-file-share-deletion",
68806940
"redirect_document_id": false
6941+
},
6942+
{
6943+
"source_path": "articles/defender-for-iot/organizations/release-notes-archive.md",
6944+
"redirect_url": "/azure/defender-for-iot/organizations/release-notes-ot-monitoring-sensor-archive",
6945+
"redirect_document_id": false
6946+
},
6947+
{
6948+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-portal.md",
6949+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6950+
"redirect_document_id": false
6951+
},
6952+
{
6953+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-powershell.md",
6954+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6955+
"redirect_document_id": false
6956+
},
6957+
{
6958+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-cli.md",
6959+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6960+
"redirect_document_id": false
6961+
},
6962+
{
6963+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-template.md",
6964+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6965+
"redirect_document_id": false
6966+
},
6967+
{
6968+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-terraform.md",
6969+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6970+
"redirect_document_id": false
6971+
},
6972+
{
6973+
"source_path": "articles/nat-gateway/quickstart-create-nat-gateway-bicep.md",
6974+
"redirect_url": "/azure/nat-gateway/quickstart-create-nat-gateway",
6975+
"redirect_document_id": false
6976+
},
6977+
{
6978+
"source_path": "articles/defender-for-iot/organizations/eiot-sensor.md",
6979+
"redirect_url": "/azure/defender-for-iot/organizations/concept-enterprise",
6980+
"redirect_document_id": false
6981+
},
6982+
{
6983+
"source_path": "articles/cyclecloud/release-notes/ccws/2024.09.18.md",
6984+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2024-09-18",
6985+
"redirect_document_id": false
6986+
},
6987+
{
6988+
"source_path": "articles/cyclecloud/release-notes/ccws/2024.11.08.md",
6989+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2024-11-08",
6990+
"redirect_document_id": false
6991+
},
6992+
{
6993+
"source_path": "articles/cyclecloud/release-notes/ccws/2024.12.18.md",
6994+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2024-12-18",
6995+
"redirect_document_id": false
6996+
},
6997+
{
6998+
"source_path": "articles/cyclecloud/release-notes/ccws/2025.02.06.md",
6999+
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2025-02-06",
7000+
"redirect_document_id": false
68817001
}
68827002
]
68837003
}

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ ms.subservice: b2c
2121

2222
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2323

24+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
25+
2426
Azure Active Directory B2C (Azure AD B2C) provides support for verifying an email address for self-service password reset (SSPR). Use the Microsoft Entra ID SSPR technical profile to generate and send a code to an email address, and then verify the code. The Microsoft Entra ID SSPR technical profile may also return an error message. The validation technical profile validates the user-provided data before the user journey continues. With the validation technical profile, an error message displays on a self-asserted page.
2527

2628
This technical profile:

articles/active-directory-b2c/access-tokens.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ ms.subservice: b2c
1818
---
1919
# Request an access token in Azure Active Directory B2C
2020

21+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
22+
2123
An *access token* contains claims that you can use in Azure Active Directory B2C (Azure AD B2C) to identify the granted permissions to your APIs. To call a resource server, the HTTP request must include an access token. An access token is denoted as **access_token** in the responses from Azure AD B2C.
2224

2325
This article shows you how to request an access token for a web application and web API. For more information about tokens in Azure AD B2C, see the [overview of tokens in Azure Active Directory B2C](tokens-overview.md).

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ ms.subservice: b2c
2121

2222
# Define a Microsoft Entra technical profile in an Azure Active Directory B2C custom policy
2323

24+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
25+
2426
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2527

2628
<!-- docutune:ignored "AAD-" -->

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,9 @@ zone_pivot_groups: b2c-policy-type
1515
---
1616

1717
# Enrich tokens with claims from external sources using API connectors
18+
19+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
20+
1821
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
1922
Azure Active Directory B2C (Azure AD B2C) enables identity developers to integrate an interaction with a RESTful API into their user flow using [API connectors](api-connectors-overview.md). It enables developers to dynamically retrieve data from external identity sources. At the end of this walkthrough, you'll be able to create an Azure AD B2C user flow that interacts with APIs to enrich tokens with information from external sources.
2023
::: zone pivot="b2c-user-flow"

articles/active-directory-b2c/add-api-connector.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ zone_pivot_groups: b2c-policy-type
1818

1919
# Add an API connector to a sign-up user flow
2020

21+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
22+
2123
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2224

2325
As a developer or IT administrator, you can use API connectors to integrate your sign-up user flows with REST APIs to customize the sign-up experience and integrate with external systems. At the end of this walkthrough, you'll be able to create an Azure AD B2C user flow that interacts with [REST API services](api-connectors-overview.md) to modify your sign-up experiences.

articles/active-directory-b2c/add-captcha.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ zone_pivot_groups: b2c-policy-type
1717

1818
# Enable CAPTCHA in Azure Active Directory B2C
1919

20+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
21+
2022
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2123

2224
Azure Active Directory B2C (Azure AD B2C) allows you to enable CAPTCHA to prevent automated attacks on your consumer-facing applications. Azure AD B2C’s CAPTCHA supports both audio and visual CAPTCHA challenges. You can enable this security feature in both sign-up and sign-in flows for your local accounts. CAPTCHA isn't applicable for social identity providers' sign-in.

articles/active-directory-b2c/add-identity-provider.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to add an identity provider to your Active Directory B2C
55
author: garrodonnell
66
manager: CelesteDG
77
ms.author: godonnell
8-
ms.date: 03/22/2024
8+
ms.date: 01/05/2025
99
ms.custom: mvc
1010
ms.topic: how-to
1111
ms.service: azure-active-directory
@@ -17,6 +17,8 @@ ms.subservice: b2c
1717

1818
# Add an identity provider to your Azure Active Directory B2C tenant
1919

20+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
21+
2022
You can configure Azure AD B2C to allow users to sign in to your application with credentials from external social or enterprise identity providers (IdP). Azure AD B2C supports external identity providers like Facebook, Microsoft account, Google, X, and any identity provider that supports OAuth 1.0, OAuth 2.0, OpenID Connect, and SAML protocols.
2123

2224
With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.

0 commit comments

Comments
 (0)