Skip to content

Commit e11793a

Browse files
authored
Merge branch 'main' into patch-1
2 parents 48f5d0d + a4f22d1 commit e11793a

File tree

1,832 files changed

+16011
-44722
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,832 files changed

+16011
-44722
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10805,6 +10805,11 @@
1080510805
"source_path": "articles/active-directory/manage-apps/manage-certificates-for-federated-single-sign-on.md",
1080610806
"redirect_url": "/azure/active-directory/manage-apps/tutorial-manage-certificates-for-federated-single-sign-on",
1080710807
"redirect_document_id": false
10808+
},
10809+
{
10810+
"source_path": "articles/active-directory/manage-apps/howto-enforce-signed-saml-authentication.md",
10811+
"redirect_url": "/azure/active-directory/manage-apps/howto-saml-token-encryption",
10812+
"redirect_document_id": true
1080810813
}
1080910814

1081010815
]

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -216,6 +216,11 @@
216216
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
217217
"redirect_document_id": false
218218
},
219+
{
220+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-sample-links.md",
221+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-samples",
222+
"redirect_document_id": false
223+
},
219224
{
220225
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-access.md",
221226
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",

.openpublishing.redirection.json

Lines changed: 52 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -621,22 +621,22 @@
621621
},
622622
{
623623
"source_path_from_root": "/articles/load-balancer/azure-media-player/components-limitations.md",
624-
"redirect_url": "/articles/load-balancer/concepts",
624+
"redirect_url": "/azure/load-balancer/concepts",
625625
"redirect_document_id": false
626626
},
627627
{
628628
"source_path_from_root": "/articles/frontdoor/standard-premium/resource-manager-template-samples.md",
629-
"redirect_url": "/articles/frontdoor/front-door-quickstart-template-samples",
629+
"redirect_url": "/azure/frontdoor/front-door-quickstart-template-samples",
630630
"redirect_document_id": false
631631
},
632632
{
633633
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-health-probes.md",
634-
"redirect_url": "/articles/frontdoor/front-door-health-probes",
634+
"redirect_url": "/azure/frontdoor/front-door-health-probes",
635635
"redirect_document_id": false
636636
},
637637
{
638638
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-ddos.md",
639-
"redirect_url": "/articles/frontdoor/front-door-ddos",
639+
"redirect_url": "/azure/frontdoor/front-door-ddos",
640640
"redirect_document_id": false
641641
},
642642
{
@@ -651,7 +651,7 @@
651651
},
652652
{
653653
"source_path_from_root": "/articles/frontdoor/standard-premium/geo-filtering.md",
654-
"redirect_url": "/articles/frontdoor/front-door-geo-filtering",
654+
"redirect_url": "/azure/frontdoor/front-door-geo-filtering",
655655
"redirect_document_id": false
656656
},
657657
{
@@ -6311,6 +6311,46 @@
63116311
"redirect_url": "/azure/azure-cache-for-redis/scripts/create-manage-cache",
63126312
"redirect_document_id": false
63136313
},
6314+
{
6315+
"source_path_from_root": "/articles/storage/storage-client-side-encryption.md",
6316+
"redirect_url": "/azure/storage/common/storage-client-side-encryption",
6317+
"redirect_document_id": true
6318+
},
6319+
{
6320+
"source_path_from_root": "/articles/storage/common/storage-client-side-encryption.md",
6321+
"redirect_url": "/azure/storage/blobs/client-side-encryption",
6322+
"redirect_document_id": true
6323+
},
6324+
{
6325+
"source_path_from_root": "/articles/storage/storage-client-side-encryption-java.md",
6326+
"redirect_url": "/azure/storage/common/storage-client-side-encryption-java",
6327+
"redirect_document_id": true
6328+
},
6329+
{
6330+
"source_path_from_root": "/articles/storage/common/storage-client-side-encryption-java.md",
6331+
"redirect_url": "/azure/storage/blobs/client-side-encryption",
6332+
"redirect_document_id": false
6333+
},
6334+
{
6335+
"source_path_from_root": "/articles/storage/storage-client-side-encryption-python.md",
6336+
"redirect_url": "/azure/storage/common/storage-client-side-encryption-python",
6337+
"redirect_document_id": true
6338+
},
6339+
{
6340+
"source_path_from_root": "/articles/storage/common/storage-client-side-encryption-python.md",
6341+
"redirect_url": "/azure/storage/blobs/client-side-encryption",
6342+
"redirect_document_id": false
6343+
},
6344+
{
6345+
"source_path_from_root": "/articles/storage/storage-encrypt-decrypt-blobs-key-vault.md",
6346+
"redirect_url": "/azure/storage/blobs/storage-encrypt-decrypt-blobs-key-vault",
6347+
"redirect_document_id": false
6348+
},
6349+
{
6350+
"source_path_from_root": "/articles/storage/blobs/storage-encrypt-decrypt-blobs-key-vault.md",
6351+
"redirect_url": "/azure/storage/blobs/client-side-encryption",
6352+
"redirect_document_id": false
6353+
},
63146354
{
63156355
"source_path_from_root": "/articles/storage/blobs/Storage-blob-performance-tiers.md",
63166356
"redirect_url": "/azure/storage/common/storage-account-overview",
@@ -22251,6 +22291,11 @@
2225122291
"redirect_url": "/azure/sql-data-warehouse/create-data-warehouse-portal",
2225222292
"redirect_document_id": false
2225322293
},
22294+
{
22295+
"source_path_from_root": "/articles/virtual-machine-scale-sets/flexible-virtual-machine-scale-sets.md",
22296+
"redirect_url": "/azure/virtual-machine-scale-sets/overview",
22297+
"redirect_document_id": false
22298+
},
2225422299
{
2225522300
"source_path_from_root": "/articles/sql-data-warehouse/sql-data-warehouse-get-started-provision-powershell.md",
2225622301
"redirect_url": "/azure/sql-data-warehouse/create-data-warehouse-powershell",
@@ -22861,11 +22906,6 @@
2286122906
"redirect_url": "/azure/storage/blobs/storage-dotnet-shared-access-signature-part-2",
2286222907
"redirect_document_id": true
2286322908
},
22864-
{
22865-
"source_path_from_root": "/articles/storage/storage-encrypt-decrypt-blobs-key-vault.md",
22866-
"redirect_url": "/azure/storage/blobs/storage-encrypt-decrypt-blobs-key-vault",
22867-
"redirect_document_id": true
22868-
},
2286922909
{
2287022910
"source_path_from_root": "/articles/storage/storage-https-custom-domain-cdn.md",
2287122911
"redirect_url": "/azure/storage/blobs/storage-https-custom-domain-cdn",
@@ -23262,21 +23302,6 @@
2326223302
"redirect_url": "/azure/storage/common/storage-choose-data-transfer-solution",
2326323303
"redirect_document_id": true
2326423304
},
23265-
{
23266-
"source_path_from_root": "/articles/storage/storage-client-side-encryption.md",
23267-
"redirect_url": "/azure/storage/common/storage-client-side-encryption",
23268-
"redirect_document_id": true
23269-
},
23270-
{
23271-
"source_path_from_root": "/articles/storage/storage-client-side-encryption-java.md",
23272-
"redirect_url": "/azure/storage/common/storage-client-side-encryption-java",
23273-
"redirect_document_id": true
23274-
},
23275-
{
23276-
"source_path_from_root": "/articles/storage/storage-client-side-encryption-python.md",
23277-
"redirect_url": "/azure/storage/common/storage-client-side-encryption-python",
23278-
"redirect_document_id": true
23279-
},
2328023305
{
2328123306
"source_path_from_root": "/articles/storage/storage-concurrency.md",
2328223307
"redirect_url": "/azure/storage/common/storage-concurrency",
@@ -37362,16 +37387,6 @@
3736237387
"redirect_url": "/azure/event-grid/event-schema-communication-services",
3736337388
"redirect_document_id": false
3736437389
},
37365-
{
37366-
"source_path_from_root": "/articles/azure-monitor/app/change-analysis.md#visualizations-for-application-change-analysis",
37367-
"redirect_url": "/articles/azure-monitor/app/change-analysis-visualizations",
37368-
"redirect_document_id": false
37369-
},
37370-
{
37371-
"source_path_from_root": "/articles/azure-monitor/app/change-analysis.md#troubleshoot",
37372-
"redirect_url": "/articles/azure-monitor/app/change-analysis-troubleshoot",
37373-
"redirect_document_id": false
37374-
},
3737537390
{
3737637391
"source_path_from_root": "/articles/cognitive-services/personalizer/personalizer-encryption-of-data-at-rest.md",
3737737392
"redirect_url": "/azure/cognitive-services/personalizer/encrypt-data-at-rest",
@@ -40240,12 +40255,12 @@
4024040255
},
4024140256
{
4024240257
"source_path_from_root": "/articles/virtual-machines/windows/connect-logon.md",
40243-
"redirect_url": "/articles/virtual-machines/windows/connect-rdp",
40258+
"redirect_url": "/azure/virtual-machines/windows/connect-rdp",
4024440259
"redirect_document_id": false
4024540260
},
4024640261
{
4024740262
"source_path_from_root": "/articles/virtual-machines/windows/winrm.md",
40248-
"redirect_url": "/articles/virtual-machines/windows/connect-winrm",
40263+
"redirect_url": "/azure/virtual-machines/windows/connect-winrm",
4024940264
"redirect_document_id": false
4025040265
}
4025140266
]

articles/active-directory-b2c/configure-authentication-in-azure-static-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ Once you've added the app ID and secrete, use the following steps to add the Azu
127127

128128
1. Navigate to `/.auth/login/aadb2c`. The `/.auth/login` points the Azure Static app login endpoint. The `aadb2c` references to your [OpenID Connect identity provider](#31-add-an-openid-connect-identity-provider). The following URL demonstrates an Azure Static app login endpoint: `https://witty-island-11111111.azurestaticapps.net/.auth/login/aadb2c`.
129129
1. Complete the sign up or sign in process.
130-
1. In your browser debugger, [run the following JavaScript in the Console](/microsoft-edge/devtools-guide-chromium/console/console-javascript.md). The JavaScript code will present information about the sign in user.
130+
1. In your browser debugger, [run the following JavaScript in the Console](/microsoft-edge/devtools-guide-chromium/console/console-javascript). The JavaScript code will present information about the sign in user.
131131

132132
```javascript
133133
async function getUserInfo() {
@@ -147,4 +147,4 @@ Once you've added the app ID and secrete, use the following steps to add the Azu
147147
## Next steps
148148
149149
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out [Accessing user information in Azure Static Web Apps](../static-web-apps/user-information.md).
150-
* Learn how to [customize and enhance the Azure AD B2C authentication experience for your web app](enable-authentication-azure-static-app-options.md).
150+
* Learn how to [customize and enhance the Azure AD B2C authentication experience for your web app](enable-authentication-azure-static-app-options.md).

articles/active-directory-b2c/configure-authentication-in-azure-web-app-file-based.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App configuration file by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](/app-service/configure-authentication-file-based.md) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](/azure/app-service/configure-authentication-file-based) article.
1919

2020
## Overview
2121

@@ -141,6 +141,6 @@ From your server code, the provider-specific tokens are injected into the reques
141141

142142
## Next steps
143143

144-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/app-service/configure-authentication-user-identities).
145-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/app-service/configure-authentication-oauth-tokens).
144+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
145+
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
146146

articles/active-directory-b2c/configure-authentication-in-azure-web-app.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](/app-service/configure-authentication-provider-openid-connect.md) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](/azure/app-service/configure-authentication-provider-openid-connect) article.
1919

2020
## Overview
2121

@@ -94,7 +94,7 @@ To register your application, follow these steps:
9494
1. For the **Client Secret** provide the Web App (client) secret from [step 2.2](#step-22-create-a-client-secret).
9595
9696
> [!TIP]
97-
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](/app-service/app-service-key-vault-references.md) if you wish to manage the secret in Azure Key Vault.
97+
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](/azure/app-service/app-service-key-vault-references) if you wish to manage the secret in Azure Key Vault.
9898
9999
1. Keep the rest of the settings with the default values.
100100
1. Press the **Add** button to finish setting up the identity provider.
@@ -119,6 +119,6 @@ From your server code, the provider-specific tokens are injected into the reques
119119
120120
## Next steps
121121
122-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/app-service/configure-authentication-user-identities).
123-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/app-service/configure-authentication-oauth-tokens).
122+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
123+
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
124124

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/15/2022
12+
ms.date: 06/27/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -154,7 +154,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
154154

155155
| Feature | Custom policy | Notes |
156156
| ------- | :--: | ----- |
157-
| [MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods) | Preview | Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
157+
| [MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods) | GA | Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
158158
| [Phone factor authentication](phone-factor-technical-profile.md) | GA | |
159159
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | Preview | |
160160
| [One-time password](one-time-password-technical-profile.md) | GA | |

articles/active-directory-b2c/faq.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,6 @@ sections:
146146
answer: |
147147
Yes. End users need to download any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app) (recommended). For details see, [verification methods](multi-factor-authentication.md#verification-methods).
148148
149-
This feature is in public preview.
150149
- question: |
151150
Why are my TOTP authenticator app codes not working?
152151
answer: |

articles/active-directory-b2c/multi-factor-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 01/14/2022
11+
ms.date: 06/27/2022
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -38,7 +38,7 @@ With [Conditional Access](conditional-access-identity-protection-overview.md) us
3838
- **SMS or phone call** - During the first sign-up or sign-in, the user is asked to provide and verify a phone number. During subsequent sign-ins, the user is prompted to select either the **Send Code** or **Call Me** phone MFA option. Depending on the user's choice, a text message is sent or a phone call is made to the verified phone number to identify the user. The user either provides the OTP code sent via text message or approves the phone call.
3939
- **Phone call only** - Works in the same way as the SMS or phone call option, but only a phone call is made.
4040
- **SMS only** - Works in the same way as the SMS or phone call option, but only a text message is sent.
41-
- **Authenticator app - TOTP (preview)** - The user must install an authenticator app that supports time-based one-time password (TOTP) verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app), on a device that they own. During the first sign-up or sign-in, the user scans a QR code or enters a code manually using the authenticator app. During subsequent sign-ins, the user types the TOTP code that appears on the authenticator app. See [how to set up the Microsoft Authenticator app](#enroll-a-user-in-totp-with-an-authenticator-app-for-end-users).
41+
- **Authenticator app - TOTP** - The user must install an authenticator app that supports time-based one-time password (TOTP) verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app), on a device that they own. During the first sign-up or sign-in, the user scans a QR code or enters a code manually using the authenticator app. During subsequent sign-ins, the user types the TOTP code that appears on the authenticator app. See [how to set up the Microsoft Authenticator app](#enroll-a-user-in-totp-with-an-authenticator-app-for-end-users).
4242

4343
> [!IMPORTANT]
4444
> Authenticator app - TOTP provides stronger security than SMS/Phone and email is the least secure. [SMS/Phone-based multi-factor authentication incurs separate charges from the normal Azure AD B2C MAU's pricing model](https://azure.microsoft.com/pricing/details/active-directory/external-identities/).
@@ -122,7 +122,7 @@ In Azure AD B2C, you can delete a user's TOTP authenticator app enrollment. Then
122122
1. In the left menu, select **Users**.
123123
1. Search for and select the user for which you want to delete TOTP authenticator app enrollment.
124124
1. In the left menu, select **Authentication methods**.
125-
1. Under **Usable authentication methods**, find **Software OATH token (Preview)**, and then select the ellipsis menu next to it. If you don't see this interface, select the option to **"Switch to the new user authentication methods experience! Click here to use it now"** to switch to the new authentication methods experience.
125+
1. Under **Usable authentication methods**, find **Software OATH token**, and then select the ellipsis menu next to it. If you don't see this interface, select the option to **"Switch to the new user authentication methods experience! Click here to use it now"** to switch to the new authentication methods experience.
126126
1. Select **Delete**, and then select **Yes** to confirm.
127127

128128
:::image type="content" source="media/multi-factor-authentication/authentication-methods.png" alt-text="User authentication methods":::

0 commit comments

Comments
 (0)