Skip to content

Commit e5d0783

Browse files
Merge branch 'main' into Aug-16-2023-CSRVM
2 parents 6b3b61b + c17f901 commit e5d0783

File tree

1,293 files changed

+17667
-8084
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,293 files changed

+17667
-8084
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -416,6 +416,12 @@
416416
"branch": "main",
417417
"branch_mapping": {}
418418
},
419+
{
420+
"path_to_root": "azureml-examples-archive",
421+
"url": "https://github.com/azure/azureml-examples",
422+
"branch": "v1-archive",
423+
"branch_mapping": {}
424+
},
419425
{
420426
"path_to_root": "azureml-examples-batch-pup",
421427
"url": "https://github.com/azure/azureml-examples",

.openpublishing.redirection.json

Lines changed: 65 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23253,6 +23253,51 @@
2325323253
"redirect_url": "/azure/active-directory/develop/index-spa",
2325423254
"redirect_document_id": false
2325523255
},
23256+
{
23257+
"source_path_from_root": "/articles/active-directory/develop/api-find-an-api-how-to.md",
23258+
"redirect_url": "/azure/active-directory/develop/quickstart-configure-app-expose-web-apis",
23259+
"redirect_document_id": false
23260+
},
23261+
{
23262+
"source_path_from_root": "/articles/active-directory/develop/consent-framework-links.md",
23263+
"redirect_url": "/azure/active-directory/develop/permissions-consent-overview",
23264+
"redirect_document_id": false
23265+
},
23266+
{
23267+
"source_path_from_root": "/articles/active-directory/develop/authentication-protocols.md",
23268+
"redirect_url": "/azure/active-directory/develop/v2-oauth2-auth-code-flow",
23269+
"redirect_document_id": false
23270+
},
23271+
{
23272+
"source_path_from_root": "/articles/active-directory/develop/delegated-and-app-perms.md",
23273+
"redirect_url": "/azure/active-directory/develop/permissions-consent-overview",
23274+
"redirect_document_id": false
23275+
},
23276+
{
23277+
"source_path_from_root": "/articles/active-directory/develop/perms-for-given-api.md",
23278+
"redirect_url": "/azure/active-directory/develop/scopes-oidc",
23279+
"redirect_document_id": false
23280+
},
23281+
{
23282+
"source_path_from_root": "/articles/active-directory/develop/setup-multi-tenant-app.md",
23283+
"redirect_url": "/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant",
23284+
"redirect_document_id": false
23285+
},
23286+
{
23287+
"source_path_from_root": "/articles/active-directory/develop/registration-config-specific-application-property-how-to.md",
23288+
"redirect_url": "/azure/active-directory/develop/quickstart-register-app",
23289+
"redirect_document_id": false
23290+
},
23291+
{
23292+
"source_path_from_root": "/articles/active-directory/develop/registration-config-how-to.md",
23293+
"redirect_url": "/azure/active-directory/develop/quickstart-register-app",
23294+
"redirect_document_id": false
23295+
},
23296+
{
23297+
"source_path_from_root": "/articles/active-directory/develop/registration-config-sso-how-to.md",
23298+
"redirect_url": "/azure/active-directory/develop/quickstart-register-app",
23299+
"redirect_document_id": false
23300+
},
2325623301
{
2325723302
"source_path_from_root": "/articles/networking/azure-orbital-overview.md",
2325823303
"redirect_url": "/azure/orbital/overview",
@@ -24142,10 +24187,29 @@
2414224187
"source_path": "articles/azure-cache-for-redis/cache-how-to-functions.md",
2414324188
"redirect_url": "/azure/azure-functions/functions-bindings-cache",
2414424189
"redirect_document_id": false
24190+
},
24191+
{
24192+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-configure-authentication.md",
24193+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-vanillajs-configure-authentication",
24194+
"redirect_document_id": false
24195+
},
24196+
{
24197+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-prepare-app.md",
24198+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-vanillajs-prepare-app",
24199+
"redirect_document_id": false
24200+
},
24201+
{
24202+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-prepare-tenant.md",
24203+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-vanillajs-prepare-tenant",
24204+
"redirect_document_id": false
24205+
},
24206+
{
24207+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-sign-in-sign-out.md",
24208+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-vanillajs-sign-in-sign-out",
24209+
"redirect_document_id": false
2414524210
}
2414624211

2414724212

24148-
2414924213

2415024214
]
2415124215
}

articles/active-directory-b2c/faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.date: 07/13/2023
1212
ms.author: godonnell
1313
ms.subservice: B2C
14-
ms.custom: "b2c-support"
14+
ms.custom: b2c-support, has-azure-ad-ps-ref
1515
title: 'Azure AD B2C: Frequently asked questions (FAQ)'
1616
summary: This page answers frequently asked questions about the Azure Active Directory B2C (Azure AD B2C). Keep checking back for updates.
1717

@@ -300,4 +300,4 @@ sections:
300300
- question: |
301301
In Azure AD B2C, I revoke all sessions of a user by using the Azure portals Revoke sessions button, but it doesn't work?
302302
answer: |
303-
Currently, Azure AD B2C doesn't support user session revocation from the Azure portal. However, you can achieve this task by using [Microsoft Graph PowerShell](manage-users-portal.md#revoke-a-consumer-users-session) or [Microsoft Graph API](/graph/api/user-revokesigninsessions).
303+
Currently, Azure AD B2C doesn't support user session revocation from the Azure portal. However, you can achieve this task by using [Microsoft Graph PowerShell](manage-users-portal.md#revoke-a-consumer-users-session) or [Microsoft Graph API](/graph/api/user-revokesigninsessions).

articles/active-directory-b2c/force-password-reset.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.topic: how-to
1212
ms.date: 06/26/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
15-
ms.custom: b2c-support
15+
ms.custom: b2c-support, has-azure-ad-ps-ref
1616
zone_pivot_groups: b2c-policy-type
1717
---
1818

articles/active-directory-b2c/manage-custom-policies-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77

88
ms.service: active-directory
99
ms.workload: identity
10-
ms.custom: devx-track-azurepowershell
10+
ms.custom: devx-track-azurepowershell, has-azure-ad-ps-ref
1111
ms.topic: how-to
1212
ms.date: 02/14/2020
1313
ms.author: kengaderdus

articles/active-directory-b2c/tenant-management-directory-quota.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ The response from the API call looks similar to the following json:
6565
{
6666
"directorySizeQuota": {
6767
"used": 211802,
68-
"total": 300000
68+
"total": 50000000
6969
}
7070
}
7171
]
@@ -81,4 +81,4 @@ If your tenant usage is higher that 80%, you can remove inactive users or reques
8181

8282
## Request increase directory quota size
8383

84-
You can request to increase the quota size by [contacting support](find-help-open-support-ticket.md)
84+
You can request to increase the quota size by [contacting support](find-help-open-support-ticket.md)

articles/active-directory-domain-services/alert-service-principal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,10 @@ ms.assetid: f168870c-b43a-4dd6-a13f-5cfadc5edf2c
99
ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
12+
ms.custom: has-azure-ad-ps-ref
1213
ms.topic: troubleshooting
1314
ms.date: 01/29/2023
1415
ms.author: justinha
15-
1616
---
1717
# Known issues: Service principal alerts in Azure Active Directory Domain Services
1818

articles/active-directory-domain-services/create-forest-trust-powershell.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,8 @@ ms.workload: identity
1010
ms.topic: conceptual
1111
ms.date: 04/03/2023
1212
ms.author: justinha
13-
ms.custom: devx-track-azurepowershell
14-
13+
ms.custom: devx-track-azurepowershell, has-azure-ad-ps-ref
1514
#Customer intent: As an identity administrator, I want to create an Azure AD Domain Services forest and one-way outbound trust from an Azure Active Directory Domain Services forest to an on-premises Active Directory Domain Services forest using Azure PowerShell to provide authentication and resource access between forests.
16-
1715
---
1816

1917
# Create an Azure Active Directory Domain Services forest trust to an on-premises domain using Azure PowerShell
@@ -419,4 +417,4 @@ For more conceptual information about forest types in Azure AD DS, see [How do f
419417
[Install-Script]: /powershell/module/powershellget/install-script
420418

421419
<!-- EXTERNAL LINKS -->
422-
[powershell-gallery]: https://www.powershellgallery.com/
420+
[powershell-gallery]: https://www.powershellgallery.com/

articles/active-directory-domain-services/powershell-create-instance.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,7 @@ ms.workload: identity
1212
ms.topic: sample
1313
ms.date: 01/29/2023
1414
ms.author: justinha
15-
ms.custom: devx-track-azurepowershell
16-
15+
ms.custom: devx-track-azurepowershell, has-azure-ad-ps-ref
1716
---
1817
# Enable Azure Active Directory Domain Services using PowerShell
1918

articles/active-directory-domain-services/powershell-scoped-synchronization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.topic: how-to
1212
ms.date: 01/29/2023
1313
ms.author: justinha
14-
ms.custom:
14+
ms.custom: has-azure-ad-ps-ref
1515
---
1616
# Configure scoped synchronization from Azure AD to Azure Active Directory Domain Services using Azure AD PowerShell
1717

0 commit comments

Comments
 (0)