Skip to content

Commit f0c4e7b

Browse files
committed
2 parents 7e9046f + a823cdd commit f0c4e7b

File tree

1,618 files changed

+18226
-8339
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,618 files changed

+18226
-8339
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,11 @@
5555
"redirect_url": "/azure/active-directory/authentication/how-to-mfa-registration-campaign",
5656
"redirect_document_id": false
5757
},
58+
{
59+
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-create-trust-github.md",
60+
"redirect_url":"/azure/active-directory/develop/workload-identity-federation-create-trust",
61+
"redirect_document_id": false
62+
},
5863
{
5964
"source_path_from_root": "/articles/active-directory/develop/active-directory-v2-limitations.md",
6065
"redirect_url": "/azure/active-directory/azuread-dev/azure-ad-endpoint-comparison",

.openpublishing.redirection.azure-monitor.json

Lines changed: 56 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -233,27 +233,27 @@
233233
},
234234
{
235235
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-examples.md",
236-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
236+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
237237
"redirect_document_id": false
238238
},
239239
{
240240
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-options.md",
241-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
241+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
242242
"redirect_document_id": false
243243
},
244244
{
245245
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-overview.md",
246-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
246+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
247247
"redirect_document_id": false
248248
},
249249
{
250250
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-tasks.md",
251-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
251+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
252252
"redirect_document_id": false
253253
},
254254
{
255255
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-tiles.md",
256-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
256+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
257257
"redirect_document_id": false
258258
},
259259
{
@@ -268,7 +268,7 @@
268268
},
269269
{
270270
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-add-text.md",
271-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-add-workbook-elements",
271+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-create-workbook",
272272
"redirect_document_id": false
273273
},
274274
{
@@ -341,6 +341,11 @@
341341
"redirect_url": "/azure/data-explorer/data-explorer-insights",
342342
"redirect_document_id": false
343343
},
344+
{
345+
"source_path_from_root": "/articles/azure-monitor/insights/troubleshoot-workbooks.md" ,
346+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
347+
"redirect_document_id": false
348+
},
344349
{
345350
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-ga-release-faq.md" ,
346351
"redirect_url": "/azure/azure-monitor/faq#vm-insights",
@@ -431,6 +436,51 @@
431436
"redirect_url": "/azure/key-vault/key-vault-insights-overview",
432437
"redirect_document_id": false
433438
},
439+
{
440+
"source_path_from_root": "/articles/azure-monitor/app/proactive-diagnostics.md" ,
441+
"redirect_url": "/azure/azure-monitor/alerts/proactive-diagnostics",
442+
"redirect_document_id": false
443+
},
444+
{
445+
"source_path_from_root": "/articles/azure-monitor/app/proactive-failure-diagnostics.md" ,
446+
"redirect_url": "/azure/azure-monitor/alerts/proactive-failure-diagnostics",
447+
"redirect_document_id": false
448+
},
449+
{
450+
"source_path_from_root": "/articles/azure-monitor/app/proactive-performance-diagnostics.md" ,
451+
"redirect_url": "/azure/azure-monitor/alerts/proactive-performance-diagnostics",
452+
"redirect_document_id": false
453+
},
454+
{
455+
"source_path_from_root": "/articles/azure-monitor/app/proactive-trace-severity.md" ,
456+
"redirect_url": "/azure/azure-monitor/alerts/proactive-trace-severity",
457+
"redirect_document_id": false
458+
},
459+
{
460+
"source_path_from_root": "/articles/azure-monitor/app/proactive-exception-volume.md" ,
461+
"redirect_url": "/azure/azure-monitor/alerts/proactive-exception-volume",
462+
"redirect_document_id": false
463+
},
464+
{
465+
"source_path_from_root": "/articles/azure-monitor/app/proactive-potential-memory-leak.md" ,
466+
"redirect_url": "/azure/azure-monitor/alerts/proactive-potential-memory-leak",
467+
"redirect_document_id": false
468+
},
469+
{
470+
"source_path_from_root": "/articles/azure-monitor/app/proactive-application-security-detection-pack.md" ,
471+
"redirect_url": "/azure/azure-monitor/alerts/proactive-application-security-detection-pack",
472+
"redirect_document_id": false
473+
},
474+
{
475+
"source_path_from_root": "/articles/azure-monitor/app/proactive-arm-config.md" ,
476+
"redirect_url": "/azure/azure-monitor/alerts/proactive-arm-config",
477+
"redirect_document_id": false
478+
},
479+
{
480+
"source_path_from_root": "/articles/azure-monitor/app/proactive-email-notification.md" ,
481+
"redirect_url": "/azure/azure-monitor/alerts/proactive-email-notification",
482+
"redirect_document_id": false
483+
},
434484
{
435485
"source_path_from_root": "/articles/azure-monitor/app/cloudservices.md" ,
436486
"redirect_url": "/azure/azure-monitor/app/azure-web-apps-net-core",

articles/active-directory-b2c/identity-provider-local.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ To set your local account sign-in options at the tenant level:
5757
## Configure your user flow
5858

5959
1. In the left menu of the Azure portal, select **Azure AD B2C**.
60-
1. Under **Policies**, select **User flows (policies)**.
60+
1. Under **Policies**, select **User flows**.
6161
1. Select the user flow for which you'd like to configure the sign-up and sign-in experience.
6262
1. Select **Identity providers**
6363
1. Under the **Local accounts**, select one of the following: **Email signup**, **User ID signup**, **Phone signup**, **Phone/Email signup**, or **None**.

articles/active-directory-b2c/json-transformations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ The following example generates a JSON string based on the claim value of "email
6868
<InputClaims>
6969
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.to.0.email" />
7070
<InputClaim ClaimTypeReferenceId="otp" TransformationClaimType="personalizations.0.dynamic_template_data.otp" />
71+
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
7172
</InputClaims>
7273
<InputParameters>
7374
<InputParameter Id="template_id" DataType="string" Value="d-4c56ffb40fa648b1aa6822283df94f60"/>
@@ -464,4 +465,4 @@ Output claim:
464465

465466
## Next steps
466467

467-
- Find more [claims transformation samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/json) on the Azure AD B2C community GitHub repo
468+
- Find more [claims transformation samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/json) on the Azure AD B2C community GitHub repo

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 19 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 05/23/2022
4+
ms.date: 08/01/2022
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,23 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## July 2022
19+
20+
### New articles
21+
22+
- [Configure authentication in a sample React single-page application by using Azure Active Directory B2C](configure-authentication-sample-react-spa-app.md)
23+
- [Configure authentication options in a React application by using Azure Active Directory B2C](enable-authentication-react-spa-app-options.md)
24+
- [Enable authentication in your own React Application by using Azure Active Directory B2C](enable-authentication-react-spa-app.md)
25+
26+
### Updated articles
27+
28+
- [Enable custom domains for Azure Active Directory B2C](custom-domain.md)
29+
- [Set up sign-up and sign-in with a Twitter account using Azure Active Directory B2C](identity-provider-twitter.md)
30+
- [Page layout versions](page-layout.md)
31+
- [Monitor Azure AD B2C with Azure Monitor](azure-monitor.md)
32+
- [Enable JavaScript and page layout versions in Azure Active Directory B2C](javascript-and-page-layout.md)
33+
- [Localization string IDs](localization-string-ids.md)
34+
1835
## June 2022
1936

2037
### New articles
@@ -137,28 +154,4 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
137154
- [Billing model for Azure Active Directory B2C](billing.md)
138155
- [Configure SAML identity provider options with Azure Active Directory B2C](identity-provider-generic-saml-options.md)
139156
- [About claim resolvers in Azure Active Directory B2C custom policies](claim-resolver-overview.md)
140-
- [Add AD FS as a SAML identity provider using custom policies in Azure Active Directory B2C](identity-provider-adfs-saml.md)
141-
142-
## December 2021
143-
144-
### New articles
145-
146-
- [TOTP display control](display-control-time-based-one-time-password.md)
147-
- [Set up sign-up and sign-in with a SwissID account using Azure Active Directory B2C](identity-provider-swissid.md)
148-
- [Set up sign-up and sign-in with a PingOne account using Azure Active Directory B2C](identity-provider-ping-one.md)
149-
- [Tutorial: Configure Haventec with Azure Active Directory B2C for single step, multifactor passwordless authentication](partner-haventec.md)
150-
- [Tutorial: Acquire an access token for calling a web API in Azure AD B2C](tutorial-acquire-access-token.md)
151-
- [Tutorial: Sign in and sign out users with Azure AD B2C in a Node.js web app](tutorial-authenticate-nodejs-web-app-msal.md)
152-
- [Tutorial: Call a web API protected with Azure AD B2C](tutorial-call-api-with-access-token.md)
153-
154-
### Updated articles
155-
156-
- [About claim resolvers in Azure Active Directory B2C custom policies](claim-resolver-overview.md)
157-
- [Azure Active Directory B2C service limits and restrictions](service-limits.md)
158-
- [Add Conditional Access to user flows in Azure Active Directory B2C](conditional-access-user-flow.md)
159-
- [Display controls](display-controls.md)
160-
- ['Azure AD B2C: Frequently asked questions (FAQ)'](faq.yml)
161-
- [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-operations.md)
162-
- [Define an Azure AD MFA technical profile in an Azure AD B2C custom policy](multi-factor-auth-technical-profile.md)
163-
- [Enable multifactor authentication in Azure Active Directory B2C](multi-factor-authentication.md)
164-
- [String claims transformations](string-transformations.md)
157+
- [Add AD FS as a SAML identity provider using custom policies in Azure Active Directory B2C](identity-provider-adfs-saml.md)

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The following table outlines when an authentication method can be used during a
6262

6363
| Method | Primary authentication | Secondary authentication |
6464
|--------------------------------|:----------------------:|:-------------------------:|
65-
| Windows Hello for Business | Yes | MFA |
65+
| Windows Hello for Business | Yes | MFA\* |
6666
| Microsoft Authenticator app | Yes | MFA and SSPR |
6767
| FIDO2 security key | Yes | MFA |
6868
| OATH hardware tokens (preview) | No | MFA and SSPR |
@@ -71,6 +71,8 @@ The following table outlines when an authentication method can be used during a
7171
| Voice call | No | MFA and SSPR |
7272
| Password | Yes | |
7373

74+
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work sucessfully.
75+
7476
All of these authentication methods can be configured in the Azure portal, and increasingly using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
7577

7678
To learn more about how each authentication method works, see the following separate conceptual articles:

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/16/2021
9+
ms.date: 08/01/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -26,7 +26,7 @@ The Azure AD multifactor authentication service has datacenters in the United St
2626

2727
* Multifactor authentication phone calls originate from datacenters in the customer's region and are routed by global providers. Phone calls using custom greetings always originate from data centers in the United States.
2828
* General purpose user authentication requests from other regions are currently processed based on the user's location.
29-
* Push notifications that use the Microsoft Authenticator app are currently processed in regional datacenters based on the user's location. Vendor-specific device services, such as Apple Push Notification Service, might be outside the user's location.
29+
* Push notifications that use the Microsoft Authenticator app are currently processed in regional datacenters based on the user's location. Vendor-specific device services, such as Apple Push Notification Service or Google Firebase Cloud Messaging, might be outside the user's location.
3030

3131
## Personal data stored by Azure AD multifactor authentication
3232

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 05/04/2022
9+
ms.date: 07/06/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -30,7 +30,7 @@ This document focuses on enabling FIDO2 security key based passwordless authenti
3030
| [Azure AD joined devices](../devices/concept-azure-ad-join.md) require Windows 10 version 1909 or higher | X | |
3131
| [Hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md) require Windows 10 version 2004 or higher | | X |
3232
| Fully patched Windows Server 2016/2019 Domain Controllers. | | X |
33-
| [Azure AD Connect](../hybrid/how-to-connect-install-roadmap.md#install-azure-ad-connect) version 1.4.32.0 or later | | X |
33+
| [Azure AD Hybrid Authentication Management module](https://www.powershellgallery.com/packages/AzureADHybridAuthenticationManagement/2.1.1.0) | | X |
3434
| [Microsoft Endpoint Manager](/intune/fundamentals/what-is-intune) (Optional) | X | X |
3535
| Provisioning package (Optional) | X | X |
3636
| Group Policy (Optional) | | X |

0 commit comments

Comments
 (0)