Skip to content

Commit fa7b2b8

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into RESTUI
2 parents db1be9d + bc1eea9 commit fa7b2b8

File tree

4,298 files changed

+39245
-21372
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,298 files changed

+39245
-21372
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -990,6 +990,7 @@
990990
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
991991
"articles/azure-relay/.openpublishing.redirection.relay.json",
992992
"articles/communication-services/.openpublishing.redirection.communication-services.json",
993+
"articles/confidential-computing/.openpublishing.redirection.json",
993994
"articles/cosmos-db/.openpublishing.redirection.cosmos-db.json",
994995
"articles/cost-management-billing/.openpublishing.redirection.cost-management-billing.json",
995996
"articles/data-catalog/.openpublishing.redirection.data-catalog.json",

.openpublishing.redirection.active-directory.json

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@
5757
},
5858
{
5959
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-create-trust-github.md",
60-
"redirect_url":"/azure/active-directory/develop/workload-identity-federation-create-trust",
60+
"redirect_url": "/azure/active-directory/develop/workload-identity-federation-create-trust",
6161
"redirect_document_id": false
6262
},
6363
{
@@ -2038,7 +2038,7 @@
20382038
{
20392039
"source_path_from_root": "/articles/active-directory/conditional-access/conditional-access-for-exo-and-spo.md",
20402040
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
2041-
"redirect_document_id": true
2041+
"redirect_document_id": false
20422042
},
20432043
{
20442044
"source_path_from_root": "/articles/active-directory/conditional-access/baseline-protection.md",
@@ -2800,7 +2800,7 @@
28002800
"redirect_url": "/azure/active-directory/develop/howto-authenticate-service-principal-powershell",
28012801
"redirect_document_id": false
28022802
},
2803-
2803+
28042804
{
28052805
"source_path_from_root": "/articles/active-directory/develop/active-directory-devhowto-multi-tenant-overview.md",
28062806
"redirect_url": "/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant",
@@ -4253,7 +4253,12 @@
42534253
},
42544254
{
42554255
"source_path_from_root": "/articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md",
4256-
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication",
4256+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
4257+
"redirect_document_id": false
4258+
},
4259+
{
4260+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication.md",
4261+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
42574262
"redirect_document_id": true
42584263
},
42594264
{
@@ -10835,6 +10840,11 @@
1083510840
"source_path_from_root": "/articles/active-directory/manage-apps/recover-deleted-apps-faq.md",
1083610841
"redirect_url": "/azure/active-directory/manage-apps/delete-recover-faq",
1083710842
"redirect_document_id": false
10843+
},
10844+
{
10845+
"source_path_from_root": "/articles/azure-percept/voice-control-your-inventory-then-visualize-with-power-bi-dashboard.md",
10846+
"redirect_url": "/azure-docs/articles/azure-percept/index.yml",
10847+
"redirect_document_id": false
1083810848
}
1083910849

1084010850

.openpublishing.redirection.json

Lines changed: 47 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,11 @@
3030
"redirect_url": "/previous-versions/azure/germany/germany-get-started-connect-with-ps",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path": "articles/security/fundamentals/azure-disk-encryption-vms-vmss.md",
35+
"redirect_url": "/azure/virtual-machines/disk-encryption-overview",
36+
"redirect_document_id": false
37+
},
3338
{
3439
"source_path": "articles/germany/germany-get-started-connect-with-vs.md",
3540
"redirect_url": "/previous-versions/azure/germany/germany-get-started-connect-with-vs",
@@ -5788,6 +5793,11 @@
57885793
"redirect_url": "/azure/automation/manage-run-as-account",
57895794
"redirect_document_id": false
57905795
},
5796+
{
5797+
"source_path_from_root": "/articles/automation/quickstarts/create-account-portal.md",
5798+
"redirect_url": "/azure/automation/create-azure-automation-account-portal",
5799+
"redirect_document_id": false
5800+
},
57915801
{
57925802
"source_path_from_root": "/articles/best-practices-availability-paired-regions.md",
57935803
"redirect_url": "/azure/availability-zones/cross-region-replication-azure",
@@ -6803,6 +6813,11 @@
68036813
"redirect_url": "/azure/azure-functions/functions-bindings-error-pages",
68046814
"redirect_document_id": false
68056815
},
6816+
{
6817+
"source_path_from_root": "/articles/azure-functions/functions-debug-event-grid-trigger-local.md",
6818+
"redirect_url": "/azure/azure-functions/functions-event-grid-blob-trigger",
6819+
"redirect_document_id": false
6820+
},
68066821
{
68076822
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
68086823
"redirect_url": "/azure/azure-government",
@@ -12843,6 +12858,16 @@
1284312858
"redirect_url": "/azure/cloudfoundry/cloudfoundry-deploy-your-first-app",
1284412859
"redirect_document_id": true
1284512860
},
12861+
{
12862+
"source_path_from_root": "/articles/virtual-machines/linux/overview.md",
12863+
"redirect_url": "/azure/virtual-machines/overview",
12864+
"redirect_document_id": true
12865+
},
12866+
{
12867+
"source_path_from_root": "/articles/virtual-machines/windows/overview.md",
12868+
"redirect_url": "/azure/virtual-machines/overview",
12869+
"redirect_document_id": false
12870+
},
1284612871
{
1284712872
"source_path_from_root": "/articles/virtual-machines/linux/cloudfoundry-get-started.md",
1284812873
"redirect_url": "/azure/cloudfoundry/cloudfoundry-get-started",
@@ -18299,9 +18324,24 @@
1829918324
"redirect_document_id": false
1830018325
},
1830118326
{
18302-
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
18327+
"source_path_from_root": "/articles/connectors/connectors-create-api-bingsearch.md",
1830318328
"redirect_url": "/connectors/bingsearch",
18304-
"redirect_document_id": false
18329+
"redirect_document_id": false
18330+
},
18331+
{
18332+
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18333+
"redirect_url": "/connectors/twilio",
18334+
"redirect_document_id": false
18335+
},
18336+
{
18337+
"source_path_from_root": "/articles/connectors/connectors-create-api-sendgrid.md",
18338+
"redirect_url": "/connectors/sendgrid",
18339+
"redirect_document_id": false
18340+
},
18341+
{
18342+
"source_path_from_root": "/articles/connectors/connectors-schema-migration.md",
18343+
"redirect_url": "/azure/logic-apps/update-consumption-workflow-schema",
18344+
"redirect_document_id": false
1830518345
},
1830618346
{
1830718347
"source_path_from_root": "/articles/logic-apps/logic-apps-scenario-error-and-exception-handling.md",
@@ -34187,6 +34227,11 @@
3418734227
"source_path_from_root": "/articles/virtual-machines/windows/winrm.md",
3418834228
"redirect_url": "/azure/virtual-machines/windows/connect-winrm",
3418934229
"redirect_document_id": false
34230+
},
34231+
{
34232+
"source_path_from_root": "/articles/virtual-machines/linux/copy-files-to-linux-vm-using-scp.md",
34233+
"redirect_url": "/azure/virtual-machines/copy-files-to-vm-using-scp",
34234+
"redirect_document_id": false
3419034235
}
3419134236
]
3419234237
}

articles/active-directory-b2c/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@
355355
items:
356356
- name: Multi-factor authentication
357357
href: multi-factor-authentication.md
358-
displayName: TOTP, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
358+
displayName: TOTP, multi-factor, multifactor, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
359359
- name: Partner integration
360360
items:
361361
- name: Asignio
@@ -482,6 +482,8 @@
482482
- name: Identity verification and proofing partners
483483
href: identity-verification-proofing.md
484484
displayName: id verify, id verification, azure ad b2c proofing, id proofing
485+
- name: Deduce
486+
href: partner-deduce.md
485487
- name: eID-Me
486488
href: partner-eid-me.md
487489
- name: Experian

articles/active-directory-b2c/configure-authentication-in-azure-static-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 06/28/2022
10+
ms.date: 08/22/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -30,7 +30,7 @@ OpenID Connect (OIDC) is an authentication protocol that's built on OAuth 2.0. U
3030
When the access token expires or the app session is invalidated, Azure Static Web App initiates a new authentication request and redirects users to Azure AD B2C. If the Azure AD B2C [SSO session](session-behavior.md) is active, Azure AD B2C issues an access token without prompting users to sign in again. If the Azure AD B2C session expires or becomes invalid, users are prompted to sign in again.
3131

3232
## Prerequisites
33-
33+
- A premium Azure subscription.
3434
- If you haven't created an app yet, follow the guidance how to create an [Azure Static Web App](../static-web-apps/overview.md).
3535
- Familiarize yourself with the Azure Static Web App [staticwebapp.config.json](../static-web-apps/configuration.md) configuration file.
3636
- Familiarize yourself with the Azure Static Web App [App Settings](../static-web-apps/application-settings.md).

articles/active-directory-b2c/identity-verification-proofing.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ Microsoft partners with the following ISV partners.
2727

2828
| ISV partner | Description and integration walkthroughs |
2929
|:-------------------------|:--------------|
30+
| ![Screenshot of a deduce logo.](./media/partner-gallery/deduce-logo.png) | [Deduce](./partner-deduce.md) is an identity verification and proofing provider focused on stopping account takeover and registration fraud. It helps combat identity fraud and creates a trusted user experience. |
3031
| ![Screenshot of a eid-me logo](./media/partner-gallery/eid-me-logo.png) | [eID-Me](./partner-eid-me.md) is an identity verification and decentralized digital identity solution for Canadian citizens. It enables organizations to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |
3132
|![Screenshot of an Experian logo.](./media/partner-gallery/experian-logo.png) | [Experian](./partner-experian.md) is an Identity verification and proofing provider that performs risk assessments based on user attributes to prevent fraud. |
3233
|![Screenshot of an IDology logo.](./media/partner-gallery/idology-logo.png) | [IDology](./partner-idology.md) is an Identity verification and proofing provider with ID verification solutions, fraud prevention solutions, compliance solutions, and others.|

articles/active-directory-b2c/json-transformations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ The following example generates a JSON string based on the claim value of "email
152152
<InputClaims>
153153
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.to.0.email" />
154154
<InputClaim ClaimTypeReferenceId="otp" TransformationClaimType="personalizations.0.dynamic_template_data.otp" />
155-
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
155+
<InputClaim ClaimTypeReferenceId="copiedEmail" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
156156
</InputClaims>
157157
<InputParameters>
158158
<InputParameter Id="template_id" DataType="string" Value="d-4c56ffb40fa648b1aa6822283df94f60"/>
@@ -169,6 +169,7 @@ The following claims transformation outputs a JSON string claim that will be the
169169

170170
- Input claims:
171171
- **email**, transformation claim type **personalizations.0.to.0.email**: "[email protected]"
172+
- **copiedEmail**, transformation claim type **personalizations.0.dynamic_template_data.verify-email**: "[email protected]"
172173
- **otp**, transformation claim type **personalizations.0.dynamic_template_data.otp** "346349"
173174
- Input parameter:
174175
- **template_id**: "d-4c56ffb40fa648b1aa6822283df94f60"
111 KB
Loading
5.61 KB
Loading

articles/active-directory-b2c/openid-connect.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/12/2022
11+
ms.date: 08/12/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -43,7 +43,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
4343
&response_type=code+id_token
4444
&redirect_uri=https%3A%2F%2Fjwt.ms%2F
4545
&response_mode=fragment
46-
&scope=&scope=openid%20offline_access%20{application-id-uri}/{scope-name}
46+
&scope=openid%20offline_access%20{application-id-uri}/{scope-name}
4747
&state=arbitrary_data_you_can_receive_in_the_response
4848
&nonce=12345
4949
```

0 commit comments

Comments
 (0)