Skip to content

Commit fb3fed5

Browse files
authored
Merge branch 'main' into 0111-Update_adf_mysql_v2
2 parents dcfe69f + 5456dbd commit fb3fed5

File tree

4,928 files changed

+52491
-42610
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,928 files changed

+52491
-42610
lines changed

.openpublishing.publish.config.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1217,6 +1217,7 @@
12171217
".openpublishing.redirection.json",
12181218
".openpublishing.redirection.key-vault.json",
12191219
".openpublishing.redirection.machine-configuration.json",
1220+
".openpublishing.redirection.marketplace.json",
12201221
".openpublishing.redirection.openshift.json",
12211222
".openpublishing.redirection.security-benchmark.json",
12221223
".openpublishing.redirection.sql-database.json",
@@ -1264,11 +1265,11 @@
12641265
"articles/iot-hub/.openpublishing.redirection.iot-hub.json",
12651266
"articles/iot-operations/.openpublishing.redirection.iot-operations.json",
12661267
"articles/load-testing/.openpublishing.redirection.azure-load-testing.json",
1268+
"articles/lab-services/.openpublishing.redirection.lab-services.json",
12671269
"articles/logic-apps/.openpublishing.redirection.logic-apps.json",
12681270
"articles/machine-learning/.openpublishing.redirection.machine-learning.json",
12691271
"articles/machine-learning/v1/.openpublishing.redirection.machine-learning-v1.json",
12701272
"articles/mariadb/.openpublishing.redirection.mariadb.json",
1271-
"articles/marketplace/.openpublishing.redirection.marketplace.json",
12721273
"articles/mysql/.openpublishing.redirection.mysql.json",
12731274
"articles/network-watcher/.openpublishing.redirection.network-watcher.json",
12741275
"articles/object-anchors/.openpublishing.redirection.object-anchors.json",
@@ -1277,7 +1278,9 @@
12771278
"articles/purview/.openpublishing.redirection.purview.json",
12781279
"articles/route-server/.openpublishing.redirection.route-server.json",
12791280
"articles/sap/.openpublishing.redirection.sap.json",
1281+
"articles/security/.openpublishing.redirection.security.json",
12801282
"articles/service-bus-messaging/.openpublishing.redirection.service-bus-messaging.json",
1283+
"articles/site-recovery/.openpublishing.redirection.site-recovery.json",
12811284
"articles/spatial-anchors/.openpublishing.redirection.spatial-anchors.json",
12821285
"articles/spring-apps/.openpublishing.redirection.spring-apps.json",
12831286
"articles/spring-cloud/.openpublishing.redirection.spring-cloud.json",

.openpublishing.redirection.app-service.json

Lines changed: 2642 additions & 147 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.azure-monitor.json

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6573,7 +6573,16 @@
65736573
"source_path_from_root": "/articles/azure-monitor/logs/data-collection-rule-sample-custom-logs.md",
65746574
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-samples",
65756575
"redirect_document_id": false
6576+
},
6577+
{
6578+
"source_path_from_root": "/articles/azure-monitor/agents/data-collection-rule-sample-agent.md",
6579+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-rule-samples",
6580+
"redirect_document_id": false
6581+
},
6582+
{
6583+
"source_path_from_root": "/articles/azure-monitor/containers/resource-manager-container-insights.md",
6584+
"redirect_url": "/azure/azure-monitor/containers/kubernetes-monitoring-enable?tabs=arm#enable-container-insights",
6585+
"redirect_document_id": false
65766586
}
6577-
65786587
]
65796588
}

.openpublishing.redirection.json

Lines changed: 4682 additions & 10246 deletions
Large diffs are not rendered by default.

articles/marketplace/.openpublishing.redirection.marketplace.json renamed to .openpublishing.redirection.marketplace.json

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1832,7 +1832,7 @@
18321832
},
18331833
{
18341834
"source_path_from_root": "/articles/marketplace/partner-center-portal/get-paid.md",
1835-
"redirect_url": "/partner-center/marketplace-get-paid?context=/azure/marketplace/context/context",
1835+
"redirect_url": "/partner-center/marketplace-get-paid",
18361836
"redirect_document_id": false
18371837
},
18381838
{
@@ -1887,22 +1887,22 @@
18871887
},
18881888
{
18891889
"source_path_from_root": "/articles/marketplace/partner-center-portal/payment-thresholds-methods-timeframes.md",
1890-
"redirect_url": "/partner-center/payment-thresholds-methods-timeframes?context=/azure/marketplace/context/context",
1890+
"redirect_url": "/partner-center/payment-thresholds-methods-timeframes",
18911891
"redirect_document_id": false
18921892
},
18931893
{
18941894
"source_path_from_root": "/articles/marketplace/partner-center-portal/payout-policy-details.md",
1895-
"redirect_url": "/partner-center/payout-policy-details?context=/azure/marketplace/context/context",
1895+
"redirect_url": "/partner-center/payout-policy-details",
18961896
"redirect_document_id": false
18971897
},
18981898
{
18991899
"source_path_from_root": "/articles/marketplace/partner-center-portal/payout-summary-overview.md",
1900-
"redirect_url": "/partner-center/payout-statement?context=/azure/marketplace/context/context",
1900+
"redirect_url": "/partner-center/payout-statement",
19011901
"redirect_document_id": false
19021902
},
19031903
{
19041904
"source_path_from_root": "/articles/marketplace/partner-center-portal/payout-summary.md",
1905-
"redirect_url": "/partner-center/payout-statement?context=/azure/marketplace/context/context",
1905+
"redirect_url": "/partner-center/payout-statement",
19061906
"redirect_document_id": false
19071907
},
19081908
{
@@ -1917,7 +1917,7 @@
19171917
},
19181918
{
19191919
"source_path_from_root": "/articles/marketplace/partner-center-portal/set-up-your-payout-account-tax-forms.md",
1920-
"redirect_url": "/partner-center/set-up-your-payout-account?context=/azure/marketplace/context/context",
1920+
"redirect_url": "/partner-center/set-up-your-payout-account",
19211921
"redirect_document_id": false
19221922
},
19231923
{
@@ -1932,7 +1932,7 @@
19321932
},
19331933
{
19341934
"source_path_from_root": "/articles/marketplace/partner-center-portal/tax-details-paid-transactions.md",
1935-
"redirect_url": "/partner-center/tax-details-marketplace?context=/azure/marketplace/context/context",
1935+
"redirect_url": "/partner-center/tax-details-marketplace",
19361936
"redirect_document_id": false
19371937
},
19381938
{
@@ -2022,7 +2022,7 @@
20222022
},
20232023
{
20242024
"source_path_from_root": "/articles/marketplace/company-work-accounts.md",
2025-
"redirect_url": "/partner-center/azure-active-directory-tenants-and-partner-center?context=/azure/marketplace/context/context",
2025+
"redirect_url": "/partner-center/azure-active-directory-tenants-and-partner-center",
20262026
"redirect_document_id": false
20272027
},
20282028
{
@@ -3454,6 +3454,11 @@
34543454
"source_path_from_root": "/articles/marketplace/partner-center-portal/saas-fulfillment-apis-faq.yml",
34553455
"redirect_url": "/partner-center/marketplace/partner-center-portal/saas-fulfillment-apis-faq",
34563456
"redirect_document_id": false
3457+
},
3458+
{
3459+
"source_path_from_root": "/articles/marketplace/context/context.yml",
3460+
"redirect_url": "/partner-center/marketplace/",
3461+
"redirect_document_id": false
34573462
}
34583463
]
34593464
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -369,6 +369,11 @@
369369
"source_path_from_root": "/articles/virtual-desktop/publish-applications.md",
370370
"redirect_url": "/azure/virtual-desktop/publish-applications-stream-remoteapp",
371371
"redirect_document_id": false
372+
},
373+
{
374+
"source_path_from_root": "/articles/virtual-desktop/autoscale-new-existing-host-pool.md",
375+
"redirect_url": "/azure/virtual-desktop/autoscale-scaling-plan",
376+
"redirect_document_id": true
372377
}
373378
]
374379
}

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,10 @@
11
---
22
title: Token enrichment - Azure Active Directory B2C
33
description: Enrich tokens with claims from external identity data sources using APIs or outbound webhooks.
4-
54
author: garrodonnell
65
manager: CelesteDG
7-
86
ms.service: active-directory
9-
10-
ms.custom:
117
ms.topic: how-to
12-
138
ms.date: 01/17/2023
149
ms.author: godonnell
1510
ms.subservice: B2C

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: reference
12-
ms.date: 01/11/2024
12+
ms.date: 01/17/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

1616

17-
#Customer intent: As a developer using Azure Active Directory B2C custom policies, I want to understand how to use claim resolvers in my technical profiles, so that I can provide context information about authorization requests and populate claims with dynamic values.
17+
#Customer intent: As a developer using Azure AD B2C custom policies, I want to understand how to use claim resolvers in my technical profiles, so that I can provide context information about authorization requests and populate claims with dynamic values.
1818

1919
---
2020

@@ -122,6 +122,17 @@ Any parameter name included as part of an OIDC or OAuth2 request can be mapped t
122122
| {OAUTH-KV:loyalty_number} | A query string parameter. | 1234 |
123123
| {OAUTH-KV:any custom query string} | A query string parameter. | N/A |
124124

125+
## SAML key-value parameters
126+
127+
In a SAML authentication request, any parameter name that's included in the request, but isn’t specific to the protocol (such as SAMLRequest) can be mapped to a claim in the user journey. For example, the request may include a custom parameter such as `username`. This applies to both SP-Initiated and IDP-Initiated SAML requests.
128+
129+
| Claim | Description | Example |
130+
| ----- | ----------------------- | --------|
131+
| {SAML-KV:username} | A query string or POST body parameter. | [email protected] |
132+
| {SAML-KV:loyalty_number} | A query string or POST body parameter. | 1234 |
133+
| {SAML-KV:any custom query string} | A query string or POST body parameter. | N/A |
134+
135+
125136
## SAML
126137

127138
The following table lists the claim resolvers with information about the SAML authorization request:

articles/active-directory-b2c/conditional-access-identity-protection-overview.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,15 @@
11
---
22
title: Identity Protection and Conditional Access in Azure AD B2C
33
description: Learn how Identity Protection gives you visibility into risky sign-ins and risk detections. Find out how and Conditional Access lets you enforce organizational policies based on risk events in your Azure AD B2C tenants.
4-
54
ms.service: active-directory
65
ms.subservice: conditional-access
76
ms.topic: overview
87
ms.date: 01/11/2024
9-
108
ms.author: kengaderdus
119
author: kengaderdus
1210
manager: CelesteDG
13-
1411
ms.collection: M365-identity-device-management
1512

16-
1713
#Customer intent: As an Azure AD B2C application owner, I want to enhance the security of my applications by using Identity Protection and Conditional Access, so that I can detect and respond to risky authentications and enforce organizational policies.
1814

1915
---

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Configure authentication in a sample Node.js web application by using Azure Active Directory B2C (Azure AD B2C)
3-
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Node.js web application.
3+
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Node.js web application.
44
titleSuffix: Azure AD B2C
55

66
author: kengaderdus
77
manager: CelesteDG
88
ms.service: active-directory
99

10-
ms.custom: devx-track-js, devx-track-linux
10+
ms.custom: devx-track-js, linux-related-content
1111
ms.topic: how-to
1212
ms.date: 01/11/2024
1313
ms.author: kengaderdus
@@ -20,14 +20,14 @@ ms.subservice: B2C
2020

2121
# Configure authentication in a sample Node.js web application by using Azure Active Directory B2C
2222

23-
This sample article uses a sample Node.js application to show how to add Azure Active Directory B2C (Azure AD B2C) authentication to a Node.js web application. The sample application enables users to sign in, sign out, update profile and reset password using Azure AD B2C user flows. The sample web application uses [Microsoft Authentication Library (MSAL) for Node](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node) to handle authentication and authorization.
23+
This sample article uses a sample Node.js application to show how to add Azure Active Directory B2C (Azure AD B2C) authentication to a Node.js web application. The sample application enables users to sign in, sign out, update profile and reset password using Azure AD B2C user flows. The sample web application uses [Microsoft Authentication Library (MSAL) for Node](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node) to handle authentication and authorization.
2424

2525
In this article, you’ll do the following tasks:
2626

2727
- Register a web application in the Azure portal.
2828
- Create combined **Sign in and sign up**, **Profile editing**, and **Password reset** user flows for the app in the Azure portal.
2929
- Update a sample Node application to use your own Azure AD B2C application and user flows.
30-
- Test the sample application.
30+
- Test the sample application.
3131

3232
## Prerequisites
3333

@@ -37,15 +37,15 @@ In this article, you’ll do the following tasks:
3737

3838
## Step 1: Configure your user flows
3939

40-
[!INCLUDE [active-directory-b2c-app-integration-add-user-flow](../../includes/active-directory-b2c-app-integration-add-user-flow.md)]
40+
[!INCLUDE [active-directory-b2c-app-integration-add-user-flow](../../includes/active-directory-b2c-app-integration-add-user-flow.md)]
4141

4242
## Step 2: Register a web application
4343

44-
To enable your application sign in with Azure AD B2C, register your app in the Azure AD B2C directory. The app registration establishes a trust relationship between the app and Azure AD B2C.
44+
To enable your application sign in with Azure AD B2C, register your app in the Azure AD B2C directory. The app registration establishes a trust relationship between the app and Azure AD B2C.
4545

46-
During app registration, you'll specify the *Redirect URI*. The redirect URI is the endpoint to which the user is redirected by Azure AD B2C after they authenticate with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, that uniquely identifies your app. After your app is registered, Azure AD B2C uses both the application ID, and the redirect URI to create authentication requests.
46+
During app registration, you'll specify the *Redirect URI*. The redirect URI is the endpoint to which the user is redirected by Azure AD B2C after they authenticate with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, that uniquely identifies your app. After your app is registered, Azure AD B2C uses both the application ID, and the redirect URI to create authentication requests.
4747

48-
### Step 2.1: Register the app
48+
### Step 2.1: Register the app
4949

5050
To register the web app, follow these steps:
5151

@@ -54,7 +54,7 @@ To register the web app, follow these steps:
5454
1. In the Azure portal, search for and select **Azure AD B2C**.
5555
1. Select **App registrations**, and then select **New registration**.
5656
1. Under **Name**, enter a name for the application (for example, *webapp1*).
57-
1. Under **Supported account types**, select **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**.
57+
1. Under **Supported account types**, select **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**.
5858
1. Under **Redirect URI**, select **Web** and then, in the URL box, enter `http://localhost:3000/redirect`.
5959
1. Under **Permissions**, select the **Grant admin consent to openid and offline_access permissions** checkbox.
6060
1. Select **Register**.
@@ -106,7 +106,7 @@ The `views` folder contains Handlebars files for the application's user interfac
106106

107107
## Step 5: Configure the sample web app
108108

109-
Open your web app in a code editor such as Visual Studio Code. Under the project root folder, open the *.env* file. This file contains information about your Azure AD B2C identity provider. Update the following app settings properties:
109+
Open your web app in a code editor such as Visual Studio Code. Under the project root folder, open the *.env* file. This file contains information about your Azure AD B2C identity provider. Update the following app settings properties:
110110

111111
|Key |Value |
112112
|---------|---------|
@@ -129,7 +129,7 @@ Your final configuration file should look like the following sample:
129129
You can now test the sample app. You need to start the Node server and access it through your browser on `http://localhost:3000`.
130130

131131
1. In your terminal, run the following code to start the Node.js web server:
132-
132+
133133
```bash
134134
node index.js
135135
```
@@ -147,19 +147,19 @@ You can now test the sample app. You need to start the Node server and access it
147147

148148
### Test profile editing
149149

150-
1. After you sign in, select **Edit profile**.
151-
1. Enter new changes as required, and then select **Continue**. You should see the page with sign-in status with the new changes, such as **Given Name**.
150+
1. After you sign in, select **Edit profile**.
151+
1. Enter new changes as required, and then select **Continue**. You should see the page with sign-in status with the new changes, such as **Given Name**.
152152

153153
### Test password reset
154154

155-
1. After you sign in, select **Reset password**.
155+
1. After you sign in, select **Reset password**.
156156
1. In the next dialog that appears, you can cancel the operation by selecting **Cancel**. Alternatively, enter your email address, and then select **Send verification code**. You'll receive a verification code to your email account. Copy the verification code in your email, enter it into the password reset dialog, and then select **Verify code**.
157157
1. Select **Continue**.
158158
1. Enter your new password, confirm it, and then select **Continue**. You should see the page that shows sign-in status.
159159
160160
### Test sign-out
161161
162-
After you sign in, select **Sign out**. You should see the page that has a **Sign in** button.
162+
After you sign in, select **Sign out**. You should see the page that has a **Sign in** button.
163163
164164
## Next steps
165165

0 commit comments

Comments
 (0)