Skip to content

Commit fb922f7

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into frontingfaq
2 parents e72d384 + b8cfb2c commit fb922f7

File tree

96 files changed

+868
-985
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

96 files changed

+868
-985
lines changed

.openpublishing.redirection.api-management.json

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,50 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/api-management/powershell-samples.md",
5+
"redirect_url": "https://github.com/Azure/azure-docs-powershell-samples",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/api-management/scripts/powershell-add-user-and-get-subscription-key.md",
10+
"redirect_url": "https://github.com/Azure/azure-docs-powershell-samples",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/api-management/scripts/powershell-create-apim-service.md",
15+
"redirect_url": "https://github.com/Azure/azure-docs-powershell-samples",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/api-management/scripts/powershell-backup-restore-apim-service.md",
20+
"redirect_url": "https://github.com/Azure/azure-docs-powershell-samples",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/api-management/scripts/powershell-scale-and-addregion-apim-service.md",
25+
"redirect_url": "https://github.com/Azure/azure-docs-powershell-samples",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/api-management/scripts/powershell-setup-custom-domain.md",
30+
"redirect_url": "https://github.com/Azure/azure-docs-powershell-samples",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path_from_root": "/articles/api-management/scripts/powershell-import-api-and-add-to-product.md",
35+
"redirect_url": "https://github.com/Azure/azure-docs-powershell-samples",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/api-management/scripts/powershell-secure-backend-with-mutual-certificate-authentication.md",
40+
"redirect_url": "https://github.com/Azure/azure-docs-powershell-samples",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/api-management/scripts/powershell-setup-rate-limit-policy.md",
45+
"redirect_url": "https://github.com/Azure/azure-docs-powershell-samples",
46+
"redirect_document_id": false
47+
},
348
{
449
"source_path_from_root": "/articles/api-management/policies/authorize-request-using-external-authorizer.md",
550
"redirect_url": "https://github.com/Azure/api-management-policy-snippets",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -910,6 +910,11 @@
910910
"redirect_url": "/azure/databox-online/azure-stack-edge-powershell-based-configuration",
911911
"redirect_document_id": false
912912
},
913+
{
914+
"source_path": "articles/databox-online/azure-stack-edge-gpu-2307-release-notes.md",
915+
"redirect_url": "/azure/databox-online/azure-stack-edge-gpu-2309-release-notes",
916+
"redirect_document_id": false
917+
},
913918
{
914919
"source_path": "articles/azure-video-analyzer/video-analyzer-docs/access-policies.md",
915920
"redirect_url": "/previous-versions/azure/azure-video-analyzer/video-analyzer-docs/access-policies",

articles/active-directory-b2c/troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,12 +29,12 @@ This error occurs when the [self-service password reset experience](add-password
2929

3030
There are 2 solutions to this problem:
3131
- Respond back with a new authentication request using Azure AD B2C password reset user flow.
32-
- Use recommended [self service password resect (SSPR) experience](add-password-reset-policy.md#self-service-password-reset-recommended).
32+
- Use recommended [self service password reset (SSPR) experience](add-password-reset-policy.md#self-service-password-reset-recommended).
3333

3434

3535
## User canceled the operation
3636
Azure AD B2C service can also return an error to your application when a user cancels an operation. The following are examples of scenarios where a user performs a cancel operation:
37-
- A user policy uses the recommended [self service password resect (SSPR) experience](add-password-reset-policy.md#self-service-password-reset-recommended) with a consumer local account. The user selects the **Forgot your password?** link , and then selects **Cancel** button before the user flow experience completes. In this case, Azure AD B2C service returns error code `AADB2C90091` to your application.
37+
- A user policy uses the recommended [self service password reset (SSPR) experience](add-password-reset-policy.md#self-service-password-reset-recommended) with a consumer local account. The user selects the **Forgot your password?** link , and then selects **Cancel** button before the user flow experience completes. In this case, Azure AD B2C service returns error code `AADB2C90091` to your application.
3838
- A user chooses to authenticate with an external identity provider such as [LinkedIn](identity-provider-linkedin.md). The user select **Cancel** button before authenticating to the identity provider itself. In this case, Azure AD B2C service returns error code `AADB2C90273` to your application. Learn more about [error codes Azure Active Directory B2C service return](error-codes.md).
3939

4040
To handle this error, fetch the **error description** for the user and respond back with a new authentication request using the same user flow.

articles/active-directory/app-provisioning/inbound-provisioning-api-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 06/22/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: chmutali
1414
---

articles/active-directory/app-provisioning/inbound-provisioning-api-curl-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 07/07/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: cmmdesai
1414
---

articles/active-directory/app-provisioning/inbound-provisioning-api-faqs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 06/26/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: chmutali
1414
---
@@ -158,7 +158,7 @@ Yes, you can soft-delete a user by using the **DELETE** method in the bulk reque
158158
To prevent and recover from accidental deletions, we recommend [configuring accidental deletion threshold](accidental-deletions.md) in the provisioning app and [enabling the on-premises Active Directory recycle bin](../hybrid/connect/how-to-connect-sync-recycle-bin.md). In your provisioning app's **Attribute Mapping** blade, under **Target object actions** disable the **Delete** operation.
159159

160160
**Recovering deleted accounts**
161-
* If the target directory for the operation is Microsoft Entra ID, then the matched user is soft-deleted. The user can be seen on the Microsoft Azure portal **Deleted users** page for the next 30 days and can be restored during that time.
161+
* If the target directory for the operation is Microsoft Entra ID, then the matched user is soft-deleted. The user can be seen on the Microsoft Entra admin center **Deleted users** page for the next 30 days and can be restored during that time.
162162
* If the target directory for the operation is on-premises Active Directory, then the matched user is hard-deleted. If the **Active Directory Recycle Bin** is enabled, you can restore the deleted on-premises AD user object.
163163

164164
## Do we need to send all users from the HR system in every request?

articles/active-directory/app-provisioning/inbound-provisioning-api-grant-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ This configuration registers an app in Microsoft Entra ID that represents the ex
5151
This section describes how you can assign the necessary permissions to a managed identity.
5252

5353
1. Configure a [managed identity](../managed-identities-azure-resources/overview.md) for use with your Azure resource.
54-
1. Copy the name of your managed identity from the Azure portal. For example: The screenshot below shows the name of a system assigned managed identity associated with an Azure Logic Apps workflow called "CSV2SCIMBulkUpload".
54+
1. Copy the name of your managed identity from the Microsoft Entra admin center. For example: The screenshot below shows the name of a system assigned managed identity associated with an Azure Logic Apps workflow called "CSV2SCIMBulkUpload".
5555

5656
[![Screenshot of managed identity name.](media/inbound-provisioning-api-grant-access/managed-identity-name.png)](media/inbound-provisioning-api-grant-access/managed-identity-name.png#lightbox)
5757

articles/active-directory/app-provisioning/inbound-provisioning-api-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.topic: troubleshooting
99
ms.workload: identity
10-
ms.date: 06/27/2023
10+
ms.date: 09/15/2023
1111
ms.author: kenwith
1212
ms.reviewer: chmutali
1313
---

articles/active-directory/app-provisioning/inbound-provisioning-api-logic-apps.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 07/18/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: cmmdesai
1414
---
@@ -73,7 +73,7 @@ The Logic Apps deployment template published in the [Microsoft Entra inbound pro
7373
## Step 1: Create an Azure Storage account to host the CSV file
7474
The steps documented in this section are optional. If you already have an existing storage account or would like to read the CSV file from another source like SharePoint site or Blob storage, update the Logic App to use your connector of choice.
7575

76-
1. Log in to your Azure portal as administrator.
76+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
7777
1. Search for "Storage accounts" and create a new storage account.
7878
:::image type="content" source="media/inbound-provisioning-api-logic-apps/storage-accounts.png" alt-text="Screenshot of creating new storage account." lightbox="media/inbound-provisioning-api-logic-apps/storage-accounts.png":::
7979
1. Assign a resource group and give it a name.
@@ -89,7 +89,7 @@ The steps documented in this section are optional. If you already have an existi
8989

9090
## Step 2: Configure Azure Function CSV2JSON converter
9191

92-
1. In the browser associated with your Azure portal login, open the GitHub repository URL - https://github.com/joelbyford/CSVtoJSONcore.
92+
1. In the browser associated with your Azure portal, open the GitHub repository URL - https://github.com/joelbyford/CSVtoJSONcore.
9393
1. Click on the link "Deploy to Azure" to deploy this Azure Function to your Azure tenant.
9494
:::image type="content" source="media/inbound-provisioning-api-logic-apps/deploy-azure-function.png" alt-text="Screenshot of deploying Azure Function." lightbox="media/inbound-provisioning-api-logic-apps/deploy-azure-function.png":::
9595
1. Specify the resource group under which to deploy this Azure function.

articles/active-directory/app-provisioning/insufficient-access-rights-error-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.topic: troubleshooting
99
ms.workload: identity
10-
ms.date: 06/27/2023
10+
ms.date: 09/15/2023
1111
ms.author: kenwith
1212
ms.reviewer: chmutali
1313
---

0 commit comments

Comments
 (0)