Skip to content

Commit fcc7434

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-desktoppub-mar23
2 parents 275048e + 7dd85e2 commit fcc7434

File tree

345 files changed

+6939
-3374
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

345 files changed

+6939
-3374
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -914,6 +914,12 @@
914914
"branch": "main",
915915
"branch_mapping": {}
916916
},
917+
{
918+
"path_to_root": "azure-ai-vision-sdk",
919+
"url": "https://github.com/Azure-Samples/azure-ai-vision-sdk",
920+
"branch": "main",
921+
"branch_mapping": {}
922+
},
917923
{
918924
"path_to_root": "azure-cache-redis-samples",
919925
"url": "https://github.com/Azure-Samples/azure-cache-redis-samples",

articles/active-directory-b2c/configure-authentication-sample-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ To create the web app registration, use the following steps:
7575
1. Under **Name**, enter a name for the application (for example, *webapp1*).
7676
1. Under **Supported account types**, select **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**.
7777
1. Under **Redirect URI**, select **Web** and then, in the URL box, enter `https://localhost:44316/signin-oidc`.
78-
1. Under **Implicit grant and hybrid flows**, select the **ID tokens (used for implicit and hybrid flows)** checkbox.
78+
1. Under **Authentication**, go to **Implicit grant and hybrid flows**, select the **ID tokens (used for implicit and hybrid flows)** checkbox.
7979
1. Under **Permissions**, select the **Grant admin consent to openid and offline access permissions** checkbox.
8080
1. Select **Register**.
8181
1. Select **Overview**.

articles/active-directory-domain-services/concepts-custom-attributes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Create and manage custom attributes for Azure AD Domain Services | Microsoft Docs
33
description: Learn how to create and manage custom attributes in an Azure AD DS managed domain.
44
services: active-directory-ds
5-
author: justinha
5+
author: AlexCesarini
66
manager: amycolannino
77

88
ms.assetid: 1a14637e-b3d0-4fd9-ba7a-576b8df62ff2
99
ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 03/06/2023
13+
ms.date: 03/07/2023
1414
ms.author: justinha
1515

1616
---
@@ -44,7 +44,7 @@ After you create a managed domain, click **Custom Attributes (Preview)** under *
4444

4545
## Enable predefined attribute synchronization
4646

47-
Click **OnPremisesExtensionAttributes** to synchronize the attributes extensionAttribute1-15, also known as [Exchange custom attributes](/graph/api/resources/onpremisesextensionattributes?view=graph-rest-1.0).
47+
Click **OnPremisesExtensionAttributes** to synchronize the attributes extensionAttribute1-15, also known as [Exchange custom attributes](/graph/api/resources/onpremisesextensionattributes).
4848

4949
## Synchronize Azure AD directory extension attributes
5050

articles/active-directory/develop/msal-b2c-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 06/05/2020
12+
ms.date: 03/07/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: nacanuma, negoe
1515
ms.custom: aaddev devx-track-js
@@ -20,7 +20,7 @@ ms.custom: aaddev devx-track-js
2020

2121
The [Microsoft Authentication Library for JavaScript (MSAL.js)](https://github.com/AzureAD/microsoft-authentication-library-for-js) enables JavaScript developers to authenticate users with social and local identities using [Azure Active Directory B2C](../../active-directory-b2c/overview.md) (Azure AD B2C).
2222

23-
By using Azure AD B2C as an identity management service, you can customize and control how your customers sign up, sign in, and manage their profiles when they use your applications.
23+
By using Azure AD B2C as an identity management service, you can customize and control how your customers sign up, sign in, and manage their profiles when they use your applications.
2424

2525
Azure AD B2C also enables you to brand and customize the UI that your application displays during the authentication process.
2626

@@ -40,4 +40,4 @@ For more information, see: [Working with Azure AD B2C](https://github.com/AzureA
4040
Follow the tutorial on how to:
4141

4242
- [Sign in users with Azure AD B2C in a single-page application](../../active-directory-b2c/configure-authentication-sample-spa-app.md)
43-
- [Call an Azure AD B2C protected web API](../../active-directory-b2c/enable-authentication-web-api.md)
43+
- [Call an Azure AD B2C protected web API](../../active-directory-b2c/enable-authentication-web-api.md)

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ With cross-tenant synchronization, you can do the following:
5151

5252
## Teams and Microsoft 365
5353

54-
Users created by cross-tenant synchronization will have the same experience when accessing Microsoft Teams and other Microsoft 365 services as B2B collaboration users created through a manual invitation. The [userType](../external-identities/user-properties.md) property on the B2B user, whether guest or member, does change the end user experience. Over time, the member userType will be used by the various Microsoft 365 services to provide differentiated end user experiences for users in a multi-tenant organization.
54+
Users created by cross-tenant synchronization will have the same experience when accessing Microsoft Teams and other Microsoft 365 services as B2B collaboration users created through a manual invitation. The [userType](../external-identities/user-properties.md) property on the B2B user, whether guest or member, does not change the end user experience. Over time, the member userType will be used by the various Microsoft 365 services to provide differentiated end user experiences for users in a multi-tenant organization.
5555

5656
## Properties
5757

articles/active-directory/saas-apps/ardoq-provisioning-tutorial.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,12 +40,23 @@ The scenario outlined in this tutorial assumes that you already have the followi
4040
1. Determine what data to [map between Azure AD and Ardoq](../app-provisioning/customize-application-attributes.md).
4141

4242
## Step 2. Configure Ardoq to support provisioning with Azure AD
43+
* Provisioning is gated by a feature toggle in Ardoq. If you intend to configure SSO or have already done so, Ardoq will automatically recognize that Azure AD is in use, and the provisioning feature will be automatically enabled.
4344

44-
1. Log in to [Ardoq](https://aad.ardoq.com/).
45+
* If you don't intend to use the provisioning features of Azure AD along with SSO, please reach out to Ardoq customer support and they'll manually enable support for provisioning.
46+
47+
Before we proceed we need to obtain a *Tenant Url* and a *Secret Token*, to configure secure communcation between Azure AD and Ardoq.
48+
49+
50+
51+
52+
1. Log in to Ardoq admin console.
4553
1. In the left menu click on profile logo and, navigate to **Organization Settings->Manage Organization->Manage SCIM Token**.
4654
1. Click on **Generate new**.
4755
1. Copy and save the **Token**.This value will be entered in the **Secret Token** field in the Provisioning tab of your Ardoq application in the Azure portal.
48-
1. And `https://aad.ardoq.com/api/scim/v2` will be entered in the **Tenant Url** field in the Provisioning tab of your Ardoq application in the Azure portal.
56+
1. To create your *tenant URL*, use this template: `https://<YOUR-SUBDOMAIN>.ardoq.com/api/scim/v2` by replacing the placeholder text `<YOUR-SUBDOMAIN>`.This value will be entered in the **Tenant Url** field in the Provisioning tab of your Ardoq application in the Azure portal.
57+
58+
>[!NOTE]
59+
>`<YOUR-SUBDOMAIN>` is the subdomain your organization has chosen to access Ardoq. This is the same URL segment you use when you access the Ardoq app. For example, if your organization accesses Ardoq at `https://acme.ardoq.com` you'd fill in `acme. If you're in the US and access Ardoq at `https://piedpiper.us.ardoq.com` then you'd fill in `piedpiper.us`.
4960

5061
## Step 3. Add Ardoq from the Azure AD application gallery
5162

articles/api-management/TOC.yml

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -88,8 +88,6 @@
8888
href: devops-api-development-templates.md
8989
- name: APIs
9090
items:
91-
- name: GraphQL APIs
92-
href: graphql-apis-overview.md
9391
- name: API design ebook
9492
href: https://azure.microsoft.com/mediahandler/files/resourcefiles/api-design/Azure_API-Design_Guide_eBook.pdf?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json
9593
- name: RESTful web API design
@@ -267,8 +265,6 @@
267265
- name: Manage secrets using named values
268266
displayName: Azure CLI, az apim nv
269267
href: api-management-howto-properties.md
270-
- name: Configure a GraphQL resolver
271-
href: configure-graphql-resolver.md
272268
- name: Secure your APIs
273269
items:
274270
- name: Secure API access
@@ -436,8 +432,6 @@
436432
href: forward-request-policy.md
437433
- name: get-authorization-context
438434
href: get-authorization-context-policy.md
439-
- name: http-data-source
440-
href: http-data-source-policy.md
441435
- name: include-fragment
442436
href: include-fragment-policy.md
443437
- name: invoke-dapr-binding
@@ -454,8 +448,6 @@
454448
href: mock-response-policy.md
455449
- name: proxy
456450
href: proxy-policy.md
457-
- name: publish-event
458-
href: publish-event-policy.md
459451
- name: publish-to-dapr
460452
href: publish-to-dapr-policy.md
461453
- name: quota

articles/api-management/api-management-features.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: api-management
99
ms.topic: article
10-
ms.date: 02/22/2023
10+
ms.date: 02/07/2022
1111
ms.author: danlep
1212
---
1313

@@ -38,11 +38,12 @@ Each API Management [pricing tier](https://aka.ms/apimpricing) offers a distinct
3838
| Direct management API | No | Yes | Yes | Yes | Yes |
3939
| Azure Monitor logs and metrics | No | Yes | Yes | Yes | Yes |
4040
| Static IP | No | Yes | Yes | Yes | Yes |
41-
| [Pass-through WebSocket APIs](websocket-api.md) | No | Yes | Yes | Yes | Yes |
42-
| [Pass-through GraphQL APIs](graphql-apis-overview.md) | Yes | Yes | Yes | Yes | Yes |
43-
| [Synthetic GraphQL APIs](graphql-apis-overview.md) | Yes | Yes | Yes | Yes | Yes |
41+
| [WebSocket APIs](websocket-api.md) | No | Yes | Yes | Yes | Yes |
42+
| [GraphQL APIs](graphql-api.md)<sup>5</sup> | Yes | Yes | Yes | Yes | Yes |
43+
| [Synthetic GraphQL APIs (preview)](graphql-schema-resolve-api.md) | No | Yes | Yes | Yes | Yes |
4444

4545
<sup>1</sup> Enables the use of Azure AD (and Azure AD B2C) as an identity provider for user sign in on the developer portal.<br/>
4646
<sup>2</sup> Including related functionality such as users, groups, issues, applications, and email templates and notifications.<br/>
4747
<sup>3</sup> See [Gateway overview](api-management-gateways-overview.md#feature-comparison-managed-versus-self-hosted-gateways) for a feature comparison of managed versus self-hosted gateways. In the Developer tier self-hosted gateways are limited to a single gateway node. <br/>
48-
<sup>4</sup> The following policies aren't available in the Consumption tier: rate limit by key and quota by key.
48+
<sup>4</sup> The following policies aren't available in the Consumption tier: rate limit by key and quota by key. <br/>
49+
<sup>5</sup> GraphQL subscriptions aren't supported in the Consumption tier.

articles/api-management/api-management-gateways-overview.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: api-management
99
ms.topic: conceptual
10-
ms.date: 02/22/2023
10+
ms.date: 08/04/2022
1111
ms.author: danlep
1212
---
1313

@@ -91,9 +91,11 @@ The following table compares features available in the managed gateway versus th
9191
| [Function App](import-function-app-as-api.md) | ✔️ | ✔️ | ✔️ |
9292
| [Container App](import-container-app-with-oas.md) | ✔️ | ✔️ | ✔️ |
9393
| [Service Fabric](../service-fabric/service-fabric-api-management-overview.md) | Developer, Premium |||
94-
| [Pass-through GraphQL](graphql-apis-overview.md) | ✔️ | ✔️ ||
95-
| [Synthetic GraphQL](graphql-apis-overview.md)| ✔️ | ✔️ ||
96-
| [Pass-through WebSocket](websocket-api.md) | ✔️ |||
94+
| [Passthrough GraphQL](graphql-api.md) | ✔️ | ✔️<sup>1</sup> ||
95+
| [Synthetic GraphQL](graphql-schema-resolve-api.md) | ✔️ |||
96+
| [Passthrough WebSocket](websocket-api.md) | ✔️ |||
97+
98+
<sup>1</sup> GraphQL subscriptions aren't supported in the Consumption tier.
9799

98100
### Policies
99101

@@ -102,9 +104,9 @@ Managed and self-hosted gateways support all available [policies](api-management
102104
| Policy | Managed (Dedicated) | Managed (Consumption) | Self-hosted<sup>1</sup> |
103105
| --- | ----- | ----- | ---------- |
104106
| [Dapr integration](api-management-policies.md#dapr-integration-policies) ||| ✔️ |
105-
| [GraphQL resolvers](api-management-policies.md#graphql-resolver-policies) and [GraphQL validation](api-management-policies.md#validation-policies)| ✔️ | ✔️ ||
106-
| [Get authorization context](get-authorization-context-policy.md) | ✔️ | ✔️ ||
107+
| [Get authorization context](get-authorization-context-policy.md) | ✔️ |||
107108
| [Quota and rate limit](api-management-policies.md#access-restriction-policies) | ✔️ | ✔️<sup>2</sup> | ✔️<sup>3</sup>
109+
| [Set GraphQL resolver](set-graphql-resolver-policy.md) | ✔️ |||
108110

109111
<sup>1</sup> Configured policies that aren't supported by the self-hosted gateway are skipped during policy execution.<br/>
110112
<sup>2</sup> The rate limit by key and quota by key policies aren't available in the Consumption tier.<br/>

articles/api-management/api-management-howto-developer-portal-customize.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -168,8 +168,7 @@ Although you don't need to adjust any styles, you may consider adjusting particu
168168
You can control which portal content appears to different users, based on their identity. For example, you might want to display certain pages only to users who have access to a specific product or API. Or, make a section of a page appear only for certain [groups of users](api-management-howto-create-groups.md). The developer portal has built-in controls for these needs.
169169

170170
> [!NOTE]
171-
> * These controls are being released during December 2022. It may take several weeks for your API Management service to receive the update.
172-
> * Visibility and access controls are supported only in the managed developer portal. They are not supported in the [self-hosted portal](developer-portal-self-host.md).
171+
> Visibility and access controls are supported only in the managed developer portal. They are not supported in the [self-hosted portal](developer-portal-self-host.md).
173172
174173
* When you add or edit a page, select the **Access** tab to control the users or groups that can access the page
175174

0 commit comments

Comments
 (0)