Skip to content

Commit fcf5296

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into portalPrivateEndpoint
2 parents a7572f3 + 9bd5e47 commit fcf5296

File tree

2,861 files changed

+26114
-28783
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,861 files changed

+26114
-28783
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,9 +135,9 @@
135135
"branch_mapping": {}
136136
},
137137
{
138-
"path_to_root": "ms-identity-dotnetcore-b2c-account-management",
138+
"path_to_root": "ms-identity-dotnetcore-b2c-account-management-archive",
139139
"url": "https://github.com/Azure-Samples/ms-identity-dotnetcore-b2c-account-management",
140-
"branch": "master",
140+
"branch": "archive",
141141
"branch_mapping": {}
142142
},
143143
{

.openpublishing.redirection.azure-kubernetes-service.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,11 @@
8080
"redirect_url": "/azure/aks/azure-csi-files-storage-provision",
8181
"redirect_document_id": false
8282
},
83+
{
84+
"source_path_from_root": "/articles/aks/learn/tutorial-kubernetes-workload-identity.md",
85+
"redirect_url": "/azure/aks/workload-identity-deploy-cluster",
86+
"redirect_document_id": false
87+
},
8388
{
8489
"source_path_from_root": "/articles/aks/workload-identity-migration-sidecar.md",
8590
"redirect_url": "/azure/aks/workload-identity-migrate-from-pod-identity",

.openpublishing.redirection.azure-monitor.json

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6649,9 +6649,14 @@
66496649
"redirect_url": "/azure/azure-functions/functions-monitoring",
66506650
"redirect_document_id": false
66516651
},
6652+
{
6653+
"source_path_from_root": "/articles/azure-monitor/app/app-insights-azure-ad-api.md",
6654+
"redirect_url": "/azure/azure-monitor/app/azure-ad-authentication",
6655+
"redirect_document_id": false
6656+
},
66526657
{
66536658
"source_path_from_root": "/articles/azure-monitor/app/resources-roles-access-control.md",
6654-
"redirect_url": "/azure/azure-monitor//roles-permissions-security",
6659+
"redirect_url": "/azure/azure-monitor/roles-permissions-security",
66556660
"redirect_document_id": false
66566661
},
66576662
{
@@ -6674,6 +6679,11 @@
66746679
"redirect_url": "/azure/azure-monitor/monitor-azure-monitor-reference",
66756680
"redirect_document_id": false
66766681
},
6682+
{
6683+
"source_path_from_root": "/articles/azure-monitor/azure-monitor-monitoring-reference.md",
6684+
"redirect_url": "/azure/azure-monitor/monitor-azure-monitor-reference",
6685+
"redirect_document_id": false
6686+
},
66776687
{
66786688
"source_path_from_root": "/articles/azure-monitor/ai-ops/responsible-ai-faq.md",
66796689
"redirect_url": "/azure/copilot/overview",
@@ -6689,11 +6699,6 @@
66896699
"redirect_url": "/azure/copilot/overview",
66906700
"redirect_document_id": false
66916701
},
6692-
{
6693-
"source_path_from_root": "/articles/azure-monitor/azure-monitor-monitoring-reference.md",
6694-
"redirect_url": "/azure/azure-monitor/monitor-azure-monitor-reference",
6695-
"redirect_document_id": false
6696-
},
66976702
{
66986703
"source_path_from_root": "/articles/azure-monitor/insights/resource-group-insights.md",
66996704
"redirect_url": "/azure/azure-resource-manager/management/resource-group-insights",

.openpublishing.redirection.container-registry.json

Lines changed: 53 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,33 +1,55 @@
11
{
22
"redirections": [
3+
4+
{
5+
"source_path_from_root": "/articles/container-registry/container-registry-oci-artifacts.md",
6+
"redirect_url": "/azure/container-registry/container-registry-manage-artifact",
7+
"redirect_document_id": false
8+
},
9+
{
10+
"source_path_from_root": "/articles/container-registry/container-registry-oras-artifacts.md",
11+
"redirect_url": "/azure/container-registry/container-registry-manage-artifact",
12+
"redirect_document_id": false
13+
},
314
{
415
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-auth.md",
5-
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-auth",
16+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
617
"redirect_document_id": false
718
},
19+
820
{
921
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-auth-cli.md",
10-
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-auth-cli",
22+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
1123
"redirect_document_id": false
1224
},
1325
{
1426
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache.md",
15-
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache",
27+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
1628
"redirect_document_id": false
1729
},
1830
{
1931
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-cli.md",
20-
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-cli",
32+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
33+
"redirect_document_id": false
34+
},
35+
{
36+
"source_path_from_root": "/articles/container-registry/tutorial-artifact-cache.md",
37+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
2138
"redirect_document_id": false
2239
},
2340
{
2441
"source_path_from_root": "/articles/container-registry/tutorial-registry-cache.md",
25-
"redirect_url": "/azure/container-registry/tutorial-artifact-cache",
42+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
2643
"redirect_document_id": false
2744
},
2845
{
2946
"source_path_from_root": "/articles/container-registry/tutorial-troubleshoot-registry-cache.md",
30-
"redirect_url": "/azure/container-registry/tutorial-troubleshoot-artifact-cache",
47+
"redirect_url": "/azure/container-registry/troubleshoot-artifact-cache",
48+
"redirect_document_id": false
49+
},
50+
{
51+
"source_path_from_root": "/articles/container-registry/tutorial-troubleshoot-artifact-cache.md",
52+
"redirect_url": "/azure/container-registry/troubleshoot-artifact-cache",
3153
"redirect_document_id": false
3254
},
3355
{
@@ -60,6 +82,31 @@
6082
"redirect_url": "/azure/container-registry/troubleshoot-artifact-streaming",
6183
"redirect_document_id": false
6284
},
85+
{
86+
"source_path": "articles/container-registry/tutorial-enable-artifact-cache.md",
87+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
88+
"redirect_document_id": false
89+
},
90+
{
91+
"source_path": "articles/container-registry/tutorial-enable-artifact-cache-cli.md",
92+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
93+
"redirect_document_id": false
94+
},
95+
{
96+
"source_path": "articles/container-registry/tutorial-enable-artifact-cache-auth.md",
97+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
98+
"redirect_document_id": false
99+
},
100+
{
101+
"source_path": "articles/container-registry/tutorial-enable-artifact-cache-auth-cli.md",
102+
"redirect_url": "/azure/container-registry/container-registry-artifact-cache",
103+
"redirect_document_id": false
104+
},
105+
{
106+
"source_path": "articles/container-registry/tutorial-artifact-cache-troubleshoot.md",
107+
"redirect_url": "/azure/container-registry/troubleshoot-artifact-cache",
108+
"redirect_document_id": false
109+
},
63110
{
64111
"source_path": "articles/container-registry/container-registry-diagnostics-audit-logs.md",
65112
"redirect_url": "/azure/container-registry/monitor-service"

.openpublishing.redirection.json

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3633,6 +3633,11 @@
36333633
"redirect_url": "https://www.twilio.com/docs/usage/tutorials/serverless-webhooks-azure-functions-and-csharp",
36343634
"redirect_document_id": false
36353635
},
3636+
{
3637+
"source_path_from_root": "/articles/azure-functions/create-first-function-vs-code-web.md",
3638+
"redirect_url": "/azure/azure-functions",
3639+
"redirect_document_id": false
3640+
},
36363641
{
36373642
"source_path_from_root": "/articles/twilio-dotnet-how-to-use-for-voice-sms.md",
36383643
"redirect_url": "https://www.twilio.com/docs/usage/tutorials/serverless-webhooks-azure-functions-and-csharp",
@@ -4055,7 +4060,22 @@
40554060
},
40564061
{
40574062
"source_path_from_root":"/articles/cosmos-db/high-availability.md",
4058-
"redirect_url":"/azure/reliability/reliability-cosmos-db-nosql.md",
4063+
"redirect_url":"/azure/reliability/reliability-cosmos-db-nosql",
4064+
"redirect_document_id":false
4065+
},
4066+
{
4067+
"source_path_from_root":"/articles/migrate/how-to-assess.md",
4068+
"redirect_url":"/azure/migrate/whats-new#update-april-2024",
4069+
"redirect_document_id":false
4070+
},
4071+
{
4072+
"source_path_from_root":"/articles/migrate/prepare-isv-movere.md",
4073+
"redirect_url":"/azure/migrate/whats-new#update-april-2024",
4074+
"redirect_document_id":false
4075+
},
4076+
{
4077+
"source_path_from_root":"/articles/aks/troubleshoot-udp-packet-drops.md",
4078+
"redirect_url":"/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
40594079
"redirect_document_id":false
40604080
}
40614081
]

.openpublishing.redirection.operator-5g-core.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,6 @@
1515
"redirect_url": "/azure/operator-5g-core/how-to-deploy-observability",
1616
"redirect_document_id": false
1717
},
18-
{
19-
"source_path_from_root": "/articles/operator-5g-core/quickstart-complete-prerequisites-deploy-azure-kubernetes-service.md",
20-
"redirect_url": "/azure/operator-5g-core/quickstart-complete-prerequisites-deploy-nexus-azure-kubernetes-service",
21-
"redirect_document_id": false
22-
},
2318
{
2419
"source_path_from_root": "/articles/operator-5g-core/how-to-complete-prerequisites-deploy-nexus-azure-kubernetes-service.md",
2520
"redirect_url": "/azure/operator-5g-core/quickstart-complete-prerequisites-deploy-nexus-azure-kubernetes-service",

articles/active-directory-b2c/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ An *access token* contains claims that you can use in Azure Active Directory B2C
2323
This article shows you how to request an access token for a web application and web API. For more information about tokens in Azure AD B2C, see the [overview of tokens in Azure Active Directory B2C](tokens-overview.md).
2424

2525
> [!NOTE]
26-
> **Web API chains (On-Behalf-Of) is not supported by Azure AD B2C** - Many architectures include a web API that needs to call another downstream web API, both secured by Azure AD B2C. This scenario is common in clients that have a web API back end, which in turn calls a another service. This chained web API scenario can be supported by using the OAuth 2.0 JWT Bearer Credential grant, otherwise known as the On-Behalf-Of flow. However, the On-Behalf-Of flow is not currently implemented in Azure AD B2C. Although On-Behalf-Of works for applications registered in Microsoft Entra ID, it does not work for applications registered in Azure AD B2C, regardless of the tenant (Microsoft Entra ID or Azure AD B2C) that is issuing the tokens.
26+
> **Web API chains (On-Behalf-Of) is not supported by Azure AD B2C** - Many architectures include a web API that needs to call another downstream web API, both secured by Azure AD B2C. This scenario is common in clients that have a web API back end, which in turn calls another service. This chained web API scenario can be supported by using the OAuth 2.0 JWT Bearer Credential grant, otherwise known as the On-Behalf-Of flow. However, the On-Behalf-Of flow is not currently implemented in Azure AD B2C. Although On-Behalf-Of works for applications registered in Microsoft Entra ID, it does not work for applications registered in Azure AD B2C, regardless of the tenant (Microsoft Entra ID or Azure AD B2C) that is issuing the tokens.
2727
2828
## Prerequisites
2929

articles/active-directory-b2c/azure-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -316,7 +316,7 @@ Use the following instructions to create a new Azure Alert, which will send an [
316316
- Alert logic: Set **Number of results** **Greater than** **0**.
317317
- Evaluation based on: Select **120** for Period (in minutes) and **5** for Frequency (in minutes)
318318

319-
![Create a alert rule condition](./media/azure-monitor/alert-create-rule-condition.png)
319+
![Create an alert rule condition](./media/azure-monitor/alert-create-rule-condition.png)
320320

321321
After the alert is created, go to **Log Analytics workspace** and select **Alerts**. This page displays all the alerts that have been triggered in the duration set by **Time range** option.
322322

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ In this article, you learn how to write an Azure Active Directory B2C (Azure AD
3131

3232
Azure AD B2C uses OpenID Connect authentication protocol to verify user credentials. In Azure AD B2C, you send the user credentials alongside other information to a secure endpoint, which then determines if the credentials are valid or not. In a nutshell, when you use Azure AD B2C's implementation of OpenID Connect, you can outsource sign-up, sign in, and other identity management experiences in your web applications to Microsoft Entra ID.
3333

34-
Azure AD B2C custom policy provides a OpenID Connect technical profile, which you use to make a call to a secure Microsoft endpoint. Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).
34+
Azure AD B2C custom policy provides an OpenID Connect technical profile, which you use to make a call to a secure Microsoft endpoint. Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).
3535

3636
## Prerequisites
3737

@@ -331,4 +331,4 @@ You can sign in by entering the **Email Address** and **Password** of an existin
331331

332332
- Learn how to [Remove the sign-up link](add-sign-in-policy.md), so users can just sign in.
333333

334-
- Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).
334+
- Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).

articles/active-directory-b2c/customize-ui-with-html.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ Configure Blob storage for Cross-Origin Resource Sharing by performing the follo
264264
Validate that you're ready by performing the following steps:
265265

266266
1. Repeat the configure CORS step. For **Allowed origins**, enter `https://www.test-cors.org`
267-
1. Navigate to [www.test-cors.org](https://www.test-cors.org/)
267+
1. Navigate to [www.test-cors.org](https://cors-test.codehappy.dev/)
268268
1. For the **Remote URL** box, paste the URL of your HTML file. For example, `https://your-account.blob.core.windows.net/root/azure-ad-b2c/unified.html`
269269
1. Select **Send Request**.
270270
The result should be `XHR status: 200`.

0 commit comments

Comments
 (0)