Skip to content

Commit ffb6d86

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 85e54a8 + ede6278 commit ffb6d86

File tree

472 files changed

+9025
-2534
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

472 files changed

+9025
-2534
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10906,6 +10906,11 @@
1090610906
"redirect_url": "/azure/active-directory-b2c/enable-authentication-in-node-web-app-with-api",
1090710907
"redirect_document_id": false
1090810908
},
10909+
{
10910+
"source_path_from_root": "/articles/active-directory-b2c/tenant-management.md",
10911+
"redirect_url": "/azure/active-directory-b2c/tenant-management-add-administrator",
10912+
"redirect_document_id": false
10913+
},
1090910914
{
1091010915
"source_path": "articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-arm.md",
1091110916
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-arm",

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22650,6 +22650,36 @@
2265022650
"source_path": "articles/load-balancer/protect-load-balancer-with-ddos-standard.md",
2265122651
"redirect_URL": "/azure/load-balancer/tutorial-protect-load-balancer",
2265222652
"redirect_document_id": false
22653+
},
22654+
{
22655+
"source_path": "articles/load-balancer/tutorial-protect-load-balancer.md",
22656+
"redirect_URL": "/azure/load-balancer/tutorial-protect-load-balancer-ddos",
22657+
"redirect_document_id": false
22658+
},
22659+
{
22660+
"source_path": "articles/bastion/tutorial-protect-bastion-host.md",
22661+
"redirect_URL": "/azure/bastion/tutorial-protect-bastion-host-ddos",
22662+
"redirect_document_id": false
22663+
},
22664+
{
22665+
"source_path": "articles/firewall/tutorial-protect-firewall.md",
22666+
"redirect_URL": "/azure/firewall/tutorial-protect-firewall-ddos",
22667+
"redirect_document_id": false
22668+
},
22669+
{
22670+
"source_path": "articles/route-server/tutorial-protect-route-server.md",
22671+
"redirect_URL": "/azure/route-server/tutorial-protect-route-server-ddos",
22672+
"redirect_document_id": false
22673+
},
22674+
{
22675+
"source_path": "articles/virtual-network/nat-gateway/tutorial-protect-nat-gateway.md",
22676+
"redirect_URL": "/azure/virtual-network/nat-gateway/tutorial-protect-nat-gateway-ddos",
22677+
"redirect_document_id": false
22678+
},
22679+
{
22680+
"source_path": "articles/application-gateway/tutorial-protect-application-gateway.md",
22681+
"redirect_URL": "/azure/application-gateway/tutorial-protect-application-gateway-ddos",
22682+
"redirect_document_id": false
2265322683
}
2265422684
]
2265522685
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,11 @@
105105
"redirect_url": "/azure/virtual-desktop/troubleshoot-client-windows",
106106
"redirect_document_id": true
107107
},
108+
{
109+
"source_path_from_root": "/articles/private-5g-core/disconnected-mode.md",
110+
"redirect_url": "/azure/private-5g-core/azure-stack-edge-disconnects",
111+
"redirect_document_id": true
112+
},
108113
{
109114
"source_path_from_root": "/articles/virtual-desktop/virtual-desktop-fall-2019/connect-windows-7-10-2019.md",
110115
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/connect-windows-2019",

articles/active-directory-b2c/TOC.yml

Lines changed: 36 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,17 @@
3737
# What keywords users are searching in TOC: https://review.docs.microsoft.com/en-us/help/contribute/kusto/samples/discoverability-toc-filter?branch=main
3838
# href:tutorial-create-user-flows.md
3939
- name: 4 - Manage your tenant
40-
href: tenant-management.md
41-
displayName: break glass account, emergence account
40+
items:
41+
- name: Add administrator (work account)
42+
href: tenant-management-manage-administrator.md
43+
- name: Manage emergency access
44+
href: tenant-management-emergency-access-account.md
45+
displayName: break glass account, emergence account
46+
- name: Check tenant creation permission
47+
href: tenant-management-check-tenant-creation-permission.md
48+
- name: Find tenant name and ID
49+
href: tenant-management-read-tenant-name.md
50+
displayName: tenant name, tenant ID, tenant details
4251
- name: 5 - Clean up and delete tenant
4352
href: tutorial-delete-tenant.md
4453
# Node Samples
@@ -462,8 +471,32 @@
462471
- name: Integrate with our technology partners
463472
items:
464473
- name: Azure AD B2C partner gallery
465-
href: partner-gallery.md
474+
href: partner-gallery.md
466475
displayName: marketplace, integration, extensibility, extend, customization, customisation
476+
- name: Custom policies guide series
477+
items:
478+
- name: 1 - Overview
479+
href: custom-policies-series-overview.md
480+
- name: 2 - Create Hello World custom policies
481+
href: custom-policies-series-hello-world.md
482+
- name: 3 - Collect user input using custom policy
483+
href: custom-policies-series-collect-user-input.md
484+
- name: 4 - Validate user input custom policy
485+
href: custom-policies-series-validate-user-input.md
486+
- name: 5 - Create branching in user journeys
487+
href: custom-policies-series-branch-user-journey.md
488+
- name: 6 - Validate custom policy files
489+
href: custom-policies-series-install-xml-extensions.md
490+
- name: 7 - Make HTTP call from custom policy
491+
href: custom-policies-series-call-rest-api.md
492+
displayName: call rest api, http call, http request
493+
- name: 8 - Create and read user record custom policy
494+
href: custom-policies-series-store-user.md
495+
displayName: CRUD, store user, create user account, read user, update user
496+
- name: 9 - Sign up and sign in (local account)
497+
href: custom-policies-series-sign-up-or-sign-in.md
498+
- name: 10 - Sign up and sign in (social account)
499+
href: custom-policies-series-sign-up-or-sign-in-federation.md
467500
# Secure
468501
- name: Secure
469502
items:

articles/active-directory-b2c/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ To request an access token, you need an authorization code. Below is an example
6464

6565
In the following example, you replace these values in the query string:
6666

67-
- `<tenant-name>` - The name of your [Azure AD B2C tenant](tenant-management.md#get-your-tenant-name). If you're using a custom domain, replace `tenant-name.b2clogin.com` with your domain, such as `contoso.com`.
67+
- `<tenant-name>` - The name of your [Azure AD B2C tenant](tenant-management-read-tenant-name.md#get-your-tenant-name). If you're using a custom domain, replace `tenant-name.b2clogin.com` with your domain, such as `contoso.com`.
6868
- `<policy-name>` - The name of your custom policy or user flow.
6969
- `<application-ID>` - The application identifier of the web application that you registered to support the user flow.
7070
- `<application-ID-URI>` - The application identifier URI that you set under **Expose an API** blade of the client application.

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ ms.workload: identity
1111
ms.topic: reference
1212
ms.date: 12/29/2022
1313
ms.author: kengaderdus
14+
ms.reviewer: yoelhor
1415
ms.subservice: B2C
1516
---
1617

articles/active-directory-b2c/client-credentials-grant-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ There are no specific actions to enable the client credentials for user flows or
141141

142142
`https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/<policy>/oauth2/v2.0/token`
143143

144-
- Replace `<tenant-name>` with the [name](tenant-management.md#get-your-tenant-name) of your Azure AD B2C tenant. For example, `contoso.b2clogin.com`.
144+
- Replace `<tenant-name>` with the [name]( tenant-management-read-tenant-name.md#get-your-tenant-name) of your Azure AD B2C tenant. For example, `contoso.b2clogin.com`.
145145
- Replace `<policy>` with the full name of your user flow, or custom policy. Note, all types of user flows and custom policies support client credentials flow. You can use any user flow or custom policy you have, or create a new one, such as sign-up or sign-in.
146146

147147
| Key | Value |

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Open your web app in a code editor such as Visual Studio Code. Under the project
108108
|---------|---------|
109109
|`APP_CLIENT_ID`|The **Application (client) ID** for the web app you registered in [step 2.1](#step-2-register-a-web-application). |
110110
|`APP_CLIENT_SECRET`|The client secret value for the web app you created in [step 2.2](#step-22-create-a-web-app-client-secret) |
111-
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`. Learn how to [Get your tenant name](tenant-management.md#get-your-tenant-name). |
111+
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`. Learn how to [Get your tenant name]( tenant-management-read-tenant-name.md#get-your-tenant-name). |
112112
|`RESET_PASSWORD_POLICY_AUTHORITY`| The **Reset password** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<reset-password-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<reset-password-user-flow-name>` with the name of your Reset password user flow such as `B2C_1_reset_password_node_app`.|
113113
|`EDIT_PROFILE_POLICY_AUTHORITY`|The **Profile editing** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<profile-edit-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<reset-password-user-flow-name>` with the name of your reset password user flow such as `B2C_1_edit_profile_node_app`. |
114114
|`AUTHORITY_DOMAIN`| The Azure AD B2C authority domain such as `https://<your-tenant-name>.b2clogin.com`. Replace `<your-tenant-name>` with the name of your tenant.|

articles/active-directory-b2c/configure-authentication-in-azure-static-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ Once you've added the app ID and secrete, use the following steps to add the Azu
120120
}
121121
```
122122

123-
1. Replace `<TENANT_NAME>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com`).
123+
1. Replace `<TENANT_NAME>` with the first part of your Azure AD B2C [tenant name]( tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com`).
124124
1. Replace `<POLICY_NAME>` with the user flows or custom policy you created in [step 1](#step-1-configure-your-user-flow).
125125

126126
## Step 4: Check the Azure Static Web APP

articles/active-directory-b2c/configure-authentication-in-azure-web-app-file-based.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Once you've the added the app ID and secret, use the following steps to add the
118118
}
119119
```
120120

121-
1. Replace `<TENANT_NAME>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com`).
121+
1. Replace `<TENANT_NAME>` with the first part of your Azure AD B2C [tenant name]( tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com`).
122122
1. Replace `<POLICY_NAME>` with the user flows or custom policy you created in [step 1](#step-1-configure-your-user-flow).
123123

124124
## Step 4: Check the Azure Web app

0 commit comments

Comments
 (0)