Skip to content

Commit 383bd58

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into blobfuse2
2 parents 8a0b572 + 5cc5821 commit 383bd58

568 files changed

Lines changed: 11102 additions & 4695 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2892,7 +2892,12 @@
28922892
},
28932893
{
28942894
"source_path_from_root": "/articles/bastion/quickstart-developer-sku.md",
2895-
"redirect_url": "/azure/bastion/quickstart-developer",
2895+
"redirect_url": "/azure/bastion/quickstart-host-portal",
2896+
"redirect_document_id": false
2897+
},
2898+
{
2899+
"source_path_from_root": "/articles/bastion/quickstart-developer.md",
2900+
"redirect_url": "/azure/bastion/quickstart-host-portal",
28962901
"redirect_document_id": false
28972902
},
28982903
{
@@ -2907,7 +2912,12 @@
29072912
},
29082913
{
29092914
"source_path_from_root": "/articles/bastion/bastion-create-host-portal.md",
2910-
"redirect_url": "/azure/bastion/tutorial-create-host-portal",
2915+
"redirect_url": "/azure/bastion/quickstart-host-portal",
2916+
"redirect_document_id": false
2917+
},
2918+
{
2919+
"source_path_from_root": "/articles/bastion/tutorial-create-host-portal.md",
2920+
"redirect_url": "/azure/bastion/quickstart-host-portal",
29112921
"redirect_document_id": false
29122922
},
29132923
{
@@ -6628,7 +6638,7 @@
66286638
{
66296639
"source_path": "articles/vpn-gateway/about-zone-redundant-vnet-gateways.md",
66306640
"redirect_url": "/azure/reliability/reliability-virtual-network-gateway",
6631-
"redirect_document_id": true
6641+
"redirect_document_id": false
66326642
},
66336643
{
66346644
"source_path": "articles/dns/dns-sdk.md",

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,13 +69,16 @@ client_id=00001111-aaaa-2222-bbbb-3333cccc4444
6969
| redirect_uri |Required |The redirect URI of your app, where authentication responses are sent and received by your app. It must exactly match one of the redirect URIs that you registered in the portal, except that it must be URL-encoded. |
7070
| scope |Required |A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. The `offline_access` scope is optional for web applications. It indicates that your application needs a *refresh token* for extended access to resources. The client-id indicates the token issued are intended for use by Azure AD B2C registered client. The `https://{tenant-name}/{app-id-uri}/{scope}` indicates a permission to protected resources, such as a web API. For more information, see [Request an access token](access-tokens.md#scopes). |
7171
| response_mode |Recommended |The method that you use to send the resulting authorization code back to your app. It can be `query`, `form_post`, or `fragment`. |
72-
| state |Recommended |A value included in the request that can be a string of any content that you want to use. Usually, a randomly generated unique value is used, to prevent cross-site request forgery attacks. The state also is used to encode information about the user's state in the app before the authentication request occurred. For example, the page the user was on, or the user flow that was being executed. |
7372
| prompt |Optional |The type of user interaction that is required. Currently, the only valid value is `login`, which forces the user to enter their credentials on that request. Single sign-on won't take effect. |
7473
| code_challenge | recommended / required | Used to secure authorization code grants via Proof Key for Code Exchange (PKCE). Required if `code_challenge_method` is included. You need to add logic in your application to generate the `code_verifier` and `code_challenge`. The `code_challenge` is a Base64 URL-encoded SHA256 hash of the `code_verifier`. You store the `code_verifier` in your application for later use, and send the `code_challenge` along with the authorization request. For more information, see the [PKCE RFC](https://tools.ietf.org/html/rfc7636). This is now recommended for all application types - native apps, SPAs, and confidential clients like web apps. |
7574
| `code_challenge_method` | recommended / required | The method used to encode the `code_verifier` for the `code_challenge` parameter. This *SHOULD* be `S256`, but the spec allows the use of `plain` if for some reason the client can't support SHA256. <br/><br/>If you exclude the `code_challenge_method`, but still include the `code_challenge`, then the `code_challenge` is assumed to be plaintext. Microsoft identity platform supports both `plain` and `S256`. For more information, see the [PKCE RFC](https://tools.ietf.org/html/rfc7636). This is required for [single page apps using the authorization code flow](tutorial-register-spa.md).|
7675
| login_hint | No| Can be used to prefill the sign-in name field of the sign-in page. For more information, see [Prepopulate the sign-in name](direct-signin.md#prepopulate-the-sign-in-name). |
7776
| domain_hint | No| Provides a hint to Azure AD B2C about the social identity provider that should be used for sign-in. If a valid value is included, the user goes directly to the identity provider sign-in page. For more information, see [Redirect sign-in to a social provider](direct-signin.md#redirect-sign-in-to-a-social-provider). |
7877
| Custom parameters | No| Custom parameters that can be used with [custom policies](custom-policy-overview.md). For example, [dynamic custom page content URI](customize-ui-with-html.md?pivots=b2c-custom-policy#configure-dynamic-custom-page-content-uri), or [key-value claim resolvers](claim-resolver-overview.md#oauth2-key-value-parameters). |
78+
| state |Recommended |A value included in the request that can be a string of any content that you want to use. Usually, a randomly generated unique value is used, to prevent cross-site request forgery attacks. The state also is used to encode information about the user's state in the app before the authentication request occurred. For example, the page the user was on, or the user flow that was being executed. |
79+
80+
> [!IMPORTANT]
81+
> For security and privacy, do not put URLs or other sensitive data directly in the state parameter. Instead, use a key or identifier that corresponds to data stored in browser storage, such as localStorage or sessionStorage. This approach lets your app securely reference the necessary data after authentication.
7982
8083
At this point, the user is asked to complete the user flow's workflow. This might involve the user entering their username and password, signing in with a social identity, signing up for the directory, or any other number of steps. User actions depend on how the user flow is defined.
8184

articles/active-directory-b2c/phone-based-mfa.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: kengaderdus
77
manager: CelesteDG
88
ms.service: azure-active-directory
99
ms.topic: how-to
10-
ms.date: 1/21/2025
10+
ms.date: 1/23/2025
1111
ms.author: kengaderdus
1212
ms.subservice: b2c
1313
ms.custom: sfi-image-nochange
@@ -144,8 +144,8 @@ To help prevent fraudulent sign-ups, remove any country/region codes that do not
144144
</RelyingParty>
145145
</TrustFrameworkPolicy>
146146
```
147-
> [!IMPORTANT]
148-
>Add the code in step 2 to the _relying party policy_ to enforce country/region code restrictions on the server side. You must not define these elements only in parent policies; put them in the relying party policy.
147+
> [!IMPORTANT]
148+
>Add the code in step 2 to the _relying party policy_ to enforce country/region code restrictions on the server side. You must not define these elements only in parent policies; put them in the relying party policy.
149149

150150
1. In the `BuildingBlocks` section of this policy file, add the following code. Make sure to include only the country/region codes relevant to your organization:
151151

articles/api-center/agent-to-agent-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Agent registry in Azure API Center
33
description: "Overview of the agent registry for discovering, registering, and managing A2A agents in API Center."
4-
author: ProfessorKendrick
5-
ms.author: kkendrick
4+
5+
66
ms.service: azure-api-center
77
ms.topic: overview
88
ms.date: 11/03/2025

articles/api-center/authorize-api-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Configure API access in Azure API Center
33
description: Learn how to configure access to APIs in the Azure API Center inventory using API keys or OAuth 2.0 authorization. Users authorized for access can test APIs in the API Center portal.
4-
author: dlepow
4+
55
ms.service: azure-api-center
66
ms.topic: how-to
77
ms.date: 06/02/2025
8-
ms.author: danlep
8+
99
ms.custom:
1010
# Customer intent: As an API program manager, I want to store API authorization information in my API center and enable authorized users to test APIs in the API Center portal.
1111
---

articles/api-center/build-register-apis-vscode-extension.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Build and Register APIs - VS Code Extension
33
description: Learn how API developers can use the Azure API Center extension for Visual Studio Code to build and register APIs in their organization's API center.
4-
author: dlepow
4+
55
ms.service: azure-api-center
66
ms.topic: how-to
77
ms.date: 08/28/2025
88
ms.update-cycle: 180-days
9-
ms.author: danlep
9+
1010
ms.collection: ce-skilling-ai-copilot
1111
ms.custom:
1212
# Customer intent: As an API developer, I want to use my Visual Studio Code environment to register APIs in my organization's API center as part of my development workflow.

articles/api-center/customize-api-center-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Customize the API Center Portal
33
description: Learn about settings you can customize in your Azure API Center portal.
4-
author: dlepow
4+
55
ms.service: azure-api-center
66
ms.topic: how-to
77
ms.date: 08/07/2025
88
ms.update-cycle: 180-days
9-
ms.author: danlep
9+
1010
ms.custom:
1111
ms.collection: ce-skilling-ai-copilot
1212
# Customer intent: As an API program manager, I want to customize the Azure-managed portal for developers and other API stakeholders in my organization.

articles/api-center/design-api-github-copilot-azure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Develop APIs with GitHub Copilot for Azure - API Center plugin
33
description: With AI assistance, API developers can use the Azure API Center plugin for GitHub Copilot for Azure to design and develop compliant APIs.
4-
author: dlepow
4+
55
ms.service: azure-api-center
66
ms.topic: how-to
77
ms.date: 09/26/2025
88
ms.update-cycle: 180-days
9-
ms.author: danlep
9+
1010
ms.collection: ce-skilling-ai-copilot
1111
ms.custom:
1212
# Customer intent: As an API developer, I want to use my Visual Studio Code environment and GitHub Copilot for Azure to generate Open API specs from natural language prompts.

articles/api-center/discover-apis-vscode-extension.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Discover APIs - VS Code extension
33
description: API developers can use the Azure API Center extension for Visual Studio Code to discover APIs in their organization's API center.
4-
author: dlepow
4+
55
ms.service: azure-api-center
66
ms.topic: how-to
77
ms.date: 05/27/2025
8-
ms.author: danlep
8+
99
ms.custom:
1010
# Customer intent: As an API developer, I want to use my Visual Studio Code environment to discover and consume APIs in my organizations API center.
1111
---

articles/api-center/enable-api-analysis-linting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Configure linting of API definitions in your API center to analyze
44
ms.service: azure-api-center
55
ms.topic: how-to
66
ms.date: 12/03/2024
7-
ms.author: danlep
8-
author: dlepow
7+
8+
99
ms.custom:
1010
- devx-track-azurecli
1111
- sfi-image-nochange

0 commit comments

Comments
 (0)