Skip to content

Commit 429c4ba

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into aschhabria-update-event-hubs-overview
2 parents b7a07e4 + 2980aff commit 429c4ba

1,683 files changed

Lines changed: 22155 additions & 56165 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.publish.config.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -834,12 +834,6 @@
834834
"branch": "tutorial",
835835
"branch_mapping": {}
836836
},
837-
{
838-
"path_to_root": "samples-tsi",
839-
"url": "https://github.com/Azure-Samples/Azure-Time-Series-Insights",
840-
"branch": "master",
841-
"branch_mapping": {}
842-
},
843837
{
844838
"path_to_root": "storage-mgmt-devguide-dotnet",
845839
"url": "https://github.com/Azure-Samples/storage-mgmt-devguide-dotnet",

.openpublishing.redirection.json

Lines changed: 42 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,20 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/network-watcher/network-watcher-using-open-source-tools.md",
5+
"redirect_url": "/previous-versions/azure/network-watcher/network-watcher-using-open-source-tools",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/network-watcher/network-watcher-intrusion-detection-open-source-tools.md",
10+
"redirect_url": "/previous-versions/azure/network-watcher/network-watcher-intrusion-detection-open-source-tools",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/frontdoor/migrate-cdn-to-front-door.md",
15+
"redirect_url": "/previous-versions/azure/frontdoor/migrate-cdn-to-front-door",
16+
"redirect_document_id": false
17+
},
318
{
419
"source_path": "articles/synapse-analytics/data-explorer/data-explorer-compare.md",
520
"redirect_url": "/previous-versions/azure/synapse-analytics/data-explorer/data-explorer-compare",
@@ -230,7 +245,7 @@
230245
"redirect_url": "/azure/resiliency/quick-understand-protection-estate",
231246
"redirect_document_id": false
232247
},
233-
{
248+
{
234249
"source_path": "articles/business-continuity-center/business-continuity-center-support-matrix.md",
235250
"redirect_url": "/azure/resiliency/resiliency-support-matrix",
236251
"redirect_document_id": false
@@ -258,42 +273,27 @@
258273
{
259274
"source_path": "articles/migrate/concepts-azure-spring-apps-assessment-calculation.md",
260275
"redirect_url": "/azure/migrate",
261-
"redirect_document_id": false,
262-
"monikers": [
263-
"migrate"
264-
]
276+
"redirect_document_id": false
265277
},
266278
{
267279
"source_path": "articles/migrate/how-to-create-azure-spring-apps-assessment.md",
268280
"redirect_url": "/azure/migrate",
269-
"redirect_document_id": false,
270-
"monikers": [
271-
"migrate"
272-
]
281+
"redirect_document_id": false
273282
},
274283
{
275284
"source_path": "articles/migrate/troubleshoot-spring-boot-discovery.md",
276285
"redirect_url": "/azure/migrate",
277-
"redirect_document_id": false,
278-
"monikers": [
279-
"migrate"
280-
]
286+
"redirect_document_id": false
281287
},
282288
{
283289
"source_path": "articles/migrate/tutorial-assess-spring-boot.md",
284290
"redirect_url": "/azure/migrate",
285-
"redirect_document_id": false,
286-
"monikers": [
287-
"migrate"
288-
]
291+
"redirect_document_id": false
289292
},
290293
{
291294
"source_path": "articles/migrate/tutorial-discover-spring-boot.md",
292295
"redirect_url": "/azure/migrate",
293-
"redirect_document_id": false,
294-
"monikers": [
295-
"migrate"
296-
]
296+
"redirect_document_id": false
297297
},
298298
{
299299
"source_path": "articles/azure-functions/functions-proxies.md",
@@ -1227,7 +1227,8 @@
12271227
},
12281228
{
12291229
"source_path": "articles/databox-online/azure-stack-edge-2301-release-notes.md",
1230-
"redirect_url": "/previous-versions/azure/databox-online/azure-stack-edge-2301-release-notes"
1230+
"redirect_url": "/previous-versions/azure/databox-online/azure-stack-edge-2301-release-notes",
1231+
"redirect_document_id": false
12311232
},
12321233
{
12331234
"source_path": "articles/network-watcher/nsg-flow-logs-rest.md",
@@ -6379,8 +6380,7 @@
63796380
"redirect_url": "/azure/cyclecloud/release-notes/ccws/2025-02-06",
63806381
"redirect_document_id": false
63816382
},
6382-
6383-
{
6383+
{
63846384
"source_path": "articles/app-service/sre-agent-overview.md",
63856385
"redirect_url": "/azure/sre-agent/overview",
63866386
"redirect_document_id": false
@@ -6430,21 +6430,11 @@
64306430
"redirect_url": "/azure/iot-hub-device-update/",
64316431
"redirect_document_id": false
64326432
},
6433-
{
6434-
"source_path": "articles/reliability/reliability-azure-container-apps.md",
6435-
"redirect_url": "/azure/reliability/reliability-container-apps",
6436-
"redirect_document_id": false
6437-
},
64386433
{
64396434
"source_path": "articles/storage/container-storage/container-storage-aks-quickstart.md",
64406435
"redirect_url": "/azure/storage/container-storage/install-container-storage-aks",
64416436
"redirect_document_id": true
64426437
},
6443-
{
6444-
"source_path": "articles/reliability/reliability-cosmos-mongodb.md",
6445-
"redirect_url": "/azure/reliability/reliability-documentdb",
6446-
"redirect_document_id": true
6447-
},
64486438
{
64496439
"source_path": "articles/communications-gateway/connectivity.md",
64506440
"redirect_url": "/previous-versions/azure/communications-gateway/connectivity",
@@ -6634,7 +6624,7 @@
66346624
"source_path": "articles/communications-gateway/whats-new.md",
66356625
"redirect_url": "/previous-versions/azure/communications-gateway/whats-new",
66366626
"redirect_document_id": false
6637-
},
6627+
},
66386628
{
66396629
"source_path": "articles/vpn-gateway/about-zone-redundant-vnet-gateways.md",
66406630
"redirect_url": "/azure/reliability/reliability-virtual-network-gateway",
@@ -6645,12 +6635,22 @@
66456635
"redirect_url": "https://learn.microsoft.com/dotnet/api/overview/azure/resourcemanager.dns-readme",
66466636
"redirect_document_id": false
66476637
},
6648-
{
6638+
{
66496639
"source_path": "articles/oracle/oracle-db/exadata-vm-clusters.md",
66506640
"redirect_url": "/azure/oracle/oracle-db/database-overview",
66516641
"redirect_document_id": false
66526642
},
66536643
{
6644+
"source_path": "articles/cyclecloud/how-to/ccws/register-entra-id-app.md",
6645+
"redirect_url": "/azure/cyclecloud/how-to/create-app-registration",
6646+
"redirect_document_id": false
6647+
},
6648+
{
6649+
"source_path": "articles/cyclecloud/how-to/ccws/open-ondemand-add-users.md",
6650+
"redirect_url": "/azure/cyclecloud/how-to/ccws/configure-open-ondemand",
6651+
"redirect_document_id": false
6652+
},
6653+
{
66546654
"source_path": "articles/reliability/reliability-health-insights.md",
66556655
"redirect_url": "/azure/azure-health-insights/reliability-health-insights",
66566656
"redirect_document_id": false
@@ -6664,6 +6664,11 @@
66646664
"source_path": "articles/nat-gateway/nat-availability-zones.md",
66656665
"redirect_url": "/azure/reliability/reliability-nat-gateway",
66666666
"redirect_document_id": false
6667-
}
6667+
},
6668+
{
6669+
"source_path": "articles/cyclecloud/how-to/collect-custom-metrics-gpu-infiniband-telegraf.md",
6670+
"redirect_url": "/azure/cyclecloud/how-to/monitor-cyclecloud-cluster-using-prometheus-grafana",
6671+
"redirect_document_id": false
6672+
}
66686673
]
66696674
}

CODEOWNERS

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,19 @@
22
# Each line is a file pattern followed by one or more owners.
33

44
# Folder paths in this list have been migrated to new repositories and content can no longer be created for these services in this repo.
5-
/articles/aks @tynevi @thomps23 @jasonwhowell
6-
/articles/defender-for-cloud @tynevi @thomps23 @jasonwhowell
7-
/articles/attestation @tynevi @thomps23 @jasonwhowell
8-
/articles/confidential-ledger @tynevi @thomps23 @jasonwhowell
9-
/articles/dedicated-hsm @tynevi @thomps23 @jasonwhowell
10-
/articles/key-vault @tynevi @thomps23 @jasonwhowell
11-
/articles/payment-hsm @tynevi @thomps23 @jasonwhowell
12-
/articles/postgresql @tynevi @thomps23 @jasonwhowell
13-
/articles/cosmos-db @tynevi @thomps23 @jasonwhowell
14-
/articles/dms @tynevi @thomps23 @jasonwhowell
15-
/articles/mariadb @tynevi @thomps23 @jasonwhowell
16-
/articles/mysql @tynevi @thomps23 @jasonwhowell
17-
/articles/managed-instance-apache-cassandra @tynevi @thomps23 @jasonwhowell
5+
/articles/aks @thomps23 @jasonwhowell
6+
/articles/defender-for-cloud @thomps23 @jasonwhowell
7+
/articles/attestation @thomps23 @jasonwhowell
8+
/articles/confidential-ledger @thomps23 @jasonwhowell
9+
/articles/dedicated-hsm @thomps23 @jasonwhowell
10+
/articles/key-vault @thomps23 @jasonwhowell
11+
/articles/payment-hsm @thomps23 @jasonwhowell
12+
/articles/postgresql @thomps23 @jasonwhowell
13+
/articles/cosmos-db @thomps23 @jasonwhowell
14+
/articles/dms @thomps23 @jasonwhowell
15+
/articles/mariadb @thomps23 @jasonwhowell
16+
/articles/mysql @thomps23 @jasonwhowell
17+
/articles/managed-instance-apache-cassandra @thomps23 @jasonwhowell
1818
/articles/virtual-machines @jasonwhowell @thomps23
1919
/articles/virtual-machines-scale-sets @jasonwhowell @thomps23
2020
/articles/container-instances @jasonwhowell @thomps23
@@ -37,3 +37,4 @@
3737
/articles/quotas @jasonwhowell @thomps23
3838
/articles/container-registry @jasonwhowell @thomps23
3939
/articles/kubernetes-fleet @MicrosoftDocs/azure-docs-codeowners
40+
/articles/reliability @thomps23

articles/active-directory-b2c/add-api-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ Content-type: application/json
160160
}
161161
```
162162

163-
The exact claims sent to the API depend on the information is provided by the identity provider. 'email' is always sent.
163+
The exact claims sent to the API depend on the information provided by the identity provider. 'email' is always sent.
164164

165165
### Expected response types from the web API at this step
166166

articles/active-directory-b2c/add-captcha.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.author: kengaderdus
1111
ms.subservice: b2c
1212
zone_pivot_groups: b2c-policy-type
1313

14-
#Customer intent: As a developer, I want to enable CAPTCHA in consumer-facing application that is secured by Azure Active Directory B2C, so that I can protect my sign-in and sign-up flows from automated attacks.
14+
#Customer intent: As a developer, I want to enable CAPTCHA in a consumer-facing application that is secured by Azure Active Directory B2C, so that I can protect my sign-in and sign-up flows from automated attacks.
1515

1616
---
1717

@@ -21,7 +21,7 @@ zone_pivot_groups: b2c-policy-type
2121

2222
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2323

24-
Azure Active Directory B2C (Azure AD B2C) allows you to enable CAPTCHA to prevent automated attacks on your consumer-facing applications. Azure AD B2C’s CAPTCHA supports both audio and visual CAPTCHA challenges. You can enable this security feature in both sign-up and sign-in flows for your local accounts. CAPTCHA isn't applicable for social identity providers' sign-in.
24+
Azure Active Directory B2C (Azure AD B2C) allows you to enable CAPTCHA to prevent automated attacks on your consumer-facing applications. Azure AD B2C CAPTCHA supports both audio and visual challenges. You can enable this security feature in both sign-up and sign-in flows for your local accounts. CAPTCHA isn't applicable for social identity providers' sign-in.
2525

2626
> [!NOTE]
2727
> This feature is in public preview
@@ -52,7 +52,7 @@ Azure Active Directory B2C (Azure AD B2C) allows you to enable CAPTCHA to preven
5252

5353
## Test the user flow
5454

55-
Use the steps in [Test the user flow](tutorial-create-user-flows.md?pivots=b2c-user-flow#test-the-user-flow-1) to test and confirm that CAPTCHA is enabled for your chosen flow. You should be prompted to enter the characters you see or hear depending on the CAPTCHA type, visual, or audio, you choose.
55+
Use the steps in [Test the user flow](tutorial-create-user-flows.md?pivots=b2c-user-flow#test-the-user-flow-1) to test and confirm that CAPTCHA is enabled for your chosen flow. You should be prompted to enter the characters you see or hear depending on the CAPTCHA type (visual or audio) that you choose.
5656

5757
::: zone-end
5858

@@ -395,7 +395,7 @@ Use the steps in [Test the custom policy](tutorial-create-user-flows.md?pivots=b
395395

396396
> [!NOTE]
397397
> - You can't add CAPTCHA to an MFA step in a sign-up only user flow.
398-
> - In an MFA flow, CAPTCHA is applicable where the MFA method you select is SMS or phone call, SMS only or Phone call only.
398+
> - In an MFA flow, CAPTCHA is applicable where the MFA method you select is SMS or phone call, SMS only, or phone call only.
399399
400400
## Related content
401401

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: b2c
1212
zone_pivot_groups: b2c-policy-type
1313
ms.custom: sfi-image-nochange
1414

15-
#Customer Intent: As an Azure AD B2C administrator, I want to set up a password reset flow for local accounts, so that users can reset their passwords if they forget them.
15+
# Customer Intent: As an Azure AD B2C administrator, I want to set up a password reset flow for local accounts, so that users can reset their passwords if they forget them.
1616
---
1717

1818
# Set up a password reset flow in Azure Active Directory B2C
@@ -43,7 +43,7 @@ The default name of the **Change email** button in *selfAsserted.html* is **chan
4343
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
4444

4545

46-
- The B2C Users need to have an authentication method specified for self-service password reset. Select the B2C User, in the left menu under **Manage**, select **Authentication methods**. Ensure **Authentication contact info** is set. B2C users created via a Sign-up flow has this set by default. For users created via Azure Portal or by Graph API, you need to set **Authentication contact info** for SSPR to work.
46+
- The B2C users need to have an authentication method specified for self-service password reset. Select the B2C User, in the left menu under **Manage**, select **Authentication methods**. Ensure **Authentication contact info** is set. B2C users created via a Sign-up flow has this set by default. For users created via Azure Portal or by Graph API, you need to set **Authentication contact info** for SSPR to work.
4747

4848

4949
## Self-service password reset (recommended)
@@ -52,7 +52,7 @@ The new password reset experience is now part of the sign-up or sign-in policy.
5252

5353
::: zone pivot="b2c-user-flow"
5454

55-
The self-service password reset experience can be configured for the Sign in (Recommended) or Sign up and sign in (Recommended) user flows. If you don't have one of these user flows setup, create a [sign-up or sign-in](add-sign-up-and-sign-in-policy.md) user flow.
55+
The self-service password reset experience can be configured for the Sign in (Recommended) or Sign up and sign in (Recommended) user flows. If you don't have one of these user flows set up, create a [sign-up or sign-in](add-sign-up-and-sign-in-policy.md) user flow.
5656

5757
To set up self-service password reset for the sign-up or sign-in user flow:
5858

articles/active-directory-b2c/partner-transmit-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ To integrating Transmit DRS into the B2C sign-in page, follow these steps:
127127

128128
Azure AD B2C can obtain a risk recommendation from Transmit using a [API connector](./add-api-connector.md). Passing this request through an intermediate web API (such as using [Azure Functions](/azure/azure-functions/)) provides more flexibility in your implementation logic.
129129

130-
Follow these steps to create an Azure function that uses the action token from the frontend application to get a recommendation from the [Transmit DRS endpoint](https://developer.transmitsecurity.com/openapi/risk/recommendations/#operation/getRiskRecommendation).
130+
Follow these steps to create an Azure function that uses the action token from the frontend application to get a recommendation from the [Transmit DRS endpoint](https://developer.transmitsecurity.com/guides/risk/recommendations#operation/getRiskRecommendation).
131131

132132
1. Create the entry point of your Azure Function, an HTTP-triggered function that processes incoming HTTP requests.
133133

articles/active-directory-b2c/phone-based-mfa.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: kengaderdus
77
manager: CelesteDG
88
ms.service: azure-active-directory
99
ms.topic: how-to
10-
ms.date: 11/05/2025
10+
ms.date: 1/21/2025
1111
ms.author: kengaderdus
1212
ms.subservice: b2c
1313
ms.custom: sfi-image-nochange
@@ -123,22 +123,29 @@ To help prevent fraudulent sign-ups, remove any country/region codes that do not
123123
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
124124
<TrustFrameworkPolicy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
125125
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
126-
xmlns="http://schemas.microsoft.com/online/cpim/schemas/2013/06" PolicySchemaVersion="0.3.0.0" TenantId="yourtenant.onmicrosoft.com" PolicyId="B2C_1A_signup_signin" PublicPolicyUri="http://yourtenant.onmicrosoft.com/B2C_1A_signup_signin">
126+
xmlns="http://schemas.microsoft.com/online/cpim/schemas/2013/06"
127+
PolicySchemaVersion="0.3.0.0"
128+
TenantId="yourtenant.onmicrosoft.com"
129+
PolicyId="B2C_1A_signup_signin"
130+
PublicPolicyUri="http://yourtenant.onmicrosoft.com/B2C_1A_signup_signin">
127131

128132
<BasePolicy>
129133
<TenantId>yourtenant.onmicrosoft.com</TenantId>
130134
<PolicyId>B2C_1A_TrustFrameworkExtensions</PolicyId>
131135
</BasePolicy>
132-
136+
137+
<!-- Add this BuildingBlocks section to the relying party policy. -->
133138
<BuildingBlocks>
134-
<!-- Add the XML code outlined in Step 2 if this section. -->
139+
<!-- Add the XML code outlined in Step 2 in this section. -->
135140
</BuildingBlocks>
136141

137142
<RelyingParty>
138143
...
139144
</RelyingParty>
140145
</TrustFrameworkPolicy>
141146
```
147+
> [!IMPORTANT]
148+
>Add the code in step 2 to the _relying party policy_ to enforce country/region code restrictions on the server side. You must not define these elements only in parent policies; put them in the relying party policy.
142149

143150
1. In the `BuildingBlocks` section of this policy file, add the following code. Make sure to include only the country/region codes relevant to your organization:
144151

@@ -178,11 +185,8 @@ To help prevent fraudulent sign-ups, remove any country/region codes that do not
178185

179186
The countryList acts as an allow list. Only the countries/regions you specify in this list (for example, Japan, Bulgaria, and the United States) are permitted to use MFA. All other countries/regions are blocked.
180187

181-
> [!IMPORTANT]
182-
> This code must be added to the relying party policy to ensure the country/region code restrictions are properly enforced on the server side.
188+
183189

184190
## Related content
185191

186192
- Learn about [Identity Protection and Conditional Access for Azure AD B2C](conditional-access-identity-protection-overview.md)
187-
188-
- Apply [Conditional Access to user flows in Azure Active Directory B2C](conditional-access-user-flow.md)

articles/active-directory-b2c/service-limits.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: azure-active-directory
99

1010
ms.topic: reference
11-
ms.date: 08/19/2025
11+
ms.date: 01/22/2026
1212
ms.subservice: b2c
1313
zone_pivot_groups: b2c-policy-type
1414

@@ -186,7 +186,7 @@ The following table lists the administrative configuration limits in the Azure A
186186

187187
## Region specific service limits
188188

189-
As a protection for our customers, Microsoft places some restrictions on telephony verification for certain region codes. The following table lists the region codes and their corresponding limits.
189+
As a protection for our customers, Microsoft places some restrictions on telephony verification for certain region codes. The following table lists the region codes and their corresponding limits. Only SMS verification is subject to these limits.
190190

191191
| Region Code | Region Name | Limit per tenant per 60 minutes | Limit per tenant per 24 hours |
192192
|:----------- |:---------------------------------------------- |:------------------------------- | :----------------------------------------|

articles/api-center/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@
9999
- name: API center management and operations
100100
items:
101101
- name: Reliability
102-
href: ../reliability/reliability-api-center.md?toc=/azure/api-center/toc.json&bc=/azure/api-center/breadcrumb/toc.json
102+
href: /azure/reliability/reliability-api-center?toc=/azure/api-center/toc.json&bc=/azure/api-center/breadcrumb/toc.json
103103
- name: Reference
104104
items:
105105
- name: Azure CLI

0 commit comments

Comments
 (0)