Skip to content

Commit e8c0863

Browse files
authored
Merge pull request #314801 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 68da47b + a02c2e6 commit e8c0863

3 files changed

Lines changed: 7 additions & 3 deletions

File tree

articles/active-directory-b2c/add-api-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ ms.custom:
2525

2626
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2727

28-
As a developer or IT administrator, you can use API connectors to integrate your sign-up user flows with REST APIs to customize the sign-up experience and integrate with external systems. At the end of this walkthrough, you'll be able to create an Azure AD B2C user flow that interacts with [REST API services](api-connectors-overview.md) to modify your sign-up experiences.
28+
As a developer or IT administrator, you can use API connectors to integrate sign-up user flows with REST APIs, enabling customization of the sign-up experience and integration with external systems. At the end of this walkthrough, you'll be able to create an Azure AD B2C user flow that interacts with [REST API services](api-connectors-overview.md) to modify your sign-up experiences.
2929

3030
::: zone pivot="b2c-user-flow"
3131
You can create an API endpoint using one of our [samples](api-connector-samples.md#api-connector-rest-api-samples).
@@ -515,7 +515,7 @@ Add the validation technical profile reference to the sign-up technical profile,
515515
<OutputClaim ClaimTypeReferenceId="reenterPassword" Required="true"/>
516516
<OutputClaim ClaimTypeReferenceId="displayName"/>
517517
<OutputClaim ClaimTypeReferenceId="givenName"/>
518-
<OutputClaim ClaimTypeReferenceId="surName"/>
518+
<OutputClaim ClaimTypeReferenceId="surname"/>
519519
<!-- Required to present the text box to collect the data from the user -->
520520
<OutputClaim ClaimTypeReferenceId="loyaltyId"/>
521521
<!-- Required to pass the promoCode returned from "REST-ValidateProfile"

articles/azure-resource-manager/bicep/bicep-functions-resource.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -681,7 +681,7 @@ The identifier is returned in the following format:
681681

682682
You use this function to get the resource ID for resources that are [deployed to the subscription](deploy-to-subscription.md) rather than a resource group. The returned ID differs from the value returned by the [resourceId](#resourceid) function by not including a resource group value.
683683

684-
### subscriptionResourceID example
684+
### subscriptionResourceId example
685685

686686
The following Bicep file assigns a built-in role. You can deploy it to either a resource group or subscription. It uses the `subscriptionResourceId` function to get the resource ID for built-in roles.
687687

articles/sentinel/connect-logstash-data-connection-rules.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,10 @@ The Microsoft Sentinel output plugin for Logstash sends JSON-formatted data to y
7474
- 7.0 - 7.17.13
7575
- 8.0 - 8.9
7676
- 8.11 - 8.15
77+
- 8.19.2
78+
- 9.0.8
79+
- 9.1.10
80+
- 9.2.4 - 9.2.5
7781

7882
> [!NOTE]
7983
> If you use Logstash 8, we recommended that you [disable ECS in the pipeline](https://www.elastic.co/guide/en/logstash/8.4/ecs-ls.html).

0 commit comments

Comments
 (0)