Skip to content

Commit fb10b30

Browse files
committed
Merge branch 'Language-day-1' of https://github.com/jboback/azure-docs-pr into Language-day-1
2 parents 98e19f8 + 03fcfef commit fb10b30

1,195 files changed

Lines changed: 19153 additions & 9556 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 40 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,40 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-cloud/tutorial-security-policy.md",
5+
"redirect_url": "/azure/defender-for-cloud/security-policy-concept",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/defender-for-cloud/how-to-manage-aws-assessments-standards.md",
10+
"redirect_url": "/azure/defender-for-cloud/create-custom-recommendations",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/defender-for-cloud/how-to-manage-gcp-assessments-standards.md",
15+
"redirect_url": "/azure/defender-for-cloud/create-custom-recommendations",
16+
"redirect_document_id": false
17+
},
318
{
419
"source_path_from_root": "/articles/security-center/release-notes.md",
520
"redirect_url": "/azure/defender-for-cloud/release-notes",
621
"redirect_document_id": false
722
},
23+
{
24+
"source_path_from_root": "/articles/defender-for-cloud/concept-credential-scanner-rules.md",
25+
"redirect_url": "/azure/defender-for-cloud/defender-for-devops-introduction",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/defender-for-cloud/concept-devops-posture-management-overview.md",
30+
"redirect_url": "/azure/defender-for-cloud/concept-devops-environment-posture-management-overview",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path_from_root": "/articles/defender-for-cloud/detect-exposed-secrets.md",
35+
"redirect_url": "/azure/defender-for-cloud/defender-for-devops-introduction",
36+
"redirect_document_id": false
37+
},
838
{
939
"source_path_from_root": "/articles/security-center/upcoming-changes.md",
1040
"redirect_url": "/azure/defender-for-cloud/upcoming-changes",
@@ -707,8 +737,8 @@
707737
},
708738
{
709739
"source_path_from_root": "/articles/defender-for-cloud/defender-for-container-registries-cicd.md",
710-
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-cicd",
711-
"redirect_document_id": true
740+
"redirect_url": "/azure/defender-for-cloud/defender-for-devops-introduction",
741+
"redirect_document_id": false
712742
},
713743
{
714744
"source_path_from_root": "/articles/defender-for-cloud/defender-for-container-registries-usage.md",
@@ -738,7 +768,7 @@
738768
{
739769
"source_path_from_root": "/articles/defender-for-cloud/defender-for-containers-cicd.md",
740770
"redirect_url": "/azure/defender-for-cloud/defender-for-devops-introduction",
741-
"redirect_document_id": true
771+
"redirect_document_id": false
742772
},
743773
{
744774
"source_path_from_root": "/articles/defender-for-cloud/tutorial-enable-pull-request-annotations.md",
@@ -752,8 +782,8 @@
752782
},
753783
{
754784
"source_path_from_root": "/articles/defender-for-cloud/detect-credential-leaks.md",
755-
"redirect_url": "/azure/defender-for-cloud/detect-exposed-secrets",
756-
"redirect_document_id": true
785+
"redirect_url": "/azure/defender-for-cloud/defender-for-devops-introduction",
786+
"redirect_document_id": false
757787
},
758788
{
759789
"source_path_from_root": "/articles/defender-for-cloud/defender-for-containers-va-ecr.md",
@@ -845,6 +875,11 @@
845875
"redirect_url": "/azure/defender-for-cloud/defender-for-dns-introduction",
846876
"redirect_document_id": true
847877
},
878+
{
879+
"source_path_from_root": "/articles/defender-for-cloud/support-agentless-containers-posture.md",
880+
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-containers",
881+
"redirect_document_id": false
882+
},
848883
{
849884
"source_path_from_root": "/articles/defender-for-cloud/defender-for-storage-exclude.md",
850885
"redirect_url": "/azure/defender-for-cloud/defender-for-storage-classic-enable#exclude-a-storage-account-from-a-protected-subscription-in-the-per-transaction-plan",

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -870,6 +870,11 @@
870870
"redirect_url": "/azure/azure-arc/vmware-vsphere/switch-to-new-version-vmware",
871871
"redirect_document_id": false
872872
},
873+
{
874+
"source_path": "articles/azure-arc/vmware-vsphere/switch-to-new-version-vmware.md",
875+
"redirect_url": "/azure/azure-arc/vmware-vsphere/switch-to-new-version",
876+
"redirect_document_id": false
877+
},
873878
{
874879
"source_path": "articles/active-directory/azuread-dev/active-directory-authentication-libraries.md",
875880
"redirect_url": "/previous-versions/azure/active-directory/azuread-dev/active-directory-authentication-libraries",
@@ -1005,6 +1010,11 @@
10051010
"redirect_URL": "bicep-import",
10061011
"redirect_document_id": false
10071012
},
1013+
{
1014+
"source_path": "articles/azure-arc/system-center-virtual-machine-manager/switch-to-the-new-preview-version.md",
1015+
"redirect_URL": "/azure/azure-arc/system-center-virtual-machine-manager/switch-to-the-new-preview-version-scvmm",
1016+
"redirect_document_id": false
1017+
},
10081018
{
10091019
"source_path": "articles/migrate/tutorial-assess-webapps-physical.md",
10101020
"redirect_URL": "tutorial-assess-webapps",
@@ -12337,6 +12347,16 @@
1233712347
"redirect_url": "/azure/defender-for-iot/organizations/tutorial-splunk",
1233812348
"redirect_document_id": false
1233912349
},
12350+
{
12351+
"source_path_from_root": "/articles/iot-operations/reference/about-iot-operations-cli.md",
12352+
"redirect_url": "/cli/azure/iot/ops",
12353+
"redirect_document_id": false
12354+
},
12355+
{
12356+
"source_path_from_root": "/articles/iot-operations/manage-layered-network/howto-configure-mq-layered-network.md",
12357+
"redirect_url": "/azure/iot-operations/manage-layered-network/overview-layered-network",
12358+
"redirect_document_id": false
12359+
},
1234012360
{
1234112361
"source_path_from_root": "/articles/jenkins/index.yml",
1234212362
"redirect_url": "/azure/developer/jenkins/",

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -219,6 +219,11 @@
219219
"source_path_from_root": "/articles/virtual-desktop/tutorial-create-connect-personal-desktop.md",
220220
"redirect_url": "/azure/virtual-desktop/tutorial-try-deploy-windows-11-desktop",
221221
"redirect_document_id": true
222+
},
223+
{
224+
"source_path_from_root": "/articles/virtual-desktop/azure-stack-hci.md",
225+
"redirect_url": "/azure/virtual-desktop/deploy-azure-virtual-desktop",
226+
"redirect_document_id": false
222227
}
223228
]
224229
}

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@
6565
items:
6666
- name: Compare solutions for External Identities
6767
href: /entra/external-id/external-identities-overview?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
68-
- name: Supported Microsoft Entra features
68+
- name: Supported Microsoft Entra ID features
6969
href: supported-azure-ad-features.md
7070
- name: Learn authentication basics
7171
items:

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Microsoft Entra SSPR technical profiles in custom policies
2+
title: Microsoft Entra ID SSPR technical profiles in custom policies
33
titleSuffix: Azure AD B2C
4-
description: Custom policy reference for Microsoft Entra SSPR technical profiles in Azure AD B2C.
4+
description: Custom policy reference for Microsoft Entra ID SSPR technical profiles in Azure AD B2C.
55
services: active-directory-b2c
66
author: kengaderdus
77
manager: CelesteDG
@@ -15,11 +15,11 @@ ms.author: kengaderdus
1515
ms.subservice: B2C
1616
---
1717

18-
# Define a Microsoft Entra SSPR technical profile in an Azure AD B2C custom policy
18+
# Define a Microsoft Entra ID SSPR technical profile in an Azure AD B2C custom policy
1919

2020
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2121

22-
Azure Active Directory B2C (Azure AD B2C) provides support for verifying an email address for self-service password reset (SSPR). Use the Microsoft Entra SSPR technical profile to generate and send a code to an email address, and then verify the code. The Microsoft Entra SSPR technical profile may also return an error message. The validation technical profile validates the user-provided data before the user journey continues. With the validation technical profile, an error message displays on a self-asserted page.
22+
Azure Active Directory B2C (Azure AD B2C) provides support for verifying an email address for self-service password reset (SSPR). Use the Microsoft Entra ID SSPR technical profile to generate and send a code to an email address, and then verify the code. The Microsoft Entra ID SSPR technical profile may also return an error message. The validation technical profile validates the user-provided data before the user journey continues. With the validation technical profile, an error message displays on a self-asserted page.
2323

2424
This technical profile:
2525

@@ -35,7 +35,7 @@ The **Name** attribute of the **Protocol** element needs to be set to `Proprieta
3535
Web.TPEngine.Providers.AadSsprProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
3636
```
3737

38-
The following example shows a Microsoft Entra SSPR technical profile:
38+
The following example shows a Microsoft Entra ID SSPR technical profile:
3939

4040
```xml
4141
<TechnicalProfile Id="AadSspr-SendCode">
@@ -81,7 +81,7 @@ The following metadata can be used to configure the error messages displayed upo
8181

8282
### Example: send an email
8383

84-
The following example shows a Microsoft Entra SSPR technical profile that is used to send a code via email.
84+
The following example shows a Microsoft Entra ID SSPR technical profile that is used to send a code via email.
8585

8686
```xml
8787
<TechnicalProfile Id="AadSspr-SendCode">
@@ -137,7 +137,7 @@ The following metadata can be used to configure the error messages displayed upo
137137

138138
### Example: verify a code
139139

140-
The following example shows a Microsoft Entra SSPR technical profile used to verify the code.
140+
The following example shows a Microsoft Entra ID SSPR technical profile used to verify the code.
141141

142142
```xml
143143
<TechnicalProfile Id="AadSspr-VerifyCode">

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.workload: identity
1111
ms.custom: build-2023
1212
ms.topic: reference
13-
ms.date: 12/29/2022
13+
ms.date: 11/06/2023
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelhor
1616
ms.subservice: B2C
@@ -252,7 +252,7 @@ The following technical profile deletes a social user account using **alternativ
252252
| --------- | -------- | ----------- |
253253
| Operation | Yes | The operation to be performed. Possible values: `Read`, `Write`, `DeleteClaims`, or `DeleteClaimsPrincipal`. |
254254
| RaiseErrorIfClaimsPrincipalDoesNotExist | No | Raise an error if the user object does not exist in the directory. Possible values: `true` or `false`. |
255-
| RaiseErrorIfClaimsPrincipalAlreadyExists | No | Raise an error if the user object already exists. Possible values: `true` or `false`.|
255+
| RaiseErrorIfClaimsPrincipalAlreadyExists | No | Raise an error if the user object already exists. Possible values: `true` or `false`. This metadata is applicable only for the Write operation.|
256256
| ApplicationObjectId | No | The application object identifier for extension attributes. Value: ObjectId of an application. For more information, see [Use custom attributes](user-flow-custom-attributes.md?pivots=b2c-custom-policy). |
257257
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](user-flow-custom-attributes.md?pivots=b2c-custom-policy) |
258258
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 09/05/2022
11+
ms.date: 11/06/2023
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -114,7 +114,12 @@ POST https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0
114114
115115
Content-Type: application/x-www-form-urlencoded
116116
117-
grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access&code=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob&code_verifier=ThisIsntRandomButItNeedsToBe43CharactersLong
117+
grant_type=authorization_code
118+
&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
119+
&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access
120+
&code=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...
121+
&redirect_uri=urn:ietf:wg:oauth:2.0:oob
122+
&code_verifier=ThisIsntRandomButItNeedsToBe43CharactersLong
118123
```
119124

120125
| Parameter | Required? | Description |
@@ -188,7 +193,11 @@ POST https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0
188193
189194
Content-Type: application/x-www-form-urlencoded
190195
191-
grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access&refresh_token=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob
196+
grant_type=refresh_token
197+
&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
198+
&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access
199+
&refresh_token=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...
200+
&redirect_uri=urn:ietf:wg:oauth:2.0:oob
192201
```
193202

194203
| Parameter | Required? | Description |

articles/active-directory-b2c/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Define your application and service architecture, inventory current systems, and
4040
| Move on-premises dependencies to the cloud | To help ensure a resilient solution, consider moving existing application dependencies to the cloud. |
4141
| Migrate existing apps to b2clogin.com | The deprecation of login.microsoftonline.com will go into effect for all Azure AD B2C tenants on 04 December 2020. [Learn more](b2clogin.md). |
4242
| Use Identity Protection and Conditional Access | Use these capabilities for significantly greater control over risky authentications and access policies. Azure AD B2C Premium P2 is required. [Learn more](conditional-access-identity-protection-overview.md). |
43-
|Tenant size | You need to plan with Azure AD B2C tenant size in mind. By default, Azure AD B2C tenant can accommodate 1 million objects (user accounts and applications). You can increase this limit to 5 million objects by adding a custom domain to your tenant, and verifying it. If you need a bigger tenant size, you need to contact [Support](find-help-open-support-ticket.md).|
43+
|Tenant size | You need to plan with Azure AD B2C tenant size in mind. By default, Azure AD B2C tenant can accommodate 1.25 million objects (user accounts and applications). You can increase this limit to 5.25 million objects by adding a custom domain to your tenant, and verifying it. If you need a bigger tenant size, you need to contact [Support](find-help-open-support-ticket.md).|
4444
| Use Identity Protection and Conditional Access | Use these capabilities for greater control over risky authentications and access policies. Azure AD B2C Premium P2 is required. [Learn more](conditional-access-identity-protection-overview.md). |
4545

4646
## Implementation

articles/active-directory-b2c/billing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ To change your pricing tier, follow these steps:
125125

126126
![Screenshot that shows how to select the pricing tier.](media/billing/select-tier.png)
127127

128-
Learn about the [Microsoft Entra features, which are supported in Azure AD B2C](supported-azure-ad-features.md).
128+
Learn about the [Microsoft Entra ID features, which are supported in Azure AD B2C](supported-azure-ad-features.md).
129129

130130

131131
## Switch to MAU billing (pre-November 2019 Azure AD B2C tenants)

articles/active-directory-b2c/custom-policies-series-branch-user-journey.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 01/30/2023
13+
ms.date: 11/06/2023
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: B2C
@@ -28,8 +28,7 @@ In [Validate user inputs by using Azure AD B2C custom policy](custom-policies-se
2828

2929
:::image type="content" source="media/custom-policies-series-branch-in-user-journey-using-pre-conditions/screenshot-of-branching-in-user-journey.png" alt-text="A flowchart of branching in user journey.":::
3030

31-
In this article, you'll learn how to use `EnabledForUserJourneys` element inside a technical profile to create different user experiences based on a claim value. First, the user selects their account type, which determines
32-
31+
In this article, you learn how to use `EnabledForUserJourneys` element inside a technical profile to create different user experiences based on a claim value.
3332
## Prerequisites
3433

3534
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
@@ -232,7 +231,7 @@ Follow the steps in [Test the custom policy](custom-policies-series-validate-use
232231

233232
## Next steps
234233

235-
In [step 3](#step-3---configure-or-update-technical-profiles), we enabled or disabled the technical profile by using the `EnabledForUserJourneys` element. Alternatively, you can use [Preconditions](userjourneys.md#preconditions) inside the user journey orchestration steps to execute or skip an orchestration step as we'll learn later in this series.
234+
In [step 3](#step-3---configure-or-update-technical-profiles), we enable or disable the technical profile by using the `EnabledForUserJourneys` element. Alternatively, you can use [Preconditions](userjourneys.md#preconditions) inside the user journey orchestration steps to execute or skip an orchestration step as we learn later in this series.
236235

237236
Next, learn:
238237

0 commit comments

Comments
 (0)