Skip to content

Commit 0187592

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents a4d4ef1 + 1b19b8d commit 0187592

File tree

134 files changed

+1185
-1041
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

134 files changed

+1185
-1041
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13520,6 +13520,11 @@
1352013520
"redirect_url": "/azure/azure-toolkit-for-intelliJ",
1352113521
"redirect_document_id": false
1352213522
},
13523+
{
13524+
"source_path_from_root": "/articles/azure-vmware/reset-vsphere-credentials.md",
13525+
"redirect_url": "/azure/azure-vmware/rotate-cloudadmin-credentials",
13526+
"redirect_document_id": false
13527+
},
1352313528
{
1352413529
"source_path_from_root": "/articles/azure-vmware/set-up-backup-server-for-azure-vmware-solution.md",
1352513530
"redirect_url": "/azure/backup/backup-azure-microsoft-azure-backup",
@@ -64855,6 +64860,11 @@
6485564860
"redirect_url": "/azure/azure-monitor/alerts/tutorial-response",
6485664861
"redirect_document_id": false
6485764862
},
64863+
{
64864+
"source_path_from_root": "/articles/azure-monitor/alerts/tutorial-response.md",
64865+
"redirect_url": "/azure/azure-monitor/alerts/alerts-log",
64866+
"redirect_document_id": false
64867+
},
6485864868
{
6485964869
"source_path_from_root": "/articles/azure-monitor/samples/cli-samples.md",
6486064870
"redirect_url": "/azure/azure-monitor//cli-samples",

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/22/2021
12+
ms.date: 05/11/2021
1313
ms.custom: project-no-code
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -57,10 +57,10 @@ To enable self-service password reset for the sign-up or sign-in user flow:
5757
1. Select **User flows**.
5858
1. Select a sign-up or sign-in user flow (of type **Recommended**) that you want to customize.
5959
1. Under **Settings** in the left menu, select **Properties**.
60-
1. Under **Password complexity**, select **Self-service password reset**.
60+
1. Under **Password configuration**, select **Self-service password reset**.
6161
1. Select **Save**.
6262
1. Under **Customize** in the left menu, select **Page layouts**.
63-
1. In the **Page Layout Version**, choose **2.1.2 - Current** or above.
63+
1. In the **Page Layout Version**, choose **2.1.3** or above.
6464
1. Select **Save**.
6565

6666
::: zone-end

articles/active-directory-b2c/azure-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -255,7 +255,7 @@ The workbook will display reports in the form of a dashboard.
255255

256256
## Create alerts
257257

258-
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events are created, absence of an event, or a number of events are created within a particular time window. For example, alerts can be used to notify you when average number of sign-in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/tutorial-response.md).
258+
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events are created, absence of an event, or a number of events are created within a particular time window. For example, alerts can be used to notify you when average number of sign-in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-log.md).
259259

260260

261261
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md#configure-notifications) whenever there is a 25% drop in the **Total Requests** compare to previous period. Alert will run every 5 minutes and look for the drop within last 24 hours windows. The alerts are created using Kusto query language.

articles/active-directory/app-provisioning/application-provisioning-log-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ AADProvisioningLogs
9191

9292
Azure Monitor lets you configure custom alerts so that you can get notified about key events related to Provisioning. For example, you might want to receive an alert on spikes in failures. Or perhaps spikes in disables or deletes. Another example of where you might want to be alerted is a lack of any provisioning, which indicates something is wrong.
9393

94-
To learn more about alerts, see [Respond to events with Azure Monitor Alerts](../../azure-monitor/alerts/tutorial-response.md).
94+
To learn more about alerts, see [Azure Monitor Log Alerts](../../azure-monitor/alerts/alerts-log.md).
9595

9696
Alert when there's a spike in failures. Replace the jobID with the jobID for your application.
9797

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@ Administrators can assign a Conditional Access policy to the following cloud app
3535
- [Office 365](#office-365)
3636
- Azure Analysis Services
3737
- Azure DevOps
38+
- Azure Event Hubs
39+
- Azure Service Bus
3840
- [Azure SQL Database and Azure Synapse Analytics](../../azure-sql/database/conditional-access-configure.md)
3941
- Dynamics CRM Online
4042
- Microsoft Application Insights Analytics

articles/active-directory/develop/index.yml

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
### YamlMime:Landing
22

33
title: Microsoft identity platform documentation
4-
summary: The Microsoft identity platform is an authentication service, open-source libraries, and application management tools. Learn to create modern, standards-based authentication solutions with our quickstarts, tutorials, and code samples. Build applications your users and customers sign in to using their Microsoft identities or social accounts, and authorize access to your APIs or Microsoft APIs like Microsoft Graph.
4+
summary: The Microsoft identity platform for developers is an authentication service, open-source libraries, and application management tools. Learn to create modern, standards-based authentication solutions with our quickstarts, tutorials, and code samples. Build applications your users and customers sign in to using their Microsoft identities or social accounts, and authorize access to your APIs or Microsoft APIs like Microsoft Graph.
55

66
metadata:
77
ms.topic: landing-page
8-
ms.date: 10/07/2020
8+
ms.date: 05/11/2021
99
author: mmacy
1010
ms.author: marsma
1111
ms.service: active-directory
@@ -51,9 +51,11 @@ landingContent:
5151
- linkListType: get-started
5252
links:
5353
- text: Angular
54-
url: quickstart-v2-angular.md
54+
url: tutorial-v2-angular-auth-code.md
5555
- text: JavaScript
56-
url: quickstart-v2-javascript-auth-code.md
56+
url: tutorial-v2-javascript-auth-code.md
57+
- text: React
58+
url: tutorial-v2-react.md
5759
- title: Web app
5860
linkLists:
5961
- linkListType: get-started
@@ -118,13 +120,9 @@ landingContent:
118120
url: ../managed-identities-azure-resources/overview.md
119121
- text: Managed identities and Azure VMs
120122
url: ../managed-identities-azure-resources/how-managed-identities-work-vm.md
121-
- title: New in docs
123+
- title: New in identity platform docs
122124
linkLists:
123125
- linkListType: whats-new
124126
links:
125127
- text: "What's new in docs?" # 9/26/2020
126128
url: whats-new-docs.md
127-
- text: "Microsoft Identity Web library overview" # 10/07/2020
128-
url: microsoft-identity-web.md
129-
- text: "Tutorial: Blazor Server" # 9/26/2020
130-
url: tutorial-blazor-server.md

articles/active-directory/external-identities/invite-internal-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Sending an invitation to an existing internal account lets you retain that user
2929

3030
- **Invitation is one-way**: You can invite internal users to use B2B collaboration, but you can’t remove the B2B credentials once they’re added. To change the user back to an internal-only user, you’ll need to delete the user object and create a new one.
3131

32-
- **Teams**: When the user accesses Teams using their external credentials, their tenant won't be available initially in the Teams tenant picker. The user can access Teams using a URL that contains the tenant context, for example: `https://team.microsoft.com/?tenantId=<TenantId>`. After that, the tenant will become available in the Teams tenant picker.
32+
- **Teams**: When the user accesses Teams using their external credentials, their tenant won't be available initially in the Teams tenant picker. The user can access Teams using a URL that contains the tenant context, for example: `https://teams.microsoft.com/?tenantId=<TenantId>`. After that, the tenant will become available in the Teams tenant picker.
3333

3434
- **On-premises synced users**: For user accounts that are synced between on-premises and the cloud, the on-premises directory remains the source of authority after they’re invited to use B2B collaboration. Any changes you make to the on-premises account will sync to the cloud account, including disabling or deleting the account. Therefore, you can’t prevent the user from signing into their on-premises account while retaining their cloud account by simply deleting the on-premises account. Instead, you can set the on-premises account password to a random GUID or other unknown value.
3535

articles/active-directory/saas-apps/samsung-knox-and-business-services-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 01/27/2021
12+
ms.date: 05/11/2021
1313
ms.author: jeedes
1414

1515
---
@@ -33,7 +33,7 @@ To get started, you need the following items:
3333

3434
In this tutorial, you configure and test Azure AD SSO in a test environment.
3535

36-
* Samsung Knox and Business Services supports **SP** initiated SSO
36+
* Samsung Knox and Business Services supports **SP** initiated SSO.
3737

3838
> [!NOTE]
3939
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
@@ -75,7 +75,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7575
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
7676

7777
* In the **Sign on URL** text box, type the URL:
78-
`https://www.samsungknox.com`
78+
`https://www2.samsungknox.com/en/sso/login/ad`
7979
* In the **Reply URL (assertion consumer service URL)** text box, type the URL:
8080
`https://central.samsungknox.com/ams/ad/saml/acs`
8181

articles/aks/csi-secrets-store-driver.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: nickoman
66
ms.service: container-service
77
ms.topic: how-to
88
ms.date: 03/30/2021
9-
ms.custom: template-how-to
9+
ms.custom: template-how-to, devx-track-azurecli
1010
---
1111

1212
# Use the Secrets Store CSI Driver for Kubernetes in an Azure Kubernetes Service (AKS) cluster (preview)

articles/aks/enable-host-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure a host-based encryption in an Azure Kubernet
44
services: container-service
55
ms.topic: article
66
ms.date: 03/03/2021
7-
ms.custom: devx-track-azurepowershell
7+
ms.custom: devx-track-azurepowershell, devx-track-azurecli
88

99
---
1010

0 commit comments

Comments
 (0)