Skip to content

Commit 0a9419a

Browse files
authored
Merge pull request #104978 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents 98a5a67 + e367903 commit 0a9419a

File tree

133 files changed

+1617
-4074
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

133 files changed

+1617
-4074
lines changed

.openpublishing.redirection.json

Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1210,6 +1210,101 @@
12101210
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
12111211
"redirect_document_id": false
12121212
},
1213+
{
1214+
"source_path": "articles/cognitive-services/Speech/concepts.md",
1215+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1216+
"redirect_document_id": false
1217+
},
1218+
{
1219+
"source_path": "articles/cognitive-services/Speech/Home.md",
1220+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1221+
"redirect_document_id": false
1222+
},
1223+
{
1224+
"source_path": "articles/cognitive-services/Speech/samples.md",
1225+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1226+
"redirect_document_id": false
1227+
},
1228+
{
1229+
"source_path": "articles/cognitive-services/Speech/support.md",
1230+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1231+
"redirect_document_id": false
1232+
},
1233+
{
1234+
"source_path": "articles/cognitive-services/Speech/troubleshooting.md",
1235+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1236+
"redirect_document_id": false
1237+
},
1238+
{
1239+
"source_path": "articles/cognitive-services/Speech/API-Reference-REST/BingVoiceOutput.md",
1240+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1241+
"redirect_document_id": false
1242+
},
1243+
{
1244+
"source_path": "articles/cognitive-services/Speech/API-Reference-REST/websocketprotocol.md",
1245+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1246+
"redirect_document_id": false
1247+
},
1248+
{
1249+
"source_path": "articles/cognitive-services/Speech/API-Reference-REST/supportedlanguages.md",
1250+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1251+
"redirect_document_id": false
1252+
},
1253+
{
1254+
"source_path": "articles/cognitive-services/Speech/GetStarted/GetStarted.md",
1255+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1256+
"redirect_document_id": false
1257+
},
1258+
{
1259+
"source_path": "articles/cognitive-services/Speech/GetStarted/GetStartedClientLibraries.md",
1260+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1261+
"redirect_document_id": false
1262+
},
1263+
{
1264+
"source_path": "articles/cognitive-services/Speech/GetStarted/GetStartedCSharpDesktop.md",
1265+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1266+
"redirect_document_id": false
1267+
},
1268+
{
1269+
"source_path": "articles/cognitive-services/Speech/GetStarted/GetStartedCSharpServiceLibrary.md",
1270+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1271+
"redirect_document_id": false
1272+
},
1273+
{
1274+
"source_path": "articles/cognitive-services/Speech/GetStarted/GetStartedJavaAndroid.md",
1275+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1276+
"redirect_document_id": false
1277+
},
1278+
{
1279+
"source_path": "articles/cognitive-services/Speech/GetStarted/GetStartedJSWebsockets.md",
1280+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1281+
"redirect_document_id": false
1282+
},
1283+
{
1284+
"source_path": "articles/cognitive-services/Speech/GetStarted/Get-Started-ObjectiveC-iOS.md",
1285+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1286+
"redirect_document_id": false
1287+
},
1288+
{
1289+
"source_path": "articles/cognitive-services/Speech/GetStarted/GetStartedREST.md",
1290+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1291+
"redirect_document_id": false
1292+
},
1293+
{
1294+
"source_path": "articles/cognitive-services/Speech/How-to/how-to-authentication.md",
1295+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1296+
"redirect_document_id": false
1297+
},
1298+
{
1299+
"source_path": "articles/cognitive-services/Speech/How-to/how-to-choose-recognition-mode.md",
1300+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1301+
"redirect_document_id": false
1302+
},
1303+
{
1304+
"source_path": "articles/cognitive-services/Speech/How-to/how-to-chunked-transfer.md",
1305+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-bing-speech",
1306+
"redirect_document_id": false
1307+
},
12131308
{
12141309
"source_path": "articles/cognitive-services/Emotion/emotion-api-how-to-topics/HowtoAnalyzeVideo_Emotion.md",
12151310
"redirect_url": "/azure/cognitive-services/face/overview",
@@ -18389,6 +18484,21 @@
1838918484
"source_path": "articles/backup/backup-azure-vms-prepare.md",
1839018485
"redirect_url": "/azure/backup/backup-azure-arm-vms-prepare",
1839118486
"redirect_document_id": false
18487+
},
18488+
{
18489+
"source_path": "articles/backup/backup-azure-configure-reports.md",
18490+
"redirect_url": "/azure/backup/configure-reports.md",
18491+
"redirect_document_id": false
18492+
},
18493+
{
18494+
"source_path": "articles/backup/backup-azure-log-analytics-data-model.md",
18495+
"redirect_url": "/azure/backup/backup-azure-diagnostics-mode-data-model.md",
18496+
"redirect_document_id": false
18497+
},
18498+
{
18499+
"source_path": "articles/backup/backup-azure-log-analytics-new-data-model.md",
18500+
"redirect_url": "/azure/backup/backup-azure-reports-data-model.md",
18501+
"redirect_document_id": false
1839218502
},
1839318503
{
1839418504
"source_path": "articles/app-service/api/index.md",

articles/active-directory-b2c/deploy-custom-policies-devops.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ Next, add a task to deploy a policy file.
161161
162162
```PowerShell
163163
# After
164-
-ClientID $(clientId) -ClientSecret $(clientSecret) -TenantId $(tenantId) -PolicyId B2C_1A_TrustFrameworkBase -PathToFile $(System.DefaultWorkingDirectory)/contosob2cpolicies/B2CAssets/TrustFrameworkBase.xml
164+
-ClientID $(clientId) -ClientSecret $(clientSecret) -TenantId $(tenantId) -PolicyId B2C_1A_TrustFrameworkBase -PathToFile $(System.DefaultWorkingDirectory)/policyRepo/B2CAssets/TrustFrameworkBase.xml
165165
```
166166
167167
1. Select **Save** to save the Agent job.
@@ -213,4 +213,4 @@ Learn more about:
213213
<!-- LINKS - External -->
214214
[devops]: https://docs.microsoft.com/azure/devops/?view=azure-devops
215215
[devops-create-project]: https://docs.microsoft.com/azure/devops/organizations/projects/create-project?view=azure-devops
216-
[devops-pipelines]: https://docs.microsoft.com/azure/devops/pipelines
216+
[devops-pipelines]: https://docs.microsoft.com/azure/devops/pipelines

articles/active-directory/privileged-identity-management/azure-ad-custom-roles-activate.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,9 @@ ms.collection: M365-identity-device-management
2727
Privileged Identity Management in Azure Active Directory (Azure AD) now supports just-in-time and time-bound assignment to custom roles created for Application Management in the Identity and Access Management administrative experience. For more information about creating custom roles to delegate application management in Azure AD, see [Custom administrator roles in Azure Active Directory (preview)](../users-groups-roles/roles-custom-overview.md).
2828

2929
> [!NOTE]
30-
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience.
30+
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience. If you see the following banner, these roles should be managed [in the built-in roles experience](pim-how-to-activate-role.md) and this article does not apply:
31+
>
32+
> [![](media/pim-how-to-add-role-to-user/pim-new-version.png "Select Azure AD > Privileged Identity Management")](media/pim-how-to-add-role-to-user/pim-new-version.png#lightbox)
3133
3234
## Activate a role
3335

articles/active-directory/privileged-identity-management/azure-ad-custom-roles-assign.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,9 @@ This article tells you how to use Privileged Identity Management (PIM) to create
3131
- For information about how to grant another administrator access to manage Privileged Identity Management, see [Grant access to other administrators to manage Privileged Identity Management](pim-how-to-give-access-to-pim.md).
3232

3333
> [!NOTE]
34-
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience.
34+
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience. If you see the following banner, these roles should be managed [in the built-in roles experience](pim-how-to-activate-role.md) and this article does not apply:
35+
>
36+
> [![](media/pim-how-to-add-role-to-user/pim-new-version.png "Select Azure AD > Privileged Identity Management")](media/pim-how-to-add-role-to-user/pim-new-version.png#lightbox)
3537
3638
## Assign a role
3739

articles/active-directory/privileged-identity-management/azure-ad-custom-roles-configure.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,11 @@ ms.collection: M365-identity-device-management
2626

2727
A privileged role administrator can change the role settings that apply to a user when they activate their assignment to a custom role and for other application administrators that are assigning custom roles.
2828

29+
> [!NOTE]
30+
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience. If you see the following banner, these roles should be managed [in the built-in roles experience](pim-how-to-activate-role.md) and this article does not apply:
31+
>
32+
> [![](media/pim-how-to-add-role-to-user/pim-new-version.png "Select Azure AD > Privileged Identity Management")](media/pim-how-to-add-role-to-user/pim-new-version.png#lightbox)
33+
2934
## Open role settings
3035

3136
Follow these steps to open the settings for an Azure AD role.
@@ -94,7 +99,7 @@ If you want to require approval to activate a role, follow these steps.
9499

95100
## Next steps
96101

97-
- [Activate an Azure AD custom role](azure-ad-custom-roles-assign.md)
102+
- [Activate an Azure AD custom role](azure-ad-custom-roles-activate.md)
98103
- [Assign an Azure AD custom role](azure-ad-custom-roles-assign.md)
99104
- [Remove or update an Azure AD custom role assignment](azure-ad-custom-roles-update-remove.md)
100105
- [Role definitions in Azure AD](../users-groups-roles/directory-assign-admin-roles.md)

articles/active-directory/privileged-identity-management/azure-ad-custom-roles-update-remove.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,9 @@ This article tells you how to use Privileged Identity Management (PIM) to update
3030
- If you haven't used Privileged Identity Management yet, get more information at [Start using Privileged Identity Management](pim-getting-started.md).
3131

3232
> [!NOTE]
33-
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management role management will take place in the built-in roles experience.
33+
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience. If you see the following banner, these roles should be managed [in the built-in roles experience](pim-how-to-add-role-to-user.md) and this article does not apply:
34+
>
35+
> [![](media/pim-how-to-add-role-to-user/pim-new-version.png "Select Azure AD > Privileged Identity Management")](media/pim-how-to-add-role-to-user/pim-new-version.png#lightbox)
3436
3537
## Update or remove an assignment
3638

articles/active-directory/privileged-identity-management/azure-ad-pim-approval-workflow.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: pim
17-
ms.date: 11/12/2019
17+
ms.date: 02/07/2020
1818
ms.author: curtand
1919
ms.custom: pim
2020
ms.collection: M365-identity-device-management
@@ -26,28 +26,28 @@ With Azure Active Directory (Azure AD) Privileged Identity Management (PIM), you
2626

2727
## Determine your version of PIM
2828

29-
Beginning in November 2019, the Azure AD roles portion of Privileged Identity Management is being updated to a new version that matches the experiences for Azure resource roles. This creates additional features as well as [changes to the existing API](azure-ad-roles-features.md#api-changes). While the new version is being rolled out, which procedures that you follow in this article depend on version of Privileged Identity Management you currently have. Follow the steps in this section to determine which version of Privileged Identity Management you have. After you know your version of Privileged Identity Management, you can select the procedures in this article that match that version.
29+
Beginning in November 2019, the Azure AD roles portion of Privileged Identity Management is being updated to a new version that matches the experiences for Azure roles. This creates additional features as well as [changes to the existing API](azure-ad-roles-features.md#api-changes). While the new version is being rolled out, which procedures that you follow in this article depend on version of Privileged Identity Management you currently have. Follow the steps in this section to determine which version of Privileged Identity Management you have. After you know your version of Privileged Identity Management, you can select the procedures in this article that match that version.
3030

3131
1. Sign in to the [Azure portal](https://portal.azure.com/) with a user who is in the [Privileged role administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
3232
1. Open **Azure AD Privileged Identity Management**. If you have a banner on the top of the overview page, follow the instructions in the **New version** tab of this article. Otherwise, follow the instructions in the **Previous version** tab.
3333

34-
![Azure AD roles new version](./media/pim-how-to-add-role-to-user/pim-new-version.png)
34+
[![](media/pim-how-to-add-role-to-user/pim-new-version.png "Select Azure AD > Privileged Identity Management")](media/pim-how-to-add-role-to-user/pim-new-version.png#lightbox)
3535

3636
Follow the steps in this article to approve or deny requests for Azure AD roles.
3737

3838
# [New version](#tab/new)
3939

4040
## View pending requests
4141

42-
As a delegated approver, you'll receive an email notification when an Azure resource role request is pending your approval. You can view these pending requests in Privileged Identity Management.
42+
As a delegated approver, you'll receive an email notification when an Azure AD role request is pending your approval. You can view these pending requests in Privileged Identity Management.
4343

4444
1. Sign in to the [Azure portal](https://portal.azure.com/).
4545

4646
1. Open **Azure AD Privileged Identity Management**.
4747

4848
1. Select **Approve requests**.
4949

50-
![Approve requests - Azure resources page showing request to review](./media/pim-resource-roles-approval-workflow/resources-approve-requests.png)
50+
![Approve requests - page showing request to review Azure AD roles](./media/azure-ad-pim-approval-workflow/resources-approve-pane.png)
5151

5252
In the **Requests for role activations** section, you'll see a list of requests pending your approval.
5353

@@ -61,7 +61,7 @@ As a delegated approver, you'll receive an email notification when an Azure reso
6161

6262
1. Select **Approve**. You will receive an Azure notification of your approval.
6363

64-
![Approve notification showing request was approved](./media/pim-resource-roles-approval-workflow/resources-approve-notification.png)
64+
![Approve notification showing request was approved](./media/pim-resource-roles-approval-workflow/resources-approve-pane.png))
6565

6666
## Deny requests
6767

@@ -80,10 +80,10 @@ Here's some information about workflow notifications:
8080
- Approvers are notified by email when a request for a role is pending their review. Email notifications include a direct link to the request, where the approver can approve or deny.
8181
- Requests are resolved by the first approver who approves or denies.
8282
- When an approver responds to the request, all approvers are notified of the action.
83-
- Resource administrators are notified when an approved user becomes active in their role.
83+
- Global admins and Privileged role admins are notified when an approved user becomes active in their role.
8484

8585
>[!NOTE]
86-
>A resource administrator who believes that an approved user should not be active can remove the active role assignment in Privileged Identity Management. Although resource administrators are not notified of pending requests unless they are an approver, they can view and cancel pending requests for all users by viewing pending requests in Privileged Identity Management.
86+
>A Global admin or Privileged role admin who believes that an approved user should not be active can remove the active role assignment in Privileged Identity Management. Although administrators are not notified of pending requests unless they are an approver, they can view and cancel any pending requests for all users by viewing pending requests in Privileged Identity Management.
8787
8888
# [Previous version](#tab/previous)
8989

@@ -129,7 +129,7 @@ As a delegated approver, you'll receive an email notification when an Azure AD r
129129

130130
![Deny selected requests pane with a deny reason](./media/azure-ad-pim-approval-workflow/pim-deny-selected-requests.png)
131131

132-
1. Click **Deny**.
132+
1. Select **Deny**.
133133

134134
The Status symbol will be updated with your denial.
135135

articles/active-directory/privileged-identity-management/azure-ad-roles-features.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ The management experience for Azure AD roles in Privileged Identity Management h
2828

2929
With the update being currently rolled out, we are merging the two into a single management experience, and in it you get the same functionality for Azure AD roles as for Azure resource roles. This article informs you of the updated features and any requirements.
3030

31+
3132
## Time-bound assignments
3233

3334
Previously in Privileged Identity Management for Azure AD roles, you were familiar with role assignments with two possible states – *eligible* and *permanent*. Now you can set a start and end time for each type of assignment. This addition gives you four possible states in which you can place an assignment:
77.6 KB
Loading
63 KB
Loading

0 commit comments

Comments
 (0)