Skip to content

Commit 0becedd

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into tshoot-connect-sync-errors
2 parents fc0bb13 + 034b310 commit 0becedd

File tree

402 files changed

+7848
-7886
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

402 files changed

+7848
-7886
lines changed

.openpublishing.redirection.json

Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2463,6 +2463,16 @@
24632463
"redirect_url": "/azure/machine-learning/reference-yaml-overview.md",
24642464
"redirect_document_id": false
24652465
},
2466+
{
2467+
"source_path_from_root": "/articles/machine-learning/tutorial-train-models-with-aml.md",
2468+
"redirect_url": "/azure/machine-learning/tutorial-train-deploy-notebook",
2469+
"redirect_document_id": true
2470+
},
2471+
{
2472+
"source_path_from_root": "/articles/machine-learning/tutorial-deploy-models-with-aml.md",
2473+
"redirect_url": "/azure/machine-learning/tutorial-train-deploy-notebook",
2474+
"redirect_document_id": false
2475+
},
24662476
{
24672477
"source_path_from_root": "/articles/machine-learning/how-to-create-labeling-projects.md",
24682478
"redirect_url": "/azure/machine-learning/how-to-create-image-labeling-projects",
@@ -41758,6 +41768,86 @@
4175841768
"redirect_url": "/azure/cognitive-services/Content-Moderator/encrypt-data-at-rest",
4175941769
"redirect_document_id": false
4176041770
},
41771+
{
41772+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/ecommerce-retail-catalog-moderation.md",
41773+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41774+
"redirect_document_id": false
41775+
},
41776+
{
41777+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/facebook-post-moderation.md",
41778+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41779+
"redirect_document_id": false
41780+
},
41781+
{
41782+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/moderation-jobs-quickstart-dotnet.md",
41783+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41784+
"redirect_document_id": false
41785+
},
41786+
{
41787+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/quick-start.md",
41788+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41789+
"redirect_document_id": false
41790+
},
41791+
{
41792+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/review-api.md",
41793+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41794+
"redirect_document_id": false
41795+
},
41796+
{
41797+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/try-review-api-job.md",
41798+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41799+
"redirect_document_id": false
41800+
},
41801+
{
41802+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/try-review-api-workflow.md",
41803+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41804+
"redirect_document_id": false
41805+
},
41806+
{
41807+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/video-moderation-human-review.md",
41808+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41809+
"redirect_document_id": false
41810+
},
41811+
{
41812+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/video-reviews-quickstart-dotnet.md",
41813+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41814+
"redirect_document_id": false
41815+
},
41816+
{
41817+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/video-transcript-reviews-quickstart-dotnet.md",
41818+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41819+
"redirect_document_id": false
41820+
},
41821+
{
41822+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Configure.md",
41823+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41824+
"redirect_document_id": false
41825+
},
41826+
{
41827+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/human-in-the-loop.md",
41828+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41829+
"redirect_document_id": false
41830+
},
41831+
{
41832+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Review-Moderated-Images.md",
41833+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41834+
"redirect_document_id": false
41835+
},
41836+
{
41837+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Workflows.md",
41838+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41839+
"redirect_document_id": false
41840+
},
41841+
{
41842+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/try-review-api-review.md",
41843+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41844+
"redirect_document_id": false
41845+
},
41846+
{
41847+
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/whats-new.md",
41848+
"redirect_url": "/azure/cognitive-services/Content-Moderator/overview",
41849+
"redirect_document_id": false
41850+
},
4176141851
{
4176241852
"source_path_from_root": "/articles/cognitive-services/Custom-Vision-Service/custom-vision-encryption-of-data-at-rest.md",
4176341853
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/encrypt-data-at-rest",

articles/active-directory-b2c/access-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,11 +60,11 @@ If the **response_type** parameter in an `/authorize` request includes `token`,
6060

6161
## Request a token
6262

63-
To request an access token, you need an authorization code. Below is an example of a request to the `/authorize` endpoint for an authorization code. Custom domains are not supported for use with access tokens. Use your tenant-name.onmicrosoft.com domain in the request URL.
63+
To request an access token, you need an authorization code. Below is an example of a request to the `/authorize` endpoint for an authorization code.
6464

6565
In the following example, you replace these values in the query string:
6666

67-
- `<tenant-name>` - The name of your Azure AD B2C tenant.
67+
- `<tenant-name>` - The name of your [Azure AD B2C tenant](tenant-management.md#get-your-tenant-name). If you're using a custom domain, replace `tenant-name.b2clogin.com` with your domain, such as `contoso.com`.
6868
- `<policy-name>` - The name of your custom policy or user flow.
6969
- `<application-ID>` - The application identifier of the web application that you registered to support the user flow.
7070
- `<application-ID-URI>` - The application identifier URI that you set under **Expose an API** blade of the client application.

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 25 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/12/2021
12+
ms.date: 1/11/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -133,8 +133,30 @@ The following table lists the [OAuth2 identity provider](oauth2-technical-profil
133133

134134
| Claim | Description | Example |
135135
| ----- | ----------------------- | --------|
136-
| {oauth2:access_token} | The access token. | N/A |
137-
| {oauth2:refresh_token} | The refresh token. | N/A |
136+
| {oauth2:access_token} | The OAuth2 identity provider access token. The `access_token` attribute. | `eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1Ni...` |
137+
| {oauth2:token_type} | The type of the access token. The `token_type` attribute. | Bearer |
138+
| {oauth2:expires_in} | The length of time that the access token is valid in seconds. The `expires_in` attribute. The output claim [DataType](claimsschema.md#datatype) must be `int` or `long`. | 960000 |
139+
| {oauth2:refresh_token} | The OAuth2 identity provider refresh token. The `refresh_token` attribute. | `eyJraWQiOiJacW9pQlp2TW5pYVc2MUY...` |
140+
141+
To use the OAuth2 identity provider claim resolvers, set the output claim's `PartnerClaimType` attribute to the claim resolver. The following example demonstrates how the get the external identity provider claims:
142+
143+
```xml
144+
<ClaimsProvider>
145+
<DisplayName>Contoso</DisplayName>
146+
<TechnicalProfiles>
147+
<TechnicalProfile Id="Contoso-OAUTH">
148+
<OutputClaims>
149+
<OutputClaim ClaimTypeReferenceId="identityProviderAccessToken" PartnerClaimType="{oauth2:access_token}" />
150+
<OutputClaim ClaimTypeReferenceId="identityProviderAccessTokenType" PartnerClaimType="{oauth2:token_type}" />
151+
<OutputClaim ClaimTypeReferenceId="identityProviderAccessTokenExpiresIn" PartnerClaimType="{oauth2:expires_in}" />
152+
<OutputClaim ClaimTypeReferenceId="identityProviderRefreshToken" PartnerClaimType="{oauth2:refresh_token}" />
153+
</OutputClaims>
154+
...
155+
</TechnicalProfile>
156+
</TechnicalProfiles>
157+
</ClaimsProvider>
158+
```
159+
138160

139161
## Using claim resolvers
140162

articles/active-directory-b2c/saml-identity-provider-technical-profile.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 09/20/2021
12+
ms.date: 01/11/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -166,6 +166,7 @@ The **OutputClaimsTransformations** element may contain a collection of **Output
166166
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
167167
|SingleLogoutEnabled| No| Indicates whether during sign-in the technical profile attempts to sign out from federated identity providers. For more information, see [Azure AD B2C session sign-out](session-behavior.md#sign-out). Possible values: `true` (default), or `false`.|
168168
|ForceAuthN| No| Passes the ForceAuthN value in the SAML authentication request to determine if the external SAML IDP will be forced to prompt the user for authentication. By default, Azure AD B2C sets the ForceAuthN value to false on initial login. If the session is then reset (for example by using the `prompt=login` in OIDC) then the ForceAuthN value will be set to `true`. Setting the metadata item as shown below will force the value for all requests to the external IDP. Possible values: `true` or `false`.|
169+
|ProviderName| No| Passes the ProviderName value in the SAML authentication request.|
169170

170171

171172
## Cryptographic keys

articles/active-directory/app-provisioning/functions-for-customizing-application-data.md

Lines changed: 36 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -274,6 +274,8 @@ Returns a date/time string representing a date to which a specified time interva
274274
| **value** |Required | Number | The number of units you want to add. It can be positive (to get dates in the future) or negative (to get dates in the past). |
275275
| **dateTime** |Required | DateTime | DateTime representing date to which the interval is added. |
276276

277+
When passing a date string as input use [CDate](#cdate) function to wrap the datetime string. To get system time in UTC use the [Now](#now) function.
278+
277279
The **interval** string must have one of the following values:
278280
* yyyy Year
279281
* m Month
@@ -283,30 +285,17 @@ The **interval** string must have one of the following values:
283285
* n Minute
284286
* s Second
285287

286-
**Example 1: Add 7 days to hire date**
288+
**Example 1: Generate a date value based on incoming StatusHireDate from Workday** <br>
287289
`DateAdd("d", 7, CDate([StatusHireDate]))`
288-
* **INPUT** (StatusHireDate): 2012-03-16-07:00
289-
* **OUTPUT**: 3/23/2012 7:00:00 AM
290-
291-
**Example 2: Get a date ten days prior to hire date**
292-
`DateAdd("d", -10, CDate([StatusHireDate]))`
293-
* **INPUT** (StatusHireDate): 2012-03-16-07:00
294-
* **OUTPUT**: 3/6/2012 7:00:00 AM
295-
296-
**Example 3: Add two weeks to hire date**
297-
`DateAdd("ww", 2, CDate([StatusHireDate]))`
298-
* **INPUT** (StatusHireDate): 2012-03-16-07:00
299-
* **OUTPUT**: 3/30/2012 7:00:00 AM
300-
301-
**Example 4: Add ten months to hire date**
302-
`DateAdd("m", 10, CDate([StatusHireDate]))`
303-
* **INPUT** (StatusHireDate): 2012-03-16-07:00
304-
* **OUTPUT**: 1/16/2013 7:00:00 AM
305-
306-
**Example 5: Add two years to hire date**
307-
`DateAdd("yyyy", 2, CDate([StatusHireDate]))`
308-
* **INPUT** (StatusHireDate): 2012-03-16-07:00
309-
* **OUTPUT**: 3/16/2014 7:00:00 AM
290+
291+
| Example | interval | value | dateTime (value of variable StatusHireDate) | output |
292+
| --- | --- | --- | --- | --- |
293+
| Add 7 days to hire date | "d" | 7 | 2012-03-16-07:00 | 3/23/2012 7:00:00 AM |
294+
| Get a date ten days prior to hire date | "d" | -10 | 2012-03-16-07:00 | 3/6/2012 7:00:00 AM |
295+
| Add two weeks to hire date | "ww" | 2 | 2012-03-16-07:00 | 3/30/2012 7:00:00 AM |
296+
| Add ten months to hire date | "m" | 10 | 2012-03-16-07:00 | 1/16/2013 7:00:00 AM |
297+
| Add two years to hire date | "yyyy" | 10 | 2012-03-16-07:00 | 3/16/2014 7:00:00 AM |
298+
310299
---
311300
### DateDiff
312301
**Function:**
@@ -326,6 +315,8 @@ This function uses the *interval* parameter to return a number that indicates th
326315
| **date1** |Required | DateTime | DateTime representing a valid date. |
327316
| **date2** |Required | DateTime | DateTime representing a valid date. |
328317

318+
When passing a date string as input use [CDate](#cdate) function to wrap the datetime string. To get system time in UTC use the [Now](#now) function.
319+
329320
The **interval** string must have one of the following values:
330321
* yyyy Year
331322
* m Month
@@ -464,9 +455,30 @@ The IIF function returns one of a set of possible values based on a specified co
464455
| **valueIfTrue** |Required |Variable or String | If the condition evaluates to true, the returned value. |
465456
| **valueIfFalse** |Required |Variable or String |If the condition evaluates to false, the returned value.|
466457

467-
**Example:**
458+
The following comparison operators can be used in the *condition*:
459+
* Equal to (=) and not equal to (<>)
460+
* Greater than (>) and greater than equal to (>=)
461+
* Less than (<) and less than equal to (<=)
462+
463+
**Example:** Set the target attribute value to source country attribute if country="USA", else set target attribute value to source department attribute.
468464
`IIF([country]="USA",[country],[department])`
469465

466+
#### Known limitations and workarounds for IIF function
467+
* The IIF function currently does not support AND and OR logical operators.
468+
* To implement AND logic, use nested IIF statement chained along the *trueValue* path.
469+
Example: If country="USA" and state="CA", return value "True", else return "False".
470+
`IIF([country]="USA",IIF([state]="CA","True","False"),"False")`
471+
* To implement OR logic, use nested IIF statement chained along the *falseValue* path.
472+
Example: If country="USA" or state="CA", return value "True", else return "False".
473+
`IIF([country]="USA","True",IIF([state]="CA","True","False"))`
474+
* If the source attribute used within the IIF function is empty or null, the condition check fails.
475+
* Unsupported IIF expression examples:
476+
* `IIF([country]="","Other",[country])`
477+
* `IIF(IsNullOrEmpty([country]),"Other",[country])`
478+
* `IIF(IsPresent([country]),[country],"Other")`
479+
* Recommended workaround: Use the [Switch](#switch) function to check for empty/null values. Example: If country attribute is empty, set value "Other". If it is present, pass the country attribute value to target attribute.
480+
* `Switch([country],[country],"","Other")`
481+
<br>
470482
---
471483
### InStr
472484
**Function:**

articles/active-directory/authentication/howto-mfa-reporting-datacollection.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Azure AD MFA user data collection - Azure Active Directory
3-
description: What information is used to help authenticate users by Azure AD Multi-Factor Authentication?
2+
title: Azure AD user data collection - Azure Active Directory
3+
description: What information is used to help authenticate users by self-service password reset and Azure AD Multi-Factor Authentication?
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 11/21/2019
9+
ms.date: 01/07/2021
1010

1111
ms.author: justinha
1212
author: justinha
@@ -15,13 +15,13 @@ ms.reviewer: michmcla
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Azure AD Multi-Factor Authentication user data collection
18+
# Azure AD user data collection for multifactor authentication and self-service password reset
1919

20-
This document explains how to find user information collected by Azure Multi-Factor Authentication Server (MFA Server) and Azure AD MFA (Cloud-based) in the event you would like to remove it.
20+
This document explains how to find user information collected by Azure Multi-Factor Authentication Server (MFA Server), Azure AD MFA (Cloud-based), and self-service password reset (SSPR) in the event you would like to remove it.
2121

2222
[!INCLUDE [gdpr-hybrid-note](../../../includes/gdpr-hybrid-note.md)]
2323

24-
## Information collected
24+
## MFA information collected
2525

2626
MFA Server, the NPS Extension, and the Windows Server 2016 Azure AD MFA AD FS Adapter collect and store the following information for 90 days.
2727

@@ -179,12 +179,18 @@ Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azu
179179

180180
- MFA information is included in the export, which may take hours or days to complete.
181181

182-
## Delete Data for Azure AD MFA
182+
## Delete data for Azure AD MFA
183183

184184
Use the [Microsoft Privacy Portal](https://portal.azure.com/#blade/Microsoft_Azure_Policy/UserPrivacyMenuBlade/Overview) to make a request for Account Close to delete all MFA cloud service information collected for this user.
185185

186186
- It may take up to 30 days for data to be fully removed.
187187

188+
## Delete data for self-service password reset
189+
190+
Users can add answers to security questions as part of SSPR. Security questions and answers are hashed to prevent unauthorized access. Only the hashed data is saved, so the security questions and answers can't be exported. Users can go to [My sign-ins](https://mysignins.microsoft.com/security-info) to edit or delete them. The only other information saved for SSPR is the user email address.
191+
192+
Global Administrators can remove data collected for any user. On the **Users** page in Azure AD, click **Authentication methods** and select a user to remove their phone or email address.
193+
188194
## Next steps
189195

190196
[MFA Server reporting](howto-mfa-reporting.md)

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ On Windows 7, iOS, Android, and macOS Azure AD identifies the device using a cli
128128

129129
#### Chrome support
130130

131-
For Chrome support in **Windows 10 Creators Update (version 1703)** or later, install the [Windows 10 Accounts extension](https://chrome.google.com/webstore/detail/windows-10-accounts/ppnbnpeolgkicgegkbkbjmhlideopiji). This extension is required when a Conditional Access policy requires device-specific details.
131+
For Chrome support in **Windows 10 Creators Update (version 1703)** or later, install the [Windows 10 Accounts](https://chrome.google.com/webstore/detail/windows-10-accounts/ppnbnpeolgkicgegkbkbjmhlideopiji) or [Office Online](https://chrome.google.com/webstore/detail/office/ndjpnladcallmjemlbaebfadecfhkepb) extensions. These extensions are required when a Conditional Access policy requires device-specific details.
132132

133133
To automatically deploy this extension to Chrome browsers, create the following registry key:
134134

articles/active-directory/conditional-access/concept-conditional-access-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 10/26/2021
9+
ms.date: 01/11/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -84,7 +84,7 @@ The behavior of the client apps condition was updated in August 2020. If you hav
8484

8585
This control is used to exclude devices that are hybrid Azure AD joined, or marked a compliant in Intune. This exclusion can be done to block unmanaged devices.
8686

87-
#### Filters for devices (preview)
87+
#### Filter for devices
8888

8989
This control allows targeting specific devices based on their attributes in a policy.
9090

0 commit comments

Comments
 (0)