Skip to content

Commit 0e0e7fe

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into asc-melvyn-quickfixFriday
2 parents f1408c5 + 35b1ef4 commit 0e0e7fe

File tree

1,426 files changed

+17594
-8049
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,426 files changed

+17594
-8049
lines changed

.openpublishing.redirection.json

Lines changed: 116 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,11 @@
5555
"redirect_url": "/azure/virtual-machines/linux/create-cli-complete",
5656
"redirect_document_id": false
5757
},
58+
{
59+
"source_path": "articles/virtual-machines/workloads/workloads.md",
60+
"redirect_url": "/azure/virtual-machines/",
61+
"redirect_document_id": false
62+
},
5863
{
5964
"source_path": "articles/virtual-machines/windows/maintenance-and-updates.md",
6065
"redirect_url": "/azure/virtual-machines/maintenance-and-updates?toc=/azure/virtual-machines/windows/toc.json&bc=/azure/virtual-machines/windows/breadcrumb/toc.json",
@@ -3930,6 +3935,61 @@
39303935
"redirect_url": "/azure/architecture/cloud-adoption-guide/subscription-governance",
39313936
"redirect_document_id": true
39323937
},
3938+
{
3939+
"source_path": "articles/azure-supportability/index.yml",
3940+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request",
3941+
"redirect_document_id": false
3942+
},
3943+
{
3944+
"source_path": "articles/azure-supportability/classic-deployment-model-quota-increase-requests.md",
3945+
"redirect_url": "/azure/azure-portal/supportability/classic-deployment-model-quota-increase-requests",
3946+
"redirect_document_id": true
3947+
},
3948+
{
3949+
"source_path": "articles/azure-supportability/create-manage-support-requests-using-access-control.md",
3950+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request#role-based-access-control",
3951+
"redirect_document_id": true
3952+
},
3953+
{
3954+
"source_path": "articles/azure-supportability/how-to-create-azure-support-request.md",
3955+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request",
3956+
"redirect_document_id": true
3957+
},
3958+
{
3959+
"source_path": "articles/azure-supportability/how-to-use-file-uploader.md",
3960+
"redirect_url": "/azure/azure-portal/supportability/how-to-use-file-uploader",
3961+
"redirect_document_id": true
3962+
},
3963+
{
3964+
"source_path": "articles/azure-supportability/low-priority-quota.md",
3965+
"redirect_url": "/azure/azure-portal/supportability/low-priority-quota",
3966+
"redirect_document_id": true
3967+
},
3968+
{
3969+
"source_path": "articles/azure-supportability/networking-quota-requests.md",
3970+
"redirect_url": "/azure/azure-portal/supportability/networking-quota-requests",
3971+
"redirect_document_id": true
3972+
},
3973+
{
3974+
"source_path": "articles/azure-supportability/per-vm-quota-requests.md",
3975+
"redirect_url": "/azure/azure-portal/supportability/per-vm-quota-requests",
3976+
"redirect_document_id": true
3977+
},
3978+
{
3979+
"source_path": "articles/azure-supportability/regional-quota-requests.md",
3980+
"redirect_url": "/azure/azure-portal/supportability/regional-quota-requests",
3981+
"redirect_document_id": true
3982+
},
3983+
{
3984+
"source_path": "articles/azure-supportability/resource-manager-core-quotas-request.md",
3985+
"redirect_url": "/azure/azure-portal/supportability/resource-manager-core-quotas-request",
3986+
"redirect_document_id": true
3987+
},
3988+
{
3989+
"source_path": "articles/azure-supportability/sku-series-unavailable.md",
3990+
"redirect_url": "/azure/azure-portal/supportability/sku-series-unavailable",
3991+
"redirect_document_id": true
3992+
},
39333993
{
39343994
"source_path": "articles/azure-toolkit-for-eclipse-debugging-azure-applications.md",
39353995
"redirect_url": "/java/azure/eclipse/azure-toolkit-for-eclipse",
@@ -12505,6 +12565,11 @@
1250512565
"redirect_url": "/azure/event-hubs/event-hubs-node-get-started-send",
1250612566
"redirect_document_id": false
1250712567
},
12568+
{
12569+
"source_path": "articles/event-hubs/event-hubs-python.md",
12570+
"redirect_url": "/azure/event-hubs/event-hubs-python-get-started-send",
12571+
"redirect_document_id": false
12572+
},
1250812573
{
1250912574
"source_path": "articles/event-hubs/event-hubs-python-get-started-receive.md",
1251012575
"redirect_url": "/azure/event-hubs/event-hubs-python-get-started-send",
@@ -12622,7 +12687,12 @@
1262212687
},
1262312688
{
1262412689
"source_path": "articles/hdinsight/hdinsight-hadoop-create-windows-clusters-dotnet-sdk.md",
12625-
"redirect_url": "/azure/hdinsight/hdinsight-hadoop-create-linux-clusters-dotnet-sdk",
12690+
"redirect_url": "https://docs.microsoft.com/dotnet/api/overview/azure/hdinsight?view=azure-dotnet",
12691+
"redirect_document_id": false
12692+
},
12693+
{
12694+
"source_path": "articles/hdinsight/hdinsight-hadoop-create-linux-clusters-dotnet-sdk.md",
12695+
"redirect_url": "https://docs.microsoft.com/dotnet/api/overview/azure/hdinsight?view=azure-dotnet",
1262612696
"redirect_document_id": false
1262712697
},
1262812698
{
@@ -24605,6 +24675,16 @@
2460524675
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-java",
2460624676
"redirect_document_id": false
2460724677
},
24678+
{
24679+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-nodejs-v10.md",
24680+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs-legacy",
24681+
"redirect_document_id": false
24682+
},
24683+
{
24684+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-v10.md",
24685+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-legacy",
24686+
"redirect_document_id": false
24687+
},
2460824688
{
2460924689
"source_path": "articles/storage/blobs/storage-nodejs-how-to-use-blob-storage.md",
2461024690
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs",
@@ -28157,8 +28237,13 @@
2815728237
},
2815828238
{
2815928239
"source_path": "articles/hdinsight/hdinsight-deep-learning-caffe-spark.md",
28160-
"redirect_url": "/azure/hdinsight/spark/apache-spark-deep-learning-caffe",
28161-
"redirect_document_id": true
28240+
"redirect_url": "/azure/hdinsight/spark/apache-spark-machine-learning-mllib-ipython",
28241+
"redirect_document_id": false
28242+
},
28243+
{
28244+
"source_path": "articles/hdinsight/spark/apache-spark-deep-learning-caffe.md",
28245+
"redirect_url": "/azure/hdinsight/spark/apache-spark-machine-learning-mllib-ipython",
28246+
"redirect_document_id": false
2816228247
},
2816328248
{
2816428249
"source_path": "articles/hdinsight/hdinsight-develop-deploy-java-mapreduce-linux.md",
@@ -40734,6 +40819,11 @@
4073440819
"redirect_url": "/azure/azure-databricks/databricks-extract-load-sql-data-warehouse",
4073540820
"redirect_document_id": false
4073640821
},
40822+
{
40823+
"source_path": "articles/azure-databricks/vnet-injection.md",
40824+
"redirect_url": "/azure/databricks/administration-guide/cloud-configurations/azure/vnet-inject",
40825+
"redirect_document_id": false
40826+
},
4073740827
{
4073840828
"source_path": "articles/security/blueprints/gdpr-analytics-overview.md",
4073940829
"redirect_url": "https://aka.ms/azureblueprint",
@@ -40879,11 +40969,6 @@
4087940969
"redirect_url": "/azure/azure-monitor/platform/data-platform",
4088040970
"redirect_document_id": false
4088140971
},
40882-
{
40883-
"source_path": "articles/azure-monitor/platform/data-sources-reference.md",
40884-
"redirect_url": "/azure/azure-monitor/platform/data-sources",
40885-
"redirect_document_id": false
40886-
},
4088740972
{
4088840973
"source_path": "articles/azure-monitor/platform/collect-activity-logs-subscriptions.md",
4088940974
"redirect_url": "/azure/azure-monitor/platform/activity-log-collect-tenants",
@@ -41116,7 +41201,12 @@
4111641201
},
4111741202
{
4111841203
"source_path": "articles/hdinsight/hdinsight-hadoop-giraph-install.md",
41119-
"redirect_url": "/azure/hdinsight/hdinsight-hadoop-giraph-install-linux",
41204+
"redirect_url": "/azure/hdinsight/hdinsight-hadoop-hue-linux",
41205+
"redirect_document_id": false
41206+
},
41207+
{
41208+
"source_path": "articles/hdinsight/hdinsight-hadoop-giraph-install-linux.md",
41209+
"redirect_url": "/azure/hdinsight/hdinsight-hadoop-hue-linux",
4112041210
"redirect_document_id": false
4112141211
},
4112241212
{
@@ -45563,6 +45653,22 @@
4556345653
"source_path": "articles/media-services/latest/cae-experimental.md",
4556445654
"redirect_url": "/azure/media-services/latest/content-aware-encoding",
4556545655
"redirect_document_id": true
45656+
},
45657+
{
45658+
"source_path": "articles/virtual-machines/workloads/redhat/redhat-byos.md",
45659+
"redirect_url": "/azure/virtual-machines/workloads/redhat/byos",
45660+
"redirect_document_id": false
45661+
},
45662+
{
45663+
"source_path": "articles/virtual-machines/workloads/redhat/redhat-overview.md",
45664+
"redirect_url": "/azure/virtual-machines/workloads/redhat/overview",
45665+
"redirect_document_id": false
45666+
},
45667+
{
45668+
"source_path": "articles/load-balancer/load-balancer-arm.md",
45669+
"redirect_url": "/azure/load-balancer/load-balancer-overview",
45670+
"redirect_document_id": true
4556645671
}
4556745672
]
45568-
}
45673+
}
45674+

CODEOWNERS

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,17 @@
11
# Testing the new code owners feature in GitHub. Please contact Cory Fowler if you have questions.
2-
# articles/storage/ @tamram @robinsh
3-
# articles/virtual-machines/ @iainfoulds @cynthn
4-
# articles/virtual-machines/linux/ @iainfoulds @cynthn
5-
# articles/virtual-machines/windows/ @iainfoulds @cynthn
6-
# articles/application-insights/ @SergeyKanzhelev
7-
# articles/cosmos-db/ @mimig1
8-
9-
# All Articles
10-
articles/ @apex-docs-pr-reviewers
11-
122
# Cognitive Services
133
articles/cognitive-services/ @diberry @erhopf, @nitinme
144

155
# DevOps
16-
176
articles/ansible/ @TomArcherMsft
187
articles/chef/ @TomArcherMsft
198
articles/jenkins/ @TomArcherMsft
209
articles/terraform/ @TomArcherMsft
2110

2211
# Governance
23-
2412
articles/governance/ @DCtheGeek
13+
14+
# Configuration
15+
*.json @SyntaxC4 @snoviking @arob98
16+
.acrolinx-config.edn @MonicaRush @arob98
17+
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking @arob98

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-basic.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -298,17 +298,19 @@ After your RESTful service is protected by the client ID (username) and secret,
298298

299299
## Step 5: Upload the policy to your tenant
300300

301-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then open **Azure AD B2C**.
301+
1. In the [Azure portal](https://portal.azure.com), select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
302302
303-
2. Select **Identity Experience Framework**.
303+
1. In the Azure portal, search for and select **Azure AD B2C**.
304304

305-
3. Open **All Policies**.
305+
1. Select **Identity Experience Framework**.
306306

307-
4. Select **Upload Policy**.
307+
1. Open **All Policies**.
308308

309-
5. Select the **Overwrite the policy if it exists** check box.
309+
1. Select **Upload Policy**.
310310

311-
6. Upload the *TrustFrameworkExtensions.xml* file, and then ensure that it passes validation.
311+
1. Select the **Overwrite the policy if it exists** check box.
312+
313+
1. Upload the *TrustFrameworkExtensions.xml* file, and then ensure that it passes validation.
312314

313315
## Step 6: Test the custom policy by using Run Now
314316

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-cert.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -96,17 +96,19 @@ To support client certificate authentication in your custom policy, change the t
9696

9797
## Step 4: Upload the policy to your tenant
9898

99-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then select **Azure AD B2C**.
99+
1. In the [Azure portal](https://portal.azure.com), select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
100100

101-
2. Select **Identity Experience Framework**.
101+
1. In the Azure portal, search for and select **Azure AD B2C**.
102102

103-
3. Select **All Policies**.
103+
1. Select **Identity Experience Framework**.
104104

105-
4. Select **Upload Policy**.
105+
1. Select **All Policies**.
106106

107-
5. Select the **Overwrite the policy if it exists** check box.
107+
1. Select **Upload Policy**.
108108

109-
6. Upload the *TrustFrameworkExtensions.xml* file, and then ensure that it passes validation.
109+
1. Select the **Overwrite the policy if it exists** check box.
110+
111+
1. Upload the *TrustFrameworkExtensions.xml* file, and then ensure that it passes validation.
110112

111113
## Step 5: Test the custom policy by using Run Now
112114
1. Open **Azure AD B2C Settings**, and then select **Identity Experience Framework**.

articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -333,7 +333,9 @@ After you add the new claim, the relying party code looks like this:
333333

334334
## Step 7: Upload the policy to your tenant
335335

336-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then open **Azure AD B2C**.
336+
1. In the [Azure portal](https://portal.azure.com), Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
337+
338+
1. In the Azure portal, search for and select **Azure AD B2C**.
337339

338340
1. Select **Identity Experience Framework**.
339341

articles/active-directory-b2c/active-directory-b2c-how-to-enable-billing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ The management of Azure AD B2C using role-based access control is not affected b
130130

131131
Azure AD B2C tenants can be moved to another subscription if the source and destination subscriptions exist within the same Azure Active Directory tenant.
132132

133-
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/resource-group-move-resources.md).
133+
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
134134

135135
Before you initiate the move, be sure to read the entire article to fully understand the limitations and requirements for such a move. In addition to instructions for moving resources, it includes critical information like a pre-move checklist and how to validate the move operation.
136136

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ OpenID Connect is an authentication protocol, built on top of OAuth 2.0, that ca
2020

2121
[OpenID Connect](https://openid.net/specs/openid-connect-core-1_0.html) extends the OAuth 2.0 *authorization* protocol for use as an *authentication* protocol. This authentication protocol allows you to perform single sign-on. It introduces the concept of an *ID token*, which allows the client to verify the identity of the user and obtain basic profile information about the user.
2222

23-
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. If you want to add identity management to your mobile or desktop applications using Azure AD B2C, you should use [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) rather than OpenID Connect. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
23+
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
2424

2525
Azure AD B2C extends the standard OpenID Connect protocol to do more than simple authentication and authorization. It introduces the [user flow parameter](active-directory-b2c-reference-policies.md), which enables you to use OpenID Connect to add user experiences to your application, such as sign-up, sign-in, and profile management.
2626

articles/active-directory-b2c/active-directory-b2c-ui-customization-custom-dynamic.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -213,17 +213,19 @@ To configure `ContentDefinition`, do the following:
213213
![Example XML snippet with LoadUri element highlighted](media/active-directory-b2c-ui-customization-custom-dynamic/aadb2c-ief-ui-customization-content-definition.png)
214214

215215
## Step 6: Upload the policy to your tenant
216-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then select **Azure AD B2C**.
216+
1. In the [Azure portal](https://portal.azure.com), select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
217217
218-
2. Select **Identity Experience Framework**.
218+
1. In the Azure portal, search for and select **Azure AD B2C**.
219219

220-
3. Select **All Policies**.
220+
1. Select **Identity Experience Framework**.
221221

222-
4. Select **Upload Policy**.
222+
1. Select **All Policies**.
223223

224-
5. Select the **Overwrite the policy if it exists** check box.
224+
1. Select **Upload Policy**.
225225

226-
6. Upload the *TrustFrameworkExtensions.xml* file, and ensure that it passes validation.
226+
1. Select the **Overwrite the policy if it exists** check box.
227+
228+
1. Upload the *TrustFrameworkExtensions.xml* file, and ensure that it passes validation.
227229

228230
## Step 7: Test the custom policy by using Run Now
229231
1. Select **Azure AD B2C Settings**, and then select **Identity Experience Framework**.
@@ -341,7 +343,3 @@ If you select the **Sign up now** link on the sign-in page, the browser displays
341343
## (Optional) Download the complete policy files and code
342344
* After you complete the [Get started with custom policies](active-directory-b2c-get-started-custom.md) walkthrough, we recommend that you build your scenario by using your own custom policy files. For your reference, we have provided [Sample policy files](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/aadb2c-ief-ui-customization).
343345
* You can download the complete code from [Sample Visual Studio solution for reference](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/aadb2c-ief-ui-customization).
344-
345-
346-
347-

0 commit comments

Comments
 (0)