Skip to content

Commit 19ed158

Browse files
authored
Merge pull request #175214 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 860f682 + 611f7c6 commit 19ed158

File tree

148 files changed

+2869
-496
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

148 files changed

+2869
-496
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -223,6 +223,11 @@
223223
"redirect_url": "/azure/azure-arc/kubernetes/quickstart-connect-cluster",
224224
"redirect_document_id": false
225225
},
226+
{
227+
"source_path": "articles/cognitive-services/whats-new-docs.md",
228+
"redirect_url": "/azure/cognitive-services/what-are-cognitive-services",
229+
"redirect_document_id": false
230+
},
226231
{
227232
"source_path": "articles/cognitive-services/Ink-Recognizer/concepts/send-ink-data.md",
228233
"redirect_url": "/previous-versions/azure/cognitive-services/Ink-Recognizer/concepts/send-ink-data",

CODEOWNERS

Lines changed: 22 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,29 @@
11
# Testing the new code owners feature in GitHub. Please contact Cory Fowler if you have questions.
2+
#
3+
# Help: https://docs.github.com/repositories/managing-your-repositorys-settings-and-features/customizing-your-repository/about-code-owners
4+
# Background: https://github.blog/2017-07-06-introducing-code-owners/
5+
# NOTE: The people you choose as code owners must have _write_ permissions for the repository. When the code owner is a team, that team must be _visible_ and it must have _write_ permissions, even if all the individual members of the team already have write permissions directly, through organization membership, or through another team membership.
26

3-
# Horizontals
4-
5-
## Azure Policy: Samples and Compliance Controls
7+
# Azure Policy: Samples and Compliance Controls
68
/articles/**/policy-reference.md @DCtheGeek
79
/articles/**/security-controls-policy.md @DCtheGeek
810
/includes/policy/ @DCtheGeek
911

1012
# Azure Monitor
11-
/articles/azure-monitor/* @bwren
12-
/articles/azure-monitor/agents @bwren
13-
/articles/azure-monitor/alerts @rboucher
14-
/articles/azure-monitor/app @bwren @lgayhardt
15-
/articles/azure-monitor/autoscale @rboucher
16-
/articles/azure-monitor/containers @bwren
17-
/articles/azure-monitor/essentials @bwren @rboucher
18-
/articles/azure-monitor/insights @bwren @rboucher @lgayhardt
19-
/articles/azure-monitor/logs @bwren
20-
/articles/azure-monitor/visualize @bwren @lgayhardt
21-
/articles/azure-monitor/vm @bwren
22-
/articles/advisor @rboucher
23-
/articles/service-health @rboucher
13+
articles/azure-monitor/* @bwren
14+
articles/azure-monitor/agents @bwren
15+
articles/azure-monitor/alerts @rboucher @abbyMSFT
16+
articles/azure-monitor/app @bwren
17+
articles/azure-monitor/autoscale @rboucher
18+
articles/azure-monitor/containers @bwren
19+
articles/azure-monitor/essentials @bwren @rboucher
20+
articles/azure-monitor/insights @bwren @rboucher
21+
articles/azure-monitor/logs @bwren @abbyMSFT
22+
articles/azure-monitor/visualize @bwren @rboucher
23+
articles/azure-monitor/vm @bwren
24+
articles/advisor @rboucher
25+
articles/service-health @rboucher
26+
2427

2528
# Azure Active Directory
2629
/articles/active-directory-b2c/ @msmimart @yoelhor
@@ -83,6 +86,6 @@
8386
/articles/healthcare-apis/ @ginalee-dotcom
8487

8588
# Configuration
86-
*.json @SyntaxC4 @snoviking @martinekuan
87-
.acrolinx-config.edn @MonicaRush @martinekuan
88-
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking @martinekuan
89+
*.json @SyntaxC4 @snoviking
90+
.acrolinx-config.edn @MonicaRush
91+
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking

articles/active-directory-b2c/extensions-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ If you accidentally deleted the b2c-extensions-app, you have 30 days to recover
3636
1. Log in to the site as a global administrator for the Azure AD B2C directory that you want to restore the deleted app for. This global administrator must have an email address similar to the following: `username@{yourTenant}.onmicrosoft.com`.
3737
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/beta/directory/deleteditems/microsoft.graph.application`. This operation will list all of the applications that have been deleted within the past 30 days.
3838
1. Find the application in the list where the name begins with 'b2c-extensions-app’ and copy its `objectid` property value.
39-
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/beta/directory/deleteditems/{id}/restore`. Replace the `{OBJECTID}` portion of the URL with the `objectid` from the previous step.
39+
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/beta/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `objectid` from the previous step.
4040

4141
You should now be able to [see the restored app](#verifying-that-the-extensions-app-is-present) in the Azure portal.
4242

articles/active-directory/governance/deploy-access-reviews.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -190,10 +190,10 @@ The administrative role required to create, manage, or read an Access Review dep
190190

191191
| Resource type| Create and manage Access Reviews (Creators)| Read Access Review results |
192192
| - | - | -|
193-
| Group or application| Global Administrator <p>User Administrator| Creators and Security Administrator |
194-
| Privileged roles in Azure AD| Global Administrator <p>Privileged Role Administrator| Creators <p>Security Reader<p>Security Administrator |
195-
| Privileged roles in Azure (resources)| Global Administrator<p>User Administrator<p>Resource Owner| Creators |
196-
| Access package| Global Administrator<p>Creator of Access Package| Global Administrator only |
193+
| Group or application| Global Administrator <p>User Administrator<p>Identity Governance Administrator<p>Privileged Role Admin (only reviews on for Azure AD role-assignable groups)<p>Group owner ([if enabled by an admin]( create-access-review.md#allow--group-owners-to-create-and-manage-access-reviews-preview))| Global Administrator<p>Global Reader<p>User Administrator<p>Identity Governance Administrator<p>Privileged Role Admin<p>Security Reader<p>Group owner ([if enabled by an admin]( create-access-review.md#allow--group-owners-to-create-and-manage-access-reviews-preview)) |
194+
|Azure AD roles| Global Administrator <p>Privileged Role Administrator| Global Administrator<p>Global Reader<p>User Administrator<p>Privileged Role Admin<p> <p>Security Reader |
195+
| Azure resource roles| Global Administrator<p>Resource Owner| Global Administrator<p>Global Reader<p>User Administrator<p>Privileged Role Admin<p> <p>Security Reader |
196+
| Access package| Global Administrator<p>User Administrator<p>Identity Governance Administrator| Global Administrator<p>Global Reader<p>User Administrator<p>Identity Governance Administrator<p> <p>Security Reader |
197197

198198
For more information, see [Administrator role permissions in Azure Active Directory](../roles/permissions-reference.md).
199199

articles/active-directory/verifiable-credentials/TOC.yml

Lines changed: 17 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,12 @@
88
- name: Tutorials
99
expanded: true
1010
items:
11-
- name: Get started with verifiable credentials
12-
href: get-started-verifiable-credentials.md
13-
- name: Configure verifiable credentials in your tenant
14-
items:
15-
- name: 1 - Set up Verifiable Credentials issuer in your own Azure AD
16-
href: enable-your-tenant-verifiable-credentials.md
17-
- name: 2- Connect your verifiable credentials issuer to your own Azure AD
18-
href: issue-verify-verifiable-credentials-your-tenant.md
11+
- name: Set up the Verifiable Credentials service
12+
href: verifiable-credentials-configure-tenant.md
13+
- name: Issue a verifiable credential
14+
href: verifiable-credentials-configure-issuer.md
15+
- name: Verify a Verifiable Credential
16+
href: verifiable-credentials-configure-verifier.md
1917
- name: Concepts
2018
expanded: true
2119
items:
@@ -32,6 +30,8 @@
3230
href: plan-issuance-solution.md
3331
- name: Plan your verification solution
3432
href: plan-verification-solution.md
33+
- name: Using the Request Service REST API
34+
href: get-started-request-api.md
3535
- name: How to customize your credentials
3636
href: credential-design.md
3737
- name: Manage credential revocation
@@ -49,6 +49,15 @@
4949
href: https://didvc-issuer-sample.azurewebsites.net/
5050
- name: Sample Verifier
5151
href: https://didvc-verifier-sample.azurewebsites.net/
52+
- name: Reference
53+
expanded: true
54+
items:
55+
- name: What's new
56+
href: whats-new.md
57+
- name: Issuance API specification
58+
href: issuance-request-api.md
59+
- name: Presentation API specification
60+
href: presentation-request-api.md
5261
- name: Resources
5362
expanded: true
5463
items:

articles/active-directory/verifiable-credentials/decentralized-identifier-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Enables real people to use decentralized identities and Verifiable Credentials.
8282
An API that connects to our ION node to look up and resolve DIDs using the ```did:ion``` method and return the DID Document Object (DDO). The DDO includes DPKI metadata associated with the DID such as public keys and service endpoints.
8383

8484
**5. Azure Active Directory Verified Credentials Service**
85-
An issuance and verification API and open-source SDK for [W3C Verifiable Credentials](https://www.w3.org/TR/vc-data-model/) that are signed with the ```did:ion``` method. They enable identity owners to generate, present, and verify claims. This forms the basis of trust between users of the systems.
85+
An issuance and verification service in Azure and a REST API for [W3C Verifiable Credentials](https://www.w3.org/TR/vc-data-model/) that are signed with the ```did:ion``` method. They enable identity owners to generate, present, and verify claims. This forms the basis of trust between users of the systems.
8686

8787
## A sample scenario
8888

articles/active-directory/verifiable-credentials/enable-your-tenant-verifiable-credentials.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,8 @@ ms.topic: tutorial
1010
ms.subservice: verifiable-credentials
1111
ms.date: 06/24/2021
1212
ms.author: barclayn
13-
ms.reviewer:
13+
ms.reviewer:
14+
ROBOTS: NOINDEX
1415

1516
# Customer intent: As an administrator, I want the high-level steps that I should follow so that I can quickly start using verifiable credentials in my own Azure Active Directory.
1617

0 commit comments

Comments
 (0)