Skip to content

Commit 1aa0864

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-synapse-current
2 parents cf05b2f + 4ead1b9 commit 1aa0864

File tree

281 files changed

+3646
-2510
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

281 files changed

+3646
-2510
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
3030
],
3131
"branches_to_filter": [],
32-
"git_repository_url_open_to_public_contributors": "https://github.com/Microsoft/azure-docs",
32+
"git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/azure-docs",
3333
"git_repository_branch_open_to_public_contributors": "master",
3434
"skip_source_output_uploading": false,
3535
"need_preview_pull_request": true,

.openpublishing.redirection.json

Lines changed: 47 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17809,12 +17809,12 @@
1780917809
},
1781017810
{
1781117811
"source_path": "articles/synapse-analytics/quickstart-create-apache-spark-pool.md",
17812-
"redirect_url": "/synapse-analytics/quickstart-create-apache-spark-pool-portal",
17812+
"redirect_url": "/azure/synapse-analytics/quickstart-create-apache-spark-pool-portal",
1781317813
"redirect_document_id": false
1781417814
},
1781517815
{
1781617816
"source_path": "articles/synapse-analytics/quickstart-create-sql-pool.md",
17817-
"redirect_url": "azure/synapse-analytics/quickstart-create-sql-pool-portal",
17817+
"redirect_url": "/azure/synapse-analytics/quickstart-create-sql-pool-portal",
1781817818
"redirect_document_id": false
1781917819
},
1782017820
{
@@ -44266,6 +44266,51 @@
4426644266
"redirect_url": "/azure/hdinsight/hadoop/apache-hadoop-use-pig-ssh",
4426744267
"redirect_document_id": false
4426844268
},
44269+
{
44270+
"source_path": "articles/marketplace/cloud-partner-portal/containers/cpp-prerequisites.md",
44271+
"redirect_url": "/azure/marketplace/partner-center-portal/create-azure-container-offer",
44272+
"redirect_document_id": false
44273+
},
44274+
{
44275+
"source_path": "articles/marketplace/cloud-partner-portal/containers/cpp-create-offer.md",
44276+
"redirect_url": "/azure/marketplace/partner-center-portal/create-azure-container-offer",
44277+
"redirect_document_id": false
44278+
},
44279+
{
44280+
"source_path": "articles/marketplace/cloud-partner-portal/containers/cpp-offer-settings-tab.md",
44281+
"redirect_url": "/azure/marketplace/partner-center-portal/create-azure-container-offer",
44282+
"redirect_document_id": false
44283+
},
44284+
{
44285+
"source_path": "articles/marketplace/cloud-partner-portal/containers/cpp-skus-tab.md",
44286+
"redirect_url": "/azure/marketplace/partner-center-portal/create-azure-container-offer",
44287+
"redirect_document_id": false
44288+
},
44289+
{
44290+
"source_path": "articles/marketplace/cloud-partner-portal/containers/cpp-marketplace-tab.md",
44291+
"redirect_url": "/azure/marketplace/partner-center-portal/create-azure-container-offer",
44292+
"redirect_document_id": false
44293+
},
44294+
{
44295+
"source_path": "articles/marketplace/cloud-partner-portal/containers/cpp-support-tab.md",
44296+
"redirect_url": "/azure/marketplace/partner-center-portal/create-azure-container-offer",
44297+
"redirect_document_id": false
44298+
},
44299+
{
44300+
"source_path": "articles/marketplace/cloud-partner-portal/containers/cpp-create-technical-assets.md",
44301+
"redirect_url": "/azure/marketplace/partner-center-portal/create-azure-container-technical-assets",
44302+
"redirect_document_id": false
44303+
},
44304+
{
44305+
"source_path": "articles/marketplace/cloud-partner-portal/containers/cpp-publish-offer.md",
44306+
"redirect_url": "/azure/marketplace/partner-center-portal/create-azure-container-offer",
44307+
"redirect_document_id": false
44308+
},
44309+
{
44310+
"source_path": "articles/marketplace/cloud-partner-portal/containers/cpp-update-existing-offer.md",
44311+
"redirect_url": "/azure/marketplace/partner-center-portal/create-azure-container-offer",
44312+
"redirect_document_id": false
44313+
},
4426944314
{
4427044315
"source_path": "articles/cognitive-services/LUIS/sdk-csharp-3x.md",
4427144316
"redirect_url": "/azure/cognitive-services/LUIS/sdk-authoring.md",

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: app-provisioning
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 12/10/2019
12+
ms.date: 05/20/2020
1313
ms.author: mimart
1414
ms.reviewer: arvinh
1515
---
@@ -59,7 +59,7 @@ When you configure provisioning to a SaaS application, one of the types of attri
5959

6060
For outbound provisioning from Azure AD to a SaaS application, relying on [user or group assignments](../manage-apps/assign-user-or-group-access-portal.md) is the most common way to determine which users are in scope for provisioning. Because user assignments are also used for enabling single sign-on, the same method can be used for managing both access and provisioning. Assignment-based scoping doesn't apply to inbound provisioning scenarios such as Workday and Successfactors.
6161

62-
* **Groups.** With an Azure AD Premium license plan, you can use groups to assign access to a SaaS application. Then, when the provisioning scope is set to **Sync only assigned users and groups**, the Azure AD provisioning service will provision or de-provision users based on whether they're members of a group that's assigned to the application. The group object itself isn't provisioned unless the application supports group objects. Ensure that groups assigned to your application have the property "SecurityEnabled" set to "False".
62+
* **Groups.** With an Azure AD Premium license plan, you can use groups to assign access to a SaaS application. Then, when the provisioning scope is set to **Sync only assigned users and groups**, the Azure AD provisioning service will provision or de-provision users based on whether they're members of a group that's assigned to the application. The group object itself isn't provisioned unless the application supports group objects. Ensure that groups assigned to your application have the property "SecurityEnabled" set to "True".
6363

6464
* **Dynamic groups.** The Azure AD user provisioning service can read and provision users in [dynamic groups](../users-groups-roles/groups-create-rule.md). Keep these caveats and recommendations in mind:
6565

articles/active-directory/b2b/facebook-federation.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ ms.collection: M365-identity-device-management
2020
# Add Facebook as an identity provider for External Identities
2121

2222
You can add Facebook to your self-service sign-up user flows (Preview) so that users can sign in to your applications using their own Facebook accounts. To allow users to sign in using Facebook, you'll first need to [enable self-service sign-up](self-service-sign-up-user-flow.md) for your tenant. After you add Facebook as an identity provider, set up a user flow for the application and select Facebook as one of the sign-in options.
23+
2324
> [!NOTE]
2425
> Users can only use their Facebook accounts to sign up through apps using self-service sign-up and user flows. Users cannot be invited and redeem their invitation using a Facebook account.
2526

articles/active-directory/b2b/identity-providers.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,16 +20,30 @@ ms.collection: M365-identity-device-management
2020

2121
An *identity provider* creates, maintains, and manages identity information while providing authentication services to applications. When sharing your apps and resources with external users, Azure AD is the default identity provider for sharing. This means when you invite external users who already have an Azure AD or Microsoft account, they can automatically sign in without further configuration on your part.
2222

23-
However, you can enable users to sign in with various identity providers. For example, you can set up federation with social identity providers that are supported by Azure AD, including Google and Facebook. You can also federate with any external identity provider that supports the SAML or WS-Fed protocols. With external identity provider federation, you can offer external users the ability to sign in to your apps with their existing social or enterprise accounts.
23+
However, you can enable users to sign in with various identity providers.
24+
25+
- **Google**: Google federation allows external users to redeem invitations from you by signing in to your apps with their own Gmail accounts. Google federation can also be used in your self-service sign-up user flows.
26+
> [!NOTE]
27+
> In the current self-service sign-up preview, if a user flow is associated with an app and you send a user an invitation to that app, the user won't be able to use a Gmail account to redeem the invitation. As a workaround, the user can go through the self-service sign-up process. Or, they can redeem the invitation by accessing a different app or by using their My Apps portal at https://myapps.microsoft.com.
28+
29+
- **Facebook**: When building an app, you can configure self-service sign-up and enable Facebook federation so that users can sign up for your app using their own Facebook accounts. Facebook can only be used for self-service sign-up user flows and isn't available as a sign-in option when users are redeeming invitations from you.
30+
31+
- **Direct federation**: You can also set up direct federation with any external identity provider that supports the SAML or WS-Fed protocols. Direct federation allows external users to redeem invitations from you by signing in to your apps with their existing social or enterprise accounts.
32+
> [!NOTE]
33+
> Direct federation identity providers can't be used in your self-service sign-up user flows.
34+
2435

2536
## How it works
2637

27-
Azure AD External Identities is preconfigured for federation with Google and Facebook. To set up these identity providers in your Azure AD tenant, you'll create an application at each identity provider and configure credentials. You'll obtain a client or app ID and a client or app secret, which you can then add to your Azure AD tenant.
38+
The Azure AD External Identities self-service sign up feature allows users to sign up with their Azure AD, Google, or Facebook account. To set up social identity providers in your Azure AD tenant, you'll create an application at each identity provider and configure credentials. You'll obtain a client or app ID and a client or app secret, which you can then add to your Azure AD tenant.
2839

2940
Once you've added an identity provider to your Azure AD tenant:
3041

3142
- When you invite an external user to apps or resources in your organization, the external user can sign in using their own account with that identity provider.
32-
- When you enable [self-service sign-up](self-service-sign-up-overview.md) for your apps, external users can sign up for your apps using their own accounts with the identity providers you've added.
43+
- When you enable [self-service sign-up](self-service-sign-up-overview.md) for your apps, external users can sign up for your apps using their own accounts with the identity providers you've added.
44+
45+
> [!NOTE]
46+
> Azure AD is enabled by default for self-service sign-up, so users always have the option of signing up using an Azure AD account.
3347
3448
When redeeming your invitation or signing up for your app, the external user has the option to sign in and authenticate with the social identity provider:
3549

articles/active-directory/b2b/self-service-sign-up-overview.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,20 @@ ms.collection: M365-identity-device-management
2222
| Self-service sign-up is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).|
2323
| |
2424

25-
When sharing applications with external users, you might not always know in advance who will need access to an application. As an alternative to sending invitations directly to individuals, you can allow external users to sign up for specific applications themselves by enabling self-service sign-up. You can create a personalized sign-up experience by customizing the self-service sign-up user flow. For example, you can provide options for Azure AD or social identity providers and collect information about the user.
25+
When sharing an application with external users, you might not always know in advance who will need access to the application. As an alternative to sending invitations directly to individuals, you can allow external users to sign up for specific applications themselves by enabling self-service sign-up. You can create a personalized sign-up experience by customizing the self-service sign-up user flow. For example, you can provide options to sign up with Azure AD or social identity providers and collect information about the user during the sign-up process.
26+
27+
> [!NOTE]
28+
> You can associate user flows with apps built by your organization. User flows can't be used for Microsoft apps, like SharePoint or Teams.
2629
2730
## User flow for self-service sign-up
2831

29-
A self-service sign-up user flow creates a sign-up experience for your external users through the application you want to share. The user flow can be associated with one or more of your applications. First you'll enable self-service sign-up for your tenant and federate with any identity providers you want to allow external users to use for sign-in. Then you'll create and customize the sign-up user flow and assign your applications to it.
32+
A self-service sign-up user flow creates a sign-up experience for your external users through the application you want to share. The user flow can be associated with one or more of your applications. First you'll enable self-service sign-up for your tenant and federate with the identity providers you want to allow external users to use for sign-in. Then you'll create and customize the sign-up user flow and assign your applications to it.
3033
You can configure user flow settings to control how the user signs up for the application:
3134

3235
- Account types used for sign-in, such as social accounts like Facebook, or Azure AD accounts
3336
- Attributes to be collected from the user signing up, such as first name, postal code, or country of residency
3437

35-
When a user wants to sign in to your application, whether it's a web, mobile, desktop, or single-page application (SPA), the application initiates an authorization request to the user flow-provided endpoint. The user flow defines and controls the user's experience. When they complete a sign-up user flow, Azure AD generates a token, then redirects the user back to your application. Multiple applications can use the same user flow.
38+
When a user wants to sign in to your application, whether it's a web, mobile, desktop, or single-page application (SPA), the application initiates an authorization request to the user flow-provided endpoint. The user flow defines and controls the user's experience. When the user completes the sign-up user flow, Azure AD generates a token and redirects the user back to your application. Upon completion of sign-up, a guest account is provisioned for the user in the directory. Multiple applications can use the same user flow.
3639

3740
## Example of self-service sign-up
3841

@@ -45,7 +48,7 @@ They use the email of their choice to sign up.
4548

4649
![Example showing selection of Facebook for sign-in](media/self-service-sign-up-overview/example-sign-in-with-facebook.png)
4750

48-
Azure AD creates a relationship with Woodgrove using the partner's Facebook account, and creates a new account.
51+
Azure AD creates a relationship with Woodgrove using the partner's Facebook account, and creates a new guest account for the user after they sign up.
4952

5053
Woodgrove wants to know more about the user, like name, business name, business registration code, phone number.
5154

articles/active-directory/b2b/self-service-sign-up-user-flow.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,23 @@ ms.collection: M365-identity-device-management
2222
| Self-service sign-up is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).|
2323
| |
2424

25-
Associating your user flow with an application allows you to enable sign-up on that app. You can choose more than one application to be associated with the user flow. Once you associate the user flow with one or more applications, users who visit that app will be able to sign up using the options configured in the user flow.
25+
You can create user flows for apps that are built by your organization. Associating your user flow with an application allows you to enable sign-up on that app. You can choose more than one application to be associated with the user flow. Once you associate the user flow with one or more applications, users who visit that app will be able to sign up and gain a guest account using the options configured in the user flow.
26+
27+
> [!NOTE]
28+
> You can associate user flows with apps built by your organization. User flows can't be used for Microsoft apps, like SharePoint or Teams.
2629
2730
## Before you begin
2831

2932
### Add social identity providers (optional)
3033

3134
Azure AD is the default identity provider for self-service sign-up. This means that users are able to sign up by default with an Azure AD account. Social identity providers can also be included in these sign-up flows to support Google and Facebook accounts.
3235

33-
- [Add Google to your list of social identity providers](google-federation.md)
3436
- [Add Facebook to your list of social identity providers](facebook-federation.md)
35-
37+
- [Add Google to your list of social identity providers](google-federation.md)
38+
39+
> [!NOTE]
40+
> In the current preview, if a self-service sign-up user flow is associated with an app and you send a user an invitation to that app, the user won't be able to use a Gmail account to redeem the invitation. As a workaround, the user can go through the self-service sign-up process. Or, they can redeem the invitation by accessing a different app or by using their My Apps portal at https://myapps.microsoft.com.
41+
3642
### Define custom attributes (optional)
3743

3844
User attributes are values collected from the user during self-service sign-up. Azure AD comes with a built-in set of attributes, but you can create custom attributes for use in your user flow. You can also read and write these attributes by using the Microsoft Graph API. See [Define custom attributes for user flows](user-flow-add-custom-attributes.md).

0 commit comments

Comments
 (0)