Skip to content

Commit 1cbb4bd

Browse files
committed
2 parents fdab24d + 39d8c01 commit 1cbb4bd

File tree

346 files changed

+3466
-1808
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

346 files changed

+3466
-1808
lines changed

.openpublishing.redirection.json

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -831,6 +831,11 @@
831831
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
832832
"redirect_document_id": false
833833
},
834+
{
835+
"source_path": "articles/cognitive-services/personalizer/how-to-learning-policy.md",
836+
"redirect_url": "/azure/cognitive-services/personalizer/how-to-manage-model",
837+
"redirect_document_id": false
838+
},
834839
{
835840
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-bot-csharp-appinsights.md",
836841
"redirect_url": "/azure/cognitive-services/LUIS/luis-csharp-tutorial-bf-v4",
@@ -27188,8 +27193,8 @@
2718827193
},
2718927194
{
2719027195
"source_path": "articles/storage/storage-java-jenkins-continuous-integration-solution.md",
27191-
"redirect_url": "/azure/storage/common/storage-java-jenkins-continuous-integration-solution",
27192-
"redirect_document_id": true
27196+
"redirect_url": "/azure/jenkins/storage-java-jenkins-continuous-integration-solution",
27197+
"redirect_document_id": false
2719327198
},
2719427199
{
2719527200
"source_path": "articles/storage/storage-manage-access-to-resources.md",
@@ -45118,7 +45123,7 @@
4511845123
},
4511945124
{
4512045125
"source_path": "articles/iot-central/howto-connect-nodejs.md",
45121-
"redirect_url": "/azure/iot-central/core/howto-connect-nodejs/",
45126+
"redirect_url": "/azure/iot-central/core/tutorial-connect-device/",
4512245127
"redirect_document_id": true
4512345128
},
4512445129
{
@@ -45598,7 +45603,7 @@
4559845603
},
4559945604
{
4560045605
"source_path": "articles/iot-central/core/howto-connect-nodejs.md",
45601-
"redirect_url": "/azure/iot-central/core/",
45606+
"redirect_url": "/azure/iot-central/core/tutorial-connect-device/",
4560245607
"redirect_document_id": false
4560345608
},
4560445609
{
@@ -48926,6 +48931,26 @@
4892648931
"source_path": "articles/virtual-machines/linux/tutorial-jenkins-github-docker-cicd.md",
4892748932
"redirect_url": "/azure/jenkins/tutorial-jenkins-github-docker-cicd",
4892848933
"redirect_document_id": false
48934+
},
48935+
{
48936+
"source_path": "articles/container-instances/container-instances-jenkins.md",
48937+
"redirect_url": "/azure/jenkins/container-instances-jenkins",
48938+
"redirect_document_id": false
48939+
},
48940+
{
48941+
"source_path": "articles/aks/jenkins-continuous-deployment.md",
48942+
"redirect_url": "/azure/jenkins/jenkins-continuous-deployment",
48943+
"redirect_document_id": false
48944+
},
48945+
{
48946+
"source_path": "articles/storage/common/storage-java-jenkins-continuous-integration-solution.md",
48947+
"redirect_url": "/azure/jenkins/storage-java-jenkins-continuous-integration-solution",
48948+
"redirect_document_id": false
48949+
},
48950+
{
48951+
"source_path": "articles/aks/acs-aks-migration.md",
48952+
"redirect_url": "/azure/aks/aks-migration",
48953+
"redirect_document_id": false
4892948954
}
4893048955
]
4893148956
}

.vscode/settings.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,5 +54,8 @@
5454
"XAML",
5555
"XML",
5656
"YAML"
57+
],
58+
"cSpell.words": [
59+
"auditd"
5760
]
5861
}

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,9 +116,9 @@ Checks that boolean value of a claims is equal to `true` or `false`, and return
116116

117117
| Item | TransformationClaimType | Data Type | Notes |
118118
| ---- | ------------------------ | ---------- | ----- |
119-
| inputClaim | inputClaim | boolean | The ClaimType to be asserted. |
119+
| InputClaim | inputClaim | boolean | The ClaimType to be asserted. |
120120
| InputParameter |valueToCompareTo | boolean | The value to compare (true or false). |
121-
| OutputClaim | inputClaim | boolean | The ClaimType that is produced after this ClaimsTransformation has been invoked. |
121+
| OutputClaim | compareResult | boolean | The ClaimType that is produced after this ClaimsTransformation has been invoked. |
122122

123123

124124
The following claims transformation demonstrates how to check the value of a boolean ClaimType with a `true` value. If the value of the `IsAgeOver21Years` ClaimType is equal to `true`, the claims transformation returns `true`, otherwise `false`.

articles/active-directory-b2c/code-samples.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ The following tables provide links to samples for applications including iOS, An
3535
| [dotnet-webapp-and-webapi](https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi) | A combined sample for a .NET web application that calls a .NET Web API, both secured using Azure AD B2C. |
3636
| [dotnetcore-webapp](https://github.com/Azure-Samples/active-directory-b2c-dotnetcore-webapp) | An ASP.NET Core web application that can sign in a user using Azure AD B2C, get an access token using MSAL.NET and call an API. |
3737
| [openidconnect-nodejs](https://github.com/AzureADQuickStarts/B2C-WebApp-OpenIDConnect-NodeJS) | A Node.js app that provides a quick and easy way to set up a Web application with Express using OpenID Connect. |
38-
| [javascript-nodejs-webapp](https://github.com/AzureADQuickStarts/active-directory-b2c-javascript-nodejs-webapp) | A node.js server that provides a quick and easy way to set up a REST API service using the OAuth2 protocol. |
3938
| [javascript-nodejs-webapi](https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi) | A small node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using passport.js. |
4039
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/master/README_B2C.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
4140

articles/active-directory-b2c/page-layout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/10/2020
12+
ms.date: 02/26/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -29,7 +29,7 @@ Page layout packages are periodically updated to include fixes and improvements
2929

3030
- All pages
3131
- Accessibility fixes
32-
- You can now add the `data-preload="true"` attribute in your HTML tags to control the load order for CSS and JavaScript.
32+
- You can now add the `data-preload="true"` attribute [in your HTML tags](custom-policy-ui-customization.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
3333
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
3434
- Control the order in which your `script` tags are fetched and executed before the page load.
3535
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions

articles/active-directory-b2c/phone-number-claims-transformations.md

Lines changed: 35 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/14/2020
12+
ms.date: 02/26/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -22,9 +22,39 @@ This article provides reference and examples for using the phone number claims t
2222

2323
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
2424

25+
## ConvertPhoneNumberClaimToString
26+
27+
Converts a `phoneNumber` data type into a `string` data type.
28+
29+
| Item | TransformationClaimType | Data Type | Notes |
30+
| ---- | ----------------------- | --------- | ----- |
31+
| InputClaim | phoneNumber | phoneNumber | The ClaimType to convert to a string. |
32+
| OutputClaim | phoneNumberString | string | The ClaimType that is produced after this claims transformation has been invoked. |
33+
34+
In this example, the cellPhoneNumber claim with a value type of `phoneNumber` is converted to a cellPhone claim with a value type of `string`.
35+
36+
```XML
37+
<ClaimsTransformation Id="PhoneNumberToString" TransformationMethod="ConvertPhoneNumberClaimToString">
38+
<InputClaims>
39+
<InputClaim ClaimTypeReferenceId="cellPhoneNumber" TransformationClaimType="phoneNumber" />
40+
</InputClaims>
41+
<OutputClaims>
42+
<OutputClaim ClaimTypeReferenceId="cellPhone" TransformationClaimType="phoneNumberString" />
43+
</OutputClaims>
44+
</ClaimsTransformation>
45+
```
46+
47+
### Example
48+
49+
- Input claims:
50+
- **phoneNumber**: +11234567890 (phoneNumber)
51+
- Output claims:
52+
- **phoneNumberString**: +11234567890 (string)
53+
54+
2555
## ConvertStringToPhoneNumberClaim
2656

27-
This claim validates the format of the phone number. If it is in a valid format, change it to a standard format used by Azure AD B2C. If the provided phone number is not in a valid format, an error message is returned.
57+
This claim transformation validates the format of the phone number. If it is in a valid format, change it to a standard format used by Azure AD B2C. If the provided phone number is not in a valid format, an error message is returned.
2858

2959
| Item | TransformationClaimType | Data Type | Notes |
3060
| ---- | ----------------------- | --------- | ----- |
@@ -64,10 +94,10 @@ The self-asserted technical profile that calls the validation technical profile
6494
### Example 1
6595

6696
- Input claims:
67-
- **phoneNumberString**: 045 456-7890
97+
- **phoneNumberString**: 033 456-7890
6898
- **country**: DK
6999
- Output claims:
70-
- **outputClaim**: +450546148120
100+
- **outputClaim**: +450334567890
71101

72102
### Example 2
73103

@@ -76,6 +106,7 @@ The self-asserted technical profile that calls the validation technical profile
76106
- Output claims:
77107
- **outputClaim**: +11234567890
78108

109+
79110
## GetNationalNumberAndCountryCodeFromPhoneNumberString
80111

81112
This extracts the country code and the national number from the input claim, and optionally throws an exception if the supplied phone number is not valid.

articles/active-directory-domain-services/change-sku.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ For more information on these limits, see [Azure AD DS SKU features and limits][
4444

4545
To change the SKU for an Azure AD DS managed domain using the Azure portal, complete the following steps:
4646

47-
1. At the top of the Azure portal, search for and select **Azure AD Domain Services**. Choose your managed domain from the list, such as *aadds.contoso.com*.
47+
1. At the top of the Azure portal, search for and select **Azure AD Domain Services**. Choose your managed domain from the list, such as *aaddscontoso.com*.
4848
1. In the menu on the left-hand side of the Azure AD DS page, select **Settings > SKU**.
4949

5050
![Select the SKU menu option for your Azure AD DS managed domain in the Azure portal](media/change-sku/overview-change-sku.png)

articles/active-directory-domain-services/check-health.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ This article shows you how to view the Azure AD DS health status and understand
2525
The health status for an Azure AD DS managed domain is viewed using the Azure portal. Information on the last backup time and synchronization with Azure AD can be seen, along with any alerts that indicate a problem with the managed domain's health. To view the health status for an Azure AD DS managed domain, complete the following steps:
2626

2727
1. In the Azure portal, search for and select **Azure AD Domain Services**.
28-
1. Select your Azure AD DS managed domain, such as *aadds.contoso.com*.
28+
1. Select your Azure AD DS managed domain, such as *aaddscontoso.com*.
2929
1. On the left-hand side of the Azure AD DS resource window, select **Health**. The following example screenshot shows a healthy Azure AD DS managed domain and the status of the last backup and Azure AD synchronization:
3030

3131
![Health page overview in the Azure portal showing the Azure Active Directory Domain Services status](./media/check-health/health-page.png)

articles/active-directory-domain-services/create-gmsa.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -61,32 +61,32 @@ First, create a custom OU using the [New-ADOrganizationalUnit][New-AdOrganizatio
6161
> [!TIP]
6262
> To complete these steps to create a gMSA, [use your management VM][tutorial-create-management-vm]. This management VM should already have the required AD PowerShell cmdlets and connection to the managed domain.
6363
64-
The following example creates a custom OU named *myNewOU* in the Azure AD DS managed domain named *aadds.contoso.com*. Use your own OU and managed domain name:
64+
The following example creates a custom OU named *myNewOU* in the Azure AD DS managed domain named *aaddscontoso.com*. Use your own OU and managed domain name:
6565

6666
```powershell
67-
New-ADOrganizationalUnit -Name "myNewOU" -Path "DC=contoso,DC=COM"
67+
New-ADOrganizationalUnit -Name "myNewOU" -Path "DC=aaddscontoso,DC=COM"
6868
```
6969

7070
Now create a gMSA using the [New-ADServiceAccount][New-ADServiceAccount] cmdlet. The following example parameters are defined:
7171

7272
* **-Name** is set to *WebFarmSvc*
7373
* **-Path** parameter specifies the custom OU for the gMSA created in the previous step.
74-
* DNS entries and service principal names are set for *WebFarmSvc.aadds.contoso.com*
75-
* Principals in *CONTOSO-SERVER$* are allowed to retrieve the password use the identity.
74+
* DNS entries and service principal names are set for *WebFarmSvc.aaddscontoso.com*
75+
* Principals in *AADDSCONTOSO-SERVER$* are allowed to retrieve the password use the identity.
7676

7777
Specify your own names and domain names.
7878

7979
```powershell
8080
New-ADServiceAccount -Name WebFarmSvc `
81-
-DNSHostName WebFarmSvc.aadds.contoso.com `
82-
-Path "OU=MYNEWOU,DC=contoso,DC=com" `
81+
-DNSHostName WebFarmSvc.aaddscontoso.com `
82+
-Path "OU=MYNEWOU,DC=aaddscontoso,DC=com" `
8383
-KerberosEncryptionType AES128, AES256 `
8484
-ManagedPasswordIntervalInDays 30 `
85-
-ServicePrincipalNames http/WebFarmSvc.aadds.contoso.com/aadds.contoso.com, `
86-
http/WebFarmSvc.aadds.contoso.com/contoso, `
87-
http/WebFarmSvc/aadds.contoso.com, `
88-
http/WebFarmSvc/contoso `
89-
-PrincipalsAllowedToRetrieveManagedPassword CONTOSO-SERVER$
85+
-ServicePrincipalNames http/WebFarmSvc.aaddscontoso.com/aaddscontoso.com, `
86+
http/WebFarmSvc.aaddscontoso.com/aaddscontoso, `
87+
http/WebFarmSvc/aaddscontoso.com, `
88+
http/WebFarmSvc/aaddscontoso `
89+
-PrincipalsAllowedToRetrieveManagedPassword AADDSCONTOSO-SERVER$
9090
```
9191

9292
Applications and services can now be configured to use the gMSA as needed.

articles/active-directory-domain-services/create-ou.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,11 +62,11 @@ To create a custom OU, you use the Active Directory Administrative Tools from a
6262
1. Sign in to your management VM. For steps on how to connect using the Azure portal, see [Connect to a Windows Server VM][connect-windows-server-vm].
6363
1. From the Start screen, select **Administrative Tools**. A list of available management tools is shown that were installed in the tutorial to [create a management VM][tutorial-create-management-vm].
6464
1. To create and manage OUs, select **Active Directory Administrative Center** from the list of administrative tools.
65-
1. In the left pane, choose your Azure AD DS managed domain, such as *aadds.contoso.com*. A list of existing OUs and resources is shown:
65+
1. In the left pane, choose your Azure AD DS managed domain, such as *aaddscontoso.com*. A list of existing OUs and resources is shown:
6666

6767
![Select your Azure AD DS managed domain in the Active Directory Administrative Center](./media/active-directory-domain-services-admin-guide/create-ou-adac-overview.png)
6868

69-
1. The **Tasks** pane is shown on the right side of the Active Directory Administrative Center. Under the domain, such as *aadds.contoso.com*, select **New > Organizational Unit**.
69+
1. The **Tasks** pane is shown on the right side of the Active Directory Administrative Center. Under the domain, such as *aaddscontoso.com*, select **New > Organizational Unit**.
7070

7171
![Select the option to create a new OU in the Active Directory Administrative Center](./media/active-directory-domain-services-admin-guide/create-ou-adac-new-ou.png)
7272

0 commit comments

Comments
 (0)