Skip to content

Commit 210067b

Browse files
authored
Merge pull request #194014 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 277b623 + f303e2b commit 210067b

File tree

138 files changed

+1952
-1073
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

138 files changed

+1952
-1073
lines changed

.openpublishing.redirection.iot-hub.json

Lines changed: 75 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -938,6 +938,81 @@
938938
"redirect_url": "/azure/iot-hub/tutorial-x509-scripts",
939939
"redirect_document_id": false
940940
},
941+
{
942+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-500xxx-internal-errors.md",
943+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#500xxx-internal-errors",
944+
"redirect_document_id": false
945+
},
946+
{
947+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-400027-connectionforcefullyclosedonnewconnection.md",
948+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#40027-connectionforcefullyclosedonnewconnection",
949+
"redirect_document_id": false
950+
},
951+
{
952+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-401003-iothubunauthorized.md",
953+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#401003-iothubunauthorized",
954+
"redirect_document_id": false
955+
},
956+
{
957+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-403004-devicemaximumqueuedepthexceeded.md",
958+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#403004-devicemaximumqueuedepthexceeded",
959+
"redirect_document_id": false
960+
},
961+
{
962+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-403002-iothubquotaexceeded.md",
963+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#403002-iothubquotaexceeded",
964+
"redirect_document_id": false
965+
},
966+
{
967+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-403006-devicemaximumactivefileuploadlimitexceeded.md",
968+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#403006-devicemaximumactivefileuploadlimitexceeded",
969+
"redirect_document_id": false
970+
},
971+
{
972+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-404001-devicenotfound.md",
973+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#404001-devicenotfound",
974+
"redirect_document_id": false
975+
},
976+
{
977+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-404103-devicenotonline.md",
978+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#404103-devicenotonline",
979+
"redirect_document_id": false
980+
},
981+
{
982+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-404104-deviceconnectionclosedremotely.md",
983+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#404104-deviceconnectionclosedremotely",
984+
"redirect_document_id": false
985+
},
986+
{
987+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-409001-devicealreadyexists.md",
988+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#409001-devicealreadyexists",
989+
"redirect_document_id": false
990+
},
991+
{
992+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-409002-linkcreationconflict.md",
993+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#409002-linkcreationconflict",
994+
"redirect_document_id": false
995+
},
996+
{
997+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-412002-devicemessagelocklost.md",
998+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#412002-devicemessagelocklost",
999+
"redirect_document_id": false
1000+
},
1001+
{
1002+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-429001-throttlingexception.md",
1003+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#429001-throttlingexception",
1004+
"redirect_document_id": false
1005+
},
1006+
{
1007+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-503003-partitionnotfound.md",
1008+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#503003-partitionnotfound",
1009+
"redirect_document_id": false
1010+
},
1011+
{
1012+
"source_path_from_root": "/articles/iot-hub/iot-hub-troubleshoot-error-504101-gatewaytimeout.md",
1013+
"redirect_url": "/azure/iot-hub/troubleshoot-error-codes#504101-gatewaytimeout",
1014+
"redirect_document_id": false
1015+
},
9411016
{
9421017
"source_path_from_root": "/articles/iot-hub/iot-hub-gateway-kit-c-iot-gateway-connect-device-to-cloud.md",
9431018
"redirect_url": "https://github.com/Azure/iot-edge/tree/master/v1/doc/commercial_gateway_kit/iot-hub-gateway-kit-c-iot-gateway-connect-device-to-cloud.md",
@@ -958,7 +1033,6 @@
9581033
"redirect_url": "https://github.com/Azure/iot-edge/tree/master/v1/doc/commercial_gateway_kit/iot-hub-gateway-kit-c-use-iot-gateway-for-data-conversion.md",
9591034
"redirect_document_id": false
9601035
},
961-
9621036
{
9631037
"source_path_from_root": "/articles/iot-hub/iot-hub-iot-edge-overview.md",
9641038
"redirect_url": "https://github.com/Azure/iot-edge/tree/master/v1/doc/iot-hub-iot-edge-overview.md",

CODEOWNERS

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,14 @@
1212
# Azure Monitor
1313
articles/azure-monitor/* @bwren
1414
articles/azure-monitor/agents @bwren
15-
articles/azure-monitor/alerts @rboucher @abbyMSFT
16-
articles/azure-monitor/app @bwren
15+
articles/azure-monitor/alerts @abbyMSFT
16+
articles/azure-monitor/app @AaronMaxwell
1717
articles/azure-monitor/autoscale @rboucher
1818
articles/azure-monitor/containers @bwren
1919
articles/azure-monitor/essentials @bwren @rboucher
2020
articles/azure-monitor/insights @bwren @rboucher
21-
articles/azure-monitor/logs @bwren @abbyMSFT
22-
articles/azure-monitor/visualize @bwren @rboucher
21+
articles/azure-monitor/logs @guywi-ms
22+
articles/azure-monitor/visualize @abbyMSFT @rboucher
2323
articles/azure-monitor/vm @bwren
2424
articles/advisor @rboucher
2525
articles/service-health @rboucher

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
6262
| client_id |Required |The application ID assigned to your app in the [Azure portal](https://portal.azure.com). |
6363
| response_type |Required |The response type, which must include `code` for the authorization code flow. |
6464
| redirect_uri |Required |The redirect URI of your app, where authentication responses are sent and received by your app. It must exactly match one of the redirect URIs that you registered in the portal, except that it must be URL-encoded. |
65-
| scope |Required |A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. The `offline_access` scope is optional for web applications. It indicates that your application will need a *refresh token* for extended access to resources. The `https://{tenant-name}/{app-id-uri}/{scope}` indicates a permission to protected resources, such as a web API. For more information, see [Request an access token](access-tokens.md#scopes). |
65+
| scope |Required |A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. The `offline_access` scope is optional for web applications. It indicates that your application will need a *refresh token* for extended access to resources.The client-id indicates the token issued are intended for use by Azure AD B2C registered client. The `https://{tenant-name}/{app-id-uri}/{scope}` indicates a permission to protected resources, such as a web API. For more information, see [Request an access token](access-tokens.md#scopes). |
6666
| response_mode |Recommended |The method that you use to send the resulting authorization code back to your app. It can be `query`, `form_post`, or `fragment`. |
6767
| state |Recommended |A value included in the request that can be a string of any content that you want to use. Usually, a randomly generated unique value is used, to prevent cross-site request forgery attacks. The state also is used to encode information about the user's state in the app before the authentication request occurred. For example, the page the user was on, or the user flow that was being executed. |
6868
| prompt |Optional |The type of user interaction that is required. Currently, the only valid value is `login`, which forces the user to enter their credentials on that request. Single sign-on will not take effect. |

articles/active-directory-b2c/identity-provider-google.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,12 @@ To enable sign-in for users with a Google account in Azure Active Directory B2C
4343
1. In the upper-left corner of the page, select the project list, and then select **New Project**.
4444
1. Enter a **Project Name**, select **Create**.
4545
1. Make sure you are using the new project by selecting the project drop-down in the top-left of the screen. Select your project by name, then select **Open**.
46-
1. Select **OAuth consent screen** in the left menu, select **External**, and then select **Create**.
47-
Enter a **Name** for your application. Enter *b2clogin.com* in the **Authorized domains** section and select **Save**.
46+
1. In the left menu, select **OAuth consent screen**, select **External**, and then select **Create**.
47+
1. Enter a **Name** for your application.
48+
1. Select a **User support email**.
49+
1. In the **Authorized domains** section, enter *b2clogin.com*.
50+
1. In the **Developer contact information** section, enter comma separated emails for Google to notify you about any changes to your project.
51+
1. Select **Save**.
4852
1. Select **Credentials** in the left menu, and then select **Create credentials** > **Oauth client ID**.
4953
1. Under **Application type**, select **Web application**.
5054
1. Enter a **Name** for your application.

articles/active-directory-b2c/saml-identity-provider-technical-profile.md

Lines changed: 0 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -179,38 +179,6 @@ The **CryptographicKeys** element contains the following attributes:
179179
| SamlAssertionDecryption |No | The X509 certificate (RSA key set). A SAML identity provider uses the public portion of the certificate to encrypt the assertion of the SAML response. Azure AD B2C uses the private portion of the certificate to decrypt the assertion. |
180180
| MetadataSigning |No | The X509 certificate (RSA key set) to use to sign SAML metadata. Azure AD B2C uses this key to sign the metadata. |
181181

182-
## SAML entityID customization
183-
184-
If you have multiple SAML applications that depend on different entityID values, you can override the `issueruri` value in your relying party file. To do this, copy the technical profile with the "Saml2AssertionIssuer" ID from the base file and override the `issueruri` value.
185-
186-
> [!TIP]
187-
> Copy the `<ClaimsProviders>` section from the base and preserve these elements within the claims provider: `<DisplayName>Token Issuer</DisplayName>`, `<TechnicalProfile Id="Saml2AssertionIssuer">`, and `<DisplayName>Token Issuer</DisplayName>`.
188-
189-
Example:
190-
191-
```xml
192-
<ClaimsProviders>
193-
<ClaimsProvider>
194-
<DisplayName>Token Issuer</DisplayName>
195-
<TechnicalProfiles>
196-
<TechnicalProfile Id="Saml2AssertionIssuer">
197-
<DisplayName>Token Issuer</DisplayName>
198-
<Metadata>
199-
<Item Key="IssuerUri">customURI</Item>
200-
</Metadata>
201-
</TechnicalProfile>
202-
</TechnicalProfiles>
203-
</ClaimsProvider>
204-
</ClaimsProviders>
205-
<RelyingParty>
206-
<DefaultUserJourney ReferenceId="SignUpInSAML" />
207-
<TechnicalProfile Id="PolicyProfile">
208-
<DisplayName>PolicyProfile</DisplayName>
209-
<Protocol Name="SAML2" />
210-
<Metadata>
211-
212-
```
213-
214182
## Next steps
215183

216184
See the following articles for examples of working with SAML identity providers in Azure AD B2C:

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenhoran
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 11/29/2021
10+
ms.date: 04/04/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -79,9 +79,7 @@ Since ECMA Connector Host currently only supports the USER object type, the OBJE
7979
You can define one or more matching attribute(s) and prioritize them based on the precedence. Should you want to change the matching attribute you can also do so.
8080
[![Matching attribute](.\media\on-premises-application-provisioning-architecture\match-1.png)](.\media\on-premises-application-provisioning-architecture\match-1.png#lightbox)
8181

82-
2. ECMA Connector Host receives the GET request and queries its internal cache to see if the user exists and has based imported. This is done using the **query attribute**. The query attribute is defined in the object types page.
83-
[![Query attribute](.\media\on-premises-application-provisioning-architecture\match-2.png)](.\media\on-premises-application-provisioning-architecture\match-2.png#lightbox)
84-
82+
2. ECMA Connector Host receives the GET request and queries its internal cache to see if the user exists and has based imported. This is done using the matching attribute(s) above. If you define multiple matching attributes, the Azure AD provisioning service will send a GET request for each attribute and the ECMA host will check it's cache for a match until it finds one.
8583

8684
3. If the user does not exist, Azure AD will make a POST request to create the user. The ECMA Connector Host will respond back to Azure AD with the HTTP 201 and provide an ID for the user. This ID is derived from the anchor value defined in the object types page. This anchor will be used by Azure AD to query the ECMA Connector Host for future and subsequent requests.
8785
4. If a change happens to the user in Azure AD, then Azure AD will make a GET request to retrieve the user using the anchor from the previous step, rather than the matching attribute in step 1. This allows, for example, the UPN to change without breaking the link between the user in Azure AD and in the app.

articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenhoran
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 02/03/2022
10+
ms.date: 04/04/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -97,7 +97,27 @@ The file location for wizard logging is C:\Program Files\Microsoft ECMA2Host\Wiz
9797
<listeners>
9898
<add initializeData="ECMA2Host" type="System.Diagnostics.EventLogTraceListener, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" name="ECMA2HostListener" traceOutputOptions="LogicalOperationStack, DateTime, Timestamp, Callstack" />
9999
```
100+
## Query the ECMA Host Cache
100101
102+
The ECMA Host has a cache of users in your application that is updated according to the schedule you specify in the properties page of the ECMA Host wizard. In order to query the cache, perform the steps below:
103+
1. Set the Debug flag to `true`.
104+
2. Restart the ECMA Host service.
105+
3. Query this endpoint from the server the ECMA Host is installed on, replacing `{connector name}` with the name of your connector, specified in the properties page of the ECMA Host. `https://localhost:8585/ecma2host_{connectorName}/scim/cache`
106+
107+
Please be aware that setting the debug flag to `true` disables authentication on the ECMA Host. You will want to set it back to `false` and restart the ECMA Host service once you are done querying the cache.
108+
109+
The file location for verbose service logging is C:\Program Files\Microsoft ECMA2Host\Service\Microsoft.ECMA2Host.Service.exe.config.
110+
```
111+
<?xml version="1.0" encoding="utf-8"?>
112+
<configuration>
113+
<startup>
114+
<supportedRuntime version="v4.0" sku=".NETFramework,Version=v4.6" />
115+
</startup>
116+
<appSettings>
117+
<add key="Debug" value="true" />
118+
</appSettings>
119+
120+
```
101121
## Target attribute is missing
102122
The provisioning service automatically discovers attributes in your target application. If you see that a target attribute is missing in the target attribute list in the Azure portal, perform the following troubleshooting step:
103123

articles/active-directory/app-proxy/application-proxy-add-on-premises-application.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,9 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 02/17/2021
11+
ms.date: 04/04/2022
1212
ms.author: kenwith
1313
ms.reviewer: ashishj
14-
ms.custom: contperf-fy21q3-portal
1514
---
1615

1716
# Tutorial: Add an on-premises application for remote access through Application Proxy in Azure Active Directory
@@ -127,7 +126,7 @@ Allow access to the following URLs:
127126
| `*.msappproxy.net` <br> `*.servicebus.windows.net` | 443/HTTPS | Communication between the connector and the Application Proxy cloud service |
128127
| `crl3.digicert.com` <br> `crl4.digicert.com` <br> `ocsp.digicert.com` <br> `crl.microsoft.com` <br> `oneocsp.microsoft.com` <br> `ocsp.msocsp.com`<br> | 80/HTTP | The connector uses these URLs to verify certificates. |
129128
| `login.windows.net` <br> `secure.aadcdn.microsoftonline-p.com` <br> `*.microsoftonline.com` <br> `*.microsoftonline-p.com` <br> `*.msauth.net` <br> `*.msauthimages.net` <br> `*.msecnd.net` <br> `*.msftauth.net` <br> `*.msftauthimages.net` <br> `*.phonefactor.net` <br> `enterpriseregistration.windows.net` <br> `management.azure.com` <br> `policykeyservice.dc.ad.msft.net` <br> `ctldl.windowsupdate.com` <br> `www.microsoft.com/pkiops` | 443/HTTPS | The connector uses these URLs during the registration process. |
130-
| `ctldl.windowsupdate.com` <br> `www.microsoft.com/pkiops` | 80/HTTP | The connector uses this URL during the registration process. |
129+
| `ctldl.windowsupdate.com` <br> `www.microsoft.com/pkiops` | 80/HTTP | The connector uses these URLs during the registration process. |
131130
132131
You can allow connections to `*.msappproxy.net`, `*.servicebus.windows.net`, and other URLs above if your firewall or proxy lets you configure access rules based on domain suffixes. If not, you need to allow access to the [Azure IP ranges and Service Tags - Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519). The IP ranges are updated each week.
133132

articles/active-directory/app-proxy/application-proxy-configure-connectors-with-proxy-servers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/27/2021
11+
ms.date: 04/04/2022
1212
ms.author: kenwith
1313
ms.reviewer: ashishj
1414
---
@@ -113,7 +113,7 @@ Allow access to the following URLs:
113113
| &ast;.msappproxy.net<br>&ast;.servicebus.windows.net | 443/HTTPS | Communication between the connector and the Application Proxy cloud service |
114114
| crl3.digicert.com<br>crl4.digicert.com<br>ocsp.digicert.com<br>crl.microsoft.com<br>oneocsp.microsoft.com<br>ocsp.msocsp.com<br> | 80/HTTP | The connector uses these URLs to verify certificates. |
115115
| login.windows.net<br>secure.aadcdn.microsoftonline-p.com<br>&ast;.microsoftonline.com<br>&ast;.microsoftonline-p.com<br>&ast;.msauth.net<br>&ast;.msauthimages.net<br>&ast;.msecnd.net<br>&ast;.msftauth.net<br>&ast;.msftauthimages.net<br>&ast;.phonefactor.net<br>enterpriseregistration.windows.net<br>management.azure.com<br>policykeyservice.dc.ad.msft.net<br>ctldl.windowsupdate.com | 443/HTTPS | The connector uses these URLs during the registration process. |
116-
| ctldl.windowsupdate.com<br>www.microsoft.com/pkiops | 80/HTTP | The connector uses this URL during the registration process. |
116+
| ctldl.windowsupdate.com<br>www.microsoft.com/pkiops | 80/HTTP | The connector uses these URLs during the registration process. |
117117

118118
If your firewall or proxy allows you to configure DNS allow lists, you can allow connections to \*.msappproxy.net and \*.servicebus.windows.net.
119119

0 commit comments

Comments
 (0)