Skip to content

Commit 23f509f

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 2f4f294 + c5a3784 commit 23f509f

File tree

140 files changed

+1745
-1028
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

140 files changed

+1745
-1028
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49189,6 +49189,11 @@
4918949189
"redirect_url": "/azure/aks/aks-migration",
4919049190
"redirect_document_id": false
4919149191
},
49192+
{
49193+
"source_path": "articles/virtual-machines/workloads/sap/sap-hana-backup-storage-snapshots.md",
49194+
"redirect_url": "sap-hana-backup-guide",
49195+
"redirect_document_id": true
49196+
},
4919249197
{
4919349198
"source_path": "articles/service-fabric/service-fabric-cicd-your-linux-applications-with-jenkins.md",
4919449199
"redirect_url": "/azure/jenkins/service-fabric-cicd-your-linux-applications-with-jenkins",

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/03/2020
12+
ms.date: 03/03/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -112,7 +112,7 @@ The self-asserted technical profile calls the validation **login-NonInteractive*
112112

113113
## CompareBooleanClaimToValue
114114

115-
Checks that boolean value of a claims is equal to `true` or `false`, and return the result of the compression.
115+
Checks that boolean value of a claim is equal to `true` or `false`, and return the result of the compression.
116116

117117
| Item | TransformationClaimType | Data Type | Notes |
118118
| ---- | ------------------------ | ---------- | ----- |

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ If you're a vendor and want to get your device on this list of supported devices
8787
- End users can register and manage these passwordless authentication methods in their account portal
8888
- End users can sign in with these passwordless authentication methods
8989
- Microsoft Authenticator App: Works in scenarios where Azure AD authentication is used, including across all browsers, during Windows 10 Out Of Box (OOBE) setup, and with integrated mobile apps on any operating system.
90-
- Security keys: Work on lock screen for Windows 10 and the web in supported browsers like Microsoft Edge.
90+
- Security keys: Work on lock screen for Windows 10 and the web in supported browsers like Microsoft Edge (both legacy and new Edge).
9191

9292
## Next steps
9393

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ You cannot change the usage model (per enabled user or per authentication) after
3838

3939
If you purchased enough licenses to cover all users that are enabled for MFA, you can delete the MFA provider altogether.
4040

41-
If your MFA provider is not linked to an Azure AD tenant, or you link the new MFA provider to a different Azure AD tenant, user settings and configuration options are not transferred. Also, existing Azure MFA Servers need to be reactivated using activation credentials generated through the MFA Provider. Reactivating the MFA Servers to link them to the MFA Provider doesn't impact phone call and text message authentication, but mobile app notifications stop working for all users until they reactivate the mobile app.
41+
If your MFA provider is not linked to an Azure AD tenant, or you link the new MFA provider to a different Azure AD tenant, user settings and configuration options are not transferred. Also, existing Azure MFA Servers need to be reactivated using activation credentials generated through the MFA Provider.
4242

4343
### Removing an authentication provider
4444

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ This document focuses on enabling FIDO2 security key based passwordless authenti
3232
| [Combined security information registration preview](concept-registration-mfa-sspr-combined.md) | X | X |
3333
| Compatible [FIDO2 security keys](concept-authentication-passwordless.md#fido2-security-keys) | X | X |
3434
| WebAuthN requires Windows 10 version 1809 or higher | X | X |
35-
| [Azure AD joined devices](../devices/concept-azure-ad-join.md) require Windows 10 version 1809 or higher | X | |
35+
| [Azure AD joined devices](../devices/concept-azure-ad-join.md) require Windows 10 version 1903 or higher | X | |
3636
| [Hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md) require Windows 10 Insider Build 18945 or higher | | X |
3737
| Fully patched Windows Server 2016/2019 Domain Controllers. | | X |
3838
| [Azure AD Connect](../hybrid/how-to-connect-install-roadmap.md#install-azure-ad-connect) version 1.4.32.0 or later | | X |
@@ -51,6 +51,7 @@ The following scenarios aren't supported:
5151
- Log in to a server using a security key.
5252
- If you haven't used your security key to sign in to your device while online, you can't use it to sign in or unlock offline.
5353
- Signing in or unlocking a Windows 10 device with a security key containing multiple Azure AD accounts. This scenario utilizes the last account added to the security key. WebAuthN allows users to choose the account they wish to use.
54+
- Unlock a device running Windows 10 version 1809. For the best experience, use Windows 10 version 1903 or higher.
5455

5556
## Prepare devices for preview
5657

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 35 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,35 @@ Organizations can choose to use the device identity as part of their Conditional
6464

6565
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile-device management (MDM) solution.
6666

67-
Supported applications can be found in the article, [Microsoft Intune protected apps](/intune/apps/apps-supported-intune-apps).
67+
This setting applies to the following client apps:
68+
69+
- Microsoft Azure Information Protection
70+
- Microsoft Bookings
71+
- Microsoft Cortana
72+
- Microsoft Dynamics 365
73+
- Microsoft Edge
74+
- Microsoft Excel
75+
- Microsoft Flow
76+
- Microsoft Intune Managed Browser
77+
- Microsoft Invoicing
78+
- Microsoft Kaizala
79+
- Microsoft Launcher
80+
- Microsoft OneDrive
81+
- Microsoft OneNote
82+
- Microsoft Outlook
83+
- Microsoft Planner
84+
- Microsoft PowerApps
85+
- Microsoft Power BI
86+
- Microsoft PowerPoint
87+
- Microsoft SharePoint
88+
- Microsoft Skype for Business
89+
- Microsoft StaffHub
90+
- Microsoft Stream
91+
- Microsoft Teams
92+
- Microsoft To-Do
93+
- Microsoft Visio
94+
- Microsoft Word
95+
- Microsoft Yammer
6896

6997
**Remarks**
7098

@@ -77,7 +105,12 @@ Supported applications can be found in the article, [Microsoft Intune protected
77105

78106
In your Conditional Access policy, you can require an [Intune app protection policy](/intune/app-protection-policy) be present on the client app before access is available to the selected cloud apps.
79107

80-
Supported applications can be found in the article, [Microsoft Intune protected apps](/intune/apps/apps-supported-intune-apps).
108+
This setting applies to the following client apps:
109+
110+
- Microsoft Cortana
111+
- Microsoft OneDrive
112+
- Microsoft Outlook
113+
- Microsoft Planner
81114

82115
**Remarks**
83116

articles/active-directory/develop/quickstart-v2-android.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Applications must be represented by an app object in Azure Active Directory so t
4343
> [!div class="sxs-lookup" renderon="portal"]
4444
> Run the project using Android Studio.
4545
> [!div renderon="portal" id="autoupdate" class="nextstepaction"]
46-
> [Download the code sample]()
46+
> [Download the code sample](https://github.com/Azure-Samples/ms-identity-android-java/archive/master.zip)
4747
>
4848
> [!div class="sxs-lookup" renderon="portal"]
4949
> ### Step 3: Your app is configured and ready to run

articles/active-directory/develop/quickstart-v2-netcore-daemon.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ This quickstart requires [.NET Core 2.2](https://www.microsoft.com/net/download/
7575
> [!div class="sxs-lookup" renderon="portal"]
7676
> Run the project using Visual Studio 2019.
7777
> [!div renderon="portal" id="autoupdate" class="nextstepaction"]
78-
> [Download the code sample]()
78+
> [Download the code sample](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/archive/master.zip)
7979
8080
> [!div class="sxs-lookup" renderon="portal"]
8181
> > [!NOTE]

articles/active-directory/develop/quickstart-v2-python-daemon.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ To run this sample, you need:
7777
> [Download the Python daemon project](https://github.com/Azure-Samples/ms-identity-python-daemon/archive/master.zip)
7878
7979
> [!div renderon="portal" id="autoupdate" class="nextstepaction"]
80-
> [Download the code sample]()
80+
> [Download the code sample](https://github.com/Azure-Samples/ms-identity-python-daemon/archive/master.zip)
8181
8282
> [!div class="sxs-lookup" renderon="portal"]
8383
> > [!NOTE]

articles/active-directory/develop/quickstart-v2-python-webapp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ To run this sample, you will need:
9494
> [!div class="sxs-lookup" renderon="portal"]
9595
> Download the project and extract the zip file to a local folder closer to the root folder - for example, **C:\Azure-Samples**
9696
> [!div renderon="portal" id="autoupdate" class="nextstepaction"]
97-
> [Download the code sample]()
97+
> [Download the code sample](https://github.com/Azure-Samples/ms-identity-python-webapp/archive/master.zip)
9898
9999
> [!div renderon="docs"]
100100
> #### Step 3: Configure the Application

0 commit comments

Comments
 (0)