Skip to content

Commit 250fd0d

Browse files
committed
Bringing even with master.
2 parents ec0396f + 8522dda commit 250fd0d

File tree

152 files changed

+1772
-529
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

152 files changed

+1772
-529
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2051,6 +2051,11 @@
20512051
"redirect_url": "/azure/managed-applications/microsoft-storage-storageaccountselector",
20522052
"redirect_document_id": false
20532053
},
2054+
{
2055+
"source_path": "articles/managed-applications/microsoft-network-availabilityzonedropdown.md",
2056+
"redirect_url": "/azure/managed-applications/create-uidefinition-elements",
2057+
"redirect_document_id": false
2058+
},
20542059
{
20552060
"source_path": "articles/solution-dev-test-environments.md",
20562061
"redirect_url": "/azure/lab-services/devtest-lab-overview",

articles/active-directory-b2c/active-directory-b2c-user-migration.md

Lines changed: 92 additions & 93 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/tutorial-v2-windows-desktop.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: article
1515
ms.tgt_pltfrm: na
1616
ms.workload: identity
17-
ms.date: 04/09/2018
17+
ms.date: 09/19/2018
1818
ms.author: andret
1919
ms.custom: aaddev
2020
---

articles/active-directory/fundamentals/active-directory-whatis.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,12 +33,8 @@ Azure AD helps you to:
3333

3434
- Take advantage of the [high-availability and reliability](https://docs.microsoft.com/azure/architecture/checklist/availability) of a worldwide, enterprise-grade, cloud-based identity and access management solution.
3535

36-
<<<<<<< HEAD
37-
Additionally, with just [four clicks](../hybrid/how-to-connect-install-express.md), you can integrate Azure AD with an existing Windows Server Active Directory, letting your organization use your existing on-premises identity investments to manage cloud-based SaaS app access.
38-
=======
3936
## Who uses Azure AD
4037
Azure AD is intended for IT admins, app developers, and for users of Office 365, Azure, or Dynamics CRM Online.
41-
>>>>>>> 73f447b1499ba1f189efb6832ad759f1230e55a2
4238

4339
- **IT admins.** Azure AD provides a more secure solution for your organization through the use of stronger identity management and single sign-on (SSO) access to thousands of [cloud-based SaaS apps](../saas-apps/tutorial-list.md) and on-premises apps. Through these apps, you'll also get cloud-based app security, seamless access, enhanced collaboration, and automation of the identity lifecycle for your users, helping to increase both security and compliance.
4440

@@ -77,4 +73,6 @@ Sign up for a free 30-day trial and deploy your first cloud solution, see [Azure
7773
Sign up for a free 30-day trial and start integrating your apps with Azure AD, see [Azure Active Directory Premium trial](https://azure.microsoft.com/trial/get-started-active-directory/). For more information, you can also see the [Developers Guide](../develop/azure-ad-developers-guide.md) for Azure Active Directory.
7874

7975
## Next steps
80-
[Learn more about the fundamentals of Azure identity and access management](identity-fundamentals.md).
76+
- [Learn more about the fundamentals of Azure identity and access management](identity-fundamentals.md).
77+
78+
- [Integrate Azure AD with Windows Server Active directory](../hybrid/how-to-connect-install-express.md).

articles/active-directory/fundamentals/customize-branding.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: kexia
1515
custom: it-pro
1616
---
1717

18-
# How to: Add branding to your Azure AD sign-in page
18+
# How to: Add branding to your Azure Active Directory sign-in page
1919
Use your organization's logo and custom color schemes to provide a consistent look-and-feel on your Azure Active Directory (Azure AD) sign-in pages. Your sign-in pages appear when users sign in to your organization's web-based apps, such as Office 365, which uses Azure AD as your identity provider.
2020

2121
>[!Note]
@@ -79,12 +79,10 @@ Your custom branding won't immediately appear when your users go to sites such a
7979

8080
3. After you've finished adding your branding, select **Save**.
8181

82-
If this process creates your first custom branding configuration, it becomes the default for your tenant. If you have additional configurations, you'll can choose your default configuration.
83-
84-
If this exercise is your first branding configuration, it will be the default for your tenant. If you add more configurations, you'll get the option to choose your default.
85-
86-
>[!Important]
87-
>To add more corporate branding configurations to your tenant, you must choose **New language** on the **Contoso - Company branding** page. This opens the **Configure company branding** page, where you can follow the same steps as above.
82+
If this process creates your first custom branding configuration, it becomes the default for your tenant. If you have additional configurations, you'll be able to choose your default configuration.
83+
84+
>[!Important]
85+
>To add more corporate branding configurations to your tenant, you must choose **New language** on the **Contoso - Company branding** page. This opens the **Configure company branding** page, where you can follow the same steps as above.
8886
8987
## Update your custom branding
9088
After you've created your custom branding, you can go back and change anything you want.

articles/active-directory/manage-apps/migration-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.component: app-mgmt
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 09/17/2018
11+
ms.date: 09/19/2018
1212
ms.author: barbkess
1313
ms.reviewer: baselden
1414

@@ -22,7 +22,7 @@ Resources to help you migrate application access and authentication to Azure Act
2222
|:-----------|:-------------|
2323
|[Migrating your apps to Azure AD](https://aka.ms/migrateapps/whitepaper) | This white paper presents the benefits of migration, and describes how to plan for migration in four clearly-outlined phases: discovery, classification, migration, and ongoing management. You’ll be guided through how to think about the process and break down your project into easy-to-consume pieces. Throughout the document are links to important resources that will help you along the way. |
2424
|[Solution guide: Migrating apps from Active Directory Federation Services (AD FS) to Azure AD](https://aka.ms/migrateapps/adfssolutionguide) | This solution guide walks you through the same four phases of planning and executing an application migration project described at a higher level in the migration whitepaper. In this guide, you’ll learn how to apply those phases to the specific goal of moving an application from Azure Directory Federated Services (AD FS) to Azure AD.|
25-
| [Tool: Active Directory Federation Services Migration Readiness Script](https://aka.ms/migrateapps/adfsscript) | This is a script you can run on your on-premises Active Directory Federation Services (AD FS) server to determine the readiness of apps for migration to Azure AD.|
25+
| [Tool: Active Directory Federation Services Migration Readiness Script](https://aka.ms/migrateapps/adfstools) | This is a script you can run on your on-premises Active Directory Federation Services (AD FS) server to determine the readiness of apps for migration to Azure AD.|
2626
| [Deployment plan: Migrating from AD FS to password hash sync](https://aka.ms/ADFSTOPHSDPDownload) | With password hash synchronization, hashes of user passwords are synchronized from on-premises Active Directory to Azure AD. This allows Azure AD to authenticate users without interacting with the on-premises Active Directory.|
2727
| [Deployment plan: Migrating from AD FS to pass-through authentication](https://aka.ms/ADFSTOPTADPDownload)|Azure AD pass-through authentication helps users sign in to both on-premises and cloud-based applications by using the same password. This feature provides your users with a better experience since they have one less password to remember. It also reduces IT helpdesk costs because users are less likely to forget how to sign in when they only need to remember one password. When people sign in using Azure AD, this feature validates users' passwords directly against your on-premises Active Directory.|
2828
| [Deployment plan: Enabling Single Sign-on to a SaaS app with Azure AD](https://aka.ms/SSODPDownload) | Single sign-on (SSO) helps you access all the apps and resources you need to do business, while signing in only once, using a single user account. For example, after a user has signed in, the user can move from Microsoft Office, to SalesForce, to Box without authenticating (for example, typing a password) a second time.

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ For this next step, you will need [Microsoft SQL Server Management Studio](https
147147
11. Clear the query window, enter the following line, and click **Execute** in the toolbar:
148148
149149
```
150-
ALTER ROLE db_datareader ADD MEMBER [VM VM managed identity access to SQL access to SQL]
150+
ALTER ROLE db_datareader ADD MEMBER [VM managed identity access to SQL]
151151
```
152152
153153
The command should complete successfully, granting the contained user the ability to read the entire database.

articles/active-directory/saas-apps/github-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ This section guides you through connecting your Azure AD to GitHub's user accoun
7777

7878
![Authorization Dialog](./media/github-provisioning-tutorial/GitHub2.png)
7979

80-
7. In the Azure portal, input **Tenant URL** and click **Test Connection** to ensure Azure AD can connect to your GitHub app. If the connection fails, ensure your GitHub account has Admin permissions and **Tenant URl** is inputted correctly, then try the "Authorize" step again (you can constitute **Tenant URL** by rule: `https://api.github.com/scim/v2/<Organizations_name>`, you can find your organizations under your GitHub account: **Settings** > **Organizations**).
80+
7. In the Azure portal, input **Tenant URL** and click **Test Connection** to ensure Azure AD can connect to your GitHub app. If the connection fails, ensure your GitHub account has Admin permissions and **Tenant URl** is inputted correctly, then try the "Authorize" step again (you can constitute **Tenant URL** by rule: `https://api.github.com/scim/v2/organizations/<Organization_name>`, you can find your organizations under your GitHub account: **Settings** > **Organizations**).
8181

8282
![Authorization Dialog](./media/github-provisioning-tutorial/GitHub3.png)
8383

articles/active-directory/users-groups-roles/directory-assign-admin-roles.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Assigning administrator roles in Azure Active Directory | Microsoft Docs
3-
description: An admin role can add users, assign administrative roles, reset user passwords, manage user licenses, or manage domains. A user who is assigned an admin role has the same permissions across all cloud services to which your organization has subscribed.
2+
title: Administrator roles reference in Azure Active Directory | Microsoft Docs
3+
description: An admin role can add users, assign administrative roles, reset user passwords, manage user licenses, or manage domains.
44
services: active-directory
55
documentationcenter: ''
66
author: curtand
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.workload: identity
1212
ms.component: users-groups-roles
1313
ms.topic: article
14-
ms.date: 09/07/2018
14+
ms.date: 09/19/2018
1515
ms.author: curtand
1616
ms.reviewer: vincesm
1717
ms.custom: it-pro
@@ -325,7 +325,8 @@ Full access to manage devices in Azure AD.
325325
| **Actions** | **Description** |
326326
| --- | --- |
327327
| microsoft.aad.directory/devices/delete | Delete devices in Azure Active Directory. |
328-
| microsoft.aad.directory/devices/update | Update the accountEnabled property on Devices in Azure Active Directory |
328+
| microsoft.aad.directory/devices/disable | Disable devices in Azure Active Directory. |
329+
| microsoft.aad.directory/devices/enable | Enable devices in Azure Active Directory. |
329330
| microsoft.aad.reports/allEntities/read | Read Azure AD Reports. |
330331
| microsoft.azure.serviceHealth/allEntities/allTasks | Read and configure Azure Service Health. |
331332
| microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Office 365 Service Health. |

articles/app-service/containers/app-service-linux-intro.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ App Service on Linux supports a number of Built-in images in order to increase d
2929

3030
| Language | Supported Versions |
3131
|---|---|
32-
| Node.js | 4.4, 4.5, 4.8, 6.2, 6.6, 6.9, 6.10, 6.11, 8.0, 8.1, 8.2, 8.8, 8.9, 9.4 |
32+
| Node.js | 4.4, 4.5, 4.8, 6.2, 6.6, 6.9, 6.10, 6.11, 8.0, 8.1, 8.2, 8.8, 8.9, 8.11, 9.4, 10.1 |
3333
| Java * | 8.0 |
3434
| PHP | 5.6, 7.0, 7.2 |
3535
| .NET Core | 1.0, 1.1, 2.0 |

0 commit comments

Comments
 (0)