Skip to content

Commit 274b3b5

Browse files
authored
Merge pull request #41944 from MicrosoftDocs/master
5/22 PM Publish
2 parents 7d4dfd6 + 7fb0072 commit 274b3b5

File tree

488 files changed

+3439
-2032
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

488 files changed

+3439
-2032
lines changed

.openpublishing.redirection.json

Lines changed: 27 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4045,6 +4045,21 @@
40454045
"redirect_url": "/azure/container-service/dcos-swarm",
40464046
"redirect_document_id": false
40474047
},
4048+
{
4049+
"source_path": "articles/container-service/dcos-swarm/container-service-create-acs-cluster-cli.md",
4050+
"redirect_url": "/azure/container-service/dcos-swarm",
4051+
"redirect_document_id": false
4052+
},
4053+
{
4054+
"source_path": "articles/container-service/dcos-swarm/container-service-swarm-walkthrough.md",
4055+
"redirect_url": "/azure/container-service/dcos-swarm/container-service-swarm-mode-walkthrough",
4056+
"redirect_document_id": false
4057+
},
4058+
{
4059+
"source_path": "articles/container-service/dcos-swarm/container-service-connect.md",
4060+
"redirect_url": "/azure/container-service/dcos-swarm",
4061+
"redirect_document_id": false
4062+
},
40484063
{
40494064
"source_path": "articles/aks/azure-files.md",
40504065
"redirect_url": "/azure/aks/azure-files-dynamic-pv",
@@ -6930,6 +6945,16 @@
69306945
"redirect_url": "https://docs.microsoft.com/rest/api/searchservice/add-scoring-profiles-to-a-search-index",
69316946
"redirect_document_id": false
69326947
},
6948+
{
6949+
"source_path": "articles/search/search-api-2017-11-11-preview.md",
6950+
"redirect_url": "/azure/search/search-api-preview",
6951+
"redirect_document_id": true
6952+
},
6953+
{
6954+
"source_path": "articles/search/search-api-2016-09-01-preview.md",
6955+
"redirect_url": "/azure/search/search-api-2017-11-11-preview",
6956+
"redirect_document_id": true
6957+
},
69336958
{
69346959
"source_path": "articles/search/search-api-2015-02-28-preview.md",
69356960
"redirect_url": "articles/search/search-api-2016-09-01-preview.md",
@@ -21539,7 +21564,7 @@
2153921564
"source_path": "articles/active-directory/develop/active-directory-v2-devquickstarts-node-api.md",
2154021565
"redirect_url": "https://github.com/AzureADQuickStarts/AppModelv2-WebAPI-nodejs",
2154121566
"redirect_document_id": false
21542-
},
21567+
},
2154321568
{
2154421569
"source_path": "articles/active-directory/active-directory-b2b-add-guest-to-role.md",
2154521570
"redirect_url": "/azure/active-directory/b2b/add-guest-to-role",
@@ -21570,7 +21595,7 @@
2157021595
"redirect_url": "/azure/active-directory/b2b/auditing-and-reporting",
2157121596
"redirect_document_id": true
2157221597
},
21573-
{
21598+
{
2157421599
"source_path": "articles/active-directory/active-directory-b2b-claims-mapping.md",
2157521600
"redirect_url": "/azure/active-directory/b2b/claims-mapping",
2157621601
"redirect_document_id": true

articles/active-directory-b2c/active-directory-b2c-access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ When requesting an access token, the client application needs to specify the des
7676
> Currently, custom domains are not supported along with access tokens. You must use your tenantName.onmicrosoft.com domain in the request URL.
7777
7878
```
79-
https://login.microsoftonline.com/<tenantName>.onmicrosoft.com/oauth2/v2.0/authorize?p=<yourPolicyId>&client_id=<appID_of_your_client_application>&nonce=anyRandomValue&redirect_uri=<redirect_uri_of_your_client_application>&scope=https%3A%2F%2Fcontoso.onmicrosoft.com%2Fnotes%2Fread&response_type=code
79+
https://login.microsoftonline.com/<tenantName>.onmicrosoft.com/<yourPolicyId>/oauth2/v2.0/authorize?client_id=<appID_of_your_client_application>&nonce=anyRandomValue&redirect_uri=<redirect_uri_of_your_client_application>&scope=https%3A%2F%2Fcontoso.onmicrosoft.com%2Fnotes%2Fread&response_type=code
8080
```
8181

8282
To acquire multiple permissions in the same request, you can add multiple entries in the single **scope** parameter, separated by spaces. For example:

articles/active-directory-b2c/active-directory-b2c-reference-custom-attr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.author: davidmu
1818
Your Azure Active Directory (Azure AD) B2C directory comes with a built-in set of information (attributes): Given Name, Surname, City, Postal Code, and other attributes. However, every consumer-facing application has unique requirements on what attributes to gather from consumers. With Azure AD B2C, you can extend the set of attributes stored on each consumer account. You can create custom attributes on the [Azure portal](https://portal.azure.com/) and use it in your sign-up policies, as shown below. You can also read and write these attributes by using the [Azure AD Graph API](active-directory-b2c-devquickstarts-graph-dotnet.md).
1919

2020
> [!NOTE]
21-
> Custom attributes use [Azure AD Graph API Directory Schema Extensions](https://msdn.microsoft.com/library/azure/dn720459.aspx).
21+
> Custom attributes use [Azure AD Graph API Directory Schema Extensions](https://msdn.microsoft.com/library/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
2222
>
2323
>
2424

articles/active-directory/active-directory-reporting-migration.md

Lines changed: 3 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -21,14 +21,7 @@ ms.reviewer: dhanyahk
2121

2222
In this article, we describe how to find Azure Active Directory user activity reports in the Azure portal.
2323

24-
## What's new
25-
26-
Reports in the Azure classic portal were separated into categories:
27-
* Security reports
28-
* Activity reports
29-
* Integrated app reports
30-
31-
### Activity and integrated app reports
24+
## Activity and integrated app reports
3225

3326
For context-based reporting in the Azure portal, existing reports are merged into a single view. A single, underlying API provides the data to the view.
3427

@@ -85,7 +78,7 @@ To view details about application usage for all apps or for a single app, under
8578

8679
#### Azure AD anomalous activity reports
8780

88-
Azure AD anomalous activity security reports from the Azure classic portal have been consolidated to provide you with one, central view. This view shows all security-related risk events that Azure AD can detect and report on.
81+
Azure AD anomalous activity security reports are consolidated to provide you with one central view. This view shows all security-related risk events that Azure AD can detect and report on.
8982

9083
The following table lists the Azure AD anomalous activity security reports, and corresponding risk event types in the Azure portal.
9184

@@ -103,8 +96,6 @@ The following Azure AD anomalous activity security reports are not included as r
10396
* Sign-ins after multiple failures
10497
* Sign-ins from multiple geographies
10598

106-
These reports are still available in the Azure classic portal, but they will be deprecated at some time in the future.
107-
10899
For more information, see
109100
[Azure Active Directory risk events](active-directory-identity-protection-risk-events.md).
110101

@@ -124,29 +115,10 @@ For more information about security reports, see:
124115
- [Risky Sign-ins report in the Azure Active Directory portal](active-directory-reporting-security-risky-sign-ins.md)
125116

126117

127-
## Activity reports in the Azure classic portal vs. the Azure portal
128-
129-
The table in this section lists existing reports in the Azure classic portal. It also describes how you can get the same information in the Azure portal.
130-
131-
To view all auditing data, on the **Azure Active Directory** blade, under **ACTIVITY**, go to **Audit logs**.
132-
133-
![Audit logs](./media/active-directory-reporting-migration/61.png "Audit logs")
134-
135-
| Azure classic portal | To find in the Azure portal |
136-
| --- | --- |
137-
| Audit logs | For **Activity Category**, select **Core Directory**. |
138-
| Password reset activity | For **Activity Category**, select **Self-service Password Management**. |
139-
| Password reset registration activity | For **Activity Category**, select **Self-service Password Management**. |
140-
| Self-service groups activity | For **Activity Category**, select **Self-service Group Management**. |
141-
| Account provisioning activity | For **Activity Category**, select **Account User Provisioning**. |
142-
| Password rollover status | For **Activity Category**, select **Automatic App Password Rollover**. |
143-
| Account provisioning errors | For **Activity Category**, select **Account User Provisioning**. |
144-
| Office365 Group Name Changes | For **Activity Category**, select **Self-service Password Management**. For **Activity Resource Type**, select **Group**. For **Activity Source**, select **O365 groups**.|
145-
146118
To view the **Application Usage** report, on the **Azure Active Directory** blade, under **MANAGE**, select **Enterprise Applications**, and then select **Sign-ins**.
147119

148120

149-
![Enterprise Applications Sign-Ins report](./media/active-directory-reporting-migration/199.png "Enterprise Applications Sign-Ins report")
121+
![Enterprise Applications Sign-Ins report](./media/active-directory-reporting-migration/199.png)
150122

151123
## Next steps
152124

articles/active-directory/active-directory-saas-asana-tutorial.md

Lines changed: 30 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 08/01/2017
16+
ms.date: 05/10/2018
1717
ms.author: jeedes
1818

1919
---
@@ -45,7 +45,7 @@ To test the steps in this tutorial, you should follow these recommendations:
4545
- If you don't have an Azure AD trial environment, you can [get a one-month trial](https://azure.microsoft.com/pricing/free-trial/).
4646

4747
## Scenario description
48-
In this tutorial, you test Azure AD single sign-on in a test environment.
48+
In this tutorial, you test Azure AD single sign-on in a test environment.
4949
The scenario outlined in this tutorial consists of two main building blocks:
5050

5151
1. Adding Asana from the gallery
@@ -63,7 +63,7 @@ To configure the integration of Asana into Azure AD, you need to add Asana from
6363
2. Navigate to **Enterprise applications**. Then go to **All applications**.
6464

6565
![The Enterprise applications blade][2]
66-
66+
6767
3. To add new application, click **New application** button on the top of dialog.
6868

6969
![The New application button][3]
@@ -98,8 +98,8 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
9898

9999
![Configure Single Sign-On][4]
100100

101-
2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
102-
101+
2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
102+
103103
![Single sign-on dialog box](./media/active-directory-saas-asana-tutorial/tutorial_asana_samlbase.png)
104104

105105
3. On the **Asana Domain and URLs** section, perform the following steps:
@@ -109,25 +109,25 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
109109
a. In the **Sign-on URL** textbox, type URL: `https://app.asana.com/`
110110

111111
b. In the **Identifier** textbox, type value: `https://app.asana.com/`
112-
112+
113113
4. On the **SAML Signing Certificate** section, click **Certificate(Base64)** and then save the certificate file on your computer.
114114

115115
![The Certificate download link](./media/active-directory-saas-asana-tutorial/tutorial_asana_certificate.png)
116-
116+
117117
5. Click **Save** button.
118118

119119
![Configure Single Sign-On Save button](./media/active-directory-saas-asana-tutorial/tutorial_general_400.png)
120120

121121
6. On the **Asana Configuration** section, click **Configure Asana** to open **Configure sign-on** window. Copy the **SAML Single Sign-On Service URL** from the **Quick Reference section.**
122122

123-
![Asana Configuration](./media/active-directory-saas-asana-tutorial/tutorial_asana_configure.png)
123+
![Asana Configuration](./media/active-directory-saas-asana-tutorial/tutorial_asana_configure.png)
124+
125+
7. In a different browser window, sign-on to your Asana application. To configure SSO in Asana, access the workspace settings by clicking the workspace name on the top right corner of the screen. Then, click on **\<your workspace name\> Settings**.
124126

125-
7. In a different browser window, sign-on to your Asana application. To configure SSO in Asana, access the workspace settings by clicking the workspace name on the top right corner of the screen. Then, click on **\<your workspace name\> Settings**.
126-
127127
![Asana sso settings](./media/active-directory-saas-asana-tutorial/tutorial_asana_09.png)
128128

129129
8. On the **Organization settings** window, click **Administration**. Then, click **Members must log in via SAML** to enable the SSO configuration. The perform the following steps:
130-
130+
131131
![Configure Single Sign-On Organization settings](./media/active-directory-saas-asana-tutorial/tutorial_asana_10.png)
132132

133133
a. In the **Sign-in page URL** textbox, paste the **SAML Single Sign-On Service URL**.
@@ -136,9 +136,6 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
136136

137137
9. Click **Save**. Go to [Asana guide for setting up SSO](https://asana.com/guide/help/premium/authentication#gl-saml) if you need further assistance.
138138

139-
> [!TIP]
140-
> You can now read a concise version of these instructions inside the [Azure portal](https://portal.azure.com), while you are setting up the app! After adding this app from the **Active Directory > Enterprise Applications** section, simply click the **Single Sign-On** tab and access the embedded documentation through the **Configuration** section at the bottom. You can read more about the embedded documentation feature here: [Azure AD embedded documentation]( https://go.microsoft.com/fwlink/?linkid=845985)
141-
142139
### Create an Azure AD test user
143140

144141
The objective of this section is to create a test user in the Azure portal called Britta Simon.
@@ -152,16 +149,16 @@ The objective of this section is to create a test user in the Azure portal calle
152149
![The Azure Active Directory button](./media/active-directory-saas-asana-tutorial/create_aaduser_01.png)
153150

154151
2. To display the list of users, go to **Users and groups** and click **All users**.
155-
156-
![The "Users and groups" and "All users" links](./media/active-directory-saas-asana-tutorial/create_aaduser_02.png)
152+
153+
![The "Users and groups" and "All users" links](./media/active-directory-saas-asana-tutorial/create_aaduser_02.png)
157154

158155
3. To open the **User** dialog, click **Add** on the top of the dialog.
159-
160-
![Creating an Azure AD test user](./media/active-directory-saas-asana-tutorial/create_aaduser_03.png)
156+
157+
![Creating an Azure AD test user](./media/active-directory-saas-asana-tutorial/create_aaduser_03.png)
161158

162159
4. On the **User** dialog page, perform the following steps:
163-
164-
![The Add button](./media/active-directory-saas-asana-tutorial/create_aaduser_04.png)
160+
161+
![The Add button](./media/active-directory-saas-asana-tutorial/create_aaduser_04.png)
165162

166163
a. In the **Name** textbox, type **BrittaSimon**.
167164

@@ -170,14 +167,18 @@ The objective of this section is to create a test user in the Azure portal calle
170167
c. Select **Show Password** and write down the value of the **Password**.
171168

172169
d. Click **Create**.
173-
170+
174171
### Create an Asana test user
175172

173+
The objective of this section is to create a user called Britta Simon in Asana. Asana supports automatic user provisioning, which is by default enabled. You can find more details [here](active-directory-saas-asana-provisioning-tutorial.md) on how to configure automatic user provisioning.
174+
175+
**If you need to create user manually, please perform following steps:**
176+
176177
In this section, you create a user called Britta Simon in Asana.
177178

178-
1. On **Asana**, go to the **Teams** section on the left panel. Click the plus sign button.
179-
180-
![Creating an Azure AD test user](./media/active-directory-saas-asana-tutorial/tutorial_asana_12.png)
179+
1. On **Asana**, go to the **Teams** section on the left panel. Click the plus sign button.
180+
181+
![Creating an Azure AD test user](./media/active-directory-saas-asana-tutorial/tutorial_asana_12.png)
181182

182183
2. Type the email [email protected] in the text box and then select **Invite**.
183184

@@ -193,11 +194,11 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
193194

194195
1. In the Azure portal, open the applications view, and then navigate to the directory view and go to **Enterprise applications** then click **All applications**.
195196

196-
![Assign User][201]
197+
![Assign User][201]
197198

198199
2. In the applications list, select **Asana**.
199200

200-
![The Asana link in the Applications list](./media/active-directory-saas-asana-tutorial/tutorial_asana_app.png)
201+
![The Asana link in the Applications list](./media/active-directory-saas-asana-tutorial/tutorial_asana_app.png)
201202

202203
3. In the menu on the left, click **Users and groups**.
203204

@@ -212,7 +213,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
212213
6. Click **Select** button on **Users and groups** dialog.
213214

214215
7. Click **Assign** button on **Add Assignment** dialog.
215-
216+
216217
### Test single sign-on
217218

218219
The objective of this section is to test your Azure AD single sign-on.
@@ -223,7 +224,7 @@ Go to Asana login page. In the Email address textbox, insert the email address b
223224

224225
* [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](active-directory-saas-tutorial-list.md)
225226
* [What is application access and single sign-on with Azure Active Directory?](manage-apps/what-is-single-sign-on.md)
226-
227+
* [Configure User Provisioning](active-directory-saas-asana-provisioning-tutorial.md)
227228

228229
<!--Image references-->
229230

@@ -239,4 +240,4 @@ Go to Asana login page. In the Email address textbox, insert the email address b
239240
[202]: ./media/active-directory-saas-asana-tutorial/tutorial_general_202.png
240241
[203]: ./media/active-directory-saas-asana-tutorial/tutorial_general_203.png
241242
[10]: ./media/active-directory-saas-asana-tutorial/tutorial_general_060.png
242-
[11]: ./media/active-directory-saas-asana-tutorial/tutorial_general_070.png
243+
[11]: ./media/active-directory-saas-asana-tutorial/tutorial_general_070.png

0 commit comments

Comments
 (0)