Skip to content

Commit 275cff4

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into billing-ea-portal-articles-edit
2 parents 39d0e0f + ed39fdc commit 275cff4

File tree

547 files changed

+8274
-7024
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

547 files changed

+8274
-7024
lines changed

.openpublishing.redirection.json

Lines changed: 150 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,75 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/power-bi-workspace-collections/app-token-flow.md",
5+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/app-token-flow",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/power-bi-workspace-collections/connect-datasource.md",
10+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/connect-datasource",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/power-bi-workspace-collections/create-report-from-dataset.md",
15+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/create-report-from-dataset",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/power-bi-workspace-collections/embed-report.md",
20+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/embed-report",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/power-bi-workspace-collections/faq.md",
25+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/faq",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/power-bi-workspace-collections/get-started-sample.md",
30+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/get-started-sample",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/power-bi-workspace-collections/get-started.md",
35+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/get-started",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/power-bi-workspace-collections/interact-with-reports.md",
40+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/interact-with-reports",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "articles/power-bi-workspace-collections/row-level-security.md",
45+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/row-level-security",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "articles/power-bi-workspace-collections/save-reports.md",
50+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/save-reports",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "articles/power-bi-workspace-collections/scenarios.md",
55+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/scenarios",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "articles/power-bi-workspace-collections/toggle-mode.md",
60+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/toggle-mode",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "articles/power-bi-workspace-collections/what-are-power-bi-workspace-collections.md",
65+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/what-are-power-bi-workspace-collections",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "articles/power-bi-workspace-collections/whats-new.md",
70+
"redirect_url": "/previous-versions/azure/power-bi-workspace-collections/whats-new",
71+
"redirect_document_id": false
72+
},
373
{
474
"source_path": "articles/active-directory/users-groups-roles/groups-update-rule.md",
575
"redirect_url": "/articles/active-directory/users-groups-roles/groups-create-rule",
@@ -1686,6 +1756,11 @@
16861756
"redirect_url": "/azure/cosmos-db/conflict-resolution-policies",
16871757
"redirect_document_id": true
16881758
},
1759+
{
1760+
"source_path": "articles/cosmos-db/how-to-custom-synchronization.md",
1761+
"redirect_url": "/azure/cosmos-db/how-to-multi-master",
1762+
"redirect_document_id": true
1763+
},
16891764
{
16901765
"source_path": "articles/cosmos-db/create-sql-api-dotnet-preview.md",
16911766
"redirect_url": "/azure/cosmos-db/create-sql-api-dotnet",
@@ -14168,9 +14243,9 @@
1416814243
"redirect_document_id": true
1416914244
},
1417014245
{
14171-
"source_path": "articles/machine-learning/service/how-to-vscode-tools.md",
14172-
"redirect_url": "/azure/machine-learning/how-to-vscode-tools",
14173-
"redirect_document_id": true
14246+
"source_path": "articles/machine-learning/service/how-to-vscode-tools.md",
14247+
"redirect_url": "/azure/machine-learning/tutorial-setup-vscode-extension",
14248+
"redirect_document_id": true
1417414249
},
1417514250
{
1417614251
"source_path": "articles/machine-learning/service/monitor-azure-machine-learning.md",
@@ -26622,15 +26697,55 @@
2662226697
"redirect_document_id": false
2662326698
},
2662426699
{
26625-
"source_path": "articles/active-directory/active-directory-azureadjoin-personal-device.md",
26700+
"source_path": "articles/active-directory/user-help-auth-app-add-account-overview.md",
2662626701
"redirect_url": "/azure/active-directory/user-help/device-management-azuread-joined-devices-setup",
2662726702
"redirect_document_id": false
2662826703
},
26704+
{
26705+
"source_path": "articles/active-directory/active-directory-azureadjoin-personal-device.md",
26706+
"redirect_url": "/azure/active-directory/user-help/user-help-auth-app-add-work-school-account",
26707+
"redirect_document_id": false
26708+
},
2662926709
{
2663026710
"source_path": "articles/active-directory/user-help/multi-factor-authentication-end-user.md",
2663126711
"redirect_url": "/azure/active-directory/user-help/user-help-two-step-verification-overview",
2663226712
"redirect_document_id": false
2663326713
},
26714+
{
26715+
"source_path": "articles/active-directory/user-help/user-help-security-info-overview.md",
26716+
"redirect_url": "/azure/active-directory/user-help/security-info-setup-signin",
26717+
"redirect_document_id": false
26718+
},
26719+
{
26720+
"source_path": "articles/active-directory/user-help/user-help-two-step-verification-overview.md",
26721+
"redirect_url": "/azure/active-directory/user-help/multi-factor-authentication-end-user-first-time",
26722+
"redirect_document_id": false
26723+
},
26724+
{
26725+
"source_path": "articles/active-directory/user-help/security-info-add-update-methods-overview.md",
26726+
"redirect_url": "/azure/active-directory/user-help/security-info-setup-auth-app",
26727+
"redirect_document_id": false
26728+
},
26729+
{
26730+
"source_path": "articles/active-directory/user-help/user-help-device-mgmt-overview.md",
26731+
"redirect_url": "/azure/active-directory/user-help/user-help-join-device-on-network",
26732+
"redirect_document_id": false
26733+
},
26734+
{
26735+
"source_path": "articles/active-directory/user-help/my-apps-portal-end-user-overview.md",
26736+
"redirect_url": "/azure/active-directory/user-help/my-apps-portal-end-user-access",
26737+
"redirect_document_id": false
26738+
},
26739+
{
26740+
"source_path": "articles/active-directory/user-help/my-applications-portal-overview.md",
26741+
"redirect_url": "/azure/active-directory/user-help/my-applications-portal-access",
26742+
"redirect_document_id": false
26743+
},
26744+
{
26745+
"source_path": "articles/active-directory/user-help/user-help-password-reset-overview.md",
26746+
"redirect_url": "/azure/active-directory/user-help/active-directory-passwords-reset-register",
26747+
"redirect_document_id": false
26748+
},
2663426749
{
2663526750
"source_path": "articles/active-directory/user-help/security-info-manage-settings.md",
2663626751
"redirect_url": "/azure/active-directory/user-help/security-info-add-update-methods-overview",
@@ -39672,9 +39787,29 @@
3967239787
},
3967339788
{
3967439789
"source_path": "articles/application-insights/app-insights-troubleshoot-faq.md",
39675-
"redirect_url": "/azure/azure-monitor/app/troubleshoot-faq",
39790+
"redirect_url": "/azure/azure-monitor/faq",
3967639791
"redirect_document_id": true
3967739792
},
39793+
{
39794+
"source_path": "articles/azure-monitor/app/troubleshoot-faq.md",
39795+
"redirect_url": "/azure/azure-monitor/faq",
39796+
"redirect_document_id": false
39797+
},
39798+
{
39799+
"source_path": "articles/azure-monitor/platform/log-faq.md",
39800+
"redirect_url": "/azure/azure-monitor/faq",
39801+
"redirect_document_id": false
39802+
},
39803+
{
39804+
"source_path": "articles/azure-monitor/insights/container-insights-faq.md",
39805+
"redirect_url": "/azure/azure-monitor/faq",
39806+
"redirect_document_id": false
39807+
},
39808+
{
39809+
"source_path": "articles/azure-monitor/insights/vminsights-faq.md",
39810+
"redirect_url": "/azure/azure-monitor/faq",
39811+
"redirect_document_id": false
39812+
},
3967839813
{
3967939814
"source_path": "articles/application-insights/app-insights-usage-cohorts.md",
3968039815
"redirect_url": "/azure/azure-monitor/app/usage-cohorts",
@@ -40960,6 +41095,11 @@
4096041095
"redirect_url": "/azure/hdinsight/hdinsight-debug-ambari-tez-view",
4096141096
"redirect_document_id": false
4096241097
},
41098+
{
41099+
"source_path": "articles/hdinsight/hadoop/apache-hadoop-debug-jobs.md",
41100+
"redirect_url": "/azure/hdinsight/hdinsight-hadoop-oms-log-analytics-tutorial",
41101+
"redirect_document_id": false
41102+
},
4096341103
{
4096441104
"source_path": "articles/hdinsight/hadoop/apache-hadoop-use-mapreduce-remote-desktop.md",
4096541105
"redirect_url": "/azure/hdinsight/hadoop/apache-hadoop-use-mapreduce-ssh",
@@ -40970,6 +41110,11 @@
4097041110
"redirect_url": "/azure/hdinsight/hadoop/apache-hadoop-use-pig-ssh",
4097141111
"redirect_document_id": false
4097241112
},
41113+
{
41114+
"source_path": "articles/cognitive-services/LUIS/sdk-csharp-3x.md",
41115+
"redirect_url": "/azure/cognitive-services/LUIS/sdk-authoring.md",
41116+
"redirect_document_id": true
41117+
},
4097341118
{
4097441119
"source_path": "articles/cognitive-services/LUIS/luis-reference-faq.md",
4097541120
"redirect_url": "/azure/cognitive-services/LUIS/troubleshooting",

articles/active-directory-b2c/active-directory-b2c-ui-customization-custom.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -141,19 +141,19 @@ To configure UI customization, you copy the **ContentDefinition** and its child
141141

142142
1. Save the extensions file.
143143

144-
## Upload your updated custom policy
144+
## Upload and test your updated custom policy
145+
146+
### Upload the custom policy
145147

146148
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
147-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
148-
1. Select **Identity Experience Framework**.
149-
1. Click **All Policies**.
150-
1. Click **Upload Policy**.
149+
1. Search for and select **Azure AD B2C**.
150+
1. Under **Policies**, select **Identity Experience Framework**.
151+
1. Select **Upload custom policy**.
151152
1. Upload the extensions file that you previously changed.
152153

153-
## Test the custom policy by using **Run now**
154+
### Test the custom policy by using **Run now**
154155

155-
1. On the **Azure AD B2C** page, go to **All policies**.
156-
1. Select the custom policy that you uploaded, and click the **Run now** button.
156+
1. Select the policy that you uploaded, and then select **Run now**.
157157
1. You should be able to sign up by using an email address.
158158

159159
## Reference

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -122,10 +122,10 @@ The technical profile also returns claims, that aren't returned by the identity
122122
| --------- | -------- | ----------- |
123123
| ServiceUrl | Yes | The URL of the REST API endpoint. |
124124
| AuthenticationType | Yes | The type of authentication being performed by the RESTful claims provider. Possible values: `None`, `Basic`, `Bearer`, or `ClientCertificate`. The `None` value indicates that the REST API is not anonymous. The `Basic` value indicates that the REST API is secured with HTTP basic authentication. Only verified users, including Azure AD B2C, can access your API. The `ClientCertificate` (recommended) value indicates that the REST API restricts access by using client certificate authentication. Only services that have the appropriate certificates, for example Azure AD B2C, can access your API. The `Bearer` value indicates that the REST API restricts access using client OAuth2 Bearer token. |
125-
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. |
125+
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. The HTTP verbs invoked by each are as follows:<br /><ul><li>`Body`: POST</li><li>`Form`: POST</li><li>`Header`: GET</li><li>`QueryString`: GET</li></ul> |
126126
| ClaimsFormat | No | Specifies the format for the output claims. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the output claim that is sent in the request body in JSON format. The `Form` value is the output claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the output claim that is sent in the request header. The `QueryString` value is the output claim that is sent in the request query string. |
127127
| ClaimUsedForRequestPayload| No | Name of a string claim that contains the payload to be sent to the REST API. |
128-
| DebugMode | No | Runs the technical profile in debug mode. In debug mode, the REST API can return more information. See the returning error message section. |
128+
| DebugMode | No | Runs the technical profile in debug mode. Possible values: `true`, or `false` (default). In debug mode, the REST API can return more information. See the [Returning error message](#returning-error-message) section. |
129129

130130
## Cryptographic keys
131131

@@ -212,7 +212,7 @@ If the type of authentication is set to `Bearer`, the **CryptographicKeys** elem
212212

213213
## Returning error message
214214

215-
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. In an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
215+
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. If an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
216216

217217
| Attribute | Required | Description |
218218
| --------- | -------- | ----------- |

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,11 @@ If your MFA provider is not linked to an Azure AD tenant, or you link the new MF
4545
> [!CAUTION]
4646
> There is no confirmation when deleting an authentication provider. Selecting **Delete** is a permanent process.
4747
48-
Authentication providers can be found in the **Azure portal** > **Azure Active Directory** > **MFA** > **Providers**. Click on listed providers to see details and configurations associated with that provider.
48+
Authentication providers can be found in the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers**. Click on listed providers to see details and configurations associated with that provider.
4949

5050
Before removing an authentication provider, take note of any customized settings configured in your provider. Decide what settings need to be migrated to general MFA settings from your provider and complete the migration of those settings.
5151

52-
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Azure portal** > **Azure Active Directory** > **MFA** > **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
52+
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
5353

5454
- caCert
5555
- cert
@@ -61,7 +61,7 @@ Azure MFA Servers linked to providers will need to be reactivated using credenti
6161

6262
![Delete an auth provider from the Azure portal](./media/concept-mfa-authprovider/authentication-provider-removal.png)
6363

64-
When you have confirmed that all settings have been migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
64+
When you have confirmed that all settings have been migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
6565

6666
> [!WARNING]
6767
> Deleting an authentication provider will delete any reporting information associated with that provider. You may want to save activity reports before deleting your provider.

articles/active-directory/authentication/howto-mfa-adfs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The first thing we need to do is to configure the AD FS claims. Create two claim
8383
Now that the claims are in place, we can configure trusted IPs.
8484

8585
1. Sign in to the [Azure portal](https://portal.azure.com).
86-
2. Select **Azure Active Directory** > **Conditional Access** > **Named locations**.
86+
2. Select **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**.
8787
3. From the **Conditional Access - Named locations** blade, select **Configure MFA trusted IPs**
8888

8989
![Azure AD Conditional Access named locations Configure MFA trusted IPs](./media/howto-mfa-adfs/trustedip6.png)

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -82,18 +82,18 @@ We recommend that organizations use Conditional Access to define their network u
8282
### Configuring a named location
8383

8484
1. Open **Azure Active Directory** in the Azure portal
85-
2. Click **Conditional Access**
86-
3. Click **Named Locations**
87-
4. Click **New Location**
85+
2. Select **Security**
86+
3. Under **Manage**, choose **Named Locations**
87+
4. Select **New Location**
8888
5. In the **Name** field, provide a meaningful name
89-
6. Select whether you are defining the location using IP ranges or Countries/Regions
90-
1. If using IP Ranges
91-
1. Decide whether to mark the location as Trusted. Signing in from a trusted location lowers a user's sign-in risk. Only mark this location as trusted if you know the IP ranges entered are established and credible in your organization.
89+
6. Select whether you are defining the location using *IP ranges* or *Countries/Regions*
90+
1. If using *IP Ranges*
91+
1. Decide whether to *Mark as trusted location*. Signing in from a trusted location lowers a user's sign-in risk. Only mark this location as trusted if you know the IP ranges entered are established and credible in your organization.
9292
2. Specify the IP Ranges
93-
2. If using Countries/Regions
93+
2. If using *Countries/Regions*
9494
1. Expand the drop-down menu and select the countries or regions you wish to define for this named location.
95-
2. Decide whether to Include unknown areas. Unknown areas are IP addresses that can't be mapped to a country/region.
96-
7. Click **Create**
95+
2. Decide whether to *Include unknown areas*. Unknown areas are IP addresses that can't be mapped to a country/region.
96+
7. Select **Create**
9797

9898
## Plan authentication methods
9999

@@ -218,7 +218,7 @@ It is important that you prevent being inadvertently locked out of your Azure AD
218218
### Create Conditional Access policy
219219

220220
1. Sign in to the [Azure portal](https://portal.azure.com) using a global administrator account.
221-
1. Browse to **Azure Active Directory**, **Conditional Access**.
221+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
222222
1. Select **New policy**.
223223
![Create a Conditional Access policy to enable MFA for Azure portal users in pilot group](media/howto-mfa-getstarted/conditionalaccess-newpolicy.png)
224224
1. Provide a meaningful name for your policy.

0 commit comments

Comments
 (0)