Skip to content

Commit 28dda2e

Browse files
authored
Merge branch 'master' into user/v-sonan/harness
2 parents e341a89 + 93ce81b commit 28dda2e

File tree

4,008 files changed

+45518
-32269
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,008 files changed

+45518
-32269
lines changed

.openpublishing.redirection.json

Lines changed: 97 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/sql-database/sql-database-feature-restrictions.md",
5+
"redirect_url": "/azure/sql-database",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/digital-twins/how-to-use-legacy-aad.md",
510
"redirect_url": "/azure/digital-twins/quickstart-view-occupancy-dotnet#set-permissions-for-your-app",
@@ -40,6 +45,26 @@
4045
"redirect_url": "/azure//virtual-machines/windows/sql/virtual-machines-windows-portal-sql-create-failover-cluster-premium-file-share",
4146
"redirect_document_id": false
4247
},
48+
{
49+
"source_path": "articles/virtual-machines/windows/maintenance-and-updates.md",
50+
"redirect_url": "/azure/virtual-machines/maintenance-and-updates?toc=/azure/virtual-machines/windows/toc.json&bc=/azure/virtual-machines/windows/breadcrumb/toc.json",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "articles/virtual-machines/linux/maintenance-and-updates.md",
55+
"redirect_url": "/azure/virtual-machines/maintenance-and-updates?toc=/azure/virtual-machines/linux/toc.json&bc=/azure/virtual-machines/linux/breadcrumb/toc.json",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "articles/virtual-machines/windows/maintenance-notifications.md",
60+
"redirect_url": "/azure/virtual-machines/maintenance-notifications?toc=/azure/virtual-machines/windows/toc.json&bc=/azure/virtual-machines/windows/breadcrumb/toc.json",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "articles/virtual-machines/linux/maintenance-notifications.md",
65+
"redirect_url": "/azure/virtual-machines/maintenance-notifications?toc=/azure/virtual-machines/linux/toc.json&bc=/azure/virtual-machines/linux/breadcrumb/toc.json",
66+
"redirect_document_id": false
67+
},
4368
{
4469
"source_path": "articles/machine-learning/service/how-to-load-data.md",
4570
"redirect_url": "/azure/machine-learning/service/how-to-create-register-datasets",
@@ -251,6 +276,12 @@
251276
"redirect_url": "/azure/site-recovery/site-to-site-deprecation",
252277
"redirect_document_id": false
253278
},
279+
280+
{
281+
"source_path": "articles/site-recovery/site-to-site-deprecation.md",
282+
"redirect_url": "/azure/site-recovery/hyper-v-azure-tutorial",
283+
"redirect_document_id": false
284+
},
254285
{
255286
"source_path": "articles/machine-learning/service/quickstart-get-started.md",
256287
"redirect_url": "/azure/machine-learning/service/tutorial-1st-experiment-sdk-setup",
@@ -526,6 +557,16 @@
526557
"redirect_url": "/azure/machine-learning",
527558
"redirect_document_id": false
528559
},
560+
{
561+
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-postman.md",
562+
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
563+
"redirect_document_id": false
564+
},
565+
{
566+
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-curl.md",
567+
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
568+
"redirect_document_id": false
569+
},
529570
{
530571
"source_path": "articles/cognitive-services/LUIS/luis-how-to-add-example-utterances.md",
531572
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities",
@@ -986,6 +1027,11 @@
9861027
"redirect_url": "/azure/machine-learning/service/how-to-configure-environment",
9871028
"redirect_document_id": false
9881029
},
1030+
{
1031+
"source_path": "articles/firewall/public-preview.md",
1032+
"redirect_url": "/azure/firewall/overview",
1033+
"redirect_document_id": false
1034+
},
9891035
{
9901036
"source_path": "articles/frontdoor/waf-faq.md",
9911037
"redirect_url": "/azure/web-application-firewall/afds/waf-faq",
@@ -4776,6 +4822,31 @@
47764822
"redirect_url": "/azure/app-service-mobile",
47774823
"redirect_document_id": false
47784824
},
4825+
{
4826+
"source_path": "articles/application-gateway/application-gateway-backend-ssl.md",
4827+
"redirect_url": "/azure/application-gateway/ssl-overview",
4828+
"redirect_document_id": false
4829+
},
4830+
{
4831+
"source_path": "articles/application-gateway/tutorial-external-site-redirect-cli.md",
4832+
"redirect_url": "/azure/application-gateway/redirect-external-site-cli",
4833+
"redirect_document_id": false
4834+
},
4835+
{
4836+
"source_path": "articles/application-gateway/application-gateway-create-gateway-cli.md",
4837+
"redirect_url": "/azure/application-gateway/quick-create-cli",
4838+
"redirect_document_id": false
4839+
},
4840+
{
4841+
"source_path": "articles/application-gateway/application-gateway-ssl-cli.md",
4842+
"redirect_url": "/azure/application-gateway/tutorial-ssl-cli",
4843+
"redirect_document_id": false
4844+
},
4845+
{
4846+
"source_path": "articles/application-gateway/application-gateway-ssl-arm.md",
4847+
"redirect_url": "/azure/application-gateway/tutorial-ssl-powershell",
4848+
"redirect_document_id": false
4849+
},
47794850
{
47804851
"source_path": "articles/application-gateway/tutorial-internal-site-redirect-cli.md",
47814852
"redirect_url": "/azure/application-gateway/redirect-internal-site-cli",
@@ -12336,6 +12407,21 @@
1233612407
"redirect_url": "/azure/cosmos-db/sql-api-sdk-java",
1233712408
"redirect_document_id": true
1233812409
},
12410+
{
12411+
"source_path": "articles/cosmos-db/logging.md",
12412+
"redirect_url": "/azure/cosmos-db/monitor-cosmos-db",
12413+
"redirect_document_id": false
12414+
},
12415+
{
12416+
"source_path": "articles/cosmos-db/cosmos-db-azure-monitor-metrics.md",
12417+
"redirect_url": "/azure/cosmos-db/monitor-cosmos-db",
12418+
"redirect_document_id": false
12419+
},
12420+
{
12421+
"source_path": "articles/cosmos-db/monitor-accounts.md",
12422+
"redirect_url": "/azure/cosmos-db/monitor-cosmos-db",
12423+
"redirect_document_id": false
12424+
},
1233912425
{
1234012426
"source_path": "articles/iot-suite/iot-suite-v1-connecting-devices-linux.md",
1234112427
"redirect_url": "https://docs.microsoft.com/previous-versions/azure/iot-suite/iot-suite-v1-connecting-devices-linux",
@@ -26252,7 +26338,7 @@
2625226338
},
2625326339
{
2625426340
"source_path": "articles/security-center/security-center-policies-overview.md",
26255-
"redirect_url": "/azure/security-center/tutorial-security-policy.md",
26341+
"redirect_url": "/azure/security-center/tutorial-security-policy",
2625626342
"redirect_document_id": false
2625726343
},
2625826344
{
@@ -26425,6 +26511,11 @@
2642526511
"redirect_url": "/azure/hdinsight/spark/apache-spark-overview",
2642626512
"redirect_document_id": true
2642726513
},
26514+
{
26515+
"source_path": "articles/hdinsight/spark/apache-spark-eventhub-streaming.md",
26516+
"redirect_url": "/azure/hdinsight/spark/apache-spark-ipython-notebook-machine-learning",
26517+
"redirect_document_id": false
26518+
},
2642826519
{
2642926520
"source_path": "articles/hdinsight/storm/apache-storm-sensor-data-analysis.md",
2643026521
"redirect_url": "https://azure.microsoft.com/resources/samples/hdinsight-java-storm-eventhub/",
@@ -43705,6 +43796,11 @@
4370543796
"source_path": "articles/aks/virtual-kubelet.md",
4370643797
"redirect_url": "/azure/aks/concepts-scale#burst-to-azure-container-instances",
4370743798
"redirect_document_id": false
43799+
},
43800+
{
43801+
"source_path": "articles/healthcare-apis/configure-cosmos-db.md",
43802+
"redirect_url": "/azure/healthcare-apis/configure-database",
43803+
"redirect_document_id": false
4370843804
}
4370943805
]
4371043806
}

articles/active-directory-b2c/active-directory-b2c-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ To set up client credential flow, see [Azure Active Directory v2.0 and the OAuth
120120

121121
#### Web API chains (on-behalf-of flow)
122122

123-
Many architectures include a web API that needs to call another downstream web API, where both are secured by Azure AD B2C. This scenario is common in native clients that have a Web API back-end and calls a Microsoft online service such as the Azure AD Graph API.
123+
Many architectures include a web API that needs to call another downstream web API, where both are secured by Azure AD B2C. This scenario is common in native clients that have a Web API back-end and calls a Microsoft online service such as the Microsoft Graph API or Azure AD Graph API.
124124

125125
This chained web API scenario can be supported by using the OAuth 2.0 JWT bearer credential grant, also known as the on-behalf-of flow. However, the on-behalf-of flow is not currently implemented in the Azure AD B2C.
126126

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -273,11 +273,11 @@ Inspect the `B2CGraphClient.SendGraphPatchRequest()` method for details on how t
273273

274274
### Search users
275275

276-
You can search for users in your B2C tenant in following ways:
276+
You can search for users in your B2C tenant in the following ways:
277277

278278
* Reference the user's **object ID**.
279279
* Reference their sign-in identifer, the `signInNames` property.
280-
* Reference any of the valid OData parameters, e.g. givenName, surname, displayName etc.
280+
* Reference any of the valid OData parameters. For example, 'givenName', 'surname', 'displayName' etc.
281281

282282
Run one of the following commands to search for a user:
283283

articles/active-directory-b2c/active-directory-b2c-quickstarts-desktop-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Quickstart - Set up sign-in for a desktop app using Azure Active Directory B2C
3-
description: Run a sample WPF desktop application that uses Azure Active Directory B2C to provide account sign-in.
3+
description: In this Quickstart, run a sample WPF desktop application that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg

articles/active-directory-b2c/active-directory-b2c-quickstarts-spa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Quickstart - Set up sign-in for a single-page app using Azure Active Directory B2C
3-
description: Run a sample single-page application that uses Azure Active Directory B2C to provide account sign-in.
3+
description: In this Quickstart, run a sample single-page application that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg

articles/active-directory-b2c/active-directory-b2c-quickstarts-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Quickstart - Set up sign in for an ASP.NET application using Azure Active Directory B2C
3-
description: Run a sample ASP.NET web app that uses Azure Active Directory B2C to provide account sign-in.
3+
description: In this Quickstart, run a sample ASP.NET web app that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg

articles/active-directory-b2c/active-directory-b2c-reference-oauth-code.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,7 @@ grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&sco
111111
|{tenant}| Required | Name of your Azure AD B2C tenant|
112112
|{policy}| Required| The user flow that was used to acquire the authorization code. You cannot use a different user flow in this request. |
113113
| client_id |Required |The application ID assigned to your app in the [Azure portal](https://portal.azure.com).|
114+
| client_secret | Yes, in Web Apps | The application secret that was generated in the [Azure portal](https://portal.azure.com/). Client secrets are used in this flow for Web App scenarios, where the client can securely store a client secret. For Native App (public client) scenarios, client secrets cannot be securely stored, and therefore are not used in this call. If you use a client secret, please change it on a periodic basis. |
114115
| grant_type |Required |The type of grant. For the authorization code flow, the grant type must be `authorization_code`. |
115116
| scope |Recommended |A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app needs a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
116117
| code |Required |The authorization code that you acquired in the first leg of the flow. |
@@ -176,7 +177,7 @@ grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=90
176177
|{tenant}| Required | Name of your Azure AD B2C tenant|
177178
|{policy} |Required |The user flow that was used to acquire the original refresh token. You cannot use a different user flow in this request. |
178179
| client_id |Required |The application ID assigned to your app in the [Azure portal](https://portal.azure.com). |
179-
| client_secret |Required |The client_secret associated to your client_id in the [Azure portal](https://portal.azure.com). |
180+
| client_secret | Yes, in Web Apps | The application secret that was generated in the [Azure portal](https://portal.azure.com/). Client secrets are used in this flow for Web App scenarios, where the client can securely store a client secret. For Native App (public client) scenarios, client secrets cannot be securely stored, and therefore are not used in this call. If you use a client secret, please change it on a periodic basis. |
180181
| grant_type |Required |The type of grant. For this leg of the authorization code flow, the grant type must be `refresh_token`. |
181182
| scope |Recommended |A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app will need a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
182183
| redirect_uri |Optional |The redirect URI of the application where you received the authorization code. |

articles/active-directory-b2c/active-directory-b2c-tutorials-spa-webapi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Tutorial - Grant access to an ASP.NET Core web API from a single-page application - Azure Active Directory B2C
3-
description: Learn how to use Active Directory B2C to protect a .NET Core web API and call the API from a single-page Node.js application.
3+
description: In this tutorial, learn how to use Active Directory B2C to protect a .NET Core web API and call the API from a single-page Node.js application.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg

articles/active-directory-b2c/active-directory-b2c-tutorials-spa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Enable authentication in a single-page application - Azure Active Directory B2C'
3-
description: Learn how to use Azure Active Directory B2C to provide user login for a single page application (JavaScript).
2+
title: 'Tutorial - Enable authentication in a single-page application - Azure Active Directory B2C'
3+
description: In this tutorial, learn how to use Azure Active Directory B2C to provide user login for a single page application (JavaScript).
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg

articles/active-directory-b2c/active-directory-b2c-ui-customization-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,4 +202,4 @@ In the Modify your sign-up or sign-in custom policy section, you configured the
202202
203203
## Next steps
204204
205-
For more information about UI elements that can be customized, see [reference guide for UI customization for built-in policies](active-directory-b2c-reference-ui-customization.md).
205+
For more information about UI elements that can be customized, see [reference guide for UI customization for user flows](active-directory-b2c-reference-ui-customization.md).

0 commit comments

Comments
 (0)