Skip to content

Commit 2b87942

Browse files
committed
Merge remote-tracking branch 'upstream/master' into v-miegge/reinstate-fstab-file
2 parents cc50831 + a30a998 commit 2b87942

File tree

118 files changed

+2350
-1763
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

118 files changed

+2350
-1763
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,11 @@
233233
"url": "https://github.com/Azure-Samples/azure-iot-samples-node",
234234
"branch": "master"
235235
},
236+
{
237+
"path_to_root": "azure-iot-sdk-node",
238+
"url": "https://github.com/Azure/azure-iot-sdk-node",
239+
"branch": "master"
240+
},
236241
{
237242
"path_to_root": "iot-samples-c",
238243
"url": "https://github.com/Azure/azure-iot-sdk-c",

.openpublishing.redirection.json

Lines changed: 56 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17800,6 +17800,11 @@
1780017800
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-load-with-data-factory",
1780117801
"redirect_document_id": false
1780217802
},
17803+
{
17804+
"source_path": "articles/synapse-analytics/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi.md",
17805+
"redirect_url": "/power-bi/service-azure-sql-data-warehouse-with-direct-connect",
17806+
"redirect_document_id": false
17807+
},
1780317808
{
1780417809
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-load-from-azure-blob-storage-with-data-factory.md",
1780517810
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-load-with-data-factory",
@@ -17937,7 +17942,7 @@
1793717942
},
1793817943
{
1793917944
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi.md",
17940-
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi",
17945+
"redirect_url": "/power-bi/service-azure-sql-data-warehouse-with-direct-connect",
1794117946
"redirect_document_id": true
1794217947
},
1794317948
{
@@ -28435,6 +28440,11 @@
2843528440
"redirect_url": "/azure/storage/files/storage-how-to-use-files-linux",
2843628441
"redirect_document_id": true
2843728442
},
28443+
{
28444+
"source_path": "articles/storage/files/storage-how-to-recover-deleted-account.md",
28445+
"redirect_url": "/azure/storage/common/storage-account-create",
28446+
"redirect_document_id": false
28447+
},
2843828448
{
2843928449
"source_path": "articles/storage/storage-https-custom-domain-cdn.md",
2844028450
"redirect_url": "/azure/storage/blobs/storage-https-custom-domain-cdn",
@@ -49084,6 +49094,51 @@
4908449094
"source_path": "articles/azure-cache-for-redis/cache-howto-manage-redis-cache-powershell.md",
4908549095
"redirect_url": "/azure/azure-cache-for-redis/cache-how-to-manage-redis-cache-powershell",
4908649096
"redirect_document_id": false
49097+
},
49098+
{
49099+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-prerequisites.md",
49100+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49101+
"redirect_document_id": false
49102+
},
49103+
{
49104+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-create-offer.md",
49105+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49106+
"redirect_document_id": false
49107+
},
49108+
{
49109+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-offer-settings-tab.md",
49110+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49111+
"redirect_document_id": false
49112+
},
49113+
{
49114+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-technical-info-tab.md",
49115+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49116+
"redirect_document_id": false
49117+
},
49118+
{
49119+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-storefront-details-tab.md",
49120+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49121+
"redirect_document_id": false
49122+
},
49123+
{
49124+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-contacts-tab.md",
49125+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49126+
"redirect_document_id": false
49127+
},
49128+
{
49129+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-create-technical-assets.md",
49130+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49131+
"redirect_document_id": false
49132+
},
49133+
{
49134+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-publish-offer.md",
49135+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49136+
"redirect_document_id": false
49137+
},
49138+
{
49139+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-update-existing-offer.md",
49140+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49141+
"redirect_document_id": false
4908749142
},
4908849143
{
4908949144
"source_path": "articles/machine-learning/algorithm-module-reference/import-from-azure-blob-storage.md",

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 04/13/2020
9+
ms.date: 04/24/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -36,9 +36,9 @@ To complete this article, you need the following resources and privileges:
3636
* An Azure Active Directory tenant associated with your subscription.
3737
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3838
* You need *global administrator* privileges in your Azure AD tenant to enable SMS-based authentication.
39-
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
39+
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD, Office 365, or Microsoft 365 licenses:
4040
* [Azure AD Premium P1 or P2][azuread-licensing]
41-
* [Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing]
41+
* [Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing] or [Office 365 F1][o365-f1] or [F3][o365-f3]
4242
* [Enterprise Mobility + Security (EMS) E3 or E5][ems-licensing] or [Microsoft 365 (M365) E3 or E5][m365-licensing]
4343

4444
## Limitations
@@ -162,3 +162,5 @@ For additional ways to sign in to Azure AD without a password, such as the Micro
162162
[azuread-licensing]: https://azure.microsoft.com/pricing/details/active-directory/
163163
[ems-licensing]: https://www.microsoft.com/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing
164164
[m365-licensing]: https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans
165+
[o365-f1]: https://www.microsoft.com/microsoft-365/business/office-365-f1?market=af
166+
[o365-f3]: https://www.microsoft.com/microsoft-365/business/office-365-f3?activetab=pivot%3aoverviewtab

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -479,7 +479,7 @@ In this example, you create a policy that adds the EmployeeID and TenantCountry
479479
1. To create the policy, run the following command:
480480
481481
``` powershell
482-
New-AzureADPolicy -Definition @('{"ClaimsMappingPolicy":{"Version":1,"IncludeBasicClaimSet":"true", "ClaimsSchema": [{"Source":"user","ID":"employeeid","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name","JwtClaimType":"name"},{"Source":"company","ID":"tenantcountry","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/country","JwtClaimType":"country"}]}}') -DisplayName "ExtraClaimsExample" -Type "ClaimsMappingPolicy"
482+
New-AzureADPolicy -Definition @('{"ClaimsMappingPolicy":{"Version":1,"IncludeBasicClaimSet":"true", "ClaimsSchema": [{"Source":"user","ID":"employeeid","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/employeeid","JwtClaimType":"name"},{"Source":"company","ID":"tenantcountry","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/country","JwtClaimType":"country"}]}}') -DisplayName "ExtraClaimsExample" -Type "ClaimsMappingPolicy"
483483
```
484484
485485
2. To see your new policy, and to get the policy ObjectId, run the following command:

articles/active-directory/develop/reference-breaking-changes.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 3/13/2020
12+
ms.date: 5/4/2020
1313
ms.author: ryanwi
1414
ms.reviewer: hirsin
1515
ms.custom: aaddev
@@ -33,13 +33,31 @@ The authentication system alters and adds features on an ongoing basis to improv
3333

3434
None scheduled at this time. Please see below for the changes that are in or are coming to production.
3535

36+
## May 2020
37+
38+
### Azure Government endpoints are changing
39+
40+
**Effective date**: May 5th (Finishing June 2020)
41+
42+
**Endpoints impacted**: All
43+
44+
**Protocol impacted**: All flows
45+
46+
On 1 June 2018, the official Azure Active Directory (AAD) Authority for Azure Government changed from `https://login-us.microsoftonline.com` to `https://login.microsoftonline.us`. This change also applied to Microsoft 365 GCC High and DoD, which Azure Government AAD also services. If you own an application within a US Government tenant, you must update your application to sign users in on the `.us` endpoint.
47+
48+
Starting May 5th, Azure AD will begin enforcing the endpoint change, blocking government users from signing into apps hosted in US Government tenants using the public endpoint (`microsoftonline.com`). Impacted apps will begin seeing an error `AADSTS900439` - `USGClientNotSupportedOnPublicEndpoint`. This error indicates that the app is attempting to sign in a US Government user on the public cloud endpoint. If your app is in a public cloud tenant and intended to support US Government users, you will need to [update your app to support them explicitly](https://docs.microsoft.com/azure/active-directory/develop/authentication-national-cloud). This may require creating a new app registration in the US Government cloud.
49+
50+
Enforcement of this change will be done using a gradual rollout based on how frequently users from the US Government cloud sign in to the application - apps signing in US Government users infrequently will see enforcement first, and apps frequently used by US Government users will be last to have enforcement applied. We expect enforcement to be complete across all apps in June 2020.
51+
52+
For more details, please see the [Azure Government blog post on this migration](https://devblogs.microsoft.com/azuregov/azure-government-aad-authority-endpoint-update/).
53+
3654
## March 2020
3755

3856
### User passwords will be restricted to 256 characters.
3957

4058
**Effective date**: March 13, 2020
4159

42-
**Endpoints impacted**: Both v1.0 and v2.0
60+
**Endpoints impacted**: All
4361

4462
**Protocol impacted**: All user flows.
4563

articles/active-directory/develop/v2-oauth2-auth-code-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ At a high level, the entire authentication flow for a native/mobile application
3131

3232
## Request an authorization code
3333

34-
The authorization code flow begins with the client directing the user to the `/authorize` endpoint. In this request, the client requests the `openid`, `offline_access`, and `https://graph.microsoft.com/mail.read ` permissions from from the user. Some permissions are admin-restricted, for example writing data to an organization's directory by using `Directory.ReadWrite.All`. If your application requests access to one of these permissions from an organizational user, the user receives an error message that says they're not authorized to consent to your app's permissions. To request access to admin-restricted scopes, you should request them directly from a company administrator. For more information, read [Admin-restricted permissions](v2-permissions-and-consent.md#admin-restricted-permissions).
34+
The authorization code flow begins with the client directing the user to the `/authorize` endpoint. In this request, the client requests the `openid`, `offline_access`, and `https://graph.microsoft.com/mail.read ` permissions from the user. Some permissions are admin-restricted, for example writing data to an organization's directory by using `Directory.ReadWrite.All`. If your application requests access to one of these permissions from an organizational user, the user receives an error message that says they're not authorized to consent to your app's permissions. To request access to admin-restricted scopes, you should request them directly from a company administrator. For more information, read [Admin-restricted permissions](v2-permissions-and-consent.md#admin-restricted-permissions).
3535

3636
```
3737
// Line breaks for legibility only

0 commit comments

Comments
 (0)