Skip to content

Commit 3180010

Browse files
committed
Merge branch 'master' into dech-sdk-retirement
2 parents bcc74d0 + a06db6b commit 3180010

File tree

735 files changed

+12928
-11221
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

735 files changed

+12928
-11221
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,12 @@
9090
"url": "https://github.com/Azure/azure-docs-json-samples",
9191
"branch": "master"
9292
},
93+
{
94+
"path_to_root": "samples-key-vault-dotnet-quickstart",
95+
"url": "https://github.com/Azure-Samples/key-vault-dotnet-core-quickstart",
96+
"branch": "master",
97+
"branch_mapping": {}
98+
},
9399
{
94100
"path_to_root": "samples-mediaservices-integration",
95101
"url": "https://github.com/Azure-Samples/media-services-dotnet-functions-integration",

.openpublishing.redirection.json

Lines changed: 60 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -725,6 +725,21 @@
725725
"redirect_url": "/azure/machine-learning/service",
726726
"redirect_document_id": false
727727
},
728+
{
729+
"source_path": "articles/cognitive-services/QnAMaker/How-To/key-management.md",
730+
"redirect_url": "/azure/cognitive-services/QnAMaker/How-To/set-up-qnamaker-service-azure#types-of-keys-in-qna-maker",
731+
"redirect_document_id": false
732+
},
733+
{
734+
"source_path": "articles/cognitive-services/QnAMaker/How-To/troubleshooting-runtime.md",
735+
"redirect_url": "/azure/cognitive-services/QnAMaker/troubleshooting",
736+
"redirect_document_id": false
737+
},
738+
{
739+
"source_path": "articles/cognitive-services/QnAMaker/How-To/upgrade-qnamaker-service.md",
740+
"redirect_url": "/azure/cognitive-services/QnAMaker/How-To/set-up-qnamaker-service-azure#upgrade-qna-maker-sku",
741+
"redirect_document_id": false
742+
},
728743
{
729744
"source_path": "articles/cognitive-services/Labs/Conversation-Learner/tutorials/demo-vr-app-launcher.md",
730745
"redirect_url": "/azure/cognitive-services/Labs/Conversation-Learner/overview",
@@ -1115,6 +1130,11 @@
11151130
"redirect_url": "/azure/cognitive-services/bing-web-search/resize-and-crop-thumbnails",
11161131
"redirect_document_id": false
11171132
},
1133+
{
1134+
"source_path": "articles/cognitive-services/bing-video-search/resize-and-crop-thumbnails.md",
1135+
"redirect_url": "/azure/cognitive-services/bing-web-search/resize-and-crop-thumbnails",
1136+
"redirect_document_id": false
1137+
},
11181138
{
11191139
"source_path": "articles/cognitive-services/bing-image-search/bing-image-stats.md",
11201140
"redirect_url": "/azure/cognitive-services/bing-web-search/bing-web-stats",
@@ -4870,6 +4890,11 @@
48704890
"redirect_url": "/azure/logic-apps/logic-apps-enterprise-integration-as2",
48714891
"redirect_document_id": false
48724892
},
4893+
{
4894+
"source_path": "articles/logic-apps/logic-apps-using-sap-connector-old.md",
4895+
"redirect_url": "/azure/logic-apps/logic-apps-using-sap-connector",
4896+
"redirect_document_id": true
4897+
},
48734898
{
48744899
"source_path": "articles/logic-apps/custom-connector-build-web-api-app-tutorial.md",
48754900
"redirect_url": "https://docs.microsoft.com/connectors/custom-connectors/create-web-api-connector",
@@ -7200,6 +7225,11 @@
72007225
"redirect_url": "/azure/active-directory/saas-apps/airwatch-tutorial",
72017226
"redirect_document_id": true
72027227
},
7228+
{
7229+
"source_path": "articles/active-directory/paloaltoglobalprotect-tutorial.md",
7230+
"redirect_url": "/azure/active-directory/saas-apps/palo-alto-networks-globalprotect-tutorial",
7231+
"redirect_document_id": true
7232+
},
72037233
{
72047234
"source_path": "articles/active-directory/active-directory-saas-alcumus-info-tutorial.md",
72057235
"redirect_url": "/azure/active-directory/saas-apps/alcumus-info-tutorial",
@@ -8735,11 +8765,6 @@
87358765
"redirect_url": "/azure/active-directory/saas-apps/paloaltoadmin-tutorial",
87368766
"redirect_document_id": true
87378767
},
8738-
{
8739-
"source_path": "articles/active-directory/active-directory-saas-paloaltoglobalprotect-tutorial.md",
8740-
"redirect_url": "/azure/active-directory/saas-apps/paloaltoglobalprotect-tutorial",
8741-
"redirect_document_id": true
8742-
},
87438768
{
87448769
"source_path": "articles/active-directory/active-directory-saas-paloaltonetworks-aperture-tutorial.md",
87458770
"redirect_url": "/azure/active-directory/saas-apps/paloaltonetworks-aperture-tutorial",
@@ -8750,6 +8775,11 @@
87508775
"redirect_url": "/azure/active-directory/saas-apps/paloaltonetworks-captiveportal-tutorial",
87518776
"redirect_document_id": true
87528777
},
8778+
{
8779+
"source_path": "articles/active-directory/saas-apps/thefundingportal-tutorial.md",
8780+
"redirect_url": "/azure/active-directory/saas-apps/the-funding-portal-tutorial",
8781+
"redirect_document_id": true
8782+
},
87538783
{
87548784
"source_path": "articles/active-directory/active-directory-saas-panopto-tutorial.md",
87558785
"redirect_url": "/azure/active-directory/saas-apps/panopto-tutorial",
@@ -26034,6 +26064,16 @@
2603426064
"redirect_url": "/azure/security-center/security-center-alerts-overview",
2603526065
"redirect_document_id": false
2603626066
},
26067+
{
26068+
"source_path": "articles/security-center/security-center-enable-network-security-groups.md",
26069+
"redirect_url": "/azure/security-center/security-center-network-recommendations",
26070+
"redirect_document_id": false
26071+
},
26072+
{
26073+
"source_path": "articles/security-center/security-center-events-dashboard.md",
26074+
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#events-dashboard---the-new-experience",
26075+
"redirect_document_id": false
26076+
},
2603726077
{
2603826078
"source_path": "articles/virtual-network/virtual-network-deploy-multinic-arm-cli.md",
2603926079
"redirect_url": "/azure/virtual-machines/linux/multiple-nics",
@@ -31564,6 +31604,11 @@
3156431604
"redirect_url": "/azure/hdinsight/storm/apache-storm-overview",
3156531605
"redirect_document_id": false
3156631606
},
31607+
{
31608+
"source_path": "articles/storage/blobs/storage-unstructured-search.md",
31609+
"redirect_url": "/azure/search/search-howto-indexing-azure-blob-storage",
31610+
"redirect_document_id": false
31611+
},
3156731612
{
3156831613
"source_path": "articles/storage/data-lake-storage/index.md",
3156931614
"redirect_url": "/azure/storage/blobs/data-lake-storage-introduction",
@@ -38883,6 +38928,16 @@
3888338928
"redirect_url": "https://github.com/Microsoft/Cognitive-Vision-Python",
3888438929
"redirect_document_id": false
3888538930
},
38931+
{
38932+
"source_path": "articles/cognitive-services/Computer-vision/Tutorials/java-tutorial.md",
38933+
"redirect_url": "https://github.com/Azure-Samples/cognitive-services-java-computer-vision-tutorial",
38934+
"redirect_document_id": false
38935+
},
38936+
{
38937+
"source_path": "articles/cognitive-services/Computer-vision/Tutorials/javascript-tutorial.md",
38938+
"redirect_url": "https://github.com/Azure-Samples/cognitive-services-javascript-computer-vision-tutorial",
38939+
"redirect_document_id": false
38940+
},
3888638941
{
3888738942
"source_path": "articles/media-services/previous/media-services-hyperlapse-content.md",
3888838943
"redirect_url": "/azure/media-services/previous/media-services-analytics-overview",

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -309,7 +309,7 @@
309309
href: b2clogin.md
310310
- name: Migrate web API to b2clogin.com
311311
href: multiple-token-endpoints.md
312-
displayName: migrate, b2clogin, owin, jwt
312+
displayName: migrate, b2clogin, owin
313313
- name: Automation
314314
items:
315315
- name: Export usage report
@@ -318,6 +318,9 @@
318318
href: active-directory-b2c-devquickstarts-graph-dotnet.md
319319
- name: Audit logs
320320
href: active-directory-b2c-reference-audit-logs.md
321+
- name: Secure API Management API
322+
href: secure-api-management.md
323+
displayName: apim, api management, migrate, b2clogin.com
321324
- name: Compliance
322325
items:
323326
- name: User access

articles/active-directory-b2c/active-directory-b2c-faqs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 08/08/2019
11+
ms.date: 08/31/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -139,7 +139,7 @@ Follow these steps to delete your Azure AD B2C tenant:
139139
1. Select **View all applications**
140140
1. Select the application named **b2c-extensions-app**, select **Delete**, and then select **Yes** when prompted.
141141
1. Under **Manage**, select **User settings**.
142-
1. Under **LinkedIn account connections**, select **No**, then select **Save**.
142+
1. If present, under **LinkedIn account connections**, select **No**, then select **Save**.
143143
1. Under **Manage**, select **Properties**
144144
1. Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
145145
1. Sign out of the Azure portal and then sign back in to refresh your access.

articles/active-directory-b2c/active-directory-b2c-reference-kmsi-custom.md

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Keep Me Signed In in Azure Active Directory B2C | Microsoft Docs
2+
title: Keep Me Signed In in Azure Active Directory B2C
33
description: Learn how to set up Keep Me Signed In (KMSI) in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 12/03/2018
11+
ms.date: 08/29/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -17,15 +17,17 @@ ms.subservice: B2C
1717

1818
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1919

20-
You can enable Keep Me Signed In (KMSI) functionality for your web and native applications in Azure Active Directory (Azure AD) B2C. This feature grants access to returning users to the application without prompting them to reenter their username and password. This access is revoked when a user signs out.
20+
You can enable Keep Me Signed In (KMSI) functionality for users of your web and native applications that have local accounts in your Azure Active Directory B2C (Azure AD B2C) directory. This feature grants access to users returning to your application without prompting them to reenter their username and password. This access is revoked when a user signs out.
2121

2222
Users should not enable this option on public computers.
2323

2424
![Example sign-up sign-in page showing a Keep me signed in checkbox](./media/active-directory-b2c-reference-kmsi-custom/kmsi.PNG)
2525

2626
## Prerequisites
2727

28-
An Azure AD B2C tenant that is configured to allow local account sign-up and sign-in. If you don't have a tenant, you can create one using the steps in [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).
28+
An Azure AD B2C tenant that is configured to allow local account sign-in. KMSI is unsupported for external identity provider accounts.
29+
30+
If you don't have a tenant, you can create one using the steps in [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).
2931

3032
## Add a content definition element
3133

@@ -83,7 +85,7 @@ Add the application identifiers to the *TrustFrameworkExtensions.xml* file.
8385

8486
1. In the *TrustFrameworkExtensions.xml* file, find the **TechnicalProfile** element with the identifier of `login-NonInteractive` and the **TechnicalProfile** element with an identifier of `login-NonInteractive-PasswordChange` and replace all values of `IdentityExperienceFrameworkAppId` with the application identifier of the Identity Experience Framework application as described in [Getting started](active-directory-b2c-get-started-custom.md).
8587

86-
```
88+
```XML
8789
<Item Key="client_id">8322dedc-cbf4-43bc-8bb6-141d16f0f489</Item>
8890
```
8991

@@ -179,11 +181,3 @@ Update the relying party (RP) file that initiates the user journey that you crea
179181
5. To test the custom policy that you uploaded, in the Azure portal, go to the policy page, and then select **Run now**.
180182

181183
You can find the sample policy [here](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/keep%20me%20signed%20in).
182-
183-
184-
185-
186-
187-
188-
189-

articles/active-directory-b2c/active-directory-b2c-ui-customization-custom.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -60,17 +60,16 @@ To host this HTML content in Blob storage, do the following:
6060

6161
1. Sign in to the [Azure portal](https://portal.azure.com).
6262
2. On the **Hub** menu, select **New** > **Storage** > **Storage account**.
63-
3. Enter a unique **Name** for your storage account.
64-
4. **Deployment model** can remain **Resource Manager**.
65-
5. Change **Account Kind** to **Blob storage**.
66-
6. **Performance** can remain **Standard**.
67-
7. **Replication** can remain **RA-GRS**.
68-
8. **Access tier** can remain **Hot**.
69-
9. **Storage service encryption** can remain **Disabled**.
70-
10. Select a **Subscription** for your storage account.
71-
11. Create a **Resource group** or select an existing one.
72-
12. Select the **Geographic location** for your storage account.
73-
13. Click **Create** to create the storage account.
63+
3. Select a **Subscription** for your storage account.
64+
4. Create a **Resource group** or select an existing one.
65+
5. Enter a unique **Name** for your storage account.
66+
6. Select the **Geographic location** for your storage account.
67+
7. **Deployment model** can remain **Resource Manager**.
68+
8. **Performance** can remain **Standard**.
69+
9. Change **Account Kind** to **Blob storage**.
70+
10. **Replication** can remain **RA-GRS**.
71+
11. **Access tier** can remain **Hot**.
72+
12. Click **Review + create** to create the storage account.
7473
After the deployment is completed, the **Storage account** blade opens automatically.
7574

7675
## Create a container

articles/active-directory-b2c/active-directory-b2c-user-migration.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/31/2019
11+
ms.date: 08/31/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -135,7 +135,9 @@ Change the `$AppId` value with your Azure AD **Application ID**.
135135

136136
## Step 2: Pre-migration application sample
137137

138-
[Download and run the sample code][UserMigrationSample]. You can download it as a .zip file.
138+
You can find the pre-migration code sample in the community-maintained `azure-ad-b2c/user-migration` GitHub repository:
139+
140+
[azure-ad-b2c/user-migration/pre-migration][UserMigrationSample-code] (GitHub)
139141

140142
### Step 2.1: Edit the migration data file
141143

@@ -360,7 +362,7 @@ You can view and monitor logging information in near-real time.
360362

361363
## (Optional) Download the complete policy files
362364

363-
After you complete the [Get started with custom policies][B2C-GetStartedCustom] walk-through, we recommend that you build your scenario by using your own custom policy files. For your reference, we have provided [sample policy files][UserMigrationSample].
365+
After you complete the [Get started with custom policies][B2C-GetStartedCustom] walk-through, we recommend that you build your scenario by using your own custom policy files. For your reference, we have provided [sample policy files][UserMigrationSample-policy].
364366

365367
[AD-PasswordPolicies]: https://docs.microsoft.com/azure/active-directory/active-directory-passwords-policy
366368
[AD-Powershell]: https://docs.microsoft.com/powershell/azure/active-directory/install-adv2
@@ -371,4 +373,5 @@ After you complete the [Get started with custom policies][B2C-GetStartedCustom]
371373
[B2C-GraphQuickStart]: https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet
372374
[B2C-NavContext]: https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-navigate-to-b2c-context
373375
[Portal]: https://portal.azure.com/
374-
[UserMigrationSample]: https://github.com/azure-ad-b2c/user-migration
376+
[UserMigrationSample-code]: https://github.com/azure-ad-b2c/user-migration/tree/master/pre-migration/source-code
377+
[UserMigrationSample-policy]: https://github.com/azure-ad-b2c/user-migration/tree/master/pre-migration/policy
-1.43 KB
Loading
-1.43 KB
Loading
-3.05 KB
Loading

0 commit comments

Comments
 (0)