Skip to content

Commit 3ad436c

Browse files
authored
Merge pull request #36 from MicrosoftDocs/master
merge
2 parents 6b06c76 + 5324e40 commit 3ad436c

File tree

616 files changed

+8118
-4502
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

616 files changed

+8118
-4502
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -277,6 +277,11 @@
277277
"url": "https://github.com/Azure/pcs-remote-monitoring-webui.git",
278278
"branch": "master"
279279
},
280+
{
281+
"path_to_root": "MachineLearningNotebooks",
282+
"url": "https://github.com/Azure/MachineLearningNotebooks",
283+
"branch": "master"
284+
},
280285
{
281286
"path_to_root": "aml-sdk-samples",
282287
"url": "https://github.com/Azure/MachineLearningNotebooks",

.openpublishing.redirection.json

Lines changed: 39 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1157,72 +1157,72 @@
11571157
},
11581158
{
11591159
"source_path": "articles/cognitive-services/Custom-Speech-Service/cognitive-services-custom-speech-home.md",
1160-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1160+
"redirect_url": "/azure/cognitive-services/speech-service",
11611161
"redirect_document_id": false
11621162
},
11631163
{
11641164
"source_path": "articles/cognitive-services/Custom-Speech-Service/cognitive-services-custom-speech-faq.md",
1165-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1165+
"redirect_url": "/azure/cognitive-services/speech-service",
11661166
"redirect_document_id": false
11671167
},
11681168
{
11691169
"source_path": "articles/cognitive-services/Custom-Speech-Service/cognitive-services-custom-speech-get-started.md",
1170-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1170+
"redirect_url": "/azure/cognitive-services/speech-service",
11711171
"redirect_document_id": false
11721172
},
11731173
{
11741174
"source_path": "articles/cognitive-services/Custom-Speech-Service/cognitive-services-custom-speech-glossary.md",
1175-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1175+
"redirect_url": "/azure/cognitive-services/speech-service",
11761176
"redirect_document_id": false
11771177
},
11781178
{
11791179
"source_path": "articles/cognitive-services/Custom-Speech-Service/cognitive-services-custom-speech-meters.md",
1180-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1180+
"redirect_url": "/azure/cognitive-services/speech-service",
11811181
"redirect_document_id": false
11821182
},
11831183
{
11841184
"source_path": "articles/cognitive-services/Custom-Speech-Service/CustomSpeech-How-to-Topics/cognitive-services-custom-speech-change-locale.md",
1185-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1185+
"redirect_url": "/azure/cognitive-services/speech-service",
11861186
"redirect_document_id": false
11871187
},
11881188
{
11891189
"source_path": "articles/cognitive-services/Custom-Speech-Service/CustomSpeech-How-to-Topics/cognitive-services-custom-speech-create-acoustic-model.md",
1190-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1190+
"redirect_url": "/azure/cognitive-services/speech-service",
11911191
"redirect_document_id": false
11921192
},
11931193
{
11941194
"source_path": "articles/cognitive-services/Custom-Speech-Service/CustomSpeech-How-to-Topics/cognitive-services-custom-speech-create-custom-pronunciation.md",
1195-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1195+
"redirect_url": "/azure/cognitive-services/speech-service",
11961196
"redirect_document_id": false
11971197
},
11981198
{
11991199
"source_path": "articles/cognitive-services/Custom-Speech-Service/CustomSpeech-How-to-Topics/cognitive-services-custom-speech-create-endpoint.md",
1200-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1200+
"redirect_url": "/azure/cognitive-services/speech-service",
12011201
"redirect_document_id": false
12021202
},
12031203
{
12041204
"source_path": "articles/cognitive-services/Custom-Speech-Service/CustomSpeech-How-to-Topics/cognitive-services-custom-speech-create-language-model.md",
1205-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1205+
"redirect_url": "/azure/cognitive-services/speech-service",
12061206
"redirect_document_id": false
12071207
},
12081208
{
12091209
"source_path": "articles/cognitive-services/Custom-Speech-Service/CustomSpeech-How-to-Topics/cognitive-services-custom-speech-migrate-tiers.md",
1210-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1210+
"redirect_url": "/azure/cognitive-services/speech-service",
12111211
"redirect_document_id": false
12121212
},
12131213
{
12141214
"source_path": "articles/cognitive-services/Custom-Speech-Service/CustomSpeech-How-to-Topics/cognitive-services-custom-speech-subscribe.md",
1215-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1215+
"redirect_url": "/azure/cognitive-services/speech-service",
12161216
"redirect_document_id": false
12171217
},
12181218
{
12191219
"source_path": "articles/cognitive-services/Custom-Speech-Service/CustomSpeech-How-to-Topics/cognitive-services-custom-speech-transcription-guidelines.md",
1220-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1220+
"redirect_url": "/azure/cognitive-services/speech-service",
12211221
"redirect_document_id": false
12221222
},
12231223
{
12241224
"source_path": "articles/cognitive-services/Custom-Speech-Service/CustomSpeech-How-to-Topics/cognitive-services-custom-speech-use-endpoint.md",
1225-
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service",
1225+
"redirect_url": "/azure/cognitive-services/speech-service",
12261226
"redirect_document_id": false
12271227
},
12281228
{
@@ -3585,6 +3585,11 @@
35853585
"redirect_url": "/azure/sql-database/troubleshoot-connectivity-issues-microsoft-azure-sql-database",
35863586
"redirect_document_id": false
35873587
},
3588+
{
3589+
"source_path": "articles/sql-database/sql-database-operate-query-store.md",
3590+
"redirect_url": "https://docs.microsoft.com/sql/relational-databases/performance/best-practice-with-the-query-store#Insight",
3591+
"redirect_document_id": false
3592+
},
35883593
{
35893594
"source_path": "articles/sql-database/sql-database-customer-implementations.md",
35903595
"redirect_url": "http://customers.microsoft.com",
@@ -3680,6 +3685,11 @@
36803685
"redirect_url": "/azure/sql-database/sql-database-performance-guidance",
36813686
"redirect_document_id": false
36823687
},
3688+
{
3689+
"source_path": "articles/sql-database/sql-database-performance.md",
3690+
"redirect_url": "/azure/sql-database/sql-database-monitor-overview",
3691+
"redirect_document_id": false
3692+
},
36833693
{
36843694
"source_path": "articles/sql-database/sql-database-managed-instance-vnet-configuration.md",
36853695
"redirect_url": "/azure/sql-database/sql-database-managed-instance-configure-vnet-subnet",
@@ -31694,6 +31704,11 @@
3169431704
"redirect_url": "/azure/key-vault/security-baseline",
3169531705
"redirect_document_id": false
3169631706
},
31707+
{
31708+
"source_path": "articles/key-vault/automation-manage-key-vault.md",
31709+
"redirect_url": "/azure/key-vault/",
31710+
"redirect_document_id": false
31711+
},
3169731712
{
3169831713
"source_path": "articles/load-balancer/load-balancer-security-attributes.md",
3169931714
"redirect_url": "/azure/load-balancer/load-balancer-security-controls",
@@ -32814,6 +32829,11 @@
3281432829
"redirect_url": "/azure/role-based-access-control/built-in-roles",
3281532830
"redirect_document_id": true
3281632831
},
32832+
{
32833+
"source_path": "articles/sql-database/sql-database-control-access.md",
32834+
"redirect_url": "/azure/sql-database/sql-database-manage-logins",
32835+
"redirect_document_id": true
32836+
},
3281732837
{
3281832838
"source_path": "articles/active-directory/role-based-access-control-access-change-history-report.md",
3281932839
"redirect_url": "/azure/role-based-access-control/change-history-report",
@@ -49303,6 +49323,11 @@
4930349323
"source_path": "articles/power-bi-embedded/index.md",
4930449324
"redirect_url": "https://docs.microsoft.com/power-bi/developer/azure-pbie-what-is-power-bi-embedded",
4930549325
"redirect_document_id": false
49326+
},
49327+
{
49328+
"source_path": "articles/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service.md",
49329+
"redirect_url": "/azure/cognitive-services/speech-service",
49330+
"redirect_document_id": false
4930649331
}
4930749332
]
4930849333
}

articles/active-directory-b2c/custom-policy-disable-email-verification.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,11 @@ Complete the steps in [Get started with custom policies](custom-policy-get-start
2424

2525
## Add the metadata to the self-asserted technical profile
2626

27-
The **LocalAccountSignUpWithLogonEmail** technical profile is a [self-asserted](self-asserted-technical-profile.md), which is invoked during the sign-up flow. To disable the email verification, set the `EnforceEmailVerification` metadata to false. Override the LocalAccountSignUpWithLogonEmail technical profiles in the extension file. Find the `ClaimsProviders` element. Add the following claims provider to the `ClaimsProviders` element:
27+
The **LocalAccountSignUpWithLogonEmail** technical profile is a [self-asserted](self-asserted-technical-profile.md), which is invoked during the sign-up flow. To disable the email verification, set the `EnforceEmailVerification` metadata to false. Override the LocalAccountSignUpWithLogonEmail technical profiles in the extension file.
2828

29+
1. Open the extensions file of your policy. For example, <em>`SocialAndLocalAccounts/`**`TrustFrameworkExtensions.xml`**</em>.
30+
1. Find the `ClaimsProviders` element. If the element doesn't exist, add it.
31+
1. Add the following claims provider to the `ClaimsProviders` element:
2932

3033
```XML
3134
<ClaimsProvider>

articles/active-directory-b2c/custom-policy-password-complexity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,4 +149,4 @@ To configure the password complexity, override the `newPassword` and `reenterPas
149149
## Next steps
150150

151151
- Learn how to [Configure password change using custom policies in Azure Active Directory B2C](custom-policy-password-change.md).
152-
- - Learn more about the [Predicates](predicates.md) and [PredicateValidations](predicates.md#predicatevalidations) elements in the IEF reference.
152+
- Learn more about the [Predicates](predicates.md) and [PredicateValidations](predicates.md#predicatevalidations) elements in the IEF reference.

articles/active-directory-domain-services/troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ If you have problems enabling Azure AD DS, review the following common errors an
2626

2727
| **Sample error Message** | **Resolution** |
2828
| --- |:--- |
29-
| *The name addscontoso.com is already in use on this network. Specify a name that is not in use.* |[Domain name conflict in the virtual network](troubleshoot.md#domain-name-conflict) |
29+
| *The name aaddscontoso.com is already in use on this network. Specify a name that is not in use.* |[Domain name conflict in the virtual network](troubleshoot.md#domain-name-conflict) |
3030
| *Domain Services could not be enabled in this Azure AD tenant. The service does not have adequate permissions to the application called 'Azure AD Domain Services Sync'. Delete the application called 'Azure AD Domain Services Sync' and then try to enable Domain Services for your Azure AD tenant.* |[Domain Services doesn't have adequate permissions to the Azure AD Domain Services Sync application](troubleshoot.md#inadequate-permissions) |
3131
| *Domain Services could not be enabled in this Azure AD tenant. The Domain Services application in your Azure AD tenant does not have the required permissions to enable Domain Services. Delete the application with the application identifier d87dcbc6-a371-462e-88e3-28ad15ec4e64 and then try to enable Domain Services for your Azure AD tenant.* |[The Domain Services application isn't configured properly in your Azure AD tenant](troubleshoot.md#invalid-configuration) |
3232
| *Domain Services could not be enabled in this Azure AD tenant. The Microsoft Azure AD application is disabled in your Azure AD tenant. Enable the application with the application identifier 00000002-0000-0000-c000-000000000000 and then try to enable Domain Services for your Azure AD tenant.* |[The Microsoft Graph application is disabled in your Azure AD tenant](troubleshoot.md#microsoft-graph-disabled) |

articles/active-directory-domain-services/tutorial-configure-ldaps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ The certificate you request or create must meet the following requirements. Your
6666
* **Key usage** - The certificate must be configured for *digital signatures* and *key encipherment*.
6767
* **Certificate purpose** - The certificate must be valid for SSL server authentication.
6868

69-
In this tutorial, let's create a self-signed certificate for secure LDAP using the [New-SelfSignedCertificate][New-SelfSignedCertificate] cmdlet. Open a PowerShell window as **Administrator** and run the following commands. Replace the *$dnsName* variable with the DNS name used by your own managed domain, such as *aaddscontoso.com*:
69+
There are several tools available to create self-signed certificate such as OpenSSL, Keytool, MakeCert, [New-SelfSignedCertificate][New-SelfSignedCertificate] cmdlet etc. In this tutorial, let's create a self-signed certificate for secure LDAP using the [New-SelfSignedCertificate][New-SelfSignedCertificate] cmdlet. Open a PowerShell window as **Administrator** and run the following commands. Replace the *$dnsName* variable with the DNS name used by your own managed domain, such as *aaddscontoso.com*:
7070

7171
```powershell
7272
# Define your own DNS name used by your Azure AD DS managed domain
@@ -140,7 +140,7 @@ Before you can use the digital certificate created in the previous step with you
140140
1. As this certificate is used to decrypt data, you should carefully control access. A password can be used to protect the use of the certificate. Without the correct password, the certificate can't be applied to a service.
141141

142142
On the **Security** page, choose the option for **Password** to protect the *.PFX* certificate file. Enter and confirm a password, then select **Next**. This password is used in the next section to enable secure LDAP for your Azure AD DS managed domain.
143-
1. On the **File to Export** page, specify the file name and location where you'd like to export the certificate, such as *C:\Users\accountname\azure-ad-ds.pfx*.
143+
1. On the **File to Export** page, specify the file name and location where you'd like to export the certificate, such as *C:\Users\accountname\azure-ad-ds.pfx*. Keep a note of the password and location of the *.PFX* file as this information would be required in next steps.
144144
1. On the review page, select **Finish** to export the certificate to a *.PFX* certificate file. A confirmation dialog is displayed when the certificate has been successfully exported.
145145
1. Leave the MMC open for use in the following section.
146146

articles/active-directory/app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,8 @@ Scoping filters are configured as part of the attribute mappings for each Azure
9898

9999

100100
>[!IMPORTANT]
101-
> The IsMemberOf filter is not supported currently.
101+
> - The IsMemberOf filter is not supported currently.
102+
> - EQUALS and NOT EQUALS are not supported for multi-valued attributes
102103
103104
9. Optionally, repeat steps 7-8 to add more scoping clauses.
104105

articles/active-directory/b2b/b2b-quickstart-invite-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ When prompted, enter your credentials.
7878
1. To send an invitation to your test email account, run the following PowerShell command (replace **"Sanda"** and **sanda\@fabrikam.com** with your test email account name and email address):
7979

8080
```powershell
81-
New-AzureADMSInvitation -InvitedUserDisplayName "Sanda" -InvitedUserEmailAddress [email protected] -InviteRedirectURL https://myapps.azure.com -SendInvitationMessage $true
81+
New-AzureADMSInvitation -InvitedUserDisplayName "Sanda" -InvitedUserEmailAddress [email protected] -InviteRedirectURL https://myapps.microsoft.com -SendInvitationMessage $true
8282
```
8383
2. The command sends an invitation to the email address specified. Check the output, which should look similar to the following:
8484

articles/active-directory/develop/authentication-scenarios.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,9 +47,9 @@ Azure AD also provides Azure Active Directory B2C so that organizations can sign
4747

4848
Security tokens contain information about users and apps. Azure AD uses JSON based tokens (JWTs) that contain claims.
4949

50-
A claim provides assertions about one entity, such as a [client application](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#client-application) or [resource owner](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#resource-owner)), to another entity, such as a [resource server](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#resource-server)).
50+
A claim provides assertions about one entity, such as a [client application](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#client-application) or [resource owner](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#resource-owner), to another entity, such as a [resource server](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#resource-server).
5151

52-
Claims are name/value pairs that relay facts about the token subject. For example, a claim may contain facts about the security principal that was authenticated by the [authorization server](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#authorization-server)). The claims present in a given token depend on many things, including the type of token, the type of credential used to authenticate the subject, the application configuration, and so on.
52+
Claims are name/value pairs that relay facts about the token subject. For example, a claim may contain facts about the security principal that was authenticated by the [authorization server](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#authorization-server). The claims present in a given token depend on many things, including the type of token, the type of credential used to authenticate the subject, the application configuration, and so on.
5353

5454
Applications can use claims for various tasks such as:
5555

0 commit comments

Comments
 (0)