Skip to content

Commit 3f3447f

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into vnettocfeb6
2 parents 07cc04b + d23d5f7 commit 3f3447f

File tree

292 files changed

+3654
-1634
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

292 files changed

+3654
-1634
lines changed

.openpublishing.redirection.json

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -970,6 +970,11 @@
970970
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-azure-subscription",
971971
"redirect_document_id": false
972972
},
973+
{
974+
"source_path": "articles/cognitive-services/QnAMaker/Tutorials/create-publish-answer.md",
975+
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-new-kb-csharp",
976+
"redirect_document_id": false
977+
},
973978
{
974979
"source_path": "articles/cognitive-services/QnAMaker/Concepts/data-sources-supported.md",
975980
"redirect_url": "/azure/cognitive-services/QnAMaker/concepts/knowledge-base",
@@ -45085,10 +45090,10 @@
4508545090
"redirect_url": "/azure/iot-central/core/howto-use-action-groups/",
4508645091
"redirect_document_id": true
4508745092
},
45088-
{
45089-
"source_path": "articles/storage/blobs/data-lake-storage-use-power-bi.md",
45090-
"redirect_url": "https://docs.microsoft.com/power-query/connectors/datalakestorage",
45091-
"redirect_document_id": false
45093+
{
45094+
"source_path": "articles/storage/blobs/data-lake-storage-use-power-bi.md",
45095+
"redirect_url": "https://docs.microsoft.com/power-query/connectors/datalakestorage",
45096+
"redirect_document_id": false
4509245097
},
4509345098
{
4509445099
"source_path": "articles/iot-central/preview/howto-use-app-templates.md",

articles/active-directory-b2c/azure-monitor.md

Lines changed: 36 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.topic: conceptual
1212
ms.author: marsma
1313
ms.subservice: B2C
14-
ms.date: 02/05/2020
14+
ms.date: 02/10/2020
1515
---
1616

1717
# Monitor Azure AD B2C with Azure Monitor
@@ -20,9 +20,9 @@ Use Azure Monitor to route Azure Active Directory B2C (Azure AD B2C) sign-in and
2020

2121
You can route log events to:
2222

23-
* An Azure storage account.
24-
* An Azure event hub (and integrate with your Splunk and Sumo Logic instances).
25-
* An Azure Log Analytics workspace (to analyze data, create dashboards, and alert on specific events).
23+
* An Azure [storage account](../storage/blobs/storage-blobs-introduction.md).
24+
* An Azure [event hub](../event-hubs/event-hubs-about.md) (and integrate with your Splunk and Sumo Logic instances).
25+
* An [Log Analytics workspace](../azure-monitor/platform/resource-logs-collect-workspace.md) (to analyze data, create dashboards, and alert on specific events).
2626

2727
![Azure Monitor](./media/azure-monitor/azure-monitor-flow.png)
2828

@@ -38,15 +38,15 @@ You can also use the [Azure Cloud Shell](https://shell.azure.com), which include
3838

3939
Azure AD B2C leverages [Azure Active Directory monitoring](../active-directory/reports-monitoring/overview-monitoring.md). To enable *Diagnostic settings* in Azure Active Directory within your Azure AD B2C tenant, you use [delegated resource management](../lighthouse/concepts/azure-delegated-resource-management.md).
4040

41-
You authorize a user in your Azure AD B2C directory (the **Service Provider**) to configure the Azure Monitor instance within the tenant that contains your Azure subscription (the **Customer**). To create the authorization, you deploy an [Azure Resource Manager](../azure-resource-manager/index.yml) template to your Azure AD tenant containing the subscription. The following sections walk you through the process.
41+
You authorize a user or group in your Azure AD B2C directory (the **Service Provider**) to configure the Azure Monitor instance within the tenant that contains your Azure subscription (the **Customer**). To create the authorization, you deploy an [Azure Resource Manager](../azure-resource-manager/index.yml) template to your Azure AD tenant containing the subscription. The following sections walk you through the process.
4242

43-
## Create a resource group
43+
## Create or choose resource group
4444

45-
In the Azure Active Directory (Azure AD) tenant that contains your Azure subscription (*not* the directory that contains your Azure AD B2C tenant), [create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md#create-resource-groups). Use the following values:
45+
This is the resource group containing the destination Azure storage account, event hub, or Log Analytics workspace to receive data from Azure Monitor. You specify the resource group name when you deploy the Azure Resource Manager template.
4646

47-
* **Subscription**: Select your Azure subscription.
48-
* **Resource group**: Enter name for the resource group. For example, *azure-ad-b2c-monitor*.
49-
* **Region**: Select an Azure location. For example, *Central US*.
47+
[Create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md#create-resource-groups) or choose an existing one the Azure Active Directory (Azure AD) tenant that contains your Azure subscription, *not* the directory that contains your Azure AD B2C tenant.
48+
49+
This example uses a resource group named *azure-ad-b2c-monitor* in the *Central US* region.
5050

5151
## Delegate resource management
5252

@@ -205,20 +205,42 @@ Once you've deployed the template and have waited a few minutes for the resource
205205

206206
## Configure diagnostic settings
207207

208-
After you've delegated resource management and have selected your subscription, you're ready to [Create diagnostic settings](../active-directory/reports-monitoring/overview-monitoring.md) in the Azure portal.
208+
Diagnostic settings define where logs and metrics for a resource should be sent. Possible destinations are:
209+
210+
- [Azure storage account](../azure-monitor/platform/resource-logs-collect-storage.md)
211+
- [Event hubs](../azure-monitor/platform/resource-logs-stream-event-hubs.md) solutions.
212+
- [Log Analytics workspace](../azure-monitor/platform/resource-logs-collect-workspace.md)
213+
214+
If you haven't already, create an instance of your chosen destination type in the resource group you specified in the [Azure Resource Manager template](#create-an-azure-resource-manager-template).
215+
216+
### Create diagnostic settings
217+
218+
You're ready to [Create diagnostic settings](../active-directory/reports-monitoring/overview-monitoring.md) in the Azure portal.
209219

210220
To configure monitoring settings for Azure AD B2C activity logs:
211221

212222
1. Sign in to the [Azure portal](https://portal.azure.com/).
213223
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
214224
1. Select **Azure Active Directory**
215225
1. Under **Monitoring**, select **Diagnostic settings**.
216-
1. Select **+ Add diagnostic setting**.
226+
1. If there are existing settings on the resource, you will see a list of settings already configured. Either select **Add diagnostic setting** to add a new setting, or **Edit** setting to edit an existing one. Each setting can have no more than one of each of the destination types..
217227

218228
![Diagnostics settings pane in Azure portal](./media/azure-monitor/azure-monitor-portal-05-diagnostic-settings-pane-enabled.png)
219229

230+
1. Give your setting a name if it doesn't already have one.
231+
1. Check the box for each destination to send the logs. Select **Configure** to specify their settings as described in the following table.
232+
233+
| Setting | Description |
234+
|:---|:---|
235+
| Archive to a storage account | Name of storage account. |
236+
| Stream to an event hub | The namespace where the event hub is created (if this is your first time streaming logs) or streamed to (if there are already resources that are streaming that log category to this namespace).
237+
| Send to Log Analytics | Name of workspace. |
238+
239+
1. Select **AuditLogs** and **SignInLogs**.
240+
1. Select **Save**.
241+
220242
## Next steps
221243

222-
For more information about adding and configuring diagnostic settings in Azure Monitor, see this tutorial in the Azure Monitor documentation:
244+
For more information about adding and configuring diagnostic settings in Azure Monitor, see [Tutorial: Collect and analyze resource logs from an Azure resource](../azure-monitor/insights/monitor-azure-resource.md).
223245

224-
[Tutorial: Collect and analyze resource logs from an Azure resource](/azure-monitor/learn/tutorial-resource-logs.md)
246+
For information about streaming Azure AD logs to an event hub, see [Tutorial: Stream Azure Active Directory logs to an Azure event hub](../active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md).

articles/active-directory-b2c/custom-policy-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ You need to register these two applications in your Azure AD B2C tenant only onc
6969

7070
### Register the IdentityExperienceFramework application
7171

72-
To register an application in your Azure AD B2C tenant, you can use the current **Applications** experience, or our new unified **App registrations (Preview)** experience. [Learn more about the new experience](https://aka.ms/b2cappregintro).
72+
To register an application in your Azure AD B2C tenant, you can use the **App registrations (Legacy)** experience, or our new unified **App registrations (Preview)** experience. [Learn more about the new experience](https://aka.ms/b2cappregintro).
7373

7474
#### [Applications](#tab/applications/)
7575

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant-custom.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/06/2020
12+
ms.date: 02/10/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -46,6 +46,19 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
4646
1. Select **Certificates & secrets**, and then select **New client secret**.
4747
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
4848
49+
## Configuring optional claims
50+
51+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
52+
53+
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
54+
1. From the **Manage** section, select **App registrations**.
55+
1. Select the application you want to configure optional claims for in the list.
56+
1. From the **Manage** section, select **Token configuration (preview)**.
57+
1. Select **Add optional claim**.
58+
1. Select the token type you want to configure.
59+
1. Select the optional claims to add.
60+
1. Click **Add**.
61+
4962
## Create a policy key
5063
5164
You need to store the application key that you created in your Azure AD B2C tenant.
@@ -60,19 +73,6 @@ You need to store the application key that you created in your Azure AD B2C tena
6073
1. For **Key usage**, select `Signature`.
6174
1. Select **Create**.
6275
63-
## Configuring optional claims
64-
65-
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
66-
67-
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
68-
1. From the **Manage** section, select **App registrations**.
69-
1. Select the application you want to configure optional claims for in the list.
70-
1. From the **Manage** section, select **Token configuration (preview)**.
71-
1. Select **Add optional claim**.
72-
1. Select the token type you want to configure.
73-
1. Select the optional claims to add.
74-
1. Click **Add**.
75-
7676
## Add a claims provider
7777
7878
If you want users to sign in by using Azure AD, you need to define Azure AD as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated.

articles/active-directory-b2c/one-time-password-technical-profile.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/03/2020
12+
ms.date: 02/10/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -164,3 +164,10 @@ The following example `TechnicalProfile` is used for verifying a code:
164164
</InputClaims>
165165
</TechnicalProfile>
166166
```
167+
168+
## Next steps
169+
170+
See the following article for example of using one-time password technial profile with custom email verification:
171+
172+
- [Custom email verification in Azure Active Directory B2C](custom-email.md)
173+

articles/active-directory/develop/authorization-agents.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Authorization agents and how to enable them | Azure
33
description: Learn about the different authorization agents the Microsoft Authentication Library (MSAL) allows your Android app to use and how to enable them.
44
services: active-directory
5-
author: tylermsft
5+
author: mmacy
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
1212
ms.date: 09/05/2019
13-
ms.author: twhitney
13+
ms.author: marsma
1414
ms.reviewer: shoatman, brianmel, hahamil
1515
ms.custom: aaddev
1616
#Customer intent: As an application developer, I want to learn about which options I can use to sign-in users and how to enable them.

articles/active-directory/develop/config-authority.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: Configure identity providers (MSAL iOS/macOS) | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn how to use different authorities such as B2C, sovereign clouds, and guest users, with MSAL for iOS and macOS.
55
services: active-directory
6-
author: tylermsft
6+
author: mmacy
77
manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.workload: identity
1212
ms.topic: conceptual
1313
ms.date: 08/28/2019
14-
ms.author: twhitney
14+
ms.author: marsma
1515
ms.reviewer: oldalton
1616
ms.custom: aaddev
1717
---

articles/active-directory/develop/customize-webviews.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: Customize browsers & WebViews (MSAL iOS/macOS) | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn how to customize the MSAL iOS/macOS browser experience to sign in users.
55
services: active-directory
6-
author: tylermsft
6+
author: mmacy
77
manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.date: 08/28/2019
14-
ms.author: twhitney
14+
ms.author: marsma
1515
ms.reviewer: oldalton
1616
ms.custom: aaddev
1717
---

articles/active-directory/develop/howto-v2-keychain-objc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: Configure keychain
33
titleSuffix: Microsoft identity platform
44
description: Learn how to configure keychain so that your app can cache tokens in the keychain.
55
services: active-directory
6-
author: TylerMSFT
6+
author: mmacy
77
manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.workload: identity
1212
ms.topic: conceptual
1313
ms.date: 08/28/2019
14-
ms.author: twhitney
14+
ms.author: marsma
1515
ms.reviewer: oldalton
1616
ms.custom: aaddev
1717
---

articles/active-directory/develop/identity-videos.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Microsoft identity platform videos | Azure
33
description: A list of videos about the Microsoft identity platform
44
services: active-directory
5-
author: tylermsft
5+
author: mmacy
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.date: 01/29/2020
12-
ms.author: twhitney
12+
ms.author: marsma
1313
ms.custom: aaddev
1414
ms.reviewer: celested
1515
---

0 commit comments

Comments
 (0)