Skip to content

Commit 46d754b

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-elm-fixes
2 parents 7e45f78 + a70ef4a commit 46d754b

File tree

904 files changed

+17998
-7187
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

904 files changed

+17998
-7187
lines changed

.openpublishing.redirection.json

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -740,6 +740,31 @@
740740
"redirect_url": "/azure/machine-learning/service",
741741
"redirect_document_id": false
742742
},
743+
{
744+
"source_path": "articles/cognitive-services/LUIS/luis-get-started-java-get-intent.md",
745+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-get-intent-from-rest",
746+
"redirect_document_id": false
747+
},
748+
{
749+
"source_path": "articles/cognitive-services/LUIS/luis-get-started-cs-get-intent.md",
750+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-get-intent-from-rest",
751+
"redirect_document_id": false
752+
},
753+
{
754+
"source_path": "articles/cognitive-services/LUIS/luis-get-started-go-get-intent.md",
755+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-get-intent-from-rest",
756+
"redirect_document_id": false
757+
},
758+
{
759+
"source_path": "articles/cognitive-services/LUIS/luis-get-started-python-get-intent.md",
760+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-get-intent-from-rest",
761+
"redirect_document_id": false
762+
},
763+
{
764+
"source_path": "articles/cognitive-services/LUIS/luis-get-started-node-get-intent.md",
765+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-get-intent-from-rest",
766+
"redirect_document_id": false
767+
},
743768
{
744769
"source_path": "articles/cognitive-services/LUIS/luis-concept-collaborator.md",
745770
"redirect_url": "/azure/cognitive-services/LUIS/luis-concept-keys",
@@ -1885,6 +1910,11 @@
18851910
"redirect_url": "/azure/cosmos-db/sql-api-get-started",
18861911
"redirect_document_id": false
18871912
},
1913+
{
1914+
"source_path": "articles/search/knowledge-store-howto.md",
1915+
"redirect_url": "/azure/search/knowledge-store-create-rest",
1916+
"redirect_document_id": false
1917+
},
18881918
{
18891919
"source_path": "articles/search/search-fiddler.md",
18901920
"redirect_url": "/azure/search/search-get-started-postman",
@@ -42056,6 +42086,16 @@
4205642086
"redirect_url": "/azure/sql-database/sql-database-instance-pools",
4205742087
"redirect_document_id": false
4205842088
},
42089+
{
42090+
"source_path": "articles/virtual-machines/windows/tutorial-monitoring.md",
42091+
"redirect_url": "/azure/virtual-machines/windows/tutorial-monitor",
42092+
"redirect_document_id": false
42093+
},
42094+
{
42095+
"source_path": "articles/virtual-machines/linux/tutorial-monitoring.md",
42096+
"redirect_url": "/azure/virtual-machines/linux/tutorial-monitor",
42097+
"redirect_document_id": false
42098+
},
4205942099
{
4206042100
"source_path": "articles/mysql/reference-data-in-stored-procedures.md",
4206142101
"redirect_url": "/azure/mysql/reference-stored-procedures",
@@ -42075,6 +42115,21 @@
4207542115
"source_path": "articles/cloudfoundry/use-osba-pcf-app.md",
4207642116
"redirect_url": "/azure/cloudfoundry",
4207742117
"redirect_document_id": false
42118+
},
42119+
{
42120+
"source_path": "articles/security/compliance/azure-services-in-fedramp-auditscope.md",
42121+
"redirect_url": "/azure/azure-government/compliance/azure-services-in-fedramp-auditscope",
42122+
"redirect_document_id": false
42123+
},
42124+
{
42125+
"source_path": "articles/security/compliance/compliance-tic.md",
42126+
"redirect_url": "/azure/azure-government/compliance/compliance-tic",
42127+
"redirect_document_id": false
42128+
},
42129+
{
42130+
"source_path": "articles/security/compliance/secure-azure-computing-architecture.md",
42131+
"redirect_url": "/azure/azure-government/compliance/secure-azure-computing-architecture",
42132+
"redirect_document_id": false
4207842133
}
4207942134
]
4208042135
}

articles/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -184,6 +184,8 @@ Open a browser and navigate to the URL. Make sure you type the correct URL and t
184184
185185
## Create an Azure AD B2C application
186186
187+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
188+
187189
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
188190
189191
### Update and test the relying party file

articles/active-directory-b2c/active-directory-b2c-custom-setup-goog-idp.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155,6 +155,8 @@ Now that you have a button in place, you need to link it to an action. The actio
155155

156156
## Create an Azure AD B2C application
157157

158+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
159+
158160
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
159161

160162
## Update and test the relying party file

articles/active-directory-b2c/active-directory-b2c-custom-setup-li-idp.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -213,6 +213,8 @@ Now that you have a button in place, you need to link it to an action. The actio
213213

214214
## Create an Azure AD B2C application
215215

216+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
217+
216218
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
217219

218220
## Update and test the relying party file

articles/active-directory-b2c/active-directory-b2c-custom-setup-msa-idp.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,8 @@ Now that you have a button in place, you need to link it to an action. The actio
161161

162162
## Create an Azure AD B2C application
163163

164+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
165+
164166
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
165167

166168
## Update and test the relying party file

articles/active-directory-b2c/active-directory-b2c-custom-setup-twitter-idp.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -150,6 +150,8 @@ Now that you have a button in place, you need to link it to an action. The actio
150150

151151
## Create an Azure AD B2C application
152152

153+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
154+
153155
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
154156

155157
## Update and test the relying party file

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 5 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -39,32 +39,17 @@ Once you have an Azure AD B2C tenant, you need to register your management appli
3939

4040
### Register application in Azure Active Directory
4141

42-
To use the Azure AD Graph API with your B2C tenant, you need to register an application by using the Azure Active Directory **App registrations** workflow.
42+
To use the Azure AD Graph API with your B2C tenant, you need to register an application by using the Azure Active Directory application registration workflow.
4343

44-
1. Sign in to the [Azure portal](https://portal.azure.com) and switch to the directory that contains your Azure AD B2C tenant.
45-
1. Select **Azure Active Directory** (*not* Azure AD B2C) in the left menu. Or, select **All services** and then search for and select **Azure Active Directory**.
46-
1. Under **Manage** in the left menu, select **App registrations (Legacy)**.
47-
1. Select **New application registration**
48-
1. Enter a name for the application. For example, *Management App*.
49-
1. Enter any valid URL in **Sign-on URL**. For example, *https://localhost*. This endpoint does not need to be reachable, but needs to be a valid URL.
50-
1. Select **Create**.
51-
1. Record the **Application ID** that appears on the **Registered app** overview page. You use this value for configuration in a later step.
44+
[!INCLUDE [active-directory-b2c-appreg-mgmt](../../includes/active-directory-b2c-appreg-mgmt.md)]
5245

5346
### Assign API access permissions
5447

55-
1. On the **Registered app** overview page, select **Settings**.
56-
1. Under **API ACCESS**, select **Required permissions**.
57-
1. Select **Windows Azure Active Directory**.
58-
1. Under **APPLICATION PERMISSIONS**, select **Read and write directory data**.
59-
1. Select **Save**.
60-
1. Select **Grant permissions**, and then select **Yes**. It might take a few minutes to for the permissions to fully propagate.
48+
[!INCLUDE [active-directory-b2c-permissions-directory](../../includes/active-directory-b2c-permissions-directory.md)]
6149

6250
### Create client secret
6351

64-
1. Under **API ACCESS**, select **Keys**.
65-
1. Enter a description for the key in the **Key description** box. For example, *Management Key*.
66-
1. Select a validity **Duration** and then select **Save**.
67-
1. Record the key's **VALUE**. You use this value for configuration in a later step.
52+
[!INCLUDE [active-directory-b2c-client-secret](../../includes/active-directory-b2c-client-secret.md)]
6853

6954
You now have an application that has permission to *create*, *read*, and *update* users in your Azure AD B2C tenant. Continue to the next section to add user *delete* and *password update* permissions.
7055

@@ -79,7 +64,7 @@ If you want to give your application the ability to delete users or update passw
7964
1. Under **Manage**, select **Roles and administrators**.
8065
1. Select the **User administrator** role.
8166
1. Select **Add assignment**.
82-
1. In the **Select** text box, enter the name of the application you registered earlier, for example, *Management App*. Select your application when it appears in the search results.
67+
1. In the **Select** text box, enter the name of the application you registered earlier, for example, *managementapp1*. Select your application when it appears in the search results.
8368
1. Select **Add**. It might take a few minutes to for the permissions to fully propagate.
8469

8570
Your Azure AD B2C application now has the additional permissions required to delete users or update their passwords in your B2C tenant.

articles/active-directory-b2c/active-directory-b2c-guide-troubleshooting-custom.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -52,13 +52,11 @@ Common validation errors include the following:
5252

5353
## Troubleshoot the runtime
5454

55-
* Use **Run now** and `https://jwt.ms` to test your policies independently of your web or mobile application. This website acts like a relying party application. It displays the contents of the JSON Web Token (JWT) that is generated by your Azure AD B2C policy. To create a test application, navigate to **Azure AD B2C** \> **Applications** in the Azure portal and add an application with the following values:
55+
* Use **Run now** and `https://jwt.ms` to test your policies independently of your web or mobile application. This website acts like a relying party application. It displays the contents of the JSON web token (JWT) that is generated by your Azure AD B2C policy.
5656

57-
* **Name**: TestApp
58-
* **Web App/Web API**: No
59-
* **Native client**: No
57+
To create a test application that can redirect to `https://jwt.ms` for token inspection:
6058

61-
Then, add `https://jwt.ms` as a **Reply URL**.
59+
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
6260

6361
* To trace the exchange of messages between your client browser and Azure AD B2C, use [Fiddler](https://www.telerik.com/fiddler). It can help you get an indication of where your user journey is failing in your orchestration steps.
6462

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 19 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -90,30 +90,25 @@ To allow script- or application-based access to the Azure AD reporting API, you
9090

9191
You can enable these permissions on an existing Azure Active Directory application registration within your B2C tenant, or create a new one specifically for use with audit log automation.
9292

93-
To create a new application, assign the required API permissions, and create a client secret, perform the following steps:
94-
95-
1. Register application in Azure Active Directory
96-
1. Sign in to the [Azure portal](https://portal.azure.com) and switch to the directory that contains your Azure AD B2C tenant.
97-
1. Select **Azure Active Directory** (*not* Azure AD B2C) from the left menu. Or, select **All services**, then search for and select **Azure Active Directory**.
98-
1. Under **Manage** in the left menu, select **App registrations (Legacy)**.
99-
1. Select **New application registration**
100-
1. Enter a name for the application. For example, *Audit Log App*.
101-
1. Enter any valid URL in **Sign-on URL**. For example, *https://localhost*. This endpoint does not need to be reachable, but needs to be a valid URL.
102-
1. Select **Create**.
103-
1. Record the **Application ID** that appears on the **Registered app** page. You need this value for authentication in automation scripts like the example PowerShell script shown in a later section.
104-
1. Assign API access permissions
105-
1. On the **Registered app** overview page, select **Settings**.
106-
1. Under **API ACCESS**, select **Required permissions**.
107-
1. Select **Add**, and then **Select an API**.
108-
1. Select **Microsoft Graph**, and then **Select**.
109-
1. Under **APPLICATION PERMISSIONS**, select **Read all audit log data**.
110-
1. Select the **Select** button, and then select **Done**.
111-
1. Select **Grant permissions**, and then select **Yes**.
112-
1. Create client secret
113-
1. Under **API ACCESS**, select **Keys**.
114-
1. Enter a description for the key in the **Key description** box. For example, *Audit Log Key*.
115-
1. Select a validity **Duration**, then select **Save**.
116-
1. Record the key's **VALUE**. You need this value for authentication in automation scripts like the example PowerShell script shown in a later section.
93+
Follow these steps register an application, grant it the required Microsoft Graph API permissions, and then create a client secret.
94+
95+
### Register application in Azure Active Directory
96+
97+
[!INCLUDE [active-directory-b2c-appreg-mgmt](../../includes/active-directory-b2c-appreg-mgmt.md)]
98+
99+
### Assign API access permissions
100+
101+
1. On the **Registered app** overview page, select **Settings**.
102+
1. Under **API ACCESS**, select **Required permissions**.
103+
1. Select **Add**, and then **Select an API**.
104+
1. Select **Microsoft Graph**, and then **Select**.
105+
1. Under **APPLICATION PERMISSIONS**, select **Read all audit log data**.
106+
1. Select the **Select** button, and then select **Done**.
107+
1. Select **Grant permissions**, and then select **Yes**.
108+
109+
### Create client secret
110+
111+
[!INCLUDE [active-directory-b2c-client-secret](../../includes/active-directory-b2c-client-secret.md)]
117112

118113
You now have an application with the required API access, an application ID, and a key that you can use in your automation scripts. See the PowerShell script section later in this article for an example of how you can get activity events with a script.
119114

articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -175,6 +175,8 @@ Now that you have a button in place, you need to link it to an action. The actio
175175
176176
## Create an Azure AD B2C application
177177
178+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
179+
178180
[!INCLUDE [active-directory-b2c-appreg-idp](../../includes/active-directory-b2c-appreg-idp.md)]
179181
180182
## Update and test the relying party file

0 commit comments

Comments
 (0)