Skip to content

Commit 48baab8

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into overview-get-started-data-sources-visualizations-renderers
2 parents bcf87a6 + e5c897f commit 48baab8

File tree

720 files changed

+10250
-5964
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

720 files changed

+10250
-5964
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -365,6 +365,46 @@
365365
"source_path_from_root": "/articles/azure-monitor/insights/redis-cache-insights-overview.md" ,
366366
"redirect_url": "/azure/azure-cache-for-redis/redis-cache-insights-overview",
367367
"redirect_document_id": false
368+
},
369+
{
370+
"source_path_from_root": "/articles/azure-monitor/logs/ingestion-time-transformations.md" ,
371+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-transformations",
372+
"redirect_document_id": false
373+
},
374+
{
375+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-ingestion-time-transformations.md" ,
376+
"redirect_url": "/azure/azure-monitor/logs/tutorial-workspace-transformations-portal",
377+
"redirect_document_id": false
378+
},
379+
{
380+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-ingestion-time-transformations-api.md" ,
381+
"redirect_url": "/azure/azure-monitor/logs/tutorial-workspace-transformations-api",
382+
"redirect_document_id": false
383+
},
384+
{
385+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-custom-logs.md" ,
386+
"redirect_url": "/azure/azure-monitor/logs/tutorial-logs-ingestion-portal",
387+
"redirect_document_id": false
388+
},
389+
{
390+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-custom-logs-api.md" ,
391+
"redirect_url": "/azure/azure-monitor/logs/tutorial-logs-ingestion-api",
392+
"redirect_document_id": false
393+
},
394+
{
395+
"source_path_from_root": "/articles/azure-monitor/agents/data-sources.md" ,
396+
"redirect_url": "/azure/azure-monitor/essentials/data-sources",
397+
"redirect_document_id": false
398+
},
399+
{
400+
"source_path_from_root": "/articles/azure-monitor/essentials/data-collection-rule-transformations.md" ,
401+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-transformations-structure",
402+
"redirect_document_id": false
403+
},
404+
{
405+
"source_path_from_root": "/articles/azure-monitor/logs/custom-logs-overview.md" ,
406+
"redirect_url": "/azure/azure-monitor/logs/logs-ingestion-api-overview",
407+
"redirect_document_id": false
368408
}
369409
]
370410
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/api-management/zone-redundancy.md",
5+
"redirect_url": "/azure/availability-zones/migrate-api-mgt",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/virtual-machines/linux/find-unattached-nics.md",
510
"redirect_url": "/previous-versions/azure/virtual-machines/linux/find-unattached-nics",

articles/active-directory-b2c/error-codes.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/16/2021
12+
ms.date: 07/18/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -20,6 +20,7 @@ The following errors can be returned by the Azure Active Directory B2C service.
2020

2121
| Error code | Message | Notes |
2222
| ---------- | ------- | ----- |
23+
| `AADB2C90001` | This user already exists, and profile '{0}' does not allow the same user to be created again. | [Sign-up flow](add-sign-up-and-sign-in-policy.md) |
2324
| `AADB2C90002` | The CORS resource '{0}' returned a 404 not found. | [Hosting the page content](customize-ui-with-html.md#hosting-the-page-content) |
2425
| `AADB2C90006` | The redirect URI '{0}' provided in the request is not registered for the client ID '{1}'. | [Register a web application](tutorial-register-applications.md), [Sending authentication requests](openid-connect.md#send-authentication-requests) |
2526
| `AADB2C90007` | The application associated with client ID '{0}' has no registered redirect URIs. | [Register a web application](tutorial-register-applications.md), [Sending authentication requests](openid-connect.md#send-authentication-requests) |

articles/active-directory-b2c/javascript-and-page-layout.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,21 @@ function addTermsOfUseLink() {
233233

234234
In the code, replace `termsOfUseUrl` with the link to your terms of use agreement. For your directory, create a new user attribute called **termsOfUse** and then include **termsOfUse** as a user attribute.
235235

236+
Alternatively, you can add a link at the bottom of self-asserted pages, without using of JavaScript. Use the following localization:
237+
238+
```xml
239+
<LocalizedResources Id="api.localaccountsignup.en">
240+
<LocalizedStrings>
241+
<!-- The following elements will display a link at the bottom of the page. -->
242+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_text">Terms of use</LocalizedString>
243+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_url">termsOfUseUrl</LocalizedString>
244+
</LocalizedStrings>
245+
</LocalizedResources>
246+
```
247+
248+
Replace `termsOfUseUrl` with the link to your organization's privacy policy and terms of use.
249+
250+
236251
## Next steps
237252

238253
Find more information about how to [Customize the user interface of your application in Azure Active Directory B2C](customize-ui-with-html.md).

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 04/12/2022
11+
ms.date: 04/19/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -177,6 +177,18 @@ The following are the IDs for a content definition with an ID of `api.localaccou
177177
| **ver_intro_msg** | Verification is necessary. Please click Send button. |
178178
| **ver_input** | Verification code |
179179

180+
### Sign-up and self-asserted pages disclaimer links
181+
182+
The following `UxElement` string IDs will display disclaimer link(s) at the bottom of the self-asserted page. These links are not displayed by default unless specified in the localized strings.
183+
184+
| ID | Example value |
185+
| --- | ------------- |
186+
| **disclaimer_msg_intro** | By providing your phone number, you consent to receiving a one-time passcode sent by text message to help you sign into {insert your application name}. Standard messsage and data rates may apply. |
187+
| **disclaimer_link_1_text** | Privacy Statement |
188+
| **disclaimer_link_1_url** | {insert your privacy statement URL} |
189+
| **disclaimer_link_2_text** | Terms and Conditions |
190+
| **disclaimer_link_2_url** | {insert your terms and conditions URL} |
191+
180192
### Sign-up and self-asserted pages error messages
181193

182194
| ID | Default value |
@@ -238,6 +250,14 @@ The following example shows the use of some of the user interface elements in th
238250
<LocalizedString ElementType="UxElement" StringId="ver_input">Verification code</LocalizedString>
239251
<LocalizedString ElementType="UxElement" StringId="ver_intro_msg">Verification is necessary. Please click Send button.</LocalizedString>
240252
<LocalizedString ElementType="UxElement" StringId="ver_success_msg">E-mail address verified. You can now continue.</LocalizedString>
253+
<!-- The following elements will display a message and two links at the bottom of the page.
254+
For policies that you intend to show to users in the United States, we suggest displaying the following text. Replace the content of the disclaimer_link_X_url elements with links to your organization's privacy statement and terms and conditions.
255+
Uncomment any of these lines to display them. -->
256+
<!-- <LocalizedString ElementType="UxElement" StringId="disclaimer_msg_intro">By providing your phone number, you consent to receiving a one-time passcode sent by text message to help you sign into {insert your application name}. Standard messsage and data rates may apply.</LocalizedString> -->
257+
<!-- <LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_text">Privacy Statement</LocalizedString>
258+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_url">{insert your privacy statement URL}</LocalizedString> -->
259+
<!-- <LocalizedString ElementType="UxElement" StringId="disclaimer_link_2_text">Terms and Conditions</LocalizedString>
260+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_2_url">{insert your terms and conditions URL}</LocalizedString> -->
241261
<LocalizedString ElementType="ErrorMessage" StringId="ServiceThrottled">There are too many requests at this moment. Please wait for some time and try again.</LocalizedString>
242262
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfClaimNotVerified">Claim not verified: {0}</LocalizedString>
243263
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfClaimsPrincipalAlreadyExists">A user with the specified ID already exists. Please choose a different one.</LocalizedString>

articles/active-directory-b2c/phone-factor-technical-profile.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,7 @@ The **CryptographicKeys** element is not used.
9393
| ManualPhoneNumberEntryAllowed| No | Specify whether or not a user is allowed to manually enter a phone number. Possible values: `true`, or `false` (default).|
9494
| setting.authenticationMode | No | The method to validate the phone number. Possible values: `sms`, `phone`, or `mixed` (default).|
9595
| setting.autodial| No| Specify whether the technical profile should auto dial or auto send an SMS. Possible values: `true`, or `false` (default). Auto dial requires the `setting.authenticationMode` metadata be set to `sms`, or `phone`. The input claims collection must have a single phone number. |
96+
| setting.autosubmit | No | Specifies whether the technical profile should auto submit the one-time password entry form. Possible values are `true` (default), or `false`. When auto-submit is turned off, the user needs to select a button to progress the journey. |
9697

9798
### UI elements
9899

41.2 KB
Loading
26.8 KB
Loading

articles/active-directory/app-provisioning/partner-driven-integrations.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: rkarlin
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 07/08/2022
10+
ms.date: 07/18/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -22,12 +22,16 @@ Popular third party applications, such as Dropbox, Snowflake, and Workplace by F
2222
**Option 2 - Implement a SCIM compliant API for your application:**
2323
If your line-of-business application supports the [SCIM](https://aka.ms/scimoverview) standard, it can easily be integrated with the [Azure AD SCIM client](use-scim-to-provision-users-and-groups.md).
2424

25+
[![Diagram showing implementation of a SCIM compliant API for your application.](media/partner-driven-integrations/scim-compliant-api-1.png)](media/partner-driven-integrations/scim-compliant-api-1.png#lightbox)
26+
2527
**Option 3 - Use Microsoft Graph:**
2628
Many new applications use Microsoft Graph to retrieve users, groups and other resources from Azure Active Directory. You can learn more about what scenarios to use [SCIM and Graph](scim-graph-scenarios.md) in.
2729

2830
**Option 4 - Use partner-driven connectors:**
2931
In cases where an application doesn't support SCIM, partners have built gateways between the Azure AD SCIM client and target applications. **This document serves as a place for partners to attest to integrations that are compatible with Azure Active Directory, and for customers to discover these partner-driven integrations.** These gateways are built, maintained, and owned by the third-party vendor.
3032

33+
[![Diagram showing gateways between the Azure AD SCIM client and target applications.](media/partner-driven-integrations/partner-driven-connectors-1.png)](media/partner-driven-integrations/partner-driven-connectors-1.png#lightbox)
34+
3135
## Available partner-driven integrations
3236
The descriptions and lists of applications below are provided by the partners themselves. You can use the lists of applications supported to identify a partner that you may want to contact and learn more about.
3337

@@ -76,7 +80,7 @@ If you have built a SCIM Gateway and would like to add it to this list, follow t
7680
1. Review the Azure AD SCIM [documentation](use-scim-to-provision-users-and-groups.md) to understand the Azure AD SCIM implementation.
7781
1. Test compatibility between the Azure AD SCIM client and your SCIM gateway.
7882
1. Click the pencil at the top of this document to edit the article
79-
1. Once you're redirected to Github, click the pencil at the top of the article to start making changes
83+
1. Once you're redirected to GitHub, click the pencil at the top of the article to start making changes
8084
1. Make changes in the article using the Markdown language and create a pull request. Make sure to provide a description for the pull request.
8185
1. An admin of the repository will review and merge your changes so that others can view them.
8286

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 21 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: how-to
10-
ms.date: 07/15/2022
10+
ms.date: 07/19/2022
1111

1212

1313
ms.author: justinha
@@ -24,21 +24,38 @@ Microsoft Authenticator can be used to sign in to any Azure AD account without u
2424

2525
This authentication technology can be used on any device platform, including mobile. This technology can also be used with any app or website that integrates with Microsoft Authentication Libraries.
2626

27-
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app.png" alt-text="Screenshot that shows an example of a browser sign-in asking for the user to approve the sign-in.":::
27+
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app-next.png" alt-text="Screenshot that shows an example of a browser sign-in asking for the user to approve the sign-in.":::
2828

2929
People who enabled phone sign-in from Microsoft Authenticator see a message that asks them to tap a number in their app. No username or password is asked for. To complete the sign-in process in the app, a user must next take the following actions:
3030

3131
1. Enter the number they see on the login screen into Microsoft Authenticator dialog.
3232
1. Choose **Approve**.
3333
1. Provide their PIN or biometric.
3434

35+
## Multiple accounts on iOS (preview)
36+
37+
You can enable passwordless phone sign-in for multiple accounts in Microsoft Authenticator on any supported iOS device. Consultants, students, and others with multiple accounts in Azure AD can add each account to Microsoft Authenticator and use passwordless phone sign-in for all of them from the same iOS device.
38+
39+
Previously, admins might not require passwordless sign-in for users with multiple accounts because it requires them to carry more devices for sign-in. By removing the limitation of one user sign-in from a device, admins can more confidently encourage users to register passwordless phone sign-in and use it as their default sign-in method.
40+
41+
The Azure AD accounts can be in the same tenant or different tenants. Guest accounts aren't supported for multiple account sign-in from one device.
42+
43+
>[!NOTE]
44+
>Multiple accounts on iOS is currently in public preview. Some features might not be supported or have limited capabilities. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
45+
3546
## Prerequisites
3647

3748
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:
3849

3950
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
4051
- Latest version of Microsoft Authenticator installed on devices running iOS 12.0 or greater, or Android 6.0 or greater.
41-
- The device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
52+
- For Android, the device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
53+
- For iOS, the device must be registered with each tenant where it's used to sign in. For example, the following device must be registered with Contoso and Wingtiptoys to allow all accounts to sign in:
54+
55+
- [email protected] and bsandhu@wingtiptoys
56+
- For iOS, we recommend enabling the option in Microsoft Authenticator to allow Microsoft to gather usage data. It's not enabled by default. To enable it in Microsoft Authenticator, go to **Settings** > **Usage Data**.
57+
58+
:::image type="content" border="true" source="./media/howto-authentication-passwordless-phone/telemetry.png" alt-text="Screenshot of Usage Data in Microsoft Authenticator.":::
4259

4360
To use passwordless authentication in Azure AD, first enable the combined registration experience, then enable users for the passwordless method.
4461

@@ -128,19 +145,11 @@ An end user can be enabled for multifactor authentication (MFA) through an on-pr
128145

129146
If the user attempts to upgrade multiple installations (5+) of Microsoft Authenticator with the passwordless phone sign-in credential, this change might result in an error.
130147

131-
### Device registration
132-
133-
Before you can create this new strong credential, there are prerequisites. One prerequisite is that the device on which Microsoft Authenticator is installed must be registered within the Azure AD tenant to an individual user.
134-
135-
Currently, a device can only be enabled for passwordless sign-in in a single tenant. This limit means that only one work or school account in Microsoft Authenticator can be enabled for phone sign-in.
136-
137-
> [!NOTE]
138-
> Device registration is not the same as device management or mobile device management (MDM). Device registration only associates a device ID and a user ID together, in the Azure AD directory.
139148

140149
## Next steps
141150

142151
To learn about Azure AD authentication and passwordless methods, see the following articles:
143152

144153
- [Learn how passwordless authentication works](concept-authentication-passwordless.md)
145154
- [Learn about device registration](../devices/overview.md)
146-
- [Learn about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)
155+
- [Learn about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)

0 commit comments

Comments
 (0)