Skip to content

Commit 4ddbca9

Browse files
committed
2 parents 2eb222e + 42e31d5 commit 4ddbca9

File tree

3,668 files changed

+79902
-31553
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,668 files changed

+79902
-31553
lines changed

.gitignore

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,3 +22,5 @@ articles/directories.txt
2222
AzureMigration.ps1
2323

2424
!/.vscode/extensions.json
25+
articles/data-lake-analytics/.vscode/settings.json
26+
.gitignore

.openpublishing.publish.config.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@
194194
{
195195
"path_to_root": "samples-cognitive-services-speech-sdk",
196196
"url": "https://github.com/Azure-Samples/cognitive-services-speech-sdk",
197-
"branch": "docs-201809"
197+
"branch": "rhurey/quickstart.refactor"
198198
},
199199
{
200200
"path_to_root": "media-services-v3-dotnet-quickstarts",
@@ -342,6 +342,11 @@
342342
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-api-nodejs-getting-started",
343343
"branch": "master"
344344
},
345+
{
346+
"path_to_root": "azure-cosmos-db-python-getting-started",
347+
"url": "https://github.com/Azure-Samples/azure-cosmos-db-python-getting-started",
348+
"branch": "master"
349+
},
345350
{
346351
"path_to_root": "cognitive-services-content-moderator-samples",
347352
"url": "https://github.com/Azure-Samples/cognitive-services-content-moderator-samples",
@@ -392,6 +397,11 @@
392397
"path_to_root": "azure-cosmosdb-java-v2",
393398
"url": "https://github.com/Azure/azure-cosmosdb-java",
394399
"branch": "master"
400+
},
401+
{
402+
"path_to_root": "azure-cosmosdb-java-v4-getting-started",
403+
"url": "https://github.com/Azure-Samples/azure-cosmos-java-getting-started",
404+
"branch": "master"
395405
}
396406
],
397407
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 443 additions & 10 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-custom-setup-msa-idp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To enable sign-in for users with a Microsoft account, you need to register an ap
4040
1. Select **Certificates & secrets**
4141
1. Click **New client secret**
4242
1. Enter a **Description** for the secret, for example *MSA Application Client Secret*, and then click **Add**.
43-
1. Record the application password shown in the **VALUE** column. You use this value in the next section.
43+
1. Record the application password shown in the **Value** column. You use this value in the next section.
4444

4545
## Create a policy key
4646

articles/active-directory-b2c/active-directory-b2c-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ Not currently. This feature is on our roadmap. Verifying your domain in the **Do
128128

129129
Follow these steps to delete your Azure AD B2C tenant.
130130

131-
You can use the current **Applications** experience or our new unified **App registrations (Preview)** experience. [Learn more about the preview experience](http://aka.ms/b2cappregintro).
131+
You can use the current **Applications** experience or our new unified **App registrations (Preview)** experience. [Learn more about the new experience](https://aka.ms/b2cappregintro).
132132

133133
#### [Applications](#tab/applications/)
134134

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ You need to register these two applications in your Azure AD B2C tenant only onc
6969

7070
### Register the IdentityExperienceFramework application
7171

72-
To register an application in your Azure AD B2C tenant, you can use the current **Applications** experience, or our new unified **App registrations (Preview)** experience. [Learn more about the preview experience](https://aka.ms/b2cappregintro).
72+
To register an application in your Azure AD B2C tenant, you can use the current **Applications** experience, or our new unified **App registrations (Preview)** experience. [Learn more about the new experience](https://aka.ms/b2cappregintro).
7373

7474
#### [Applications](#tab/applications/)
7575

@@ -147,7 +147,7 @@ Now, grant permissions to the API scope you exposed earlier in the *IdentityExpe
147147
1. Select **Grant admin consent for (your tenant name)**.
148148
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
149149
1. Select **Accept**.
150-
1. Select **Refresh**, and then verify that "Granted for ..." appears under **STATUS** for both scopes. It might take a few minutes for the permissions to propagate.
150+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status** for both scopes. It might take a few minutes for the permissions to propagate.
151151

152152
* * *
153153

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ Follow these steps register an application, grant it the required Microsoft Grap
119119
1. Select **Grant admin consent for (your tenant name)**.
120120
1. Select your currently signed-in account if it's been assigned the *Global Administrator* role, or sign in with an account in your Azure AD B2C tenant that's been assigned the *Global Administrator* role.
121121
1. Select **Accept**.
122-
1. Select **Refresh**, and then verify that "Granted for ..." appears under **STATUS** for the *AuditLog.Read.All* permission. It might take a few minutes for the permissions to propagate.
122+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status** for the *AuditLog.Read.All* permission. It might take a few minutes for the permissions to propagate.
123123

124124
* * *
125125

articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
4343
4444
1. Select **Register**. Record the **Application (client) ID** for use in a later step.
4545
1. Select **Certificates & secrets**, and then select **New client secret**.
46-
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **VALUE** of the secret for use in a later step.
46+
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
4747
4848
## Create a policy key
4949

articles/active-directory-b2c/active-directory-b2c-setup-commonaad-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
4343
4444
1. Select **Register**. Record the **Application (client) ID** for use in a later step.
4545
1. Select **Certificates & secrets**, and then select **New client secret**.
46-
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **VALUE** of the secret for use in a later step.
46+
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
4747
4848
## Create a policy key
4949

articles/active-directory-b2c/active-directory-b2c-setup-msa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To use a Microsoft account as an [identity provider](active-directory-b2c-refere
3333
1. Select **Certificates & secrets**
3434
1. Click **New client secret**
3535
1. Enter a **Description** for the secret, for example *Application password 1*, and then click **Add**.
36-
1. Record the application password shown in the **VALUE** column. You need this when you configure the identity provider in the next section.
36+
1. Record the application password shown in the **Value** column. You need this when you configure the identity provider in the next section.
3737

3838
## Configure a Microsoft account as an identity provider
3939

0 commit comments

Comments
 (0)