Skip to content

Commit 5152265

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into sdg-master
2 parents d5caf45 + 65e780f commit 5152265

File tree

2,299 files changed

+47570
-30598
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,299 files changed

+47570
-30598
lines changed

.markdownlint.json

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,6 @@
3232
"MD035": false,
3333
"MD036": false,
3434
"MD037": false,
35-
"MD038": false,
36-
"MD039": false,
3735
"MD040": false,
3836
"MD041": false,
3937
"MD042": false,

.openpublishing.redirection.json

Lines changed: 132 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,11 @@
2424
"source_path": "articles/best-practices-network-security.md",
2525
"redirect_url": "https://docs.microsoft.com/azure/architecture/vdc/networking-virtual-datacenter",
2626
"redirect_document_id": true
27+
},
28+
{
29+
"source_path": "articles/active-directory/saas-apps/realtimeboard-tutorial.md",
30+
"redirect_url": "/articles/active-directory/saas-apps/miro-tutorial",
31+
"redirect_document_id": true
2732
},
2833
{
2934
"source_path": "articles/virtual-network/virtual-networks-dmz-nsg-asm.md",
@@ -1491,8 +1496,8 @@
14911496
"redirect_document_id": true
14921497
},
14931498
{
1494-
"source_path": "articles/cosmos-db/sql-api-sql-query-reference.md",
1495-
"redirect_url": "/azure/cosmos-db/sql-api-query-reference",
1499+
"source_path": "articles/cosmos-db/sql-api-query-reference.md",
1500+
"redirect_url": "/azure/cosmos-db/sql-query-getting-started",
14961501
"redirect_document_id": true
14971502
},
14981503
{
@@ -1532,7 +1537,7 @@
15321537
},
15331538
{
15341539
"source_path": "articles/cosmos-db/sql-api-sql-query.md",
1535-
"redirect_url": "/azure/cosmos-db/how-to-sql-query",
1540+
"redirect_url": "/azure/cosmos-db/sql-query-getting-started",
15361541
"redirect_document_id": false
15371542
},
15381543
{
@@ -1545,6 +1550,31 @@
15451550
"redirect_url": "/azure/cosmos-db/high-availability",
15461551
"redirect_document_id": true
15471552
},
1553+
{
1554+
"source_path": "articles/search/search-fiddler.md",
1555+
"redirect_url": "/azure/search/search-get-started-postman",
1556+
"redirect_document_id": false
1557+
},
1558+
{
1559+
"source_path": "articles/search/search-create-index-rest-api.md",
1560+
"redirect_url": "/azure/search/search-get-started-powershell",
1561+
"redirect_document_id": false
1562+
},
1563+
{
1564+
"source_path": "articles/search/search-create-index-dotnet.md",
1565+
"redirect_url": "/azure/search/search-get-started-dotnet",
1566+
"redirect_document_id": false
1567+
},
1568+
{
1569+
"source_path": "articles/search/search-import-data-dotnet.md",
1570+
"redirect_url": "/azure/search/search-get-started-dotnet",
1571+
"redirect_document_id": false
1572+
},
1573+
{
1574+
"source_path": "articles/search/search-query-dotnet.md",
1575+
"redirect_url": "/azure/search/search-get-started-dotnet",
1576+
"redirect_document_id": false
1577+
},
15481578
{
15491579
"source_path": "articles/search/search-autosuggest-example.md",
15501580
"redirect_url": "/azure/search/search-autocomplete-tutorial",
@@ -4655,11 +4685,21 @@
46554685
"redirect_url": "/azure/app-service-mobile",
46564686
"redirect_document_id": false
46574687
},
4688+
{
4689+
"source_path": "articles/application-gateway/application-gateway-create-gateway-arm-template.md",
4690+
"redirect_url": "/azure/application-gateway/create-vmss-template",
4691+
"redirect_document_id": false
4692+
},
46584693
{
46594694
"source_path": "articles/application-gateway/application-gateway-webapplicationfirewall-overview.md",
46604695
"redirect_url": "/azure/application-gateway/application-gateway-web-application-firewall-overview",
46614696
"redirect_document_id": false
46624697
},
4698+
{
4699+
"source_path": "articles/application-gateway/application-gateway-create-multisite-portal.md",
4700+
"redirect_url": "/azure/application-gateway/create-multiple-sites-portal",
4701+
"redirect_document_id": false
4702+
},
46634703
{
46644704
"source_path": "articles/application-gateway/application-gateway-introduction.md",
46654705
"redirect_url": "/azure/application-gateway/overview",
@@ -11207,7 +11247,7 @@
1120711247
},
1120811248
{
1120911249
"source_path": "articles/hdinsight/hdinsight-hadoop-r-scripts.md",
11210-
"redirect_url": "/azure/hdinsight/r-server/r-server-get-started",
11250+
"redirect_url": "/azure/hdinsight/r-server/r-server-overview",
1121111251
"redirect_document_id": false
1121211252
},
1121311253
{
@@ -11272,7 +11312,7 @@
1127211312
},
1127311313
{
1127411314
"source_path": "articles/hdinsight/hdinsight-hadoop-r-scripts-linux.md",
11275-
"redirect_url": "/azure/hdinsight/hdinsight-hadoop-r-server-get-started",
11315+
"redirect_url": "/azure/hdinsight/hdinsight-hadoop-r-server-overview",
1127611316
"redirect_document_id": false
1127711317
},
1127811318
{
@@ -12152,7 +12192,7 @@
1215212192
},
1215312193
{
1215412194
"source_path": "articles/cosmos-db/documentdb-sql-query-reference.md",
12155-
"redirect_url": "/azure/cosmos-db/sql-api-sql-query-reference",
12195+
"redirect_url": "/azure/cosmos-db/sql-query-getting-started",
1215612196
"redirect_document_id": false
1215712197
},
1215812198
{
@@ -15360,6 +15400,11 @@
1536015400
"redirect_url": "/azure/aks/networking-overview",
1536115401
"redirect_document_id": false
1536215402
},
15403+
{
15404+
"source_path": "articles/stream-analytics/stream-analytics-common-troubleshooting-issues.md",
15405+
"redirect_url": "/azure/stream-analytics/stream-analytics-troubleshoot-input",
15406+
"redirect_document_id": false
15407+
},
1536315408
{
1536415409
"source_path": "articles/stream-analytics/vs-code-how-to.md",
1536515410
"redirect_url": "/azure/stream-analytics/vscode-explore-jobs",
@@ -22464,6 +22509,21 @@
2246422509
"redirect_url": "/azure/vs-azure-tools-storage-explorer-relnotes",
2246522510
"redirect_document_id": false
2246622511
},
22512+
{
22513+
"source_path": "articles/cosmos-db/how-to-sql-query.md",
22514+
"redirect_url": "/azure/cosmos-db/sql-query-getting-started",
22515+
"redirect_document_id": false
22516+
},
22517+
{
22518+
"source_path": "articles/cosmos-db/sql-api-query-getting-started.md",
22519+
"redirect_url": "/azure/cosmos-db/sql-query-getting-started",
22520+
"redirect_document_id": false
22521+
},
22522+
{
22523+
"source_path": "articles/cosmos-db/sql-query-reference.md",
22524+
"redirect_url": "/azure/cosmos-db/sql-query-getting-started",
22525+
"redirect_document_id": false
22526+
},
2246722527
{
2246822528
"source_path": "articles/active-directory/secure-email-introduction.md",
2246922529
"redirect_url": "https://docs.microsoft.com/microsoft-365-enterprise/microsoft-365-policies-configurations",
@@ -25811,8 +25871,8 @@
2581125871
},
2581225872
{
2581325873
"source_path": "articles/hdinsight/hdinsight-hadoop-r-server-get-started.md",
25814-
"redirect_url": "/azure/hdinsight/r-server/r-server-get-started",
25815-
"redirect_document_id": true
25874+
"redirect_url": "/azure/hdinsight/r-server/r-server-overview",
25875+
"redirect_document_id": false
2581625876
},
2581725877
{
2581825878
"source_path": "articles/hdinsight/hdinsight-hadoop-r-server-install-r-studio.md",
@@ -25822,7 +25882,7 @@
2582225882
{
2582325883
"source_path": "articles/hdinsight/hdinsight-hadoop-r-server-overview.md",
2582425884
"redirect_url": "/azure/hdinsight/r-server/r-server-overview",
25825-
"redirect_document_id": true
25885+
"redirect_document_id": false
2582625886
},
2582725887
{
2582825888
"source_path": "articles/hdinsight/hdinsight-hadoop-r-server-storage.md",
@@ -26141,7 +26201,12 @@
2614126201
},
2614226202
{
2614326203
"source_path": "articles/hdinsight/r-server/r-server-install-r-studio.md",
26144-
"redirect_url": "/azure/hdinsight/r-server/r-server-get-started",
26204+
"redirect_url": "/azure/hdinsight/r-server/r-server-overview",
26205+
"redirect_document_id": false
26206+
},
26207+
{
26208+
"source_path": "articles/hdinsight/r-server/r-server-get-started.md",
26209+
"redirect_url": "/azure/hdinsight/r-server/r-server-overview",
2614526210
"redirect_document_id": false
2614626211
},
2614726212
{
@@ -27128,6 +27193,11 @@
2712827193
"source_path": "articles/backup/backup-azure-dpm-introduction-classic.md",
2712927194
"redirect_url": "/azure/backup/backup-azure-dpm-introduction",
2713027195
"redirect_document_id": false
27196+
},
27197+
{
27198+
"source_path": "articles/backup/backup-azure-monitor-vms.md",
27199+
"redirect_url": "/azure/backup/backup-azure-monitoring-built-in-monitor",
27200+
"redirect_document_id": false
2713127201
},
2713227202
{
2713327203
"source_path": "articles/backup/backup-azure-manage-vms-classic.md",
@@ -30293,7 +30363,17 @@
3029330363
"source_path": "articles/networking/index.md",
3029430364
"redirect_url": "/azure/networking/networking-overview",
3029530365
"redirect_document_id": false
30296-
},
30366+
},
30367+
{
30368+
"source_path": "articles/notification-hubs/configure-android-device-messaging.md",
30369+
"redirect_url": "/azure//notification-hubs/configure-google-firebase-cloud-messaging",
30370+
"redirect_document_id": false
30371+
},
30372+
{
30373+
"source_path": "articles/notification-hubs/notification-hubs-kindle-amazon-adm-push-notification.md",
30374+
"redirect_url": "/azure//notification-hubs/notification-hubs-android-push-notification-google-fcm-get-started",
30375+
"redirect_document_id": false
30376+
},
3029730377
{
3029830378
"source_path": "articles/security/blueprints/index.md",
3029930379
"redirect_url": "/azure/security/index",
@@ -35048,6 +35128,11 @@
3504835128
"redirect_url": "/azure/azure-monitor/log-query/portals",
3504935129
"redirect_document_id": true
3505035130
},
35131+
{
35132+
"source_path": "articles/azure-monitor/log-query/portals.md",
35133+
"redirect_url": "/azure/azure-monitor/log-query/log-query-overview",
35134+
"redirect_document_id": false
35135+
},
3505135136
{
3505235137
"source_path": "articles/log-analytics/log-analytics-log-search-takeaction.md",
3505335138
"redirect_url": "/azure/azure-monitor/log-query/take-action",
@@ -36378,6 +36463,11 @@
3637836463
"redirect_url": "/azure/azure-monitor/platform/activity-log-collect",
3637936464
"redirect_document_id": false
3638036465
},
36466+
{
36467+
"source_path": "articles/azure-monitor/learn/tutorial-viewdata.md",
36468+
"redirect_url": "/azure/azure-monitor/log-query/get-started-portal",
36469+
"redirect_document_id": false
36470+
},
3638136471
{
3638236472
"source_path": "articles/machine-learning/service/how-to-automated-ml.md",
3638336473
"redirect_url": "/azure/machine-learning/service/concept-automated-ml",
@@ -36578,6 +36668,17 @@
3657836668
"redirect_url": "https://docs.microsoft.com/python/api/overview/azure/dataprep/intro?view=azure-dataprep-py",
3657936669
"redirect_document_id": false
3658036670
},
36671+
{
36672+
"source_path": "articles/machine-learning/service/how-to-create-dataset-snapshots.md",
36673+
"redirect_url": "https://docs.microsoft.com/python/api/azureml-core/azureml.data.dataset_snapshot.datasetsnapshot?view=azure-ml-py",
36674+
"redirect_document_id": false
36675+
},
36676+
36677+
{
36678+
"source_path": "articles/machine-learning/service/how-to-manage-dataset-definitions.md",
36679+
"redirect_url": "https://docs.microsoft.com/python/api/azureml-core/azureml.core.dataset?view=azure-ml-py",
36680+
"redirect_document_id": false
36681+
},
3658136682
{
3658236683
"source_path": "articles/governance/policy/samples/allowed-app-gate-sku.md",
3658336684
"redirect_url": "/azure/governance/policy/samples/allowed-app-gateway-sku",
@@ -37282,6 +37383,10 @@
3728237383
"source_path": "articles/azure-monitor/platform/collect-activity-logs-subscriptions.md",
3728337384
"redirect_url": "/azure/azure-monitor/platform/activity-log-collect-tenants",
3728437385
"redirect_document_id": false
37386+
}, {
37387+
"source_path": "articles/azure-monitor/app/analytics.md",
37388+
"redirect_url": "/azure/azure-monitor/log-query/portals",
37389+
"redirect_document_id": false
3728537390
},
3728637391
{
3728737392
"source_path": "articles/azure-monitor/platform/oms-portal-faq.md",
@@ -37465,7 +37570,12 @@
3746537570
},
3746637571
{
3746737572
"source_path": "articles/hdinsight/hdinsight-analyze-flight-delay-data.md",
37468-
"redirect_url": "/azure/hdinsight/hdinsight-analyze-flight-delay-data-linux",
37573+
"redirect_url": "/azure/hdinsight/interactive-query/interactive-query-tutorial-analyze-flight-data",
37574+
"redirect_document_id": false
37575+
},
37576+
{
37577+
"source_path": "articles/hdinsight/hdinsight-analyze-flight-delay-data-linux.md",
37578+
"redirect_url": "/azure/hdinsight/interactive-query/interactive-query-tutorial-analyze-flight-data",
3746937579
"redirect_document_id": false
3747037580
},
3747137581
{
@@ -39917,6 +40027,16 @@
3991740027
"source_path": "articles/backup/backup-azure-upgrade-backup-to-recovery-services.md",
3991840028
"redirect_url": "/azure/backup/backup-create-rs-vault",
3991940029
"redirect_document_id": true
40030+
},
40031+
{
40032+
"source_path": "articles/cognitive-services/text-analytics/how-tos/text-analytics-how-to-use-container-instance.md",
40033+
"redirect_url": "/azure/cognitive-services/text-analytics/how-tos/use-language-detection-on-aks",
40034+
"redirect_document_id": false
40035+
},
40036+
{
40037+
"source_path": "articles/storage/blobs/data-lake-storage-use-hdi-cluster.md",
40038+
"redirect_url": "/azure/hdinsight/hdinsight-hadoop-use-data-lake-storage-gen2",
40039+
"redirect_document_id": false
3992040040
}
3992140041
]
3992240042
}

README.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,9 @@ Follow the instructions provided in the [Install content authoring tools](https:
2626

2727
## License
2828

29-
Please refer to [LICENSE](.github/LICENSE), [LICENSE-CODE](.github/LICENSE-CODE) and [ThirdPartyNotices](.github/ThirdPartyNotices.md) for all Licensing information.
29+
Please refer to [LICENSE](LICENSE), [LICENSE-CODE](LICENSE-CODE) and [ThirdPartyNotices](ThirdPartyNotices.md) for all Licensing information.
3030

3131
## Code of Conduct
3232

3333
This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
3434
For more information, see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [[email protected]](mailto:[email protected]) with any additional questions or comments.
35-

articles/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,10 @@ By now, you have configured your policy so that Azure AD B2C knows how to commun
9898
2. Enable **Overwrite the policy if it exists**, and then browse to and select the *TrustFrameworkExtensions.xml* file.
9999
3. Click **Upload**.
100100

101+
> [!NOTE]
102+
> The Visual Studio code B2C extension uses "socialIdpUserId." A social policy is also required for ADFS.
103+
>
104+
101105
## Register the claims provider
102106

103107
At this point, the identity provider has been set up, but it’s not available in any of the sign-up or sign-in screens. To make it available, you create a duplicate of an existing template user journey, and then modify it so that it also has the ADFS identity provider.

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ ms.workload: identity
1111
ms.date: 08/04/2017
1212
ms.author: marsma
1313
ms.subservice: B2C
14+
ms.custom: fasttrack-edit
1415
---
1516

1617
# Accessing Azure AD B2C audit logs
@@ -20,6 +21,9 @@ Azure Active Directory B2C (Azure AD B2C) emits audit logs containing activity i
2021
> [!IMPORTANT]
2122
> Audit logs are only retained for seven days. Plan to download and store your logs using one of the methods shown below if you require a longer retention period.
2223
24+
> [!NOTE]
25+
> You cannot see user sign-ins for individual Azure AD B2C applications under the **Users** section of the **Azure Active Directory** or **Azure AD B2C** blades. The sign-ins there will show user activity, but cannot be correlated back to the B2C application that the user signed in to. You must use the audit logs for that, as explained further in this article.
26+
2327
## Overview of activities available in the B2C category of audit logs
2428
The **B2C** category in audit logs contains the following types of activities:
2529

@@ -39,6 +43,18 @@ The **B2C** category in audit logs contains the following types of activities:
3943
The example below shows the data captured when a user signs in with an external identity provider:
4044
![Audit Logs - Example](./media/active-directory-b2c-reference-audit-logs/audit-logs-example.png)
4145

46+
The activity details panel contains the following relevant information:
47+
48+
|Section|Field|Description|
49+
|-------|-----|-----------|
50+
| Activity | Name | Which activity took place. For example, "Issue an id_token to the application" (which concludes the actual user sign-in). |
51+
| Initiated By (Actor) | ObjectId | The **Object ID** of the B2C application that the user is signing in to (this identifier is not visible in the Azure Portal but it's accessible via the Graph API for example). |
52+
| Initiated By (Actor) | Spn | The **Application ID** of the B2C application that the user is signing in to. |
53+
| Target(s) | ObjectId | The **Object ID** of the user that is signing in. |
54+
| Additional Details | TenantId | The **Tenant ID** of the Azure AD B2C tenant. |
55+
| Additional Details | PolicyId | The **Policy ID** of the user flow (policy) being used to sign the user in. |
56+
| Additional Details | ApplicationId | The **Application ID** of the B2C application that the user is signing in to. |
57+
4258
## Accessing audit logs through the Azure Portal
4359
1. Go to the [Azure portal](https://portal.azure.com). Make sure you are in your B2C directory.
4460
2. Click on **Azure Active Directory** in the favorites bar on the left
@@ -60,6 +76,9 @@ You will see a list of activities logged over the last seven days.
6076
- If you click on a specific row in the list, a contextual box on the right will show you additional attributes associated with the activity
6177
- Click on **Download** to download the activities as a csv file
6278

79+
> [!NOTE]
80+
> You can also see the audit logs by navigating to **Azure AD B2C** rather than **Azure Active Directory** in the favorites bar on the left. Under **Activities**, click on **Audit logs**, where you will find the same logs with similar filtering capabilities.
81+
6382
## Accessing audit logs through the Azure AD reporting API
6483
Audit logs are published to the same pipeline as other activities for Azure Active Directory, so they can be accessed through the [Azure Active Directory reporting API](https://docs.microsoft.com/azure/active-directory/active-directory-reporting-api-audit-reference).
6584

articles/active-directory-b2c/active-directory-b2c-reference-oauth-code.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ ms.topic: conceptual
1111
ms.date: 02/19/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
14+
ms.custom: fasttrack-edit
1415
---
1516

1617
# OAuth 2.0 authorization code flow in Azure Active Directory B2C
@@ -113,7 +114,9 @@ error=access_denied
113114
| state |See the full description in the preceding table. If a `state` parameter is included in the request, the same value should appear in the response. The app should verify that the `state` values in the request and response are identical. |
114115

115116
## 2. Get a token
116-
Now that you've acquired an authorization code, you can redeem the `code` for a token to the intended resource by sending a POST request to the `/token` endpoint. In Azure AD B2C, the only resource that you can request a token for is your app's own back-end web API. The convention that's used for requesting a token to yourself is to use your app's client ID as the scope:
117+
Now that you've acquired an authorization code, you can redeem the `code` for a token to the intended resource by sending a POST request to the `/token` endpoint. In Azure AD B2C, you can [request access tokens for other API's](active-directory-b2c-access-tokens.md#request-a-token) as usual by specifying their scope(s) in the request.
118+
119+
You can also request an access token for your app's own back-end Web API by convention of using the app's client ID as the requested scope (which will result in an access token with that client ID as the "audience"):
117120

118121
```
119122
POST fabrikamb2c.onmicrosoft.com/oauth2/v2.0/token?p=b2c_1_sign_in HTTP/1.1

0 commit comments

Comments
 (0)