Skip to content

Commit 51946a2

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-iotedge-109
2 parents 9a24003 + 1bad6ac commit 51946a2

File tree

545 files changed

+6375
-4482
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

545 files changed

+6375
-4482
lines changed

.openpublishing.publish.config.json

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -151,8 +151,37 @@
151151
"url": "https://github.com/Azure-Samples/functions-python-tensorflow-tutorial",
152152
"branch": "master",
153153
"branch_mapping": {}
154+
},
155+
{
156+
"path_to_root": "functions-quickstart-templates",
157+
"url": "https://github.com/Azure/azure-functions-templates",
158+
"branch": "dev"
159+
},
160+
{
161+
"path_to_root": "functions-docs-csharp",
162+
"url": "https://github.com/Azure-Samples/functions-docs-csharp",
163+
"branch": "master"
154164
},
155165
{
166+
"path_to_root": "functions-docs-javascript",
167+
"url": "https://github.com/Azure-Samples/functions-docs-javascript",
168+
"branch": "master"
169+
},
170+
{
171+
"path_to_root": "functions-docs-typescript",
172+
"url": "https://github.com/Azure-Samples/functions-docs-typescript",
173+
"branch": "master"
174+
},
175+
{
176+
"path_to_root": "functions-docs-python",
177+
"url": "https://github.com/Azure-Samples/functions-docs-python",
178+
"branch": "master"
179+
},
180+
{
181+
"path_to_root": "functions-docs-powershell",
182+
"url": "https://github.com/Azure-Samples/functions-docs-powershell",
183+
"branch": "master"
184+
}, {
156185
"path_to_root": "samples-personalizer",
157186
"url": "https://github.com/Azure-Samples/cognitive-services-personalizer-samples",
158187
"branch": "master"

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7263,6 +7263,26 @@
72637263
"redirect_url": "/azure/azure-functions/functions-create-first-azure-function-azure-cli",
72647264
"redirect_document_id": false
72657265
},
7266+
{
7267+
"source_path": "articles/azure-functions/functions-create-first-function-python.md",
7268+
"redirect_url": "/azure/azure-functions/functions-create-first-azure-function-azure-cli?pivots=programming-language-python",
7269+
"redirect_document_id": false
7270+
},
7271+
{
7272+
"source_path": "articles/azure-functions/functions-create-first-function-powershell.md",
7273+
"redirect_url": "/azure/azure-functions/functions-create-first-function-vs-code?pivots=programming-language-powershell",
7274+
"redirect_document_id": false
7275+
},
7276+
{
7277+
"source_path": "articles/azure-functions/functions-create-first-azure-function-azure-cli-linux.md",
7278+
"redirect_url": "/azure/azure-functions/functions-create-first-azure-function-azure-cli?pivots=programming-language-python",
7279+
"redirect_document_id": false
7280+
},
7281+
{
7282+
"source_path": "articles/azure-functions/functions-add-output-binding-storage-queue-python.md",
7283+
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-cli.md?pivots=programming-language-python",
7284+
"redirect_document_id": false
7285+
},
72667286
{
72677287
"source_path": "articles/azure-functions/create-visual-studio.md",
72687288
"redirect_url": "/azure/azure-functions/functions-create-your-first-function-visual-studio",

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/17/2020
12+
ms.date: 03/02/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -71,6 +71,7 @@ The following sections list available claim resolvers.
7171
| {OIDC:Prompt} | The `prompt` query string parameter. | login |
7272
| {OIDC:Resource} |The `resource` query string parameter. | N/A |
7373
| {OIDC:scope} |The `scope` query string parameter. | openid |
74+
| {OIDC:RedirectUri} |The `redirect_uri` query string parameter. | https://jwt.ms |
7475

7576
### Context
7677

@@ -81,7 +82,7 @@ The following sections list available claim resolvers.
8182
| {Context:DateTimeInUtc} |The date time in UTC. | 10/10/2018 12:00:00 PM |
8283
| {Context:DeploymentMode} |The policy deployment mode. | Production |
8384
| {Context:IPAddress} | The user IP address. | 11.111.111.11 |
84-
85+
| {Context:KMSI} | Indicates whether [Keep me signed in](custom-policy-keep-me-signed-in.md) checkbox is selected. | true |
8586

8687
### Non-protocol parameters
8788

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ If you don't yet have a SAML service provider and an associated metadata endpoin
5959

6060
## 1. Set up certificates
6161

62-
To build a trust relationship between your service provider and Azure AD B2C, you need to provide X509 certificates and their private keys.
62+
To build a trust relationship between your service provider and Azure AD B2C, you need to provide the web app X509 certificates.
6363

6464
* **Service provider certificates**
6565
* Certificate with a private key stored in your Web App. This certificate is used by your service provider to sign the SAML request sent to Azure AD B2C. Azure AD B2C reads the public key from the service provider metadata to validate the signature.

articles/active-directory-b2c/custom-policy-keep-me-signed-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Update the relying party (RP) file that initiates the user journey that you crea
6868
</UserJourneyBehaviors>
6969
```
7070

71-
- **SessionExpiryType** - Indicates how the session is extended by the time specified in `SessionExpiryInSeconds` and KeepAliveInDays. The `Rolling` value (default) indicates that the session is extended every time the user performs authentication. The `Absolute` value indicates that the user is forced to reauthenticate after the time period specified.
71+
- **SessionExpiryType** - Indicates how the session is extended by the time specified in `SessionExpiryInSeconds` and `KeepAliveInDays`. The `Rolling` value (default) indicates that the session is extended every time the user performs authentication. The `Absolute` value indicates that the user is forced to reauthenticate after the time period specified.
7272

7373
- **SessionExpiryInSeconds** - The lifetime of session cookies when *keep me signed in* is not enabled, or if a user does not select *keep me signed in*. The session expires after `SessionExpiryInSeconds` has passed, or the browser is closed.
7474

articles/active-directory/app-provisioning/provisioning-agent-release-version-history.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: reference
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 02/04/2020
15+
ms.date: 02/26/2020
1616
ms.subservice: app-provisioning
1717
ms.author: chmutali
1818

@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121
# Azure AD Connect Provisioning Agent: Version release history
2222
This article lists the versions and features of Azure Active Directory Connect Provisioning Agent that have been released. The Azure AD team regularly updates the Provisioning Agent with new features and functionality. The Provisioning Agent is updated automatically when a new version is released.
2323

24-
We recommend enabling auto update for your agents to ensure that you have the latest features and bug fixes. Microsoft provides direct support for the latest agent version and one version before.
24+
Microsoft provides direct support for the latest agent version and one version before.
2525

2626
## 1.1.96.0
2727

articles/active-directory/azuread-dev/howto-v1-enable-sso-android.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ If a compatible broker is installed on the device, like the Microsoft Authentica
5656

5757
#### How Microsoft ensures the application is valid
5858

59-
The need to ensure the identity of an application call the broker is crucial to the security provided in broker assisted logins. iOS and Android do not enforce unique identifiers that are valid only for a given application, so malicious applications may "spoof" a legitimate application's identifier and receive the tokens meant for the legitimate application. To ensure Microsoft is always communicating with the right application at runtime, the developer is asked to provide a custom redirectURI when registering their application with Microsoft. **How developers should craft this redirect URI is discussed in detail below.** This custom redirectURI contains the certificate thumbprint of the application and is ensured to be unique to the application by the Google Play Store. When an application calls the broker, the broker asks the Android operating system to provide it with the certificate thumbprint that called the broker. The broker provides this certificate thumbprint to Microsoft in the call to the identity system. If the certificate thumbprint of the application does not match the certificate thumbprint provided to us by the developer during registration, access is denied to the tokens for the resource the application is requesting. This check ensures that only the application registered by the developer receives tokens.
59+
The need to ensure the identity of an application calling the broker is crucial to the security provided in broker assisted logins. iOS and Android do not enforce unique identifiers that are valid only for a given application, so malicious applications may "spoof" a legitimate application's identifier and receive the tokens meant for the legitimate application. To ensure Microsoft is always communicating with the right application at runtime, the developer is asked to provide a custom redirectURI when registering their application with Microsoft. **How developers should craft this redirect URI is discussed in detail below.** This custom redirectURI contains the certificate thumbprint of the application and is ensured to be unique to the application by the Google Play Store. When an application calls the broker, the broker asks the Android operating system to provide it with the certificate thumbprint that called the broker. The broker provides this certificate thumbprint to Microsoft in the call to the identity system. If the certificate thumbprint of the application does not match the certificate thumbprint provided to us by the developer during registration, access is denied to the tokens for the resource the application is requesting. This check ensures that only the application registered by the developer receives tokens.
6060

6161
Brokered-SSO logins have the following benefits:
6262

articles/active-directory/azuread-dev/howto-v1-enable-sso-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ If a compatible broker is installed on the device, like the Microsoft Authentica
104104

105105
#### How we ensure the application is valid
106106

107-
The need to ensure the identity of an application call the broker is crucial to the security we provide in broker assisted logins. Neither iOS nor Android enforces unique identifiers that are valid only for a given application, so malicious applications may "spoof" a legitimate application's identifier and receive the tokens meant for the legitimate application. To ensure we are always communicating with the right application at runtime, we ask the developer to provide a custom redirectURI when registering their application with Microsoft. How developers should craft this redirect URI is discussed in detail below. This custom redirectURI contains the Bundle ID of the application and is ensured to be unique to the application by the Apple App Store. When an application calls the broker, the broker asks the iOS operating system to provide it with the Bundle ID that called the broker. The broker provides this Bundle ID to Microsoft in the call to our identity system. If the Bundle ID of the application does not match the Bundle ID provided to us by the developer during registration, we will deny access to the tokens for the resource the application is requesting. This check ensures that only the application registered by the developer receives tokens.
107+
The need to ensure the identity of an application that calls the broker is crucial to the security we provide in broker assisted logins. Neither iOS nor Android enforces unique identifiers that are valid only for a given application, so malicious applications may "spoof" a legitimate application's identifier and receive the tokens meant for the legitimate application. To ensure we are always communicating with the right application at runtime, we ask the developer to provide a custom redirectURI when registering their application with Microsoft. How developers should craft this redirect URI is discussed in detail below. This custom redirectURI contains the Bundle ID of the application and is ensured to be unique to the application by the Apple App Store. When an application calls the broker, the broker asks the iOS operating system to provide it with the Bundle ID that called the broker. The broker provides this Bundle ID to Microsoft in the call to our identity system. If the Bundle ID of the application does not match the Bundle ID provided to us by the developer during registration, we will deny access to the tokens for the resource the application is requesting. This check ensures that only the application registered by the developer receives tokens.
108108

109109
**The developer has the choice whether the SDK calls the broker or uses the non-broker assisted flow.** However if the developer chooses not to use the broker-assisted flow they lose the benefit of using SSO credentials that the user may have already added on the device and prevents their application from being used with business features Microsoft provides its customers such as Conditional Access, Intune management capabilities, and certificate-based authentication.
110110

articles/active-directory/b2b/direct-federation.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 08/07/2019
9+
ms.date: 02/27/2019
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -61,6 +61,10 @@ If you specify the metadata URL in the identity provider settings, Azure AD will
6161

6262
### Limit on federation relationships
6363
Currently, a maximum of 1,000 federation relationships is supported. This limit includes both [internal federations](https://docs.microsoft.com/powershell/module/msonline/set-msoldomainfederationsettings?view=azureadps-1.0) and direct federations.
64+
65+
### Limit on multiple domains
66+
We don’t currently support direct federation with multiple domains from the same tenant.
67+
6468
## Frequently asked questions
6569
### Can I set up direct federation with a domain for which an unmanaged (email-verified) tenant exists?
6670
Yes. If the domain hasn't been verified and the tenant hasn't undergone an [admin takeover](../users-groups-roles/domains-admin-takeover.md), you can set up direct federation with that domain. Unmanaged, or email-verified, tenants are created when a user redeems a B2B invitation or performs a self-service sign-up for Azure AD using a domain that doesn’t currently exist. You can set up direct federation with these domains. If you try to set up direct federation with a DNS-verified domain, either in the Azure portal or via PowerShell, you'll see an error.

articles/active-directory/cloud-provisioning/how-to-automatic-upgrade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919
---
2020
# Azure AD Connect cloud provisioning agent: Automatic upgrade
2121

22-
Making sure your Azure Active Directory (Azure AD) Connect cloud provisioning agent installation is always up to date is easy with the automatic upgrade feature. This feature is enabled by default and can't be disabled.
22+
Making sure your Azure Active Directory (Azure AD) Connect cloud provisioning agent installation is always up to date is easy with the automatic upgrade feature.
2323

2424
The agent is installed here: "Program files\Azure AD Connect Provisioning Agent\AADConnectProvisioningAgent.exe"
2525

0 commit comments

Comments
 (0)