Skip to content

Commit 51a4bb1

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-ignite-disk-bursting
2 parents d64dd7b + efbc861 commit 51a4bb1

File tree

977 files changed

+9721
-2655
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

977 files changed

+9721
-2655
lines changed

.openpublishing.redirection.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36168,6 +36168,46 @@
3616836168
"redirect_url": "/azure/key-vault/vs-key-vault-add-connected-service",
3616936169
"redirect_document_id": false
3617036170
},
36171+
{
36172+
"source_path": "articles/iot-central/core/howto-create-event-rules-pnp.md",
36173+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36174+
"redirect_document_id": false
36175+
},
36176+
{
36177+
"source_path": "articles/iot-central/core/howto-create-telemetry-rules-pnp.md",
36178+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36179+
"redirect_document_id": false
36180+
},
36181+
{
36182+
"source_path": "articles/iot-central/core/tutorial-configure-rules-pnp.md",
36183+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36184+
"redirect_document_id": false
36185+
},
36186+
{
36187+
"source_path": "articles/iot-central/core/tutorial-monitor-devices-pnp.md",
36188+
"redirect_url": "/azure/iot-central/core/quick-monitor-devices-pnp",
36189+
"redirect_document_id": false
36190+
},
36191+
{
36192+
"source_path": "articles/iot-central/tutorial-add-device-pnp.md",
36193+
"redirect_url": "/azure/iot-central/quick-create-pnp-device-pnp",
36194+
"redirect_document_id": false
36195+
},
36196+
{
36197+
"source_path": "articles/iot-central/tutorial-define-device-type-pnp.md",
36198+
"redirect_url": "/azure/iot-central/quick-create-pnp-device-pnp",
36199+
"redirect_document_id": false
36200+
},
36201+
{
36202+
"source_path": "articles/iot-central/howto-export-data-blob-storage-pnp.md",
36203+
"redirect_url": "/azure/iot-central/howto-export-data-pnp",
36204+
"redirect_document_id": false
36205+
},
36206+
{
36207+
"source_path": "articles/iot-central/howto-export-data-event-hubs-service-bus-pnp.md",
36208+
"redirect_url": "/azure/iot-central/howto-export-data-pnp",
36209+
"redirect_document_id": false
36210+
},
3617136211
{
3617236212
"source_path": "articles/iot-central/howto-generate-connection-string.md",
3617336213
"redirect_url": "/azure/iot-central",

articles/active-directory-b2c/active-directory-b2c-how-to-enable-billing.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -41,14 +41,14 @@ Here's how to make the switch to MAU billing for an existing Azure AD B2C resour
4141

4242
1. Sign in to the [Azure portal](https://portal.azure.com) as the subscription owner.
4343
1. Select the **Directory + subscription** filter in the top menu, and then select the Azure AD B2C directory that you want to upgrade to MAU billing.<br/>
44-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-01-select-b2c-directory.png" alt-text="Directory and subscription filter in Azure portal":::
44+
![Directory and subscription filter in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-01-select-b2c-directory.png)
4545
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
4646
1. On the **Overview** page of the Azure AD B2C tenant, select the link under **Resource name**. You're directed to the Azure AD B2C resource in your Azure AD tenant.<br/>
47-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-02-b2c-resource-link.png" alt-text="Azure AD B2C resource link highlighted in Azure portal":::
47+
![Azure AD B2C resource link highlighted in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-02-b2c-resource-link.png)
4848
1. On the **Overview** page of the Azure AD B2C resource, under **Billable Units**, select the **Per Authentication (Change to MAU)** link.<br/>
49-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-03-change-to-mau-link.png" alt-text="Change to MAU link highlighted in Azure portal":::
49+
![Change to MAU link highlighted in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-03-change-to-mau-link.png)
5050
1. Select **Confirm** to complete the upgrade to MAU billing.<br/>
51-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-04-confirm-change-to-mau.png" alt-text="MAU-based billing confirmation dialog in Azure portal":::
51+
![MAU-based billing confirmation dialog in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-04-confirm-change-to-mau.png)
5252

5353
### What to expect when you transition to MAU billing from per-authentication billing
5454

articles/active-directory/develop/quickstart-v2-android.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.date: 09/16/2019
1717
ms.author: twhitney
18-
ms.custom: aaddev, identityplatformtop40
18+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:Android
1919
#Customer intent: As an application developer, I want to learn how Android native apps can call protected APIs that require login and access tokens using the Microsoft identity platform endpoint.
2020
ms.collection: M365-identity-device-management
2121
---

articles/active-directory/develop/quickstart-v2-aspnet-webapp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.tgt_pltfrm: na
1616
ms.workload: identity
1717
ms.date: 04/11/2019
1818
ms.author: jmprieur
19-
ms.custom: aaddev, identityplatformtop40
19+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:ASP.NET
2020
#Customer intent: As an application developer, I want to know how to write an ASP.NET web app that can sign in personal accounts, as well as work and school accounts from any Azure Active Directory instance.
2121
ms.collection: M365-identity-device-management
2222
---

articles/active-directory/develop/quickstart-v2-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.workload: identity
1616
ms.date: 09/24/2019
1717
ms.author: twhitney
1818
ms.reviewer: jmprieur, saeeda
19-
ms.custom: aaddev, identityplatformtop40
19+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:iOS
2020
#Customer intent: As an application developer, I want to learn how to sign in users and call Microsoft Graph from my iOS or macOS application.
2121
ms.collection: M365-identity-device-management
2222
---

articles/active-directory/develop/quickstart-v2-java-webapp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.date: 10/09/2019
1717
ms.author: sagonzal
18-
ms.custom: aaddev
18+
ms.custom: aaddev, scenarios:getting-started, languages:Java
1919
---
2020

2121
# Quickstart: Add sign-in with Microsoft to a Java web app

articles/active-directory/develop/quickstart-v2-javascript.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.tgt_pltfrm: na
1616
ms.workload: identity
1717
ms.date: 04/11/2019
1818
ms.author: nacanuma
19-
ms.custom: aaddev, identityplatformtop40
19+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:JavaScript
2020

2121
#Customer intent: As an app developer, I want to learn how to get access tokens by using the Microsoft identity platform endpoint so that my JavaScript app can sign in users of personal accounts, work accounts, and school accounts.
2222
ms.collection: M365-identity-device-management

articles/active-directory/develop/quickstart-v2-python-daemon.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.tgt_pltfrm: na
1616
ms.workload: identity
1717
ms.date: 10/22/2019
1818
ms.author: jmprieur
19-
ms.custom: aaddev, identityplatformtop40
19+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:Python
2020
#Customer intent: As an application developer, I want to learn how my Python app can get an access token and call an API that's protected by an Microsoft identity platform endpoint using client credentials flow.
2121
ms.collection: M365-identity-device-management
2222
---

articles/active-directory/develop/quickstart-v2-uwp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.tgt_pltfrm: na
1616
ms.workload: identity
1717
ms.date: 07/16/2019
1818
ms.author: jmprieur
19-
ms.custom: aaddev, identityplatformtop40
19+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:UWP
2020
#Customer intent: As an application developer, I want to learn how my Universal Windows Platform (XAML) application can get an access token and call an API that's protected by an Microsoft identity platform endpoint.
2121
ms.collection: M365-identity-device-management
2222
---
@@ -180,4 +180,4 @@ Try out the Windows desktop tutorial for a complete step-by-step guide on buildi
180180
Help us improve the Microsoft identity platform. Tell us what you think by completing a short two-question survey.
181181

182182
> [!div class="nextstepaction"]
183-
> [Microsoft identity platform survey](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRyKrNDMV_xBIiPGgSvnbQZdUQjFIUUFGUE1SMEVFTkdaVU5YT0EyOEtJVi4u)
183+
> [Microsoft identity platform survey](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRyKrNDMV_xBIiPGgSvnbQZdUQjFIUUFGUE1SMEVFTkdaVU5YT0EyOEtJVi4u)

articles/active-directory/develop/tutorial-v2-android.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,9 @@ ms.collection: M365-identity-device-management
2121

2222
# Sign in users and call the Microsoft Graph from an Android app
2323

24+
> [!NOTE]
25+
> This tutorial has not yet been updated to work with MSAL for Android version 1.0 library. It works with an earlier version, as configured in this tutorial.
26+
2427
In this tutorial, you'll learn how to integrate an Android app with the Microsoft identity platform. Your app will sign in a user, get an access token to call the Microsoft Graph API, and make a request to the Microsoft Graph API.
2528

2629
When you've completed the guide, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory.
@@ -173,7 +176,7 @@ This tutorial will create a new project. If you want to download the completed t
173176

174177
```gradle
175178
implementation 'com.android.volley:volley:1.1.1'
176-
implementation 'com.microsoft.identity.client:msal:1.0.+'
179+
implementation 'com.microsoft.identity.client:msal:0.3+'
177180
```
178181

179182
### Use MSAL

0 commit comments

Comments
 (0)