Skip to content

Commit 51b7e30

Browse files
committed
2 parents af2fee5 + c55139d commit 51b7e30

File tree

252 files changed

+2569
-1791
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

252 files changed

+2569
-1791
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48545,6 +48545,11 @@
4854548545
"source_path": "articles/virtual-machines/linux/ansible-manage-linux-vm.md",
4854648546
"redirect_url": "/azure/ansible/ansible-manage-linux-vm",
4854748547
"redirect_document_id": false
48548+
},
48549+
{
48550+
"source_path": "articles/app-service/containers/tutorial-java-enterprise-postgresql-app.md",
48551+
"redirect_url": "/azure/app-service/containers/configure-language-java",
48552+
"redirect_document_id": false
4854848553
}
4854948554
]
4855048555
}

articles/active-directory-b2c/string-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -519,9 +519,9 @@ Clean the value of a given claim.
519519

520520
| Item | TransformationClaimType | Data Type | Notes |
521521
| ---- | ----------------------- | --------- | ----- |
522-
| OutputClaim | claim_to_null | string | The claim its value to be NULL. |
522+
| OutputClaim | claim_to_null | string | The claim's value is set to NULL. |
523523

524-
Use this claim transformation to remove unnecessary data from the claims property bag. So, the session cookie will be smaller. The following example removes the value of the `TermsOfService` claim type.
524+
Use this claim transformation to remove unnecessary data from the claims property bag so the session cookie will be smaller. The following example removes the value of the `TermsOfService` claim type.
525525

526526
```XML
527527
<ClaimsTransformation Id="SetTOSToNull" TransformationMethod="NullClaim">

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 121 additions & 11 deletions
Large diffs are not rendered by default.

articles/active-directory/cloud-provisioning/tutorial-pilot-aadc-aadccp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ Same steps need to be followed for all object types (user, group and contact). R
9595
2. On the **Description** page, enter the following and click **Next**:
9696

9797
**Name:** Give the rule a meaningful name<br>
98-
**Description:** Add a meaningful description<br>
98+
**Description:** Add a meaningful description<br>
9999
**Connected System:** Choose the AAD connector that you are writing the custom sync rule for<br>
100100
**Connected System Object Type:** User<br>
101101
**Metaverse Object Type:** Person<br>

articles/active-directory/develop/active-directory-configurable-token-lifetimes.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,14 @@ services: active-directory
66
author: rwike77
77
manager: CelesteDG
88

9-
ms.assetid: 06f5b317-053e-44c3-aaaa-cf07d8692735
109
ms.service: active-directory
1110
ms.subservice: develop
1211
ms.workload: identity
1312
ms.topic: conceptual
14-
ms.date: 10/07/2019
13+
ms.date: 02/19/2020
1514
ms.author: ryanwi
16-
ms.custom: aaddev, annaba, identityplatformtop40
17-
ms.reviewer: hirsin
15+
ms.custom: aaddev, identityplatformtop40
16+
ms.reviewer: hirsin, jlu, annaba
1817
---
1918
# Configurable token lifetimes in Azure Active Directory (Preview)
2019

@@ -28,9 +27,8 @@ In Azure AD, a policy object represents a set of rules that are enforced on indi
2827
You can designate a policy as the default policy for your organization. The policy is applied to any application in the organization, as long as it is not overridden by a policy with a higher priority. You also can assign a policy to specific applications. The order of priority varies by policy type.
2928

3029
> [!NOTE]
31-
> Configurable token lifetime policy is not supported for SharePoint Online. Even though you have the ability to create this policy via PowerShell, SharePoint Online will not acknowledge this policy. Refer to the [SharePoint Online blog](https://techcommunity.microsoft.com/t5/SharePoint-Blog/Introducing-Idle-Session-Timeout-in-SharePoint-and-OneDrive/ba-p/119208) to learn more about configuring idle session timeouts.
32-
>* The default lifetime for the SharePoint Online access token is 1 hour.
33-
>* The default max inactive time of the SharePoint Online refresh token is 90 days.
30+
> Configurable token lifetime policy only applies to mobile and desktop clients that access SharePoint Online and OneDrive for Business resources, and does not apply to web browser sessions.
31+
> To manage the lifetime of web browser sessions for SharePoint Online and OneDrive for Business, use the [Conditional Access session lifetime](../conditional-access/howto-conditional-access-session-lifetime.md) feature. Refer to the [SharePoint Online blog](https://techcommunity.microsoft.com/t5/SharePoint-Blog/Introducing-Idle-Session-Timeout-in-SharePoint-and-OneDrive/ba-p/119208) to learn more about configuring idle session timeouts.
3432
3533
## Token types
3634

articles/active-directory/manage-apps/application-proxy-configure-single-sign-on-on-premises-apps.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -38,17 +38,15 @@ The protocol diagrams below describe the single sign-on sequence for both a serv
3838

3939
1. In the Azure portal, select **Azure Active Directory > Enterprise applications** and select **New application**.
4040

41-
2. In the **On-premises applications** section, select **Add an on-premises application**.
41+
2. Enter the display name for your new application, select **Integrate any other application you don't find in the gallery**, then select **Create**.
4242

43-
3. Enter the display name for your new application, and then select **Add**.
43+
3. On the app's **Overview** page, select **Single sign-on**.
4444

45-
4. On the app's **Overview** page, select **Single sign-on**.
45+
4. Select **SAML** as the single sign-on method.
4646

47-
5. Select **SAML** as the single sign-on method.
47+
5. First set up SAML SSO to work while on the corporate network. In the **Set up Single Sign-On with SAML** page, go to the **Basic SAML Configuration** heading and select its **Edit** icon (a pencil). Follow the steps in [Enter basic SAML configuration](configure-single-sign-on-non-gallery-applications.md#step-1-edit-the-basic-saml-configuration) to configure SAML-based authentication for the application.
4848

49-
6. First set up SAML SSO to work while on the corporate network. In the **Set up Single Sign-On with SAML** page, go to the **Basic SAML Configuration** heading and select its **Edit** icon (a pencil). Follow the steps in [Enter basic SAML configuration](configure-single-sign-on-non-gallery-applications.md#step-1-edit-the-basic-saml-configuration) to configure SAML-based authentication for the application.
50-
51-
7. Add at least one user to the application and make sure the test account has access to the application. While connected to the corporate network, use the test account to see if you have single sign-on to the application.
49+
6. Add at least one user to the application and make sure the test account has access to the application. While connected to the corporate network, use the test account to see if you have single sign-on to the application.
5250

5351
> [!NOTE]
5452
> After you set up Application Proxy, you'll come back and update the SAML **Reply URL**.
@@ -71,7 +69,7 @@ Before you can provide SSO for on-premises applications, you need to enable Appl
7169

7270
1. With the application still open in the Azure portal, select **Single sign-on**.
7371

74-
2. In the **Set up Single Sign-On with SAML** page, go to the **Basic SAML Configuration** heading and select its **Edit** icon (a pencil). The **External URL** you configured in Application Proxy automatically populates the **Identifier**, **Reply URL**, and **Logout URL** fields. Don't edit these URLs because they are required for Application Proxy to work correctly.
72+
2. In the **Set up Single Sign-On with SAML** page, go to the **Basic SAML Configuration** heading and select its **Edit** icon (a pencil). Make sure the **External URL** you configured in Application Proxy is populated in the **Identifier**, **Reply URL**, and **Logout URL** fields. These URLs are required for Application Proxy to work correctly.
7573

7674
3. Edit the **Reply URL** configured earlier so that its domain is reachable by Application Proxy. For example, if your **External URL** is `https://contosotravel-f128.msappproxy.net` and the original **Reply URL** was `https://contosotravel.com/acs`, you'll need to update the original **Reply URL** to `https://contosotravel-f128.msappproxy.net/acs`.
7775

articles/active-directory/user-help/user-help-auth-app-faq.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.workload: identity
1111
ms.subservice: user-help
1212
ms.topic: conceptual
13-
ms.date: 01/16/2020
13+
ms.date: 02/18/2020
1414
ms.author: curtand
1515
ms.reviewer: olhaun
1616
---
@@ -48,6 +48,7 @@ The Microsoft Authenticator app replaced the Azure Authenticator app, and is the
4848
| Why am I getting notifications about my account activity? | To help keep you more informed about what's going on with your personal Microsoft account, we're sending activity notifications to your Microsoft Authenticator app. These notifications appear immediately after something changes, helping to keep you more secure. We previously sent these notifications through email and SMS, and have now expanded to include the app. For more information about these activity notifications, see [What happens if there's an unusual sign-in to your account](https://support.microsoft.com/help/13967/microsoft-account-unusual-sign-in). To change where you receive your notifications, sign in to the [Where can we contact you with non-critical account alerts](https://account.live.com/SecurityNotifications/Update) page of your account. |
4949
| While signing in to my work or school account using the default mail app that comes with iOS, I get prompted by the Microsoft Authenticator app for my security verification information. After I enter that information and return to the mail app, I get an error. What can I do? | This most-likely happens because your sign-in and your mail app are occurring across two different apps, causing the initial background sign-in process to stop working and to fail. To try to fix this, we recommend you select the **Safari** icon on the bottom right side of the screen while signing in to your mail app. By moving to Safari, the whole sign-in process happens in a single app, allowing you to sign in to the app successfully. |
5050
| My one-time password (OTP) codes are not working. What should I do? | Make sure the date and time on your device are correct and are being automatically synced. If the date and time is wrong, or out of sync, the code won’t work. |
51+
| The Windows 10 Mobile operating system was deprecated December 2019. Will the Microsoft Authenticator on Windows Mobile operating systems be deprecated as well? | The Microsoft Authenticator app on all Windows Mobile operating systems will not be supported after Feb 28, 2020. Users will not be eligible for receiving any new updates to the app post the aforementioned date. After Feb 28, 2020 Microsoft services that currently support authentications using the Microsoft Authenticator on all Windows Mobile operating systems will begin to retire their support. In order to authenticate into Microsoft services, we strongly encourage all our users to switch to an alternate authentication mechanism prior to this date. |
5152

5253
## Next steps
5354

articles/analysis-services/analysis-services-datasource.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Describes data sources and connectors supported for tabular 1200 an
44
author: minewiskan
55
ms.service: azure-analysis-services
66
ms.topic: conceptual
7-
ms.date: 12/02/2019
7+
ms.date: 02/20/2019
88
ms.author: owend
99
ms.reviewer: minewiskan
1010

@@ -18,7 +18,7 @@ Data sources and connectors shown in Get Data or Table Import Wizard in Visual S
1818
|Data source |In-memory |DirectQuery |Notes |
1919
|---------|---------|---------|---------|
2020
|Azure SQL Database | Yes | Yes |<sup>[2](#azprovider)</sup>, <sup>[3](#azsqlmanaged)</sup>|
21-
|Azure SQL Data Warehouse | Yes | Yes |<sup>[2](#azprovider)</sup>|
21+
|Azure Synapse Analytics (SQL Data Warehouse) | Yes | Yes |<sup>[2](#azprovider)</sup>|
2222
|Azure Blob Storage | Yes | No | <sup>[1](#tab1400a)</sup> |
2323
|Azure Table Storage | Yes | No | <sup>[1](#tab1400a)</sup>|
2424
|Azure Cosmos DB | Yes | No |<sup>[1](#tab1400a)</sup> |
@@ -115,7 +115,7 @@ For cloud data sources:
115115

116116
## OAuth credentials
117117

118-
For tabular models at the 1400 and higher compatibility level using in-memory mode, Azure SQL Database, Azure SQL Data Warehouse, Dynamics 365, and SharePoint List support OAuth credentials. Azure Analysis Services manages token refresh for OAuth data sources to avoid timeouts for long-running refresh operations. To generate valid tokens, set credentials by using SSMS.
118+
For tabular models at the 1400 and higher compatibility level using in-memory mode, Azure SQL Database, Azure Synapse Analytics (SQL Data Warehouse), Dynamics 365, and SharePoint List support OAuth credentials. Azure Analysis Services manages token refresh for OAuth data sources to avoid timeouts for long-running refresh operations. To generate valid tokens, set credentials by using SSMS.
119119

120120
Direct Query mode is not supported with OAuth credentials.
121121

articles/analysis-services/analysis-services-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Azure Analysis Services, a fully managed platform as a
44
author: minewiskan
55
ms.service: azure-analysis-services
66
ms.topic: overview
7-
ms.date: 01/17/2020
7+
ms.date: 02/20/2020
88
ms.author: owend
99
ms.reviewer: minewiskan
1010
#Customer intent: As a BI developer, I want to determine if Azure Analysis Services is the best data modeling platform for our organization.
@@ -134,7 +134,7 @@ Azure Analysis Services is compatible with many great features already in SQL Se
134134

135135
Tabular models in both in-memory and DirectQuery modes are supported. In-memory mode (default) tabular models support multiple data sources. Because model data is highly compressed and cached in-memory, this mode provides the fastest query response over large amounts of data. It also provides the greatest flexibility for complex datasets and queries. Partitioning enables incremental loads, increases parallelization, and reduces memory consumption. Other advanced data modeling features like calculated tables, and all DAX functions are supported. In-memory models must be refreshed (processed) to update cached data from data sources. With Azure service principal support, unattended refresh operations using PowerShell, TOM, TMSL and REST offer flexibility in making sure your model data is always up to date.
136136

137-
DirectQuery mode* leverages the backend relational database for storage and query execution. Extremely large data sets in single SQL Server, SQL Server Data Warehouse, Azure SQL Database, Azure SQL Data Warehouse, Oracle, and Teradata data sources are supported. Backend data sets can exceed available server resource memory. Complex data model refresh scenarios aren't needed. There are also some restrictions, such as limited data source types, DAX formula limitations, and some advanced data modeling features aren't supported. Before determining the best mode for you, see [Direct Query mode](https://docs.microsoft.com/analysis-services/tabular-models/directquery-mode-ssas-tabular).
137+
DirectQuery mode* leverages the backend relational database for storage and query execution. Extremely large data sets in single SQL Server, SQL Server Data Warehouse, Azure SQL Database, Azure Synapse Analytics (SQL Data Warehouse), Oracle, and Teradata data sources are supported. Backend data sets can exceed available server resource memory. Complex data model refresh scenarios aren't needed. There are also some restrictions, such as limited data source types, DAX formula limitations, and some advanced data modeling features aren't supported. Before determining the best mode for you, see [Direct Query mode](https://docs.microsoft.com/analysis-services/tabular-models/directquery-mode-ssas-tabular).
138138

139139
\* Feature availability depends on tier.
140140

articles/analysis-services/analysis-services-service-principal.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to create a service principal for automating Azure Analys
44
author: minewiskan
55
ms.service: azure-analysis-services
66
ms.topic: conceptual
7-
ms.date: 02/14/2020
7+
ms.date: 02/18/2020
88
ms.author: owend
99
ms.reviewer: minewiskan
1010

@@ -16,6 +16,8 @@ Service principals are an Azure Active Directory application resource you create
1616

1717
In Analysis Services, service principals are used with Azure Automation, PowerShell unattended mode, custom client applications, and web apps to automate common tasks. For example, provisioning servers, deploying models, data refresh, scale up/down, and pause/resume can all be automated by using service principals. Permissions are assigned to service principals through role membership, much like regular Azure AD UPN accounts.
1818

19+
Analysis Services also supports operations performed by managed identities using service principals. To learn more, see [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md) and [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-analysis-services).
20+
1921
## Create service principals
2022

2123
Service principals can be created in the Azure portal or by using PowerShell. To learn more, see:

0 commit comments

Comments
 (0)