Skip to content

Commit 53808a4

Browse files
committed
1614298, fixed a merge conflict.
2 parents 745cdac + 7b989c8 commit 53808a4

File tree

792 files changed

+3108
-8503
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

792 files changed

+3108
-8503
lines changed

.openpublishing.redirection.json

Lines changed: 185 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1220,6 +1220,61 @@
12201220
"redirect_url": "/azure/machine-learning/service/how-to-configure-environment",
12211221
"redirect_document_id": false
12221222
},
1223+
{
1224+
"source_path": "articles/frontdoor/waf-faq.md",
1225+
"redirect_url": "/azure/web-application-firewall/afds/waf-faq",
1226+
"redirect_document_id": false
1227+
},
1228+
{
1229+
"source_path": "articles/frontdoor/waf-front-door-rate-limit-powershell.md",
1230+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-rate-limit-powershell",
1231+
"redirect_document_id": false
1232+
},
1233+
{
1234+
"source_path": "articles/frontdoor/waf-front-door-configure-ip-restriction.md",
1235+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-configure-ip-restriction",
1236+
"redirect_document_id": false
1237+
},
1238+
{
1239+
"source_path": "articles/frontdoor/waf-front-door-configure-custom-response-code.md",
1240+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-configure-custom-response-code",
1241+
"redirect_document_id": false
1242+
},
1243+
{
1244+
"source_path": "articles/frontdoor/waf-front-door-policy-configure-bot-protection.md",
1245+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-policy-configure-bot-protection",
1246+
"redirect_document_id": false
1247+
},
1248+
{
1249+
"source_path": "articles/frontdoor/waf-front-door-custom-rules-powershell.md",
1250+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-custom-rules-powershell",
1251+
"redirect_document_id": false
1252+
},
1253+
{
1254+
"source_path": "articles/frontdoor/waf-front-door-create-portal.md",
1255+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-create-portal",
1256+
"redirect_document_id": false
1257+
},
1258+
{
1259+
"source_path": "articles/frontdoor/waf-front-door-monitor.md",
1260+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-monitor",
1261+
"redirect_document_id": false
1262+
},
1263+
{
1264+
"source_path": "articles/frontdoor/waf-front-door-policy-settings.md",
1265+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-policy-settings",
1266+
"redirect_document_id": false
1267+
},
1268+
{
1269+
"source_path": "articles/frontdoor/waf-front-door-custom-rules.md",
1270+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-custom-rules",
1271+
"redirect_document_id": false
1272+
},
1273+
{
1274+
"source_path": "articles/frontdoor/waf-overview.md",
1275+
"redirect_url": "/azure/web-application-firewall/afds/afds-overview",
1276+
"redirect_document_id": false
1277+
},
12231278
{
12241279
"source_path": "articles/frontdoor/front-door-powershell-reference.md",
12251280
"redirect_url": "/powershell/module/azurerm.frontdoor",
@@ -34903,6 +34958,11 @@
3490334958
"redirect_url": "/azure/cognitive-services/Bing-Image-Search/language-support",
3490434959
"redirect_document_id": true
3490534960
},
34961+
{
34962+
"source_path": "articles/machine-learning/service/machine-learning-interpretability-explainability.md",
34963+
"redirect_url": "/azure/machine-learning/service/how-to-machine-learning-interpretability",
34964+
"redirect_document_id": true
34965+
},
3490634966
{
3490734967
"source_path": "articles/active-directory/identity-protection/overview-v2.md",
3490834968
"redirect_url": "/azure/active-directory/identity-protection/overview-identity-protection",
@@ -43827,6 +43887,131 @@
4382743887
"source_path": "articles/security/fundamentals/azure-log-integration-faq.md",
4382843888
"redirect_url": "/previous-versions/azure/security/fundamentals/azure-log-integration-faq",
4382943889
"redirect_document_id": false
43890+
},
43891+
{
43892+
"source_path": "articles/security/blueprints/au-protected-iaaswa-overview.md",
43893+
"redirect_url": "/previous-versions/azure/security/blueprints/au-protected-iaaswa-overview",
43894+
"redirect_document_id": false
43895+
},
43896+
{
43897+
"source_path": "articles/security/blueprints/au-protected-paaswa-overview.md",
43898+
"redirect_url": "/previous-versions/azure/security/blueprints/au-protected-paaswa-overview",
43899+
"redirect_document_id": false
43900+
},
43901+
{
43902+
"source_path": "articles/security/blueprints/azure-health.md",
43903+
"redirect_url": "/previous-versions/azure/security/blueprints/azure-health",
43904+
"redirect_document_id": false
43905+
},
43906+
{
43907+
"source_path": "articles/security/blueprints/fedramp-analytics-overview.md",
43908+
"redirect_url": "/previous-versions/azure/security/blueprints/fedramp-analytics-overview",
43909+
"redirect_document_id": false
43910+
},
43911+
{
43912+
"source_path": "articles/security/blueprints/fedramp-datawarehouse-overview.md",
43913+
"redirect_url": "/previous-versions/azure/security/blueprints/fedramp-datawarehouse-overview",
43914+
"redirect_document_id": false
43915+
},
43916+
{
43917+
"source_path": "articles/security/blueprints/fedramp-iaaswa-overview.md",
43918+
"redirect_url": "/previous-versions/azure/security/blueprints/fedramp-iaaswa-overview",
43919+
"redirect_document_id": false
43920+
},
43921+
{
43922+
"source_path": "articles/security/blueprints/fedramp-paaswa-overview.md",
43923+
"redirect_url": "/previous-versions/azure/security/blueprints/fedramp-paaswa-overview",
43924+
"redirect_document_id": false
43925+
},
43926+
{
43927+
"source_path": "articles/security/blueprints/ffiec-analytics-overview.md",
43928+
"redirect_url": "/previous-versions/azure/security/blueprints/ffiec-analytics-overview",
43929+
"redirect_document_id": false
43930+
},
43931+
{
43932+
"source_path": "articles/security/blueprints/ffiec-dw-overview.md",
43933+
"redirect_url": "/previous-versions/azure/security/blueprints/ffiec-dw-overview",
43934+
"redirect_document_id": false
43935+
},
43936+
{
43937+
"source_path": "articles/security/blueprints/ffiec-iaaswa-overview.md",
43938+
"redirect_url": "/previous-versions/azure/security/blueprints/ffiec-iaaswa-overview",
43939+
"redirect_document_id": false
43940+
},
43941+
{
43942+
"source_path": "articles/security/blueprints/ffiec-paaswa-overview.md",
43943+
"redirect_url": "/previous-versions/azure/security/blueprints/ffiec-paaswa-overview",
43944+
"redirect_document_id": false
43945+
},
43946+
{
43947+
"source_path": "articles/security/blueprints/nist171-analytics-overview.md",
43948+
"redirect_url": "/previous-versions/azure/security/blueprints/nist171-analytics-overview",
43949+
"redirect_document_id": false
43950+
},
43951+
{
43952+
"source_path": "articles/security/blueprints/nist171-datawarehouse-overview.md",
43953+
"redirect_url": "/previous-versions/azure/security/blueprints/nist171-datawarehouse-overview",
43954+
"redirect_document_id": false
43955+
},
43956+
{
43957+
"source_path": "articles/security/blueprints/nist171-iaaswa-overview.md",
43958+
"redirect_url": "/previous-versions/azure/security/blueprints/nist171-iaaswa-overview",
43959+
"redirect_document_id": false
43960+
},
43961+
{
43962+
"source_path": "articles/security/blueprints/nist171-paaswa-overview.md",
43963+
"redirect_url": "/previous-versions/azure/security/blueprints/nist171-paaswa-overview",
43964+
"redirect_document_id": false
43965+
},
43966+
{
43967+
"source_path": "articles/security/blueprints/pcidss-analytics-overview.md",
43968+
"redirect_url": "/previous-versions/azure/security/blueprints/pcidss-analytics-overview",
43969+
"redirect_document_id": false
43970+
},
43971+
{
43972+
"source_path": "articles/security/blueprints/pcidss-dw-overview.md",
43973+
"redirect_url": "/previous-versions/azure/security/blueprints/pcidss-dw-overview",
43974+
"redirect_document_id": false
43975+
},
43976+
{
43977+
"source_path": "articles/security/blueprints/pcidss-iaaswa-overview.md",
43978+
"redirect_url": "/previous-versions/azure/security/blueprints/pcidss-iaaswa-overview",
43979+
"redirect_document_id": false
43980+
},
43981+
{
43982+
"source_path": "articles/security/blueprints/pcidss-paaswa-overview.md",
43983+
"redirect_url": "/previous-versions/azure/security/blueprints/pcidss-paaswa-overview",
43984+
"redirect_document_id": false
43985+
},
43986+
{
43987+
"source_path": "articles/security/blueprints/uknhs-analytics-overview.md",
43988+
"redirect_url": "/previous-versions/azure/security/blueprints/uknhs-analytics-overview",
43989+
"redirect_document_id": false
43990+
},
43991+
{
43992+
"source_path": "articles/security/blueprints/uknhs-datawarehouse-overview.md",
43993+
"redirect_url": "/previous-versions/azure/security/blueprints/uknhs-datawarehouse-overview",
43994+
"redirect_document_id": false
43995+
},
43996+
{
43997+
"source_path": "articles/security/blueprints/uknhs-iaaswa-overview.md",
43998+
"redirect_url": "/previous-versions/azure/security/blueprints/uknhs-iaaswa-overview",
43999+
"redirect_document_id": false
44000+
},
44001+
{
44002+
"source_path": "articles/security/blueprints/uknhs-paaswa-overview.md",
44003+
"redirect_url": "/previous-versions/azure/security/blueprints/uknhs-paaswa-overview",
44004+
"redirect_document_id": false
44005+
},
44006+
{
44007+
"source_path": "articles/security/blueprints/ukofficial-iaaswa-overview.md",
44008+
"redirect_url": "/previous-versions/azure/security/blueprints/ukofficial-iaaswa-overview",
44009+
"redirect_document_id": false
44010+
},
44011+
{
44012+
"source_path": "articles/security/blueprints/ukofficial-paaswa-overview.md",
44013+
"redirect_url": "/previous-versions/azure/security/blueprints/ukofficial-paaswa-overview",
44014+
"redirect_document_id": false
4383044015
}
4383144016
]
4383244017
}

articles/active-directory/conditional-access/faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Policies are enforced for business-to-business (B2B) collaboration users. Howeve
2929

3030
Yes. A SharePoint Online policy also applies to OneDrive for Business.
3131

32-
## Why can’t I set a policy on client apps, like Word or Outlook?
32+
## Why can’t I set a policy directly on client apps, like Word or Outlook?
3333

3434
A Conditional Access policy sets requirements for accessing a service. It's enforced when authentication to that service occurs. The policy is not set directly on a client application. Instead, it is applied when a client calls a service. For example, a policy set on SharePoint applies to clients calling SharePoint. A policy set on Exchange applies to Outlook.
3535

articles/active-directory/develop/quickstart-v2-javascript.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -79,11 +79,12 @@ Select the option that's suitable to your development environment:
7979

8080
* (Optional) To run the project with the IIS server, [download the Visual Studio project](https://github.com/Azure-Samples/active-directory-javascript-graphapi-v2/archive/vsquickstart.zip). Extract the zip file to a local folder (for example, *C:\Azure-Samples*).
8181

82+
#### Step 3: Configure your JavaScript app
83+
8284
> [!div renderon="docs"]
83-
> #### Step 3: Configure your JavaScript app
8485
> In the *JavaScriptSPA* folder, edit *index.html*, and set the `clientID` and `authority` values under `msalConfig`.
8586
86-
> [!div renderon="docs"]
87+
> [!div class="sxs-lookup" renderon="portal"]
8788
> In the *JavaScriptSPA* folder, edit *index.html*, and replace `msalConfig` with the following code:
8889
8990
```javascript
@@ -100,6 +101,10 @@ var msalConfig = {
100101
};
101102

102103
```
104+
> [!div renderon="portal"]
105+
> > [!NOTE]
106+
> > This quickstart supports Enter_the_Supported_Account_Info_Here.
107+
103108

104109
> [!div renderon="docs"]
105110
>
@@ -114,12 +119,7 @@ var msalConfig = {
114119
> > To find the values of **Application (client) ID**, **Directory (tenant) ID**, and **Supported account types**, go to the app's **Overview** page in the Azure portal.
115120
>
116121
117-
> [!div class="sxs-lookup" renderon="portal"]
118-
> #### Step 3: Your app is configured and ready to run
119-
> We have configured your project with values of your app's properties.
120-
121-
> [!div renderon="docs"]
122-
> #### Step 4: Run the project
122+
#### Step 4: Run the project
123123

124124
* If you're using [Node.js](https://nodejs.org/en/download/):
125125

articles/active-directory/fundamentals/add-users-azure-active-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818

1919
# Add or delete users using Azure Active Directory
20-
Add new users or delete existing users from your Azure Active Directory (Azure AD) organization.
20+
Add new users or delete existing users from your Azure Active Directory (Azure AD) organization. To add or delete users you must be a User administrator or Global administrator.
2121

2222
## Add a new user
2323
You can create a new user using the Azure Active Directory portal.

articles/active-directory/fundamentals/license-users-groups.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: fundamentals
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 09/18/2018
13+
ms.date: 09/06/2018
1414
ms.author: ajburnle
1515
ms.reviewer: jeffsta
1616
ms.custom: "it-pro, seodec18"
@@ -83,6 +83,8 @@ Make sure that anyone needing to use a licensed Azure AD service has the appropr
8383
1. Select **Assign**.
8484

8585
The user is added to the list of licensed users and has access to the included Azure AD services.
86+
> [!NOTE]
87+
> Licenses can also be assigned directly to a user from the user's **Licenses** page. If a user has a license assigned through a group membership and you want to assign the same license to the user directly, it can be done only from the **Products** page mentioned in step 1 only.
8688
8789
### To assign a license to a group
8890

articles/active-directory/fundamentals/whats-new-microsoft-365-government.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: What’s new for Azure Active Directory in Microsoft 365 Government - Azure Active Directory | Microsoft Docs
2+
title: What’s new for Azure AD in Microsoft 365 Government? | Microsoft Docs
33
description: Learn about some changes to Azure Active Directory (Azure AD) in the Microsoft 365 Government cloud instance, which might impact you.
44
services: active-directory
55
author: eross-msft

articles/active-directory/hybrid/how-to-connect-password-hash-synchronization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ When *EnforceCloudPasswordPolicyForPasswordSyncedUsers* is disabled (which is th
9595

9696
To enable the EnforceCloudPasswordPolicyForPasswordSyncedUsers feature, run the following command using the MSOnline PowerShell module:
9797

98-
`Set-MsolDirSyncFeature-FeatureEnforceCloudPasswordPolicyForPasswordSyncedUsers $true`
98+
`Set-MsolDirSyncFeature -Feature EnforceCloudPasswordPolicyForPasswordSyncedUsers -Enable $true`
9999

100100
Once enabled, Azure AD does not go to each synchronized user to remove the `DisablePasswordExpiration` value from the PasswordPolicies attribute. Instead, the value is set to `None` during the next password sync for each user when they next change their password in on-premises AD. 
101101

articles/active-directory/hybrid/plan-migrate-adfs-password-hash-sync.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ For more information about the **Location** condition in Conditional Access, see
157157

158158
When you join a device to Azure AD, you can create Conditional Access rules that enforce that devices meet your access standards for security and compliance. Also, users can sign in to a device by using an organizational work or school account instead of a personal account. When you use hybrid Azure AD-joined devices, you can join your Active Directory domain-joined devices to Azure AD. Your federated environment might have been set up to use this feature.
159159

160-
To ensure that hybrid join continues to work for any devices that are joined to the domain after your domains are converted to password hash synchronization, for Windows 10 clients, you must use Azure AD Connect device options to populate SCP and then sync Active Directory computer accounts to Azure AD.
160+
To ensure that hybrid join continues to work for any devices that are joined to the domain after your domains are converted to password hash synchronization, for Windows 10 clients, you must use Azure AD Connect device options to sync Active Directory computer accounts to Azure AD.
161161

162162
For Windows 8 and Windows 7 computer accounts, hybrid join uses seamless SSO to register the computer in Azure AD. You don't have to sync Windows 8 and Windows 7 computer accounts like you do for Windows 10 devices. However, you must deploy an updated workplacejoin.exe file (via an .msi file) to Windows 8 and Windows 7 clients so they can register themselves by using seamless SSO. [Download the .msi file](https://www.microsoft.com/download/details.aspx?id=53554).
163163

articles/active-directory/reports-monitoring/reference-sign-ins-error-codes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,7 @@ You can also programmatically access the sign-in data using the [reporting API](
124124
|50177|External challenge is not supported for passthrough users.|
125125
|50178|Session Control is not supported for passthrough users.|
126126
|50180|Windows Integrated authentication is needed. Enable the tenant for Seamless SSO.|
127+
|50181|OTP related failure during sign-in. |
127128
|50201|This message prompt interrupt will be shown to the user during login when additional information should be provided to user.|
128129
|51001|Domain Hint is not present with On-Premises Security Identifier - On-Premises UPN.|
129130
|51004|User account doesn’t exist in the directory.|

articles/active-directory/user-help/active-directory-passwords-reset-register.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Register for self-service password reset - Azure Active Directory | Microsoft Docs
3-
description: Register authentication data for Azure AD self-service password reset
2+
title: Register to reset your own password - Azure AD
3+
description: Register your authentication data for Azure AD self-service password reset, so you can reset your own password without administrator help.
44
services: active-directory
55
author: eross-msft
66
manager: daveba
@@ -16,7 +16,7 @@ ms.author: lizross
1616
ms.collection: M365-identity-device-management
1717
---
1818

19-
# Register for self-service password reset
19+
# Register to reset your own password
2020

2121
> [!IMPORTANT]
2222
> Are you here because you can't sign in? If so, see [Reset your work or school password](active-directory-passwords-update-your-own-password.md).

0 commit comments

Comments
 (0)