Skip to content

Commit 59994f0

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into v-dele-1387770-2
2 parents bf7bbd5 + e09cb9c commit 59994f0

File tree

667 files changed

+5264
-2674
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

667 files changed

+5264
-2674
lines changed

.openpublishing.redirection.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7949,6 +7949,11 @@
79497949
"redirect_url": "/azure/container-instances/container-instances-jenkins",
79507950
"redirect_document_id": false
79517951
},
7952+
{
7953+
"source_path": "articles/jenkins/java-deploy-webapp-tutorial.md",
7954+
"redirect_url": "/azure/jenkins/tutorial-jenkins-deploy-web-app-azure-app-service",
7955+
"redirect_document_id": false
7956+
},
79527957
{
79537958
"source_path": "articles/container-service/dcos-swarm/container-service-deployment.md",
79547959
"redirect_url": "/azure/container-service/dcos-swarm",
@@ -30720,6 +30725,41 @@
3072030725
"source_path": "articles/monitoring/monitoring-vminsights-optout.md",
3072130726
"redirect_url": "/azure/azure-monitor/insights/vminsights-optout",
3072230727
"redirect_document_id": "false"
30728+
},
30729+
{
30730+
"source_path": "articles/monitoring/monitoring-data-sources.md",
30731+
"redirect_url": "/azure/azure-monitor/platform/data-sources",
30732+
"redirect_document_id": "false"
30733+
},
30734+
{
30735+
"source_path": "articles/monitoring/monitoring-data-collection.md",
30736+
"redirect_url": "/azure/azure-monitor/platform/data-collection",
30737+
"redirect_document_id": "false"
30738+
},
30739+
{
30740+
"source_path": "articles/monitoring/monitoring-overview-azure-agents.md",
30741+
"redirect_url": "/azure/azure-monitor/platform/agents-overview",
30742+
"redirect_document_id": "false"
30743+
},
30744+
{
30745+
"source_path": "articles/monitoring/monitoring-runbook-datacollect.md",
30746+
"redirect_url": "/azure/azure-monitor/platform/runbook-datacollect",
30747+
"redirect_document_id": "false"
30748+
},
30749+
{
30750+
"source_path": "articles/monitoring/monitoring-service-map.md",
30751+
"redirect_url": "/azure/azure-monitor/insights/service-map",
30752+
"redirect_document_id": "false"
30753+
},
30754+
{
30755+
"source_path": "articles/monitoring/monitoring-service-map-configure.md",
30756+
"redirect_url": "/azure/azure-monitor/insights/service-map-configure",
30757+
"redirect_document_id": "false"
30758+
},
30759+
{
30760+
"source_path": "articles/monitoring/monitoring-service-map-scom.md",
30761+
"redirect_url": "/azure/azure-monitor/insights/service-map-scom",
30762+
"redirect_document_id": "false"
3072330763
}
3072430764
]
3072530765
}

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,10 +29,10 @@ In the following example, a claim type named `correlationId` is defined with a *
2929
</ClaimType>
3030
```
3131

32-
In the technical profile, map the claim resolver to the claim type. Azure AD B2C populates the value of the claim resolver `{context:corelationId}` into the claim `correlationId` and sends the claim to the technical profile.
32+
In the technical profile, map the claim resolver to the claim type. Azure AD B2C populates the value of the claim resolver `{Context:CorrelationId}` into the claim `correlationId` and sends the claim to the technical profile.
3333

3434
```XML
35-
<InputClaim ClaimTypeReferenceId="correlationId" DefaultValue="{context:corelationId}" />
35+
<InputClaim ClaimTypeReferenceId="correlationId" DefaultValue="{Context:CorrelationId}" />
3636
```
3737

3838
## Claim resolver types

articles/active-directory/develop/azure-ad-endpoint-comparison.md

Lines changed: 63 additions & 91 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/howto-add-terms-of-service-privacy-statement.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -60,10 +60,10 @@ When the terms of service and privacy statement are ready, you can add links to
6060

6161
Follow these steps if you registered your app in the Azure portal.
6262

63-
1. Sign in to the[Azure portal](https://portal.azure.com/).
64-
2. Navigate to the**App Registrations**section and select your app.
65-
3. Open the**Properties**section of the app.
66-
4. Fill out the**Terms of Service URL**and**Privacy Statement URL**fields.
63+
1. Sign in to the [Azure portal](https://portal.azure.com/).
64+
2. Navigate to the **App Registrations** section and select your app.
65+
3. Open the **Properties** section of the app.
66+
4. Fill out the **Terms of Service URL** and **Privacy Statement URL** fields.
6767
5. Save your changes.
6868

6969
![App properties section with terms of service and privacy statement URLs](./media/howto-add-terms-of-service-privacy-statement/azure-portal-terms-service-privacy-statement-urls.png)
@@ -72,9 +72,9 @@ Follow these steps if you registered your app in the Azure portal.
7272

7373
Follow these steps if you registered your app in the Application Registration Portal or Dev Center.
7474

75-
1. Sign in to the[Application Registration Portal](https://apps.dev.microsoft.com/).
76-
2. Select your app and scroll to the**Profile**section.
77-
3. Fill out the**Terms of Service URL**and**Privacy Statement URL**fields.
75+
1. Sign in to the [Application Registration Portal](https://apps.dev.microsoft.com/).
76+
2. Select your app and scroll to the **Profile** section.
77+
3. Fill out the **Terms of Service URL** and **Privacy Statement URL** fields.
7878
4. Save your changes.
7979

8080
![App profile section with terms of service and privacy statement URLs](./media/howto-add-terms-of-service-privacy-statement/app-registration-portal-profile-terms-service-privacy-statement-urls.png)
@@ -110,4 +110,4 @@ PATCH https://graph.microsoft.com/beta/applications/{application id}
110110

111111
> [!NOTE]
112112
> * Be careful not to overwrite any pre-existing values you have assigned to any of these fields: `supportUrl`, `marketingUrl`, and `logoUrl`
113-
> * The MSGraph beta REST API will only work when you sign in with an Azure AD account. Personal Microsoft accounts are not supported.
113+
> * The MSGraph beta REST API will only work when you sign in with an Azure AD account. Personal Microsoft accounts are not supported.

articles/active-directory/identity-protection/quickstart-sign-in-risk-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,6 @@ When no longer needed, delete the test user, the Tor Browser and disable the sig
119119

120120
- If you don't know how to delete an Azure AD user, see [How to add or delete users](../fundamentals/add-users-azure-active-directory.md#delete-a-user).
121121

122-
- For instructions to remove the Tor Browser, see [Uninstalling](https://tb-manual.torproject.org/en-US/uninstalling.html).
122+
- For instructions to remove the Tor Browser, see [Uninstalling](https://tb-manual.torproject.org/uninstalling/).
123123

124124

articles/active-directory/managed-identities-azure-resources/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,4 +72,4 @@ sections:
7272
- title: Command-Line
7373
html: <p><a href="/powershell/module/azurerm.managedserviceidentity#managed_service_identity">Azure PowerShell</a></p><p><a href="/cli/azure/identity">Azure CLI</a></p>
7474
- title: Languages
75-
html: <p><a href="/dotnet/api/microsoft.azure.management.resourcemanager.fluent.authentication#azure-dotnet">.NET</a></p><p><a href="https://github.com/Azure/azure-libraries-for-java#ready-to-run-code-samples-for-virtual-machines">Java</a></p><p><a href="/javascript/api/ms-rest-azure">Node​.js</a></p><p><a href="/python/api/azure.mgmt.msi">Python</a></p></p><a href="https://rubygems.org/gems/azure_mgmt_msi">Ruby</a></p></p><a href="https://godoc.org/github.com/Azure/azure-sdk-for-go/services/msi/mgmt/2015-08-31-preview/msi">Go</a></p>
75+
html: <p><a href="/dotnet/api/microsoft.azure.management.resourcemanager.fluent.authentication#azure-dotnet">.NET</a></p><p><a href="https://github.com/Azure/azure-libraries-for-java#ready-to-run-code-samples-for-virtual-machines">Java</a></p><p><a href="/javascript/api/ms-rest-azure">Node​.js</a></p><p><a href="/python/api/azure.mgmt.msi">Python</a></p></p><a href="https://rubygems.org/gems/azure_mgmt_msi">Ruby</a></p></p><a href="https://godoc.org/github.com/Azure/azure-sdk-for-go/services/preview/msi/mgmt/2015-08-31-preview/msi">Go</a></p>

articles/active-directory/saas-apps/kantegassoforbamboo-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: 'Tutorial: Azure Active Directory integration with Kantega SSO for Bamboo | Microsoft Docs'
33
description: Learn how to configure single sign-on between Azure Active Directory and Kantega SSO for Bamboo.
44
services: active-directory
@@ -120,7 +120,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
120120
In the **Sign-on URL** textbox, type a URL using the following pattern: `https://<server-base-url>/plugins/servlet/no.kantega.saml/sp/<uniqueid>/login`
121121
122122
> [!NOTE]
123-
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-On URL. These values are recieved during the configuration of Bamboo plugin which is explained later in the tutorial.
123+
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-On URL. These values are received during the configuration of Bamboo plugin which is explained later in the tutorial.
124124

125125
1. On the **SAML Signing Certificate** section, click **Metadata XML** and then save the metadata file on your computer.
126126

articles/active-directory/saas-apps/kantegassoforbitbucket-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
120120
In the **Sign-on URL** textbox, type a URL using the following pattern: `https://<server-base-url>/plugins/servlet/no.kantega.saml/sp/<uniqueid>/login`
121121

122122
> [!NOTE]
123-
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-On URL. These values are recieved during the configuration of Bitbucket plugin which is explained later in the tutorial.
123+
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-On URL. These values are received during the configuration of Bitbucket plugin which is explained later in the tutorial.
124124

125125
1. On the **SAML Signing Certificate** section, click **Metadata XML** and then save the metadata file on your computer.
126126

articles/active-directory/saas-apps/kantegassoforfisheyecrucible-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: 'Tutorial: Azure Active Directory integration with Kantega SSO for FishEye/Crucible | Microsoft Docs'
33
description: Learn how to configure single sign-on between Azure Active Directory and Kantega SSO for FishEye/Crucible.
44
services: active-directory
@@ -120,7 +120,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
120120
In the **Sign-on URL** textbox, type a URL using the following pattern: `https://<server-base-url>/plugins/servlet/no.kantega.saml/sp/<uniqueid>/login`
121121
122122
> [!NOTE]
123-
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-On URL. These values are recieved during the configuration of FishEye/Crucible plugin which is explained later in the tutorial.
123+
> These values are not real. Update these values with the actual Identifier, Reply URL, and Sign-On URL. These values are received during the configuration of FishEye/Crucible plugin which is explained later in the tutorial.
124124

125125
1. On the **SAML Signing Certificate** section, click **Metadata XML** and then save the metadata file on your computer.
126126

articles/active-directory/saas-apps/leapsome-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: 'Tutorial: Azure Active Directory integration with Leapsome | Microsoft Docs'
33
description: Learn how to configure single sign-on between Azure Active Directory and Leapsome.
44
services: active-directory
@@ -173,7 +173,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
173173

174174
b. Copy the **Login URL (point your users here to start login)** value and paste it into the **Sign-on URL** textbox in **Leapsome Domain and URLs** section on Azure portal.
175175

176-
c. Copy the **Reply URL (recieves response from your identity provider)** value and paste it into the **Reply URL** textbox in **Leapsome Domain and URLs** section on Azure portal.
176+
c. Copy the **Reply URL (receives response from your identity provider)** value and paste it into the **Reply URL** textbox in **Leapsome Domain and URLs** section on Azure portal.
177177

178178
d. In the **SSO Login URL (provided by identity provider)** textbox, paste the value of **SAML Single Sign-On Service URL**, which you copied from the Azure portal.
179179

0 commit comments

Comments
 (0)