Skip to content

Commit 5a193ae

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents d956ca7 + 3ced637 commit 5a193ae

File tree

86 files changed

+796
-615
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

86 files changed

+796
-615
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4769,6 +4769,11 @@
47694769
"source_path": "articles/azure-functions/functions-bindings-external-file.md",
47704770
"redirect_url": "/azure/azure-functions/functions-triggers-bindings#supported-bindings",
47714771
"redirect_document_id": false
4772+
},
4773+
{
4774+
"source_path": "articles/azure-functions/functions-create-vnet-old.md",
4775+
"redirect_url": "/azure/azure-functions/functions-create-vnet",
4776+
"redirect_document_id": false
47724777
},
47734778
{
47744779
"source_path": "articles/automation/automation-source-control-integration.md",
@@ -36183,6 +36188,16 @@
3618336188
"redirect_url": "/azure/azure-monitor/platform/data-collector-api",
3618436189
"redirect_document_id": false
3618536190
},
36191+
{
36192+
"source_path": "articles/cognitive-services/personalizer/personalizer-container-configuration.md",
36193+
"redirect_url": "/azure/cognitive-services/personalizer/what-is-personalizer",
36194+
"redirect_document_id": false
36195+
},
36196+
{
36197+
"source_path": "articles/cognitive-services/personalizer/personalizer-container-howto.md",
36198+
"redirect_url": "/azure/cognitive-services/personalizer/what-is-personalizer",
36199+
"redirect_document_id": false
36200+
},
3618636201
{
3618736202
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intent-and-key-phrase.md",
3618836203
"redirect_url": "/azure/cognitive-services/LUIS/luis-reference-prebuilt-keyphrase",

articles/active-directory-b2c/active-directory-b2c-reference-custom-attr.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,11 @@ ms.subservice: B2C
1717

1818
Every customer-facing application has unique requirements for the information that needs to be collected. Your Azure Active Directory (Azure AD) B2C tenant comes with a built-in set of information stored in attributes, such as Given Name, Surname, City, and Postal Code. With Azure AD B2C, you can extend the set of attributes stored on each customer account.
1919

20-
You can create custom attributes in the [Azure portal](https://portal.azure.com/) and use them in your sign-up user flows, sign-up or sign-in user flows, or profile editing user flows. You can also read and write these attributes by using the [Azure AD Graph API](active-directory-b2c-devquickstarts-graph-dotnet.md). Custom attributes in Azure AD B2C use [Azure AD Graph API Directory Schema Extensions](/previous-versions/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
20+
You can create custom attributes in the [Azure portal](https://portal.azure.com/) and use them in your sign-up user flows, sign-up or sign-in user flows, or profile editing user flows. You can also read and write these attributes by using the [Azure AD Graph API](active-directory-b2c-devquickstarts-graph-dotnet.md). Custom attributes in Azure AD B2C use [Azure AD Graph API Directory Schema Extensions](/previous-versions/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
21+
22+
> [!NOTE]
23+
> Support for newer [Microsoft Graph API](https://docs.microsoft.com/en-us/graph/overview?view=graph-rest-1.0) for querying Azure AD B2C tenant is still under development.
24+
>
2125
2226
## Create a custom attribute
2327

@@ -37,7 +41,8 @@ ms.subservice: B2C
3741
7. Optionally, enter a **Description** for informational purposes.
3842
8. Click **Create**.
3943

40-
The custom attribute is now available in the list of **User attributes** and for use in your user flows. A custom attribute is only created the first time it is used in any user flow, and not when you add it to the list of **User attributes**.
44+
The custom attribute is now available in the list of **User attributes** and for use in your user flows. A custom attribute is only created the first time it is used in any user flow, and not when you add it to the list of **User attributes**.
45+
4146

4247
## Use a custom attribute in your user flow
4348

@@ -47,5 +52,5 @@ The custom attribute is now available in the list of **User attributes** and for
4752
5. Select **Application claims** and then select the custom attribute.
4853
6. Click **Save**.
4954

50-
You can use the **Run user flow** feature on the user flow to verify the customer experience. You should now see **ShoeSize** in the list of attributes collected during the sign-up journey, and see it in the token sent back to your application.
55+
Once you have created a new user using a user flow which uses the newly created custom attribute, the object can be queried in [Azure AD Graph Explorer](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-graph-api-quickstart). Alternatively you can use the [**Run user flow**](https://docs.microsoft.com/en-us/azure/active-directory-b2c/tutorial-create-user-flows) feature on the user flow to verify the customer experience. You should now see **ShoeSize** in the list of attributes collected during the sign-up journey, and see it in the token sent back to your application.
5156

articles/active-directory/conditional-access/baseline-protection.md

Lines changed: 12 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: What is a baseline protection in Azure Active Directory conditional access? - preview | Microsoft Docs
2+
title: What is a baseline protection in Azure Active Directory conditional access? | Microsoft Docs
33
description: Learn how baseline protection ensures that you have at least the baseline level of security enabled in your Azure Active Directory environment.
44
services: active-directory
55
keywords: conditional access to apps, conditional access with Azure AD, secure access to company resources, conditional access policies
@@ -21,40 +21,32 @@ ms.reviewer: nigu
2121

2222
ms.collection: M365-identity-device-management
2323
---
24-
# What is baseline protection (preview)?
24+
# What is baseline protection?
2525

2626
In the last year, identity attacks have increased by 300%. To protect your environment from the ever-increasing attacks, Azure Active Directory (Azure AD) introduces a new feature called baseline protection. Baseline protection is a set of predefined [conditional access policies](../active-directory-conditional-access-azure-portal.md). The goal of these policies is to ensure that you have at least the baseline level of security enabled in all editions of Azure AD.
2727

2828
This article provides you with an overview of baseline protection in Azure Active Directory.
29-
30-
3129

3230
## Require MFA for admins
3331

3432
Users with access to privileged accounts have unrestricted access to your environment. Due to the power these accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification when they are used to sign-in. In Azure Active Directory, you can get a stronger account verification by requiring multi-factor authentication (MFA).
3533

36-
**Require MFA for admins** is a baseline policy that requires MFA for the following directory roles:
37-
38-
- Global administrator 
39-
40-
- SharePoint administrator 
41-
42-
- Exchange administrator 
43-
44-
- Conditional access administrator 
45-
46-
- Security administrator 
34+
**Require MFA for admins** is a baseline policy that requires MFA for the following directory roles:
4735

36+
* Global administrator
37+
* SharePoint administrator
38+
* Exchange administrator
39+
* Conditional access administrator
40+
* Security administrator
41+
* Helpdesk administrator / Password administrator
42+
* Billing administrator
43+
* User administrator
4844

4945
![Azure Active Directory](./media/baseline-protection/01.png)
5046

5147
This baseline policy provides you with the option to exclude users. You might want to exclude one *[emergency-access administrative account](../users-groups-roles/directory-emergency-access.md)* to ensure you are not locked out of the tenant.
5248

53-
54-
## Enable a baseline policy
55-
56-
While baseline policies are in preview, they are by default not activated. You need to manually enable a policy if you want to activate it. If you explicitly enable the baseline policies at the preview stage, they will remain active when this feature reaches general availability. The planned behavior change is the reason why, in addition to activate and deactivate, you have a third option to set the state of a policy: **Automatically enable policy in the future**. By selecting this option, you can leave the policies disabled during preview, but have Microsoft enable them automatically when this feature reaches general availability. If you do not explicitly enable baseline policies now, and do not select the **Automatically enable policy in the future** option, the policies will remain disabled when this feature reaches general availability.
57-
49+
## Enable a baseline policy
5850

5951
**To enable a baseline policy:**
6052

@@ -73,9 +65,6 @@ While baseline policies are in preview, they are by default not activated. You n
7365
5. To enable the policy, click **Use policy immediately**.
7466

7567
6. Click **Save**.
76-
77-
78-
7968

8069
## What you should know
8170

@@ -87,14 +76,10 @@ If you have privileged accounts that are used in your scripts, you should replac
8776

8877
Baseline policies apply to legacy authentication flows like POP, IMAP, older Office desktop client.
8978

90-
91-
92-
9379
## Next steps
9480

9581
For more information, see:
9682

9783
- [Five steps to securing your identity infrastructure](https://docs.microsoft.com/azure/security/azure-ad-secure-steps)
9884

9985
- [What is conditional access in Azure Active Directory?](overview.md)
100-
3.72 KB
Loading

articles/active-directory/develop/about-microsoft-identity-platform.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323

2424
# Evolution of Microsoft identity platform
2525

26-
Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) identity service and developer platform. It allows developers to build applications that sign in users, get tokens to call APIs, such as Microsoft Graph, or APIs that developers have built. It consists of an authentication service, open-source libraries, application registration, and configuration (through a developer portal and application API), full developer documentation, quickstart samples, code samples, tutorials, how-to guides, and other developer content. The Microsoft identity platform supports industry standard protocols such as OAuth 2.0 and OpenID Connect.
26+
Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) developer platform. It allows developers to build applications that sign in users, get tokens to call APIs, such as Microsoft Graph, or APIs that developers have built. It consists of an authentication service, open-source libraries, application registration, and configuration (through a developer portal and application API), full developer documentation, quickstart samples, code samples, tutorials, how-to guides, and other developer content. The Microsoft identity platform supports industry standard protocols such as OAuth 2.0 and OpenID Connect.
2727

2828
Up until now, most developers have worked with the Azure AD v1.0 platform to authenticate work and school accounts (provisioned by Azure AD) by requesting tokens from the Azure AD v1.0 endpoint, using Azure AD Authentication Library (ADAL), Azure portal for application registration and configuration, and Azure AD Graph API for programmatic application configuration.
2929

@@ -70,4 +70,4 @@ Microsoft identity platform (v2.0) endpoint is now OIDC certified. It works with
7070
Learn more about v1.0 and v2.0.
7171

7272
* [Microsoft identity platform (v2.0) overview](v2-overview.md)
73-
* [Azure Active Directory for developers (v1.0) overview](v1-overview.md)
73+
* [Azure Active Directory for developers (v1.0) overview](v1-overview.md)

articles/active-directory/develop/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ metadata:
1515
ms.date: 05/07/2019
1616
ms.author: celested
1717
abstract:
18-
description: Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) identity service and developer platform. It allows developers to build applications that sign in all Microsoft identities and get tokens to call Microsoft APIs such as Microsoft Graph or APIs that developers have built. It’s a full-featured platform that consists of an OAuth 2.0 and OpenID Connect standard-compliant authentication service, open-source libraries, application registration and configuration, robust conceptual and reference documentation, quickstart samples, code samples, tutorials, and how-to guides.
18+
description: Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) developer platform. It allows developers to build applications that sign in all Microsoft identities and get tokens to call Microsoft APIs such as Microsoft Graph or APIs that developers have built. It’s a full-featured platform that consists of an OAuth 2.0 and OpenID Connect standard-compliant authentication service, open-source libraries, application registration and configuration, robust conceptual and reference documentation, quickstart samples, code samples, tutorials, and how-to guides.
1919
aside:
2020
image:
2121
alt:

articles/active-directory/develop/scenario-protected-web-api-production.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Learn how to call downstream APIs:
3535
Learn more with tutorials and samples:
3636

3737
> [!div class="nextstepaction"]
38-
> [ASP.NET Core Web API Tutorial](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2)
38+
> [ASP.NET Core web API Tutorial](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2)
3939
4040
> [!div class="nextstepaction"]
41-
> [ASP.NET Web API sample](https://github.com/azureadquickstarts/appmodelv2-nativeclient-dotnet)
41+
> [ASP.NET web API sample](https://github.com/azureadquickstarts/appmodelv2-nativeclient-dotnet)

articles/active-directory/develop/scenario-web-app-sign-user-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ If you want to create your first portable (ASP.NET Core) web apps that sign in u
3737
If you prefer to stay with ASP.NET, try out the following tutorial:
3838

3939
> [!div class="nextstepaction"]
40-
> [Quickstart: ASP.NET Core web app that signs-in users](quickstart-v2-aspnet-webapp.md)
40+
> [Quickstart: ASP.NET web app that signs-in users](quickstart-v2-aspnet-webapp.md)
4141
4242
## Overview
4343

articles/active-directory/develop/v2-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323

2424
# Microsoft identity platform (v2.0) overview
2525

26-
Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) identity service and developer platform. It allows developers to build applications that sign in all Microsoft identities and get tokens to call Microsoft APIs, such as Microsoft Graph, or APIs that developers have built. The Microsoft identity platform consists of:
26+
Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) developer platform. It allows developers to build applications that sign in all Microsoft identities and get tokens to call Microsoft APIs, such as Microsoft Graph, or APIs that developers have built. The Microsoft identity platform consists of:
2727

2828
- **OAuth 2.0 and OpenID Connect standard-compliant authentication service** that enables developers to authenticate any Microsoft identity, including:
2929
- Work or school accounts (provisioned through Azure AD)
@@ -76,4 +76,4 @@ When you’re ready to launch your app into a **production environment**, review
7676

7777
## Learn more
7878

79-
If you’d planning to build a customer-facing application that signs in social and local identities, take a look at the [Azure AD B2C overview](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-add-identity-providers).
79+
If you’re planning to build a customer-facing application that signs in social and local identities, see the [Azure AD B2C overview](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-add-identity-providers).

articles/aks/azure-ad-integration-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@ For the complete sample script used in this article, see [Azure CLI samples - AK
2121
The following limitations apply:
2222

2323
- Azure AD can only be enabled when you create a new, RBAC-enabled cluster. You can't enable Azure AD on an existing AKS cluster.
24-
- *Guest* users in Azure AD, such as if you use a federated sign in from a different directory, are not supported.
2524

2625
## Before you begin
2726

@@ -233,8 +232,9 @@ If you see an authorization error message after you've successfully signed in us
233232
error: You must be logged in to the server (Unauthorized)
234233
```
235234

236-
* The user you are signed in as is not a *Guest* in the Azure AD instance (this is often the case if you use a federated login from a different directory).
235+
* You defined the appropriate object ID or UPN, depending on if the user account is in the same Azure AD tenant or not.
237236
* The user is not a member of more than 200 groups.
237+
* Secret defined in the application registration for server matches the value configured using `--aad-server-app-secret`
238238

239239
## Next steps
240240

0 commit comments

Comments
 (0)