Skip to content

Commit 5b691f4

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into sqldw_move1
2 parents 04ab534 + 98c17d5 commit 5b691f4

File tree

388 files changed

+7699
-2313
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

388 files changed

+7699
-2313
lines changed

.openpublishing.redirection.json

Lines changed: 46 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2170,6 +2170,11 @@
21702170
"redirect_url": "/azure/cosmos-db/create-sql-api-python",
21712171
"redirect_document_id": false
21722172
},
2173+
{
2174+
"source_path": "articles/cosmos-db/cosmos-db-security-controls.md",
2175+
"redirect_url": "/azure/cosmos-db/security-baseline",
2176+
"redirect_document_id": false
2177+
},
21732178
{
21742179
"source_path": "articles/cosmos-db/powershell-samples.md",
21752180
"redirect_url": "/azure/cosmos-db/powershell-samples-sql",
@@ -13604,6 +13609,11 @@
1360413609
"redirect_url": "/azure/event-hubs/authorize-access-azure-active-directory",
1360513610
"redirect_document_id": false
1360613611
},
13612+
{
13613+
"source_path": "articles/event-hubs/event-hubs-tutorial-virtual-networks-firewalls.md",
13614+
"redirect_url": "/azure/event-hubs/event-hubs-service-endpoints",
13615+
"redirect_document_id": false
13616+
},
1360713617
{
1360813618
"source_path": "articles/active-directory/active-directory-saml-protocol-reference.md",
1360913619
"redirect_url": "/azure/active-directory/develop/active-directory-saml-protocol-reference",
@@ -15786,7 +15796,12 @@
1578615796
},
1578715797
{
1578815798
"source_path": "articles/machine-learning/machine-learning-dedicated-capacity-for-bes-jobs.md",
15789-
"redirect_url": "/azure/machine-learning/studio/dedicated-capacity-for-bes-jobs",
15799+
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
15800+
"redirect_document_id": false
15801+
},
15802+
{
15803+
"source_path": "articles/machine-learning/studio/dedicated-capacity-for-bes-jobs.md",
15804+
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
1579015805
"redirect_document_id": false
1579115806
},
1579215807
{
@@ -49284,6 +49299,11 @@
4928449299
"redirect_url": "/azure/azure-monitor/overview",
4928549300
"redirect_document_id": false
4928649301
},
49302+
{
49303+
"source_path": "articles/cli/index.yml",
49304+
"redirect_url": "/cli/azure",
49305+
"redirect_document_id": false
49306+
},
4928749307
{
4928849308
"source_path": "articles/virtual-machines/linux/tutorial-build-deploy-jenkins.md",
4928949309
"redirect_url": "/azure/jenkins/tutorial-build-deploy-jenkins",
@@ -49364,6 +49384,16 @@
4936449384
"redirect_url": "/azure/cognitive-services/speech-service",
4936549385
"redirect_document_id": false
4936649386
},
49387+
{
49388+
"source_path": "articles/media-services/latest/access-api-portal.md",
49389+
"redirect_url": "/azure/media-services/latest/access-api-howto",
49390+
"redirect_document_id": false
49391+
},
49392+
{
49393+
"source_path": "articles/media-services/latest/access-api-cli-how-to.md",
49394+
"redirect_url": "/azure/media-services/latest/access-api-howto",
49395+
"redirect_document_id": false
49396+
},
4936749397
{
4936849398
"source_path": "articles/media-services/latest/create-account-portal.md",
4936949399
"redirect_url": "/azure/media-services/latest/create-account-howto",
@@ -49373,6 +49403,21 @@
4937349403
"source_path": "articles/media-services/latest/create-account-cli-how-to.md",
4937449404
"redirect_url": "/azure/media-services/latest/create-account-howto",
4937549405
"redirect_document_id": false
49406+
},
49407+
{
49408+
"source_path": "articles/mariadb/howto-tls-configurations.md",
49409+
"redirect_url": "/azure/mariadb/howto-configure-ssl",
49410+
"redirect_document_id": false
49411+
},
49412+
{
49413+
"source_path": "articles/mysql/howto-tls-configurations.md",
49414+
"redirect_url": "/azure/mysql/howto-configure-ssl",
49415+
"redirect_document_id": false
49416+
},
49417+
{
49418+
"source_path": "articles/postgresql/howto-tls-configurations.md",
49419+
"redirect_url": "/azure/postgresql/concepts-ssl-connection-security",
49420+
"redirect_document_id": false
4937649421
}
4937749422
]
4937849423
}

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/03/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -62,7 +62,7 @@ Checks that boolean values of two claims are equal, and throws an exception if t
6262
| inputClaim | inputClaim | boolean | The ClaimType to be asserted. |
6363
| InputParameter |valueToCompareTo | boolean | The value to compare (true or false). |
6464

65-
The **AssertBooleanClaimIsEqualToValue** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationBooleanValueIsNotEqual** self-asserted technical profile metadata controls the error message that the technical profile presents to the user.
65+
The **AssertBooleanClaimIsEqualToValue** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationBooleanValueIsNotEqual** self-asserted technical profile metadata controls the error message that the technical profile presents to the user. The error messages can be [localized](localization-string-ids.md#claims-transformations-error-messages).
6666

6767
![AssertStringClaimsAreEqual execution](./media/boolean-transformations/assert-execution.png)
6868

articles/active-directory-b2c/date-transformations.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 02/03/2020
11+
ms.date: 02/16/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -31,7 +31,7 @@ Checks that one date and time claim (string data type) is later than a second da
3131
| InputParameter | AssertIfRightOperandIsNotPresent | boolean | Specifies whether this assertion should pass if the right operand is missing. |
3232
| InputParameter | TreatAsEqualIfWithinMillseconds | int | Specifies the number of milliseconds to allow between the two date times to consider the times equal (for example, to account for clock skew). |
3333

34-
The **AssertDateTimeIsGreaterThan** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **DateTimeGreaterThan** self-asserted technical profile metadata controls the error message that the technical profile presents to the user.
34+
The **AssertDateTimeIsGreaterThan** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **DateTimeGreaterThan** self-asserted technical profile metadata controls the error message that the technical profile presents to the user. The error messages can be [localized](localization-string-ids.md#claims-transformations-error-messages).
3535

3636
![AssertStringClaimsAreEqual execution](./media/date-transformations/assert-execution.png)
3737

@@ -77,8 +77,8 @@ The self-asserted technical profile calls the validation **login-NonInteractive*
7777
### Example
7878

7979
- Input claims:
80-
- **leftOperand**: 2018-10-01T15:00:00.0000000Z
81-
- **rightOperand**: 2018-10-01T14:00:00.0000000Z
80+
- **leftOperand**: 2020-03-01T15:00:00.0000000Z
81+
- **rightOperand**: 2020-03-01T14:00:00.0000000Z
8282
- Result: Error thrown
8383

8484
## ConvertDateToDateTimeClaim
@@ -106,9 +106,9 @@ The following example demonstrates the conversion of the claim `dateOfBirth` (da
106106
### Example
107107

108108
- Input claims:
109-
- **inputClaim**: 2019-06-01
109+
- **inputClaim**: 2020-15-03
110110
- Output claims:
111-
- **outputClaim**: 1559347200 (June 1, 2019 12:00:00 AM)
111+
- **outputClaim**: 2020-15-03T00:00:00.0000000Z
112112

113113
## ConvertDateTimeToDateClaim
114114

@@ -135,9 +135,9 @@ The following example demonstrates the conversion of the claim `systemDateTime`
135135
### Example
136136

137137
- Input claims:
138-
- **inputClaim**: 1559347200 (June 1, 2019 12:00:00 AM)
138+
- **inputClaim**: 2020-15-03T11:34:22.0000000Z
139139
- Output claims:
140-
- **outputClaim**: 2019-06-01
140+
- **outputClaim**: 2020-15-03
141141

142142
## GetCurrentDateTime
143143

@@ -158,7 +158,7 @@ Get the current UTC date and time and add the value to a ClaimType.
158158
### Example
159159

160160
* Output claims:
161-
* **currentDateTime**: 1534418820 (August 16, 2018 11:27:00 AM)
161+
* **currentDateTime**: 2020-15-03T11:40:35.0000000Z
162162

163163
## DateTimeComparison
164164

@@ -194,8 +194,8 @@ To run the claim transformation, you first need to get the current dateTime and
194194
### Example
195195

196196
- Input claims:
197-
- **firstDateTime**: 2018-01-01T00:00:00.100000Z
198-
- **secondDateTime**: 2018-04-01T00:00:00.100000Z
197+
- **firstDateTime**: 2020-01-01T00:00:00.100000Z
198+
- **secondDateTime**: 2020-04-01T00:00:00.100000Z
199199
- Input parameters:
200200
- **operator**: later than
201201
- **timeSpanInSeconds**: 7776000 (90 days)

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 31 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Localization string IDs - Azure Active Directory B2C | Microsoft Docs
3-
description: Specify the IDs for a content definition with an Id of api.signuporsignin in a custom policy in Azure Active Directory B2C.
3+
description: Specify the IDs for a content definition with an ID of api.signuporsignin in a custom policy in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: msmimart
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 03/09/2020
11+
ms.date: 03/16/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -21,7 +21,7 @@ The **Localization** element enables you to support multiple locales or language
2121

2222
## Sign-up or sign-in page elements
2323

24-
The following Ids are used for a content definition with an ID of `api.signuporsignin`.
24+
The following IDs are used for a content definition with an ID of `api.signuporsignin`.
2525

2626
| ID | Default value |
2727
| -- | ------------- |
@@ -87,7 +87,7 @@ The following example localizes the Facebook identity provider to Arabic:
8787
| **UserMessageIfUserAccountLocked** | Your account is temporarily locked to prevent unauthorized use. Try again later. |
8888
| **AADRequestsThrottled** | There are too many requests at this moment. Please wait for some time and try again. |
8989

90-
## Sign-up and self asserted pages user interface elements
90+
## Sign-up and self-asserted pages user interface elements
9191

9292
The following are the IDs for a content definition with an ID of `api.localaccountsignup` or any content definition that starts with `api.selfasserted`, such as `api.selfasserted.profileupdate` and `api.localaccountpasswordreset`.
9393

@@ -128,7 +128,7 @@ The following are the IDs for a content definition with an ID of `api.localaccou
128128
| **ver_intro_msg** | Verification is necessary. Please click Send button. |
129129
| **ver_input** | Verification code |
130130

131-
### Sign-up and self asserted pages error messages
131+
### Sign-up and self-asserted pages error messages
132132

133133
| ID | Default value |
134134
| -- | ------------- |
@@ -253,6 +253,32 @@ The following are the IDs for a [one time password technical profile](one-time-p
253253
```
254254

255255

256+
## Claims transformations error messages
257+
258+
The following are the IDs for claims transformations error messages:
259+
260+
| ID | Claims transformation | Default value |
261+
| -- | ------------- |------------- |
262+
|UserMessageIfClaimsTransformationBooleanValueIsNotEqual |[AssertBooleanClaimIsEqualToValue](boolean-transformations.md#assertbooleanclaimisequaltovalue) | Boolean claim value comparison failed for claim type "inputClaim".|
263+
|DateTimeGreaterThan |[AssertDateTimeIsGreaterThan](date-transformations.md#assertdatetimeisgreaterthan) | Claim value comparison failed: The provided left operand is greater than the right operand.|
264+
|UserMessageIfClaimsTransformationStringsAreNotEqual |[AssertStringClaimsAreEqual](string-transformations.md#assertstringclaimsareequal) | Claim value comparison failed using StringComparison "OrdinalIgnoreCase".|
265+
266+
### Example
267+
268+
```XML
269+
<LocalizedResources Id="api.localaccountsignup.en">
270+
<LocalizedStrings>
271+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfClaimsTransformationBooleanValueIsNotEqual">Your email address hasn't been verified.</LocalizedString>
272+
<LocalizedString ElementType="ErrorMessage" StringId="DateTimeGreaterThan">Expiration date must be greater that the current date.</LocalizedString>
273+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfClaimsTransformationStringsAreNotEqual">The email entry fields do not match. Please enter the same email address in both fields and try again.</LocalizedString>
274+
</LocalizedStrings>
275+
</LocalizedResources>
276+
```
277+
278+
279+
280+
281+
256282

257283

258284

articles/active-directory-b2c/string-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/24/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -30,7 +30,7 @@ Compare two claims, and throw an exception if they are not equal according to th
3030
| InputClaim | inputClaim2 | string | Second claim's type, which is to be compared. |
3131
| InputParameter | stringComparison | string | string comparison, one of the values: Ordinal, OrdinalIgnoreCase. |
3232

33-
The **AssertStringClaimsAreEqual** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md), or a [DisplayConrtol](display-controls.md). The `UserMessageIfClaimsTransformationStringsAreNotEqual` metadata of a self-asserted technical profile controls the error message that is presented to the user.
33+
The **AssertStringClaimsAreEqual** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md), or a [DisplayConrtol](display-controls.md). The `UserMessageIfClaimsTransformationStringsAreNotEqual` metadata of a self-asserted technical profile controls the error message that is presented to the user. The error messages can be [localized](localization-string-ids.md#claims-transformations-error-messages).
3434

3535

3636
![AssertStringClaimsAreEqual execution](./media/string-transformations/assert-execution.png)

articles/active-directory/app-provisioning/application-provisioning-configure-api.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ Content-type: application/json
171171

172172
### Retrieve the template for the provisioning connector
173173

174-
Applications in the gallery that are enabled for provisioning have templates to streamline configuration. Use the request below to [retrieve the template for the provisioning configuration](https://docs.microsoft.com/graph/api/synchronization-synchronizationtemplate-list?view=graph-rest-beta&tabs=http).
174+
Applications in the gallery that are enabled for provisioning have templates to streamline configuration. Use the request below to [retrieve the template for the provisioning configuration](https://docs.microsoft.com/graph/api/synchronization-synchronizationtemplate-list?view=graph-rest-beta&tabs=http). Note that you will need to provide the ID. The ID refers to the preceding resource, which in this case is the ServicePrincipal.
175175

176176
#### *Request*
177177

@@ -263,10 +263,10 @@ Content-type: application/json
263263

264264
### Test the connection to the application
265265

266-
Test the connection with the third-party application. The example below is for an application that requires clientSecret and secretToken. Each application has its on requirements. Review the [API documentation](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-validatecredentials?view=graph-rest-beta&tabs=http) to see the available options.
266+
Test the connection with the third-party application. The example below is for an application that requires clientSecret and secretToken. Each application has its on requirements. Applications often use BaseAddress in place of ClientSecret. To determine what credentials your app requires, navigate to the provisioning configuration page for your application and in developer mode click test connection. The network traffic will show the parameters used for credentials. The full list of credentials can be found [here](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-validatecredentials?view=graph-rest-beta&tabs=http).
267267

268268
#### *Request*
269-
```http
269+
```msgraph-interactive
270270
POST https://graph.microsoft.com/beta/servicePrincipals/{id}/synchronization/jobs/{id}/validateCredentials
271271
{
272272
credentials: [
@@ -290,7 +290,7 @@ HTTP/1.1 204 No Content
290290
Configuring provisioning requires establishing a trust between Azure AD and the application. Authorize access to the third-party application. The example below is for an application that requires clientSecret and secretToken. Each application has its on requirements. Review the [API documentation](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-validatecredentials?view=graph-rest-beta&tabs=http) to see the available options.
291291

292292
#### *Request*
293-
```json
293+
```msgraph-interactive
294294
PUT https://graph.microsoft.com/beta/servicePrincipals/{id}/synchronization/secrets
295295
296296
{

articles/active-directory/authentication/tutorial-enable-sspr-writeback.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,6 @@ Azure AD Connect lets you synchronize users, groups, and credential between an o
5050
To correctly work with SSPR writeback, the account specified in Azure AD Connect must have the appropriate permissions and options set. If you're not sure which account is currently in use, open Azure AD Connect and select the **View current configuration** option. The account that you need to add permissions to is listed under **Synchronized Directories**. The following permissions and options must be set on the account:
5151

5252
* **Reset password**
53-
* **Change password**
5453
* **Write permissions** on `lockoutTime`
5554
* **Write permissions** on `pwdLastSet`
5655
* **Extended rights** on either:
@@ -68,7 +67,6 @@ To set up the appropriate permissions for password writeback to occur, complete
6867
1. For **Principal**, select the account that permissions should be applied to (the account used by Azure AD Connect).
6968
1. In the **Applies to** drop-down list, select **Descendant User objects**.
7069
1. Under *Permissions*, select the boxes for the following options:
71-
* **Change password**
7270
* **Reset password**
7371
1. Under *Properties*, select the boxes for the following options. You need to scroll through the list to find these options, which may already be set by default:
7472
* **Write lockoutTime**

articles/active-directory/develop/howto-convert-app-to-be-multi-tenant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.subservice: develop
1212
ms.topic: conceptual
1313
ms.workload: identity
14-
ms.date: 02/19/2020
14+
ms.date: 03/17/2020
1515
ms.author: ryanwi
1616
ms.reviewer: jmprieur, lenalepa, sureshja, kkrishna
1717
ms.custom: aaddev
@@ -172,7 +172,7 @@ In this article, you learned how to build an application that can sign in a user
172172

173173
## Related content
174174

175-
* [Multi-tenant application sample](https://github.com/mspnp/multitenant-saas-guidance)
175+
* [Multi-tenant application sample](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/master/2-WebApp-graph-user/2-3-Multi-Tenant/README.md)
176176
* [Branding guidelines for applications][AAD-App-Branding]
177177
* [Application objects and service principal objects][AAD-App-SP-Objects]
178178
* [Integrating applications with Azure Active Directory][AAD-Integrating-Apps]

0 commit comments

Comments
 (0)