Skip to content

Commit 5cc0b45

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into speech-synthesis-markup
2 parents ca213ac + f1d3edc commit 5cc0b45

File tree

378 files changed

+3795
-2063
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

378 files changed

+3795
-2063
lines changed

.gitignore

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,5 +23,5 @@ AzureMigration.ps1
2323
!/.vscode/extensions.json
2424
.gitignore
2525
**/.vscode/settings.json
26-
27-
desktop.ini
26+
*.pdn
27+
articles/azure-cache-for-redis/media/cache-managed-identity/Screenshot 2022-01-20 092913.pdn

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22858,6 +22858,11 @@
2285822858
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
2285922859
"redirect_document_id": ""
2286022860
},
22861+
{
22862+
"source_path_from_root": "/articles/search/cognitive-search-resources-documentation.md",
22863+
"redirect_url": "/azure/search/cognitive-search-concept-intro",
22864+
"redirect_document_id": false
22865+
},
2286122866
{
2286222867
"source_path_from_root": "/articles/search/search-blob-ai-integration.md",
2286322868
"redirect_url": "/azure/search/cognitive-search-concept-intro",
@@ -45207,6 +45212,11 @@
4520745212
"source_path_from_root": "/articles/azure/sentinel/connect-windows-virtual-desktop.md",
4520845213
"redirect_url": "/azure/sentinel/connect-azure-virtual-desktop",
4520945214
"redirect_document_id": true
45215+
},
45216+
{
45217+
"source_path_from_root": "/articles/azure/cognitive-services/translator/custom-translator/v2-preview/project-overview.md",
45218+
"redirect_url": "/azure/cognitive-services/translator/custom-translator/v2-preview/beginners-guide",
45219+
"redirect_document_id": true
4521045220
}
4521145221
]
4521245222
}

articles/active-directory-b2c/localization.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 03/08/2021
10+
ms.date: 01/21/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -142,8 +142,8 @@ The **LocalizedString** element contains the following attributes:
142142

143143
| Attribute | Required | Description |
144144
| --------- | -------- | ----------- |
145-
| ElementType | Yes | Possible values: [ClaimsProvider](#claimsprovider), [ClaimType](#claimtype), [ErrorMessage](#errormessage), [GetLocalizedStringsTransformationClaimType](#getlocalizedstringstransformationclaimtype), [FormatLocalizedStringTransformationClaimType](#formatlocalizedstringtransformationclaimtype), [Predicate](#predicate), [InputValidation](#inputvalidation), or [UxElement](#uxelement). |
146-
| ElementId | Yes | If **ElementType** is set to `ClaimType`, `Predicate`, or `InputValidation`, this element contains a reference to a claim type already defined in the ClaimsSchema section. |
145+
| ElementType | Yes | Possible values: [ClaimsProvider](#claimsprovider), [ClaimType](#claimtype), [ErrorMessage](#errormessage), [GetLocalizedStringsTransformationClaimType](#getlocalizedstringstransformationclaimtype), [FormatLocalizedStringTransformationClaimType](#formatlocalizedstringtransformationclaimtype), [Predicate](#predicate), [PredicateValidation](#predicatevalidation), or [UxElement](#uxelement). |
146+
| ElementId | Yes | If **ElementType** is set to `ClaimType`, `Predicate`, or `PredicateValidation`, this element contains a reference to a claim type already defined in the ClaimsSchema section. |
147147
| StringId | Yes | If **ElementType** is set to `ClaimType`, this element contains a reference to an attribute of a claim type. Possible values: `DisplayName`, `AdminHelpText`, or `PatternHelpText`. The `DisplayName` value is used to set the claim display name. The `AdminHelpText` value is used to set the help text name of the claim user. The `PatternHelpText` value is used to set the claim pattern help text. If **ElementType** is set to `UxElement`, this element contains a reference to an attribute of a user interface element. If **ElementType** is set to `ErrorMessage`, this element specifies the identifier of an error message. See [Localization string IDs](localization-string-ids.md) for a complete list of the `UxElement` identifiers.|
148148

149149
## ElementType
@@ -157,7 +157,7 @@ The ElementType reference to a claim type, a claim transformation, or a user int
157157
|Error message|`ErrorMessage`||The ID of the error message |
158158
|Copies localized strings into claims|`GetLocalizedStringsTra nsformationClaimType`||The name of the output claim|
159159
|Predicate user message|`Predicate`|The name of the predicate| The attribute of the predicate to be localized. Possible values: `HelpText`.|
160-
|Predicate group user message|`InputValidation`|The ID of the PredicateValidation element.|The ID of the PredicateGroup element. The predicate group must be a child of the predicate validation element as defined in the ElementId.|
160+
|Predicate group user message|`PredicateValidation`|The ID of the PredicateValidation element.|The ID of the PredicateGroup element. The predicate group must be a child of the predicate validation element as defined in the ElementId.|
161161
|User interface elements |`UxElement` | | The ID of the user interface element to be localized.|
162162
|[Display Control](display-controls.md) |`DisplayControl` |The ID of the display control. | The ID of the user interface element to be localized.|
163163

@@ -312,9 +312,9 @@ The following example shows how to localize predicates help text.
312312
<LocalizedString ElementType="Predicate" ElementId="Uppercase" StringId="HelpText">an uppercase letter</LocalizedString>
313313
```
314314

315-
### InputValidation
315+
### PredicateValidation
316316

317-
The InputValidation value is used to localize one of the [PredicateValidation](predicates.md) group error messages.
317+
The PredicateValidation value is used to localize one of the [PredicateValidation](predicates.md) group error messages.
318318

319319
```xml
320320
<PredicateValidations>
@@ -342,7 +342,7 @@ The InputValidation value is used to localize one of the [PredicateValidation](p
342342
The following example shows how to localize a predicate validation group help text.
343343

344344
```xml
345-
<LocalizedString ElementType="InputValidation" ElementId="CustomPassword" StringId="CharacterClasses">The password must have at least 3 of the following:</LocalizedString>
345+
<LocalizedString ElementType="PredicateValidation" ElementId="CustomPassword" StringId="CharacterClasses">The password must have at least 3 of the following:</LocalizedString>
346346
```
347347

348348
### UxElement

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -176,8 +176,7 @@ Your identity provider and resource providers may see different IP addresses. Th
176176

177177
Examples:
178178

179-
- Your identity provider sees one IP address from the client.
180-
- Your resource provider sees a different IP address from the client after passing through a proxy.
179+
- Your identity provider sees one IP address from the client while your resource provider sees a different IP address from the client after passing through a proxy.
181180
- The IP address your identity provider sees is part of an allowed IP range in policy but the IP address from the resource provider isn't.
182181

183182
To avoid infinite loops because of these scenarios, Azure AD issues a one hour CAE token and won't enforce client location change. In this case, security is improved compared to traditional one hour tokens since we're still evaluating the [other events](#critical-event-evaluation) besides client location change events.

articles/active-directory/hybrid/how-to-connect-fed-saml-idp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.tgt_pltfrm: na
1111
ms.topic: how-to
12-
ms.date: 07/13/2017
12+
ms.date: 01/21/2022
1313
ms.subservice: hybrid
1414
ms.author: billmath
1515
ms.collection: M365-identity-device-management

articles/active-directory/hybrid/how-to-connect-fed-sha256-guidance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: hybrid
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: how-to
16-
ms.date: 10/26/2018
16+
ms.date: 01/21/2022
1717
ms.author: billmath
1818

1919
ms.collection: M365-identity-device-management

articles/active-directory/hybrid/how-to-connect-fed-single-adfs-multitenant-federation.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Federating multiple Azure AD with single AD FS - Azure
3-
description: In this document you will learn how to federate multiple Azure AD with a single AD FS.
3+
description: In this document, you will learn how to federate multiple Azure AD with a single AD FS.
44
keywords: federate, ADFS, AD FS, multiple tenants, single AD FS, one ADFS, multi-tenant federation, multi-forest adfs, aad connect, federation, cross-tenant federation
55
services: active-directory
66
documentationcenter: ''
@@ -13,15 +13,15 @@ ms.service: active-directory
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: how-to
16-
ms.date: 07/17/2017
16+
ms.date: 01/21/2022
1717
ms.subservice: hybrid
1818
ms.author: billmath
1919
ms.collection: M365-identity-device-management
2020
---
2121

2222
# Federate multiple instances of Azure AD with single instance of AD FS
2323

24-
A single high available AD FS farm can federate multiple forests if they have 2-way trust between them. These multiple forests may or may not correspond to the same Azure Active Directory. This article provides instructions on how to configure federation between a single AD FS deployment and more than one forests that sync to different Azure AD.
24+
A single high available AD FS farm can federate multiple forests if they have 2-way trust between them. These multiple forests may or may not correspond to the same Azure Active Directory. This article provides instructions on how to configure federation between a single AD FS deployment and multiple instances of Azure AD.
2525

2626
![Multi-tenant federation with single AD FS](./media/how-to-connect-fed-single-adfs-multitenant-federation/concept.png)
2727

@@ -41,9 +41,9 @@ For AD FS in contoso.com to be able to authenticate users in fabrikam.com, a two
4141

4242
## Step 2: Modify contoso.com federation settings
4343

44-
The default issuer set for a single domain federated to AD FS is "http\://ADFSServiceFQDN/adfs/services/trust", for example, `http://fs.contoso.com/adfs/services/trust`. Azure Active Directory requires unique issuer for each federated domain. Since the same AD FS is going to federate two domains, the issuer value needs to be modified so that it is unique for each domain AD FS federates with Azure Active Directory.
44+
The default issuer set for a single domain federated to AD FS is "http\://ADFSServiceFQDN/adfs/services/trust", for example, `http://fs.contoso.com/adfs/services/trust`. Azure Active Directory requires unique issuer for each federated domain. Because AD FS is going to federate two domains, the issuer value needs to be modified so that it is unique.
4545

46-
On the AD FS server, open Azure AD PowerShell (ensure that the MSOnline module is installed) and perform the following steps:
46+
On the AD FS server, open Azure AD PowerShell (ensure that the MSOnline module is installed) and do the following steps:
4747

4848
Connect to the Azure Active Directory that contains the domain contoso.com
4949
Connect-MsolService
@@ -69,4 +69,4 @@ Convert-MsolDomainToFederated -DomainName fabrikam.com -Verbose -SupportMultiple
6969
The above operation will federate the domain fabrikam.com with the same AD FS. You can verify the domain settings by using Get-MsolDomainFederationSettings for both domains.
7070

7171
## Next steps
72-
[Connect Active Directory with Azure Active Directory](whatis-hybrid-identity.md)
72+
[Connect Active Directory with Azure Active Directory](whatis-hybrid-identity.md)

articles/active-directory/hybrid/how-to-connect-fed-ssl-update.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.tgt_pltfrm: na
1111
ms.topic: how-to
12-
ms.date: 07/09/2018
12+
ms.date: 01/21/2022
1313
ms.subservice: hybrid
1414
author: billmath
1515
ms.custom: seohack1
@@ -102,4 +102,4 @@ After you complete the configuration, Azure AD Connect displays the message that
102102
## Next steps
103103

104104
- [Azure AD Connect and federation](how-to-connect-fed-whatis.md)
105-
- [Active Directory Federation Services management and customization with Azure AD Connect](how-to-connect-fed-management.md)
105+
- [Active Directory Federation Services management and customization with Azure AD Connect](how-to-connect-fed-management.md)

articles/active-directory/hybrid/how-to-connect-fed-whatis.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.topic: how-to
14-
ms.date: 10/09/2018
14+
ms.date: 01/21/2022
1515
ms.subservice: hybrid
1616
ms.author: billmath
1717

@@ -48,4 +48,4 @@ This topic is the home for information on federation-related functionalities for
4848
## Additional resources
4949
* [Federating two Azure AD with single AD FS](how-to-connect-fed-single-adfs-multitenant-federation.md)
5050
* [AD FS deployment in Azure](/windows-server/identity/ad-fs/deployment/how-to-connect-fed-azure-adfs)
51-
* [High-availability cross-geographic AD FS deployment in Azure with Azure Traffic Manager](/windows-server/identity/ad-fs/deployment/active-directory-adfs-in-azure-with-azure-traffic-manager)
51+
* [High-availability cross-geographic AD FS deployment in Azure with Azure Traffic Manager](/windows-server/identity/ad-fs/deployment/active-directory-adfs-in-azure-with-azure-traffic-manager)

articles/active-directory/hybrid/how-to-connect-fix-default-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.reviewer: darora10
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/21/2019
12+
ms.date: 01/21/2022
1313
ms.subservice: hybrid
1414
ms.author: billmath
1515
ms.collection: M365-identity-device-management
@@ -188,4 +188,4 @@ To fix your rules to change them back to default settings, delete the modified r
188188
## Next steps
189189
- [Hardware and prerequisites](how-to-connect-install-prerequisites.md)
190190
- [Express settings](how-to-connect-install-express.md)
191-
- [Customized settings](how-to-connect-install-custom.md)
191+
- [Customized settings](how-to-connect-install-custom.md)

0 commit comments

Comments
 (0)