Skip to content

Commit 5d52daf

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into yelevin/cross-workspace-incidents
2 parents 14566ad + a69c58c commit 5d52daf

File tree

462 files changed

+4386
-3897
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

462 files changed

+4386
-3897
lines changed

.openpublishing.redirection.json

Lines changed: 29 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
"redirect_url": "/previous-versions/azure/virtual-network/virtual-networks-create-vnet-classic-cli",
2121
"redirect_document_id": false
2222
},
23-
23+
2424
{
2525
"source_path": "articles/virtual-network/virtual-networks-specifying-a-dns-settings-in-a-virtual-network-configuration-file.md",
2626
"redirect_url": "/previous-versions/azure/virtual-network/virtual-networks-specifying-a-dns-settings-in-a-virtual-network-configuration-file",
@@ -727,6 +727,13 @@
727727
"redirect_url": "/azure/cognitive-services/personalizer/how-to-manage-model",
728728
"redirect_document_id": false
729729
},
730+
731+
{
732+
"source_path": "articles/cognitive-services/LUIS/luis-migration-api-authoring.md",
733+
"redirect_url": "/azure/cognitive-services/LUIS/luis-migration-authoring-entities",
734+
"redirect_document_id": false
735+
},
736+
730737
{
731738
"source_path": "articles/cognitive-services/LUIS/luis-resources-faq.md",
732739
"redirect_url": "/azure/cognitive-services/LUIS/troubleshooting",
@@ -1767,6 +1774,21 @@
17671774
"redirect_url": "/azure/cognitive-services/bing-web-search/bing-web-stats",
17681775
"redirect_document_id": false
17691776
},
1777+
{
1778+
"source_path": "articles/cognitive-services/Anomaly-Detector/quickstarts/detect-data-anomalies-csharp-sdk.md",
1779+
"redirect_url": "/azure/cognitive-services/Anomaly-Detector/quickstarts/client-libraries?pivots=programming-language-csharp",
1780+
"redirect_document_id": false
1781+
},
1782+
{
1783+
"source_path": "articles/cognitive-services/Anomaly-Detector/quickstarts/detect-data-anomalies-nodejs-sdk.md",
1784+
"redirect_url": "/azure/cognitive-services/Anomaly-Detector/quickstarts/client-libraries?pivots=programming-language-javascript",
1785+
"redirect_document_id": false
1786+
},
1787+
{
1788+
"source_path": "articles/cognitive-services/Anomaly-Detector/quickstarts/detect-data-anomalies-python-sdk.md",
1789+
"redirect_url": "/azure/cognitive-services/Anomaly-Detector/quickstarts/client-libraries?pivots=programming-language-python",
1790+
"redirect_document_id": false
1791+
},
17701792
{
17711793
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-quickstart.md",
17721794
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-csharp",
@@ -5276,7 +5298,7 @@
52765298
"source_path": "articles/event-grid/event-sources.md",
52775299
"redirect_url": "/azure/event-grid/overview#event-sources",
52785300
"redirect_document_id": false
5279-
},
5301+
},
52805302
{
52815303
"source_path": "articles/event-grid/event-subscription-template.md",
52825304
"redirect_url": "/azure/event-grid/template-samples",
@@ -51214,6 +51236,11 @@
5121451236
"source_path": "articles/media-services/previous/media-services-configure-tricaster-live-encoder.md",
5121551237
"redirect_url": "/azure/media-services",
5121651238
"redirect_document_id": false
51239+
},
51240+
{
51241+
"source_path": "articles/aks/kubernetes-draft.md",
51242+
"redirect_url": "/azure/aks/quickstart-helm",
51243+
"redirect_document_id": false
5121751244
}
5121851245
]
5121951246
}

articles/active-directory-b2c/json-transformations.md

Lines changed: 36 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/10/2019
12+
ms.date: 04/21/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -219,6 +219,39 @@ In the following example, the claims transformation extracts the `id` element fr
219219
- Output claims:
220220
- **extractedClaim**: 6353399
221221

222+
## GetSingleItemFromJson
223+
224+
Gets the first element from a JSON data.
225+
226+
| Item | TransformationClaimType | Data Type | Notes |
227+
| ---- | ----------------------- | --------- | ----- |
228+
| InputClaim | inputJson | string | The ClaimTypes that are used by the claims transformation to get the item from the JSON data. |
229+
| OutputClaim | key | string | The first element key in the JSON. |
230+
| OutputClaim | value | string | The first element value in the JSON. |
231+
232+
In the following example, the claims transformation extracts the first element (given name) from the JSON data.
233+
234+
```XML
235+
<ClaimsTransformation Id="GetGivenNameFromResponse" TransformationMethod="GetSingleItemFromJson">
236+
<InputClaims>
237+
<InputClaim ClaimTypeReferenceId="json" TransformationClaimType="inputJson" />
238+
</InputClaims>
239+
<OutputClaims>
240+
<OutputClaim ClaimTypeReferenceId="givenNameKey" TransformationClaimType="key" />
241+
<OutputClaim ClaimTypeReferenceId="givenName" TransformationClaimType="value" />
242+
</OutputClaims>
243+
</ClaimsTransformation>
244+
```
245+
246+
### Example
247+
248+
- Input claims:
249+
- **inputJson**: {"givenName": "Emilty", "lastName": "Smith"}
250+
- Output claims:
251+
- **key**: givenName
252+
- **value**: Emilty
253+
254+
222255
## GetSingleValueFromJsonArray
223256

224257
Gets the first element from a JSON data array.
@@ -290,3 +323,5 @@ Output claim:
290323
}
291324
}
292325
```
326+
327+

articles/active-directory/app-provisioning/functions-for-customizing-application-data.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -519,11 +519,11 @@ SelectUniqueValue(uniqueValueRule1, uniqueValueRule2, uniqueValueRule3, …)
519519
**Description:**<br>
520520
Requires a minimum of two arguments, which are unique value generation rules defined using expressions. The function evaluates each rule and then checks the value generated for uniqueness in the target app/directory. The first unique value found will be the one returned. If all of the values already exist in the target, the entry will get escrowed and the reason gets logged in the audit logs. There is no upper bound to the number of arguments that can be provided.
521521

522-
> [!NOTE]
523-
> - This is a top-level function, it cannot be nested.
524-
> - This function cannot be applied to attributes that have a matching precedence.
525-
> - This function is only meant to be used for entry creations. When using it with an attribute, set the **Apply Mapping** property to **Only during object creation**.
526-
> - This function is currently only supported for "Workday to Active Directory User Provisioning". It cannot be used with other provisioning applications.
522+
523+
- This is a top-level function, it cannot be nested.
524+
- This function cannot be applied to attributes that have a matching precedence.
525+
- This function is only meant to be used for entry creations. When using it with an attribute, set the **Apply Mapping** property to **Only during object creation**.
526+
- This function is currently only supported for "Workday to Active Directory User Provisioning". It cannot be used with other provisioning applications.
527527

528528

529529
**Parameters:**<br>

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,8 @@ To complete this article, you need the following resources and privileges:
3838
* You need *global administrator* privileges in your Azure AD tenant to enable SMS-based authentication.
3939
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
4040
* [Azure AD Premium P1 or P2][azuread-licensing]
41-
* [Microsoft 365 F1 or F3][m365-firstline-workers-licensing]
41+
* [Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing]
42+
* [Enterprise Mobility + Security (EMS) E3 or E5][ems-licensing] or [Microsoft 365 (M365) E3 or E5][m365-licensing]
4243

4344
## Limitations
4445

@@ -159,3 +160,5 @@ For additional ways to sign in to Azure AD without a password, such as the Micro
159160
[office]: https://www.office.com
160161
[m365-firstline-workers-licensing]: https://www.microsoft.com/licensing/news/m365-firstline-workers
161162
[azuread-licensing]: https://azure.microsoft.com/pricing/details/active-directory/
163+
[ems-licensing]: https://www.microsoft.com/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing
164+
[m365-licensing]: https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans

articles/active-directory/develop/howto-restrict-your-app-to-a-set-of-users.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,17 @@ ms.date: 09/24/2018
1414
ms.author: kkrishna
1515
ms.reviewer: jmprieur
1616
ms.custom: aaddev
17-
#Customer intent: As an application developer, I want to restrict an application that I have registered in Azure AD to a select set of users available in my Azure AD tenant
17+
#Customer intent: As a tenant administrator, I want to restrict an application that I have registered in Azure AD to a select set of users available in my Azure AD tenant
1818
---
19-
# How to: Restrict your Azure AD app to a set of users
19+
# How to: Restrict your Azure AD app to a set of users in an Azure AD tenant
2020

2121
Applications registered in an Azure Active Directory (Azure AD) tenant are, by default, available to all users of the tenant who authenticate successfully.
2222

2323
Similarly, in case of a [multi-tenant](howto-convert-app-to-be-multi-tenant.md) app, all users in the Azure AD tenant where this app is provisioned will be able to access this application once they successfully authenticate in their respective tenant.
2424

2525
Tenant administrators and developers often have requirements where an app must be restricted to a certain set of users. Developers can accomplish the same by using popular authorization patterns like Role Based Access Control (RBAC), but this approach requires a significant amount of work on part of the developer.
2626

27-
Azure AD allows tenant administrators and developers to restrict an app to a specific set of users or security groups in the tenant.
27+
Tenant administrators and developers can restrict an app to a specific set of users or security groups in the tenant by using this built-in feature of Azure AD as well.
2828

2929
## Supported app configurations
3030

@@ -58,7 +58,7 @@ There are two ways to create an application with enabled user assignment. One re
5858

5959
1. Select the application you want to assign a user or security group to from the list.
6060
1. On the application's **Overview** page, select **Properties** from the application’s left-hand navigation menu.
61-
1. Locate the setting **User assignment required?** and set it to **Yes**. When this option is set to **Yes**, users must first be assigned to this application before they can access it.
61+
1. Locate the setting **User assignment required?** and set it to **Yes**. When this option is set to **Yes**, users in the tenant must first be assigned to this application or they won't be able to sign-in to this application.
6262
1. Select **Save** to save this configuration change.
6363

6464
### App registration
@@ -71,7 +71,7 @@ There are two ways to create an application with enabled user assignment. One re
7171
1. Create or select the app you want to manage. You need to be **Owner** of this app registration.
7272
1. On the application's **Overview** page, follow the **Managed application in local directory** link under the essentials in the top of the page. This will take you to the _managed Enterprise Application_ of your app registration.
7373
1. From the navigation blade on the left, select **Properties**.
74-
1. Locate the setting **User assignment required?** and set it to **Yes**. When this option is set to **Yes**, users must first be assigned to this application before they can access it.
74+
1. Locate the setting **User assignment required?** and set it to **Yes**. When this option is set to **Yes**, users in the tenant must first be assigned to this application or they won't be able to sign-in to this application.
7575
1. Select **Save** to save this configuration change.
7676

7777
## Assign users and groups to the app
@@ -85,6 +85,14 @@ Once you've configured your app to enable user assignment, you can go ahead and
8585
A list of users and security groups will be shown along with a textbox to search and locate a certain user or group. This screen allows you to select multiple users and groups in one go.
8686

8787
1. Once you are done selecting the users and groups, press the **Select** button on bottom to move to the next part.
88+
1. (Optional) If you have defined App roles in your application, you can use the **Select role** option to assign the selected users and groups to one of the application's roles.
8889
1. Press the **Assign** button on the bottom to finish the assignments of users and groups to the app.
8990
1. Confirm that the users and groups you added are showing up in the updated **Users and groups** list.
9091

92+
## More information
93+
94+
- [How to: Add app roles in your application](https://docs.microsoft.com/azure/active-directory/develop/howto-add-app-roles-in-azure-ad-apps)
95+
- [Add authorization using app roles & roles claims to an ASP.NET Core web app](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/5-WebApp-AuthZ/5-1-Roles)
96+
- [Using Security Groups and Application Roles in your apps (Video)](https://www.youtube.com/watch?v=V8VUPixLSiM)
97+
- [Azure Active Directory, now with Group Claims and Application Roles](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-Active-Directory-now-with-Group-Claims-and-Application/ba-p/243862)
98+
- [Azure Active Directory app manifest](https://docs.microsoft.com/azure/active-directory/develop/reference-app-manifest)

articles/active-directory/develop/scenario-daemon-acquire-token.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ If you don't yet have a library for your chosen language, you might want to use
172172

173173
#### First case: Access the token request by using a shared secret
174174

175-
```Text
175+
```HTTP
176176
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 //Line breaks for clarity.
177177
Host: login.microsoftonline.com
178178
Content-Type: application/x-www-form-urlencoded
@@ -185,7 +185,7 @@ client_id=535fb089-9ff3-47b6-9bfb-4f1264799865
185185

186186
#### Second case: Access the token request by using a certificate
187187

188-
```Text
188+
```HTTP
189189
POST /{tenant}/oauth2/v2.0/token HTTP/1.1 // Line breaks for clarity.
190190
Host: login.microsoftonline.com
191191
Content-Type: application/x-www-form-urlencoded
@@ -215,7 +215,7 @@ If you get an error message telling you that you used an invalid scope, you prob
215215
If you get an **Insufficient privileges to complete the operation** error when you call the API, the tenant administrator needs to grant permissions to the application. See step 6 of Register the client app above.
216216
You'll typically see an error that looks like this error:
217217

218-
```JSon
218+
```json
219219
Failed to call the web API: Forbidden
220220
Content: {
221221
"error": {

articles/active-directory/develop/scenario-daemon-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The configuration file defines:
5858

5959
[appsettings.json](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/blob/master/1-Call-MSGraph/daemon-console/appsettings.json) from the [.NET Core console daemon](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2) sample.
6060

61-
```JSon
61+
```json
6262
{
6363
"Instance": "https://login.microsoftonline.com/{0}",
6464
"Tenant": "[Enter here the tenantID or domain name for your Azure AD tenant]",

articles/active-directory/develop/scenario-desktop-app-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ To learn more about how to configure an MSAL.NET desktop application:
111111

112112
Imagine a .NET Core console application that has the following `appsettings.json` configuration file:
113113

114-
```JSon
114+
```json
115115
{
116116
"Authentication": {
117117
"AzureCloudInstance": "AzurePublic",
@@ -213,7 +213,7 @@ Objective-C:
213213
```objc
214214
NSError *msalError = nil;
215215

216-
MSALPublicClientApplicationConfig *config = [[MSALPublicClientApplicationConfig alloc] initWithClientId:@"<your-client-id-here>"];
216+
MSALPublicClientApplicationConfig *config = [[MSALPublicClientApplicationConfig alloc] initWithClientId:@"<your-client-id-here>"];
217217
MSALPublicClientApplication *application = [[MSALPublicClientApplication alloc] initWithConfiguration:config error:&msalError];
218218
```
219219

articles/active-directory/develop/scenario-mobile-acquire-token.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ When you use the protocol to get tokens for mobile apps, make two requests:
265265

266266
#### Get an authorization code
267267

268-
```Text
268+
```
269269
https://login.microsoftonline.com/{tenant}/oauth2/v2.0/authorize?
270270
client_id=<CLIENT_ID>
271271
&response_type=code
@@ -277,7 +277,7 @@ client_id=<CLIENT_ID>
277277

278278
#### Get access and refresh the token
279279

280-
```Text
280+
```HTTP
281281
POST /{tenant}/oauth2/v2.0/token HTTP/1.1
282282
Host: https://login.microsoftonline.com
283283
Content-Type: application/x-www-form-urlencoded

articles/active-directory/develop/scenario-protected-web-api-app-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ To expose application permissions, you need to edit the manifest.
105105

106106
The following sample shows the contents of `appRoles`, where the value of `id` can be any unique GUID.
107107

108-
```JSon
108+
```json
109109
"appRoles": [
110110
{
111111
"allowedMemberTypes": [ "Application" ],

0 commit comments

Comments
 (0)