Skip to content

Commit 5f6b97f

Browse files
author
stevestein
committed
fix merge conflict
2 parents 1445589 + 9af5d5c commit 5f6b97f

File tree

58 files changed

+675
-332
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+675
-332
lines changed

.openpublishing.redirection.json

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4042,7 +4042,7 @@
40424042
},
40434043
{
40444044
"source_path": "articles/azure-resource-manager/templates/template-tutorial-create-encrypted-storage-accounts.md",
4045-
"redirect_url": "articles/azure-resource-manager/templates/template-tutorial-use-template-reference",
4045+
"redirect_url": "/azure/azure-resource-manager/templates/template-tutorial-use-template-reference",
40464046
"redirect_document_id": false
40474047
},
40484048
{
@@ -50419,21 +50419,21 @@
5041950419
"source_path": "articles/cognitive-services/speech-service/quickstart-voice-assistant-java-jre.md",
5042050420
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-java&tabs=jre"
5042150421
},
50422-
{
50422+
{
5042350423
"source_path": "articles/security/fundamentals/choose-ad-authn.md",
5042450424
"redirect_url": "/azure/active-directory/hybrid/choose-ad-authn",
50425-
"redirect_document_id": true
50425+
"redirect_document_id": true
5042650426
},
50427-
{
50428-
"source_path": "articles/azure-monitor/app/opencensus-go.md",
50427+
{
50428+
"source_path": "articles/azure-monitor/app/opencensus-go.md",
5042950429
"redirect_url": "/azure/azure-monitor/overview",
5043050430
"redirect_document_id": false
50431-
},
50432-
{
50433-
"source_path": "articles/azure-monitor/app/opencensus-local-forwarder.md",
50431+
},
50432+
{
50433+
"source_path": "articles/azure-monitor/app/opencensus-local-forwarder.md",
5043450434
"redirect_url": "/azure/azure-monitor/overview",
5043550435
"redirect_document_id": false
50436-
},
50436+
},
5043750437
{
5043850438
"source_path": "articles/cognitive-services/Speech-Service/quickstart-voice-assistant-csharp-uwp.md",
5043950439
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-csharp&tabs=uwp"
@@ -50442,6 +50442,10 @@
5044250442
"source_path": "articles/load-balancer/use-existing-lb-vmss-cli.md",
5044350443
"redirect_url": "/azure/load-balancer/configure-vm-scale-set-cli"
5044450444
},
50445+
{
50446+
"source_path": "articles/cognitive-services/speech-service/how-to-custom-speech-test-data.md",
50447+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-custom-speech-test-and-train"
50448+
},
5044550449
{
5044650450
"source_path": "articles/sql-database/sql-database-paas-index.yml",
5044750451
"redirect_url": "/azure/sql-database/sql-database-technical-overview"

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/20/2020
12+
ms.date: 03/30/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -72,7 +72,7 @@ The following sections list available claim resolvers.
7272
| {OIDC:Prompt} | The `prompt` query string parameter. | login |
7373
| {OIDC:RedirectUri} |The `redirect_uri` query string parameter. | https://jwt.ms |
7474
| {OIDC:Resource} |The `resource` query string parameter. | N/A |
75-
| {OIDC:scope} |The `scope` query string parameter. | openid |
75+
| {OIDC:Scope} |The `scope` query string parameter. | openid |
7676
| {OIDC:Username}| The [resource owner password credentials flow](ropc-custom.md) user's username.| [email protected]|
7777

7878
### Context
@@ -158,7 +158,7 @@ The following example shows a RESTful technical profile with this scenario:
158158
<InputClaims>
159159
<InputClaim ClaimTypeReferenceId="userLanguage" DefaultValue="{Culture:LCID}" AlwaysUseDefaultValue="true" />
160160
<InputClaim ClaimTypeReferenceId="policyName" DefaultValue="{Policy:PolicyId}" AlwaysUseDefaultValue="true" />
161-
<InputClaim ClaimTypeReferenceId="scope" DefaultValue="{OIDC:scope}" AlwaysUseDefaultValue="true" />
161+
<InputClaim ClaimTypeReferenceId="scope" DefaultValue="{OIDC:Scope}" AlwaysUseDefaultValue="true" />
162162
<InputClaim ClaimTypeReferenceId="clientId" DefaultValue="{OIDC:ClientId}" AlwaysUseDefaultValue="true" />
163163
</InputClaims>
164164
<UseTechnicalProfileForSessionManagement ReferenceId="SM-Noop" />
@@ -171,7 +171,7 @@ Using claim resolvers, you can prepopulate the sign-in name or direct sign-in to
171171

172172
### Dynamic UI customization
173173

174-
Azure AD B2C enables you to pass query string parameters to your HTML content definition endpoints to dynamically render the page content. For example, this allows the ability to modify the background image on the Azure AD B2C sign-up or sign-in page based on a custom parameter that you pass from your web or mobile application. For more information, see [Dynamically configure the UI by using custom policies in Azure Active Directory B2C](custom-policy-ui-customization.md). You can also localize your HTML page based on a language parameter, or you can change the content based on the client ID.
174+
Azure AD B2C enables you to pass query string parameters to your HTML content definition endpoints to dynamically render the page content. For example, this feature allows the ability to modify the background image on the Azure AD B2C sign-up or sign-in page based on a custom parameter that you pass from your web or mobile application. For more information, see [Dynamically configure the UI by using custom policies in Azure Active Directory B2C](custom-policy-ui-customization.md#configure-dynamic-custom-page-content-uri). You can also localize your HTML page based on a language parameter, or you can change the content based on the client ID.
175175

176176
The following example passes in the query string parameter named **campaignId** with a value of `Hawaii`, a **language** code of `en-US`, and **app** representing the client ID:
177177

articles/active-directory-b2c/custom-policy-ui-customization.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Complete the steps in [Get started with custom policies](custom-policy-get-start
2525

2626
[!INCLUDE [active-directory-b2c-html-how-to](../../includes/active-directory-b2c-html-how-to.md)]
2727

28-
## 4. Modify the extensions file
28+
### 4. Modify the extensions file
2929

3030
To configure UI customization, copy the **ContentDefinition** and its child elements from the base file to the extensions file.
3131

@@ -55,17 +55,17 @@ To configure UI customization, copy the **ContentDefinition** and its child elem
5555

5656
1. Save the extensions file.
5757

58-
## 5. Upload and test your updated custom policy
58+
### 5. Upload and test your updated custom policy
5959

60-
### 5.1 Upload the custom policy
60+
#### 5.1 Upload the custom policy
6161

6262
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
6363
1. Search for and select **Azure AD B2C**.
6464
1. Under **Policies**, select **Identity Experience Framework**.
6565
1. Select **Upload custom policy**.
6666
1. Upload the extensions file that you previously changed.
6767

68-
### 5.2 Test the custom policy by using **Run now**
68+
#### 5.2 Test the custom policy by using **Run now**
6969

7070
1. Select the policy that you uploaded, and then select **Run now**.
7171
1. You should be able to sign up by using an email address.

articles/active-directory-b2c/predicates.md

Lines changed: 45 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/24/2020
12+
ms.date: 03/30/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -41,7 +41,7 @@ The **Predicate** element contains the following attributes:
4141
| Attribute | Required | Description |
4242
| --------- | -------- | ----------- |
4343
| Id | Yes | An identifier that's used for the predicate. Other elements can use this identifier in the policy. |
44-
| Method | Yes | The method type to use for validation. Possible values: **IsLengthRange**, **MatchesRegex**, **IncludesCharacters**, or **IsDateRange**. The **IsLengthRange** value checks whether the length of a string claim value is within the range of minimum and maximum parameters specified. The **MatchesRegex** value checks whether a string claim value matches a regular expression. The **IncludesCharacters** value checks whether a string claim value contains a character set. The **IsDateRange** value checks whether a date claim value is between a range of minimum and maximum parameters specified. |
44+
| Method | Yes | The method type to use for validation. Possible values: [IsLengthRange](#islengthrange), [MatchesRegex](#matchesregex), [IncludesCharacters](#includescharacters), or [IsDateRange](#isdaterange). |
4545
| HelpText | No | An error message for users if the check fails. This string can be localized using the [language customization](localization.md) |
4646

4747
The **Predicate** element contains the following elements:
@@ -63,7 +63,19 @@ The **Parameter** element contains the following attributes:
6363
| ------- | ----------- | ----------- |
6464
| Id | 1:1 | The identifier of the parameter. |
6565

66-
The following example shows a `IsLengthRange` method with the parameters `Minimum` and `Maximum` that specify the length range of the string:
66+
### Predicate methods
67+
68+
#### IsLengthRange
69+
70+
The IsLengthRange method checks whether the length of a string claim value is within the range of minimum and maximum parameters specified. The predicate element supports the following parameters:
71+
72+
| Parameter | Required | Description |
73+
| ------- | ----------- | ----------- |
74+
| Maximum | Yes | The maximum number of characters that can be entered. |
75+
| Minimum | Yes | The minimum number of characters that must be entered. |
76+
77+
78+
The following example shows a IsLengthRange method with the parameters `Minimum` and `Maximum` that specify the length range of the string:
6779

6880
```XML
6981
<Predicate Id="IsLengthBetween8And64" Method="IsLengthRange" HelpText="The password must be between 8 and 64 characters.">
@@ -74,6 +86,14 @@ The following example shows a `IsLengthRange` method with the parameters `Minimu
7486
</Predicate>
7587
```
7688

89+
#### MatchesRegex
90+
91+
The MatchesRegex method checks whether a string claim value matches a regular expression. The predicate element supports the following parameters:
92+
93+
| Parameter | Required | Description |
94+
| ------- | ----------- | ----------- |
95+
| RegularExpression | Yes | The regular expression pattern to match. |
96+
7797
The following example shows a `MatchesRegex` method with the parameter `RegularExpression` that specifies a regular expression:
7898

7999
```XML
@@ -84,6 +104,14 @@ The following example shows a `MatchesRegex` method with the parameter `RegularE
84104
</Predicate>
85105
```
86106

107+
#### IncludesCharacters
108+
109+
The IncludesCharacters method checks whether a string claim value contains a character set. The predicate element supports the following parameters:
110+
111+
| Parameter | Required | Description |
112+
| ------- | ----------- | ----------- |
113+
| CharacterSet | Yes | The set of characters that can be entered. For example, lowercase characters `a-z`, uppercase characters `A-Z`, digits `0-9`, or a list of symbols, such as `@#$%^&amp;*\-_+=[]{}|\\:',?/~"();!`. |
114+
87115
The following example shows a `IncludesCharacters` method with the parameter `CharacterSet` that specifies the set of characters:
88116

89117
```XML
@@ -94,7 +122,16 @@ The following example shows a `IncludesCharacters` method with the parameter `Ch
94122
</Predicate>
95123
```
96124

97-
The following example shows a `IsDateRange` method with the parameters `Minimum` and `Maximum` that specify the date range with a format of `yyyy-MM-dd` and `Today`.
125+
#### IsDateRange
126+
127+
The IsDateRange method checks whether a date claim value is between a range of minimum and maximum parameters specified. The predicate element supports the following parameters:
128+
129+
| Parameter | Required | Description |
130+
| ------- | ----------- | ----------- |
131+
| Maximum | Yes | The largest possible date that can be entered. The format of the date follows `yyyy-mm-dd` convention, or `Today`. |
132+
| Minimum | Yes | The smallest possible date that can be entered. The format of the date follows `yyyy-mm-dd` convention, or `Today`.|
133+
134+
The following example shows a `IsDateRange` method with the parameters `Minimum` and `Maximum` that specify the date range with a format of `yyyy-mm-dd` and `Today`.
98135

99136
```XML
100137
<Predicate Id="DateRange" Method="IsDateRange" HelpText="The date must be between 1970-01-01 and today.">
@@ -384,3 +421,7 @@ In your claim type, add **PredicateValidationReference** element and specify the
384421
<PredicateValidationReference Id="CustomDateRange" />
385422
</ClaimType>
386423
```
424+
425+
## Next steps
426+
427+
- Learn how to [Configure password complexity using custom policies in Azure Active Directory B2C](custom-policy-password-complexity.md) using predicate validations.

articles/active-directory-b2c/secure-rest-api.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/27/2020
12+
ms.date: 03/30/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -182,6 +182,8 @@ The following is an example of a RESTful technical profile configured with an HT
182182

183183
## OAuth2 bearer authentication
184184

185+
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
186+
185187
Bearer token authentication is defined in [OAuth2.0 Authorization Framework: Bearer Token Usage (RFC 6750)](https://www.rfc-editor.org/rfc/rfc6750.txt). In bearer token authentication, Azure AD B2C sends an HTTP request with a token in the authorization header.
186188

187189
```http
@@ -193,6 +195,7 @@ A bearer token is an opaque string. It can be a JWT access token or any string t
193195
- **Bearer token**. To be able to send the bearer token in the Restful technical profile, your policy needs to first acquire the bearer token and then use it in the RESTful technical profile.
194196
- **Static bearer token**. Use this approach when your REST API issues a long-term access token. To use a static bearer token, create a policy key and make a reference from the RESTful technical profile to your policy key.
195197

198+
196199
## Using OAuth2 Bearer
197200

198201
The following steps demonstrate how to use client credentials to obtain a bearer token and pass it into the Authorization header of the REST API calls.

articles/azure-monitor/insights/vminsights-log-search.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -261,7 +261,7 @@ let Today = now(); VMComputer | extend DaysSinceBoot = Today - BootTime | summar
261261
### Summary of Azure VMs by image, location, and SKU
262262

263263
```kusto
264-
VMComputer | where AzureLocation != "" | summarize by ComputerName, AzureImageOffering, AzureLocation, AzureImageSku
264+
VMComputer | where AzureLocation != "" | summarize by Computer, AzureImageOffering, AzureLocation, AzureImageSku
265265
```
266266

267267
### List the physical memory capacity of all managed computers
@@ -279,7 +279,7 @@ VMComputer | summarize arg_max(TimeGenerated, *) by _ResourceId | project Comput
279279
### Find all processes with "sql" in the command line
280280

281281
```kusto
282-
VMComputer | where CommandLine contains_cs "sql" | summarize arg_max(TimeGenerated, *) by _ResourceId
282+
VMProcess | where CommandLine contains_cs "sql" | summarize arg_max(TimeGenerated, *) by _ResourceId
283283
```
284284

285285
### Find a machine (most recent record) by resource name
@@ -303,7 +303,7 @@ VMProcess | where Machine == "m-559dbcd8-3130-454d-8d1d-f624e57961bc" | summariz
303303
### List all computers running SQL Server
304304

305305
```kusto
306-
VMComputer | where AzureResourceName in ((search in (VMProcess) "\*sql\*" | distinct Machine)) | distinct Computer
306+
VMComputer | where AzureResourceName in ((search in (VMProcess) "*sql*" | distinct Machine)) | distinct Computer
307307
```
308308

309309
### List all unique product versions of curl in my datacenter
@@ -315,7 +315,7 @@ VMProcess | where ExecutableName == "curl" | distinct ProductVersion
315315
### Create a computer group of all computers running CentOS
316316

317317
```kusto
318-
VMComputer | where OperatingSystemFullName contains_cs "CentOS" | distinct ComputerName
318+
VMComputer | where OperatingSystemFullName contains_cs "CentOS" | distinct Computer
319319
```
320320

321321
### Bytes sent and received trends

articles/azure-monitor/platform/alerts-metric-create-templates.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1513,6 +1513,10 @@ This section will describe Azure Resource Manager templates for three scenarios
15131513
- Monitoring all virtual machines (in one Azure region) in a subscription.
15141514
- Monitoring a list of virtual machines (in one Azure region) in a subscription.
15151515

1516+
> [!NOTE]
1517+
>
1518+
> In a metric alert rule that monitors multiple resources, only one condition is allowed.
1519+
15161520
### Static threshold alert on all virtual machines in one or more resource groups
15171521

15181522
This template will create a static threshold metric alert rule that monitors Percentage CPU for all virtual machines (in one Azure region) in one or more resource groups.

articles/azure-monitor/platform/alerts-metric-overview.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,10 @@ You can specify the scope of monitoring by a single metric alert rule in one of
137137

138138
Creating metric alert rules that monitor multiple resources is like [creating any other metric alert](alerts-metric.md) that monitors a single resource. Only difference is that you would select all the resources you want to monitor. You can also create these rules through [Azure Resource Manager templates](../../azure-monitor/platform/alerts-metric-create-templates.md#template-for-a-metric-alert-that-monitors-multiple-resources). You will receive individual notifications for each monitored resource.
139139

140+
> [!NOTE]
141+
>
142+
> In a metric alert rule that monitors multiple resources, only one condition is allowed.
143+
140144
## Typical latency
141145

142146
For metric alerts, typically you will get notified in under 5 minutes if you set the alert rule frequency to be 1 min. In cases of heavy load for notification systems, you might see a longer latency.

articles/azure-resource-manager/templates/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@
6868
- name: Advanced
6969
items:
7070
- name: Utilize template reference
71-
href: template-tutorial-create-encrypted-storage-accounts.md
71+
href: template-tutorial-use-template-reference.md
7272
- name: Create multiple instances
7373
displayName: iteration,copy
7474
href: template-tutorial-create-multiple-instances.md

articles/backup/azure-file-share-backup-overview.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,15 @@ Azure file share backup is a native, cloud based backup solution that protects y
3939

4040
7. The backup and restore job monitoring data is pushed to the Azure Backup Monitoring service. This allows you to monitor cloud backups for your file shares in a single dashboard. In addition, you can also configure alerts or email notifications when backup health is affected. Emails are sent via the Azure email service.
4141

42+
## Backup costs
43+
44+
Azure File share backup is a snapshot-based solution and storage charges incurred for snapshots are billed along with Azure Files Usage as per the pricing details mentioned [here](https://azure.microsoft.com/pricing/details/storage/files/).
45+
46+
However, the protected instance fee for leveraging the backup solution is according to the pricing model described under the [Backup For Azure Files](https://azure.microsoft.com/pricing/details/backup/) section. Currently, the actual price has been updated only for West Central US. For other regions, exact prices will be updated soon with some regional variations, but using the same pricing model.
47+
48+
>[!NOTE]
49+
>During preview, there is no "Protected Instance fee" and you will be charged only for snapshots according to the pricing mentioned [here](https://azure.microsoft.com/pricing/details/storage/files/).
50+
4251
## Next steps
4352

4453
* Learn how to [Back up Azure file shares](backup-afs.md)

0 commit comments

Comments
 (0)