Skip to content

Commit 602e6db

Browse files
authored
Merge pull request #114083 from MicrosoftDocs/master
5/06 AM Publish
2 parents c535228 + 6bd7a8c commit 602e6db

File tree

61 files changed

+1583
-829
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+1583
-829
lines changed

.openpublishing.redirection.json

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49084,6 +49084,51 @@
4908449084
"source_path": "articles/azure-cache-for-redis/cache-howto-manage-redis-cache-powershell.md",
4908549085
"redirect_url": "/azure/azure-cache-for-redis/cache-how-to-manage-redis-cache-powershell",
4908649086
"redirect_document_id": false
49087+
},
49088+
{
49089+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-prerequisites.md",
49090+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49091+
"redirect_document_id": false
49092+
},
49093+
{
49094+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-create-offer.md",
49095+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49096+
"redirect_document_id": false
49097+
},
49098+
{
49099+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-offer-settings-tab.md",
49100+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49101+
"redirect_document_id": false
49102+
},
49103+
{
49104+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-technical-info-tab.md",
49105+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49106+
"redirect_document_id": false
49107+
},
49108+
{
49109+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-storefront-details-tab.md",
49110+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49111+
"redirect_document_id": false
49112+
},
49113+
{
49114+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-contacts-tab.md",
49115+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49116+
"redirect_document_id": false
49117+
},
49118+
{
49119+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-create-technical-assets.md",
49120+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49121+
"redirect_document_id": false
49122+
},
49123+
{
49124+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-publish-offer.md",
49125+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49126+
"redirect_document_id": false
49127+
},
49128+
{
49129+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-update-existing-offer.md",
49130+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49131+
"redirect_document_id": false
4908749132
},
4908849133
{
4908949134
"source_path": "articles/machine-learning/algorithm-module-reference/import-from-azure-blob-storage.md",

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1198,8 +1198,8 @@ The SCIM spec does not define a SCIM-specific scheme for authentication and auth
11981198
[!NOTE] It's not recommended to leave the token field blank in the Azure AD provisioning configuration custom app UI. The token generated is primarily available for testing purposes.
11991199

12001200
**OAuth authorization code grant flow:** The provisioning service supports the [authorization code grant](https://tools.ietf.org/html/rfc6749#page-24). After submitting your request for publishing your app in the gallery, our team will work with you to collect the following information:
1201-
* Authorization URL: A URL by the client to obtain authorization from the resource owner via user-agent redirection. The user is redirected to this URL to authorize access.
1202-
* Token exchange URL: A URL by the client to exchange an authorization grant for an access token, typically with client authentication.
1201+
* Authorization URL: A URL by the client to obtain authorization from the resource owner via user-agent redirection. The user is redirected to this URL to authorize access. Note that this URL is currently not configurable per tenant.
1202+
* Token exchange URL: A URL by the client to exchange an authorization grant for an access token, typically with client authentication. Note that this URL is currently not configurable per tenant.
12031203
* Client ID: The authorization server issues the registered client a client identifier, which is a unique string representing the registration information provided by the client. The client identifier is not a secret; it is exposed to the resource owner and **must not** be used alone for client authentication.
12041204
* Client secret: The client secret is a secret generated by the authorization server. It should be a unique value known only to the authorization server.
12051205

articles/active-directory/develop/v2-oauth2-auth-code-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ At a high level, the entire authentication flow for a native/mobile application
3131

3232
## Request an authorization code
3333

34-
The authorization code flow begins with the client directing the user to the `/authorize` endpoint. In this request, the client requests the `openid`, `offline_access`, and `https://graph.microsoft.com/mail.read ` permissions from from the user. Some permissions are admin-restricted, for example writing data to an organization's directory by using `Directory.ReadWrite.All`. If your application requests access to one of these permissions from an organizational user, the user receives an error message that says they're not authorized to consent to your app's permissions. To request access to admin-restricted scopes, you should request them directly from a company administrator. For more information, read [Admin-restricted permissions](v2-permissions-and-consent.md#admin-restricted-permissions).
34+
The authorization code flow begins with the client directing the user to the `/authorize` endpoint. In this request, the client requests the `openid`, `offline_access`, and `https://graph.microsoft.com/mail.read ` permissions from the user. Some permissions are admin-restricted, for example writing data to an organization's directory by using `Directory.ReadWrite.All`. If your application requests access to one of these permissions from an organizational user, the user receives an error message that says they're not authorized to consent to your app's permissions. To request access to admin-restricted scopes, you should request them directly from a company administrator. For more information, read [Admin-restricted permissions](v2-permissions-and-consent.md#admin-restricted-permissions).
3535

3636
```
3737
// Line breaks for legibility only

articles/active-directory/saas-apps/google-apps-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 02/14/2020
16+
ms.date: 05/06/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -137,8 +137,8 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
137137

138138
| |
139139
|--|
140-
| `https://google.com` |
141-
| `https://google.com/a/<yourdomain.com>` |
140+
| `https://www.google.com` |
141+
| `https://www.google.com/a/<yourdomain.com>` |
142142

143143

144144
1. On the **Basic SAML Configuration** section, if you want to configure for the **Google Cloud Platform** perform the following steps:
@@ -158,8 +158,8 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
158158

159159
| |
160160
|--|
161-
| `https://google.com` |
162-
| `https://google.com/a/<yourdomain.com>` |
161+
| `https://www.google.com` |
162+
| `https://www.google.com/a/<yourdomain.com>` |
163163

164164
> [!NOTE]
165165
> These values are not real. Update these values with the actual Sign-On URL and Identifier. Google Cloud (G Suite) Connector doesn't provide Entity ID/Identifier value on Single Sign On configuration so when you uncheck the **domain specific issuer** option the Identifier value will be `google.com`. If you check the **domain specific issuer** option it will be `google.com/a/<yourdomainname.com>`. To check/uncheck the **domain specific issuer** option you need to go to the **Configure Google Cloud (G Suite) Connector SSO** section which is explained later in the tutorial. For more information contact [Google Cloud (G Suite) Connector Client support team](https://www.google.com/contact/).

articles/automation/automation-solution-vm-management-config.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
2-
title: Azure Automation Configure Start/Stop VMs during off hours solution
2+
title: Azure Automation Configure Start/Stop VMs during off-hours solution
33
description: This article describes how to configure the Start/Stop VMs during off-hours solution to support different use cases or scenarios.
44
services: automation
55
ms.subservice: process-automation
66
ms.date: 04/01/2020
77
ms.topic: conceptual
88
---
99

10-
# How to configure Start/Stop VMs during off hours solution
10+
# How to configure Start/Stop VMs during off-hours solution
1111

12-
With the **Start/Stop VMs during off hours** solution, you can:
12+
With the **Start/Stop VMs during off-hours** solution, you can:
1313

1414
- [Schedule VMs to start and stop](#schedule).
1515
- Schedule VMs to start and stop in ascending order by [using Azure Tags](#tags) (not supported for classic VMs).

articles/automation/automation-solution-vm-management-enable.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Enable Azure Automation Start/Stop VMs during off hours solution
3-
description: This article describes how to enable the Azure Automation Start/Stop VM solution for your Azure virtual machines.
2+
title: Enable Azure Automation Start/Stop VMs during off-hours solution
3+
description: This article describes how to enable the Azure Automation Start/Stop VM during off-hours solution for your Azure virtual machines.
44
services: automation
55
ms.subservice: process-automation
66
ms.date: 04/01/2020

articles/automation/automation-solution-vm-management-logs.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
2-
title: How to query logs from Start/Stop VMs solution
3-
description: This article describes how to query log data generated by the Start/Stop VMs solution from Azure Monitor.
2+
title: How to query logs from Start/Stop VMs during off-hours
3+
description: This article describes how to query log data generated by Start/Stop VMs during off-hours solution from Azure Monitor.
44
services: automation
55
ms.subservice: process-automation
66
ms.date: 04/01/2020
77
ms.topic: conceptual
88
---
99

10-
# How to query logs from Start/Stop VMs solution
10+
# How to query logs from Start/Stop VMs during off-hours
1111

12-
Azure Automation forwards two types of records to the linked Log Analytics workspace: job logs and job streams. This data is available for [query](../azure-monitor/log-query/log-query-overview.md) in Azure Monitor.
12+
Azure Automation forwards two types of records to the linked Log Analytics workspace: job logs and job streams. This article reviews the data available for [query](../azure-monitor/log-query/log-query-overview.md) in Azure Monitor.
1313

1414
## Job logs
1515

0 commit comments

Comments
 (0)