Skip to content

Commit 6061454

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rboucher-metrics
2 parents b19b947 + 7cd8b74 commit 6061454

File tree

231 files changed

+1400
-1142
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

231 files changed

+1400
-1142
lines changed

.openpublishing.redirection.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50325,6 +50325,18 @@
5032550325
"source_path": "articles/sql-data-warehouse/what-is-a-data-warehouse-unit-dwu-cdwu.md",
5032650326
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/what-is-a-data-warehouse-unit-dwu-cdwu",
5032750327
"redirect_document_id": true
50328+
},
50329+
{
50330+
"source_path": "articles/cognitive-services/speech-service/quickstart-voice-assistant-java-android.md",
50331+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-java&tabs=android"
50332+
},
50333+
{
50334+
"source_path": "articles/cognitive-services/speech-service/quickstart-voice-assistant-java-jre.md",
50335+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-java&tabs=jre"
50336+
},
50337+
{
50338+
"source_path": "articles/cognitive-services/Speech-Service/quickstart-voice-assistant-csharp-uwp.md",
50339+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-csharp&tabs=uwp"
5032850340
}
5032950341
]
5033050342
}

articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@ There are three ways to check whether an application is in quarantine:
3434

3535
![Provisioning status bar showing quarantine status](./media/application-provisioning-quarantine-status/progress-bar-quarantined.png)
3636

37+
- In the Azure portal, navigate to **Azure Active Directory** > **Audit Logs** > filter on **Activity: Quarantine** and review the quarantine history. While the view in the progress bar as described above shows whether provisioning is currently in quarantine, the audit logs allow you to see the quarantine history for an application.
38+
3739
- Use the Microsoft Graph request [Get synchronizationJob](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-get?view=graph-rest-beta&tabs=http) to programmatically get the status of the provisioning job:
3840

3941
`GET https://graph.microsoft.com/beta/servicePrincipals/{id}/synchronization/jobs/{jobId}/`
@@ -68,4 +70,4 @@ After you've resolved the issue, restart the provisioning job. Certain changes t
6870

6971
- Use Microsoft Graph to [restart the provisioning job](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-restart?view=graph-rest-beta&tabs=http). You'll have full control over what you restart. You can choose to clear escrows (to restart the escrow counter that accrues toward quarantine status), clear quarantine (to remove the application from quarantine), or clear watermarks. Use the following request:
7072

71-
`POST /servicePrincipals/{id}/synchronization/jobs/{jobId}/restart`
73+
`POST /servicePrincipals/{id}/synchronization/jobs/{jobId}/restart`

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Allow your employee's phone to become a passwordless authentication method. You
5757

5858
![Sign in to Microsoft Edge with the Microsoft Authenticator app](./media/concept-authentication-passwordless/concept-web-sign-in-microsoft-authenticator-app.png)
5959

60-
The Authenticator App turns any iOS or Android phone into a strong, passwordless credential. Users can sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using their biometric (touch or face) or PIN to confirm.
60+
The Authenticator App turns any iOS or Android phone into a strong, passwordless credential. Users can sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using their biometric (touch or face) or PIN to confirm. Please refer to [Download and install the Microsoft Authenticator app](https://docs.microsoft.com/azure/active-directory/user-help/user-help-auth-app-download-install) for installation details.
6161

6262
Passwordless authentication using the Authenticator App follows the same basic pattern as Windows Hello for Business. It's a little more complicated as the user needs to be identified so that Azure AD can find the Microsoft Authenticator App version being used:
6363

articles/active-directory/develop/app-registration-portal-training-guide.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: New Azure portal app registration experience
33
titleSuffix: Microsoft identity platform
44
description: An introduction to the new App registration experience in the Azure portal
55
services: active-directory
6-
author: archieag
6+
author: mmacy
77
manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.workload: identity
1212
ms.topic: conceptual
1313
ms.date: 11/8/2019
14-
ms.author: aragra
14+
ms.author: marsma
1515
ms.reviewer: lenalepa, alamaral
1616
ms.custom: aaddev
1717
---
@@ -29,7 +29,7 @@ There are many improvements in the new [App registrations](https://go.microsoft.
2929
check the signed in user in the Azure portal matches the user that
3030
was signed into the Application registration portal by comparing the
3131
email address from your profile.
32-
>
32+
>
3333
> In some cases, especially when you sign in using personal Microsoft
3434
accounts(e.g. Outlook, Live, Xbox, etc.) with an Azure AD email address, we found out that when you
3535
go to the Azure portal from the old experience, it signs you into a
@@ -129,7 +129,7 @@ desktop). [Learn more](quickstart-configure-app-access-web-apis.md#add-redirect-
129129

130130
Web APIs are configured in Expose an API page.
131131

132-
> [!NOTE]
132+
> [!NOTE]
133133
> Try out the new Authentication settings experience where you can
134134
configure settings for your application based on the platform or device
135135
that you want to target. [Learn more](quickstart-configure-app-access-web-apis.md#configure-platform-settings-for-your-application)
@@ -143,8 +143,8 @@ that you want to target. [Learn more](quickstart-configure-app-access-web-apis.m
143143
Microsoft APIs, APIs my organization uses, or My APIs. The search
144144
bar on APIs my organization uses tab searches through service
145145
principals in the tenant.
146-
147-
> [!NOTE]
146+
147+
> [!NOTE]
148148
> You won't see this tab if your application isn't
149149
associated with a tenant. For more info on how to request
150150
permissions using the new experience, see [this

articles/active-directory/develop/app-registrations-training-guide-for-app-registrations-legacy-users.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: New Azure portal app registration training guide
33
description: Introduces the new Azure portal App registration experience
44
services: active-directory
5-
author: archieag
5+
author: mmacy
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
1212
ms.date: 10/25/2019
13-
ms.author: aragra
13+
ms.author: marsma
1414
ms.reviewer: lenalepa, keyam
1515
ms.custom: aaddev
1616
---

articles/active-directory/develop/reference-aadsts-error-codes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -270,6 +270,7 @@ Search on the numeric part of the returned error code. For example, if you rece
270270
| AADSTS1000000 | UserNotBoundError - The Bind API requires the Azure AD user to also authenticate with an external IDP, which hasn't happened yet. |
271271
| AADSTS1000002 | BindCompleteInterruptError - The bind completed successfully, but the user must be informed. |
272272
| AADSTS7000112 | UnauthorizedClientApplicationDisabled - The application is disabled. |
273+
| AADSTS7500529 | The value ‘SAMLId-Guid’ is not a valid SAML ID - Azure AD uses this attribute to populate the InResponseTo attribute of the returned response. ID must not begin with a number, so a common strategy is to prepend a string like "id" to the string representation of a GUID. For example, id6c1c178c166d486687be4aaf5e482730 is a valid ID. |
273274

274275
## Next steps
275276

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
17-
ms.date: 02/26/2020
17+
ms.date: 03/24/2020
1818
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

@@ -43,7 +43,11 @@ This article gives you an overview of the sign-ins report.
4343

4444
### What Azure AD license do you need to access sign-in activity?
4545

46-
* Your tenant must have an Azure AD Premium license associated with it to see the all up sign-in activity report. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in the reports after you upgrade to a premium license with no data activities before the upgrade.
46+
- The sign-in activity report is available in all editions of Azure AD.
47+
48+
- If you want to access the sign-in data using an API, your tenant must have an [Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) license associated with it.
49+
50+
4751

4852
## Sign-ins report
4953

articles/active-directory/reports-monitoring/reference-reports-data-retention.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: reference
1414
ms.tgt_pltfrm:
1515
ms.workload: identity
1616
ms.subservice: report-monitor
17-
ms.date: 11/13/2018
17+
ms.date: 03/24/2020
1818
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

@@ -29,7 +29,7 @@ In this article, you learn about the data retention policies for the different a
2929
| Azure AD Edition | Collection Start |
3030
| :-- | :-- |
3131
| Azure AD Premium P1 <br /> Azure AD Premium P2 | When you sign up for a subscription |
32-
| Azure AD Free <br /> Azure AD Basic | The first time you open the [Azure Active Directory blade](https://ms.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) or use the [reporting APIs](https://aka.ms/aadreports) |
32+
| Azure AD Free| The first time you open the [Azure Active Directory blade](https://ms.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) or use the [reporting APIs](https://aka.ms/aadreports) |
3333

3434
---
3535

@@ -62,19 +62,19 @@ For security signals, the collection process starts when you opt-in to use the *
6262

6363
**Activity reports**
6464

65-
| Report | Azure AD Free | Azure AD Basic | Azure AD Premium P1 | Azure AD Premium P2 |
66-
| :-- | :-- | :-- | :-- | :-- |
67-
| Audit logs | 7 days | 7 days | 30 days | 30 days |
68-
| Sign-ins | N/A | N/A | 30 days | 30 days |
69-
| Azure MFA usage | 30 days | 30 days | 30 days | 30 days |
65+
| Report | Azure AD Free | Azure AD Premium P1 | Azure AD Premium P2 |
66+
| :-- | :-- | :-- | :-- |
67+
| Audit logs | 7 days | 30 days | 30 days |
68+
| Sign-ins | N/A | 30 days | 30 days |
69+
| Azure MFA usage | 30 days | 30 days | 30 days |
7070

7171
You can retain the audit and sign-in activity data for longer than the default retention period outlined above by routing it to an Azure storage account using Azure Monitor. For more information, see [Archive Azure AD logs to an Azure storage account](quickstart-azure-monitor-route-logs-to-storage-account.md).
7272

7373
**Security signals**
7474

75-
| Report | Azure AD Free | Azure AD Basic | Azure AD Premium P1 | Azure AD Premium P2 |
76-
| :-- | :-- | :-- | :-- | :-- |
77-
| Users at risk | 7 days | 7 days | 30 days | 90 days |
78-
| Risky sign-ins | 7 days | 7 days | 30 days | 90 days |
75+
| Report | Azure AD Free | Azure AD Premium P1 | Azure AD Premium P2 |
76+
| :-- | :-- | :-- | :-- |
77+
| Users at risk | 7 days | 30 days | 90 days |
78+
| Risky sign-ins | 7 days | 30 days | 90 days |
7979

8080
---

0 commit comments

Comments
 (0)