Skip to content

Commit 64def2a

Browse files
authored
Merge pull request #104844 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents 6ee876c + c7f24bd commit 64def2a

File tree

169 files changed

+2425
-1802
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

169 files changed

+2425
-1802
lines changed

.openpublishing.redirection.json

Lines changed: 40 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41230,6 +41230,26 @@
4123041230
"redirect_url": "/azure/azure-monitor/platform/diagnostic-settings-legacy",
4123141231
"redirect_document_id": false
4123241232
},
41233+
{
41234+
"source_path": "articles/azure-monitor/platform/azure-storage-iis-table.md",
41235+
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-logs",
41236+
"redirect_document_id": false
41237+
},
41238+
{
41239+
"source_path": "articles/azure-monitor/platform/diagnostics-extension-schema-1dot3.md",
41240+
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-schema-windows",
41241+
"redirect_document_id": false
41242+
},
41243+
{
41244+
"source_path": "articles/azure-monitor/platform/diagnostics-extension-schema.md",
41245+
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-versions",
41246+
"redirect_document_id": false
41247+
},
41248+
{
41249+
"source_path": "articles/azure-monitor/platform/diagnostics-extension-to-storage.md",
41250+
"redirect_url": "/azure/azure-monitor/cloud-services/diagnostics-extension-to-storage",
41251+
"redirect_document_id": false
41252+
},
4123341253
{
4123441254
"source_path": "articles/machine-learning/service/how-to-automated-ml.md",
4123541255
"redirect_url": "/azure/machine-learning/service/concept-automated-ml",
@@ -47088,8 +47108,8 @@
4708847108
},
4708947109
{
4709047110
"source_path": "articles/terraform/terraform-vm-msi.md",
47091-
"redirect_url": "/azure/terraform/terraform-vm-managed-identities-for-azure-resources",
47092-
"redirect_document_id": true
47111+
"redirect_url": "/azure/terraform/terraform-create-complete-vm",
47112+
"redirect_document_id": false
4709347113
},
4709447114
{
4709547115
"source_path": "articles/cognitive-services/speech-service/quickstart-csharp-dotnet-windows.md",
@@ -48534,22 +48554,37 @@
4853448554
{
4853548555
"source_path": "articles/virtual-machines/linux/ansible-install-configure.md",
4853648556
"redirect_url": "/azure/ansible/ansible-install-configure",
48537-
"redirect_document_id": false
48557+
"redirect_document_id": true
4853848558
},
4853948559
{
4854048560
"source_path": "articles/virtual-machines/linux/ansible-create-vm.md",
4854148561
"redirect_url": "/azure/ansible/ansible-create-vm",
48542-
"redirect_document_id": false
48562+
"redirect_document_id": true
4854348563
},
4854448564
{
4854548565
"source_path": "articles/virtual-machines/linux/ansible-manage-linux-vm.md",
4854648566
"redirect_url": "/azure/ansible/ansible-manage-linux-vm",
48547-
"redirect_document_id": false
48567+
"redirect_document_id": true
4854848568
},
4854948569
{
4855048570
"source_path": "articles/app-service/containers/tutorial-java-enterprise-postgresql-app.md",
4855148571
"redirect_url": "/azure/app-service/containers/configure-language-java",
4855248572
"redirect_document_id": false
48573+
},
48574+
{
48575+
"source_path": "articles/virtual-machines/linux/terraform-install-configure.md",
48576+
"redirect_url": "/azure/terraform/terraform-install-configure",
48577+
"redirect_document_id": true
48578+
},
48579+
{
48580+
"source_path": "articles/virtual-machines/linux/terraform-create-complete-vm.md",
48581+
"redirect_url": "/azure/terraform/terraform-create-complete-vm",
48582+
"redirect_document_id": true
48583+
},
48584+
{
48585+
"source_path": "articles/terraform/terraform-vm-managed-identities-for-azure-resources.md",
48586+
"redirect_url": "/azure/terraform/terraform-create-complete-vm",
48587+
"redirect_document_id": false
4855348588
}
4855448589
]
4855548590
}

articles/active-directory/conditional-access/plan-conditional-access.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ There are two types of Conditional Access policies: baseline and standard. A [ba
2929

3030
In a standard Conditional Access policy, you can customize all settings to adjust the policy to your business requirements. Standard policies require an Azure AD Premium P1 license.
3131

32+
>[!NOTE]
33+
> We recommend using Azure AD device based Conditional Access policy to get the best enforcement after initial device authentication. This includes closing sessions if the device falls out of compliance and device code flow.
34+
3235
## Draft policies
3336

3437
Azure Active Directory Conditional Access enables you to bring the protection of your cloud apps to a new level. In this new level, how you can access a cloud app is based on a dynamic policy evaluation instead of a static access configuration. With a Conditional Access policy, you define a response (**do this**) to an access condition (**when this happens**).

articles/active-directory/conditional-access/require-managed-devices.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,10 @@ Requiring managed devices for cloud app access ties **Azure AD Conditional Acces
2929
- **[Conditional Access in Azure Active Directory](../active-directory-conditional-access-azure-portal.md)** - This article provides you with a conceptual overview of Conditional Access and the related terminology.
3030
- **[Introduction to device management in Azure Active Directory](../devices/overview.md)** - This article gives you an overview of the various options you have to get devices under organizational control.
3131

32+
>[!IMPORTANT]
33+
> We recommend using Azure AD device based Conditional Access policy to get the best enforcement after initial device authentication. This includes closing sessions if the device falls out of compliance and device code flow.
34+
35+
3236
## Scenario description
3337

3438
Mastering the balance between security and productivity is a challenge. The proliferation of supported devices to access your cloud resources helps to improve the productivity of your users. On the flip side, you probably don't want certain resources in your environment to be accessed by devices with an unknown protection level. For the affected resources, you should require that users can only access them using a managed device.

articles/active-directory/develop/howto-convert-app-to-be-multi-tenant.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ ms.service: active-directory
1111
ms.subservice: develop
1212
ms.topic: conceptual
1313
ms.workload: identity
14-
ms.date: 12/10/2019
14+
ms.date: 02/19/2020
1515
ms.author: ryanwi
16-
ms.reviewer: jmprieur, lenalepa, sureshja
16+
ms.reviewer: jmprieur, lenalepa, sureshja, kkrishna
1717
ms.custom: aaddev
1818
---
1919

@@ -33,7 +33,7 @@ There are four simple steps to convert your application into an Azure AD multi-t
3333
3. [Update your code to handle multiple issuer values](#update-your-code-to-handle-multiple-issuer-values)
3434
4. [Understand user and admin consent and make appropriate code changes](#understand-user-and-admin-consent)
3535

36-
Let’s look at each step in detail. You can also jump straight to [this list of multi-tenant samples](https://docs.microsoft.com/samples/browse/?products=azure-active-directory).
36+
Let’s look at each step in detail. You can also jump straight to the sample [Build a multi-tenant SaaS web application that calls Microsoft Graph using Azure AD and OpenID Connect](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/master/2-WebApp-graph-user/2-3-Multi-Tenant/README.md).
3737

3838
## Update registration to be multi-tenant
3939

articles/active-directory/managed-identities-azure-resources/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.author: markvi
1919
ms.collection: M365-identity-device-management
2020
---
2121

22-
# What is managed identities for Azure resources?
22+
# What are managed identities for Azure resources?
2323

2424
[!INCLUDE [preview-notice](../../../includes/active-directory-msi-preview-notice.md)]
2525

articles/active-directory/reports-monitoring/reference-sign-ins-error-codes.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
17-
ms.date: 08/08/2019
17+
ms.date: 02/19/2020
1818
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

@@ -130,6 +130,7 @@ You can also programmatically access the sign-in data using the [reporting API](
130130
|50178|Session Control is not supported for passthrough users.|
131131
|50180|Windows Integrated authentication is needed. Enable the tenant for Seamless SSO.|
132132
|50181|OTP related failure during sign-in. |
133+
|50194|Application '{appId}'({appName}) is not configured as a multi-tenant application. Usage of the /common endpoint is not supported for such applications created after '{time}'. Use a tenant-specific endpoint or configure the application to be multi-tenant.|
133134
|50201|This message prompt interrupt will be shown to the user during login when additional information should be provided to user.|
134135
|51001|Domain Hint is not present with On-Premises Security Identifier - On-Premises UPN.|
135136
|51004|User account doesn’t exist in the directory.|
@@ -185,13 +186,19 @@ You can also programmatically access the sign-in data using the [reporting API](
185186
|90072| The account needs to be added as an external user in the tenant first. Sign-out and sign-in again with a different Azure AD account.|
186187
|90094| The app has requested permissions which the signed-in user is not allowed to consent to, and the user was blocked. |
187188
|90095| The app has requested permissions which the signed-in user is not allowed to consent to, and the user was shown the [admin consent request](../manage-apps/configure-admin-consent-workflow.md) form. |
189+
|130500|Phone sign in was blocked due to User Credential Policy.|
188190
|500011| The resource principal named <site address> was not found in the tenant named <tenant ID>. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant. You might have sent your authentication request to the wrong tenant.|
191+
|500014|Resource '{identifier}' is disabled.|
189192
|500021| Tenant is restricted by company proxy. Denying the resource access.|
190193
|500121| Authentication failed during strong authentication request.|
191194
|500133| The assertion is not within its valid time range. Ensure that the access token is not expired before using it for user assertion, or request a new token.|
195+
|500172|Certificate '{name}' issued by '{issuer}' is not valid. Current time: '{curTime}'. Certificate NotBefore: '{startTime}'. Certificate NotAfter: '{endTime}'.|
196+
|501291|Client app is a Mam app, device is not registered and request is sent using a broker. Work place join needs to be done to register the device before the app can be accessed.|
197+
|530003|Your device is required to be managed to access this resource.|
192198
|530021|Application does not meet the Conditional Access approved app requirements.|
193199
|530032|Blocked by security policy.|
194200
|700016|Application with identifier '{appIdentifier}' was not found in the directory '{tenantName}'. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant. You may have sent your authentication request to the wrong tenant.|
201+
|700051|Response_type 'token' is not enabled for the application. The application requested an unsupported response type due to the following reasons: response_type 'token' is not enabled for the application. Application owner should go to the Azure portal or call MS Graph to enable the implicit access token grant.|
195202
|900432|Confidential Client is not supported in Cross Cloud request.|
196203
|5000811|Unable to verify SAML token signature. The signing key identifier does not match any valid registered keys.|
197204
|7000215|Invalid client secret was provided.|

articles/aks/certificate-rotation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ AKS generates and uses the following certificates, Certificate Authorities, and
3838
>
3939
> Additionally, you can check the expiration date of your cluster's certificate. For example, the following command displays the certificate details for the *myAKSCluster* cluster.
4040
> ```console
41-
> kubectl config view --raw -o jsonpath='{.clusters[?(@.name == "myAKSCluster")].cluster.certificate-authority-data}' | base64 -d > my-cert.crt
41+
> kubectl config view --raw -o jsonpath="{.clusters[?(@.name == 'myAKSCluster')].cluster.certificate-authority-data}" | base64 -d > my-cert.crt
4242
> openssl x509 -in my-cert.crt -text
4343
> ```
4444

articles/aks/quotas-skus-regions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ All other network, compute, and storage limitations apply to the provisioned inf
2828
2929
## Restricted VM sizes
3030

31-
Each node in an AKS cluster contains a fixed amount of compute resources such as vCPU and memory. If an AKS node contains insufficient compute resources, pods might fail to run correctly. To ensure that the required *kube-system* pods and your applications can reliably be scheduled, don't use the following VM SKUs in AKS:
31+
Each node in an AKS cluster contains a fixed amount of compute resources such as vCPU and memory. If an AKS node contains insufficient compute resources, pods might fail to run correctly. To ensure that the required *kube-system* pods and your applications can reliably be scheduled, **don't use the following VM SKUs in AKS**:
3232

3333
- Standard_A0
3434
- Standard_A1

articles/api-management/import-api-from-oas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.author: apimpm
2020
This article shows how to import an "OpenAPI specification" back-end API residing at https://conferenceapi.azurewebsites.net?format=json. This back-end API is provided by Microsoft and hosted on Azure. The article also shows how to test the APIM API.
2121

2222
> [!IMPORTANT]
23-
> See this [document](https://blogs.msdn.microsoft.com/apimanagement/2018/04/11/important-changes-to-openapi-import-and-export/) for important information and tips related to OpenAPI import.
23+
> See this [document](https://azure.microsoft.com/blog/announcing-the-preview-of-openapi-specification-v3-support-in-azure-api-management/) for important information and tips related to OpenAPI import.
2424
2525
In this article, you learn how to:
2626

articles/azure-app-configuration/TOC.yml

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
- name: Azure App Configuration Preview documentation
1+
- name: Azure App Configuration documentation
22
href: index.yml
33
- name: Overview
44
items:
@@ -59,6 +59,8 @@
5959
items:
6060
- name: Key-value store
6161
href: concept-key-value.md
62+
- name: Encrypt using customer-managed keys
63+
href: concept-customer-managed-keys.md
6264
- name: Point-in-time snapshot
6365
href: concept-point-time-snapshot.md
6466
- name: Feature management
@@ -67,14 +69,18 @@
6769
href: concept-github-action.md
6870
- name: Event handling
6971
href: concept-app-configuration-event.md
72+
- name: Authentication
73+
items:
74+
- name: Integrate with Azure Managed Identity
75+
href: howto-integrate-azure-managed-service-identity.md
76+
- name: Enable access using Azure Active Directory
77+
href: concept-enable-rbac.md
7078
- name: High availability
7179
items:
7280
- name: Resiliency and disaster recovery
7381
href: concept-disaster-recovery.md
7482
- name: How-to guides
7583
items:
76-
- name: Integrate with Azure Managed Identity
77-
href: howto-integrate-azure-managed-service-identity.md
7884
- name: Import or export configuration data
7985
href: howto-import-export-data.md
8086
- name: Route events to a custom endpoint
@@ -86,12 +92,12 @@
8692
- name: Configuration
8793
items:
8894
- name: Azure CLI
89-
href: https://docs.microsoft.com/cli/azure/ext/appconfig/appconfig?view=azure-cli-latest
95+
href: https://docs.microsoft.com/cli/azure/appconfig?view=azure-cli-latest
9096
- name: .NET Core provider
9197
href: https://go.microsoft.com/fwlink/?linkid=2074664
9298
- name: .NET Framework builder
9399
href: https://go.microsoft.com/fwlink/?linkid=2074663
94-
- name: Azure SDK for .Net
100+
- name: Azure SDK for .NET
95101
href: https://go.microsoft.com/fwlink/?linkid=2092056
96102
- name: Java Spring provider
97103
href: https://go.microsoft.com/fwlink/?linkid=2074659

0 commit comments

Comments
 (0)