Skip to content

Commit 668b348

Browse files
authored
Merge pull request #106846 from MicrosoftDocs/master
3/06 PM Publish
2 parents f5e4d04 + d3f8178 commit 668b348

File tree

197 files changed

+1974
-1328
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

197 files changed

+1974
-1328
lines changed

.openpublishing.redirection.json

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1701,6 +1701,26 @@
17011701
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-python",
17021702
"redirect_document_id": false
17031703
},
1704+
{
1705+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-search-sdk-quickstart.md",
1706+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-csharp",
1707+
"redirect_document_id": false
1708+
},
1709+
{
1710+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-sdk-java-quickstart.md",
1711+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-java",
1712+
"redirect_document_id": false
1713+
},
1714+
{
1715+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-search-sdk-node-quickstart.md",
1716+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-javascript",
1717+
"redirect_document_id": false
1718+
},
1719+
{
1720+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-sdk-python-quickstart.md",
1721+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-python",
1722+
"redirect_document_id": false
1723+
},
17041724
{
17051725
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
17061726
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",
@@ -6706,6 +6726,10 @@
67066726
"redirect_url": "/azure/logic-apps/logic-apps-using-sap-connector",
67076727
"redirect_document_id": true
67086728
},
6729+
{
6730+
"source_path": "articles/scheduler/get-started-portal.md",
6731+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
6732+
},
67096733
{
67106734
"source_path": "articles/connectors/connectors-create-api-googledrive.md",
67116735
"redirect_url": "https://docs.microsoft.com/connectors/googledrive/",

articles/active-directory-b2c/relyingparty.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ The **SingleSignOn** element contains in the following attribute:
123123
| --------- | -------- | ----------- |
124124
| Scope | Yes | The scope of the single sign-on behavior. Possible values: `Suppressed`, `Tenant`, `Application`, or `Policy`. The `Suppressed` value indicates that the behavior is suppressed. For example, in the case of a single sign-on session, no session is maintained for the user and the user is always prompted for an identity provider selection. The `TrustFramework` value indicates that the behavior is applied for all policies in the trust framework. For example, a user navigating through two policy journeys for a trust framework is not prompted for an identity provider selection. The `Tenant` value indicates that the behavior is applied to all policies in the tenant. For example, a user navigating through two policy journeys for a tenant is not prompted for an identity provider selection. The `Application` value indicates that the behavior is applied to all policies for the application making the request. For example, a user navigating through two policy journeys for an application is not prompted for an identity provider selection. The `Policy` value indicates that the behavior only applies to a policy. For example, a user navigating through two policy journeys for a trust framework is prompted for an identity provider selection when switching between policies. |
125125
| KeepAliveInDays | Yes | Controls how long the user remains signed in. Setting the value to 0 turns off KMSI functionality. For more information, see [Keep me signed in](custom-policy-keep-me-signed-in.md). |
126-
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more infomation, see [Web sign-in with OpenID Connect](openid-connect.md). |
126+
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more information, see [Web sign-in with OpenID Connect](openid-connect.md). |
127127

128128

129129
## JourneyInsights

articles/active-directory/develop/scenario-daemon-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Here are some examples of use cases for daemon apps:
4141
- Desktop applications (like Windows services on Windows or daemon processes on Linux) that perform batch jobs, or an operating system service that runs in the background
4242
- Web APIs that need to manipulate directories, not specific users
4343

44-
There's another common case where non-daemon applications use client credentials: even when they act on behalf of users, they need to access a web API or a resource under own their identity for technical reasons. An example is access to secrets in Azure Key Vault or an Azure SQL database for a cache.
44+
There's another common case where non-daemon applications use client credentials: even when they act on behalf of users, they need to access a web API or a resource under their own identity for technical reasons. An example is access to secrets in Azure Key Vault or an Azure SQL database for a cache.
4545

4646
Applications that acquire a token for their own identities:
4747

articles/active-directory/hybrid/how-to-connect-sync-feature-preferreddatalocation.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ The outbound synchronization rule permits the attribute value to flow from the m
180180
| sourceObjectType | EQUAL | User |
181181
| cloudMastered | NOTEQUAL | True |
182182

183-
Scoping filter determines which Azure AD objects this outbound synchronization rule is applied to. In this example, we use the same scoping filter from “Out to Azure AD – User Identity” OOB (out-of-box) synchronization rule. It prevents the synchronization rule from being applied to **User** objects that are not synchronized from on-premises Active Directory. You might need to tweak the scoping filter according to your Azure AD Connect deployment.
183+
Scoping filter determines which Azure AD objects this outbound synchronization rule is applied to. In this example, we use the same scoping filter from “Out to Azure AD – User Identity” OOB (out-of-box) synchronization rule. It prevents the synchronization rule from being applied to **User** objects that are not synchronized from an on-premises Active Directory. You might need to tweak the scoping filter according to your Azure AD Connect deployment.
184184

185185
6. Go to the **Transformation** tab, and implement the following transformation rule:
186186

@@ -255,7 +255,6 @@ It is now time to verify the configuration and enable it for your users.
255255
3. Using Exchange Online PowerShell, verify that the mailbox region has been set correctly.
256256
![Screenshot of Exchange Online PowerShell](./media/how-to-connect-sync-feature-preferreddatalocation/preferreddatalocation-mailboxregion.png)
257257
Assuming your tenant has been marked to be able to use this feature, the mailbox is moved to the correct geo. This can be verified by looking at the server name where the mailbox is located.
258-
4. To verify that this setting has been effective over many mailboxes, use the script in the [TechNet gallery](https://gallery.technet.microsoft.com/office/PowerShell-Script-to-a6bbfc2e). This script also has a list of the server prefixes of all Office 365 datacenters, and which geo it is located in. It can be used as a reference in the previous step to verify the location of the mailbox.
259258

260259
## Next steps
261260

articles/active-directory/saas-apps/awardspring-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
104104
| First Name | user.givenname |
105105
| Last Name | user.surname |
106106
| Email | user.mail |
107-
| Username | user.userprinicipalname |
107+
| Username | user.userprincipalname |
108108
| StudentID | < Student ID > |
109109

110110
> [!NOTE]

articles/active-directory/saas-apps/kronos-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
102102

103103
b. From the **Transformation** list, select **ExtractMailPrefix()**.
104104

105-
c. From the **Parameter 1** list, select **user.userprinicipalname**.
105+
c. From the **Parameter 1** list, select **user.userprincipalname**.
106106

107107
d. Click **Save**.
108108

articles/active-directory/saas-apps/purecloud-by-genesys-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ To enable Azure AD SSO in the Azure portal, follow these steps:
122122

123123
| Name | Source attribute|
124124
| ---------------| --------------- |
125-
| Email | user.userprinicipalname |
125+
| Email | user.userprincipalname |
126126
| OrganizationName | `Your organization name` |
127127

128128
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
@@ -227,4 +227,4 @@ When you select the **PureCloud by Genesys** tile in the Access Panel, you shoul
227227

228228
- [What is conditional access in Azure AD?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
229229

230-
- [Try PureCloud by Genesys with Azure AD](https://aad.portal.azure.com/)
230+
- [Try PureCloud by Genesys with Azure AD](https://aad.portal.azure.com/)

articles/active-directory/saas-apps/sap-fiori-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
170170

171171
1. In the **Transformation** list, select **ExtractMailPrefix()**.
172172

173-
1. In the **Parameter 1** list, select **user.userprinicipalname**.
173+
1. In the **Parameter 1** list, select **user.userprincipalname**.
174174

175175
1. Select **Save**.
176176

articles/active-directory/saas-apps/sap-netweaver-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
175175

176176
b. From the **Transformation** list, select **ExtractMailPrefix()**.
177177

178-
c. From the **Parameter 1** list, select **user.userprinicipalname**.
178+
c. From the **Parameter 1** list, select **user.userprincipalname**.
179179

180180
d. Click **Save**.
181181

articles/active-directory/user-help/multi-factor-authentication-end-user-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 8f3aef42-7f66-4656-a7cd-d25a971cb9eb
99
ms.workload: identity
1010
ms.service: active-directory
1111
ms.subservice: user-help
12-
ms.topic: troubleshooting
12+
ms.topic: conceptual
1313
ms.date: 02/20/2020
1414
ms.author: curtand
1515
ms.reviewer: kexia

0 commit comments

Comments
 (0)