Skip to content

Commit 7208bfe

Browse files
authored
Merge pull request #46611 from MicrosoftDocs/master
7/13 PM Publish
2 parents 04fc178 + afbadf8 commit 7208bfe

File tree

762 files changed

+2961
-3575
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

762 files changed

+2961
-3575
lines changed

.openpublishing.redirection.json

Lines changed: 108 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -21387,17 +21387,17 @@
2138721387
},
2138821388
{
2138921389
"source_path": "articles/iot-hub/iot-hub-node-node-twin-how-to-configure.md",
21390-
"redirect_url": "/azure/iot-hub/tutorial-routing",
21390+
"redirect_url": "/azure/iot-hub/tutorial-device-twins",
2139121391
"redirect_document_id": false
2139221392
},
2139321393
{
2139421394
"source_path": "articles/iot-hub/iot-hub-java-java-twin-how-to-configure.md",
21395-
"redirect_url": "/azure/iot-hub/tutorial-routing",
21395+
"redirect_url": "/azure/iot-hub/tutorial-device-twins",
2139621396
"redirect_document_id": false
2139721397
},
2139821398
{
2139921399
"source_path": "articles/iot-hub/iot-hub-csharp-node-twin-how-to-configure.md",
21400-
"redirect_url": "/azure/iot-hub/tutorial-routing",
21400+
"redirect_url": "/azure/iot-hub/tutorial-device-twins",
2140121401
"redirect_document_id": false
2140221402
},
2140321403
{
@@ -21406,8 +21406,23 @@
2140621406
"redirect_document_id": false
2140721407
},
2140821408
{
21409-
"source_path": "articles/iot-hub/iot-hub-csharp-node-firmware-update.md",
21410-
"redirect_url": "/azure/iot-hub/iot-hub-node-node-firmware-update",
21409+
"source_path": "articles/iot-hub/iot-hub-csharp-csharp-firmware-update.md",
21410+
"redirect_url": "/azure/iot-hub/tutorial-firmware-update",
21411+
"redirect_document_id": false
21412+
},
21413+
{
21414+
"source_path": "articles/iot-hub/iot-hub-java-java-firmware-update.md",
21415+
"redirect_url": "/azure/iot-hub/tutorial-firmware-update",
21416+
"redirect_document_id": false
21417+
},
21418+
{
21419+
"source_path": "articles/iot-hub/iot-hub-node-node-firmware-update.md",
21420+
"redirect_url": "/azure/iot-hub/tutorial-firmware-update",
21421+
"redirect_document_id": false
21422+
},
21423+
{
21424+
"source_path": "articles/iot-hub/iot-hub-python-python-firmware-update.md",
21425+
"redirect_url": "/azure/iot-hub/tutorial-firmware-update",
2141121426
"redirect_document_id": false
2141221427
},
2141321428
{
@@ -21422,12 +21437,12 @@
2142221437
},
2142321438
{
2142421439
"source_path": "articles/iot-hub/iot-hub-csharp-csharp-twin-how-to-configure.md",
21425-
"redirect_url": "/azure/iot-hub/tutorial-routing",
21440+
"redirect_url": "/azure/iot-hub/tutorial-device-twins",
2142621441
"redirect_document_id": false
2142721442
},
2142821443
{
2142921444
"source_path": "articles/iot-hub/iot-hub-python-python-twin-how-to-configure.md",
21430-
"redirect_url": "/azure/iot-hub/tutorial-routing",
21445+
"redirect_url": "/azure/iot-hub/tutorial-device-twins",
2143121446
"redirect_document_id": false
2143221447
},
2143321448
{
@@ -24560,6 +24575,16 @@
2456024575
"redirect_url": "/azure/security/blueprints/pcidss-paaswa-overview#compliance-documentation",
2456124576
"redirect_document_id": true
2456224577
},
24578+
{
24579+
"source_path": "articles/security/blueprints/uk-official-three-tier-applications-overview.md",
24580+
"redirect_url": "/azure/security/blueprints/ukofficial-iaaswa-overview",
24581+
"redirect_document_id": true
24582+
},
24583+
{
24584+
"source_path": "articles/security/blueprints/uk-official-three-tier-applications-principles-overview.md",
24585+
"redirect_url": "/azure/security/blueprints/ukofficial-iaaswa-overview#compliance-documentation",
24586+
"redirect_document_id": true
24587+
},
2456324588
{
2456424589
"source_path": "articles/active-directory/active-directory-cloudappdiscovery-registry-settings-for-proxy-services.md",
2456524590
"redirect_url": "/azure/active-directory/cloudappdiscovery-get-started",
@@ -26174,6 +26199,81 @@
2617426199
"source_path": "articles/cognitive-services/LUIS/luis-reference-cortana-prebuilt.md",
2617526200
"redirect_url": "/azure/cognitive-services/LUIS/luis-resources-faq#does-luis-currently-support-cortana",
2617626201
"redirect_document_id": true
26177-
}
26202+
},
26203+
{
26204+
"source_path": "articles/active-directory/authentication/end-user/current/microsoft-authenticator-app-backup-and-recovery.md",
26205+
"redirect_url": "/azure/active-directory/user-help/microsoft-authenticator-app-backup-and-recovery",
26206+
"redirect_document_id": true
26207+
},
26208+
{
26209+
"source_path": "articles/active-directory/authentication/end-user/current/microsoft-authenticator-app-faq.md",
26210+
"redirect_url": "/azure/active-directory/user-help/microsoft-authenticator-app-faq",
26211+
"redirect_document_id": true
26212+
},
26213+
{
26214+
"source_path": "articles/active-directory/authentication/end-user/current/microsoft-authenticator-app-how-to.md",
26215+
"redirect_url": "/azure/active-directory/user-help/microsoft-authenticator-app-how-to",
26216+
"redirect_document_id": true
26217+
},
26218+
{
26219+
"source_path": "articles/active-directory/authentication/end-user/current/microsoft-authenticator-app-phone-signin-faq.md",
26220+
"redirect_url": "/azure/active-directory/user-help/microsoft-authenticator-app-phone-signin-faq",
26221+
"redirect_document_id": true
26222+
},
26223+
{
26224+
"source_path": "articles/active-directory/authentication/end-user/current/multi-factor-authentication-end-user.md",
26225+
"redirect_url": "/azure/active-directory/user-help/multi-factor-authentication-end-user",
26226+
"redirect_document_id": true
26227+
},
26228+
{
26229+
"source_path": "articles/active-directory/authentication/end-user/current/multi-factor-authentication-end-user-app-passwords.md",
26230+
"redirect_url": "/azure/active-directory/user-help/multi-factor-authentication-end-user-app-passwords",
26231+
"redirect_document_id": true
26232+
},
26233+
{
26234+
"source_path": "articles/active-directory/authentication/end-user/current/multi-factor-authentication-end-user-first-time.md",
26235+
"redirect_url": "/azure/active-directory/user-help/multi-factor-authentication-end-user-first-time",
26236+
"redirect_document_id": true
26237+
},
26238+
{
26239+
"source_path": "articles/active-directory/authentication/end-user/current/multi-factor-authentication-end-user-manage-settings.md",
26240+
"redirect_url": "/azure/active-directory/user-help/multi-factor-authentication-end-user-manage-settings",
26241+
"redirect_document_id": true
26242+
},
26243+
{
26244+
"source_path": "articles/active-directory/authentication/end-user/current/multi-factor-authentication-end-user-signin.md",
26245+
"redirect_url": "/azure/active-directory/user-help/multi-factor-authentication-end-user-signin",
26246+
"redirect_document_id": true
26247+
},
26248+
{
26249+
"source_path": "articles/active-directory/authentication/end-user/current/multi-factor-authentication-end-user-troubleshoot.md",
26250+
"redirect_url": "/azure/active-directory/user-help/multi-factor-authentication-end-user-troubleshoot",
26251+
"redirect_document_id": true
26252+
},
26253+
{
26254+
"source_path": "articles/active-directory/authentication/end-user/current/sign-in-experience-updates.md",
26255+
"redirect_url": "/azure/active-directory/user-help/microsoft-authenticator-app-phone-signin-faq",
26256+
"redirect_document_id": false
26257+
},
26258+
{
26259+
"source_path": "articles/active-directory/active-directory-passwords-reset-register.md",
26260+
"redirect_url": "/azure/active-directory/user-help/active-directory-passwords-reset-register",
26261+
"redirect_document_id": true
26262+
},
26263+
{
26264+
"source_path": "articles/active-directory/active-directory-passwords-update-your-own-password.md",
26265+
"redirect_url": "/azure/active-directory/user-help/active-directory-passwords-update-your-own-password",
26266+
"redirect_document_id": true
26267+
},
26268+
{
26269+
"source_path": "articles/active-directory/active-directory-saas-access-panel-introduction.md",
26270+
"redirect_url": "/azure/active-directory/user-help/active-directory-saas-access-panel-introduction",
26271+
"redirect_document_id": true
26272+
},
26273+
{
26274+
"source_path": "articles/active-directory/active-directory-saas-access-panel-user-help.md",
26275+
"redirect_url": "/azure/active-directory/user-help/active-directory-saas-access-panel-user-help",
26276+
"redirect_document_id": true
26277+
}
2617826278
]
2617926279
}

articles/active-directory-b2c/active-directory-b2c-quickstarts-spa.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
11-
ms.date: 2/13/2018
11+
ms.date: 7/13/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -25,7 +25,7 @@ In this quickstart, you use an Azure AD B2C enabled sample single-page app to si
2525

2626
* [Visual Studio 2017](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
2727
* Install [Node.js](https://nodejs.org/en/download/)
28-
* A social account from either Facebook, Google, Microsoft, or Twitter.
28+
* A Facebook account.
2929

3030
## Download the sample
3131

@@ -59,21 +59,17 @@ Browse to the app's URL `http://localhost:6420` in a web browser.
5959

6060
Click the **Login** button to start the Azure AD B2C **Sign Up or Sign In** workflow based on an Azure AD B2C policy.
6161

62-
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
62+
The sample is intended to support several sign-up options including creating a local account using an email address. For this quickstart, use a Facebook account.
6363

6464
### Sign up using a social identity provider
6565

6666
Azure AD B2C presents a custom login page for a fictitious brand called Wingtip Toys for the sample web app.
6767

68-
1. To sign up using a social identity provider, click the button of the identity provider you want to use.
69-
70-
![Sign In or Sign Up provider](media/active-directory-b2c-quickstarts-spa/sign-in-or-sign-up-spa.png)
68+
1. To sign up using a social identity provider, click the button of the Facebook identity provider.
7169

7270
You authenticate (sign-in) using your social account credentials and authorize the application to read information from your social account. By granting access, the application can retrieve profile information from the social account such as your name and city.
7371

74-
2. Finish the sign-in process for the identity provider. For example, if you chose Twitter, enter your Twitter credentials and click **Sign in**.
75-
76-
![Authenticate and authorize using a social account](media/active-directory-b2c-quickstarts-spa/twitter-authenticate-authorize-spa.png)
72+
2. Finish the sign-in process for the identity provider by entering your credentials.
7773

7874
Your new account profile details are pre-populated with information from your social account.
7975

articles/active-directory-domain-services/active-directory-ds-getting-started-password-sync.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Here are the instructions you need to provide users, so they can change their pa
7474
A few minutes after you have changed your password, the new password is usable in Azure Active Directory Domain Services. After about 20 minutes, you can sign in to computers joined to the managed domain using the newly changed password.
7575

7676
## Related Content
77-
* [How to update your own password](../active-directory/active-directory-passwords-update-your-own-password.md)
77+
* [How to update your own password](../active-directory/user-help/active-directory-passwords-update-your-own-password.md)
7878
* [Getting started with Password Management in Azure AD](../active-directory/authentication/quickstart-sspr.md)
7979
* [Enable password hash synchronization to Azure Active Directory Domain Services for a synced Azure AD tenant](active-directory-ds-getting-started-password-sync-synced-tenant.md)
8080
* [Administer an Azure Active Directory Domain Services-managed domain](active-directory-ds-admin-guide-administer-domain.md)

articles/active-directory/TOC.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,9 @@
143143
## Manage passwords
144144
### [Passwords overview](authentication/active-directory-passwords-overview.md)
145145
### User documents
146-
#### [Reset or change your password](active-directory-passwords-update-your-own-password.md)
146+
#### [Reset or change your password](user-help/active-directory-passwords-update-your-own-password.md)
147147
#### [Password best practices](active-directory-secure-passwords.md)
148-
#### [Register for self-service password reset](active-directory-passwords-reset-register.md)
148+
#### [Register for self-service password reset](user-help/active-directory-passwords-reset-register.md)
149149
### [SSPR How it works](authentication/concept-sspr-howitworks.md)
150150
### [SSPR Deployment guide](authentication/howto-sspr-deployment.md)
151151
### [SSPR and Windows 10](authentication/tutorial-sspr-windows.md)
@@ -174,8 +174,8 @@
174174
### [Plan Azure AD Join](active-directory-azureadjoin-deployment-aadjoindirect.md)
175175
### [FAQs](device-management-faq.md)
176176
### Tasks
177-
#### [Set up Azure AD registered Windows 10 devices](device-management-azuread-registered-devices-windows10-setup.md)
178-
#### [Set up Azure AD joined devices](device-management-azuread-joined-devices-setup.md)
177+
#### [Set up Azure AD registered Windows 10 devices](user-help/device-management-azuread-registered-devices-windows10-setup.md)
178+
#### [Set up Azure AD joined devices](user-help/device-management-azuread-joined-devices-setup.md)
179179
#### [Set up hybrid Azure AD joined devices](device-management-hybrid-azuread-joined-devices-setup.md)
180180
#### [Deploy on-premises](active-directory-device-registration-on-premises-setup.md)
181181
#### [Azure AD join during Windows 10 first-run experience](device-management-azuread-joined-devices-frx.md)

articles/active-directory/active-directory-apps-index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Once you set up single sign-on to your apps and resources, you can then further
108108
| How to enable conditional access for the following types of resources |[Conditional Access for SaaS Apps](active-directory-conditional-access-azure-portal-get-started.md)<br /><br />[Conditional Access for Office 365 services](active-directory-conditional-access-device-policies.md)<br /><br />[Conditional Access for On-Premises Applications](active-directory-conditional-access-azure-portal.md)<br /><br />[Conditional Access for On-Premises Applications Published via Azure AD App Proxy](manage-apps/application-proxy-integrate-with-sharepoint-server.md) |
109109
| How to register devices with Azure Active Directory in order to enable device-based conditional access policies |[Overview of Azure Active Directory Device Registration](active-directory-conditional-access-device-registration-overview.md)<br /><br />[How to Enable Automatic Device Registration for Domain Joined Windows Devices](active-directory-conditional-access-automatic-device-registration.md)<br />— [Steps for Windows 8.1 devices](active-directory-conditional-access-automatic-device-registration-setup.md)<br />— [Steps for Windows 7 devices](active-directory-conditional-access-automatic-device-registration-setup.md) |
110110

111-
| How to use the Microsoft Authenticator app for two-step verification |[Microsoft Authenticator](authentication/end-user/current/microsoft-authenticator-app-how-to.md) |
111+
| How to use the Microsoft Authenticator app for two-step verification |[Microsoft Authenticator](user-help/microsoft-authenticator-app-how-to.md) |
112112

113113
Conditional Access is an [Azure AD Premium](https://azure.microsoft.com/pricing/details/active-directory/) feature.
114114

@@ -176,7 +176,7 @@ The Azure AD Access Panel is where end-users can launch their apps and access th
176176
| Article Guide | |
177177
|:---:| --- |
178178
| A comparison of the different options available for deploying single sign-on apps to users |[Deploying Azure AD Integrated Applications to Users](manage-apps/what-is-single-sign-on.md#deploying-azure-ad-integrated-applications-to-users) |
179-
| An overview of the Access Panel and its mobile equivalent MyApps |[Introduction to Access Panel and MyApps](active-directory-saas-access-panel-introduction.md)<br />— [iOS](https://itunes.apple.com/us/app/my-apps-azure-active-directory/id824048653?mt=8)<br />— [Android](https://play.google.com/store/apps/details?id=com.microsoft.myapps) |
179+
| An overview of the Access Panel and its mobile equivalent MyApps |[Introduction to Access Panel and MyApps](user-help/active-directory-saas-access-panel-introduction.md)<br />— [iOS](https://itunes.apple.com/us/app/my-apps-azure-active-directory/id824048653?mt=8)<br />— [Android](https://play.google.com/store/apps/details?id=com.microsoft.myapps) |
180180
| How to access Azure AD apps from the Office 365 website |[Using the Office 365 App Launcher](https://support.office.com/en-us/article/Meet-the-Office-365-app-launcher-79f12104-6fed-442f-96a0-eb089a3f476a) |
181181
| How to access Azure AD apps from the Intune Managed Browser mobile app |[Intune Managed Browser](https://technet.microsoft.com/library/dn878029.aspx)<br />— [iOS](https://itunes.apple.com/us/app/microsoft-intune-managed-browser/id943264951?mt=8)<br />— [Android](https://play.google.com/store/apps/details?id=com.microsoft.intune.mam.managedbrowser) |
182182
| How to access Azure AD apps using deep links to initiate single sign-on |[Getting Direct Sign-On Links to Your Apps](manage-apps/what-is-single-sign-on.md#direct-sign-on-links-for-federated-password-based-or-existing-apps) |

articles/active-directory/active-directory-claims-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -353,7 +353,7 @@ Based on the method chosen, a set of inputs and outputs is expected. These are d
353353
|TransformationMethod|Expected input|Expected output|Description|
354354
|-----|-----|-----|-----|
355355
|Join|string1, string2, separator|outputClaim|Joins input strings by using a separator in between. For example: string1:"[email protected]" , string2:"sandbox" , separator:"." results in outputClaim:"[email protected]"|
356-
|ExtractMailPrefix|mail|outputClaim|Extracts the local part of an email address. For example: mail:"[email protected]" results in outputClaim:"foo". If no @ sign is present, then the orignal input string is returned as is.|
356+
|ExtractMailPrefix|mail|outputClaim|Extracts the local part of an email address. For example: mail:"[email protected]" results in outputClaim:"foo". If no \@ sign is present, then the orignal input string is returned as is.|
357357

358358
**InputClaims:** Use an InputClaims element to pass the data from a claim schema entry to a transformation. It has two attributes: **ClaimTypeReferenceId** and
359359
**TransformationClaimType**.

0 commit comments

Comments
 (0)