Skip to content

Commit 723691c

Browse files
committed
2 parents eb7d804 + f17e685 commit 723691c

File tree

526 files changed

+14942
-13308
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

526 files changed

+14942
-13308
lines changed

.openpublishing.redirection.json

Lines changed: 43 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -250,6 +250,11 @@
250250
"redirect_url": "/azure/virtual-machines/",
251251
"redirect_document_id": false
252252
},
253+
{
254+
"source_path": "articles/virtual-machines/dc-series.md",
255+
"redirect_url": "/azure/virtual-machines/sizes-previous-gen",
256+
"redirect_document_id": false
257+
},
253258
{
254259
"source_path": "articles/virtual-machines/windows/maintenance-and-updates.md",
255260
"redirect_url": "/azure/virtual-machines/maintenance-and-updates?toc=/azure/virtual-machines/windows/toc.json&bc=/azure/virtual-machines/windows/breadcrumb/toc.json",
@@ -520,16 +525,7 @@
520525
"redirect_url": "/azure/site-recovery/vmware-physical-mobility-service-overview#install-mobility-agent-through-ui",
521526
"redirect_document_id": false
522527
},
523-
{
524-
"source_path": "articles/site-recovery/scvmm-site-recovery-deprecation.md",
525-
"redirect_url": "/azure/site-recovery/site-to-site-deprecation",
526-
"redirect_document_id": false
527-
},
528-
{
529-
"source_path": "articles/site-recovery/site-to-site-deprecation.md",
530-
"redirect_url": "/azure/site-recovery/hyper-v-azure-tutorial",
531-
"redirect_document_id": false
532-
},
528+
533529
{
534530
"source_path": "articles/machine-learning/service/quickstart-get-started.md",
535531
"redirect_url": "/azure/machine-learning/service/tutorial-1st-experiment-sdk-setup",
@@ -26985,6 +26981,16 @@
2698526981
"redirect_url": "/azure/storage/files/storage-files-faq",
2698626982
"redirect_document_id": true
2698726983
},
26984+
{
26985+
"source_path": "articles/storage/files/storage-files-active-directory-enable.md",
26986+
"redirect_url": "/azure/storage/files/storage-files-identity-auth-active-directory-domain-service-enable",
26987+
"redirect_document_id": true
26988+
},
26989+
{
26990+
"source_path": "articles/storage/files/storage-files-active-directory-domain-services-enable.md",
26991+
"redirect_url": "/azure/storage/files/storage-files-identity-auth-active-directory-enable",
26992+
"redirect_document_id": true
26993+
},
2698826994
{
2698926995
"source_path": "articles/storage/storage-files-introduction.md",
2699026996
"redirect_url": "/azure/storage/files/storage-files-introduction",
@@ -29010,6 +29016,11 @@
2901029016
"redirect_url": "/azure/security-center/security-center-partner-integration",
2901129017
"redirect_document_id": false
2901229018
},
29019+
{
29020+
"source_path": "articles/security-center/security-center-faq.md",
29021+
"redirect_url": "/azure/security-center/faq-general",
29022+
"redirect_document_id": false
29023+
},
2901329024
{
2901429025
"source_path": "articles/security-center/security-center-playbooks.md",
2901529026
"redirect_url": "/azure/security-center/workflow-automation",
@@ -31431,8 +31442,8 @@
3143131442
"redirect_document_id": false
3143231443
},
3143331444
{
31434-
"source_path": "articles/key-vault/key-vault-security-attributes.md",
31435-
"redirect_url": "/azure/key-vault/key-vault-security-controls",
31445+
"source_path": "articles/key-vault/key-vault-security-controls.md",
31446+
"redirect_url": "/azure/key-vault/security-baseline",
3143631447
"redirect_document_id": false
3143731448
},
3143831449
{
@@ -41420,6 +41431,11 @@
4142041431
"redirect_url": "/azure/azure-monitor/cloud-services/diagnostics-extension-to-storage",
4142141432
"redirect_document_id": false
4142241433
},
41434+
{
41435+
"source_path": "articles/azure-monitor/log-query/log-query-performance.md",
41436+
"redirect_url": "/azure/azure-monitor/log-query/query-optimization",
41437+
"redirect_document_id": false
41438+
},
4142341439
{
4142441440
"source_path": "articles/machine-learning/service/how-to-automated-ml.md",
4142541441
"redirect_url": "/azure/machine-learning/service/concept-automated-ml",
@@ -48870,6 +48886,21 @@
4887048886
"source_path": "articles/virtual-machines/windows/chef-automation.md",
4887148887
"redirect_url": "/azure/chef/chef-automation",
4887248888
"redirect_document_id": true
48889+
},
48890+
{
48891+
"source_path": "articles/azure-monitor/app/hockeyapp-bridge-app.md",
48892+
"redirect_url": "/azure/azure-monitor/overview",
48893+
"redirect_document_id": false
48894+
},
48895+
{
48896+
"source_path": "articles/virtual-machines/linux/tutorial-build-deploy-jenkins.md",
48897+
"redirect_url": "/azure/jenkins/tutorial-build-deploy-jenkins",
48898+
"redirect_document_id": true
48899+
},
48900+
{
48901+
"source_path": "articles/virtual-machines/linux/tutorial-jenkins-github-docker-cicd.md",
48902+
"redirect_url": "/azure/jenkins/tutorial-jenkins-github-docker-cicd",
48903+
"redirect_document_id": false
4887348904
}
4887448905
]
4887548906
}

articles/active-directory-b2c/claimsschema.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,7 @@ The **Pattern** element can contain the following attributes:
207207
| Attribute | Required | Description |
208208
| --------- | -------- | ----------- |
209209
| RegularExpression | Yes | The regular expression that claims of this type must match in order to be valid. |
210-
| HelpText | No | The pattern or regular expression for this claim. |
210+
| HelpText | No | An error message for users if the regular expression check fails. |
211211

212212
The following example configures an **email** claim with regular expression input validation and help text:
213213

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/10/2019
12+
ms.date: 02/24/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit
@@ -255,7 +255,7 @@ Your final relying party policy file should look like the following:
255255

256256
Save your changes and upload the new policy file. After you've uploaded both policies (the extension and the relying party files), open a web browser and navigate to the policy metadata.
257257

258-
The Azure AD B2C policy metadata is available at the following URL. Replace `tenant-name` with the name of your Azure AD B2C tenant, and `policy-name` with the name (ID) of the policy:
258+
Azure AD B2C policy IDP metadata is information used in the SAML protocol to expose the configuration of a SAML identity provider. Metadata defines the location of the services, such as sign-in and sign-out, certificates, sign-in method, and more. The Azure AD B2C policy metadata is available at the following URL. Replace `tenant-name` with the name of your Azure AD B2C tenant, and `policy-name` with the name (ID) of the policy:
259259

260260
`https://tenant-name.b2clogin.com/tenant-name.onmicrosoft.com/policy-name/Samlp/metadata`
261261

articles/active-directory-b2c/manage-user-accounts-graph-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ public static async Task ListUsers(GraphServiceClient graphClient)
175175
}
176176
```
177177

178-
[Make API calls using the Microsoft Graph SDKs](https://docs.microsoft.comgraph/sdks/create-requests) includes information on how to read and write information from Microsoft Graph, use `$select` to control the properties returned, provide custom query parameters, and use the `$filter` and `$orderBy` query parameters.
178+
[Make API calls using the Microsoft Graph SDKs](https://docs.microsoft.com/graph/sdks/create-requests) includes information on how to read and write information from Microsoft Graph, use `$select` to control the properties returned, provide custom query parameters, and use the `$filter` and `$orderBy` query parameters.
179179

180180
## Next steps
181181

articles/active-directory-b2c/predicates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ The **PredicateReferences** element contains the following attributes:
170170

171171
| Attribute | Required | Description |
172172
| --------- | -------- | ----------- |
173-
| MatchAtLeast | No | Specifies that the value must match at least that many predicate definitions for the input to be accepted. |
173+
| MatchAtLeast | No | Specifies that the value must match at least that many predicate definitions for the input to be accepted. If not specified, the value must match all predicate definitions. |
174174

175175
The **PredicateReferences** element contains the following elements:
176176

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Organizations can choose to use the device identity as part of their Conditional
6262

6363
### Require approved client app
6464

65-
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app. These approved client aps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile-device management (MDM) solution.
65+
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile-device management (MDM) solution.
6666

6767
This setting applies to the following client apps:
6868

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ If supported by a specific claim, you can also modify the behavior of the Option
203203
| `additionalProperties` | Collection (Edm.String) | Additional properties of the claim. If a property exists in this collection, it modifies the behavior of the optional claim specified in the name property. |
204204
## Configuring directory extension optional claims
205205

206-
In addition to the standard optional claims set, you can also configure tokens to include extensions. For more info, see [Add custom data to resources using extensions](https://docs.microsoft.com/graph/extensibility-overview). This feature is useful for attaching additional user information that your app can use – for example, an additional identifier or important configuration option that the user has set. See the bottom of this page for an example.
206+
In addition to the standard optional claims set, you can also configure tokens to include extensions. This feature is useful for attaching additional user information that your app can use – for example, an additional identifier or important configuration option that the user has set. See the bottom of this page for an example.
207207

208208
> [!NOTE]
209209
> - Directory schema extensions are an Azure AD-only feature, so if your application manifest requests a custom extension and an MSA user logs into your app, these extensions will not be returned.

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,9 +36,9 @@ Let's jump straight into creating the identity. If you run into a problem, check
3636

3737
You've created your Azure AD application and service principal.
3838

39-
## Assign the application to a role
39+
## Assign a role to the application
4040

41-
To access resources in your subscription, you must assign the application to a role. Decide which role offers the right permissions for the application. To learn about the available roles, see [RBAC: Built in Roles](../../role-based-access-control/built-in-roles.md).
41+
To access resources in your subscription, you must assign a role to the application. Decide which role offers the right permissions for the application. To learn about the available roles, see [RBAC: Built in Roles](../../role-based-access-control/built-in-roles.md).
4242

4343
You can set the scope at the level of the subscription, resource group, or resource. Permissions are inherited to lower levels of scope. For example, adding an application to the Reader role for a resource group means it can read the resource group and any resources it contains.
4444

@@ -58,7 +58,7 @@ You can set the scope at the level of the subscription, resource group, or resou
5858

5959
![Select the role to assign to the application](./media/howto-create-service-principal-portal/select-role.png)
6060

61-
1. Select **Save** to finish assigning the role. You see your application in the list of users assigned to a role for that scope.
61+
1. Select **Save** to finish assigning the role. You see your application in the list of users with a role for that scope.
6262

6363
Your service principal is set up. You can start using it to run your scripts or apps. The next section shows how to get values that are needed when signing in programmatically.
6464

@@ -108,7 +108,7 @@ If you choose not to use a certificate, you can create a new application secret.
108108
1. Select **Client secrets -> New client secret**.
109109
1. Provide a description of the secret, and a duration. When done, select **Add**.
110110

111-
After saving the client secret, the value of the client secret is displayed. Copy this value because you aren't able to retrieve the key later. You provide the key value with the application ID to sign in as the application. Store the key value where your application can retrieve it.
111+
After saving the client secret, the value of the client secret is displayed. Copy this value because you won't be able to retrieve the key later. You will provide the key value with the application ID to sign in as the application. Store the key value where your application can retrieve it.
112112

113113
![Copy the secret value because you can't retrieve this later](./media/howto-create-service-principal-portal/copy-secret.png)
114114

@@ -122,7 +122,7 @@ Keep in mind, you might need to configure addition permissions on resources that
122122

123123
## Required permissions
124124

125-
You must have sufficient permissions to register an application with your Azure AD tenant, and assign the application to a role in your Azure subscription.
125+
You must have sufficient permissions to register an application with your Azure AD tenant, and assign to the application a role in your Azure subscription.
126126

127127
### Check Azure AD permissions
128128

@@ -134,11 +134,11 @@ You must have sufficient permissions to register an application with your Azure
134134
1. In the left pane, select **User settings**.
135135
1. Check the **App registrations** setting. This value can only be set by an administrator. If set to **Yes**, any user in the Azure AD tenant can register an app.
136136

137-
If the app registrations setting is set to **No**, only users with an administrator role may register these types of applications. See [available roles](../users-groups-roles/directory-assign-admin-roles.md#available-roles) and [role permissions](../users-groups-roles/directory-assign-admin-roles.md#role-permissions) to learn about available administrator roles and the specific permissions in Azure AD that are given to each role. If your account is assigned to the User role, but the app registration setting is limited to admin users, ask your administrator to either assign you to one of the administrator roles that can create and manage all aspects of app registrations, or to enable users to register apps.
137+
If the app registrations setting is set to **No**, only users with an administrator role may register these types of applications. See [available roles](../users-groups-roles/directory-assign-admin-roles.md#available-roles) and [role permissions](../users-groups-roles/directory-assign-admin-roles.md#role-permissions) to learn about available administrator roles and the specific permissions in Azure AD that are given to each role. If your account is assigned the User role, but the app registration setting is limited to admin users, ask your administrator to either assign you one of the administrator roles that can create and manage all aspects of app registrations, or to enable users to register apps.
138138

139139
### Check Azure subscription permissions
140140

141-
In your Azure subscription, your account must have `Microsoft.Authorization/*/Write` access to assign an AD app to a role. This action is granted through the [Owner](../../role-based-access-control/built-in-roles.md#owner) role or [User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) role. If your account is assigned to the **Contributor** role, you don't have adequate permission. You receive an error when attempting to assign the service principal to a role.
141+
In your Azure subscription, your account must have `Microsoft.Authorization/*/Write` access to assign a role to an AD app. This action is granted through the [Owner](../../role-based-access-control/built-in-roles.md#owner) role or [User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) role. If your account is assigned the **Contributor** role, you don't have adequate permission. You will receive an error when attempting to assign the service principal a role.
142142

143143
To check your subscription permissions:
144144

@@ -150,9 +150,9 @@ To check your subscription permissions:
150150

151151
![Select the subscription you want to create the service principal in](./media/howto-create-service-principal-portal/view-details.png)
152152

153-
1. Select **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign an AD app to a role. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned to the Owner role, which means that user has adequate permissions.
153+
1. Select **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
154154

155-
![This example shows the user is assigned to the Owner role](./media/howto-create-service-principal-portal/view-user-role.png)
155+
![This example shows the user is assigned the Owner role](./media/howto-create-service-principal-portal/view-user-role.png)
156156

157157
## Next steps
158158

0 commit comments

Comments
 (0)