Skip to content

Commit 747a20b

Browse files
authored
Merge pull request #105789 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents 96dc60c + 0706132 commit 747a20b

File tree

665 files changed

+2176
-2232
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

665 files changed

+2176
-2232
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3666,6 +3666,11 @@
36663666
"redirect_url": "/azure/architecture",
36673667
"redirect_document_id": false
36683668
},
3669+
{
3670+
"source_path": "articles/azure-monitor/azure-monitor-log-hub.md",
3671+
"redirect_url": "/azure/azure-monitor/overview",
3672+
"redirect_document_id": false
3673+
},
36693674
{
36703675
"source_path": "articles/cloud-services/cloud-services-dotnet-diagnostics-storage.md",
36713676
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-to-storage",
@@ -48976,6 +48981,11 @@
4897648981
"source_path": "articles/aks/acs-aks-migration.md",
4897748982
"redirect_url": "/azure/aks/aks-migration",
4897848983
"redirect_document_id": false
48984+
},
48985+
{
48986+
"source_path": "articles/service-fabric/service-fabric-cicd-your-linux-applications-with-jenkins.md",
48987+
"redirect_url": "/azure/jenkins/service-fabric-cicd-your-linux-applications-with-jenkins",
48988+
"redirect_document_id": true
4897948989
}
4898048990
]
4898148991
}

articles/active-directory-b2c/stringcollection-transformations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/03/2020
12+
ms.date: 02/27/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -22,13 +22,13 @@ This article provides examples for using the string collection claims transforma
2222

2323
## AddItemToStringCollection
2424

25-
Adds a string claim to a new stringCollection claim.
25+
Adds a string claim to a new unique values stringCollection claim.
2626

2727
| Item | TransformationClaimType | Data Type | Notes |
2828
| ---- | ----------------------- | --------- | ----- |
2929
| InputClaim | item | string | The ClaimType to be added to the output claim. |
3030
| InputClaim | collection | stringCollection | [Optional] If specified, the claims transformation copies the items from this collection, and adds the item to the end of the output collection claim. |
31-
| OutputClaim | collection | stringCollection | The ClaimTypes that are produced after this ClaimsTransformation has been invoked. |
31+
| OutputClaim | collection | stringCollection | The ClaimType that is produced after this claims transformation has been invoked, with the value specified in the input claim. |
3232

3333
Use this claims transformation to add a string to a new or existing stringCollection. It's commonly used in a **AAD-UserWriteUsingAlternativeSecurityId** technical profile. Before a new social account is created, **CreateOtherMailsFromEmail** claims transformation reads the ClaimType and adds the value to the **otherMails** ClaimType.
3434

@@ -56,13 +56,13 @@ The following claims transformation adds the **email** ClaimType to **otherMails
5656

5757
## AddParameterToStringCollection
5858

59-
Adds a string parameter to a new stringCollection claim.
59+
Adds a string parameter to a new unique values stringCollection claim.
6060

6161
| Item | TransformationClaimType | Data Type | Notes |
6262
| ---- | ----------------------- | --------- | ----- |
6363
| InputClaim | collection | stringCollection | [Optional] If specified, the claims transformation copies the items from this collection, and adds the item to the end of the output collection claim. |
6464
| InputParameter | item | string | The value to be added to the output claim. |
65-
| OutputClaim | collection | stringCollection | The ClaimTypes that will be produced after this ClaimsTransformation has been invoked. |
65+
| OutputClaim | collection | stringCollection | The ClaimType that is produced after this claims transformation has been invoked, with the value specified in the input parameter. |
6666

6767
Use this claims transformation to add a string value to a new or existing stringCollection. The following example adds a constant email address ([email protected]) to the **otherMails** claim.
6868

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/21/2020
9+
ms.date: 02/26/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -52,7 +52,7 @@ Selecting this checkbox will require users to perform Azure Multi-Factor Authent
5252

5353
Organizations who have deployed Microsoft Intune can use the information returned from their devices to identify devices that meet specific compliance requirements. This policy compliance information is forwarded from Intune to Azure AD where Conditional Access can make decisions to grant or block access to resources. For more information about compliance policies, see the article [Set rules on devices to allow access to resources in your organization using Intune](https://docs.microsoft.com/intune/protect/device-compliance-get-started).
5454

55-
A device can be marked as compliant by Intune (for any device OS) or by third-party MDM system for Windows 10 devices. Third-party MDM systems for device OS types other than Windows 10 are not supported.
55+
A device can be marked as compliant by Intune (for any device OS) or by third-party MDM system for Windows 10 devices. Jamf pro is the only supported third-party MDM system. More information about integration can be found in the article, [Integrate Jamf Pro with Intune for compliance](/intune/protect/conditional-access-integrate-jamf).
5656

5757
Devices must be registered in Azure AD before they can be marked as compliant. More information about device registration can be found in the article, [What is a device identity](../devices/overview.md).
5858

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 22 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
12-
ms.date: 10/14/2019
12+
ms.date: 02/26/2020
1313
ms.author: ryanwi
1414
ms.reviewer: tomfitz
1515
ms.custom: aaddev, seoapril2019, identityplatformtop40
@@ -81,16 +81,26 @@ Daemon applications can use two forms of credentials to authenticate with Azure
8181

8282
### Upload a certificate
8383

84-
You can use an existing certificate if you have one. Optionally, you can create a self-signed certificate for testing purposes. Open PowerShell and run [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate) with the following parameters to create a self-signed certificate in the user certificate store on your computer:
84+
You can use an existing certificate if you have one. Optionally, you can create a self-signed certificate for *testing purposes only*. Open PowerShell and run [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate) with the following parameters to create a self-signed certificate in the user certificate store on your computer:
8585

8686
```powershell
8787
$cert=New-SelfSignedCertificate -Subject "CN=DaemonConsoleCert" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature
8888
```
8989

9090
Export this certificate to a file using the [Manage User Certificate](/dotnet/framework/wcf/feature-details/how-to-view-certificates-with-the-mmc-snap-in) MMC snap-in accessible from the Windows Control Panel.
9191

92+
1. Select **Run** from the **Start** menu, and then enter **certmgr.msc**.
93+
94+
The Certificate Manager tool for the current user appears.
95+
96+
1. To view your certificates, under **Certificates - Current User** in the left pane, expand the **Personal** directory.
97+
1. Right-click on the cert you created, select **All tasks->Export**.
98+
1. Follow the Certificate Export wizard. Export the private key, specify a password for the cert file, and export to a file.
99+
92100
To upload the certificate:
93101

102+
1. Select **Azure Active Directory**.
103+
1. From **App registrations** in Azure AD, select your application.
94104
1. Select **Certificates & secrets**.
95105
1. Select **Upload certificate** and select the certificate (an existing certificate or the self-signed certificate you exported).
96106

@@ -142,15 +152,21 @@ In your Azure subscription, your account must have `Microsoft.Authorization/*/Wr
142152

143153
To check your subscription permissions:
144154

145-
1. Select your account in the upper right corner, and select **... -> My permissions**.
155+
1. Search for and select **Subscriptions**, or select **Subscriptions** on the **Home** page.
146156

147-
![Select your account and your user permissions](./media/howto-create-service-principal-portal/select-my-permissions.png)
157+
![Search](./media/howto-create-service-principal-portal/select-subscription.png)
158+
159+
1. Select the subscription you want to create the service principal in.
160+
161+
![Select subscription for assignment](./media/howto-create-service-principal-portal/select-one-subscription.png)
162+
163+
If you don't see the subscription you're looking for, select **global subscriptions filter**. Make sure the subscription you want is selected for the portal.
148164

149-
1. From the drop-down list, select the subscription you want to create the service principal in. Then, select **Click here to view complete access details for this subscription**.
165+
1. Select **My permissions**. Then, select **Click here to view complete access details for this subscription**.
150166

151167
![Select the subscription you want to create the service principal in](./media/howto-create-service-principal-portal/view-details.png)
152168

153-
1. Select **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
169+
1. Select **View** in **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
154170

155171
![This example shows the user is assigned the Owner role](./media/howto-create-service-principal-portal/view-user-role.png)
156172

75.3 KB
Loading

articles/active-directory/develop/reply-url.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ The Azure AD application model doesn't support wildcard URIs for apps that are c
4949
> [!NOTE]
5050
> The new [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience doesn't allow developers to add wildcard URIs on the UI. Adding wilcard URI for apps that sign in work or school accounts is supported only through the app manifest editor. Going forward, new apps won't be able to use wildcards in the redirect URI. However, older apps that contain wildcards in redirect URIs will continue to work.
5151
52-
If your scenario requires more redirect URIs than the maximum limit allowed, instead of adding a wildcard redirect URI, consider one of the following approaches.
52+
If your scenario requires more redirect URIs than the maximum limit allowed, instead of adding a wildcard redirect URI, consider the following approach.
5353

5454
### Use a state parameter
5555

@@ -66,10 +66,6 @@ In this approach:
6666
> [!NOTE]
6767
> This approach allows a compromised client to modify the additional parameters sent in the state parameter, thereby redirecting the user to a different URL, which is the [open redirector threat](https://tools.ietf.org/html/rfc6819#section-4.2.4) described in RFC 6819. Therefore, the client must protect these parameters by encrypting the state or verifying it by some other means such as validating domain name in the redirect URI against the token.
6868
69-
### Add redirect URIs to service principals
70-
71-
Another approach is to add redirect URIs to the [service principals](app-objects-and-service-principals.md#application-and-service-principal-relationship) that represent your app registration in any Azure AD tenant. You can use this approach when you can't use a state parameter or your scenario requires you to add new redirect URIs to your app registration for every new tenant you support.
72-
7369
## Next steps
7470

7571
- Learn about the [Application manifest](reference-app-manifest.md)

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 5 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -28,15 +28,10 @@ This article:
2828

2929
## Manage device identities
3030

31-
The Azure AD portal provides you with a central place to manage your device identities. You can get to this place by either using a [direct link](https://portal.azure.com/#blade/Microsoft_AAD_IAM/DevicesMenuBlade/Devices) or by following these manual steps:
31+
The Azure AD portal provides you with a central place to manage your device identities. You can get to this place by either using a [direct link](https://portal.azure.com/#blade/Microsoft_AAD_IAM/DevicesMenuBlade/Devices) or:
3232

33-
1. Sign in to the [Azure portal](https://portal.azure.com) as administrator.
34-
35-
2. Search for and select **Azure Active Directory** or select it from the **Home** page.
36-
37-
3. In the **Manage** section, click **Devices**.
38-
39-
![Configure device settings](./media/device-management-azure-portal/74.png)
33+
1. Sign in to the [Azure portal](https://portal.azure.com).
34+
1. Browse to **Azure Active Directory** > **Devices**.
4035

4136
The **Devices** page enables you to:
4237

@@ -49,9 +44,7 @@ The **Devices** page enables you to:
4944

5045
To manage your device identities using the Azure AD portal, your devices need to be either [registered or joined](overview.md) to Azure AD. As an administrator, you can fine-tune the process of registering and joining devices by configuring the device settings.
5146

52-
![Configure device settings](./media/device-management-azure-portal/22.png)
53-
54-
The device settings page enables you to configure:
47+
The device settings page enables you to configure settings related to device identities:
5548

5649
![Manage an Intune device](./media/device-management-azure-portal/21.png)
5750

@@ -81,13 +74,8 @@ This option is a premium capability available through products such as Azure AD
8174
You have two options to locate registered and joined devices:
8275

8376
- **All devices** in the **Manage** section of the **Devices** page
84-
85-
![All devices](./media/device-management-azure-portal/41.png)
86-
8777
- **Devices** in the **Manage** section of a **User** page
8878

89-
![All devices](./media/device-management-azure-portal/43.png)
90-
9179
With both options, you can get to a view that:
9280

9381
- Enables you to search for devices using the display name or device ID as filter.
@@ -193,9 +181,7 @@ Device activities are available through the activity logs. These logs include ac
193181

194182
Your entry point to the auditing data is **Audit logs** in the **Activity** section of the **Devices** page.
195183

196-
![Audit logs](./media/device-management-azure-portal/61.png)
197-
198-
An audit log has a default list view that shows:
184+
The audit log has a default list view that shows:
199185

200186
- The date and time of the occurrence
201187
- The targets

0 commit comments

Comments
 (0)