Skip to content

Commit 77d03a7

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into configure-load-balancer-outbound-powershell
2 parents 2267eb5 + 68d3a8d commit 77d03a7

File tree

275 files changed

+6901
-2616
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

275 files changed

+6901
-2616
lines changed

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -740,6 +740,31 @@
740740
"redirect_url": "/azure/machine-learning/service",
741741
"redirect_document_id": false
742742
},
743+
{
744+
"source_path": "articles/cognitive-services/LUIS/luis-get-started-java-get-intent.md",
745+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-get-intent-from-rest",
746+
"redirect_document_id": false
747+
},
748+
{
749+
"source_path": "articles/cognitive-services/LUIS/luis-get-started-cs-get-intent.md",
750+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-get-intent-from-rest",
751+
"redirect_document_id": false
752+
},
753+
{
754+
"source_path": "articles/cognitive-services/LUIS/luis-get-started-go-get-intent.md",
755+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-get-intent-from-rest",
756+
"redirect_document_id": false
757+
},
758+
{
759+
"source_path": "articles/cognitive-services/LUIS/luis-get-started-python-get-intent.md",
760+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-get-intent-from-rest",
761+
"redirect_document_id": false
762+
},
763+
{
764+
"source_path": "articles/cognitive-services/LUIS/luis-get-started-node-get-intent.md",
765+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-get-intent-from-rest",
766+
"redirect_document_id": false
767+
},
743768
{
744769
"source_path": "articles/cognitive-services/LUIS/luis-concept-collaborator.md",
745770
"redirect_url": "/azure/cognitive-services/LUIS/luis-concept-keys",
@@ -1885,6 +1910,11 @@
18851910
"redirect_url": "/azure/cosmos-db/sql-api-get-started",
18861911
"redirect_document_id": false
18871912
},
1913+
{
1914+
"source_path": "articles/search/knowledge-store-howto.md",
1915+
"redirect_url": "/azure/search/knowledge-store-create-rest",
1916+
"redirect_document_id": false
1917+
},
18881918
{
18891919
"source_path": "articles/search/search-fiddler.md",
18901920
"redirect_url": "/azure/search/search-get-started-postman",

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -39,16 +39,9 @@ Once you have an Azure AD B2C tenant, you need to register your management appli
3939

4040
### Register application in Azure Active Directory
4141

42-
To use the Azure AD Graph API with your B2C tenant, you need to register an application by using the Azure Active Directory **App registrations** workflow.
42+
To use the Azure AD Graph API with your B2C tenant, you need to register an application by using the Azure Active Directory application registration workflow.
4343

44-
1. Sign in to the [Azure portal](https://portal.azure.com) and switch to the directory that contains your Azure AD B2C tenant.
45-
1. Select **Azure Active Directory** (*not* Azure AD B2C) in the left menu. Or, select **All services** and then search for and select **Azure Active Directory**.
46-
1. Under **Manage** in the left menu, select **App registrations (Legacy)**.
47-
1. Select **New application registration**
48-
1. Enter a name for the application. For example, *Management App*.
49-
1. Enter any valid URL in **Sign-on URL**. For example, *https://localhost*. This endpoint does not need to be reachable, but needs to be a valid URL.
50-
1. Select **Create**.
51-
1. Record the **Application ID** that appears on the **Registered app** overview page. You use this value for configuration in a later step.
44+
[!INCLUDE [active-directory-b2c-appreg-mgmt](../../includes/active-directory-b2c-appreg-mgmt.md)]
5245

5346
### Assign API access permissions
5447

@@ -79,7 +72,7 @@ If you want to give your application the ability to delete users or update passw
7972
1. Under **Manage**, select **Roles and administrators**.
8073
1. Select the **User administrator** role.
8174
1. Select **Add assignment**.
82-
1. In the **Select** text box, enter the name of the application you registered earlier, for example, *Management App*. Select your application when it appears in the search results.
75+
1. In the **Select** text box, enter the name of the application you registered earlier, for example, *managementapp1*. Select your application when it appears in the search results.
8376
1. Select **Add**. It might take a few minutes to for the permissions to fully propagate.
8477

8578
Your Azure AD B2C application now has the additional permissions required to delete users or update their passwords in your B2C tenant.

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 22 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -90,30 +90,28 @@ To allow script- or application-based access to the Azure AD reporting API, you
9090

9191
You can enable these permissions on an existing Azure Active Directory application registration within your B2C tenant, or create a new one specifically for use with audit log automation.
9292

93-
To create a new application, assign the required API permissions, and create a client secret, perform the following steps:
94-
95-
1. Register application in Azure Active Directory
96-
1. Sign in to the [Azure portal](https://portal.azure.com) and switch to the directory that contains your Azure AD B2C tenant.
97-
1. Select **Azure Active Directory** (*not* Azure AD B2C) from the left menu. Or, select **All services**, then search for and select **Azure Active Directory**.
98-
1. Under **Manage** in the left menu, select **App registrations (Legacy)**.
99-
1. Select **New application registration**
100-
1. Enter a name for the application. For example, *Audit Log App*.
101-
1. Enter any valid URL in **Sign-on URL**. For example, *https://localhost*. This endpoint does not need to be reachable, but needs to be a valid URL.
102-
1. Select **Create**.
103-
1. Record the **Application ID** that appears on the **Registered app** page. You need this value for authentication in automation scripts like the example PowerShell script shown in a later section.
104-
1. Assign API access permissions
105-
1. On the **Registered app** overview page, select **Settings**.
106-
1. Under **API ACCESS**, select **Required permissions**.
107-
1. Select **Add**, and then **Select an API**.
108-
1. Select **Microsoft Graph**, and then **Select**.
109-
1. Under **APPLICATION PERMISSIONS**, select **Read all audit log data**.
110-
1. Select the **Select** button, and then select **Done**.
111-
1. Select **Grant permissions**, and then select **Yes**.
112-
1. Create client secret
113-
1. Under **API ACCESS**, select **Keys**.
114-
1. Enter a description for the key in the **Key description** box. For example, *Audit Log Key*.
115-
1. Select a validity **Duration**, then select **Save**.
116-
1. Record the key's **VALUE**. You need this value for authentication in automation scripts like the example PowerShell script shown in a later section.
93+
Follow these steps register an application, grant it the required Microsoft Graph API permissions, and then create a client secret.
94+
95+
### Register application in Azure Active Directory
96+
97+
[!INCLUDE [active-directory-b2c-appreg-mgmt](../../includes/active-directory-b2c-appreg-mgmt.md)]
98+
99+
### Assign API access permissions
100+
101+
1. On the **Registered app** overview page, select **Settings**.
102+
1. Under **API ACCESS**, select **Required permissions**.
103+
1. Select **Add**, and then **Select an API**.
104+
1. Select **Microsoft Graph**, and then **Select**.
105+
1. Under **APPLICATION PERMISSIONS**, select **Read all audit log data**.
106+
1. Select the **Select** button, and then select **Done**.
107+
1. Select **Grant permissions**, and then select **Yes**.
108+
109+
### Create client secret
110+
111+
1. Under **API ACCESS**, select **Keys**.
112+
1. Enter a description for the key in the **Key description** box. For example, *Audit Log Key*.
113+
1. Select a validity **Duration**, then select **Save**.
114+
1. Record the key's **VALUE**. You need this value for authentication in automation scripts like the example PowerShell script shown in a later section.
117115

118116
You now have an application with the required API access, an application ID, and a key that you can use in your automation scripts. See the PowerShell script section later in this article for an example of how you can get activity events with a script.
119117

articles/active-directory-b2c/active-directory-b2c-tutorials-spa-webapi.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -50,12 +50,7 @@ To call a protected web API from another application, you need to grant that app
5050

5151
In the prerequisite tutorial, you created a web application named *webapp1*. In this tutorial, you configure that application to call the web API you created in a previous section, *webapi1*.
5252

53-
1. Navigate to your B2C tenant in Azure portal
54-
1. Select **Applications**, and then select *webapp1*.
55-
1. Select **API access**, and then select **Add**.
56-
1. In the **Select API** dropdown, select *webapi1*.
57-
1. In the **Select Scopes** dropdown, select the scopes that you defined earlier. For example, *demo.read* and *demo.write*.
58-
1. Select **OK**.
53+
[!INCLUDE [active-directory-b2c-permissions-api](../../includes/active-directory-b2c-permissions-api.md)]
5954

6055
Your single-page web application is registered to call the protected web API. A user authenticates with Azure AD B2C to use the single-page application. The single-page app obtains an authorization grant from Azure AD B2C to access the protected web API.
6156

articles/active-directory-b2c/active-directory-b2c-tutorials-web-api.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -56,11 +56,7 @@ Scopes provide a way to govern access to protected resources. Scopes are used by
5656

5757
To call a protected web API from an application, you need to grant your application permissions to the API. In the prerequisite tutorial, you created a web application in Azure AD B2C named *webapp1*. You use this application to call the web API.
5858

59-
1. Select **Applications**, and then select *webapp1*.
60-
1. Select **API access**, and then select **Add**.
61-
1. In the **Select API** dropdown, select *webapi1*.
62-
1. In the **Select Scopes** dropdown, select the scopes that you defined earlier. For example, *demo.read* and *demo.write*.
63-
1. Select **OK**.
59+
[!INCLUDE [active-directory-b2c-permissions-api](../../includes/active-directory-b2c-permissions-api.md)]
6460

6561
Your application is registered to call the protected web API. A user authenticates with Azure AD B2C to use the application. The application obtains an authorization grant from Azure AD B2C to access the protected web API.
6662

@@ -70,8 +66,6 @@ Now that the web API is registered and you have scopes defined, you configure th
7066

7167
There are two projects in the sample solution:
7268

73-
The following two projects are in the sample solution:
74-
7569
* **TaskWebApp** - Create and edit a task list. The sample uses the **sign-up or sign-in** user flow to sign up or sign in users.
7670
* **TaskService** - Supports the create, read, update, and delete task list functionality. The API is protected by Azure AD B2C and called by TaskWebApp.
7771

articles/active-directory-b2c/active-directory-b2c-user-migration.md

Lines changed: 15 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -45,51 +45,38 @@ You create the Azure AD B2C user account via Graph API (with the password or wit
4545

4646
### Step 1.1: Register your application in your tenant
4747

48-
To communicate with the Graph API, you first must have a service account with administrative privileges. In Azure AD, you register an application and authentication to Azure AD. The application credentials are **Application ID** and **Application Secret**. The application acts as itself, not as a user, to call the Graph API.
48+
To communicate with the Graph API, you first must have a service account with administrative privileges. In Azure AD, you register an application and enable write access to the directory. The application credentials are the **Application ID** and **Application Secret**. The application acts as itself, not as a user, to call the Graph API.
4949

50-
First, register your migration application in Azure AD. Then, create an application key (application secret) and set the application with write privileges.
50+
First, register an application that you can use for management tasks like user migration.
5151

52-
1. Sign in to the [Azure portal][Portal].
53-
1. Select the **Directory + subscription** filter in the upper-right section of the portal.
54-
1. Select the directory containing your Azure AD B2C tenant.
55-
1. In the left-hand menu, select **Azure Active Directory** (*not* Azure AD B2C). To find it, you might need to select **All services**.
56-
1. Select **App registrations (Legacy)**.
57-
1. Select **New application registration**.
52+
[!INCLUDE [active-directory-b2c-appreg-mgmt](../../includes/active-directory-b2c-appreg-mgmt.md)]
5853

59-
![Azure Active Directory and App registrations menu items highlighted](media/active-directory-b2c-user-migration/pre-migration-app-registration.png)
54+
### Step 1.2: Grant administrative permission to your application
6055

61-
1. Create a new application by doing the following:
56+
Next, grant the application the Azure AD Graph API permissions required for writing to the directory.
6257

63-
- For **Name**, use *B2CUserMigration* or any other name you want.
64-
- For **Application type**, select **Web app/API**.
65-
- For **Sign-on URL**, use `https://localhost` (it's not relevant for this application).
66-
- Select **Create**.
58+
1. In the **Settings** menu, select **Required permissions**.
59+
1. Select **Windows Azure Active Directory**.
60+
1. In the **Enable Access** pane, under **Application Permissions**, select **Read and write directory data**, and then select **Save**.
61+
1. In the **Required permissions** pane, select **Grant Permissions**, then select **Yes**.
6762

68-
After the application is created, the **Registered app** page is displayed showing its properties.
69-
1. Copy the application's **Application ID**, and save it for later.
63+
![Read/write directory checkbox, Save, and Grant permissions highlighted](media/active-directory-b2c-user-migration/pre-migration-app-registration-permissions.png)
64+
65+
### Step 1.3: Create the application secret
7066

71-
### Step 1.2: Create the application secret
67+
Create a client secret (key) for use by the user migration application that you configure in a later step.
7268

7369
1. In the **Registered app** page, select **Settings**.
7470
1. Select **Keys**.
7571
1. Under **Passwords**, add a new key (also known as a client secret) named *MyClientSecret* or another name of your choosing, select an expiration window, select **Save**, and then copy the key value for later use.
7672

7773
![Application ID value and Keys menu item highlighted in Azure portal](media/active-directory-b2c-user-migration/pre-migration-app-id-and-key.png)
7874

79-
### Step 1.3: Grant administrative permission to your application
80-
81-
1. In the **Settings** menu, select **Required permissions**.
82-
1. Select **Windows Azure Active Directory**.
83-
1. In the **Enable Access** pane, under **Application Permissions**, select **Read and write directory data**, and then select **Save**.
84-
1. In the **Required permissions** pane, select **Grant Permissions**, then select **Yes**.
85-
86-
![Read/write directory checkbox, Save, and Grant permissions highlighted](media/active-directory-b2c-user-migration/pre-migration-app-registration-permissions.png)
87-
88-
Now you have an application with permissions to create, read, and update users from your Azure AD B2C tenant.
75+
Now you have an application with permissions to create, read, and update users in your Azure AD B2C tenant.
8976

9077
### Step 1.4: (Optional) Environment cleanup
9178

92-
Read and write directory data permissions do *not* include the right to delete users. To give your application the ability to delete users (to clean up your environment), you must perform an extra step, which involves running PowerShell to set User Account Administrator permissions. Otherwise, you can skip to the next section.
79+
The *Read and write directory data* permission does *not* include the right to delete users. To give your application the ability to delete users (to clean up your environment), you must perform an extra step, which involves running PowerShell to set User Account Administrator permissions. Otherwise, you can skip to the next section.
9380

9481
> [!IMPORTANT]
9582
> You must use a B2C tenant administrator account that is *local* to the B2C tenant. The account name syntax is *admin\@contosob2c.onmicrosoft.com*.

articles/active-directory-b2c/add-web-application.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,6 @@ Scopes provide a way to govern access to protected resources. Scopes are used by
3838

3939
To call a protected web API from an application, you need to grant your application permissions to the API. For example, in [Tutorial: Register an application in Azure Active Directory B2C](tutorial-register-applications.md), a web application is created in Azure AD B2C named *webapp1*. You can use this application to call the web API.
4040

41-
1. Select **Applications**, and then select your web application.
42-
1. Select **API access**, and then select **Add**.
43-
1. In the **Select API** dropdown, select *webapi1*.
44-
1. In the **Select Scopes** dropdown, select the scopes that you defined earlier. For example, *demo.read* and *demo.write*.
45-
1. Select **OK**.
41+
[!INCLUDE [active-directory-b2c-permissions-api](../../includes/active-directory-b2c-permissions-api.md)]
4642

4743
Your application is registered to call the protected web API. A user authenticates with Azure AD B2C to use the application. The application obtains an authorization grant from Azure AD B2C to access the protected web API.

0 commit comments

Comments
 (0)