Skip to content

Commit 792af70

Browse files
committed
2 parents b72c0db + eac4909 commit 792af70

File tree

89 files changed

+1444
-628
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

89 files changed

+1444
-628
lines changed

.openpublishing.redirection.json

Lines changed: 36 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -801,34 +801,44 @@
801801
"redirect_url": "/azure/machine-learning",
802802
"redirect_document_id": false
803803
},
804+
{
805+
"source_path": "articles/cognitive-services/QnAMaker/concepts/data-sources-supported.md",
806+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/reference-document-format-guidelines",
807+
"redirect_document_id": false
808+
},
809+
{
810+
"source_path": "articles/cognitive-services/QnAMaker/tutorials/choosing-capacity-qnamaker-deployment.md",
811+
"redirect_url": "/azure/cognitive-services/QnAMaker/Concepts/azure-resources",
812+
"redirect_document_id": false
813+
},
804814
{
805815
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-publish-kb-nodejs-sdk.md",
806-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
816+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
807817
"redirect_document_id": false
808818
},
809819
{
810820
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-publish-kb-csharp-sdk.md",
811-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
821+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
812822
"redirect_document_id": false
813823
},
814824
{
815825
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/python-sdk.md",
816-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
826+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
817827
"redirect_document_id": false
818828
},
819829
{
820830
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-knowledge-rest-api-nodejs.md",
821-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/publish-kb-nodejs",
831+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/publish-kb-nodejs",
822832
"redirect_document_id": false
823833
},
824834
{
825835
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-postman.md",
826-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
836+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
827837
"redirect_document_id": false
828838
},
829839
{
830840
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-curl.md",
831-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
841+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
832842
"redirect_document_id": false
833843
},
834844
{
@@ -986,11 +996,6 @@
986996
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-new-kb-csharp",
987997
"redirect_document_id": false
988998
},
989-
{
990-
"source_path": "articles/cognitive-services/QnAMaker/Concepts/data-sources-supported.md",
991-
"redirect_url": "/azure/cognitive-services/QnAMaker/concepts/knowledge-base",
992-
"redirect_document_id": false
993-
},
994999
{
9951000
"source_path": "articles/cognitive-services/QnAMaker/How-To/create-knowledge-base.md",
9961001
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/create-publish-knowledge-base",
@@ -1666,6 +1671,26 @@
16661671
"redirect_url": "/azure/cognitive-services/bing-web-search/bing-web-stats",
16671672
"redirect_document_id": false
16681673
},
1674+
{
1675+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-quickstart.md",
1676+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1677+
"redirect_document_id": false
1678+
},
1679+
{
1680+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-java-quickstart.md",
1681+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1682+
"redirect_document_id": false
1683+
},
1684+
{
1685+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-node-quickstart.md",
1686+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1687+
"redirect_document_id": false
1688+
},
1689+
{
1690+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-python-quickstart.md",
1691+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1692+
"redirect_document_id": false
1693+
},
16691694
{
16701695
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
16711696
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,6 @@ Your custom policy and Azure AD B2C tenant are now ready. Next, create an applic
272272
1. Enter a **Name** for the application. For example, *SAMLApp1*.
273273
1. Under **Supported account types**, select **Accounts in this organizational directory only**
274274
1. Under **Redirect URI**, select **Web**, and then enter `https://localhost`. You modify this value later in the application registration's manifest.
275-
1. Select **Grant admin consent to openid and offline_access permissions**.
276275
1. Select **Register**.
277276

278277
### 4.2 Update the app manifest
@@ -334,7 +333,7 @@ The last step is to enable Azure AD B2C as a SAML IdP in your SAML relying party
334333
Some or all the following are typically required:
335334

336335
* **Metadata**: `https://tenant-name.b2clogin.com/tenant-name.onmicrosoft.com/policy-name/Samlp/metadata`
337-
* **Issuer**: `https://tenant-name.onmicrosoft.com/policy-name`
336+
* **Issuer**: `https://tenant-name.b2clogin.com/tenant-name.onmicrosoft.com/policy-name`
338337
* **Login Url/SAML endpoint/SAML Url**: Check the value in the metadata file
339338
* **Certificate**: This is *B2C_1A_SamlIdpCert*, but without the private key. To get the public key of the certificate:
340339

articles/active-directory/develop/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ We provide libraries and code samples that show how to easily handle token valid
174174

175175
A JWT contains three segments, which are separated by the `.` character. The first segment is known as the **header**, the second as the **body**, and the third as the **signature**. The signature segment can be used to validate the authenticity of the token so that it can be trusted by your app.
176176

177-
Tokens issued by Azure AD are signed using industry standard asymmetric encryption algorithms, such as RSA 256. The header of the JWT contains information about the key and encryption method used to sign the token:
177+
Tokens issued by Azure AD are signed using industry standard asymmetric encryption algorithms, such as RS256. The header of the JWT contains information about the key and encryption method used to sign the token:
178178

179179
```json
180180
{

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 16 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -38,11 +38,11 @@ This article gives you an overview of the audit report.
3838

3939
## Who can access the data?
4040

41-
* Users in the **Security Administrator**, **Security Reader**, **Report Reader** or **Global Administrator** roles
41+
* Users in the **Security Administrator**, **Security Reader**, **Report Reader** , **Global Reader** or **Global Administrator** roles
4242

4343
## Audit logs
4444

45-
The Azure AD audit logs provide records of system activities for compliance. To access the audit report, select **Audit logs** in the **Activity** section of **Azure Active Directory**. Note that audit logs may have a latency of up to an hour, so it may take that long for audit activity data to show up in the portal after you have completed the task.
45+
The Azure AD audit logs provide records of system activities for compliance. To access the audit report, select **Audit logs** in the **Monitoring** section of **Azure Active Directory**. Note that audit logs may have a latency of up to an hour, so it may take that long for audit activity data to show up in the portal after you have completed the task.
4646

4747

4848

@@ -87,16 +87,20 @@ You can filter the audit data on the following fields:
8787
The **Service** filter allows you to select from a drop-down list of the following services:
8888

8989
- All
90+
- AAD Management UX
9091
- Access Reviews
91-
- Account Provisioning
92-
- Application SSO
92+
- Account Provisioning
93+
- Application Proxy
9394
- Authentication Methods
9495
- B2C
9596
- Conditional Access
9697
- Core Directory
9798
- Entitlement Management
99+
- Hybrid Authentication
98100
- Identity Protection
99101
- Invited Users
102+
- MIM Service
103+
- MyApps
100104
- PIM
101105
- Self-service Group Management
102106
- Self-service Password Management
@@ -115,7 +119,11 @@ The **Category** filter enables you to select one of the following filters:
115119
- DirectoryManagement
116120
- EntitlementManagement
117121
- GroupManagement
122+
- KerberosDomain
123+
- KeyManagement
124+
- Label
118125
- Other
126+
- PermissionGrantPolicy
119127
- Policy
120128
- ResourceManagement
121129
- RoleManagement
@@ -131,14 +139,13 @@ The **Status** filter allows you to filter based on the status of an audit opera
131139
- Success
132140
- Failure
133141

134-
The **Target** filter allows you to search for a particular target by name or user principal name (UPN). The target name and UPN are case-sensitive.
142+
The **Target** filter allows you to search for a particular target by the starting of the name or user principal name (UPN). The target name and UPN are case-sensitive.
135143

136-
The **Initiated by** filter enables you to define an actor's name or a universal principal name (UPN). The name and UPN are case-sensitive.
144+
The **Initiated by** filter enables you to define what an actor's name or a universal principal name (UPN) starts with. The name and UPN are case-sensitive.
137145

138146
The **Date range** filter enables to you to define a timeframe for the returned data.
139147
Possible values are:
140148

141-
- 1 month
142149
- 7 days
143150
- 24 hours
144151
- Custom
@@ -176,11 +183,11 @@ With user and group-based audit reports, you can get answers to questions such a
176183

177184
- What licenses have been assigned to a group or a user?
178185

179-
If you want to review only auditing data that is related to users, you can find a filtered view under **Audit logs** in the **Activity** section of the **Users** tab. This entry point has **UserManagement** as preselected category.
186+
If you want to review only auditing data that is related to users, you can find a filtered view under **Audit logs** in the **Monitoring** section of the **Users** tab. This entry point has **UserManagement** as preselected category.
180187

181188
![Audit logs](./media/concept-audit-logs/users.png "Audit logs")
182189

183-
If you want to review only auditing data that is related to groups, you can find a filtered view under **Audit logs** in the **Activity** section of the **Groups** tab. This entry point has **GroupManagement** as preselected category.
190+
If you want to review only auditing data that is related to groups, you can find a filtered view under **Audit logs** in the **Monitoring** section of the **Groups** tab. This entry point has **GroupManagement** as preselected category.
184191

185192
![Audit logs](./media/concept-audit-logs/groups.png "Audit logs")
186193

articles/aks/upgrade-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ For AKS clusters that use multiple node pools or Windows Server nodes (currently
1818
This article requires that you are running the Azure CLI version 2.0.65 or later. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][azure-cli-install].
1919

2020
> [!WARNING]
21-
> An AKS cluster upgrade triggers a cordon and drain of your nodes. If you have a low compute quota available, the upgrade may fail. See [increase quotas](https://docs.microsoft.com/azure/azure-portal/supportability/resource-manager-core-quotas-request?branch=pr-en-us-83289) for more information.
21+
> An AKS cluster upgrade triggers a cordon and drain of your nodes. If you have a low compute quota available, the upgrade may fail. See [increase quotas](https://docs.microsoft.com/azure/azure-portal/supportability/resource-manager-core-quotas-request) for more information.
2222
> If you are running your own cluster autoscaler deployment please disable it (you can scale it to zero replicas) during the upgrade as there is a chance it will interfere with the upgrade process. Managed autoscaler automatically handles this.
2323
2424
## Check for available AKS cluster upgrades

0 commit comments

Comments
 (0)