Skip to content

Commit 81788a4

Browse files
committed
fix
2 parents d7aff7b + dea61e5 commit 81788a4

File tree

735 files changed

+15930
-4662
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

735 files changed

+15930
-4662
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,11 @@
163163
"url": "https://github.com/Azure/azure-functions-templates",
164164
"branch": "dev"
165165
},
166+
{
167+
"path_to_root": "functions-quickstart-java",
168+
"url": "https://github.com/Azure-Samples/functions-quickstarts-java",
169+
"branch": "master"
170+
},
166171
{
167172
"path_to_root": "functions-docs-csharp",
168173
"url": "https://github.com/Azure-Samples/functions-docs-csharp",

.openpublishing.redirection.json

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7619,6 +7619,11 @@
76197619
"redirect_url": "/azure/python/tutorial-vs-code-serverless-python-01",
76207620
"redirect_document_id": false
76217621
},
7622+
{
7623+
"source_path": "articles/azure-functions/functions-create-first-java-maven.md",
7624+
"redirect_url": "/azure/azure-functions/functions-create-first-java-gradle",
7625+
"redirect_document_id": false
7626+
},
76227627
{
76237628
"source_path": "articles/azure-functions/scripts/functions-cli-configure-custom-domain.md",
76247629
"redirect_url": "/azure/app-service/scripts/cli-configure-custom-domain?toc=%2fcli%2fazure%2ftoc.json",
@@ -19184,6 +19189,11 @@
1918419189
"redirect_url": "/azure/backup/backup-overview",
1918519190
"redirect_document_id": false
1918619191
},
19192+
{
19193+
"source_path": "articles/backup/tutorial-backup-azure-files.md",
19194+
"redirect_url": "/azure/backup/backup-afs",
19195+
"redirect_document_id": false
19196+
},
1918719197
{
1918819198
"source_path": "articles/backup/backup-azure-backup-ibiza-faq.md",
1918919199
"redirect_url": "/azure/backup/backup-azure-backup-faq",
@@ -47004,6 +47014,11 @@
4700447014
"redirect_url": "/azure/iot-fundamentals/iot-services-and-technologies/",
4700547015
"redirect_document_id": false
4700647016
},
47017+
{
47018+
"source_path": "articles/iot-central/core/tutorial-connect-device.md",
47019+
"redirect_url": "/azure/iot-central/core/tutorial-connect-device-nodejs/",
47020+
"redirect_document_id": true
47021+
},
4700747022
{
4700847023
"source_path": "articles/iot-accelerators/iot-accelerators-arduino-iot-devkit-az3166-devkit-remote-monitoringV2.md",
4700947024
"redirect_url": "/azure/iot-accelerators/iot-accelerators-arduino-iot-devkit-az3166-devkit-remote-monitoring-v2",
@@ -50553,6 +50568,10 @@
5055350568
"source_path": "articles/aks/use-cosmosdb-osba-mongo-app.md",
5055450569
"redirect_url": "/azure/aks/",
5055550570
"redirect_document_id": false
50571+
},
50572+
{
50573+
"source_path": "articles/cognitive-services/speech-service/ship-application.md",
50574+
"redirect_url": "/azure/cognitive-services/speech-service/speech-sdk"
5055650575
}
5055750576
]
5055850577
}

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 03/24/2020
12+
ms.date: 04/05/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515

@@ -128,6 +128,7 @@ Add the profiles to the *TrustFrameworkExtensions.xml* file from the starter pac
128128
<InputClaim ClaimTypeReferenceId="PolicyId" PartnerClaimType="{property:Policy}" DefaultValue="{Policy:PolicyId}" />
129129
<InputClaim ClaimTypeReferenceId="CorrelationId" PartnerClaimType="{property:CorrelationId}" DefaultValue="{Context:CorrelationId}" />
130130
<InputClaim ClaimTypeReferenceId="Culture" PartnerClaimType="{property:Culture}" DefaultValue="{Culture:RFC5646}" />
131+
</InputClaims>
131132
</TechnicalProfile>
132133

133134
<TechnicalProfile Id="AppInsights-SignInRequest">
@@ -236,4 +237,4 @@ Add claim types and events to your user journey to fit your needs. You can use [
236237

237238
## Next steps
238239

239-
- Learn more about [Application Insights](application-insights-technical-profile.md) technical profile in the IEF reference.
240+
- Learn more about [Application Insights](application-insights-technical-profile.md) technical profile in the IEF reference.

articles/active-directory-b2c/customize-ui-overview.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/19/2020
12+
ms.date: 04/04/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -87,7 +87,10 @@ Review the following guidance before using your own HTML and CSS files to custom
8787

8888
When using your own HTML and CSS files to customize the UI, you can host your UI content on any publicly available HTTPS endpoint that supports CORS. For example, [Azure Blob storage](../storage/blobs/storage-blobs-introduction.md), web servers, CDNs, AWS S3, or file sharing systems.
8989

90-
The important point is that you host the content on a publicly available HTTPS endpoint with CORS enabled. You must use an absolute URL when you specify it in your content.
90+
The important point is that you host the content on a publicly available HTTPS endpoint with [CORS enabled](https://enable-cors.org/server.html). You must use an absolute URL when you specify it in your content.
91+
92+
> [!NOTE]
93+
> For details about creating HTML content, uploading content to Azure Blob storage, and configuring CORS, see the [Custom page content walkthrough](custom-policy-ui-customization.md#custom-page-content-walkthrough) section in the UI customization article.
9194
9295
## Get started with custom HTML and CSS
9396

articles/active-directory-b2c/secure-rest-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ To support bearer token authentication in your custom policy, modify the REST AP
268268
1. Ensure you add the claim used above as an input claim:
269269

270270
```xml
271-
<InputClaim ClaimTyeReferenceId="bearerToken"/>
271+
<InputClaim ClaimTypeReferenceId="bearerToken"/>
272272
```
273273

274274
After you add the above snippets, your technical profile should look like the following XML code:
@@ -288,7 +288,7 @@ After you add the above snippets, your technical profile should look like the fo
288288
<Item Key="AllowInsecureAuthInProduction">false</Item>
289289
</Metadata>
290290
<InputClaims>
291-
<InputClaim ClaimTyeReferenceId="bearerToken"/>
291+
<InputClaim ClaimTypeReferenceId="bearerToken"/>
292292
</InputClaims>
293293
...
294294
</TechnicalProfile>

articles/active-directory-domain-services/compare-identity-solutions.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,17 @@ Although the three Active Directory-based identity solutions share a common name
2323

2424
* **Active Directory Domain Services (AD DS)** - Enterprise-ready lightweight directory access protocol (LDAP) server that provides key features such as identity and authentication, computer object management, group policy, and trusts.
2525
* AD DS is a central component in many organizations with an on-premises IT environment, and provides core user account authentication and computer management features.
26+
* For more information, see [Active Directory Domain Services overview in the Windows Server documentation][overview-adds].
2627
* **Azure Active Directory (Azure AD)** - Cloud-based identity and mobile device management that provides user account and authentication services for resources such as Office 365, the Azure portal, or SaaS applications.
2728
* Azure AD can be synchronized with an on-premises AD DS environment to provide a single identity to users that works natively in the cloud.
29+
* For more information about Azure AD, see [What is Azure Active Directory?][whatis-azuread]
2830
* **Azure Active Directory Domain Services (Azure AD DS)** - Provides managed domain services with a subset of fully-compatible traditional AD DS features such as domain join, group policy, LDAP, and Kerberos / NTLM authentication.
2931
* Azure AD DS integrates with Azure AD, which itself can synchronize with an on-premises AD DS environment. This ability extends central identity use cases to traditional web applications that run in Azure as part of a lift-and-shift strategy.
3032

3133
This overview article compares and contrasts how these identity solutions can work together, or would be used independently, depending on the needs of your organization.
3234

35+
To get started, [create an Azure AD DS managed domain using the Azure portal][tutorial-create].
36+
3337
## Azure AD DS and self-managed AD DS
3438

3539
If you have applications and services that need access to traditional authentication mechanisms such as Kerberos or NTLM, there are two ways to provide Active Directory Domain Services in the cloud:
@@ -116,3 +120,5 @@ To get started with using Azure AD DS, [create an Azure AD DS managed domain usi
116120
[manage-gpos]: manage-group-policy.md
117121
[tutorial-ldaps]: tutorial-configure-ldaps.md
118122
[tutorial-create]: tutorial-create-instance.md
123+
[whatis-azuread]: ../active-directory/fundamentals/active-directory-whatis.md
124+
[overview-adds]: /windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview

articles/active-directory-domain-services/overview.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ ms.author: iainfou
1919

2020
Azure Active Directory Domain Services (Azure AD DS) provides managed domain services such as domain join, group policy, lightweight directory access protocol (LDAP), and Kerberos / NTLM authentication that is fully compatible with Windows Server Active Directory. You use these domain services without the need to deploy, manage, and patch domain controllers in the cloud. Azure AD DS integrates with your existing Azure AD tenant, which makes it possible for users to sign in using their existing credentials. You can also use existing groups and user accounts to secure access to resources, which provides a smoother lift-and-shift of on-premises resources to Azure.
2121

22+
To get started, [create an Azure AD DS managed domain using the Azure portal][tutorial-create].
23+
2224
Azure AD DS replicates identity information from Azure AD, so works with Azure AD tenants that are cloud-only, or synchronized with an on-premises Active Directory Domain Services (AD DS) environment. The same set of Azure AD DS features exist for both environments.
2325

2426
* If you have an existing on-premises AD DS environment, you can synchronize user account information to provide a consistent identity for users.
@@ -49,7 +51,11 @@ Azure AD DS offers alternatives to the need to create VPN connections back to an
4951

5052
## Azure AD DS features and benefits
5153

52-
To provide identity services to applications and VMs in the cloud, Azure AD DS is fully compatible with a traditional AD DS environment for operations such as domain-join, secure LDAP (LDAPS), Group Policy, DNS management, and LDAP bind and read support. LDAP write support is available for objects created in the Azure AD DS managed domain, but not resources synchronized from Azure AD. The following features of Azure AD DS simplify deployment and management operations:
54+
To provide identity services to applications and VMs in the cloud, Azure AD DS is fully compatible with a traditional AD DS environment for operations such as domain-join, secure LDAP (LDAPS), Group Policy, DNS management, and LDAP bind and read support. LDAP write support is available for objects created in the Azure AD DS managed domain, but not resources synchronized from Azure AD.
55+
56+
To learn more about your identity options, [compare Azure AD DS with Azure AD, Active Directory Domain Services on Azure VMs, and Active Directory Domain Services on-premises][compare].
57+
58+
The following features of Azure AD DS simplify deployment and management operations:
5359

5460
* **Simplified deployment experience:** Azure AD DS is enabled for your Azure AD tenant using a single wizard in the Azure portal.
5561
* **Integrated with Azure AD:** User accounts, group memberships, and credentials are automatically available from your Azure AD tenant. New users, groups, or changes to attributes from your Azure AD tenant or your on-premises AD DS environment are automatically synchronized to Azure AD DS.

articles/active-directory-domain-services/password-policy.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,11 @@ To complete this article, you need the following resources and privileges:
4242

4343
Fine-grained password policies (FGPPs) let you apply specific restrictions for password and account lockout policies to different users in a domain. For example, to secure privileged accounts you can apply stricter account lockout settings than regular non-privileged accounts. You can create multiple FGPPs within an Azure AD DS managed domain and specify the order of priority to apply them to users.
4444

45+
For more information about password policies and using the Active Directory Administration Center, see the following articles:
46+
47+
* [Learn about fine-grained password policies](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc770394(v=ws.10))
48+
* [Configure fine-grained password policies using AD Administration Center](/windows-server/identity/ad-ds/get-started/adac/introduction-to-active-directory-administrative-center-enhancements--level-100-#fine_grained_pswd_policy_mgmt)
49+
4550
Policies are distributed through group association in an Azure AD DS managed domain, and any changes you make are applied at the next user sign-in. Changing the policy doesn't unlock a user account that's already locked out.
4651

4752
Password policies behave a little differently depending on how the user account they're applied to was created. There are two ways a user account can be created in Azure AD DS:

0 commit comments

Comments
 (0)