Skip to content

Commit 8441b2d

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1679050ae
2 parents c197e61 + 7c63ea2 commit 8441b2d

File tree

409 files changed

+4525
-2640
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

409 files changed

+4525
-2640
lines changed

.openpublishing.redirection.json

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7049,6 +7049,11 @@
70497049
"redirect_url": "/azure/app-service-mobile",
70507050
"redirect_document_id": false
70517051
},
7052+
{
7053+
"source_path": "articles/application-gateway/application-gateway-covid-guidelines.md",
7054+
"redirect_url": "/azure/application-gateway/high-traffic-support",
7055+
"redirect_document_id": false
7056+
},
70527057
{
70537058
"source_path": "articles/application-gateway/application-gateway-backend-ssl.md",
70547059
"redirect_url": "/azure/application-gateway/ssl-overview",
@@ -26594,6 +26599,21 @@
2659426599
"redirect_url": "/azure/virtual-machines/linux/tutorial-lamp-stack",
2659526600
"redirect_document_id": false
2659626601
},
26602+
{
26603+
"source_path": "articles/vpn-gateway/nva-working-remotely-support.md",
26604+
"redirect_url": "/azure/vpn-gateway/nva-work-remotely-support",
26605+
"redirect_document_id": false
26606+
},
26607+
{
26608+
"source_path": "articles/expressroute/working-remotely-support.md",
26609+
"redirect_url": "/azure/expressroute/work-remotely-support",
26610+
"redirect_document_id": false
26611+
},
26612+
{
26613+
"source_path": "articles/bastion/working-remotely-support.md",
26614+
"redirect_url": "/azure/bastion/work-remotely-support",
26615+
"redirect_document_id": false
26616+
},
2659726617
{
2659826618
"source_path": "articles/vpn-gateway/vpn-gateway-site-to-site-create.md",
2659926619
"redirect_url": "/azure/vpn-gateway/vpn-gateway-howto-site-to-site-classic-portal",
@@ -43745,6 +43765,11 @@
4374543765
"redirect_url": "/azure/cognitive-services/acoustics/what-is-acoustics",
4374643766
"redirect_document_id": false
4374743767
},
43768+
{
43769+
"source_path": "articles/cognitive-services/Acoustics/index.md",
43770+
"redirect_url": "/azure/cognitive-services/acoustics/what-is-acoustics",
43771+
"redirect_document_id": false
43772+
},
4374843773
{
4374943774
"source_path": "articles/iot-central/howto-export-data.md",
4375043775
"redirect_url": "/azure/iot-central/core/howto-export-data-event-hubs-service-bus",
@@ -50325,6 +50350,18 @@
5032550350
"source_path": "articles/sql-data-warehouse/what-is-a-data-warehouse-unit-dwu-cdwu.md",
5032650351
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/what-is-a-data-warehouse-unit-dwu-cdwu",
5032750352
"redirect_document_id": true
50353+
},
50354+
{
50355+
"source_path": "articles/cognitive-services/speech-service/quickstart-voice-assistant-java-android.md",
50356+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-java&tabs=android"
50357+
},
50358+
{
50359+
"source_path": "articles/cognitive-services/speech-service/quickstart-voice-assistant-java-jre.md",
50360+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-java&tabs=jre"
50361+
},
50362+
{
50363+
"source_path": "articles/cognitive-services/Speech-Service/quickstart-voice-assistant-csharp-uwp.md",
50364+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-csharp&tabs=uwp"
5032850365
}
5032950366
]
5033050367
}

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/16/2020
12+
ms.date: 03/24/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -251,7 +251,7 @@ The following technical profile deletes a social user account using **alternativ
251251
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md) |
252252
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
253253

254-
## Error messages
254+
### Error messages
255255

256256
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
257257

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 88 additions & 90 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/custom-policy-keep-me-signed-in.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 02/27/2020
11+
ms.date: 03/24/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -103,7 +103,15 @@ We recommend that you set the value of SessionExpiryInSeconds to be a short peri
103103
</RelyingParty>
104104
```
105105

106-
4. Save your changes and then upload the file.
107-
5. To test the custom policy that you uploaded, in the Azure portal, go to the policy page, and then select **Run now**.
106+
## Test your policy
108107

109-
You can find the sample policy [here](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/keep%20me%20signed%20in).
108+
1. Save your changes, and then upload the file.
109+
1. To test the custom policy you uploaded, in the Azure portal, go to the policy page, and then select **Run now**.
110+
1. Type your **username** and **password**, select **Keep me signed in**, and then click **sign-in**.
111+
1. Go back to the Azure portal. Go to the policy page, and then select **Copy** to copy the sign-in URL.
112+
1. In the browser address bar, remove the `&prompt=login` query string parameter, which forces the user to enter their credentials on that request.
113+
1. In the browser, click **Go**. Now Azure AD B2C will issue an access token without prompting you to sign-in again.
114+
115+
## Next steps
116+
117+
Find the sample policy [here](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/keep%20me%20signed%20in).

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,16 @@ The technical profile also returns claims that aren't returned by the identity p
8888
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token. |
8989
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
9090

91+
### Error messages
92+
93+
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the OpenID Connect technical profile. The error messages can be [localized](localization-string-ids.md#sign-up-or-sign-in-error-messages).
94+
95+
| Attribute | Required | Description |
96+
| --------- | -------- | ----------- |
97+
| UserMessageIfClaimsPrincipalDoesNotExist | No | The message to display to the user if an account with the provided username not found in the directory. |
98+
| UserMessageIfInvalidPassword | No | The message to display to the user if the password is incorrect. |
99+
| UserMessageIfOldPasswordUsed| No | The message to display to the user if an old password used.|
100+
91101
## Cryptographic keys
92102

93103
The **CryptographicKeys** element contains the following attribute:

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ The following example demonstrates the use of a self-asserted technical profile
174174

175175
## Persist claims
176176

177-
If the **PersistedClaims** element is absent, the self-asserted technical profile doesn't persist the data to Azure AD B2C. Instead, a call is made to a validation technical profile that's responsible for persisting the data. For example, the sign-up policy uses the `LocalAccountSignUpWithLogonEmail` self-asserted technical profile to collect the new user profile. The `LocalAccountSignUpWithLogonEmail` technical profile calls the validation technical profile to create the account in Azure AD B2C.
177+
The PersistedClaims element is not used. The self-asserted technical profile doesn't persist the data to Azure AD B2C. Instead, a call is made to a validation technical profile that's responsible for persisting the data. For example, the sign-up policy uses the `LocalAccountSignUpWithLogonEmail` self-asserted technical profile to collect the new user profile. The `LocalAccountSignUpWithLogonEmail` technical profile calls the validation technical profile to create the account in Azure AD B2C.
178178

179179
## Validation technical profiles
180180

articles/active-directory-domain-services/troubleshoot-account-lockout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The most common reasons for an account to be locked out, without any malicious i
5252

5353
## Troubleshoot account lockouts with security audits
5454

55-
To troubleshoot when account lockout events occur and where they're coming from, [enable security audits for Azure AD DS (currently in preview)][security-audit-events]. Audit events are only captured from the time you enable the feature. Ideally, you should enable security audits *before* there's an account lockout issue to troubleshoot. If a user account repeatedly has lockout issues, you can enable security audits ready for the next time the situation occurs.
55+
To troubleshoot when account lockout events occur and where they're coming from, [enable security audits for Azure AD DS][security-audit-events]. Audit events are only captured from the time you enable the feature. Ideally, you should enable security audits *before* there's an account lockout issue to troubleshoot. If a user account repeatedly has lockout issues, you can enable security audits ready for the next time the situation occurs.
5656

5757
Once you have enabled security audits, the following sample queries show you how to review *Account Lockout Events*, code *4740*.
5858

articles/active-directory-domain-services/tutorial-create-management-vm.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,6 @@ To get started, connect to the Windows Server VM as follows:
8787

8888
![Connect to Windows virtual machine using Bastion in the Azure portal](./media/join-windows-vm/connect-to-vm.png)
8989

90-
You can also [create and use an Azure Bastion host (currently in preview)][azure-bastion] to allow access only through the Azure portal over TLS.
9190
1. Enter the credentials for your VM, then select **Connect**.
9291

9392
![Connect through the Bastion host in the Azure portal](./media/join-windows-vm/connect-to-bastion.png)

articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@ There are three ways to check whether an application is in quarantine:
3434

3535
![Provisioning status bar showing quarantine status](./media/application-provisioning-quarantine-status/progress-bar-quarantined.png)
3636

37+
- In the Azure portal, navigate to **Azure Active Directory** > **Audit Logs** > filter on **Activity: Quarantine** and review the quarantine history. While the view in the progress bar as described above shows whether provisioning is currently in quarantine, the audit logs allow you to see the quarantine history for an application.
38+
3739
- Use the Microsoft Graph request [Get synchronizationJob](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-get?view=graph-rest-beta&tabs=http) to programmatically get the status of the provisioning job:
3840

3941
`GET https://graph.microsoft.com/beta/servicePrincipals/{id}/synchronization/jobs/{jobId}/`
@@ -68,4 +70,4 @@ After you've resolved the issue, restart the provisioning job. Certain changes t
6870

6971
- Use Microsoft Graph to [restart the provisioning job](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-restart?view=graph-rest-beta&tabs=http). You'll have full control over what you restart. You can choose to clear escrows (to restart the escrow counter that accrues toward quarantine status), clear quarantine (to remove the application from quarantine), or clear watermarks. Use the following request:
7072

71-
`POST /servicePrincipals/{id}/synchronization/jobs/{jobId}/restart`
73+
`POST /servicePrincipals/{id}/synchronization/jobs/{jobId}/restart`

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Allow your employee's phone to become a passwordless authentication method. You
5757

5858
![Sign in to Microsoft Edge with the Microsoft Authenticator app](./media/concept-authentication-passwordless/concept-web-sign-in-microsoft-authenticator-app.png)
5959

60-
The Authenticator App turns any iOS or Android phone into a strong, passwordless credential. Users can sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using their biometric (touch or face) or PIN to confirm.
60+
The Authenticator App turns any iOS or Android phone into a strong, passwordless credential. Users can sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using their biometric (touch or face) or PIN to confirm. Please refer to [Download and install the Microsoft Authenticator app](https://docs.microsoft.com/azure/active-directory/user-help/user-help-auth-app-download-install) for installation details.
6161

6262
Passwordless authentication using the Authenticator App follows the same basic pattern as Windows Hello for Business. It's a little more complicated as the user needs to be identified so that Azure AD can find the Microsoft Authenticator App version being used:
6363

0 commit comments

Comments
 (0)