Skip to content

Commit 902b7df

Browse files
committed
2 parents 39261c1 + 3e28068 commit 902b7df

File tree

332 files changed

+3978
-3346
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

332 files changed

+3978
-3346
lines changed

.openpublishing.redirection.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15275,6 +15275,41 @@
1527515275
"redirect_url": "/azure/machine-learning/how-to-designer-sample-classification-flight-delay",
1527615276
"redirect_document_id": false
1527715277
},
15278+
{
15279+
"source_path": "articles/machine-learning/how-to-designer-sample-classification-churn.md",
15280+
"redirect_url": "/azure/machine-learning/samples-designer",
15281+
"redirect_document_id": false
15282+
},
15283+
{
15284+
"source_path": "articles/machine-learning/how-to-designer-sample-classification-credit-risk-cost-sensitive.md",
15285+
"redirect_url": "/azure/machine-learning/samples-designer",
15286+
"redirect_document_id": false
15287+
},
15288+
{
15289+
"source_path": "articles/machine-learning/how-to-designer-sample-classification-flight-delay.md",
15290+
"redirect_url": "/azure/machine-learning/samples-designer",
15291+
"redirect_document_id": false
15292+
},
15293+
{
15294+
"source_path": "articles/machine-learning/how-to-designer-sample-classification-predict-income.md",
15295+
"redirect_url": "/azure/machine-learning/samples-designer",
15296+
"redirect_document_id": false
15297+
},
15298+
{
15299+
"source_path": "articles/machine-learning/how-to-designer-sample-regression-automobile-price-basic.md",
15300+
"redirect_url": "/azure/machine-learning/samples-designer",
15301+
"redirect_document_id": false
15302+
},
15303+
{
15304+
"source_path": "articles/machine-learning/how-to-designer-sample-regression-automobile-price-compare-algorithms.md",
15305+
"redirect_url": "/azure/machine-learning/samples-designer",
15306+
"redirect_document_id": false
15307+
},
15308+
{
15309+
"source_path": "articles/machine-learning/how-to-designer-sample-text-classification.md",
15310+
"redirect_url": "/azure/machine-learning/samples-designer",
15311+
"redirect_document_id": false
15312+
},
1527815313
{
1527915314
"source_path": "articles/log-analytics/log-analytics-add-solutions.md",
1528015315
"redirect_url": "/azure/monitoring/monitoring-solutions",
@@ -49215,6 +49250,11 @@
4921549250
"source_path": "articles/cognitive-services/Speech-Service/how-to-use-codec-compressed-audio-input-streams-ios.md",
4921649251
"redirect_url": "/azure/cognitive-services/Speech-Service/how-to-use-codec-compressed-audio-input-streams?pivots=programming-language-objectivec",
4921749252
"redirect_document_id": false
49253+
},
49254+
{
49255+
"source_path": "articles/power-bi-embedded/index.md",
49256+
"redirect_url": "https://docs.microsoft.com/power-bi/developer/azure-pbie-what-is-power-bi-embedded",
49257+
"redirect_document_id": false
4921849258
}
4921949259
]
4922049260
}

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The following example shows the **AAD-Common** technical profile:
5252
</TechnicalProfile>
5353
```
5454

55-
## Input claims
55+
## InputClaims
5656

5757
The InputClaims element contains a claim, which is used to look up an account in the directory, or create a new one. There must be exactly one InputClaim element in the input claims collection for all Azure AD technical profiles. You may need to map the name of the claim defined in your policy to the name defined in Azure Active Directory.
5858

@@ -62,7 +62,7 @@ To create a new user account, the input claim is a key that uniquely identifies
6262

6363
The InputClaimsTransformations element may contain a collection of input claims transformation elements that are used to modify the input claim or generate new one.
6464

65-
## Output claims
65+
## OutputClaims
6666

6767
The **OutputClaims** element contains a list of claims returned by the Azure AD technical profile. You may need to map the name of the claim defined in your policy to the name defined in Azure Active Directory. You can also include claims that aren't returned by the Azure Active Directory, as long as you set the `DefaultValue` attribute.
6868

articles/active-directory-b2c/custom-policy-configure-user-input.md

Lines changed: 138 additions & 210 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/saml-issuer-technical-profile.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/09/2020
12+
ms.date: 03/10/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -67,6 +67,12 @@ The CryptographicKeys element contains the following attributes:
6767

6868
To configure the Azure AD B2C SAML sessions between a relying party application, the attribute of the `UseTechnicalProfileForSessionManagement` element, reference to [SamlSSOSessionProvider](custom-policy-reference-sso.md#samlssosessionprovider) SSO session.
6969

70+
## Next steps
71+
72+
See the following article for example of using a SAML issuer technical profile:
73+
74+
- [Register a SAML application in Azure AD B2C](connect-with-saml-service-providers.md)
75+
7076

7177

7278

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/16/2019
9+
ms.date: 03/09/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -153,25 +153,25 @@ Users may have a combination of up to five OATH hardware tokens or authenticator
153153

154154
## OATH hardware tokens (public preview)
155155

156-
OATH is an open standard that specifies how one-time password (OTP) codes are generated. Azure AD will support the use of OATH-TOTP SHA-1 tokens of the 30-second or 60-second variety. Customers can procure these tokens from the vendor of their choice. Secret keys are limited to 128 characters, which may not be compatible with all tokens. The secret keys need to be encoded in Base32.
156+
OATH is an open standard that specifies how one-time password (OTP) codes are generated. Azure AD will support the use of OATH-TOTP SHA-1 tokens of the 30-second or 60-second variety. Customers can procure these tokens from the vendor of their choice. Secret keys are limited to 128 characters, which may not be compatible with all tokens. The secret key can only contain the characters *a-z* or *A-Z* and digits *1-7*, and must be encoded in Base32.
157157

158-
![Uploading OATH tokens to the MFA Server OATH tokens blade](media/concept-authentication-methods/mfa-server-oath-tokens-azure-ad.png)
158+
![Uploading OATH tokens to the MFA OATH tokens blade](media/concept-authentication-methods/mfa-server-oath-tokens-azure-ad.png)
159159

160-
OATH hardware tokens are being supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)
160+
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)
161161

162-
Once tokens are acquired they must be uploaded in a comma-separated values (CSV) file format including the UPN, serial number, secret key, time interval, manufacturer, and model as the example below shows.
162+
Once tokens are acquired they must be uploaded in a comma-separated values (CSV) file format including the UPN, serial number, secret key, time interval, manufacturer, and model as shown in the following example:
163163

164164
```csv
165165
upn,serial number,secret key,time interval,manufacturer,model
166-
[email protected],1234567,1234567890abcdef1234567890abcdef,60,Contoso,HardwareKey
166+
[email protected],1234567,1234567abcdef1234567abcdef,60,Contoso,HardwareKey
167167
```
168168

169169
> [!NOTE]
170-
> Make sure you include the header row in your CSV file as shown above.
170+
> Make sure you include the header row in your CSV file.
171171
172-
Once properly formatted as a CSV file, an administrator can then sign in to the Azure portal and navigate to **Azure Active Directory**, **MFA Server**, **OATH tokens**, and upload the resulting CSV file.
172+
Once properly formatted as a CSV file, an administrator can then sign in to the Azure portal, navigate to **Azure Active Directory** > **Security** > **MFA** > **OATH tokens**, and upload the resulting CSV file.
173173

174-
Depending on the size of the CSV file, it may take a few minutes to process. Click the **Refresh** button to get the current status. If there are any errors in the file, you will have the option to download a CSV file listing any errors for you to resolve.
174+
Depending on the size of the CSV file, it may take a few minutes to process. Click the **Refresh** button to get the current status. If there are any errors in the file, you will have the option to download a CSV file listing any errors for you to resolve. The field names in the downloaded CSV file are different than the uploaded version.
175175

176176
Once any errors have been addressed, the administrator then can activate each key by clicking **Activate** for the token to be activated and entering the OTP displayed on the token.
177177

articles/active-directory/authentication/tutorial-enable-sspr-writeback.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ To complete this tutorial, you need the following resources and privileges:
4141
* If needed, [complete the previous tutorial to enable Azure AD SSPR](tutorial-enable-sspr.md).
4242
* An existing on-premises AD DS environment configured with a current version of Azure AD Connect.
4343
* If needed, configure Azure AD Connect using the [Express](../hybrid/how-to-connect-install-express.md) or [Custom](../hybrid/how-to-connect-install-custom.md) settings.
44+
* To use Password Writeback, your Domain Controllers must be Windows Server 2008 R2 or later.
4445

4546
## Configure account permissions for Azure AD Connect
4647

articles/active-directory/conditional-access/app-protection-based-conditional-access.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,9 @@ In the Conditional Access, these client apps are known to be protected with an a
2828

2929
For a list of eligible client apps, see [App protection policy requirement](concept-conditional-access-grant.md).
3030

31+
> [!NOTE]
32+
> The or clause is used within the policy to enable users to utilize apps that support either the **Require app protection policy** or **Require approved client app** grant controls. For more information on which apps support the **Require app protection policy** grant control, see [App protection policy requirement](concept-conditional-access-grant.md).
33+
3134
## Scenario 1: Office 365 apps require approved apps with app protection policies
3235

3336
In this scenario, Contoso has decided that all mobile access to Office 365 resources must use approved client apps, like Outlook mobile, OneDrive, and Microsoft Teams protected by an app protection policy prior to receiving access. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.
@@ -53,7 +56,7 @@ Organizations must complete the following steps in order to require the use of a
5356
1. Under **Access controls** > **Grant**, select the following options:
5457
- **Require approved client app**
5558
- **Require app protection policy (preview)**
56-
- **Require all of the selected controls**
59+
- **Require one of the selected controls**
5760
1. Confirm your settings and set **Enable policy** to **On**.
5861
1. Select **Create** to create and enable your policy.
5962

@@ -72,7 +75,7 @@ For the Conditional Access policy in this step, configure the following componen
7275
1. **Client apps (preview)**:
7376
1. Set **Configure** to **Yes**.
7477
1. Select **Mobile apps and desktop clients** and **Exchange ActiveSync clients**.
75-
1. Under **Access controls** > **Grant**, select **Grant access**, **Require approved client app**, and select **Select**.
78+
1. Under **Access controls** > **Grant**, select **Grant access**, **Require app protection policy**, and select **Select**.
7679
1. Confirm your settings and set **Enable policy** to **On**.
7780
1. Select **Create** to create and enable your policy.
7881

@@ -105,7 +108,7 @@ Organizations must complete the following three steps in order to require the us
105108
1. Under **Access controls** > **Grant**, select the following options:
106109
- **Require approved client app**
107110
- **Require app protection policy (preview)**
108-
- **Require all of the selected controls**
111+
- **Require one of the selected controls**
109112
1. Confirm your settings and set **Enable policy** to **On**.
110113
1. Select **Create** to create and enable your policy.
111114

@@ -122,7 +125,7 @@ Organizations must complete the following three steps in order to require the us
122125
1. **Client apps (preview)**:
123126
1. Set **Configure** to **Yes**.
124127
1. Select **Mobile apps and desktop clients** and **Exchange ActiveSync clients**.
125-
1. Under **Access controls** > **Grant**, select **Grant access**, **Require approved client app**, and select **Select**.
128+
1. Under **Access controls** > **Grant**, select **Grant access**, **Require app protection policy**, and select **Select**.
126129
1. Confirm your settings and set **Enable policy** to **On**.
127130
1. Select **Create** to create and enable your policy.
128131

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Organizations can choose to use the device identity as part of their Conditional
6464

6565
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile-device management (MDM) solution.
6666

67-
This setting applies to the following client apps:
67+
This setting applies to the following iOS and Android apps:
6868

6969
- Microsoft Azure Information Protection
7070
- Microsoft Bookings
@@ -77,6 +77,7 @@ This setting applies to the following client apps:
7777
- Microsoft Invoicing
7878
- Microsoft Kaizala
7979
- Microsoft Launcher
80+
- Microsoft Office
8081
- Microsoft OneDrive
8182
- Microsoft OneNote
8283
- Microsoft Outlook

0 commit comments

Comments
 (0)