Skip to content

Commit 9215dc7

Browse files
committed
Merge branch 'personal/hansenms/article-type-fix' into personal/hansenms/azure-rbac
2 parents 1768099 + 5285409 commit 9215dc7

File tree

1,091 files changed

+15752
-6805
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,091 files changed

+15752
-6805
lines changed

.openpublishing.publish.config.json

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@
157157
"url": "https://github.com/Azure-Samples/functions-python-pytorch-tutorial",
158158
"branch": "master",
159159
"branch_mapping": {}
160-
},
160+
},
161161
{
162162
"path_to_root": "functions-quickstart-templates",
163163
"url": "https://github.com/Azure/azure-functions-templates",
@@ -187,7 +187,8 @@
187187
"path_to_root": "functions-docs-powershell",
188188
"url": "https://github.com/Azure-Samples/functions-docs-powershell",
189189
"branch": "master"
190-
}, {
190+
},
191+
{
191192
"path_to_root": "samples-personalizer",
192193
"url": "https://github.com/Azure-Samples/cognitive-services-personalizer-samples",
193194
"branch": "master"
@@ -366,7 +367,7 @@
366367
"path_to_root": "azure-sdk-for-java-script-event-hubs",
367368
"url": "https://github.com/Azure/azure-sdk-for-js/",
368369
"branch": "master"
369-
},
370+
},
370371
{
371372
"path_to_root": "azure-sdk-for-net-event-hubs",
372373
"url": "https://github.com/Azure/azure-sdk-for-net/",
@@ -376,7 +377,7 @@
376377
"path_to_root": "azure-sdk-for-python-event-hubs",
377378
"url": "https://github.com/Azure/azure-sdk-for-python/",
378379
"branch": "master"
379-
},
380+
},
380381
{
381382
"path_to_root": "cosmos-dotnet-getting-started",
382383
"url": "https://github.com/Azure-Samples/cosmos-dotnet-getting-started",
@@ -510,5 +511,8 @@
510511
"Pdf": {
511512
"template_folder": "_themes.pdf"
512513
}
514+
},
515+
"docs_build_engine": {
516+
"name": "docfx_v3"
513517
}
514518
}

.openpublishing.redirection.json

Lines changed: 128 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1745,6 +1745,26 @@
17451745
"redirect_url": "/azure/cognitive-services/bing-entity-search/quickstarts/client-libraries?pivots=programming-language-python",
17461746
"redirect_document_id": false
17471747
},
1748+
{
1749+
"source_path": "articles/cognitive-services/Bing-News-Search/news-search-sdk-quickstart.md",
1750+
"redirect_url": "/azure/cognitive-services/bing-news-search/quickstarts/client-libraries?pivots=programming-language-csharp",
1751+
"redirect_document_id": false
1752+
},
1753+
{
1754+
"source_path": "articles/cognitive-services/Bing-News-Search/news-sdk-java-quickstart.md",
1755+
"redirect_url": "/azure/cognitive-services/bing-news-search/quickstarts/client-libraries?pivots=programming-language-java",
1756+
"redirect_document_id": false
1757+
},
1758+
{
1759+
"source_path": "articles/cognitive-services/Bing-News-Search/news-search-sdk-node-quickstart.md",
1760+
"redirect_url": "/azure/cognitive-services/bing-news-search/quickstarts/client-libraries?pivots=programming-language-javascript",
1761+
"redirect_document_id": false
1762+
},
1763+
{
1764+
"source_path": "articles/cognitive-services/Bing-News-Search/news-sdk-python-quickstart.md",
1765+
"redirect_url": "/azure/cognitive-services/bing-news-search/quickstarts/client-libraries?pivots=programming-language-python",
1766+
"redirect_document_id": false
1767+
},
17481768
{
17491769
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
17501770
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",
@@ -2170,6 +2190,11 @@
21702190
"redirect_url": "/azure/cosmos-db/create-sql-api-python",
21712191
"redirect_document_id": false
21722192
},
2193+
{
2194+
"source_path": "articles/cosmos-db/cosmos-db-security-controls.md",
2195+
"redirect_url": "/azure/cosmos-db/security-baseline",
2196+
"redirect_document_id": false
2197+
},
21732198
{
21742199
"source_path": "articles/cosmos-db/powershell-samples.md",
21752200
"redirect_url": "/azure/cosmos-db/powershell-samples-sql",
@@ -4478,7 +4503,7 @@
44784503
{
44794504
"source_path": "articles/azure-supportability/create-manage-support-requests-using-access-control.md",
44804505
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request#role-based-access-control",
4481-
"redirect_document_id": true
4506+
"redirect_document_id": false
44824507
},
44834508
{
44844509
"source_path": "articles/azure-supportability/how-to-create-azure-support-request.md",
@@ -6762,7 +6787,7 @@
67626787
},
67636788
{
67646789
"source_path": "articles/scheduler/get-started-portal.md",
6765-
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
6790+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps"
67666791
},
67676792
{
67686793
"source_path": "articles/connectors/connectors-create-api-googledrive.md",
@@ -13604,6 +13629,11 @@
1360413629
"redirect_url": "/azure/event-hubs/authorize-access-azure-active-directory",
1360513630
"redirect_document_id": false
1360613631
},
13632+
{
13633+
"source_path": "articles/event-hubs/event-hubs-tutorial-virtual-networks-firewalls.md",
13634+
"redirect_url": "/azure/event-hubs/event-hubs-service-endpoints",
13635+
"redirect_document_id": false
13636+
},
1360713637
{
1360813638
"source_path": "articles/active-directory/active-directory-saml-protocol-reference.md",
1360913639
"redirect_url": "/azure/active-directory/develop/active-directory-saml-protocol-reference",
@@ -15786,7 +15816,12 @@
1578615816
},
1578715817
{
1578815818
"source_path": "articles/machine-learning/machine-learning-dedicated-capacity-for-bes-jobs.md",
15789-
"redirect_url": "/azure/machine-learning/studio/dedicated-capacity-for-bes-jobs",
15819+
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
15820+
"redirect_document_id": false
15821+
},
15822+
{
15823+
"source_path": "articles/machine-learning/studio/dedicated-capacity-for-bes-jobs.md",
15824+
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
1579015825
"redirect_document_id": false
1579115826
},
1579215827
{
@@ -16689,6 +16724,11 @@
1668916724
"redirect_url": "https://docs.microsoft.com/rest/api/searchservice/add-scoring-profiles-to-a-search-index",
1669016725
"redirect_document_id": false
1669116726
},
16727+
{
16728+
"source_path": "articles/service-bus/index.md",
16729+
"redirect_url": "/azure/service-bus-messaging/index",
16730+
"redirect_document_id": false
16731+
},
1669216732
{
1669316733
"source_path": "articles/service-bus-messaging/service-bus-role-based-access-control.md",
1669416734
"redirect_url": "/azure/service-bus-messaging/service-bus-managed-service-identity",
@@ -17014,6 +17054,31 @@
1701417054
"redirect_url": "/azure/sql-data-warehouse/maintenance-scheduling#change-a-maintenance-schedule",
1701517055
"redirect_document_id": false
1701617056
},
17057+
{
17058+
"source_path": "articles/sql-data-warehouse/backup-and-restore.md",
17059+
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/backup-and-restore",
17060+
"redirect_document_id": true
17061+
},
17062+
{
17063+
"source_path": "articles/sql-data-warehouse/cheat-sheet.md",
17064+
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/cheat-sheet",
17065+
"redirect_document_id": true
17066+
},
17067+
{
17068+
"source_path": "articles/sql-data-warehouse/column-level-security.md",
17069+
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/column-level-security",
17070+
"redirect_document_id": true
17071+
},
17072+
{
17073+
"source_path": "articles/sql-data-warehouse/create-data-warehouse-portal.md",
17074+
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/create-data-warehouse-portal",
17075+
"redirect_document_id": true
17076+
},
17077+
{
17078+
"source_path": "articles/sql-data-warehouse/create-data-warehouse-powershell.md",
17079+
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/create-data-warehouse-powershell",
17080+
"redirect_document_id": true
17081+
},
1701717082
{
1701817083
"source_path": "articles/sql-data-warehouse/viewing-maintenance-schedule.md",
1701917084
"redirect_url": "/azure/sql-data-warehouse/maintenance-scheduling#view-a-maintenance-schedule",
@@ -41774,6 +41839,16 @@
4177441839
"redirect_url": "/azure/azure-monitor/platform/diagnostic-settings-legacy",
4177541840
"redirect_document_id": false
4177641841
},
41842+
{
41843+
"source_path": "articles/azure-monitor/platform/flow-tutorial.md",
41844+
"redirect_url": "/azure/azure-monitor/platform/logicapp-flow-connector",
41845+
"redirect_document_id": false
41846+
},
41847+
{
41848+
"source_path": "articles/azure-monitor/app/automate-with-flow.md",
41849+
"redirect_url": "/azure/azure-monitor/platform/logicapp-flow-connector",
41850+
"redirect_document_id": false
41851+
},
4177741852
{
4177841853
"source_path": "articles/azure-monitor/platform/azure-storage-iis-table.md",
4177941854
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-logs",
@@ -41799,6 +41874,16 @@
4179941874
"redirect_url": "/azure/azure-monitor/log-query/query-optimization",
4180041875
"redirect_document_id": false
4180141876
},
41877+
{
41878+
"source_path": "articles/azure-monitor/insights/vminsights-known-issues.md",
41879+
"redirect_url": "/azure/azure-monitor/insights/vminsights-overview",
41880+
"redirect_document_id": false
41881+
},
41882+
{
41883+
"source_path": "articles/azure-monitor/log-query/vminsights-health.md",
41884+
"redirect_url": "/azure/azure-monitor/log-query/vminsights-overview",
41885+
"redirect_document_id": false
41886+
},
4180241887
{
4180341888
"source_path": "articles/machine-learning/service/how-to-automated-ml.md",
4180441889
"redirect_url": "/azure/machine-learning/service/concept-automated-ml",
@@ -48144,11 +48229,6 @@
4814448229
"redirect_url": "/azure/app-service/containers/configure-language-java#use-service-bus-as-a-message-broker",
4814548230
"redirect_document_id": false
4814648231
},
48147-
{
48148-
"source_path": "articles/mysql/howto-redirection.md",
48149-
"redirect_url": "/azure/mysql/concepts-connectivity-architecture",
48150-
"redirect_document_id": false
48151-
},
4815248232
{
4815348233
"source_path": "articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-storage.md",
4815448234
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/overview",
@@ -49259,6 +49339,11 @@
4925949339
"redirect_url": "/azure/azure-monitor/overview",
4926049340
"redirect_document_id": false
4926149341
},
49342+
{
49343+
"source_path": "articles/cli/index.yml",
49344+
"redirect_url": "/cli/azure",
49345+
"redirect_document_id": false
49346+
},
4926249347
{
4926349348
"source_path": "articles/virtual-machines/linux/tutorial-build-deploy-jenkins.md",
4926449349
"redirect_url": "/azure/jenkins/tutorial-build-deploy-jenkins",
@@ -49338,6 +49423,41 @@
4933849423
"source_path": "articles/cognitive-services/speech-service/how-to-migrate-from-custom-speech-service.md",
4933949424
"redirect_url": "/azure/cognitive-services/speech-service",
4934049425
"redirect_document_id": false
49426+
},
49427+
{
49428+
"source_path": "articles/media-services/latest/access-api-portal.md",
49429+
"redirect_url": "/azure/media-services/latest/access-api-howto",
49430+
"redirect_document_id": false
49431+
},
49432+
{
49433+
"source_path": "articles/media-services/latest/access-api-cli-how-to.md",
49434+
"redirect_url": "/azure/media-services/latest/access-api-howto",
49435+
"redirect_document_id": false
49436+
},
49437+
{
49438+
"source_path": "articles/media-services/latest/create-account-portal.md",
49439+
"redirect_url": "/azure/media-services/latest/create-account-howto",
49440+
"redirect_document_id": false
49441+
},
49442+
{
49443+
"source_path": "articles/media-services/latest/create-account-cli-how-to.md",
49444+
"redirect_url": "/azure/media-services/latest/create-account-howto",
49445+
"redirect_document_id": false
49446+
},
49447+
{
49448+
"source_path": "articles/mariadb/howto-tls-configurations.md",
49449+
"redirect_url": "/azure/mariadb/howto-configure-ssl",
49450+
"redirect_document_id": false
49451+
},
49452+
{
49453+
"source_path": "articles/mysql/howto-tls-configurations.md",
49454+
"redirect_url": "/azure/mysql/howto-configure-ssl",
49455+
"redirect_document_id": false
49456+
},
49457+
{
49458+
"source_path": "articles/postgresql/howto-tls-configurations.md",
49459+
"redirect_url": "/azure/postgresql/concepts-ssl-connection-security",
49460+
"redirect_document_id": false
4934149461
}
4934249462
]
4934349463
}

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,8 @@
7474
href: custom-policy-overview.md
7575
- name: User accounts
7676
href: user-overview.md
77+
- name: User profile attributes
78+
href: user-profile-attributes.md
7779
- name: How-to guides
7880
items:
7981
- name: App integration

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/09/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -111,6 +111,7 @@ The name of the claim is the name of the Azure AD attribute unless the **Partner
111111
## Requirements of an operation
112112

113113
- There must be exactly one **InputClaim** element in the claims bag for all Azure AD technical profiles.
114+
- The [user profile attributes article](user-profile-attributes.md) describes the supported Azure AD B2C user profile attributes you can use in the input claims, output claims, and persisted claims.
114115
- If the operation is `Write` or `DeleteClaims`, then it must also appear in a **PersistedClaims** element.
115116
- The value of the **userPrincipalName** claim must be in the format of `[email protected]`.
116117
- The **displayName** claim is required and cannot be an empty string.
@@ -250,7 +251,7 @@ The following technical profile deletes a social user account using **alternativ
250251
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md) |
251252
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
252253

253-
### Error messages
254+
## Error messages
254255

255256
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
256257

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/03/2020
12+
ms.date: 03/16/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -62,7 +62,7 @@ Checks that boolean values of two claims are equal, and throws an exception if t
6262
| inputClaim | inputClaim | boolean | The ClaimType to be asserted. |
6363
| InputParameter |valueToCompareTo | boolean | The value to compare (true or false). |
6464

65-
The **AssertBooleanClaimIsEqualToValue** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationBooleanValueIsNotEqual** self-asserted technical profile metadata controls the error message that the technical profile presents to the user.
65+
The **AssertBooleanClaimIsEqualToValue** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationBooleanValueIsNotEqual** self-asserted technical profile metadata controls the error message that the technical profile presents to the user. The error messages can be [localized](localization-string-ids.md#claims-transformations-error-messages).
6666

6767
![AssertStringClaimsAreEqual execution](./media/boolean-transformations/assert-execution.png)
6868

articles/active-directory-b2c/custom-policy-configure-user-input.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/10/2020
12+
ms.date: 03/17/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -19,9 +19,12 @@ ms.subservice: B2C
1919

2020
In this article, you collect a new attribute during your sign-up journey in Azure Active Directory B2C (Azure AD B2C). You'll obtain the users' city, configure it as a drop-down, and define whether it's required to be provided.
2121

22+
> [!NOTE]
23+
> This sample uses the built-in claim 'city'. Instead, you can choose one of the supported [Azure AD B2C built-in attributes](user-profile-attributes.md) or a custom attribute. To use a custom attribute, [enable custom attributes in your policy](custom-policy-custom-attributes.md). To use a different built-in or custom attribute, replace 'city' with the attribute of your choice, for example the built-in attribute *jobTitle* or a custom attribute like *extension_loyaltyId*.
24+
2225
You can gather initial data from your users by using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its [self-asserted technical profile](self-asserted-technical-profile.md). In this sample, you:
2326

24-
1. Define a "city" claim.
27+
1. Define a "city" claim.
2528
1. Ask the user for their city.
2629
1. Persist the city to the user profile in the Azure AD B2C directory.
2730
1. Read the city claim from the Azure AD B2C directory on each sign-in.

0 commit comments

Comments
 (0)