Skip to content

Commit 9692032

Browse files
committed
2 parents eca9062 + e7e50bb commit 9692032

File tree

999 files changed

+21415
-15644
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

999 files changed

+21415
-15644
lines changed

.openpublishing.publish.config.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -434,6 +434,12 @@
434434
"branch": "main",
435435
"branch_mapping": {}
436436
},
437+
{
438+
"path_to_root": "media-services-video-indexer",
439+
"url": "https://github.com/Azure-Samples/media-services-video-indexer",
440+
"branch": "main",
441+
"branch_mapping": {}
442+
},
437443
{
438444
"path_to_root": "remote-monitoring-webui",
439445
"url": "https://github.com/Azure/pcs-remote-monitoring-webui.git",
@@ -913,6 +919,12 @@
913919
"url": "https://github.com/Azure-Samples/ms-identity-javascript-nodejs-desktop",
914920
"branch": "main",
915921
"branch_mapping": {}
922+
},
923+
{
924+
"path_to_root": "azure-cosmos-dotnet-v3",
925+
"url": "https://github.com/Azure-Samples/cosmos-db-sql-api-dotnet-samples",
926+
"branch": "v3",
927+
"branch_mapping": {}
916928
}
917929
],
918930
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -749,6 +749,11 @@
749749
"redirect_url": "/azure/frontdoor/how-to-configure-endpoints",
750750
"redirect_document_id": false
751751
},
752+
{
753+
"source_path_from_root": "/articles/frontdoor/standard-premium/create-front-door-cli.md",
754+
"redirect_url": "/azure/frontdoor/create-front-door-cli",
755+
"redirect_document_id": false
756+
},
752757
{
753758
"source_path_from_root": "/articles/app-service-web/web-sites-dotnet-deploy-aspnet-mvc-app-membership-oauth-sql-database.md",
754759
"redirect_url": "/aspnet/core/security/authorization/secure-data",
@@ -6931,6 +6936,11 @@
69316936
"redirect_url": "/azure/azure-functions/functions-bindings-event-hubs-output",
69326937
"redirect_document_id": false
69336938
},
6939+
{
6940+
"source_path_from_root": "/articles/azure-functions/functions-bindings-errors.md",
6941+
"redirect_url": "/azure/azure-functions/functions-bindings-error-pages",
6942+
"redirect_document_id": false
6943+
},
69346944
{
69356945
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
69366946
"redirect_url": "/azure/azure-government",
@@ -35413,22 +35423,17 @@
3541335423
},
3541435424
{
3541535425
"source_path_from_root": "/articles/cognitive-services/Speech-Service/how-to-translate-speech-cpp.md",
35416-
"redirect_url": "/azure/cognitive-services/speech-service/quickstart-translate-speech-cpp-windows",
35426+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-translate-speech",
3541735427
"redirect_document_id": false
3541835428
},
3541935429
{
3542035430
"source_path_from_root": "/articles/cognitive-services/Speech-Service/how-to-translate-speech-csharp.md",
35421-
"redirect_url": "/azure/cognitive-services/speech-service/quickstart-translate-speech-dotnetcore-windows",
35422-
"redirect_document_id": false
35423-
},
35424-
{
35425-
"source_path_from_root": "/articles/cognitive-services/Speech-Service/how-to-translate-speech.md",
35426-
"redirect_url": "/azure/cognitive-services/speech-service/quickstart-translate-speech-dotnetframework-windows",
35431+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-translate-speech",
3542735432
"redirect_document_id": false
3542835433
},
3542935434
{
3543035435
"source_path_from_root": "/articles/cognitive-services/Speech-Service/how-to-translate-speech-java.md",
35431-
"redirect_url": "/azure/cognitive-services/speech-service/quickstart-translate-speech-java-jre",
35436+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-translate-speech",
3543235437
"redirect_document_id": false
3543335438
},
3543435439
{
@@ -35516,6 +35521,11 @@
3551635521
"redirect_url": "/azure/cognitive-services/speech-service/role-based-access-control",
3551735522
"redirect_document_id": false
3551835523
},
35524+
{
35525+
"source_path_from_root": "/articles/cognitive-services/Speech-Service/index-speech-translation.yml",
35526+
"redirect_url": "/azure/cognitive-services/speech-service/speech-translation",
35527+
"redirect_document_id": false
35528+
},
3551935529
{
3552035530
"source_path_from_root": "/articles/cognitive-services/Speech-Service/voice-first-virtual-assistants.md",
3552135531
"redirect_url": "/azure/cognitive-services/Speech-Service/voice-assistants",

.openpublishing.redirection.key-vault.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,11 @@
1515
"redirect_url": "/azure/key-vault/basic-concepts",
1616
"redirect_document_id": false
1717
},
18+
{
19+
"source_path_from_root": "/articles/key-vault/general/import-cert-faqs.yml",
20+
"redirect_url": "/azure/key-vault/general/faq",
21+
"redirect_document_id": false
22+
},
1823
{
1924
"source_path_from_root": "/articles/key-vault/certificate-scenarios.md",
2025
"redirect_url": "/azure/key-vault/certificates/certificate-scenarios",

CODEOWNERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111

1212
# Azure Monitor
1313
articles/azure-monitor/* @bwren
14-
articles/azure-monitor/agents @bwren
14+
articles/azure-monitor/agents @guywi-ms @bwren
1515
articles/azure-monitor/alerts @abbyMSFT
1616
articles/azure-monitor/app @AaronMaxwell
1717
articles/azure-monitor/autoscale @rboucher

articles/active-directory/app-provisioning/check-status-user-account-provisioning.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 05/11/2021
11+
ms.date: 05/30/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -21,10 +21,15 @@ This article describes how to check the status of provisioning jobs after they h
2121

2222
## Overview
2323

24-
Provisioning connectors are set up and configured using the [Azure portal](https://portal.azure.com), by following the [provided documentation](../saas-apps/tutorial-list.md) for the supported application. Once configured and running, provisioning jobs can be reported on using one of two methods:
24+
Provisioning connectors are set up and configured using the [Azure portal](https://portal.azure.com), by following the [provided documentation](../saas-apps/tutorial-list.md) for the supported application. Once configured and running, provisioning jobs can be reported on using the following methods:
2525

26-
* **Azure portal** - This article primarily describes retrieving report information from the [Azure portal](https://portal.azure.com), which provides both a provisioning summary report as well as detailed provisioning audit logs for a given application.
27-
* **Audit API** - Azure Active Directory also provides an Audit API that enables programmatic retrieval of the detailed provisioning audit logs. See [Azure Active Directory audit API reference](/graph/api/resources/directoryaudit) for documentation specific to using this API. While this article does not specifically cover how to use the API, it does detail the types of provisioning events that are recorded in the audit log.
26+
- The [Azure portal](https://portal.azure.com)
27+
28+
- Streaming the provisioning logs into [Azure Monitor](../app-provisioning/application-provisioning-log-analytics.md). This method allows for extended data retention and building custom dashboards, alerts, and queries.
29+
30+
- Querying the [Microsoft Graph API](/graph/api/resources/provisioningobjectsummary) for the provisioning logs.
31+
32+
- Downloading the provisioning logs as a CSV or JSON file.
2833

2934
### Definitions
3035

@@ -35,7 +40,7 @@ This article uses the following terms, defined below:
3540

3641
## Getting provisioning reports from the Azure portal
3742

38-
To get provisioning report information for a given application, start by launching the [Azure portal](https://portal.azure.com) and **Azure Active Directory** > **Enterprise Apps** > **Provisioning logs (preview)** in the **Activity** section. You can also browse to the Enterprise Application for which provisioning is configured. For example, if you are provisioning users to LinkedIn Elevate, the navigation path to the application details is:
43+
To get provisioning report information for a given application, start by launching the [Azure portal](https://portal.azure.com) and **Azure Active Directory** > **Enterprise Apps** > **Provisioning logs** in the **Activity** section. You can also browse to the Enterprise Application for which provisioning is configured. For example, if you are provisioning users to LinkedIn Elevate, the navigation path to the application details is:
3944

4045
**Azure Active Directory > Enterprise Applications > All applications > LinkedIn Elevate**
4146

@@ -54,10 +59,10 @@ The **Current Status** should be the first place admins look to check on the ope
5459

5560
 ![Summary report](./media/check-status-user-account-provisioning/provisioning-progress-bar-section.png)
5661

57-
## Provisioning logs (preview)
62+
## Provisioning logs
63+
64+
All activities performed by the provisioning service are recorded in the Azure AD [provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context). You can access the provisioning logs in the Azure portal by selecting **Azure Active Directory** > **Enterprise Apps** > **Provisioning logs ** in the **Activity** section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
5865

59-
All activities performed by the provisioning service are recorded in the Azure AD [provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context). You can access the provisioning logs in the Azure portal by selecting **Azure Active Directory** > **Enterprise Apps** > **Provisioning logs (preview)** in the **Activity** section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
60-
Logged activity event types include:
6166

6267
## Troubleshooting
6368

@@ -68,4 +73,4 @@ For scenario-based guidance on how to troubleshoot automatic user provisioning,
6873
## Additional Resources
6974

7075
* [Managing user account provisioning for Enterprise Apps](configure-automatic-user-provisioning-portal.md)
71-
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
76+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -237,7 +237,7 @@ It's common for a security review to be required as part of a deployment. If you
237237

238238
If the automatic user provisioning implementation fails to work as desired in the production environment, the following rollback steps below can assist you in reverting to a previous known good state:
239239

240-
1. Review the [provisioning summary report](../app-provisioning/check-status-user-account-provisioning.md) and [provisioning logs](../app-provisioning/check-status-user-account-provisioning.md#provisioning-logs-preview) to determine what incorrect operations occurred on the affected users and/or groups.
240+
1. Review the [provisioning logs](../app-provisioning/check-status-user-account-provisioning.md) to determine what incorrect operations occurred on the affected users and/or groups.
241241

242242
1. Use provisioning audit logs to determine the last known good state of the users and/or groups affected. Also review the source systems (Azure AD or AD).
243243

@@ -324,4 +324,4 @@ Refer to the following links to troubleshoot any issues that may turn up during
324324

325325
* [Export or import your provisioning configuration by using Microsoft Graph API](../app-provisioning/export-import-provisioning-configuration.md)
326326

327-
* [Writing expressions for attribute mappings in Azure Active directory](../app-provisioning/functions-for-customizing-application-data.md)
327+
* [Writing expressions for attribute mappings in Azure Active directory](../app-provisioning/functions-for-customizing-application-data.md)

articles/active-directory/app-provisioning/plan-cloud-hr-provision.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -463,7 +463,7 @@ It's common for a security review to be required as part of the deployment of a
463463

464464
The cloud HR user provisioning implementation might fail to work as desired in the production environment. If so, the following rollback steps can assist you in reverting to a previous known good state.
465465

466-
1. Review the [provisioning summary report](../app-provisioning/check-status-user-account-provisioning.md#getting-provisioning-reports-from-the-azure-portal) and [provisioning logs](../app-provisioning/check-status-user-account-provisioning.md#provisioning-logs-preview) to determine what incorrect operations were performed on the affected users or groups. For more information on the provisioning summary report and logs, see [Manage cloud HR app user provisioning](#manage-your-configuration).
466+
1. Review the [provisioning logs](../app-provisioning/check-status-user-account-provisioning.md#provisioning-logs) to determine what incorrect operations were performed on the affected users or groups. For more information on the provisioning summary report and logs, see [Manage cloud HR app user provisioning](#manage-your-configuration).
467467
2. The last known good state of the users or groups affected can be determined through the provisioning audit logs or by reviewing the target systems (Azure AD or Active Directory).
468468
3. Work with the app owner to update the users or groups affected directly in the app by using the last known good state values.
469469

articles/active-directory/authentication/howto-mfa-nps-extension-errors.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ To collect debug logs for support diagnostics, use the following steps on the NP
109109

110110
```
111111
Mkdir c:\NPS
112-
Cd NPS
112+
Cd c:\NPS
113113
netsh trace start Scenario=NetConnection capture=yes tracefile=c:\NPS\nettrace.etl
114114
logman create trace "NPSExtension" -ow -o c:\NPS\NPSExtension.etl -p {7237ED00-E119-430B-AB0F-C63360C8EE81} 0xffffffffffffffff 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 4096 -ets
115115
logman update trace "NPSExtension" -p {EC2E6D3A-C958-4C76-8EA4-0262520886FF} 0xffffffffffffffff 0xff -ets

articles/active-directory/develop/includes/web-app/quickstart-aspnet-core.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ See [How the sample works](#how-the-sample-works) for an illustration.
3232
1. Search for and select **Azure Active Directory**.
3333
1. Under **Manage**, select **App registrations** > **New registration**.
3434
1. For **Name**, enter a name for your application. For example, enter **AspNetCore-Quickstart**. Users of your app will see this name, and you can change it later.
35-
1. For **Redirect URI**, enter **https://localhost:44321/signin-oidc**.
35+
1. Set the **Redirect URI** type to **Web** and value to `https://localhost:44321/signin-oidc`.
3636
1. Select **Register**.
3737
1. Under **Manage**, select **Authentication**.
3838
1. For **Front-channel logout URL**, enter **https://localhost:44321/signout-oidc**.

articles/active-directory/develop/includes/web-app/quickstart-aspnet.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,8 @@ If you want to manually configure your application and code sample, use the foll
4545
1. Search for and select **Azure Active Directory**.
4646
1. Under **Manage**, select **App registrations** > **New registration**.
4747
1. For **Name**, enter a name for your application. For example, enter **ASPNET-Quickstart**. Users of your app will see this name, and you can change it later.
48-
1. Add **https://localhost:44368/** in **Redirect URI**, and select **Register**.
48+
1. Set the **Redirect URI** type to **Web** and value to `https://localhost:44368/`.
49+
1. Select **Register**.
4950
1. Under **Manage**, select **Authentication**.
5051
1. In the **Implicit grant and hybrid flows** section, select **ID tokens**.
5152
1. Select **Save**.

0 commit comments

Comments
 (0)