Skip to content

Commit 96dc60c

Browse files
authored
Merge pull request #105702 from MicrosoftDocs/master
2/26 PM Publsih
2 parents 5a71ec1 + e519ce6 commit 96dc60c

File tree

175 files changed

+3031
-1315
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

175 files changed

+3031
-1315
lines changed

.openpublishing.redirection.json

Lines changed: 36 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -801,34 +801,44 @@
801801
"redirect_url": "/azure/machine-learning",
802802
"redirect_document_id": false
803803
},
804+
{
805+
"source_path": "articles/cognitive-services/QnAMaker/concepts/data-sources-supported.md",
806+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/reference-document-format-guidelines",
807+
"redirect_document_id": false
808+
},
809+
{
810+
"source_path": "articles/cognitive-services/QnAMaker/tutorials/choosing-capacity-qnamaker-deployment.md",
811+
"redirect_url": "/azure/cognitive-services/QnAMaker/Concepts/azure-resources",
812+
"redirect_document_id": false
813+
},
804814
{
805815
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-publish-kb-nodejs-sdk.md",
806-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
816+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
807817
"redirect_document_id": false
808818
},
809819
{
810820
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-publish-kb-csharp-sdk.md",
811-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
821+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
812822
"redirect_document_id": false
813823
},
814824
{
815825
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/python-sdk.md",
816-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
826+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
817827
"redirect_document_id": false
818828
},
819829
{
820830
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-knowledge-rest-api-nodejs.md",
821-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/publish-kb-nodejs",
831+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/publish-kb-nodejs",
822832
"redirect_document_id": false
823833
},
824834
{
825835
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-postman.md",
826-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
836+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
827837
"redirect_document_id": false
828838
},
829839
{
830840
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-curl.md",
831-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
841+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
832842
"redirect_document_id": false
833843
},
834844
{
@@ -986,11 +996,6 @@
986996
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-new-kb-csharp",
987997
"redirect_document_id": false
988998
},
989-
{
990-
"source_path": "articles/cognitive-services/QnAMaker/Concepts/data-sources-supported.md",
991-
"redirect_url": "/azure/cognitive-services/QnAMaker/concepts/knowledge-base",
992-
"redirect_document_id": false
993-
},
994999
{
9951000
"source_path": "articles/cognitive-services/QnAMaker/How-To/create-knowledge-base.md",
9961001
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/create-publish-knowledge-base",
@@ -1666,6 +1671,26 @@
16661671
"redirect_url": "/azure/cognitive-services/bing-web-search/bing-web-stats",
16671672
"redirect_document_id": false
16681673
},
1674+
{
1675+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-quickstart.md",
1676+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1677+
"redirect_document_id": false
1678+
},
1679+
{
1680+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-java-quickstart.md",
1681+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1682+
"redirect_document_id": false
1683+
},
1684+
{
1685+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-node-quickstart.md",
1686+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1687+
"redirect_document_id": false
1688+
},
1689+
{
1690+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-python-quickstart.md",
1691+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1692+
"redirect_document_id": false
1693+
},
16691694
{
16701695
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
16711696
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -350,8 +350,9 @@
350350
- name: Azure Monitor
351351
href: azure-monitor.md
352352
displayName: log, logs, logging, usage, events
353-
- name: Account management
353+
- name: Manage users - Microsoft Graph
354354
href: manage-user-accounts-graph-api.md
355+
displayName: account, accounts
355356
- name: Deploy with Azure Pipelines
356357
href: deploy-custom-policies-devops.md
357358
displayName: azure devops, ci/cd, cicd, custom policy, policies

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,6 @@ Your custom policy and Azure AD B2C tenant are now ready. Next, create an applic
272272
1. Enter a **Name** for the application. For example, *SAMLApp1*.
273273
1. Under **Supported account types**, select **Accounts in this organizational directory only**
274274
1. Under **Redirect URI**, select **Web**, and then enter `https://localhost`. You modify this value later in the application registration's manifest.
275-
1. Select **Grant admin consent to openid and offline_access permissions**.
276275
1. Select **Register**.
277276

278277
### 4.2 Update the app manifest
@@ -334,7 +333,7 @@ The last step is to enable Azure AD B2C as a SAML IdP in your SAML relying party
334333
Some or all the following are typically required:
335334

336335
* **Metadata**: `https://tenant-name.b2clogin.com/tenant-name.onmicrosoft.com/policy-name/Samlp/metadata`
337-
* **Issuer**: `https://tenant-name.onmicrosoft.com/policy-name`
336+
* **Issuer**: `https://tenant-name.b2clogin.com/tenant-name.onmicrosoft.com/policy-name`
338337
* **Login Url/SAML endpoint/SAML Url**: Check the value in the metadata file
339338
* **Certificate**: This is *B2C_1A_SamlIdpCert*, but without the private key. To get the public key of the certificate:
340339

articles/active-directory-b2c/phone-authentication.md

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,35 @@
11
---
2-
title: Phone sign-up and sign-in with custom policies
2+
title: Phone sign-up and sign-in with custom policies (Preview)
33
titleSuffix: Azure AD B2C
4-
description: Learn how to send one-time passwords in text messages to your application users' phones with custom policies in Azure Active Directory B2C.
4+
description: Send one-time passwords (OTP) in text messages to your application users' phones with custom policies in Azure Active Directory B2C.
55
services: active-directory-b2c
66
author: mmacy
77
manager: celestedg
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 12/17/2019
12+
ms.date: 02/25/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
1616

17-
# Set up phone sign-up and sign-in with custom policies in Azure AD B2C
17+
# Set up phone sign-up and sign-in with custom policies in Azure AD B2C (Preview)
1818

1919
Phone sign-up and sign-in in Azure Active Directory B2C (Azure AD B2C) enables your users to sign up and sign in to your applications by using a one-time password (OTP) sent in a text message to their phone. One-time passwords can help minimize the risk of your users forgetting or having their passwords compromised.
2020

2121
Follow the steps in this article to use the custom policies to enable your customers to sign up and sign in to your applications by using a one-time password sent to their phone.
2222

2323
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
2424

25+
## Pricing
26+
27+
One-time passwords are sent to your users by using SMS text messages, and you may be charged for each message sent. For pricing information, see the **Separate Charges** section of [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
28+
2529
## Prerequisites
2630

31+
You need the following resources in place before setting up OTP.
32+
2733
* [Azure AD B2C tenant](tutorial-create-tenant.md)
2834
* [Web application registered](tutorial-register-applications.md) in your tenant
2935
* [Custom policies](custom-policy-get-started.md) uploaded to your tenant
@@ -66,6 +72,22 @@ As you upload each file, Azure adds the prefix `B2C_1A_`.
6672
1. Select **Run now** and sign up using an email address or a phone number.
6773
1. Select **Run now** once again and sign in with the same account to confirm that you have the correct configuration.
6874

75+
## Get user account by phone number
76+
77+
A user that signs up with a phone number but does not provide a recovery email address is recorded in your Azure AD B2C directory with their phone number as their sign-in name. If the user then wishes to change their phone number, your help desk or support team must first find their account, and then update their phone number.
78+
79+
You can find a user by their phone number (sign-in name) by using [Microsoft Graph](manage-user-accounts-graph-api.md):
80+
81+
```http
82+
GET https://graph.microsoft.com/v1.0/users?$filter=identities/any(c:c/issuerAssignedId eq '+{phone number}' and c/issuer eq '{tenant name}.onmicrosoft.com')
83+
```
84+
85+
For example:
86+
87+
```http
88+
GET https://graph.microsoft.com/v1.0/users?$filter=identities/any(c:c/issuerAssignedId eq '+450334567890' and c/issuer eq 'contosob2c.onmicrosoft.com')
89+
```
90+
6991
## Next steps
7092

7193
You can find the phone sign-up and sign-in custom policy starter pack (and other starter packs) on GitHub:

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The following table provides a list of the features that are available in the va
3939

4040
| Feature | Azure AD Free - Security defaults | Azure AD Free - Azure AD Global Administrators | Office 365 Business Premium, E3, or E5 | Azure AD Premium P1 or P2 |
4141
| --- |:---:|:---:|:---:|:---:|
42-
| Protect Azure AD admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) |||
42+
| Protect Azure AD tenant admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) |||
4343
| Mobile app as a second factor |||||
4444
| Phone call as a second factor | ||||
4545
| SMS as a second factor | ||||

articles/active-directory/develop/howto-authenticate-service-principal-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ You can set the scope at the level of the subscription, resource group, or resou
4646

4747
## Create service principal with self-signed certificate
4848

49-
The following example covers a simple scenario. It uses [New-​AzAD​Service​Principal](/powershell/module/az.resources/new-azadserviceprincipal) to create a service principal with a self-signed certificate, and uses [New-​Azure​Rm​Role​Assignment](/powershell/module/az.resources/new-azroleassignment) to assign the [Reader](/azure/role-based-access-control/built-in-roles#reader) role to the service principal. The role assignment is scoped to your currently selected Azure subscription. To select a different subscription, use [Set-AzContext](/powershell/module/Az.Accounts/Set-AzContext).
49+
The following example covers a simple scenario. It uses [New-​AzAD​Service​Principal](/powershell/module/az.resources/new-azadserviceprincipal) to create a service principal with a self-signed certificate, and uses [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) to assign the [Reader](/azure/role-based-access-control/built-in-roles#reader) role to the service principal. The role assignment is scoped to your currently selected Azure subscription. To select a different subscription, use [Set-AzContext](/powershell/module/Az.Accounts/Set-AzContext).
5050

5151
> [!NOTE]
5252
> The New-SelfSignedCertificate cmdlet and the PKI module are currently not supported in PowerShell Core.

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 16 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -38,11 +38,11 @@ This article gives you an overview of the audit report.
3838

3939
## Who can access the data?
4040

41-
* Users in the **Security Administrator**, **Security Reader**, **Report Reader** or **Global Administrator** roles
41+
* Users in the **Security Administrator**, **Security Reader**, **Report Reader** , **Global Reader** or **Global Administrator** roles
4242

4343
## Audit logs
4444

45-
The Azure AD audit logs provide records of system activities for compliance. To access the audit report, select **Audit logs** in the **Activity** section of **Azure Active Directory**. Note that audit logs may have a latency of up to an hour, so it may take that long for audit activity data to show up in the portal after you have completed the task.
45+
The Azure AD audit logs provide records of system activities for compliance. To access the audit report, select **Audit logs** in the **Monitoring** section of **Azure Active Directory**. Note that audit logs may have a latency of up to an hour, so it may take that long for audit activity data to show up in the portal after you have completed the task.
4646

4747

4848

@@ -87,16 +87,20 @@ You can filter the audit data on the following fields:
8787
The **Service** filter allows you to select from a drop-down list of the following services:
8888

8989
- All
90+
- AAD Management UX
9091
- Access Reviews
91-
- Account Provisioning
92-
- Application SSO
92+
- Account Provisioning
93+
- Application Proxy
9394
- Authentication Methods
9495
- B2C
9596
- Conditional Access
9697
- Core Directory
9798
- Entitlement Management
99+
- Hybrid Authentication
98100
- Identity Protection
99101
- Invited Users
102+
- MIM Service
103+
- MyApps
100104
- PIM
101105
- Self-service Group Management
102106
- Self-service Password Management
@@ -115,7 +119,11 @@ The **Category** filter enables you to select one of the following filters:
115119
- DirectoryManagement
116120
- EntitlementManagement
117121
- GroupManagement
122+
- KerberosDomain
123+
- KeyManagement
124+
- Label
118125
- Other
126+
- PermissionGrantPolicy
119127
- Policy
120128
- ResourceManagement
121129
- RoleManagement
@@ -131,14 +139,13 @@ The **Status** filter allows you to filter based on the status of an audit opera
131139
- Success
132140
- Failure
133141

134-
The **Target** filter allows you to search for a particular target by name or user principal name (UPN). The target name and UPN are case-sensitive.
142+
The **Target** filter allows you to search for a particular target by the starting of the name or user principal name (UPN). The target name and UPN are case-sensitive.
135143

136-
The **Initiated by** filter enables you to define an actor's name or a universal principal name (UPN). The name and UPN are case-sensitive.
144+
The **Initiated by** filter enables you to define what an actor's name or a universal principal name (UPN) starts with. The name and UPN are case-sensitive.
137145

138146
The **Date range** filter enables to you to define a timeframe for the returned data.
139147
Possible values are:
140148

141-
- 1 month
142149
- 7 days
143150
- 24 hours
144151
- Custom
@@ -176,11 +183,11 @@ With user and group-based audit reports, you can get answers to questions such a
176183

177184
- What licenses have been assigned to a group or a user?
178185

179-
If you want to review only auditing data that is related to users, you can find a filtered view under **Audit logs** in the **Activity** section of the **Users** tab. This entry point has **UserManagement** as preselected category.
186+
If you want to review only auditing data that is related to users, you can find a filtered view under **Audit logs** in the **Monitoring** section of the **Users** tab. This entry point has **UserManagement** as preselected category.
180187

181188
![Audit logs](./media/concept-audit-logs/users.png "Audit logs")
182189

183-
If you want to review only auditing data that is related to groups, you can find a filtered view under **Audit logs** in the **Activity** section of the **Groups** tab. This entry point has **GroupManagement** as preselected category.
190+
If you want to review only auditing data that is related to groups, you can find a filtered view under **Audit logs** in the **Monitoring** section of the **Groups** tab. This entry point has **GroupManagement** as preselected category.
184191

185192
![Audit logs](./media/concept-audit-logs/groups.png "Audit logs")
186193

articles/aks/operator-best-practices-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The following table outlines the available storage types and their capabilities:
3131
|----------|---------------|-----------------|----------------|-----------------|--------------------|
3232
| Shared configuration | Azure Files | Yes | Yes | Yes | Yes |
3333
| Structured app data | Azure Disks | Yes | No | No | Yes |
34-
| Unstructured data, file system operations | [BlobFuse (preview)][blobfuse] | Yes | Yes | Yes | No |
34+
| Unstructured data, file system operations | [BlobFuse][blobfuse] | Yes | Yes | Yes | No |
3535

3636
The two primary types of storage provided for volumes in AKS are backed by Azure Disks or Azure Files. To improve security, both types of storage use Azure Storage Service Encryption (SSE) by default that encrypts data at rest. Disks cannot currently be encrypted using Azure Disk Encryption at the AKS node level.
3737

articles/aks/private-clusters.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,18 @@ The control plane or API server is in an Azure Kubernetes Service (AKS)-managed
5151
* West US 2
5252
* East US 2
5353

54+
## Currently Supported Availability Zones
55+
56+
* Central US
57+
* East US
58+
* East US 2
59+
* France Central
60+
* Japan East
61+
* North Europe
62+
* Southeast Asia
63+
* UK South
64+
* West Europe
65+
* West US 2
5466

5567
## Install the latest Azure CLI AKS Preview extension
5668

@@ -111,6 +123,7 @@ Where *--enable-private-cluster* is a mandatory flag for a private cluster.
111123
> If the Docker bridge address CIDR (172.17.0.1/16) clashes with the subnet CIDR, change the Docker bridge address appropriately.
112124
113125
## Connect to the private cluster
126+
114127
The API server endpoint has no public IP address. Consequently, you must create an Azure virtual machine (VM) in a virtual network and connect to the API server. To do so, do the following:
115128

116129
1. Get credentials to connect to the cluster.
@@ -144,7 +157,8 @@ The API server endpoint has no public IP address. Consequently, you must create
144157
* To use a custom DNS server, deploy an AD server with DNS to forward to this IP 168.63.129.16
145158

146159
## Limitations
147-
* Availability Zones are currently only supported for East US 2 and West US 2 regions
160+
* IP authorized ranges cannot be applied to the private api server endpoint, they only apply to the public API server
161+
* Availability Zones are currently supported for certain regions, see the beginning of this document
148162
* [Azure Private Link service limitations][private-link-service] apply to private clusters, Azure private endpoints, and virtual network service endpoints, which aren't currently supported in the same virtual network.
149163
* No support for virtual nodes in a private cluster to spin private Azure Container Instances (ACI) in a private Azure virtual network
150164
* No support for Azure DevOps integration out of the box with private clusters

articles/api-management/configure-custom-domain.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,8 @@ To perform the steps described in this article, you must have:
4949
- **Gateway** (default is: `<apim-service-name>.azure-api.net`),
5050
- **Portal** (default is: `<apim-service-name>.portal.azure-api.net`),
5151
- **Management** (default is: `<apim-service-name>.management.azure-api.net`),
52-
- **SCM** (default is: `<apim-service-name>.scm.azure-api.net`).
52+
- **SCM** (default is: `<apim-service-name>.scm.azure-api.net`),
53+
- **NewPortal** (default is: `<apim-service-name>.developer.azure-api.net`).
5354

5455
> [!NOTE]
5556
> Only the **Gateway** endpoint is available for configuration in the Consumption tier.

0 commit comments

Comments
 (0)