Skip to content

Commit 97bc4fa

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into update-SQL-tutorial
2 parents a4e0bc6 + bce97c7 commit 97bc4fa

File tree

1,256 files changed

+5369
-5372
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,256 files changed

+5369
-5372
lines changed

.openpublishing.publish.config.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -224,11 +224,29 @@
224224
"branch": "master",
225225
"branch_mapping": {}
226226
},
227+
{
228+
"path_to_root": "samples-qnamaker-go",
229+
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-go",
230+
"branch": "master",
231+
"branch_mapping": {}
232+
},
227233
{
228234
"path_to_root": "samples-qnamaker-csharp",
229235
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-csharp",
230236
"branch": "master",
231237
"branch_mapping": {}
238+
},
239+
{
240+
"path_to_root": "samples-qnamaker-java",
241+
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-java",
242+
"branch": "master",
243+
"branch_mapping": {}
244+
},
245+
{
246+
"path_to_root": "samples-qnamaker-python",
247+
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-python",
248+
"branch": "master",
249+
"branch_mapping": {}
232250
}
233251
],
234252
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1271,6 +1271,16 @@
12711271
"redirect_url": "/azure/iot-edge/quickstart",
12721272
"redirect_document_id": false
12731273
},
1274+
{
1275+
"source_path": "articles/iot-edge/quickstart.experimental.md",
1276+
"redirect_url": "/azure/iot-edge/quickstart",
1277+
"redirect_document_id": false
1278+
},
1279+
{
1280+
"source_path": "articles/iot-edge/quickstart-linux.experimental.md",
1281+
"redirect_url": "/azure/iot-edge/quickstart-linux",
1282+
"redirect_document_id": false
1283+
},
12741284
{
12751285
"source_path": "articles/iot-edge/how-iot-edge-works.md",
12761286
"redirect_url": "/azure/iot-edge/about-iot-edge",
@@ -13765,6 +13775,11 @@
1376513775
"redirect_url": "./end-user/microsoft-authenticator-app-how-to",
1376613776
"redirect_document_id": false
1376713777
},
13778+
{
13779+
"source_path": "articles/service-fabric/service-fabric-patterns-and-scenarios.md",
13780+
"redirect_url": "/azure/service-fabric/service-fabric-application-scenarios",
13781+
"redirect_document_id": false
13782+
},
1376813783
{
1376913784
"source_path": "articles/service-fabric-mesh/service-fabric-mesh-howto-deploy-app-private-registry.md",
1377013785
"redirect_url": "/azure/service-fabric-mesh/service-fabric-mesh-tutorial-template-deploy-app",

articles/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -162,6 +162,15 @@ Open a browser and navigate to the URL. Make sure you type the correct URL and t
162162
9. Select **Add Rule**.
163163
10. In **Claim rule template**, select **Send LDAP attributes as claims**.
164164
11. Provide a **Claim rule name**. For the **Attribute store**, select **Select Active Directory**, add the following claims, then click **Finish** and **OK**.
165+
166+
| LDAP attrubute | Outgoing claim type |
167+
| -------------- | ------------------- |
168+
| User-Principal-Name | userPricipalName |
169+
| Surname | family_name |
170+
| Given-Name | given_name |
171+
| E-Mail-Address | email |
172+
| Display-Name | name |
173+
165174
12. Based on your certificate type, you may need to set the HASH algorithm. On the relying party trust (B2C Demo) properties window, select the **Advanced** tab and change the **Secure hash algorithm** to `SHA-1` or `SHA-256`, and click **Ok**.
166175
13. In Server Manager, select **Tools**, and then select **ADFS Management**.
167176
14. Select the relying party trust you created, select **Update from Federation Metadata**, and then click **Update**.

articles/active-directory-b2c/active-directory-b2c-support-create-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ If you encounter issues when you [create an Azure Active Directory B2C (Azure AD
2424
* If the Azure AD B2C tenant doesn't show up in your list of tenants, try again to create the tenant.
2525
* If the Azure AD B2C tenant does show up in your list of tenants and you see the following error message, delete the tenant and create it again:
2626

27-
"Could not complete the creation of the B2C tenant 'contosob2c'. Please visit this [link](http://go.microsoft.com/fwlink/?LinkID=624192&clcid=0x409) for more guidance."
27+
"Could not complete the creation of the B2C tenant 'contosob2c'. Please visit this [link](https://go.microsoft.com/fwlink/?LinkID=624192&clcid=0x409) for more guidance."
2828
* There are known issues when you delete an existing Azure AD B2C tenant and re-create it by using the same domain name. When you create a new Azure AD B2C tenant, you must use a different domain name.
2929
* If these resolutions don't work, contact Azure Support. For more information, see [File support requests for Azure AD B2C](active-directory-b2c-support.md).
3030

articles/active-directory-domain-services/active-directory-ds-admin-guide-administer-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The first step is to set up a Windows Server virtual machine that is joined to t
5959
### Remotely administer the managed domain from a client computer (for example, Windows 10)
6060
The instructions in this article use a Windows Server virtual machine to administer the AAD-DS managed domain. However, you can also choose to use a Windows client (for example, Windows 10) virtual machine to do so.
6161

62-
You can [install Remote Server Administration Tools (RSAT)](http://social.technet.microsoft.com/wiki/contents/articles/2202.remote-server-administration-tools-rsat-for-windows-client-and-windows-server-dsforum2wiki.aspx) on a Windows client virtual machine by following the instructions on TechNet.
62+
You can [install Remote Server Administration Tools (RSAT)](https://social.technet.microsoft.com/wiki/contents/articles/2202.remote-server-administration-tools-rsat-for-windows-client-and-windows-server-dsforum2wiki.aspx) on a Windows client virtual machine by following the instructions on TechNet.
6363

6464
## Task 2 - Install Active Directory administration tools on the virtual machine
6565
Complete the following steps to install the Active Directory Administration tools on the domain joined virtual machine. See Technet for more [information on installing and using Remote Server Administration Tools](https://technet.microsoft.com/library/hh831501.aspx).

articles/active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Acquire a valid certificate per the following guidelines, before you enable secu
4141

4242
1. **Trusted issuer** - The certificate must be issued by an authority trusted by computers connecting to the managed domain using secure LDAP. This authority may be a public certification authority (CA) or an Enterprise CA trusted by these computers.
4343
2. **Lifetime** - The certificate must be valid for at least the next 3-6 months. Secure LDAP access to your managed domain is disrupted when the certificate expires.
44-
3. **Subject name** - The subject name on the certificate must be a wildcard for your managed domain. For instance, if your domain is named 'contoso100.com', the certificate's subject name must be 'contoso100.com'. Set the DNS name (subject alternate name) to this wildcard name.
44+
3. **Subject name** - The subject name on the certificate must be your managed domain. For instance, if your domain is named 'contoso100.com', the certificate's subject name must be 'contoso100.com'. Set the DNS name (subject alternate name) to a wildcard name for your managed domain.
4545
4. **Key usage** - The certificate must be configured for the following uses - Digital signatures and key encipherment.
4646
5. **Certificate purpose** - The certificate must be valid for SSL server authentication.
4747

@@ -79,7 +79,7 @@ On your Windows computer, open a new PowerShell window as **Administrator** and
7979
$lifetime=Get-Date
8080
New-SelfSignedCertificate -Subject contoso100.com `
8181
-NotAfter $lifetime.AddDays(365) -KeyUsage DigitalSignature, KeyEncipherment `
82-
-Type SSLServerAuthentication -DnsName *.contoso100.com
82+
-Type SSLServerAuthentication -DnsName *.contoso100.com, contoso100.com
8383
```
8484

8585
In the preceding sample, replace 'contoso100.com' with the DNS domain name of your managed domain. For example, if you created a managed domain called 'contoso100.onmicrosoft.com', replace 'contoso100.com' in the Subject attribute with 'contoso100.onmicrosoft.com' and '*.contoso100.com' in the DnsName attribute with '*.contoso100.onmicrosoft.com').

articles/active-directory-domain-services/active-directory-ds-getting-started-password-sync-synced-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ A synced Azure AD tenant is set to synchronize with your organization's on-premi
4646
### Install or update Azure AD Connect
4747
Install the latest recommended release of Azure AD Connect on a domain joined computer. If you have an existing instance of Azure AD Connect setup, you need to update it to use the latest version of Azure AD Connect. To avoid known issues/bugs that may have already been fixed, always use the latest version of Azure AD Connect.
4848

49-
**[Download Azure AD Connect](http://www.microsoft.com/download/details.aspx?id=47594)**
49+
**[Download Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594)**
5050

5151
Recommended version: **1.1.614.0** - published on September 5, 2017.
5252

articles/active-directory-domain-services/active-directory-ds-getting-started-password-sync.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ This password change process causes the password hashes that are required by Azu
4949
### Enable NTLM and Kerberos password hash generation for a cloud-only user account
5050
Here are the instructions you need to provide users, so they can change their passwords:
5151

52-
1. Go to the [Azure AD Access Panel](http://myapps.microsoft.com) page for your organization.
52+
1. Go to the [Azure AD Access Panel](https://myapps.microsoft.com) page for your organization.
5353

5454
![Launch the Azure AD access panel](./media/active-directory-domain-services-getting-started/access-panel.png)
5555

articles/active-directory/active-directory-device-registration-on-premises-setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ These capabilities are available to customers who purchase an Azure Active Direc
4646
* License for Azure Active Directory Premium
4747
* Windows Server 2012 R2 Federation Services, configured for SSO to Azure AD
4848
* Windows Server 2012 R2 Web Application Proxy
49-
* Microsoft Azure Active Directory Connect (Azure AD Connect) [(Download Azure AD Connect)](http://www.microsoft.com/download/details.aspx?id=47594)
49+
* Microsoft Azure Active Directory Connect (Azure AD Connect) [(Download Azure AD Connect)](https://www.microsoft.com/download/details.aspx?id=47594)
5050
* Verified domain
5151

5252
## Known issues in this release

articles/active-directory/authentication/active-directory-passwords-troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ A best practice when you troubleshoot problems with password writeback is to ins
9696
| Code | Name or message | Description |
9797
| --- | --- | --- |
9898
| 6329 | BAIL: MMS(4924) 0x80230619: “A restriction prevents the password from being changed to the current one specified.” | This event occurs when the password writeback service attempts to set a password on your local directory that does not meet the password age, history, complexity, or filtering requirements of the domain. <br> <br> If you have a minimum password age and have recently changed the password within that window of time, you're not able to change the password again until it reaches the specified age in your domain. For testing purposes, the minimum age should be set to 0. <br> <br> If you have password history requirements enabled, then you must select a password that has not been used in the last *N* times, where *N* is the password history setting. If you do select a password that has been used in the last *N* times, then you see a failure in this case. For testing purposes, the password history should be set to 0. <br> <br> If you have password complexity requirements, all of them are enforced when the user attempts to change or reset a password. <br> <br> If you have password filters enabled and a user selects a password that does not meet the filtering criteria, then the reset or change operation fails. |
99-
| 6329 | MMS(3040): admaexport.cpp(2837): The server does not contain the LDAP password policy control. | This problem occurs if LDAP_SERVER_POLICY_HINTS_OID control (1.2.840.113556.1.4.2066) isn't enabled on the DCs. To use the password writeback feature, you must enable the control. To do so, the DCs must be on Windows Server 2008 (with the latest SP) or later. If your DCs are on 2008 (pre-R2), then you must also apply hotfix [KB2386717](http://support.microsoft.com/kb/2386717). |
99+
| 6329 | MMS(3040): admaexport.cpp(2837): The server does not contain the LDAP password policy control. | This problem occurs if LDAP_SERVER_POLICY_HINTS_OID control (1.2.840.113556.1.4.2066) isn't enabled on the DCs. To use the password writeback feature, you must enable the control. To do so, the DCs must be on Windows Server 2008 (with the latest SP) or later. If your DCs are on 2008 (pre-R2), then you must also apply hotfix [KB2386717](https://support.microsoft.com/kb/2386717). |
100100
| HR 8023042 | Synchronization Engine returned an error hr=80230402, message=An attempt to get an object failed because there are duplicated entries with the same anchor. | This error occurs when the same user ID is enabled in multiple domains. An example is if you're syncing account and resource forests and have the same user ID present and enabled in each forest. <br> <br> This error can also occur if you use a non-unique anchor attribute, like an alias or UPN, and two users share that same anchor attribute. <br> <br> To resolve this problem, ensure that you don't have any duplicated users within your domains and that you use a unique anchor attribute for each user. |
101101

102102
### If the source of the event is PasswordResetService
@@ -212,7 +212,7 @@ We recommend that you perform this step only after you attempt the first two ste
212212
> If you have customized the out-of-the-box sync rules, *back them up before proceeding with upgrade and then manually redeploy them after you're finished.*
213213
>
214214
215-
1. Download the latest version of Azure AD Connect from the [Microsoft Download Center](http://go.microsoft.com/fwlink/?LinkId=615771).
215+
1. Download the latest version of Azure AD Connect from the [Microsoft Download Center](https://go.microsoft.com/fwlink/?LinkId=615771).
216216
1. Because you have already installed Azure AD Connect, you need to perform an in-place upgrade to update your Azure AD Connect installation to the latest version.
217217
1. Execute the downloaded package and follow the on-screen instructions to update your Azure AD Connect machine.
218218

0 commit comments

Comments
 (0)