Skip to content

Commit 9d57827

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-asa-1908
2 parents c464ad7 + f8990ae commit 9d57827

File tree

238 files changed

+1148
-1906
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

238 files changed

+1148
-1906
lines changed

.openpublishing.redirection.json

Lines changed: 43 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -520,11 +520,16 @@
520520
"redirect_url": "/azure/machine-learning",
521521
"redirect_document_id": false
522522
},
523+
{
524+
"source_path": "articles/cognitive-services/LUIS/luis-how-to-add-example-utterances.md",
525+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities",
526+
"redirect_document_id": false
527+
},
523528
{
524529
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-prebuilt-intents-entities.md",
525530
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-machine-learned-entity",
526531
"redirect_document_id": false
527-
},
532+
},
528533
{
529534
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intents-only.md",
530535
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-intents-only",
@@ -43604,6 +43609,43 @@
4360443609
"redirect_document_id": false
4360543610
},
4360643611
{
43612+
"source_path": "articles/load-balancer/load-balancer-outbound-connections-classic.md",
43613+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-outbound-connections-classic",
43614+
"redirect_document_id": false
43615+
},
43616+
{
43617+
"source_path": "articles/load-balancer/load-balancer-multivip.md",
43618+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-multivip",
43619+
"redirect_document_id": false
43620+
},
43621+
{
43622+
"source_path": "articles/load-balancer/load-balancer-get-started-ilb-classic-cloud.md",
43623+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-ilb-classic-cloud",
43624+
"redirect_document_id": false
43625+
},
43626+
{
43627+
"source_path": "articles/load-balancer/load-balancer-get-started-ilb-classic-ps.md",
43628+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-ilb-classic-ps",
43629+
"redirect_document_id": false
43630+
},
43631+
{
43632+
"source_path": "articles/load-balancer/load-balancer-get-started-ilb-classic-cli.md",
43633+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-ilb-classic-cli",
43634+
"redirect_document_id": false
43635+
},
43636+
{
43637+
"source_path": "articles/load-balancer/load-balancer-get-started-internet-classic-ps.md",
43638+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-internet-classic-ps",
43639+
"redirect_document_id": false
43640+
},
43641+
{
43642+
"source_path": "articles/load-balancer/load-balancer-get-started-internet-classic-cloud.md",
43643+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-internet-classic-cloud",
43644+
"redirect_document_id": false
43645+
},
43646+
{
43647+
"source_path": "articles/load-balancer/load-balancer-get-started-internet-classic-cli.md",
43648+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-internet-classic-cli",
4360743649
"source_path": "articles/cognitive-services/translator/how-to-install-containers.md",
4360843650
"redirect_url": "/azure/cognitive-services/translator/translator-info-overview",
4360943651
"redirect_document_id": false

articles/active-directory/b2b/troubleshoot.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: troubleshooting
8-
ms.date: 05/25/2017
8+
ms.date: 11/12/2019
99
tags: active-directory
1010
ms.author: mimart
1111
author: v-miegge
@@ -90,6 +90,10 @@ To resolve this problem, you must take over the abandoned tenant. Refer to [Tak
9090

9191
If the identity tenant is a just-in-time (JIT) or viral tenant (meaning it's a separate, unmanaged Azure tenant), only the guest user can reset their password. Sometimes an organization will [take over management of viral tenants](https://docs.microsoft.com/azure/active-directory/users-groups-roles/domains-admin-takeover) that are created when employees use their work email addresses to sign up for services. After the organization takes over a viral tenant, only an administrator in that organization can reset the user's password or enable SSPR. If necessary, as the inviting organization, you can remove the guest user account from your directory and resend an invitation.
9292

93+
## A guest user is unable to use the AzureAD PowerShell V1 module
94+
95+
As of November 18, 2019, guest users in your directory (defined as user accounts where the **userType** property equals **Guest**) are blocked from using the AzureAD PowerShell V1 module. Going forward, a user will need to either be a member user (where **userType** equals **Member**) or use the AzureAD PowerShell V2 module.
96+
9397
## Next steps
9498

9599
[Get support for B2B collaboration](get-support.md)

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -392,9 +392,9 @@
392392
href: active-directory-configurable-token-lifetimes.md
393393
- name: Application configuration
394394
items:
395-
- name: Azure portal app registrations training guide (legacy)
395+
- name: Transitioning from App registrations (Legacy) to the new App registrations experience in the Azure portal
396396
href: app-registrations-training-guide-for-app-registrations-legacy-users.md
397-
- name: Application Registration Portal app registration guide
397+
- name: Transitioning from Application Registration Portal to the new App registrations experience in the Azure portal
398398
href: app-registration-portal-training-guide.md
399399
- name: Convert a single-tenant app to a multi-tenant app
400400
href: howto-convert-app-to-be-multi-tenant.md

articles/active-directory/develop/app-registration-portal-training-guide.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
2-
title: Application Registration Portal app registrations training guide - Microsoft identity platform | Azure
3-
description: App registrations in the Azure portal for users familiar with Application registration portal
2+
title: Transitioning from Application Registration Portal to the new App registrations experience in the Azure portal
3+
titleSuffix: Microsoft identity platform
4+
description: An introduction to the new App registration experience in the Azure portal
45
services: active-directory
56
documentationcenter: ''
67
author: archieag
@@ -20,7 +21,7 @@ ms.custom: aaddev
2021
ms.collection: M365-identity-device-management
2122
---
2223

23-
# Training guide: Using App registrations in the Azure portal instead of Application Registration Portal
24+
# Transitioning from Application Registration Portal to the new App registrations experience in the Azure portal
2425

2526
There are many improvements in the new [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience in the Azure portal. If you're more familiar with the Application registration portal (apps.dev.microsoft.com) experience for registering or managing converged applications, referred to as the old experience, this training guide will get you started using the new experience.
2627

@@ -113,15 +114,15 @@ separate pages. Here's where you can find the equivalent functionality:
113114

114115
- Advanced option - Live SDK support is on the Authentication page.
115116

116-
## Application Secrets/Certificates & secrets
117+
## Application secrets/Certificates & secrets
117118

118119
In the new experience, **Application secrets** have been renamed to
119120
**Certificates & secrets**. In addition, **Public keys** are referred to as
120121
**Certificates** and **Passwords** are referred to as **Client secrets**. We
121122
chose to not bring this functionality along in the new experience for
122123
security reasons, hence, you can no longer generate a new key pair.
123124

124-
## Platforms/Authentication - Reply URLs/Redirect URIs
125+
## Platforms/Authentication: Reply URLs/redirect URIs
125126
In the old experience, an app had Platforms section for Web, native, and
126127
Web API to configure Redirect URLs, Logout URL and Implicit flow.
127128

@@ -138,7 +139,7 @@ Web APIs are configured in Expose an API page.
138139
configure settings for your application based on the platform or device
139140
that you want to target. [Learn more](quickstart-configure-app-access-web-apis.md#configure-platform-settings-for-your-application)
140141

141-
## Microsoft Graph Permissions/API permissions
142+
## Microsoft Graph permissions/API permissions
142143

143144
- When selecting an API in the old experience, you could choose from
144145
Microsoft Graph APIs only. In the new experience, you can choose
@@ -172,7 +173,7 @@ the manifest editor or the API, or didn't exist.
172173

173174
- Implicit grant flow (oauth2AllowImplicitFlow) can be found on the
174175
Authentication page. Unlike the old experience, you can enable
175-
access tokens or id tokens, or both.
176+
access tokens or ID tokens, or both.
176177

177178
- Scopes defined by this API (oauth2Permissions) and Authorized client
178179
applications (preAuthorizedApplications) can be configured through
@@ -202,4 +203,4 @@ The new experience has the following limitations:
202203
between Azure AD single-tenant and multi-tenant.
203204

204205
> [!NOTE]
205-
> If you're a personal Microsoft account user in Azure AD tenant, and the tenant admin has restricted access to Azure portal, you may get an access denied. However, if you come through the shortcut by typing App registrations in the search bar or pinning it, you'll be able to access the new experience.
206+
> If you're a personal Microsoft account user in Azure AD tenant, and the tenant admin has restricted access to Azure portal, you may get an access denied. However, if you come through the shortcut by typing App registrations in the search bar or pinning it, you'll be able to access the new experience.

articles/active-directory/fundamentals/add-users-azure-active-directory.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 11/11/2019
12+
ms.date: 11/12/2019
1313
ms.author: ajburnle
1414
ms.reviewer: jeffsta
1515
ms.custom: "it-pro, seodec18"
@@ -40,20 +40,28 @@ You can create a new user using the Azure Active Directory portal.
4040

4141
- **User name (required)**: The user name of the new user. For example, [email protected].
4242

43-
The domain part of the user name must use either the initial default domain name, <_yourdomainname_>.onmicrosoft.com, or a custom domain name in your Azure AD organization such as contoso.com. For more information about how to create a custom domain name, see [How to add a custom domain name to Azure Active Directory](add-custom-domain.md).
43+
The domain part of the user name must use either the initial default domain name, <_yourdomainname_>.onmicrosoft.com, or a custom domain name in your Azure AD organization such as contoso.com. You can select from the list of available domains. You can also filter the list by typing a portion of the domain name. For more information about how to create a custom domain name, see [How to add a custom domain name to Azure Active Directory](add-custom-domain.md).
4444

4545
- **Groups**: You can add the user to one or more existing groups, or you can do it later. For more information about adding users to groups, see [How to create a basic group and add members](active-directory-groups-create-azure-portal.md).
4646

4747
- **Directory role**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role. You can assign the user to be a Global administrator or one or more of the limited administrator roles in Azure AD. For more information about assigning roles, see [How to assign roles to users](active-directory-users-assign-role-azure-portal.md).
4848

4949
- **Job info**: You can add more information about the user here, or do it later. For more information about adding user info, see [How to add or change user profile information](active-directory-users-profile-azure-portal.md).
5050

51-
4. Copy the auto-generated password provided in the **Password** box. You'll need to give this password to the user for the initial sign-in process.
51+
4. Copy the auto-generated password provided in the **Password** box. You can choose to use the auto-generated password provided in the Password box or create a custom password. You'll need to give this password to the user for the initial sign-in process.
5252

5353
5. Select **Create**.
5454

5555
The user is created and added to your Azure AD organization.
5656

57+
## Add a new guest user
58+
59+
You can also invite new guest user to collaborate with your organization by selecting **Invite user** from the **New user** page. If your organization's external collaboration settings are configured such that you're allowed to invite guests, the user will be emailed an invitation they must accept in order to begin collaborating. For more information about inviting B2B collaboration users, see [Invite B2B users to Azure Active Directory](../b2b/add-users-administrator.md)
60+
61+
## Add a consumer user
62+
63+
There might be scenarios in which you want to manually create consumer accounts in your Azure Active Directory B2C (Azure AD B2C) directory. For more information about creating consumer accounts, see [Create and delete consumer users in Azure AD B2C](../../active-directory-b2c/manage-users-portal.md).
64+
5765
## Add a new user within a hybrid environment
5866

5967
If you have an environment with both Azure Active Directory (cloud) and Windows Server Active Directory (on-premises), you can add new users by syncing the existing user account data. For more information about hybrid environments and users, see [Integrate your on-premises directories with Azure Active Directory](../hybrid/whatis-hybrid-identity.md).

articles/active-directory/manage-apps/application-proxy-configure-cookie-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ Azure Active Directory (Azure AD) has access and session cookies for accessing o
2929
| Use Persistent Cookie | **No** | **Yes** allows Application Proxy to set its access cookies to not expire when the web browser is closed. The persistence lasts until the access token expires, or until the user manually deletes the persistent cookies. | Use **No** because of the security risk associated with keeping users authenticated.<br></br><br></br>We suggest only using **Yes** for older applications that can't share cookies between processes. It's better to update your application to handle sharing cookies between processes instead of using persistent cookies. For example, you might need persistent cookies to allow a user to open Office documents in explorer view from a SharePoint site. Without persistent cookies, this operation might fail if the access cookies aren't shared between the browser, the explorer process, and the Office process. |
3030

3131
## SameSite Cookies
32-
Starting in version [Chrome 80](https://support.google.com/chrome/a/answer/7679408?hl=en) and eventually in browsers leveraging [Chromium](https://blog.chromium.org/2019/10/developers-get-ready-for-new.html), cookies that do not specify the [SameSite](https://web.dev/samesite-cookies-explained) attribute will be treated as if they were set to **SameSite=Lax**. The SameSite attribute declares how cookies should be restricted to a same-site context. When set to Lax, the cookie is only to sent to same-site requests or top-level navigation. However, Application Proxy requires these cookies to be preserved in the third-party context in order to keep users properly signed in during their session. Due to this, we are making updates to the Application Proxy access and session cookies to avoid adverse impact from this change. The updates include:
32+
Starting in version Chrome 80 and eventually in browsers leveraging Chromium, cookies that do not specify the [SameSite](https://web.dev/samesite-cookies-explained) attribute will be treated as if they were set to **SameSite=Lax**. The SameSite attribute declares how cookies should be restricted to a same-site context. When set to Lax, the cookie is only to sent to same-site requests or top-level navigation. However, Application Proxy requires these cookies to be preserved in the third-party context in order to keep users properly signed in during their session. Due to this, we are making updates to the Application Proxy access and session cookies to avoid adverse impact from this change. The updates include:
3333

34-
* Setting the **SameSite** attribute to **None**- This allows Application Proxy access and sessions cookies to be properly sent in the third-party context.
34+
* Setting the **SameSite** attribute to **None**. This allows Application Proxy access and sessions cookies to be properly sent in the third-party context.
3535
* Setting the **Use Secure Cookie** setting to use **Yes** as the default. Chrome also requires the cookies to specify the Secure flag or it will be rejected. This change will apply to all existing applications published through Application Proxy. Note that Application Proxy access cookies have always been set to Secure and only transmitted over HTTPS. This change will only apply to the session cookies.
3636

3737
These changes to Application Proxy cookies will roll out over the course of the next several weeks before the Chrome 80 release date.

articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Active Directory activity logs in Azure Monitor | Microsoft Docs
33
description: Introduction to Azure Active Directory activity logs in Azure Monitor
44
services: active-directory
55
documentationcenter: ''
6-
author: cawrites
6+
author: MarkusVi
77
manager: daveba
88
editor: ''
99

@@ -15,7 +15,7 @@ ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
1717
ms.date: 04/22/2019
18-
ms.author: chadam
18+
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

2121
ms.collection: M365-identity-device-management

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Audit activity reports in the Azure Active Directory portal | Microsoft D
44
description: Introduction to the audit activity reports in the Azure Active Directory portal
55
services: active-directory
66
documentationcenter: ''
7-
author: cawrites
7+
author: MarkusVi
88
manager: daveba
99
editor: ''
1010

@@ -16,7 +16,7 @@ ms.tgt_pltfrm: na
1616
ms.workload: identity
1717
ms.subservice: report-monitor
1818
ms.date: 07/17/2019
19-
ms.author: chadam
19+
ms.author: markvi
2020
ms.reviewer: dhanyahk
2121

2222
ms.collection: M365-identity-device-management

articles/active-directory/reports-monitoring/concept-reporting-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Get started with the Azure AD reporting API | Microsoft Docs
44
description: How to get started with the Azure Active Directory reporting API
55
services: active-directory
66
documentationcenter: ''
7-
author: cawrites
7+
author: MarkusVi
88
manager: daveba
99
editor: ''
1010

@@ -16,7 +16,7 @@ ms.tgt_pltfrm: na
1616
ms.workload: identity
1717
ms.subservice: report-monitor
1818
ms.date: 11/13/2018
19-
ms.author: chadam
19+
ms.author: markvi
2020
ms.reviewer: dhanyahk
2121

2222
ms.collection: M365-identity-device-management

articles/active-directory/reports-monitoring/concept-risk-events.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Active Directory risk detections | Microsoft Docs
33
description: This artice gives you a detailed overview of what risk detections are.
44
services: active-directory
55
keywords: azure active directory identity protection, security, risk, risk level, vulnerability, security policy
6-
author: cawrites
6+
author: MarkusVi
77
manager: daveba
88

99
ms.assetid: fa2c8b51-d43d-4349-8308-97e87665400b
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.subservice: report-monitor
1616
ms.date: 11/13/2018
17-
ms.author: chadam
17+
ms.author: markvi
1818
ms.reviewer: dhanyahk
1919

2020
ms.collection: M365-identity-device-management

0 commit comments

Comments
 (0)