Skip to content

Commit 9e0a045

Browse files
authored
Merge branch 'master' into mapboxv1
2 parents 6a191aa + a89f986 commit 9e0a045

File tree

588 files changed

+11668
-3377
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

588 files changed

+11668
-3377
lines changed

.openpublishing.redirection.json

Lines changed: 44 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33927,6 +33927,11 @@
3392733927
"redirect_url": "/azure/role-based-access-control/role-assignments-portal",
3392833928
"redirect_document_id": false
3392933929
},
33930+
{
33931+
"source_path": "articles/role-based-access-control/tutorial-role-assignments-user-template.md",
33932+
"redirect_url": "/azure/role-based-access-control/quickstart-role-assignments-template",
33933+
"redirect_document_id": true
33934+
},
3393033935
{
3393133936
"source_path": "articles/active-directory/privileged-identity-management/active-directory-securing-privileged-access.md",
3393233937
"redirect_url": "/azure/active-directory/users-groups-roles/directory-admin-roles-secure",
@@ -40833,7 +40838,7 @@
4083340838
},
4083440839
{
4083540840
"source_path": "articles/monitoring/monitoring-solutions-inventory.md",
40836-
"redirect_url": "/azure/azure-monitor/insights/solutions-inventory",
40841+
"redirect_url": "/azure/azure-monitor/monitor-reference",
4083740842
"redirect_document_id": false
4083840843
},
4083940844
{
@@ -41698,8 +41703,8 @@
4169841703
},
4169941704
{
4170041705
"source_path": "articles/log-analytics/powershell-samples.md",
41701-
"redirect_url": "/azure/azure-monitor/platform/powershell-samples",
41702-
"redirect_document_id": true
41706+
"redirect_url": "/azure/azure-monitor/samples/powershell-samples",
41707+
"redirect_document_id": false
4170341708
},
4170441709
{
4170541710
"source_path": "articles/monitoring-and-diagnostics/alert-log.md",
@@ -41838,7 +41843,7 @@
4183841843
},
4183941844
{
4184041845
"source_path": "articles/monitoring-and-diagnostics/insights-cli-samples.md",
41841-
"redirect_url": "/azure/azure-monitor/platform/cli-samples",
41846+
"redirect_url": "/azure/azure-monitor/samples/cli-samples",
4184241847
"redirect_document_id": true
4184341848
},
4184441849
{
@@ -43006,6 +43011,41 @@
4300643011
"redirect_url": "/azure/azure-monitor/platform/activity-log-collect",
4300743012
"redirect_document_id": false
4300843013
},
43014+
{
43015+
"source_path": "articles/azure-monitor/learn/quick-create-workspace-posh.md",
43016+
"redirect_url": "/azure/azure-monitor/platform/powershell-workspace-configuration",
43017+
"redirect_document_id": false
43018+
},
43019+
{
43020+
"source_path": "articles/azure-monitor/platform/powershell-quickstart-samples.md",
43021+
"redirect_url": "/azure/azure-monitor/platform/powershell-samples",
43022+
"redirect_document_id": false
43023+
},
43024+
{
43025+
"source_path": "articles/azure-monitor/platform/cli-samples.md",
43026+
"redirect_url": "/azure/azure-monitor/samples/cli-samples",
43027+
"redirect_document_id": false
43028+
},
43029+
{
43030+
"source_path": "articles/azure-monitor/azure-management.md",
43031+
"redirect_url": "/azure/azure-monitor/overview",
43032+
"redirect_document_id": false
43033+
},
43034+
{
43035+
"source_path": "articles/azure-monitor/insights/solutions-inventory.md",
43036+
"redirect_url": "/azure/azure-monitor/monitor-reference",
43037+
"redirect_document_id": false
43038+
},
43039+
{
43040+
"source_path": "articles/azure-monitor/policy-samples.md",
43041+
"redirect_url": "/azure/azure-monitor/samples/policy-samples",
43042+
"redirect_document_id": false
43043+
},
43044+
{
43045+
"source_path": "articles/azure-monitor/platform/powershell-samples.md",
43046+
"redirect_url": "/azure/azure-monitor/samples/powershell-samples",
43047+
"redirect_document_id": false
43048+
},
4300943049
{
4301043050
"source_path": "articles/machine-learning/service/how-to-automated-ml.md",
4301143051
"redirect_url": "/azure/machine-learning/service/concept-automated-ml",

articles/active-directory-b2c/identity-provider-salesforce-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ Now that you have a button in place, you need to link it to an action. The actio
205205
<ClaimsExchange Id="SalesforceExchange" TechnicalProfileReferenceId="salesforce" />
206206
```
207207

208-
Update the value of **TechnicalProfileReferenceId** to the **ID** of the technical profile you created earlier. For example, `LinkedIn-OAUTH`.
208+
Update the value of **TechnicalProfileReferenceId** to the **ID** of the technical profile you created earlier. For example, `salesforce` or `LinkedIn-OAUTH`.
209209

210210
3. Save the *TrustFrameworkExtensions.xml* file and upload it again for verification.
211211

articles/active-directory-b2c/secure-rest-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -237,7 +237,7 @@ For the ServiceUrl, replace your-tenant-name with the name of your Azure AD tena
237237
<DisplayName></DisplayName>
238238
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.RestfulProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
239239
<Metadata>
240-
<Item Key="ServiceUrl">https://login.microsoftonline.com/your-tenant-name.microsoft.com/oauth2/v2.0/token</Item>
240+
<Item Key="ServiceUrl">https://login.microsoftonline.com/your-tenant-name.onmicrosoft.com/oauth2/v2.0/token</Item>
241241
<Item Key="AuthenticationType">Basic</Item>
242242
<Item Key="SendClaimsIn">Form</Item>
243243
</Metadata>

articles/active-directory-domain-services/alert-service-principal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ To recreate the Azure AD application used for credential synchronization, use Az
9898
$app = Get-AzureADApplication -Filter "IdentifierUris eq 'https://sync.aaddc.activedirectory.windowsazure.com'"
9999
Remove-AzureADApplication -ObjectId $app.ObjectId
100100
$spObject = Get-AzureADServicePrincipal -Filter "DisplayName eq 'Azure AD Domain Services Sync'"
101-
Remove-AzureADServicePrincipal -ObjectId $app.ObjectId
101+
Remove-AzureADServicePrincipal -ObjectId $spObject
102102
```
103103
104104
After you delete both applications, the Azure platform automatically recreates them and tries to resume password synchronization. The Azure AD DS managed domain's health automatically updates itself within two hours and removes the alert.

articles/active-directory/app-provisioning/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,8 +99,8 @@
9999
href: /azure/active-directory/develop/developer-support-help-options
100100
- name: Azure feedback forum
101101
href: https://feedback.azure.com/forums/169401-azure-active-directory
102-
- name: MSDN forum
103-
href: https://social.msdn.microsoft.com/Forums/azure/en-US/home?forum=WindowsAzureAD
102+
- name: Microsoft Q&A question page
103+
href: https://docs.microsoft.com/answers/topics/azure-active-directory.html
104104
- name: Pricing
105105
href: https://azure.microsoft.com/pricing/details/active-directory
106106
- name: Service updates

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1224,10 +1224,6 @@ To help drive awareness and demand of our joint integration, we recommend you up
12241224
)
12251225
* **Customer communication.** Alert customers of the new integration through your customer communication (monthly newsletters, email campaigns, product release notes).
12261226

1227-
### Allow IP addresses used by the Azure AD provisioning service to make SCIM requests
1228-
1229-
Certain apps allow inbound traffic to their app. In order for the Azure AD provisioning service to function as expected, the IP addresses used must be allowed. For a list of IP addresses for each service tag/region, see the JSON file - [Azure IP Ranges and Service TagsPublic Cloud](https://www.microsoft.com/download/details.aspx?id=56519). You can download and program these IPs into your firewall as needed. The reserved IP ranges for Azure AD provisioning can be found under "AzureActiveDirectoryDomainServices."
1230-
12311227
## Related articles
12321228

12331229
* [Automate user provisioning and deprovisioning to SaaS apps](user-provisioning.md)

articles/active-directory/authentication/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,8 @@
138138
href: howto-password-ban-bad-on-premises-agent-versions.md
139139
- name: Use SMS-based authentication (preview)
140140
href: howto-authentication-sms-signin.md
141+
- name: Use email address sign-in (preview)
142+
href: howto-authentication-use-email-signin.md
141143
- name: Azure AD smart lockout
142144
href: howto-password-smart-lockout.md
143145
- name: Certificate-based authentication
@@ -223,8 +225,8 @@
223225
items:
224226
- name: Azure feedback forum
225227
href: https://feedback.azure.com/forums/169401-azure-active-directory
226-
- name: MSDN forum
227-
href: https://social.msdn.microsoft.com/Forums/azure/en-US/home?forum=WindowsAzureAD
228+
- name: Microsoft Q&A question page
229+
href: https://docs.microsoft.com/answers/topics/azure-active-directory.html
228230
- name: Pricing
229231
href: https://azure.microsoft.com/pricing/details/active-directory/
230232
- name: Service updates

articles/active-directory/authentication/active-directory-passwords-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
The following are some frequently asked questions (FAQ) for all things related to password reset.
2121

22-
If you have a general question about Azure Active Directory (Azure AD) and self-service password reset (SSPR) that's not answered here, you can ask the community for assistance on the [Azure AD forum](https://social.msdn.microsoft.com/Forums/en-US/home?forum=WindowsAzureAD). Members of the community include engineers, product managers, MVPs, and fellow IT professionals.
22+
If you have a general question about Azure Active Directory (Azure AD) and self-service password reset (SSPR) that's not answered here, you can ask the community for assistance on the [Microsoft Q&A question page for Azure Active Directory](https://docs.microsoft.com/answers/topics/azure-active-directory.html). Members of the community include engineers, product managers, MVPs, and fellow IT professionals.
2323

2424
This FAQ is split into the following sections:
2525

articles/active-directory/authentication/active-directory-passwords-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -254,7 +254,7 @@ Azure AD Connect requires Active Directory **Reset password** permission to perf
254254

255255
## Azure AD forums
256256

257-
If you have a general question about Azure AD and self-service password reset, you can ask the community for assistance on the [Azure AD forums](https://social.msdn.microsoft.com/Forums/en-US/home?forum=WindowsAzureAD). Members of the community include engineers, product managers, MVPs, and fellow IT professionals.
257+
If you have a general question about Azure AD and self-service password reset, you can ask the community for assistance on the [Microsoft Q&A question page for Azure Active Directory](https://docs.microsoft.com/answers/topics/azure-active-directory.html). Members of the community include engineers, product managers, MVPs, and fellow IT professionals.
258258

259259
## Contact Microsoft support
260260

0 commit comments

Comments
 (0)