Skip to content

Commit 9e76116

Browse files
committed
Bringing even with master.
2 parents ee5b53f + 68305e5 commit 9e76116

File tree

248 files changed

+2132
-1251
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

248 files changed

+2132
-1251
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30510,6 +30510,12 @@
3051030510
"source_path": "articles/iot-central/howto-create-application.md",
3051130511
"redirect_url": "/azure/iot-central/quick-deploy-iot-central",
3051230512
"redirect_document_id" : false
30513+
},
30514+
30515+
{
30516+
"source_path": "articles/backup/backup-mabs-upgrade-to-v2.md",
30517+
"redirect_url": "/azure/backup/backup-mabs-whats-new-mabs",
30518+
"redirect_document_id" : false
3051330519
}
3051430520
]
3051530521
}

articles/active-directory-b2c/claimsschema.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ The **Mask** element contains the following attributes:
105105
| Type | Yes | The type of the claim mask. Possible values: `Simple` or `Regex`. The `Simple` value indicates that a simple text mask is applied to the leading portion of a string claim. The `Regex` value indicates that a regular expression is applied to the string claim as whole. If the `Regex` value is specified, an optional attribute must also be defined with the regular expression to use. |
106106
| Regex | No | If **Type** is set to `Regex`, specify the regular expression to use.
107107

108-
The follwing example configures a **PhoneNumber** claim with the `Simple` mask:
108+
The following example configures a **PhoneNumber** claim with the `Simple` mask:
109109

110110
```XML
111111
<ClaimType Id="PhoneNumber">
@@ -120,7 +120,7 @@ The Identity Experience Framework renders the phone number while hiding the firs
120120

121121
![Using claim type with mask](./media/claimsschema/mask.png)
122122

123-
The follwing example configures a **AlternateEmail** claim with the `Regex` mask:
123+
The following example configures a **AlternateEmail** claim with the `Regex` mask:
124124

125125
```XML
126126
<ClaimType Id="AlternateEmail">

articles/active-directory-b2c/technical-profiles-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ All types of technical profiles share the same concept. You send input claims, r
5252
- Create or update the user account.
5353
- Sends and verifies the MFA text message.
5454
4. **ValidationTechnicalProfiles** - For a [self asserted technical profile](self-asserted-technical-profile.md), you can call an input [validation technical profile](validation-technical-profile.md). The validation technical profile validates the data profiled by the user and returns an error message or Ok, with or without output claims. For example, before Azure AD B2C creates a new account, it checks whether the user already exists in the directory services. You can call a REST API technical profile to add your own business logic.<p>The scope of the output claims of a validation technical profile is limited to the technical profile that invokes the validation technical profile and other validation technical profiles under same technical profile. If you want to use the output claims in the next orchestration step, you need to add the output claims to the technical profile that invokes the validation technical profile.
55-
5. **OutputClaims** - Claims are retuned back to the claims bag. You can use those claims in the next orchestrations step, or output claims transformations.
55+
5. **OutputClaims** - Claims are returned back to the claims bag. You can use those claims in the next orchestrations step, or output claims transformations.
5656
6. **OutputClaimsTransformations** - Input claims of every output [claims transformation](claimstransformations.md) are picked up from the claims bag. The output claims of the technical profile from the previous steps can be input claims of an output claims transformation. After execution, the output claims are put back in the claims bag. The output claims of an output claims transformation can also be input claims of a subsequent output claims transformation.
5757
7. **Single sign-on (SSO) session management** - [SSO session management](active-directory-b2c-reference-sso-custom.md) controls interaction with a user after the user has already authenticated. For example, the administrator can control whether the selection of identity providers is displayed, or whether local account details need to be entered again.
5858

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ The **UseTechnicalProfileForSessionManagement** element contains the following a
268268
| ReferenceId | Yes | An identifier of a technical profile already defined in the policy file or parent policy file. |
269269

270270
### EnabledForUserJourneys
271-
The **ClaimsProviderSelections** in a user journey defines the list of claims provider selection options and their order. With the **EnabledForUserJourneys** element you filter, which claims provider is avaible to the user. The **EnabledForUserJourneys** element contains one of the following values:
271+
The **ClaimsProviderSelections** in a user journey defines the list of claims provider selection options and their order. With the **EnabledForUserJourneys** element you filter, which claims provider is available to the user. The **EnabledForUserJourneys** element contains one of the following values:
272272

273273
- **Always**, execute the technical profile.
274274
- **Never**, skip the technical profile.

articles/active-directory-b2c/userjourneys.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,7 @@ The **UserJourney** element contains the following elements:
4545

4646
A user journey is represented as an orchestration sequence that must be followed through for a successful transaction. If any step fails, the transaction fails. These orchestration steps reference both the building blocks and the claims providers allowed in the policy file. Any orchestration step that is responsible to show or render a user experience also has a reference to the corresponding content definition identifier.
4747

48-
Orchestration steps can be conditionaly ecxetuted, based on preconditions defined in the orchestration step element. For examle you can check to perform an orchestration step only if a specific claims exists, or if a claim is equal or not to the specified value.
49-
48+
Orchestration steps can be conditionaly executed, based on preconditions defined in the orchestration step element. For examle you can check to perform an orchestration step only if a specific claims exists, or if a claim is equal or not to the specified value.
5049

5150
To specify the ordered list of orchestration steps, an **OrchestrationSteps** element is added as part of the policy. This element is required.
5251

@@ -62,7 +61,7 @@ The **OrchestrationStep** element contains the following attributes:
6261
| --------- | -------- | ----------- |
6362
| Order | Yes | The order of the orchestration steps. |
6463
| Type | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
65-
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples, if the type of the orchestration step is one of follwing: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`. Azure AD B2C needs to display the identity provider selection without having a technical profile. |
64+
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples, if the type of the orchestration step is one of following: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`. Azure AD B2C needs to display the identity provider selection without having a technical profile. |
6665
| CpimIssuerTechnicalProfileReferenceId | No | The type of the orchestration step is `SendClaims`. This property defines the technical profile identifier of the claims provider that issues the token for the relying party. If absent, no relying party token is created. |
6766

6867

articles/active-directory-b2c/validation-technical-profile.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ A validation technical profile is an ordinary technical profile from any protoco
2727
}
2828
```
2929

30-
Claims that are retuned from a validation technical profile are added back to the claims bag. You can use those claims in the next validation technical profiles.
30+
Claims that are returned from a validation technical profile are added back to the claims bag. You can use those claims in the next validation technical profiles.
3131

3232
Validation technical profiles are executed in the sequence that they appear in the **ValidationTechnicalProfiles** element. You can configure in a validation technical profile whether the execution of any subsequent validation technical profiles should continue if the validation technical profile raises an error or is successful.
3333

@@ -49,8 +49,8 @@ The **ValidationTechnicalProfile** element contains the following attribute:
4949
| Attribute | Required | Description |
5050
| --------- | -------- | ----------- |
5151
| ReferenceId | Yes | An identifier of a technical profile already defined in the policy or parent policy. |
52-
|ContinueOnError|No| Indicating whether validation of any subsequent validation technical profiles should continue if this validaiton technical profile raises an error. Posible values: `true` or `false` (default, processing of further validation profiles will stop and an error returned).
53-
|ContinueOnSuccess | No | Indicating whether validation of any subsequent validation profiles should continue if this validation technical profile succeeds. Posible values: `true` or `false`. The default is `true`, meaning that the processing of further validation profiles will continue. |
52+
|ContinueOnError|No| Indicating whether validation of any subsequent validation technical profiles should continue if this validaiton technical profile raises an error. Possible values: `true` or `false` (default, processing of further validation profiles will stop and an error returned).
53+
|ContinueOnSuccess | No | Indicating whether validation of any subsequent validation profiles should continue if this validation technical profile succeeds. Possible values: `true` or `false`. The default is `true`, meaning that the processing of further validation profiles will continue. |
5454

5555
The **ValidationTechnicalProfile** element contains the following element:
5656

@@ -77,8 +77,8 @@ The **Precondition** element contains following elements:
7777
Following example uses these validation technical profiles:
7878

7979
1. The first validation technical profile checks user credentials and doesn't continue if an error occurs, such as invalid username or bad password.
80-
2. The next validation technical profile, doesn't execute if the userType claim does not exist, or if the value of the userType is `Partner`. The validation technical profile tries to read the user profile from the internal customer database and continue if an error occurs, such as REST API service not avaible, or any internal error.
81-
3. The last validation technical profile, doesn't execute if the userType claim has not existed, or if the value of the userType is `Customer`. The validation technical profile tries to read the user profile from the internal partner database and continues if an error occurs, such as REST API service not avaible, or any internal error.
80+
2. The next validation technical profile, doesn't execute if the userType claim does not exist, or if the value of the userType is `Partner`. The validation technical profile tries to read the user profile from the internal customer database and continue if an error occurs, such as REST API service not available, or any internal error.
81+
3. The last validation technical profile, doesn't execute if the userType claim has not existed, or if the value of the userType is `Customer`. The validation technical profile tries to read the user profile from the internal partner database and continues if an error occurs, such as REST API service not available, or any internal error.
8282

8383
```XML
8484
<ValidationTechnicalProfiles>

articles/active-directory/develop/howto-reactivate-disabled-acs-namespaces.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ On October 3, 2018, we announced (through email and [a blog post](https://azure.
3131
If you haven't opted in for the extension, we will start to disable ACS namespaces starting November 7, 2018. If you missed the communications and would still like to opt in for the extension to February 4, 2019, follow the instructions in the following sections.
3232

3333
> [!NOTE]
34-
> You must be an administrator of the subscription to run the PowerShell commands and request an extension.
34+
> You must be an administrator of the subscription to run the PowerShell commands and request an extension. The permissions to log into the ACS namespace's management portal and PowerShell are the same. Service administrators and co-administrators can log in, but account administrators cannot log in.
3535
3636
## Find and enable your ACS namespaces
3737

articles/active-directory/saas-apps/kantegassoforbamboo-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ To enable Azure AD users to log in to Bamboo, they must be provisioned into Bamb
260260

261261
![Add Employee](./media/kantegassoforbamboo-tutorial/user1.png)
262262

263-
1. Click **Users**. Under the **Add user** section, Perform follwing steps:
263+
1. Click **Users**. Under the **Add user** section, Perform following steps:
264264

265265
![Add Employee](./media/kantegassoforbamboo-tutorial/user2.png)
266266

articles/app-service/scripts/app-service-cli-scale-high-availability.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure CLI Script Sample - Scale a web app worldwide with a high-availabilty architecture | Microsoft Docs
3-
description: Azure CLI Script Sample - Scale a web app worldwide with a high-availabilty architecture
2+
title: Azure CLI Script Sample - Scale a web app worldwide with a high-availability architecture | Microsoft Docs
3+
description: Azure CLI Script Sample - Scale a web app worldwide with a high-availability architecture
44
services: appservice
55
documentationcenter: appservice
66
author: syntaxc4

articles/application-gateway/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -130,12 +130,12 @@
130130
href: redirect-internal-site-powershell.md
131131
- name: Azure CLI
132132
href: redirect-internal-site-cli.md
133+
- name: Redirect web traffic using Azure PowerShell
134+
href: tutorial-url-redirect-powershell.md
133135
- name: Multi-tenant support
134136
items:
135137
- name: Configure multi-tenant support
136138
href: create-web-app.md
137-
- name: Redirect web traffic using Azure PowerShell
138-
href: tutorial-url-redirect-powershell.md
139139
- name: Custom probes
140140
items:
141141
- name: Portal

0 commit comments

Comments
 (0)