Skip to content

Commit a43d9ab

Browse files
committed
Merge branch 'master' of https://github.com/Microsoft/azure-docs-pr into azureadds-createui
2 parents f94000c + b64a389 commit a43d9ab

File tree

1,142 files changed

+15886
-13966
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,142 files changed

+15886
-13966
lines changed

.openpublishing.redirection.json

Lines changed: 137 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3821,7 +3821,7 @@
38213821
"redirect_document_id": false
38223822
},
38233823
{
3824-
"source_path": "articles/billing-mca-setup-account.md",
3824+
"source_path": "articles/billing/billing-mca-setup-account.md",
38253825
"redirect_url": "/azure/billing/mca-setup-account",
38263826
"redirect_document_id": false
38273827
},
@@ -15810,6 +15810,16 @@
1581015810
"redirect_url": "/azure/traffic-manager/traffic-manager-manage-endpoints",
1581115811
"redirect_document_id": false
1581215812
},
15813+
{
15814+
"source_path": "articles/virtual-machine-scale-sets/virtual-machine-scale-sets-encrypt-disks-cli.md",
15815+
"redirect_url": "/azure/virtual-machine-scale-sets/disk-encryption-cli",
15816+
"redirect_document_id": true
15817+
},
15818+
{
15819+
"source_path": "articles/virtual-machine-scale-sets/virtual-machine-scale-sets-encrypt-disks-ps.md",
15820+
"redirect_url": "/azure/virtual-machine-scale-sets/disk-encryption-powershell",
15821+
"redirect_document_id": true
15822+
},
1581315823
{
1581415824
"source_path": "articles/virtual-machine-scale-sets/virtual-machine-scale-sets-advanced-autoscale.md",
1581515825
"redirect_url": "/azure/monitoring-and-diagnostics/insights-advanced-autoscale-virtual-machine-scale-sets",
@@ -34614,11 +34624,6 @@
3461434624
"redirect_url": "/azure/cognitive-services/video-indexer/video-indexer-output-json-v2",
3461534625
"redirect_document_id": true
3461634626
},
34617-
{
34618-
"source_path": "articles/security/azure-security-disk-encryption.md",
34619-
"redirect_url": "/azure/security/azure-security-disk-encryption-overview",
34620-
"redirect_document_id": true
34621-
},
3462234627
{
3462334628
"source_path": "articles/active-directory/device-management-hybrid-azuread-joined-devices-setup.md",
3462434629
"redirect_url": "/azure/active-directory/devices/hybrid-azuread-join-manual-steps",
@@ -34718,6 +34723,26 @@
3471834723
"redirect_url": "/azure/active-directory/conditional-access/app-based-mfa",
3471934724
"redirect_document_id": true
3472034725
},
34726+
{
34727+
"source_path": "articles/active-directory/conditional-access/howto-baseline-protect-administrators.md",
34728+
"redirect_url": "/azure/active-directory/conditional-access/concept-baseline-protection",
34729+
"redirect_document_id": false
34730+
},
34731+
{
34732+
"source_path": "articles/active-directory/conditional-access/howto-baseline-protect-azure.md",
34733+
"redirect_url": "/azure/active-directory/conditional-access/concept-baseline-protection",
34734+
"redirect_document_id": false
34735+
},
34736+
{
34737+
"source_path": "articles/active-directory/conditional-access/howto-baseline-protect-end-users.md",
34738+
"redirect_url": "/azure/active-directory/conditional-access/concept-baseline-protection",
34739+
"redirect_document_id": false
34740+
},
34741+
{
34742+
"source_path": "articles/active-directory/conditional-access/howto-baseline-protect-legacy-auth.md",
34743+
"redirect_url": "/azure/active-directory/conditional-access/concept-baseline-protection",
34744+
"redirect_document_id": false
34745+
},
3472134746
{
3472234747
"source_path": "articles/active-directory/active-directory-identityprotection-enable.md",
3472334748
"redirect_url": "/azure/active-directory/identity-protection/enable",
@@ -34893,6 +34918,56 @@
3489334918
"redirect_url": "/azure/aks/ssh",
3489434919
"redirect_document_id": true
3489534920
},
34921+
{
34922+
"source_path": "articles/security/azure-security-disk-encryption-appendix.md",
34923+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34924+
"redirect_document_id": false
34925+
},
34926+
{
34927+
"source_path": "articles/security/azure-security-disk-encryption-faq.md",
34928+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34929+
"redirect_document_id": false
34930+
},
34931+
{
34932+
"source_path": "articles/security/azure-security-disk-encryption-linux.md",
34933+
"redirect_url": "/azure/virtual-machines/linux/disk-encryption-overview",
34934+
"redirect_document_id": false
34935+
},
34936+
{
34937+
"source_path": "articles/security/azure-security-disk-encryption-linux-aad.md",
34938+
"redirect_url": "/azure/virtual-machines/linux/disk-encryption-overview-aad",
34939+
"redirect_document_id": false
34940+
},
34941+
{
34942+
"source_path": "articles/security/azure-security-disk-encryption-overview.md",
34943+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34944+
"redirect_document_id": false
34945+
},
34946+
{
34947+
"source_path": "articles/security/azure-security-disk-encryption-prerequisites.md",
34948+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34949+
"redirect_document_id": false
34950+
},
34951+
{
34952+
"source_path": "articles/security/azure-security-disk-encryption-prerequisites-aad.md",
34953+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34954+
"redirect_document_id": false
34955+
},
34956+
{
34957+
"source_path": "articles/security/azure-security-disk-encryption-tsg.md",
34958+
"redirect_url": "/azure/security/fundamentals/azure-disk-encryption-vms-vmss",
34959+
"redirect_document_id": false
34960+
},
34961+
{
34962+
"source_path": "articles/security/azure-security-disk-encryption-windows.md",
34963+
"redirect_url": "/azure/virtual-machines/linux/disk-encryption-overview",
34964+
"redirect_document_id": false
34965+
},
34966+
{
34967+
"source_path": "articles/security/azure-security-disk-encryption-windows-aad.md",
34968+
"redirect_url": "/azure/virtual-machines/linux/disk-encryption-overview-aad",
34969+
"redirect_document_id": false
34970+
},
3489634971
{
3489734972
"source_path": "articles/cognitive-services/luis/Home.md",
3489834973
"redirect_url": "/azure/cognitive-services/luis/what-is-luis",
@@ -34903,6 +34978,11 @@
3490334978
"redirect_url": "/azure/data-factory/monitor-using-azure-monitor",
3490434979
"redirect_document_id": true
3490534980
},
34981+
{
34982+
"source_path": "articles/data-factory/concepts-data-flow-reference-node.md",
34983+
"redirect_url": "/azure/data-factory/data-flow-join",
34984+
"redirect_document_id": true
34985+
},
3490634986
{
3490734987
"source_path": "articles/virtual-machines/linux/ansible-create-complete-vm.md",
3490834988
"redirect_url": "/azure/virtual-machines/linux/ansible-create-vm",
@@ -34920,7 +35000,7 @@
3492035000
},
3492135001
{
3492235002
"source_path": "articles/security-center/security-center-disk-encryption.md",
34923-
"redirect_url": "/azure/security/azure-security-disk-encryption-overview",
35003+
"redirect_url": "/azure/security-center/security-center-apply-disk-encryption",
3492435004
"redirect_document_id": false
3492535005
},
3492635006
{
@@ -42437,6 +42517,56 @@
4243742517
"source_path": "articles/storage/common/storage-import-export-tool-previewing-drive-usage-export-v1.md",
4243842518
"redirect_url": "/previous-versions/azure/storage/common/storage-import-export-tool-previewing-drive-usage-export-v1",
4243942519
"redirect_document_id": true
42520+
},
42521+
{
42522+
"source_path": "articles/security/fundamentals/abstract-network-security.md",
42523+
"redirect_url": "https://azure.microsoft.com/resources/azure-network-security/",
42524+
"redirect_document_id": false
42525+
},
42526+
{
42527+
"source_path": "articles/security/fundamentals/abstract-serverless-platform-security.md",
42528+
"redirect_url": "https://azure.microsoft.com/resources/azure-functions-serverless-platform-security/",
42529+
"redirect_document_id": false
42530+
},
42531+
{
42532+
"source_path": "articles/security/fundamentals/abstract-container-security.md",
42533+
"redirect_url": "https://azure.microsoft.com/resources/container-security-in-microsoft-azure/",
42534+
"redirect_document_id": false
42535+
},
42536+
{
42537+
"source_path": "articles/security/fundamentals/abstract-operational-security.md",
42538+
"redirect_url": "https://azure.microsoft.com/resources/azure-operational-security/",
42539+
"redirect_document_id": false
42540+
},
42541+
{
42542+
"source_path": "articles/security/fundamentals/abstract-develop-secure-apps.md",
42543+
"redirect_url": "https://azure.microsoft.com/resources/develop-secure-applications-on-azure/",
42544+
"redirect_document_id": false
42545+
},
42546+
{
42547+
"source_path": "articles/security/fundamentals/storage-overview.md",
42548+
"redirect_url": "/azure/storage/common/storage-security-guide",
42549+
"redirect_document_id": false
42550+
},
42551+
{
42552+
"source_path": "articles/security/fundamentals/global-admin.md",
42553+
"redirect_url": "/azure/active-directory/authentication/multi-factor-authentication",
42554+
"redirect_document_id": false
42555+
},
42556+
{
42557+
"source_path": "articles/aks/istio-install.md",
42558+
"redirect_url": "/azure/aks/servicemesh-istio-install",
42559+
"redirect_document_id": false
42560+
},
42561+
{
42562+
"source_path": "articles/aks/istio-scenario-routing.md",
42563+
"redirect_url": "/azure/aks/servicemesh-istio-scenario-routing",
42564+
"redirect_document_id": false
42565+
},
42566+
{
42567+
"source_path": "articles/aks/consul-install.md",
42568+
"redirect_url": "/azure/aks/servicemesh-consul-install",
42569+
"redirect_document_id": false
4244042570
}
4244142571
]
4244242572
}

articles/active-directory-b2c/active-directory-b2c-quickstarts-spa.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,12 @@ Azure Active Directory B2C (Azure AD B2C) provides cloud identity management to
2121

2222
## Prerequisites
2323

24-
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
25-
- Install [Node.js](https://nodejs.org/en/download/)
26-
- A social account from either Facebook, Google, or Microsoft.
27-
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp/archive/master.zip) or clone the sample web app from GitHub.
24+
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload
25+
- [Node.js](https://nodejs.org/en/download/)
26+
- Social account from Facebook, Google, or Microsoft
27+
- Code sample from GitHub: [active-directory-b2c-javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp)
28+
29+
You can [download the zip archive](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp/archive/master.zip) or clone the repository:
2830

2931
```
3032
git clone https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp.git

articles/active-directory-b2c/active-directory-b2c-reference-oauth-code.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ POST {tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/token HTTP/1.1
168168
Host: {tenant}.b2clogin.com
169169
Content-Type: application/x-www-form-urlencoded
170170
171-
grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&client_secret=JqQX2PNo9bpM0uEihUPzyrh&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access&refresh_token=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob
171+
grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access&refresh_token=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob
172172
```
173173

174174
| Parameter | Required? | Description |
@@ -222,4 +222,4 @@ To try these requests yourself, complete the following steps. Replace the exampl
222222

223223
1. [Create an Azure AD B2C directory](active-directory-b2c-get-started.md). Use the name of your directory in the requests.
224224
2. [Create an application](active-directory-b2c-app-registration.md) to obtain an application ID and a redirect URI. Include a native client in your app.
225-
3. [Create your user flows](active-directory-b2c-reference-policies.md) to obtain your user flow names.
225+
3. [Create your user flows](active-directory-b2c-reference-policies.md) to obtain your user flow names.

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ POST {tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/token HTTP/1.1
137137
Host: {tenant}.b2clogin.com
138138
Content-Type: application/x-www-form-urlencoded
139139
140-
grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access&code=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob&client_secret=<your-application-secret>
140+
grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access&code=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob
141141
```
142142

143143
| Parameter | Required | Description |
@@ -206,7 +206,7 @@ POST {tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/token HTTP/1.1
206206
Host: {tenant}.b2clogin.com
207207
Content-Type: application/x-www-form-urlencoded
208208
209-
grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=openid offline_access&refresh_token=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob&client_secret=<your-application-secret>
209+
grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=openid offline_access&refresh_token=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob
210210
```
211211

212212
| Parameter | Required | Description |

articles/active-directory-b2c/active-directory-b2c-setup-commonaad-custom.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
7979
<Description>Login with your Contoso account</Description>
8080
<Protocol Name="OpenIdConnect"/>
8181
<Metadata>
82-
<Item Key="METADATA">https://login.windows.net/common/.well-known/openid-configuration</Item>
82+
<Item Key="METADATA">https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration</Item>
8383
<!-- Update the Client ID below to the Application ID -->
8484
<Item Key="client_id">00000000-0000-0000-0000-000000000000</Item>
8585
<Item Key="response_types">code</Item>
@@ -89,9 +89,9 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
8989
<Item Key="UsePolicyInRedirectUri">false</Item>
9090
<Item Key="DiscoverMetadataByTokenIssuer">true</Item>
9191
<!-- The key below allows you to specify each of the Azure AD tenants that can be used to sign in. Update the GUIDs below for each tenant. -->
92-
<Item Key="ValidTokenIssuerPrefixes">https://sts.windows.net/00000000-0000-0000-0000-000000000000,https://sts.windows.net/11111111-1111-1111-1111-111111111111</Item>
92+
<Item Key="ValidTokenIssuerPrefixes">https://login.microsoftonline.com/00000000-0000-0000-0000-000000000000,https://login.microsoftonline.com/11111111-1111-1111-1111-111111111111</Item>
9393
<!-- The commented key below specifies that users from any tenant can sign-in. Uncomment if you would like anyone with an Azure AD account to be able to sign in. -->
94-
<!-- <Item Key="ValidTokenIssuerPrefixes">https://sts.windows.net/</Item> -->
94+
<!-- <Item Key="ValidTokenIssuerPrefixes">https://login.microsoftonline.com/</Item> -->
9595
</Metadata>
9696
<CryptographicKeys>
9797
<Key Id="client_secret" StorageReferenceId="B2C_1A_AADAppSecret"/>
@@ -125,17 +125,17 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
125125
### Restrict access
126126
127127
> [!NOTE]
128-
> Using `https://sts.windows.net` as the value for **ValidTokenIssuerPrefixes** allows all Azure AD users to sign in to your application.
128+
> Using `https://login.microsoftonline.com/` as the value for **ValidTokenIssuerPrefixes** allows all Azure AD users to sign in to your application.
129129
130130
You need to update the list of valid token issuers and restrict access to a specific list of Azure AD tenant users who can sign in.
131131
132-
To obtain the values, look at the OpenID Connect discovery metadata for each of the Azure AD tenants that you would like to have users sign in from. The format of the metadata URL is similar to `https://login.windows.net/your-tenant/.well-known/openid-configuration`, where `your-tenant` is your Azure AD tenant name. For example:
132+
To obtain the values, look at the OpenID Connect discovery metadata for each of the Azure AD tenants that you would like to have users sign in from. The format of the metadata URL is similar to `https://login.microsoftonline.com/your-tenant/v2.0/.well-known/openid-configuration`, where `your-tenant` is your Azure AD tenant name. For example:
133133
134-
`https://login.windows.net/fabrikam.onmicrosoft.com/.well-known/openid-configuration`
134+
`https://login.microsoftonline.com/fabrikam.onmicrosoft.com/v2.0/.well-known/openid-configuration`
135135
136136
Perform these steps for each Azure AD tenant that should be used to sign in:
137137
138-
1. Open your browser and go to the OpenID Connect metadata URL for the tenant. Find the **issuer** object and record its value. It should look similar to `https://sts.windows.net/00000000-0000-0000-0000-000000000000/`.
138+
1. Open your browser and go to the OpenID Connect metadata URL for the tenant. Find the **issuer** object and record its value. It should look similar to `https://login.microsoftonline.com/00000000-0000-0000-0000-000000000000/`.
139139
1. Copy and paste the value into the **ValidTokenIssuerPrefixes** key. Separate multiple issuers with a comma. An example with two issuers appears in the previous `ClaimsProvider` XML sample.
140140
141141
### Upload the extension file for verification

articles/active-directory-b2c/page-layout.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,17 @@ To set up a page layout, use the following table to find **DataUri** values.
6464

6565
Page layout packages are periodically updated to include fixes and improvements in their page elements. The following change log specifies the changes introduced in each version.
6666

67+
### 1.2.0
68+
- All pages
69+
- Accessibility fixes
70+
- You can now add the `data-preload="true"` attribute in your HTML tags to control the load order for CSS and JavaScript. Scenarios include:
71+
- Use this on your CSS link to load the CSS at the same time as your HTML so that it doesn't 'flicker' between loading the files
72+
- This attribute allows you to control the order in which your Script tags are fetched and executed before the page load
73+
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions
74+
- Support for Chrome translate
75+
- Unified and self-asserted page
76+
- The username/email and password fields now use the form HTML element. This will now allow Edge and IE to properly save this information
77+
6778
### 1.1.0
6879

6980
- Exception page (globalexception)

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,8 @@
131131
href: howto-password-smart-lockout.md
132132
- name: Passwordless
133133
items:
134+
- name: Deploying passwordless
135+
href: howto-authentication-passwordless-deployment.md
134136
- name: Passwordless security keys
135137
href: howto-authentication-passwordless-security-key.md
136138
- name: Passwordless phone sign-in

0 commit comments

Comments
 (0)