Skip to content

Commit ac7d1af

Browse files
committed
2 parents 8a72157 + 893b26a commit ac7d1af

File tree

314 files changed

+6790
-8244
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

314 files changed

+6790
-8244
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,11 @@
233233
"url": "https://github.com/Azure-Samples/azure-iot-samples-node",
234234
"branch": "master"
235235
},
236+
{
237+
"path_to_root": "azure-iot-sdk-node",
238+
"url": "https://github.com/Azure/azure-iot-sdk-node",
239+
"branch": "master"
240+
},
236241
{
237242
"path_to_root": "iot-samples-c",
238243
"url": "https://github.com/Azure/azure-iot-sdk-c",

.openpublishing.redirection.json

Lines changed: 157 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,11 @@
55
"redirect_url": "articles/azure-monitor/insights/container-insights-azure-redhat4-setup.md",
66
"redirect_document_id": false
77
},
8+
{
9+
"source_path": "articles/container-registry/container-registry-tasks-agent-pools.md",
10+
"redirect_url": "/azure/container-registry/container-registry-tasks-overview",
11+
"redirect_document_id": false
12+
},
813
{
914
"source_path": "articles/openshift/tutorial-scale-cluster.md",
1015
"redirect_url": "articles/openshift/tutorial-connect-cluster.md",
@@ -5451,6 +5456,16 @@
54515456
"redirect_url": "/azure/event-grid/template-samples",
54525457
"redirect_document_id": false
54535458
},
5459+
{
5460+
"source_path": "articles/event-grid/premium-basic-tiers.md",
5461+
"redirect_url": "https://azure.microsoft.com/pricing/details/event-grid/",
5462+
"redirect_document_id": false
5463+
},
5464+
{
5465+
"source_path": "articles/event-grid/update-tier.md",
5466+
"redirect_url": "https://azure.microsoft.com/pricing/details/event-grid/",
5467+
"redirect_document_id": false
5468+
},
54545469
{
54555470
"source_path": "articles/azure-resource-manager/resource-manager-samples-powershell-deploy.md",
54565471
"redirect_url": "/azure/azure-resource-manager/templates/deploy-powershell",
@@ -17790,6 +17805,11 @@
1779017805
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-load-with-data-factory",
1779117806
"redirect_document_id": false
1779217807
},
17808+
{
17809+
"source_path": "articles/synapse-analytics/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi.md",
17810+
"redirect_url": "/power-bi/service-azure-sql-data-warehouse-with-direct-connect",
17811+
"redirect_document_id": false
17812+
},
1779317813
{
1779417814
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-load-from-azure-blob-storage-with-data-factory.md",
1779517815
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-load-with-data-factory",
@@ -17927,8 +17947,8 @@
1792717947
},
1792817948
{
1792917949
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi.md",
17930-
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi",
17931-
"redirect_document_id": true
17950+
"redirect_url": "/power-bi/service-azure-sql-data-warehouse-with-direct-connect",
17951+
"redirect_document_id": false
1793217952
},
1793317953
{
1793417954
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-how-to-configure-workload-importance.md",
@@ -28195,6 +28215,16 @@
2819528215
"redirect_url": "/azure/storage/blobs/storage-blob-snapshots",
2819628216
"redirect_document_id": true
2819728217
},
28218+
{
28219+
"source_path": "articles/storage/blobs/storage-blob-snapshots.md",
28220+
"redirect_url": "/azure/storage/blobs/snapshots-overview",
28221+
"redirect_document_id": false
28222+
},
28223+
{
28224+
"source_path": "articles/storage/blobs/storage-blob-soft-delete.md",
28225+
"redirect_url": "/azure/storage/blobs/soft-delete-overview",
28226+
"redirect_document_id": true
28227+
},
2819828228
{
2819928229
"source_path": "articles/storage/storage-blob-storage-tiers.md",
2820028230
"redirect_url": "/azure/storage/blobs/storage-blob-storage-tiers",
@@ -28425,6 +28455,11 @@
2842528455
"redirect_url": "/azure/storage/files/storage-how-to-use-files-linux",
2842628456
"redirect_document_id": true
2842728457
},
28458+
{
28459+
"source_path": "articles/storage/files/storage-how-to-recover-deleted-account.md",
28460+
"redirect_url": "/azure/storage/common/storage-account-create",
28461+
"redirect_document_id": false
28462+
},
2842828463
{
2842928464
"source_path": "articles/storage/storage-https-custom-domain-cdn.md",
2843028465
"redirect_url": "/azure/storage/blobs/storage-https-custom-domain-cdn",
@@ -49074,6 +49109,51 @@
4907449109
"source_path": "articles/azure-cache-for-redis/cache-howto-manage-redis-cache-powershell.md",
4907549110
"redirect_url": "/azure/azure-cache-for-redis/cache-how-to-manage-redis-cache-powershell",
4907649111
"redirect_document_id": false
49112+
},
49113+
{
49114+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-prerequisites.md",
49115+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49116+
"redirect_document_id": false
49117+
},
49118+
{
49119+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-create-offer.md",
49120+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49121+
"redirect_document_id": false
49122+
},
49123+
{
49124+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-offer-settings-tab.md",
49125+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49126+
"redirect_document_id": false
49127+
},
49128+
{
49129+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-technical-info-tab.md",
49130+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49131+
"redirect_document_id": false
49132+
},
49133+
{
49134+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-storefront-details-tab.md",
49135+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49136+
"redirect_document_id": false
49137+
},
49138+
{
49139+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-contacts-tab.md",
49140+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49141+
"redirect_document_id": false
49142+
},
49143+
{
49144+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-create-technical-assets.md",
49145+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49146+
"redirect_document_id": false
49147+
},
49148+
{
49149+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-publish-offer.md",
49150+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49151+
"redirect_document_id": false
49152+
},
49153+
{
49154+
"source_path": "articles/marketplace/cloud-partner-portal/power-bi/cpp-update-existing-offer.md",
49155+
"redirect_url": "/azure/marketplace/partner-center-portal/create-power-bi-app-offer",
49156+
"redirect_document_id": false
4907749157
},
4907849158
{
4907949159
"source_path": "articles/machine-learning/algorithm-module-reference/import-from-azure-blob-storage.md",
@@ -52268,6 +52348,81 @@
5226852348
"source_path": "articles/load-balancer/azure-media-player/components-limitations.md",
5226952349
"redirect_url": "/articles/load-balancer/concepts",
5227052350
"redirect_document_id": false
52351+
},
52352+
{
52353+
"source_path": "articles/visual-studio/vs-storage-webjobs-what-happened.md",
52354+
"redirect_url": "/azure/storage",
52355+
"redirect_document_id": false
52356+
},
52357+
{
52358+
"source_path": "articles/visual-studio/vs-storage-aspnet5-getting-started-blobs.md",
52359+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet-legacy",
52360+
"redirect_document_id": false
52361+
},
52362+
{
52363+
"source_path": "articles/visual-studio/vs-storage-aspnet5-getting-started-tables.md",
52364+
"redirect_url": "/azure/storage/tables/table-storage-overview",
52365+
"redirect_document_id": false
52366+
},
52367+
{
52368+
"source_path": "articles/visual-studio/vs-storage-aspnet-getting-started-queues.md",
52369+
"redirect_url": "/azure/storage/queues/",
52370+
"redirect_document_id": false
52371+
},
52372+
{
52373+
"source_path": "articles/visual-studio/vs-storage-aspnet-what-happened.md",
52374+
"redirect_url": "/azure/storage",
52375+
"redirect_document_id": false
52376+
},
52377+
{
52378+
"source_path": "articles/visual-studio/vs-storage-webjobs-getting-started-tables.md",
52379+
"redirect_url": "/azure/storage/tables/table-storage-overview",
52380+
"redirect_document_id": false
52381+
},
52382+
{
52383+
"source_path": "articles/visual-studio/vs-storage-aspnet-core-getting-started-blobs.md",
52384+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet-legacy",
52385+
"redirect_document_id": false
52386+
},
52387+
{
52388+
"source_path": "articles/visual-studio/vs-storage-aspnet5-getting-started-queues.md",
52389+
"redirect_url": "/azure/storage/queues/",
52390+
"redirect_document_id": false
52391+
},
52392+
{
52393+
"source_path": "articles/vs-azure-tools-storage-emulator-using.md",
52394+
"redirect_url": "/azure/storage/common/storage-use-emulator",
52395+
"redirect_document_id": false
52396+
},
52397+
{
52398+
"source_path": "articles/visual-studio/vs-storage-aspnet-getting-started-blobs.md",
52399+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet-legacy",
52400+
"redirect_document_id": false
52401+
},
52402+
{
52403+
"source_path": "articles/visual-studio/vs-storage-aspnet5-what-happened.md",
52404+
"redirect_url": "/azure/storage",
52405+
"redirect_document_id": false
52406+
},
52407+
{
52408+
"source_path": "articles/visual-studio/vs-storage-aspnet-getting-started-tables.md",
52409+
"redirect_url": "/azure/storage/tables/table-storage-overview",
52410+
"redirect_document_id": false
52411+
},
52412+
{
52413+
"source_path": "articles/visual-studio/vs-storage-webjobs-getting-started-blobs.md",
52414+
"redirect_url": "/azure/storage/blobs/",
52415+
"redirect_document_id": false
52416+
},
52417+
{
52418+
"source_path": "articles/visual-studio/vs-storage-webjobs-getting-started-queues.md",
52419+
"redirect_url": "/azure/storage/queues/",
52420+
"redirect_document_id": false
52421+
},
52422+
{
52423+
"source_path": "articles/visual-studio/vs-storage-cloud-services-what-happened.md",
52424+
"redirect_url": "/azure/storage",
52425+
"redirect_document_id": false
5227152426
}
5227252427
]
5227352428
}

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1198,8 +1198,8 @@ The SCIM spec does not define a SCIM-specific scheme for authentication and auth
11981198
[!NOTE] It's not recommended to leave the token field blank in the Azure AD provisioning configuration custom app UI. The token generated is primarily available for testing purposes.
11991199

12001200
**OAuth authorization code grant flow:** The provisioning service supports the [authorization code grant](https://tools.ietf.org/html/rfc6749#page-24). After submitting your request for publishing your app in the gallery, our team will work with you to collect the following information:
1201-
* Authorization URL: A URL by the client to obtain authorization from the resource owner via user-agent redirection. The user is redirected to this URL to authorize access.
1202-
* Token exchange URL: A URL by the client to exchange an authorization grant for an access token, typically with client authentication.
1201+
* Authorization URL: A URL by the client to obtain authorization from the resource owner via user-agent redirection. The user is redirected to this URL to authorize access. Note that this URL is currently not configurable per tenant.
1202+
* Token exchange URL: A URL by the client to exchange an authorization grant for an access token, typically with client authentication. Note that this URL is currently not configurable per tenant.
12031203
* Client ID: The authorization server issues the registered client a client identifier, which is a unique string representing the registration information provided by the client. The client identifier is not a secret; it is exposed to the resource owner and **must not** be used alone for client authentication.
12041204
* Client secret: The client secret is a secret generated by the authorization server. It should be a unique value known only to the authorization server.
12051205

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 04/13/2020
9+
ms.date: 04/24/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -36,9 +36,9 @@ To complete this article, you need the following resources and privileges:
3636
* An Azure Active Directory tenant associated with your subscription.
3737
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3838
* You need *global administrator* privileges in your Azure AD tenant to enable SMS-based authentication.
39-
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
39+
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD, Office 365, or Microsoft 365 licenses:
4040
* [Azure AD Premium P1 or P2][azuread-licensing]
41-
* [Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing]
41+
* [Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing] or [Office 365 F1][o365-f1] or [F3][o365-f3]
4242
* [Enterprise Mobility + Security (EMS) E3 or E5][ems-licensing] or [Microsoft 365 (M365) E3 or E5][m365-licensing]
4343

4444
## Limitations
@@ -162,3 +162,5 @@ For additional ways to sign in to Azure AD without a password, such as the Micro
162162
[azuread-licensing]: https://azure.microsoft.com/pricing/details/active-directory/
163163
[ems-licensing]: https://www.microsoft.com/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing
164164
[m365-licensing]: https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans
165+
[o365-f1]: https://www.microsoft.com/microsoft-365/business/office-365-f1?market=af
166+
[o365-f3]: https://www.microsoft.com/microsoft-365/business/office-365-f3?activetab=pivot%3aoverviewtab

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -479,7 +479,7 @@ In this example, you create a policy that adds the EmployeeID and TenantCountry
479479
1. To create the policy, run the following command:
480480
481481
``` powershell
482-
New-AzureADPolicy -Definition @('{"ClaimsMappingPolicy":{"Version":1,"IncludeBasicClaimSet":"true", "ClaimsSchema": [{"Source":"user","ID":"employeeid","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name","JwtClaimType":"name"},{"Source":"company","ID":"tenantcountry","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/country","JwtClaimType":"country"}]}}') -DisplayName "ExtraClaimsExample" -Type "ClaimsMappingPolicy"
482+
New-AzureADPolicy -Definition @('{"ClaimsMappingPolicy":{"Version":1,"IncludeBasicClaimSet":"true", "ClaimsSchema": [{"Source":"user","ID":"employeeid","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/employeeid","JwtClaimType":"name"},{"Source":"company","ID":"tenantcountry","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/country","JwtClaimType":"country"}]}}') -DisplayName "ExtraClaimsExample" -Type "ClaimsMappingPolicy"
483483
```
484484
485485
2. To see your new policy, and to get the policy ObjectId, run the following command:

articles/active-directory/develop/app-registration-portal-training-guide.md

Lines changed: 19 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom: aaddev
1818

1919
# The new Azure portal app registration experience
2020

21-
There are many improvements in the new [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience in the Azure portal. If you're more familiar with the Application registration portal (apps.dev.microsoft.com) experience for registering or managing converged applications, referred to as the old experience, this training guide will get you started using the new experience.
21+
There are many improvements in the new [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience in the Azure portal. If you're more familiar with the Application registration portal (apps.dev.microsoft.com) for registering or managing applications, referred to here as the "old experience," this guide will get you started using the new experience.
2222

2323
## What's not changing?
2424

@@ -41,8 +41,8 @@ There are many improvements in the new [App registrations](https://go.microsoft.
4141

4242
## Key changes
4343

44-
- In the old experience, apps were by default registered as converged
45-
apps supporting all organizational accounts (multitenant) as well as
44+
- In the old experience, apps were by default registered as *converged*
45+
apps - apps that support all organizational accounts (multitenant) as well as
4646
personal Microsoft accounts. This could not be modified through the
4747
old experience, making it difficult to create apps that supported
4848
only organizational accounts (either multitenant or single tenant).
@@ -75,10 +75,10 @@ There are many improvements in the new [App registrations](https://go.microsoft.
7575

7676
## New app registration
7777

78-
In the old experience, to register a converged app you were only
78+
In the old experience, to register an app you were only
7979
required to provide a Name. The apps that were created were registered
80-
as converged apps supporting all organizational directory (multitenant)
81-
as well as personal Microsoft accounts. This could not be modified through the old experience, making it difficult to create apps that supported only organizational accounts (either multitenant or single tenant). [Learn more about supported account types](v2-supported-account-types.md)
80+
as *converged* apps - apps supporting all organizational directories (multitenant)
81+
as well as personal Microsoft accounts. This could not be modified through the old experience, making it difficult to create apps that supported only organizational accounts (either single- or multi-tenant). [Learn more about supported account types](v2-supported-account-types.md)
8282

8383
In the new experience, you must provide a Name for the app and choose
8484
the Supported account types. You can optionally provide a redirect URI.
@@ -89,25 +89,19 @@ quickstart](quickstart-register-app.md).
8989

9090
## App management page
9191

92-
The old experience had a single app management page for converged apps
92+
The old experience had a single app management page for apps
9393
with the following sections: Properties, Application secrets, Platforms,
9494
Owners, Microsoft Graph Permissions, Profile, and Advanced Options.
9595

96-
The new experience in the Azure portal represents these features into
96+
The new experience in the Azure portal presents these features in
9797
separate pages. Here's where you can find the equivalent functionality:
9898

99-
- Properties - Name and Application ID is on the Overview page.
100-
101-
- Application Secrets is on the Certificates & secrets page
102-
103-
- Platforms configuration is on the Authentication page
104-
105-
- Microsoft Graph permissions is on the API permissions page along
106-
with other permissions
107-
108-
- Profile is on Branding page
109-
110-
- Advanced option - Live SDK support is on the Authentication page.
99+
- Properties - Name and Application ID is on the Overview page.
100+
- Application Secrets is on the Certificates & secrets page
101+
- Platforms configuration is on the Authentication page
102+
- Microsoft Graph permissions is on the API permissions page along with other permissions
103+
- Profile is on Branding page
104+
- Advanced option - Live SDK support is on the Authentication page.
111105

112106
## Application secrets/Certificates & secrets
113107

@@ -179,7 +173,7 @@ the manifest editor or the API, or didn't exist.
179173
- Publisher domain (which is displayed to users on the [application\'s
180174
consent
181175
prompt](application-consent-experience.md))
182-
can be found on the Branding blade page. For more info on how to
176+
can be found on the Branding page. For more info on how to
183177
configure a publisher domain, see [this
184178
how-to](howto-configure-publisher-domain.md).
185179

@@ -199,3 +193,7 @@ The new experience has the following limitations:
199193

200194
> [!NOTE]
201195
> If you're a personal Microsoft account user in Azure AD tenant, and the tenant admin has restricted access to Azure portal, you may get an access denied. However, if you come through the shortcut by typing App registrations in the search bar or pinning it, you'll be able to access the new experience.
196+
197+
## Next steps
198+
199+
To get started with the new app registration experience, see [Quickstart: Register an application with the Microsoft identity platform](quickstart-register-app.md).

0 commit comments

Comments
 (0)