Skip to content

Commit ae8b23a

Browse files
authored
Merge pull request #95726 from MicrosoftDocs/master
11/12 PM Publish
2 parents 39da2d9 + ca8c42d commit ae8b23a

File tree

322 files changed

+2020
-1595
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

322 files changed

+2020
-1595
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -520,6 +520,11 @@
520520
"redirect_url": "/azure/machine-learning",
521521
"redirect_document_id": false
522522
},
523+
{
524+
"source_path": "articles/cognitive-services/LUIS/luis-how-to-add-example-utterances.md",
525+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities",
526+
"redirect_document_id": false
527+
},
523528
{
524529
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-prebuilt-intents-entities.md",
525530
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-machine-learned-entity",

articles/active-directory/b2b/add-users-administrator.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 04/11/2019
10+
ms.date: 11/12/2019
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -44,14 +44,18 @@ To add B2B collaboration users to the directory, follow these steps:
4444
> [!NOTE]
4545
> The **New guest user** option is also available on the **Organizational relationships** page. In **Azure Active Directory**, under **Manage**, select **Organizational relationships**.
4646
47-
5. Under **User name**, enter the email address of the external user. Optionally, include a welcome message. For example:
48-
49-
![Shows where New guest user is in the UI](./media/add-users-administrator/InviteGuest.png)
47+
5. On the **New user** page, select **Invite user** and then add the guest user's information.
5048

5149
> [!NOTE]
5250
> Group email addresses aren’t supported; enter the email address for an individual. Also, some email providers allow users to add a plus symbol (+) and additional text to their email addresses to help with things like inbox filtering. However, Azure AD doesn’t currently support plus symbols in email addresses. To avoid delivery issues, omit the plus symbol and any characters following it up to the @ symbol.
5351
54-
6. Select **Invite** to automatically send the invitation to the guest user.
52+
- **Name.** The first and last name of the guest user.
53+
- **Email address (required)**. The email address of the guest user.
54+
- **Personal message (optional)** Include a personal welcome message to the guest user.
55+
- **Groups**: You can add the guest user to one or more existing groups, or you can do it later.
56+
- **Directory role**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role.
57+
58+
7. Select **Invite** to automatically send the invitation to the guest user.
5559

5660
After you send the invitation, the user account is automatically added to the directory as a guest.
5761

articles/active-directory/b2b/b2b-quickstart-add-guest-users-portal.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: quickstart
9-
ms.date: 07/02/2018
9+
ms.date: 11/12/2019
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -44,9 +44,13 @@ To complete the scenario in this tutorial, you need:
4444

4545
![Screenshot showing where to select the New guest user option](media/quickstart-add-users-portal/quickstart-users-portal-user-3.png)
4646

47-
5. Under **User name**, enter the email address of the external user. Under **Include a personal message with the invitation**, type a welcome message.
47+
5. On the **New user** page, select **Invite user** and then add the guest user's information.
4848

49-
![Screenshot showing where to enter the guest user invitation message](media/quickstart-add-users-portal/quickstart-users-portal-user-4.png)
49+
- **Name.** The first and last name of the guest user.
50+
- **Email address (required)**. The email address of the guest user.
51+
- **Personal message (optional)** Include a personal welcome message to the guest user.
52+
- **Groups**: You can add the guest user to one or more existing groups, or you can do it later.
53+
- **Directory role**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role.
5054

5155
6. Select **Invite** to automatically send the invitation to the guest user. A notification appears in the upper right with the message **Successfully invited user**.
5256
7. After you send the invitation, the user account is automatically added to the directory as a guest.

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -392,9 +392,9 @@
392392
href: active-directory-configurable-token-lifetimes.md
393393
- name: Application configuration
394394
items:
395-
- name: Azure portal app registrations training guide (legacy)
395+
- name: Transitioning from App registrations (Legacy) to the new App registrations experience in the Azure portal
396396
href: app-registrations-training-guide-for-app-registrations-legacy-users.md
397-
- name: Application Registration Portal app registration guide
397+
- name: Transitioning from Application Registration Portal to the new App registrations experience in the Azure portal
398398
href: app-registration-portal-training-guide.md
399399
- name: Convert a single-tenant app to a multi-tenant app
400400
href: howto-convert-app-to-be-multi-tenant.md

articles/active-directory/develop/app-registration-portal-training-guide.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
2-
title: Application Registration Portal app registrations training guide - Microsoft identity platform | Azure
3-
description: App registrations in the Azure portal for users familiar with Application registration portal
2+
title: Transitioning from Application Registration Portal to the new App registrations experience in the Azure portal
3+
titleSuffix: Microsoft identity platform
4+
description: An introduction to the new App registration experience in the Azure portal
45
services: active-directory
56
documentationcenter: ''
67
author: archieag
@@ -20,7 +21,7 @@ ms.custom: aaddev
2021
ms.collection: M365-identity-device-management
2122
---
2223

23-
# Training guide: Using App registrations in the Azure portal instead of Application Registration Portal
24+
# Transitioning from Application Registration Portal to the new App registrations experience in the Azure portal
2425

2526
There are many improvements in the new [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience in the Azure portal. If you're more familiar with the Application registration portal (apps.dev.microsoft.com) experience for registering or managing converged applications, referred to as the old experience, this training guide will get you started using the new experience.
2627

@@ -113,15 +114,15 @@ separate pages. Here's where you can find the equivalent functionality:
113114

114115
- Advanced option - Live SDK support is on the Authentication page.
115116

116-
## Application Secrets/Certificates & secrets
117+
## Application secrets/Certificates & secrets
117118

118119
In the new experience, **Application secrets** have been renamed to
119120
**Certificates & secrets**. In addition, **Public keys** are referred to as
120121
**Certificates** and **Passwords** are referred to as **Client secrets**. We
121122
chose to not bring this functionality along in the new experience for
122123
security reasons, hence, you can no longer generate a new key pair.
123124

124-
## Platforms/Authentication - Reply URLs/Redirect URIs
125+
## Platforms/Authentication: Reply URLs/redirect URIs
125126
In the old experience, an app had Platforms section for Web, native, and
126127
Web API to configure Redirect URLs, Logout URL and Implicit flow.
127128

@@ -138,7 +139,7 @@ Web APIs are configured in Expose an API page.
138139
configure settings for your application based on the platform or device
139140
that you want to target. [Learn more](quickstart-configure-app-access-web-apis.md#configure-platform-settings-for-your-application)
140141

141-
## Microsoft Graph Permissions/API permissions
142+
## Microsoft Graph permissions/API permissions
142143

143144
- When selecting an API in the old experience, you could choose from
144145
Microsoft Graph APIs only. In the new experience, you can choose
@@ -172,7 +173,7 @@ the manifest editor or the API, or didn't exist.
172173

173174
- Implicit grant flow (oauth2AllowImplicitFlow) can be found on the
174175
Authentication page. Unlike the old experience, you can enable
175-
access tokens or id tokens, or both.
176+
access tokens or ID tokens, or both.
176177

177178
- Scopes defined by this API (oauth2Permissions) and Authorized client
178179
applications (preAuthorizedApplications) can be configured through
@@ -202,4 +203,4 @@ The new experience has the following limitations:
202203
between Azure AD single-tenant and multi-tenant.
203204

204205
> [!NOTE]
205-
> If you're a personal Microsoft account user in Azure AD tenant, and the tenant admin has restricted access to Azure portal, you may get an access denied. However, if you come through the shortcut by typing App registrations in the search bar or pinning it, you'll be able to access the new experience.
206+
> If you're a personal Microsoft account user in Azure AD tenant, and the tenant admin has restricted access to Azure portal, you may get an access denied. However, if you come through the shortcut by typing App registrations in the search bar or pinning it, you'll be able to access the new experience.

articles/active-directory/develop/howto-configure-publisher-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.custom: aaddev
2121
ms.collection: M365-identity-device-management
2222
---
2323

24-
# How to: Configure an application's publisher domain (Preview)
24+
# How to: Configure an application's publisher domain
2525

2626
An application’s publisher domain is displayed to users on the [application’s consent prompt](application-consent-experience.md) to let users know where their information is being sent. Multi-tenant applications that are registered after May 21, 2019 that don't have a publisher domain show up as **unverified**. Multi-tenant applications are applications that support accounts outside of a single organizational directory; for example, support all Azure AD accounts, or support all Azure AD accounts and personal Microsoft accounts.
2727

articles/active-directory/fundamentals/add-users-azure-active-directory.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: conceptual
12-
ms.date: 11/11/2019
12+
ms.date: 11/12/2019
1313
ms.author: ajburnle
1414
ms.reviewer: jeffsta
1515
ms.custom: "it-pro, seodec18"
@@ -40,20 +40,28 @@ You can create a new user using the Azure Active Directory portal.
4040

4141
- **User name (required)**: The user name of the new user. For example, [email protected].
4242

43-
The domain part of the user name must use either the initial default domain name, <_yourdomainname_>.onmicrosoft.com, or a custom domain name in your Azure AD organization such as contoso.com. For more information about how to create a custom domain name, see [How to add a custom domain name to Azure Active Directory](add-custom-domain.md).
43+
The domain part of the user name must use either the initial default domain name, <_yourdomainname_>.onmicrosoft.com, or a custom domain name in your Azure AD organization such as contoso.com. You can select from the list of available domains. You can also filter the list by typing a portion of the domain name. For more information about how to create a custom domain name, see [How to add a custom domain name to Azure Active Directory](add-custom-domain.md).
4444

4545
- **Groups**: You can add the user to one or more existing groups, or you can do it later. For more information about adding users to groups, see [How to create a basic group and add members](active-directory-groups-create-azure-portal.md).
4646

4747
- **Directory role**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role. You can assign the user to be a Global administrator or one or more of the limited administrator roles in Azure AD. For more information about assigning roles, see [How to assign roles to users](active-directory-users-assign-role-azure-portal.md).
4848

4949
- **Job info**: You can add more information about the user here, or do it later. For more information about adding user info, see [How to add or change user profile information](active-directory-users-profile-azure-portal.md).
5050

51-
4. Copy the auto-generated password provided in the **Password** box. You'll need to give this password to the user for the initial sign-in process.
51+
4. Copy the auto-generated password provided in the **Password** box. You can choose to use the auto-generated password provided in the Password box or create a custom password. You'll need to give this password to the user for the initial sign-in process.
5252

5353
5. Select **Create**.
5454

5555
The user is created and added to your Azure AD organization.
5656

57+
## Add a new guest user
58+
59+
You can also invite new guest user to collaborate with your organization by selecting **Invite user** from the **New user** page. If your organization's external collaboration settings are configured such that you're allowed to invite guests, the user will be emailed an invitation they must accept in order to begin collaborating. For more information about inviting B2B collaboration users, see [Invite B2B users to Azure Active Directory](../b2b/add-users-administrator.md)
60+
61+
## Add a consumer user
62+
63+
There might be scenarios in which you want to manually create consumer accounts in your Azure Active Directory B2C (Azure AD B2C) directory. For more information about creating consumer accounts, see [Create and delete consumer users in Azure AD B2C](../../active-directory-b2c/manage-users-portal.md).
64+
5765
## Add a new user within a hybrid environment
5866

5967
If you have an environment with both Azure Active Directory (cloud) and Windows Server Active Directory (on-premises), you can add new users by syncing the existing user account data. For more information about hybrid environments and users, see [Integrate your on-premises directories with Azure Active Directory](../hybrid/whatis-hybrid-identity.md).

articles/active-directory/manage-apps/application-proxy-configure-cookie-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ Azure Active Directory (Azure AD) has access and session cookies for accessing o
2929
| Use Persistent Cookie | **No** | **Yes** allows Application Proxy to set its access cookies to not expire when the web browser is closed. The persistence lasts until the access token expires, or until the user manually deletes the persistent cookies. | Use **No** because of the security risk associated with keeping users authenticated.<br></br><br></br>We suggest only using **Yes** for older applications that can't share cookies between processes. It's better to update your application to handle sharing cookies between processes instead of using persistent cookies. For example, you might need persistent cookies to allow a user to open Office documents in explorer view from a SharePoint site. Without persistent cookies, this operation might fail if the access cookies aren't shared between the browser, the explorer process, and the Office process. |
3030

3131
## SameSite Cookies
32-
Starting in version [Chrome 80](https://support.google.com/chrome/a/answer/7679408?hl=en) and eventually in browsers leveraging [Chromium](https://blog.chromium.org/2019/10/developers-get-ready-for-new.html), cookies that do not specify the [SameSite](https://web.dev/samesite-cookies-explained) attribute will be treated as if they were set to **SameSite=Lax**. The SameSite attribute declares how cookies should be restricted to a same-site context. When set to Lax, the cookie is only to sent to same-site requests or top-level navigation. However, Application Proxy requires these cookies to be preserved in the third-party context in order to keep users properly signed in during their session. Due to this, we are making updates to the Application Proxy access and session cookies to avoid adverse impact from this change. The updates include:
32+
Starting in version Chrome 80 and eventually in browsers leveraging Chromium, cookies that do not specify the [SameSite](https://web.dev/samesite-cookies-explained) attribute will be treated as if they were set to **SameSite=Lax**. The SameSite attribute declares how cookies should be restricted to a same-site context. When set to Lax, the cookie is only to sent to same-site requests or top-level navigation. However, Application Proxy requires these cookies to be preserved in the third-party context in order to keep users properly signed in during their session. Due to this, we are making updates to the Application Proxy access and session cookies to avoid adverse impact from this change. The updates include:
3333

34-
* Setting the **SameSite** attribute to **None**- This allows Application Proxy access and sessions cookies to be properly sent in the third-party context.
34+
* Setting the **SameSite** attribute to **None**. This allows Application Proxy access and sessions cookies to be properly sent in the third-party context.
3535
* Setting the **Use Secure Cookie** setting to use **Yes** as the default. Chrome also requires the cookies to specify the Secure flag or it will be rejected. This change will apply to all existing applications published through Application Proxy. Note that Application Proxy access cookies have always been set to Secure and only transmitted over HTTPS. This change will only apply to the session cookies.
3636

3737
These changes to Application Proxy cookies will roll out over the course of the next several weeks before the Chrome 80 release date.

articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Active Directory activity logs in Azure Monitor | Microsoft Docs
33
description: Introduction to Azure Active Directory activity logs in Azure Monitor
44
services: active-directory
55
documentationcenter: ''
6-
author: cawrites
6+
author: MarkusVi
77
manager: daveba
88
editor: ''
99

@@ -15,7 +15,7 @@ ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
1717
ms.date: 04/22/2019
18-
ms.author: chadam
18+
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

2121
ms.collection: M365-identity-device-management

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Audit activity reports in the Azure Active Directory portal | Microsoft D
44
description: Introduction to the audit activity reports in the Azure Active Directory portal
55
services: active-directory
66
documentationcenter: ''
7-
author: cawrites
7+
author: MarkusVi
88
manager: daveba
99
editor: ''
1010

@@ -16,7 +16,7 @@ ms.tgt_pltfrm: na
1616
ms.workload: identity
1717
ms.subservice: report-monitor
1818
ms.date: 07/17/2019
19-
ms.author: chadam
19+
ms.author: markvi
2020
ms.reviewer: dhanyahk
2121

2222
ms.collection: M365-identity-device-management

0 commit comments

Comments
 (0)