Skip to content

Commit b03556e

Browse files
committed
merge conflict; replica note
2 parents a209b4f + 0832180 commit b03556e

File tree

328 files changed

+6104
-7536
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

328 files changed

+6104
-7536
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,11 @@
233233
"url": "https://github.com/Azure-Samples/azure-iot-samples-node",
234234
"branch": "master"
235235
},
236+
{
237+
"path_to_root": "azure-iot-sdk-node",
238+
"url": "https://github.com/Azure/azure-iot-sdk-node",
239+
"branch": "master"
240+
},
236241
{
237242
"path_to_root": "iot-samples-c",
238243
"url": "https://github.com/Azure/azure-iot-sdk-c",

.openpublishing.redirection.json

Lines changed: 99 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,11 @@
55
"redirect_url": "articles/azure-monitor/insights/container-insights-azure-redhat4-setup.md",
66
"redirect_document_id": false
77
},
8+
{
9+
"source_path": "articles/container-registry/container-registry-tasks-agent-pools.md",
10+
"redirect_url": "/azure/container-registry/container-registry-tasks-overview",
11+
"redirect_document_id": false
12+
},
813
{
914
"source_path": "articles/openshift/tutorial-scale-cluster.md",
1015
"redirect_url": "articles/openshift/tutorial-connect-cluster.md",
@@ -17800,6 +17805,11 @@
1780017805
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-load-with-data-factory",
1780117806
"redirect_document_id": false
1780217807
},
17808+
{
17809+
"source_path": "articles/synapse-analytics/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi.md",
17810+
"redirect_url": "/power-bi/service-azure-sql-data-warehouse-with-direct-connect",
17811+
"redirect_document_id": false
17812+
},
1780317813
{
1780417814
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-load-from-azure-blob-storage-with-data-factory.md",
1780517815
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-load-with-data-factory",
@@ -17937,8 +17947,8 @@
1793717947
},
1793817948
{
1793917949
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi.md",
17940-
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-get-started-visualize-with-power-bi",
17941-
"redirect_document_id": true
17950+
"redirect_url": "/power-bi/service-azure-sql-data-warehouse-with-direct-connect",
17951+
"redirect_document_id": false
1794217952
},
1794317953
{
1794417954
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-how-to-configure-workload-importance.md",
@@ -28205,6 +28215,16 @@
2820528215
"redirect_url": "/azure/storage/blobs/storage-blob-snapshots",
2820628216
"redirect_document_id": true
2820728217
},
28218+
{
28219+
"source_path": "articles/storage/blobs/storage-blob-snapshots.md",
28220+
"redirect_url": "/azure/storage/blobs/snapshots-overview",
28221+
"redirect_document_id": false
28222+
},
28223+
{
28224+
"source_path": "articles/storage/blobs/storage-blob-soft-delete.md",
28225+
"redirect_url": "/azure/storage/blobs/soft-delete-overview",
28226+
"redirect_document_id": true
28227+
},
2820828228
{
2820928229
"source_path": "articles/storage/storage-blob-storage-tiers.md",
2821028230
"redirect_url": "/azure/storage/blobs/storage-blob-storage-tiers",
@@ -28435,6 +28455,11 @@
2843528455
"redirect_url": "/azure/storage/files/storage-how-to-use-files-linux",
2843628456
"redirect_document_id": true
2843728457
},
28458+
{
28459+
"source_path": "articles/storage/files/storage-how-to-recover-deleted-account.md",
28460+
"redirect_url": "/azure/storage/common/storage-account-create",
28461+
"redirect_document_id": false
28462+
},
2843828463
{
2843928464
"source_path": "articles/storage/storage-https-custom-domain-cdn.md",
2844028465
"redirect_url": "/azure/storage/blobs/storage-https-custom-domain-cdn",
@@ -52325,10 +52350,79 @@
5232552350
"redirect_document_id": false
5232652351
},
5232752352
{
52328-
"source_path": "articles/virtual-machines/troubleshooting/linux-virtual-machine-cannot-start-fstab-errors.md",
52329-
"redirect_url": "/articles/virtual-machines/troubleshooting",
52353+
"source_path": "articles/visual-studio/vs-storage-webjobs-what-happened.md",
52354+
"redirect_url": "/azure/storage",
52355+
"redirect_document_id": false
52356+
},
52357+
{
52358+
"source_path": "articles/visual-studio/vs-storage-aspnet5-getting-started-blobs.md",
52359+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet-legacy",
52360+
"redirect_document_id": false
52361+
},
52362+
{
52363+
"source_path": "articles/visual-studio/vs-storage-aspnet5-getting-started-tables.md",
52364+
"redirect_url": "/azure/storage/tables/table-storage-overview",
52365+
"redirect_document_id": false
52366+
},
52367+
{
52368+
"source_path": "articles/visual-studio/vs-storage-aspnet-getting-started-queues.md",
52369+
"redirect_url": "/azure/storage/queues/",
52370+
"redirect_document_id": false
52371+
},
52372+
{
52373+
"source_path": "articles/visual-studio/vs-storage-aspnet-what-happened.md",
52374+
"redirect_url": "/azure/storage",
52375+
"redirect_document_id": false
52376+
},
52377+
{
52378+
"source_path": "articles/visual-studio/vs-storage-webjobs-getting-started-tables.md",
52379+
"redirect_url": "/azure/storage/tables/table-storage-overview",
52380+
"redirect_document_id": false
52381+
},
52382+
{
52383+
"source_path": "articles/visual-studio/vs-storage-aspnet-core-getting-started-blobs.md",
52384+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet-legacy",
52385+
"redirect_document_id": false
52386+
},
52387+
{
52388+
"source_path": "articles/visual-studio/vs-storage-aspnet5-getting-started-queues.md",
52389+
"redirect_url": "/azure/storage/queues/",
52390+
"redirect_document_id": false
52391+
},
52392+
{
52393+
"source_path": "articles/vs-azure-tools-storage-emulator-using.md",
52394+
"redirect_url": "/azure/storage/common/storage-use-emulator",
52395+
"redirect_document_id": false
52396+
},
52397+
{
52398+
"source_path": "articles/visual-studio/vs-storage-aspnet-getting-started-blobs.md",
52399+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet-legacy",
52400+
"redirect_document_id": false
52401+
},
52402+
{
52403+
"source_path": "articles/visual-studio/vs-storage-aspnet5-what-happened.md",
52404+
"redirect_url": "/azure/storage",
52405+
"redirect_document_id": false
52406+
},
52407+
{
52408+
"source_path": "articles/visual-studio/vs-storage-aspnet-getting-started-tables.md",
52409+
"redirect_url": "/azure/storage/tables/table-storage-overview",
52410+
"redirect_document_id": false
52411+
},
52412+
{
52413+
"source_path": "articles/visual-studio/vs-storage-webjobs-getting-started-blobs.md",
52414+
"redirect_url": "/azure/storage/blobs/",
52415+
"redirect_document_id": false
52416+
},
52417+
{
52418+
"source_path": "articles/visual-studio/vs-storage-webjobs-getting-started-queues.md",
52419+
"redirect_url": "/azure/storage/queues/",
52420+
"redirect_document_id": false
52421+
},
52422+
{
52423+
"source_path": "articles/visual-studio/vs-storage-cloud-services-what-happened.md",
52424+
"redirect_url": "/azure/storage",
5233052425
"redirect_document_id": false
5233152426
}
52332-
5233352427
]
5233452428
}

CODEOWNERS

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,12 @@
66
articles/**/policy-samples.md @DCtheGeek
77
includes/policy/ @DCtheGeek
88

9+
# Azure Active Directory
10+
11+
articles/active-directory-b2c/ @msmimart @yoelhor
12+
articles/active-directory/app-provisioning/ @CelesteDG
13+
articles/active-directory/manage-apps/ @CelesteDG
14+
915
# Cognitive Services
1016
articles/cognitive-services/ @diberry @erhopf @aahill @ievangelist @patrickfarley @nitinme
1117

articles/active-directory-b2c/identity-provider-amazon-custom.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 10/05/2018
12+
ms.date: 05/04/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -25,17 +25,16 @@ This article shows you how to enable sign-in for users from an Amazon account by
2525
- Complete the steps in [Get started with custom policies](custom-policy-get-started.md).
2626
- If you don't already have an Amazon account, create one at [https://www.amazon.com/](https://www.amazon.com/).
2727

28-
## Register the application
28+
## Create an app in the Amazon developer console
2929

30-
To enable sign-in for users from an Amazon account, you need to create an Amazon application.
30+
To use an Amazon account as a federated identity provider in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your [Amazon Developer Services and Technologies](https://developer.amazon.com). If you don't already have an Amazon account, you can sign up at [https://www.amazon.com/](https://www.amazon.com/).
3131

32-
1. Sign in to the [Amazon Developer Center](https://login.amazon.com/) with your Amazon account credentials.
33-
2. If you have not already done so, click **Sign Up**, follow the developer registration steps, and accept the policy.
34-
3. Select **Register new application**.
35-
4. Enter a **Name**, **Description**, and **Privacy Notice URL**, and then click **Save**. The privacy notice is a page that you manage that provides privacy information to users.
36-
5. In the **Web Settings** section, copy the values of **Client ID**. Select **Show Secret** to get the client secret and then copy it. You need both of them to configure an Amazon account as an identity provider in your tenant. **Client Secret** is an important security credential.
37-
6. In the **Web Settings** section, select **Edit**, and then enter `https://your-tenant-name.b2clogin.com` in **Allowed JavaScript Origins** and `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Allowed Return URLs**. Replace `your-tenant-name` with the name of your tenant. Use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C.
38-
7. Click **Save**.
32+
> [!NOTE]
33+
> Use the following URLs in **step 8** below, replacing `your-tenant-name` with the name of your tenant. When entering your tenant name, use all lowercase letters, even if the tenant is defined with uppercase letters in Azure AD B2C.
34+
> - For **Allowed Origins**, enter `https://your-tenant-name.b2clogin.com`
35+
> - For **Allowed Return URLs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`
36+
37+
[!INCLUDE [identity-provider-amazon-idp-register.md](../../includes/identity-provider-amazon-idp-register.md)]
3938

4039
## Create a policy key
4140

articles/active-directory-b2c/identity-provider-amazon.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,24 +9,23 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 08/08/2019
12+
ms.date: 04/05/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
1616

1717
# Set up sign-up and sign-in with an Amazon account using Azure Active Directory B2C
1818

19-
## Create an Amazon application
19+
## Create an app in the Amazon developer console
2020

21-
To use an Amazon account as an [identity provider](authorization-code-flow.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your tenant that represents it. If you don't already have an Amazon account you can sign up at [https://www.amazon.com/](https://www.amazon.com/).
21+
To use an Amazon account as a federated identity provider in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your [Amazon Developer Services and Technologies](https://developer.amazon.com). If you don't already have an Amazon account, you can sign up at [https://www.amazon.com/](https://www.amazon.com/).
2222

23-
1. Sign in to the [Amazon Developer Center](https://login.amazon.com/) with your Amazon account credentials.
24-
1. If you have not already done so, click **Sign Up**, follow the developer registration steps, and accept the policy.
25-
1. Select **Register new application**.
26-
1. Enter a **Name**, **Description**, and **Privacy Notice URL**, and then click **Save**. The privacy notice is a page that you manage that provides privacy information to users.
27-
1. In the **Web Settings** section, copy the values of **Client ID**. Select **Show Secret** to get the client secret and then copy it. You need both of them to configure an Amazon account as an identity provider in your tenant. **Client Secret** is an important security credential.
28-
1. In the **Web Settings** section, select **Edit**, and then enter `https://your-tenant-name.b2clogin.com` in **Allowed JavaScript Origins** and `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Allowed Return URLs**. Replace `your-tenant-name` with the name of your tenant. You need to use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C.
29-
1. Click **Save**.
23+
> [!NOTE]
24+
> Use the following URLs in **step 8** below, replacing `your-tenant-name` with the name of your tenant. When entering your tenant name, use all lowercase letters, even if the tenant is defined with uppercase letters in Azure AD B2C.
25+
> - For **Allowed Origins**, enter `https://your-tenant-name.b2clogin.com`
26+
> - For **Allowed Return URLs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`
27+
28+
[!INCLUDE [identity-provider-amazon-idp-register.md](../../includes/identity-provider-amazon-idp-register.md)]
3029

3130
## Configure an Amazon account as an identity provider
3231

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 03/26/2020
11+
ms.date: 05/02/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -267,6 +267,7 @@ The following are the IDs for a [one-time password technical profile](one-time-p
267267
|UserMessageIfSessionDoesNotExist |One time password verification session has expired |
268268
|UserMessageIfSessionConflict |One time password verification session has conflict |
269269
|UserMessageIfInvalidCode |One time password provided for verification is incorrect |
270+
|UserMessageIfVerificationFailedRetryAllowed |That code is incorrect. Please try again. |
270271

271272
### Example
272273

@@ -277,6 +278,7 @@ The following are the IDs for a [one-time password technical profile](one-time-p
277278
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfMaxRetryAttempted">You have exceed the number of retries allowed.</LocalizedString>
278279
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfInvalidCode">You have entered the wrong code.</LocalizedString>
279280
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</LocalizedString>
281+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfVerificationFailedRetryAllowed">That code is incorrect. Please try again.</LocalizedString>
280282
</LocalizedStrings>
281283
</LocalizedResources>
282284
```

articles/active-directory-b2c/one-time-password-technical-profile.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,7 @@ The following metadata can be used to configure the error messages displayed upo
140140
| UserMessageIfSessionDoesNotExist | No | The message to display to the user if the code verification session has expired. It is either the code has expired or the code has never been generated for a given identifier. |
141141
| UserMessageIfMaxRetryAttempted | No | The message to display to the user if they've exceeded the maximum allowed verification attempts. |
142142
| UserMessageIfInvalidCode | No | The message to display to the user if they've provided an invalid code. |
143+
| UserMessageIfVerificationFailedRetryAllowed | No | The message to display to the user if they've provided an invalid code, and user is allowed to provide the correct code. |
143144
|UserMessageIfSessionConflict|No| The message to display to the user if the code cannot be verified.|
144145

145146
### Example

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 04/13/2020
9+
ms.date: 04/24/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -36,9 +36,9 @@ To complete this article, you need the following resources and privileges:
3636
* An Azure Active Directory tenant associated with your subscription.
3737
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3838
* You need *global administrator* privileges in your Azure AD tenant to enable SMS-based authentication.
39-
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
39+
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD, Office 365, or Microsoft 365 licenses:
4040
* [Azure AD Premium P1 or P2][azuread-licensing]
41-
* [Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing]
41+
* [Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing] or [Office 365 F1][o365-f1] or [F3][o365-f3]
4242
* [Enterprise Mobility + Security (EMS) E3 or E5][ems-licensing] or [Microsoft 365 (M365) E3 or E5][m365-licensing]
4343

4444
## Limitations
@@ -162,3 +162,5 @@ For additional ways to sign in to Azure AD without a password, such as the Micro
162162
[azuread-licensing]: https://azure.microsoft.com/pricing/details/active-directory/
163163
[ems-licensing]: https://www.microsoft.com/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing
164164
[m365-licensing]: https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans
165+
[o365-f1]: https://www.microsoft.com/microsoft-365/business/office-365-f1?market=af
166+
[o365-f3]: https://www.microsoft.com/microsoft-365/business/office-365-f3?activetab=pivot%3aoverviewtab

articles/active-directory/azuread-dev/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@
158158
- name: Use the Microsoft Graph API
159159
href: ../develop/microsoft-graph-intro.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
160160
- name: AD FS for developers
161-
href: https://docs.microsoft.com/windows-server/identity/ad-fs/overview/ad-fs-scenarios-for-developers
161+
href: https://docs.microsoft.com/windows-server/identity/ad-fs/ad-fs-overview
162162
- name: References
163163
items:
164164
- name: Authentication libraries

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -479,7 +479,7 @@ In this example, you create a policy that adds the EmployeeID and TenantCountry
479479
1. To create the policy, run the following command:
480480
481481
``` powershell
482-
New-AzureADPolicy -Definition @('{"ClaimsMappingPolicy":{"Version":1,"IncludeBasicClaimSet":"true", "ClaimsSchema": [{"Source":"user","ID":"employeeid","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name","JwtClaimType":"name"},{"Source":"company","ID":"tenantcountry","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/country","JwtClaimType":"country"}]}}') -DisplayName "ExtraClaimsExample" -Type "ClaimsMappingPolicy"
482+
New-AzureADPolicy -Definition @('{"ClaimsMappingPolicy":{"Version":1,"IncludeBasicClaimSet":"true", "ClaimsSchema": [{"Source":"user","ID":"employeeid","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/employeeid","JwtClaimType":"name"},{"Source":"company","ID":"tenantcountry","SamlClaimType":"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/country","JwtClaimType":"country"}]}}') -DisplayName "ExtraClaimsExample" -Type "ClaimsMappingPolicy"
483483
```
484484
485485
2. To see your new policy, and to get the policy ObjectId, run the following command:

0 commit comments

Comments
 (0)