Skip to content

Commit b128491

Browse files
committed
merge from master
2 parents 248cc5f + 16054b8 commit b128491

File tree

2,072 files changed

+30333
-19796
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,072 files changed

+30333
-19796
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,2 @@
11
{:allowed-branchname-matches ["^master$" "^release..*"]
2-
:allowed-filename-matches ["articles" "includes"]
3-
4-
:template-header
5-
"
6-
## Acrolinx Scorecards
7-
8-
**A minimum Acrolinx score of 80 is required.**
9-
10-
Click the scorecard links for each article to review the Acrolinx feedback on grammar, spelling, punctuation, writing style, and terminology:
11-
12-
| Article | Score | Issues | Scorecard |
13-
| ------- | ----- | ------ | --------- |
14-
"
15-
16-
;; do not remove the spaces at the end of lines! That is markdown for
17-
;; linebreak
18-
:template-change
19-
"| **${github/filename}** | ${acrolinx/qualityscore} | ${acrolinx/flags/issues} | [link](${acrolinx/scorecard}) |
20-
"
21-
22-
:template-footer
23-
"
24-
**More info about Acrolinx**
25-
26-
- [Install Acrolinx locally for VSCode](https://review.docs.microsoft.com/en-us/help/contribute/contribute-acrolinx-vscode)
27-
- [Report false positives or issues](https://aka.ms/acrolinxbug)
28-
29-
"}
2+
:allowed-filename-matches ["articles" "includes"]}

.openpublishing.publish.config.json

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -247,6 +247,42 @@
247247
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-python",
248248
"branch": "master",
249249
"branch_mapping": {}
250+
},
251+
{
252+
"path_to_root": "cognitive-services-dotnet-sdk-samples",
253+
"url": "https://github.com/Azure-Samples/cognitive-services-dotnet-sdk-samples",
254+
"branch": "master",
255+
"branch_mapping": {}
256+
},
257+
{
258+
"path_to_root": "cognitive-services-java-sdk-samples",
259+
"url": "https://github.com/Azure-Samples/cognitive-services-java-sdk-samples",
260+
"branch": "master",
261+
"branch_mapping": {}
262+
},
263+
{
264+
"path_to_root": "aml-sdk-samples",
265+
"url": "https://github.com/Azure/MachineLearningNotebooks",
266+
"branch": "sdk-codetest",
267+
"branch_mapping": {}
268+
},
269+
{
270+
"path_to_root": "cognitive-services-vision-csharp-sdk-quickstarts",
271+
"url": "https://github.com/Azure-Samples/cognitive-services-vision-csharp-sdk-quickstarts",
272+
"branch": "master",
273+
"branch_mapping": {}
274+
},
275+
{
276+
"path_to_root": "cognitive-face-csharp-sample",
277+
"url": "https://github.com/Azure-Samples/Cognitive-Face-CSharp-sample",
278+
"branch": "master",
279+
"branch_mapping": {}
280+
},
281+
{
282+
"path_to_root": "cognitive-services-face-android-detect",
283+
"url": "https://github.com/Azure-Samples/cognitive-services-face-android-detect",
284+
"branch": "master",
285+
"branch_mapping": {}
250286
}
251287
],
252288
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 129 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/machine-learning/service/how-to-choose-a-dev-environment.md",
5+
"redirect_url": "/azure/machine-learning/service/how-to-configure-environment",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/frontdoor/front-door-powershell-reference.md",
510
"redirect_url": "/powershell/module/azurerm.frontdoor",
@@ -150,6 +155,21 @@
150155
"redirect_url": "/azure/active-directory/users-groups-roles/users-sharing-accounts",
151156
"redirect_document_id": true
152157
},
158+
{
159+
"source_path": "articles/active-directory/fundamentals/active-directory-administer.md",
160+
"redirect_url": "/azure/active-directory/fundamentals/active-directory-whatis",
161+
"redirect_document_id": false
162+
},
163+
{
164+
"source_path": "articles/active-directory/fundamentals/identity-fundamentals.md",
165+
"redirect_url": "/azure/active-directory/fundamentals/active-directory-whatis",
166+
"redirect_document_id": false
167+
},
168+
{
169+
"source_path": "articles/active-directory/fundamentals/understand-azure-identity-solutions.md",
170+
"redirect_url": "/azure/active-directory/fundamentals/active-directory-whatis",
171+
"redirect_document_id": false
172+
},
153173
{
154174
"source_path": "articles/active-directory/fundamentals/active-directory-groups-restore-azure-portal.md",
155175
"redirect_url": "/azure/active-directory/users-groups-roles/groups-restore-deleted",
@@ -356,6 +376,16 @@
356376
"redirect_url": "/azure/cosmos-db/conflict-resolution-policies",
357377
"redirect_document_id": true
358378
},
379+
{
380+
"source_path": "articles/cosmos-db/manage-account.md",
381+
"redirect_url": "/azure/cosmos-db/how-to-manage-database-account",
382+
"redirect_document_id": false
383+
},
384+
{
385+
"source_path": "articles/cosmos-db/indexing-policies.md",
386+
"redirect_url": "/azure/cosmos-db/indexing-policy",
387+
"redirect_document_id": true
388+
},
359389
{
360390
"source_path": "articles/cosmos-db/distribute-data-globally-benefits.md",
361391
"redirect_url": "/azure/cosmos-db/distribute-data-globally",
@@ -3261,6 +3291,11 @@
32613291
"redirect_url": "/azure/application-gateway/tutorial-autoscale-ps",
32623292
"redirect_document_id": false
32633293
},
3294+
{
3295+
"source_path": "articles/application-gateway/application-gateway-create-gateway-portal.md",
3296+
"redirect_url": "/azure/application-gateway/quick-create-portal",
3297+
"redirect_document_id": false
3298+
},
32643299
{
32653300
"source_path": "articles/application-insights/app-insights-azure-diagnostics.md",
32663301
"redirect_url": "/azure/monitoring-and-diagnostics/azure-diagnostics-configure-application-insights",
@@ -7844,6 +7879,11 @@
78447879
"redirect_url": "/azure/cosmos-db/enable-multi-master",
78457880
"redirect_document_id": false
78467881
},
7882+
{
7883+
"source_path": "articles/cosmos-db/sql-api-resources.md",
7884+
"redirect_url": "/azure/cosmos-db/databases-containers-items",
7885+
"redirect_document_id": false
7886+
},
78477887
{
78487888
"source_path": "articles/cosmos-db/multi-master-oss-nosql.md",
78497889
"redirect_url": "/azure/cosmos-db/consistency-levels-across-apis",
@@ -9266,7 +9306,7 @@
92669306
},
92679307
{
92689308
"source_path": "articles/documentdb/documentdb-indexing-policies.md",
9269-
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/indexing-policies",
9309+
"redirect_url": "/azure/cosmos-db/indexing-policy",
92709310
"redirect_document_id": false
92719311
},
92729312
{
@@ -9999,6 +10039,11 @@
999910039
"redirect_url": "/azure/log-analytics/log-analytics-data-security",
1000010040
"redirect_document_id": false
1000110041
},
10042+
{
10043+
"source_path": "articles/log-analytics/log-analytics-concept-hybrid.md",
10044+
"redirect_url": "/azure/log-analytics/log-analytics-agent-overview",
10045+
"redirect_document_id": false
10046+
},
1000210047
{
1000310048
"source_path": "articles/log-analytics/log-analytics-change-tracking.md",
1000410049
"redirect_url": "/azure/automation/automation-change-tracking",
@@ -11069,6 +11114,11 @@
1106911114
"redirect_url": "/azure/monitoring-and-diagnostics/alert-log",
1107011115
"redirect_document_id": false
1107111116
},
11117+
{
11118+
"source_path": "articles/monitoring-and-diagnostics/monitoring-overview-unified-alerts.md",
11119+
"redirect_url": "/azure/monitoring-and-diagnostics/monitoring-overview-alerts",
11120+
"redirect_document_id": false
11121+
},
1107211122
{
1107311123
"source_path": "articles/monitoring-and-diagnostics/monitoring-create-activity-log-alerts-with-resource-manager-template.md",
1107411124
"redirect_url": "/azure/monitoring-and-diagnostics/alert-activity-log",
@@ -27052,11 +27102,6 @@
2705227102
"redirect_url": "/azure/cloud-shell/overview",
2705327103
"redirect_document_id": false
2705427104
},
27055-
{
27056-
"source_path": "articles/dms/index.md",
27057-
"redirect_url": "/azure/dms/dms-overview",
27058-
"redirect_document_id": false
27059-
},
2706027105
{
2706127106
"source_path": "articles/guides/developer/index.md",
2706227107
"redirect_url": "/azure/guides/developer/azure-developer-guide",
@@ -27244,7 +27289,7 @@
2724427289
},
2724527290
{
2724627291
"source_path": "articles/active-directory/application-proxy-sso-overview.md",
27247-
"redirect_url": "/azure/active-directory/manage-apps/application-proxy-single-sign-on",
27292+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
2724827293
"redirect_document_id": false
2724927294
},
2725027295
{
@@ -28410,8 +28455,8 @@
2841028455
},
2841128456
{
2841228457
"source_path": "articles/active-directory/application-config-sso-how-to-choose-sign-on-method.md",
28413-
"redirect_url": "/azure/active-directory/manage-apps/single-sign-on-modes",
28414-
"redirect_document_id": true
28458+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
28459+
"redirect_document_id": false
2841528460
},
2841628461
{
2841728462
"source_path": "articles/active-directory/application-config-sso-how-to-configure-federated-sso-gallery.md",
@@ -28638,6 +28683,16 @@
2863828683
"redirect_url": "/azure/active-directory/manage-apps/developer-guidance-for-integrating-applications",
2863928684
"redirect_document_id": true
2864028685
},
28686+
{
28687+
"source_path": "articles/active-directory/manage-apps/application-proxy-single-sign-on.md",
28688+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
28689+
"redirect_document_id": false
28690+
},
28691+
{
28692+
"source_path": "articles/active-directory/manage-apps/single-sign-on-modes.md",
28693+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
28694+
"redirect_document_id": false
28695+
},
2864128696
{
2864228697
"source_path": "articles/virtual-machines/linux/classic/cli-use-docker.md",
2864328698
"redirect_url": "/azure/virtual-machines/linux/dockerextension",
@@ -30515,6 +30570,71 @@
3051530570
"source_path": "articles/iot-central/howto-create-application.md",
3051630571
"redirect_url": "/azure/iot-central/quick-deploy-iot-central",
3051730572
"redirect_document_id" : false
30573+
},
30574+
{
30575+
"source_path": "articles/media-services/latest/create-account-cli-quickstart.md",
30576+
"redirect_url": "/azure/media-services/latest/create-account-cli-how-to",
30577+
"redirect_document_id" : false
30578+
},
30579+
{
30580+
"source_path": "articles/backup/backup-mabs-upgrade-to-v2.md",
30581+
"redirect_url": "/azure/backup/backup-mabs-whats-new-mabs",
30582+
"redirect_document_id" : false
30583+
},
30584+
{
30585+
"source_path": "articles/monitoring/monitoring-solution-agenthealth.md",
30586+
"redirect_url": "/azure/azure-monitor/insights/solution-agenthealth",
30587+
"redirect_document_id": "false"
30588+
},
30589+
{
30590+
"source_path": "articles/monitoring/monitoring-solution-office-365.md",
30591+
"redirect_url": "/azure/azure-monitor/insights/solution-office-365",
30592+
"redirect_document_id": "false"
30593+
},
30594+
{
30595+
"source_path": "articles/monitoring/monitoring-solutions.md",
30596+
"redirect_url": "/azure/azure-monitor/insights/solutions",
30597+
"redirect_document_id": "false"
30598+
},
30599+
{
30600+
"source_path": "articles/monitoring/monitoring-solutions-best-practices.md",
30601+
"redirect_url": "/azure/azure-monitor/insights/solutions-best-practices",
30602+
"redirect_document_id": "false"
30603+
},
30604+
{
30605+
"source_path": "articles/monitoring/monitoring-solutions-creating.md",
30606+
"redirect_url": "/azure/azure-monitor/insights/solutions-creating",
30607+
"redirect_document_id": "false"
30608+
},
30609+
{
30610+
"source_path": "articles/monitoring/monitoring-solutions-inventory.md",
30611+
"redirect_url": "/azure/azure-monitor/insights/solutions-inventory",
30612+
"redirect_document_id": "false"
30613+
},
30614+
{
30615+
"source_path": "articles/monitoring/monitoring-solutions-resources-automation.md",
30616+
"redirect_url": "/azure/azure-monitor/insights/solutions-resources-automation",
30617+
"redirect_document_id": "false"
30618+
},
30619+
{
30620+
"source_path": "articles/monitoring/monitoring-solutions-resources-searches-alerts.md",
30621+
"redirect_url": "/azure/azure-monitor/insights/solutions-resources-searches-alerts",
30622+
"redirect_document_id": "false"
30623+
},
30624+
{
30625+
"source_path": "articles/monitoring/monitoring-solutions-resources-views.md",
30626+
"redirect_url": "/azure/azure-monitor/insights/solutions-resources-views",
30627+
"redirect_document_id": "false"
30628+
},
30629+
{
30630+
"source_path": "articles/monitoring/monitoring-solutions-solution-file.md",
30631+
"redirect_url": "/azure/azure-monitor/insights/solutions-solution-file",
30632+
"redirect_document_id": "false"
30633+
},
30634+
{
30635+
"source_path": "articles/monitoring/monitoring-solution-targeting.md",
30636+
"redirect_url": "/azure/azure-monitor/insights/solution-targeting",
30637+
"redirect_document_id": "false"
3051830638
}
3051930639
]
3052030640
}

articles/active-directory-b2c/active-directory-b2c-configure-signup-self-asserted-custom.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -273,8 +273,8 @@ Verified email is enabled by default in the `<TechnicalProfile Id="LocalAccountS
273273

274274
## Next steps
275275

276-
Add the new claim to the flows for social account logins by changing the TechnicalProfiles listed below. These are used by social/federated account logins to write and read the user data using the alternativeSecurityId as the locator.
277-
```xml
278-
<TechnicalProfile Id="AAD-UserWriteUsingAlternativeSecurityId">
279-
<TechnicalProfile Id="AAD-UserReadUsingAlternativeSecurityId">
280-
```
276+
If your policy supports social accounts, add the new claim to the flows for social account logins by changing the technical profiles listed below. These claims are used by social account logins to collect and write data from the user.
277+
278+
1. Locate the technical profile **SelfAsserted-Social** and add the output claim. The order of the claims in **OutputClaims** controls the order that Azure AD B2C renders the claims on the screen. For example, `<OutputClaim ClaimTypeReferenceId="city" />`.
279+
2. Locate the technical profile **AAD-UserWriteUsingAlternativeSecurityId** and add the persist claim. For example, `<PersistedClaim ClaimTypeReferenceId="city" />`.
280+
3. Locate the technical profile **AAD-UserReadUsingAlternativeSecurityId** and add the output claim. For example, `<OutputClaim ClaimTypeReferenceId="city" />`.

articles/active-directory-b2c/active-directory-b2c-custom-guide-eventlogger-appins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ When you use Azure Active Directory (Azure AD) B2C together with Azure Applicati
2727
2828
## How it works
2929

30-
The Identity Experience Framework in Azure AD B2C includes the provider `Handler="Web.TPEngine.Providers.UserJourneyContextProvider, Web.TPEngine, Version=1.0.0.0`. It sends event data directly to Application Insights by using the instrumentation key provided to Azure AD B2C.
30+
The Identity Experience Framework in Azure AD B2C includes the provider `Handler="Web.TPEngine.Providers.AzureApplicationInsightsProvider, Web.TPEngine, Version=1.0.0.0`. It sends event data directly to Application Insights by using the instrumentation key provided to Azure AD B2C.
3131

3232
A technical profile uses this provider to define an event from Azure AD B2C. The profile specifies the name of the event, the claims that are recorded, and the instrumentation key. To post an event, the technical profile is then added as an `orchestration step`, or as a `validation technical profile` in a custom user journey.
3333

articles/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/05/2018
11+
ms.date: 11/07/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -17,24 +17,24 @@ ms.component: B2C
1717

1818
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1919

20-
This article shows you how to enable sign-in for an ADFS user account by using [custom policies](active-directory-b2c-overview-custom.md) in Azure Active Directory (Azure AD) B2C.
20+
This article shows you how to enable sign-in for an ADFS user account by using [custom policies](active-directory-b2c-overview-custom.md) in Azure Active Directory (Azure AD) B2C. You enable sign-in by adding a [SAML technical profile](saml-technical-profile.md) to a custom policy.
2121

2222
## Prerequisites
2323

2424
- Complete the steps in [Get started with custom policies in Azure Active Directory B2C](active-directory-b2c-get-started-custom.md).
25-
- Make sure that you have access to the certificate .pfx file with the private key that was issued by ADFS.
25+
- Make sure that you have access to a certificate .pfx file with a private key. You can generate your own signed certificate and upload it to Azure AD B2C. Azure AD B2C uses this certificate to sign the SAML request sent to your SAML identity provider.
2626

2727
## Create a policy key
2828

29-
You need to store your ADFS certificate in your Azure AD B2C tenant.
29+
You need to store your certificate in your Azure AD B2C tenant.
3030

3131
1. Sign in to the [Azure portal](https://portal.azure.com/).
3232
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
3333
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
3434
4. On the Overview page, select **Identity Experience Framework - PREVIEW**.
3535
5. Select **Policy Keys** and then select **Add**.
3636
6. For **Options**, choose `Upload`.
37-
7. Enter a **Name** for the policy key. For example, `ADFSSamlCert`. The prefix `B2C_1A_` is added automatically to the name of your key.
37+
7. Enter a **Name** for the policy key. For example, `SamlCert`. The prefix `B2C_1A_` is added automatically to the name of your key.
3838
8. Browse to and select your certificate .pfx file with the private key.
3939
9. Click **Create**.
4040

0 commit comments

Comments
 (0)