Skip to content

Commit b56fde3

Browse files
authored
Merge pull request #26 from MicrosoftDocs/master
update private branch
2 parents d6d08a0 + 501d24c commit b56fde3

File tree

1,763 files changed

+28177
-14549
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,763 files changed

+28177
-14549
lines changed

.openpublishing.redirection.json

Lines changed: 87 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2032,7 +2032,12 @@
20322032
},
20332033
{
20342034
"source_path": "articles/xplat-cli-azure-resource-manager.md",
2035-
"redirect_url": "/azure/azure-resource-manager/xplat-cli-azure-resource-manager",
2035+
"redirect_url": "/azure/azure-resource-manager/cli-azure-resource-manager",
2036+
"redirect_document_id": false
2037+
},
2038+
{
2039+
"source_path": "articles/azure-resource-manager/xplat-cli-azure-resource-manager.md",
2040+
"redirect_url": "/azure/azure-resource-manager/cli-azure-resource-manager",
20362041
"redirect_document_id": false
20372042
},
20382043
{
@@ -6945,6 +6950,16 @@
69456950
"redirect_url": "/azure/azure-stack/user/azure-stack-sql-server-vm-considerations",
69466951
"redirect_document_id": false
69476952
},
6953+
{
6954+
"source_path": "articles/azure-stack/azure-stack-update-1807.md",
6955+
"redirect_url": "/azure/azure-stack",
6956+
"redirect_document_id": false
6957+
},
6958+
{
6959+
"source_path": "articles/azure-stack/azure-stack-add-scale-node.md",
6960+
"redirect_url": "/azure/azure-stack",
6961+
"redirect_document_id": false
6962+
},
69486963
{
69496964
"source_path": "articles/azure-resource-manager/best-practices-resource-manager-security.md",
69506965
"redirect_url": "/azure/best-practices-network-security",
@@ -8175,6 +8190,11 @@
81758190
"redirect_url": "/azure/event-hubs/event-hubs-quickstart-powershell",
81768191
"redirect_document_id": false
81778192
},
8193+
{
8194+
"source_path": "articles/active-directory/active-directory-saml-protocol-reference.md",
8195+
"redirect_url": "/azure/active-directory/develop/active-directory-saml-protocol-reference",
8196+
"redirect_document_id": false
8197+
},
81788198
{
81798199
"source_path": "articles/event-hubs/event-hubs-overview.md",
81808200
"redirect_url": "/azure/event-hubs/event-hubs-what-is-event-hubs",
@@ -11580,11 +11600,6 @@
1158011600
"redirect_url": "/azure/traffic-manager/traffic-manager-manage-endpoints",
1158111601
"redirect_document_id": false
1158211602
},
11583-
{
11584-
"source_path": "articles/traffic-manager/traffic-manager-how-traffic-manager-works.md",
11585-
"redirect_url": "/azure/traffic-manager/traffic-manager-overview",
11586-
"redirect_document_id": false
11587-
},
1158811603
{
1158911604
"source_path": "articles/virtual-machine-scale-sets/virtual-machine-scale-sets-advanced-autoscale.md",
1159011605
"redirect_url": "/azure/monitoring-and-diagnostics/insights-advanced-autoscale-virtual-machine-scale-sets",
@@ -14355,14 +14370,19 @@
1435514370
"redirect_url": "/azure/active-directory/active-directory-reporting-risk-events",
1435614371
"redirect_document_id": false
1435714372
},
14373+
{
14374+
"source_path": "articles/active-directory/active-directory-reporting-activity-sign-ins-mfa.md",
14375+
"redirect_url": "/azure/active-directory/authentication/howto-mfa-reporting",
14376+
"redirect_document_id": false
14377+
},
1435814378
{
1435914379
"source_path": "articles/active-directory/active-directory-reporting-api-audit-reference.md",
1436014380
"redirect_url": "https://developer.microsoft.com/en-us/graph/docs/api-reference/beta/resources/directoryaudit",
1436114381
"redirect_document_id": false
1436214382
},
1436314383
{
1436414384
"source_path": "articles/active-directory/active-directory-reporting-api-sign-in-activity-reference.md",
14365-
"redirect_url": "https://developer.microsoft.com/en-us/graph/docs/api-reference/beta/resources/directoryaudit",
14385+
"redirect_url": "https://developer.microsoft.com/en-us/graph/docs/api-reference/beta/resources/signin",
1436614386
"redirect_document_id": false
1436714387
},
1436814388
{
@@ -26469,6 +26489,66 @@
2646926489
"source_path": "articles/cognitive-services/LUIS/interactive-test.md",
2647026490
"redirect_url": "/azure/cognitive-services/LUIS/luis-interactive-test",
2647126491
"redirect_document_id": true
26492+
},
26493+
{
26494+
"source_path": "articles/china/china-get-started-service-availability.md",
26495+
"redirect_url": "https://www.azure.cn/home/features/products-by-region",
26496+
"redirect_document_id": true
26497+
},
26498+
{
26499+
"source_path": "articles/powerbi-embedded/create-capacity.md",
26500+
"redirect_url": "https://docs.microsoft.com/power-bi/developer/azure-pbie-create-capacity",
26501+
"redirect_document_id": true
26502+
},
26503+
{
26504+
"source_path": "articles/powerbi-embedded/get-started.md",
26505+
"redirect_url": "https://docs.microsoft.com/power-bi/developer/embedding",
26506+
"redirect_document_id": true
26507+
},
26508+
{
26509+
"source_path": "articles/powerbi-embedded/pause-start.md",
26510+
"redirect_url": "https://docs.microsoft.com/power-bi/developer/azure-pbie-pause-start",
26511+
"redirect_document_id": true
26512+
},
26513+
{
26514+
"source_path": "articles/powerbi-embedded/scale-capacity.md",
26515+
"redirect_url": "https://docs.microsoft.com/power-bi/developer/azure-pbie-scale-capacity",
26516+
"redirect_document_id": true
26517+
},
26518+
{
26519+
"source_path": "articles/powerbi-embedded/what-is-power-bi-embedded.md",
26520+
"redirect_url": "https://docs.microsoft.com/power-bi/developer/azure-pbie-what-is-power-bi-embedded",
26521+
"redirect_document_id": true
26522+
},
26523+
{
26524+
"source_path": "articles/powerbi-embedded/migrate-from-power-bi-workspace-collections.md",
26525+
"redirect_url": "https://docs.microsoft.com/en-us/power-bi/developer/migrate-from-powerbi-embedded",
26526+
"redirect_document_id": true
26527+
},
26528+
{
26529+
"source_path": "articles/power-bi-embedded/migrate-tool.md",
26530+
"redirect_url": "https://docs.microsoft.com/en-us/power-bi/developer/migrate-tool",
26531+
"redirect_document_id": true
26532+
},
26533+
{
26534+
"source_path": "articles/powerbi-embedded/migrate-code-snippets.md",
26535+
"redirect_url": "https://docs.microsoft.com/en-us/power-bi/developer/migrate-code-snippets",
26536+
"redirect_document_id": true
26537+
},
26538+
{
26539+
"source_path": "articles/cognitive-services/video-indexer/video-indexer-output-json.md",
26540+
"redirect_url": "/azure/cognitive-services/video-indexer/video-indexer-output-json-v2",
26541+
"redirect_document_id": true
26542+
},
26543+
{
26544+
"source_path": "articles/security/azure-security-disk-encryption.md",
26545+
"redirect_url": "/azure/security/azure-security-disk-encryption-overview",
26546+
"redirect_document_id": true
26547+
},
26548+
{
26549+
"source_path": "articles/active-directory/device-management-hybrid-azuread-joined-devices-setup.md",
26550+
"redirect_url": "/azure/active-directory/devices/hybrid-azuread-join-manual-steps",
26551+
"redirect_document_id": true
2647226552
}
2647326553
]
2647426554
}

articles/active-directory-b2c/active-directory-b2c-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
1111
ms.date: 07/13/2018
12-
ms.author: davidmu1
12+
ms.author: davidmu
1313
ms.component: B2C
1414

1515
---

articles/active-directory-b2c/active-directory-b2c-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.component: B2C
1717
This page answers frequently asked questions about the Azure Active Directory (Azure AD) B2C. Keep checking back for updates.
1818

1919
### Why can't I access the Azure AD B2C extension in the Azure portal?
20-
There are two common reasons for why the Azure AD extesion is not working for you. Azure AD B2C requires your user role in the directory to be global administrator. Please contact your administrator if you think you should have access. If you have global administrator privileges, make sure that you are in an Azure AD B2C directory and not an Azure Active Directory directory. You can see instructions for [creating an Azure AD B2C directory here](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-tenant).
20+
There are two common reasons for why the Azure AD extension is not working for you. Azure AD B2C requires your user role in the directory to be global administrator. Please contact your administrator if you think you should have access. If you have global administrator privileges, make sure that you are in an Azure AD B2C directory and not an Azure Active Directory directory. You can see instructions for [creating an Azure AD B2C directory here](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-tenant).
2121

2222
### Can I use Azure AD B2C features in my existing, employee-based Azure AD tenant?
2323
Azure AD and Azure AD B2C are separate product offerings and cannot coexist in the same tenant. An Azure AD tenant represents an organization. An Azure AD B2C tenant represents a collection of identities to be used with relying party applications. With custom policies (in public preview), Azure AD B2C can federate to Azure AD allowing authentication of employees in an organization.

articles/active-directory-b2c/active-directory-b2c-reference-disable-ev.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,14 @@ By default, sign-up policies have email verification turned on. Use the followin
2222

2323
1. [Follow these steps to navigate to the B2C features blade on the Azure portal](active-directory-b2c-app-registration.md#navigate-to-b2c-settings).
2424
2. Click **Sign-up policies** or **Sign-up or sign-in policies** depending on what you configured for sign-up.
25-
3. Click your policy (for example, "B2C_1_SiUp") to open it. Click **Edit** at the top of the blade.
26-
4. Click **Page UI Customization**.
27-
5. Click **Local account sign-up page**.
28-
6. Click **Email Address** in the **Name** column under the **Sign-up attributes** section.
29-
7. Toggle the **Require verification** option to **No**.
30-
8. Click **OK** at the bottom until you reach the **Edit policy** blade.
31-
9. Click **Save** at the top of the blade. You're done!
25+
3. Click your policy (for example, "B2C_1_SiUp") to open it.
26+
4. Click **Edit** at the top of the blade.
27+
5. Click **Page UI Customization**.
28+
6. Click **Local account sign-up page**.
29+
7. Click **Email Address** in the **Name** column under the **Sign-up attributes** section.
30+
8. Toggle the **Require verification** option to **No**.
31+
9. Click **OK** at the bottom until you reach the **Edit policy** blade.
32+
10. Click **Save** at the top of the blade. You're done!
3233

3334
> [!NOTE]
3435
> Disabling email verification in the sign-up process may lead to spam. If you disable the default one, we recommend adding your own verification system.

articles/active-directory-b2c/active-directory-b2c-reference-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Note that the claims in ID tokens are not returned in any particular order. In a
6868

6969
| Name | Claim | Example value | Description |
7070
| --- | --- | --- | --- |
71-
| Audience |`aud` |`90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6` |An audience claim identifies the intended recipient of the token. For Azure AD B2C, the audience is your app's application ID, as assigned to your app in the app registration portal. Your app should validate this value and reject the token if it does not match. |
71+
| Audience |`aud` |`90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6` |An audience claim identifies the intended recipient of the token. For Azure AD B2C, the audience is your app's application ID, as assigned to your app in the app registration portal. Your app should validate this value and reject the token if it does not match. Audience is synonymous with resource. |
7272
| Issuer |`iss` |`https://login.microsoftonline.com/775527ff-9a37-4307-8b3d-cc311f58d925/v2.0/` |This claim identifies the security token service (STS) that constructs and returns the token. It also identifies the Azure AD directory in which the user was authenticated. Your app should validate the issuer claim to ensure that the token came from the Azure Active Directory v2.0 endpoint. |
7373
| Issued at |`iat` |`1438535543` |This claim is the time at which the token was issued, represented in epoch time. |
7474
| Expiration time |`exp` |`1438539443` |The expiration time claim is the time at which the token becomes invalid, represented in epoch time. Your app should use this claim to verify the validity of the token lifetime. |

articles/active-directory-b2c/active-directory-b2c-user-migration.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -351,8 +351,6 @@ You can view and monitor logging information in near-real time.
351351

352352
6. Check the output of the RESTful API.
353353

354-
For more information, see [Streaming logs and the console][AppService-Log].
355-
356354
> [!IMPORTANT]
357355
> Use the diagnostics logs only during development and testing. The RESTful API output might contain confidential information that should not be exposed in production.
358356
>
@@ -363,7 +361,6 @@ After you complete the [Get started with custom policies][B2C-GetStartedCustom]
363361
[AD-PasswordPolicies]: https://docs.microsoft.com/azure/active-directory/active-directory-passwords-policy
364362
[AD-Powershell]: https://docs.microsoft.com/en-us/powershell/azure/active-directory/install-adv2
365363
[AppService-Deploy]: https://docs.microsoft.com/aspnet/core/tutorials/publish-to-azure-webapp-using-vs
366-
[AppService-Log]: https://docs.microsoft.com/azure/active-directory-b2c/app-service-web/web-sites-streaming-logs-and-console
367364
[B2C-AppRegister]: https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-app-registration
368365
[B2C-GetStarted]: https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-get-started
369366
[B2C-GetStartedCustom]: https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-get-started-custom

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,9 @@ ms.workload: identity
1010
ms.topic: conceptual
1111
ms.date: 06/19/2018
1212
ms.author: davidmu
13-
13+
ms.component: B2C
1414
---
15+
1516
# Tutorial: Create an Azure Active Directory B2C tenant
1617

1718
Before your applications can interact with Azure Active Directory (Azure AD) B2C, they must be registered in a tenant that you manage.

0 commit comments

Comments
 (0)