Skip to content

Commit b604c49

Browse files
committed
2 parents 68777b5 + 7c0fccb commit b604c49

File tree

528 files changed

+18202
-3103
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

528 files changed

+18202
-3103
lines changed

.openpublishing.redirection.json

Lines changed: 200 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21030,6 +21030,186 @@
2103021030
"redirect_url": "/azure/iot-fundamentals/iot-security-ground-up",
2103121031
"redirect_document_id": true
2103221032
},
21033+
{
21034+
"source_path": "articles/active-directory/develop/active-directory-acs-migration.md",
21035+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/active-directory-acs-migration",
21036+
"redirect_document_id": true
21037+
},
21038+
{
21039+
"source_path": "articles/active-directory/develop/active-directory-authentication-libraries.md",
21040+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/active-directory-authentication-libraries",
21041+
"redirect_document_id": true
21042+
},
21043+
{
21044+
"source_path": "articles/active-directory/develop/active-directory-devhowto-adal-error-handling.md",
21045+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/active-directory-devhowto-adal-error-handling",
21046+
"redirect_document_id": true
21047+
},
21048+
{
21049+
"source_path": "articles/active-directory/develop/app-types.md",
21050+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/app-types",
21051+
"redirect_document_id": true
21052+
},
21053+
{
21054+
"source_path": "articles/active-directory/develop/azure-ad-endpoint-comparison.md",
21055+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/azure-ad-endpoint-comparison",
21056+
"redirect_document_id": true
21057+
},
21058+
{
21059+
"source_path": "articles/active-directory/develop/azure-ad-federation-metadata.md",
21060+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/azure-ad-federation-metadata",
21061+
"redirect_document_id": true
21062+
},
21063+
{
21064+
"source_path": "articles/active-directory/develop/conditional-access-dev-guide.md",
21065+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/conditional-access-dev-guide",
21066+
"redirect_document_id": true
21067+
},
21068+
{
21069+
"source_path": "articles/active-directory/develop/howto-app-gallery-listing.md",
21070+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/howto-app-gallery-listing",
21071+
"redirect_document_id": true
21072+
},
21073+
{
21074+
"source_path": "articles/active-directory/develop/howto-get-appsource-certified.md",
21075+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/howto-get-appsource-certified",
21076+
"redirect_document_id": true
21077+
},
21078+
{
21079+
"source_path": "articles/active-directory/develop/howto-reactivate-disabled-acs-namespaces.md",
21080+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/howto-reactivate-disabled-acs-namespaces",
21081+
"redirect_document_id": true
21082+
},
21083+
{
21084+
"source_path": "articles/active-directory/develop/howto-v1-debug-saml-sso-issues.md",
21085+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/howto-v1-debug-saml-sso-issues",
21086+
"redirect_document_id": true
21087+
},
21088+
{
21089+
"source_path": "articles/active-directory/develop/howto-v1-enable-sso-android.md",
21090+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/howto-v1-enable-sso-android",
21091+
"redirect_document_id": true
21092+
},
21093+
{
21094+
"source_path": "articles/active-directory/develop/howto-v1-enable-sso-ios.md",
21095+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/howto-v1-enable-sso-ios",
21096+
"redirect_document_id": true
21097+
},
21098+
{
21099+
"source_path": "articles/active-directory/develop/native-app.md",
21100+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/native-app",
21101+
"redirect_document_id": true
21102+
},
21103+
{
21104+
"source_path": "articles/active-directory/develop/quickstart-v1-android.md",
21105+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/develop/quickstart-v2-android",
21106+
"redirect_document_id": false
21107+
},
21108+
{
21109+
"source_path": "articles/active-directory/develop/quickstart-v1-angularjs-spa.md",
21110+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/develop/authentication-flows-app-scenarios",
21111+
"redirect_document_id": false
21112+
},
21113+
{
21114+
"source_path": "articles/active-directory/develop/quickstart-v1-aspnet-webapp.md",
21115+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/develop/quickstart-v2-aspnet-webapp",
21116+
"redirect_document_id": false
21117+
},
21118+
{
21119+
"source_path": "articles/active-directory/develop/quickstart-v1-dotnet.md",
21120+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/develop/quickstart-v2-windows-desktop",
21121+
"redirect_document_id": false
21122+
},
21123+
{
21124+
"source_path": "articles/active-directory/develop/quickstart-v1-dotnet-webapi.md",
21125+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/develop/quickstart-v2-dotnet-native-aspnet",
21126+
"redirect_document_id": false
21127+
},
21128+
{
21129+
"source_path": "articles/active-directory/develop/quickstart-v1-ios.md",
21130+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/develop/quickstart-v2-ios",
21131+
"redirect_document_id": false
21132+
},
21133+
{
21134+
"source_path": "articles/active-directory/develop/quickstart-v1-netcore-daemon.md",
21135+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/develop/quickstart-v2-netcore-daemon",
21136+
"redirect_document_id": false
21137+
},
21138+
{
21139+
"source_path": "articles/active-directory/develop/quickstart-v1-nodejs-webapi.md",
21140+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/develop/authentication-flows-app-scenarios",
21141+
"redirect_document_id": false
21142+
},
21143+
{
21144+
"source_path": "articles/active-directory/develop/quickstart-v1-xamarin.md",
21145+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/develop/authentication-flows-app-scenarios",
21146+
"redirect_document_id": false
21147+
},
21148+
{
21149+
"source_path": "articles/active-directory/develop/sample-v1-code.md",
21150+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/sample-v1-code",
21151+
"redirect_document_id": true
21152+
},
21153+
{
21154+
"source_path": "articles/active-directory/develop/service-to-service.md",
21155+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/service-to-service",
21156+
"redirect_document_id": true
21157+
},
21158+
{
21159+
"source_path": "articles/active-directory/develop/single-page-application.md",
21160+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/single-page-application",
21161+
"redirect_document_id": true
21162+
},
21163+
{
21164+
"source_path": "articles/active-directory/develop/v1-authentication-scenarios.md",
21165+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/v1-authentication-scenarios",
21166+
"redirect_document_id": true
21167+
},
21168+
{
21169+
"source_path": "articles/active-directory/develop/v1-oauth2-client-creds-grant-flow.md",
21170+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/v1-oauth2-client-creds-grant-flow",
21171+
"redirect_document_id": true
21172+
},
21173+
{
21174+
"source_path": "articles/active-directory/develop/v1-oauth2-implicit-grant-flow.md",
21175+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/v1-oauth2-implicit-grant-flow",
21176+
"redirect_document_id": true
21177+
},
21178+
{
21179+
"source_path": "articles/active-directory/develop/v1-oauth2-on-behalf-of-flow.md",
21180+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/v1-oauth2-on-behalf-of-flow",
21181+
"redirect_document_id": true
21182+
},
21183+
{
21184+
"source_path": "articles/active-directory/develop/v1-overview.md",
21185+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/v1-overview",
21186+
"redirect_document_id": true
21187+
},
21188+
{
21189+
"source_path": "articles/active-directory/develop/v1-permissions-and-consent.md",
21190+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/v1-permissions-and-consent",
21191+
"redirect_document_id": true
21192+
},
21193+
{
21194+
"source_path": "articles/active-directory/develop/v1-protocols-oauth-code.md",
21195+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/v1-protocols-oauth-code",
21196+
"redirect_document_id": true
21197+
},
21198+
{
21199+
"source_path": "articles/active-directory/develop/v1-protocols-openid-connect-code.md",
21200+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/v1-protocols-openid-connect-code",
21201+
"redirect_document_id": true
21202+
},
21203+
{
21204+
"source_path": "articles/active-directory/develop/web-api.md",
21205+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/web-api",
21206+
"redirect_document_id": true
21207+
},
21208+
{
21209+
"source_path": "articles/active-directory/develop/web-app.md",
21210+
"redirect_url": "https://docs.microsoft.com/azure/active-directory/azuread-dev/web-app",
21211+
"redirect_document_id": true
21212+
},
2103321213
{
2103421214
"source_path": "articles/active-directory/active-directory-app-gallery-listing.md",
2103521215
"redirect_url": "/azure/active-directory/develop/active-directory-app-gallery-listing",
@@ -26530,6 +26710,26 @@
2653026710
"redirect_url": "/azure/storage/common/storage-designing-ha-apps-with-ragrs",
2653126711
"redirect_document_id": true
2653226712
},
26713+
{
26714+
"source_path": "articles/storage/common/storage-redundancy-lrs.md",
26715+
"redirect_url": "/azure/storage/common/storage-redundancy",
26716+
"redirect_document_id": false
26717+
},
26718+
{
26719+
"source_path": "articles/storage/common/storage-redundancy-grs.md",
26720+
"redirect_url": "/azure/storage/common/storage-redundancy",
26721+
"redirect_document_id": false
26722+
},
26723+
{
26724+
"source_path": "articles/storage/common/storage-redundancy-zrs.md",
26725+
"redirect_url": "/azure/storage/common/storage-redundancy",
26726+
"redirect_document_id": false
26727+
},
26728+
{
26729+
"source_path": "articles/storage/common/storage-redundancy-gzrs.md",
26730+
"redirect_url": "/azure/storage/common/storage-redundancy",
26731+
"redirect_document_id": false
26732+
},
2653326733
{
2653426734
"source_path": "articles/storage/storage-disaster-recovery-guidance.md",
2653526735
"redirect_url": "/azure/storage/common/storage-disaster-recovery-guidance",

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 27 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/10/2020
12+
ms.date: 02/11/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -80,11 +80,11 @@ The **DataUri** element is used to specify the page identifier. Azure AD B2C use
8080
| `globalexception` | Displays an error page when an exception or an error is encountered. |
8181
| `providerselection` | Lists the identity providers that users can choose from during sign-in. |
8282
| `unifiedssp` | Displays a form for signing in with a local account that's based on an email address or a user name. This value also provides the “keep me sign-in functionality” and “Forgot your password?” link. |
83-
| `unifiedssp` | Displays a form for signing in with a local account that's based on an email address or a user name. |
83+
| `unifiedssd` | Displays a form for signing in with a local account that's based on an email address or a user name. |
8484
| `multifactor` | Verifies phone numbers by using text or voice during sign-up or sign-in. |
8585
| `selfasserted` | Displays a form that enables users to create or update their profile. |
8686

87-
## Select a page layout
87+
### Select a page layout
8888

8989
You can enable [JavaScript client-side code](javascript-samples.md) by inserting `contract` between `elements` and the page type. For example, `urn:com:microsoft:aad:b2c:elements:contract:page-name:version`.
9090

@@ -122,6 +122,29 @@ The format of the value must contain the word `contract`: _urn:com:microsoft:aad
122122
| `urn:com:microsoft:aad:b2c:elements:unifiedssp:1.0.0` | `urn:com:microsoft:aad:b2c:elements:contract:unifiedssp:1.2.0` |
123123
| `urn:com:microsoft:aad:b2c:elements:unifiedssp:1.1.0` | `urn:com:microsoft:aad:b2c:elements:contract:unifiedssp:1.2.0` |
124124

125+
126+
### Metadata
127+
128+
A **Metadata** element contains the following elements:
129+
130+
| Element | Occurrences | Description |
131+
| ------- | ----------- | ----------- |
132+
| Item | 0:n | The metadata that relates to the content definition. |
133+
134+
The **Item** element of the **Metadata** element contains the following attributes:
135+
136+
| Attribute | Required | Description |
137+
| --------- | -------- | ----------- |
138+
| Key | Yes | The metadata key. |
139+
140+
#### Metadata keys
141+
142+
Content definition supports following metadata items:
143+
144+
| Key | Required | Description |
145+
| --------- | -------- | ----------- |
146+
| DisplayName | No | A string that contains the name of the content definition. |
147+
125148
### LocalizedResourcesReferences
126149

127150
The **LocalizedResourcesReferences** element contains the following elements:
@@ -130,7 +153,7 @@ The **LocalizedResourcesReferences** element contains the following elements:
130153
| ------- | ----------- | ----------- |
131154
| LocalizedResourcesReference | 1:n | A list of localized resource references for the content definition. |
132155

133-
The **LocalizedResourcesReferences** element contains the following attributes:
156+
The **LocalizedResourcesReference** element contains the following attributes:
134157

135158
| Attribute | Required | Description |
136159
| --------- | -------- | ----------- |

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/18/2019
12+
ms.date: 02/12/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -68,7 +68,7 @@ Custom policy/Identity Experience Framework capabilities are under constant and
6868
| Relying Party OAUTH1 | | | | Not supported. |
6969
| Relying Party OAUTH2 | | | X | |
7070
| Relying Party OIDC | | | X | |
71-
| Relying Party SAML | X | | | |
71+
| Relying Party SAML | |X | | |
7272
| Relying Party WSFED | X | | | |
7373
| REST API with basic and certificate auth | | | X | For example, Azure Logic Apps. |
7474

@@ -81,7 +81,7 @@ Custom policy/Identity Experience Framework capabilities are under constant and
8181
| Azure Email subsystem for email verification | | | X | |
8282
| Multi-language support| | | X | |
8383
| Predicate Validations | | | X | For example, password complexity. |
84-
| Using third party email service providers | X | | | |
84+
| Using third party email service providers | |X | | |
8585

8686
### Content Definition
8787

articles/active-directory-b2c/manage-user-accounts-graph-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You might need to migrate an existing user store to a B2C tenant. You may want t
2222
For B2C tenants, there are two primary modes of communicating with the Graph API:
2323

2424
* For **interactive**, run-once tasks, you should act as an administrator account in the B2C tenant when you perform the tasks. This mode requires an administrator to sign in with credentials before that admin can perform any calls to the Graph API.
25-
* For **automated**, continuous tasks, you should use some type of service account that you provide with the necessary privileges to perform management tasks. In Azure AD, you can do this by registering an application and authenticating to Azure AD. This is done by using an *Application ID* that uses the [OAuth 2.0 client credentials grant](../active-directory/develop/service-to-service.md). In this case, the application acts as itself, not as a user, to call the Graph API.
25+
* For **automated**, continuous tasks, you should use some type of service account that you provide with the necessary privileges to perform management tasks. In Azure AD, you can do this by registering an application and authenticating to Azure AD. This is done by using an *Application ID* that uses the [OAuth 2.0 client credentials grant](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md). In this case, the application acts as itself, not as a user, to call the Graph API.
2626

2727
In this article, you learn how to perform the automated use case. You'll build a .NET 4.5 `B2CGraphClient` that performs user create, read, update, and delete (CRUD) operations. The client will have a Windows command-line interface (CLI) that allows you to invoke various methods. However, the code is written to behave in a non-interactive, automated fashion.
2828

@@ -69,7 +69,7 @@ Your Azure AD B2C application now has the additional permissions required to del
6969

7070
## Get the sample code
7171

72-
The code sample is a .NET console application that uses the [Active Directory Authentication Library (ADAL)](../active-directory/develop/active-directory-authentication-libraries.md) to interact with Azure AD Graph API. Its code demonstrates how to call the API to programmatically manage users in an Azure AD B2C tenant.
72+
The code sample is a .NET console application that uses the [Active Directory Authentication Library (ADAL)](../active-directory/azuread-dev/active-directory-authentication-libraries.md) to interact with Azure AD Graph API. Its code demonstrates how to call the API to programmatically manage users in an Azure AD B2C tenant.
7373

7474
You can [download the sample archive](https://github.com/AzureADQuickStarts/B2C-GraphAPI-DotNet/archive/master.zip) (\*.zip) or clone the GitHub repository:
7575

articles/active-directory-domain-services/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@
7777
href: notifications.md
7878
- name: Delete a managed domain
7979
href: delete-aadds.md
80-
- name: Migrate from a Classic deployment (preview)
80+
- name: Migrate from a Classic deployment
8181
href: migrate-from-classic-vnet.md
8282
- name: Change SKU
8383
href: change-sku.md

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,11 @@ ms.author: iainfou
1313

1414
---
1515

16-
# Preview - Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager
16+
# Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager
1717

1818
Azure Active Directory Domain Services (AD DS) supports a one-time move for customers currently using the Classic virtual network model to the Resource Manager virtual network model. Azure AD DS managed domains that use the Resource Manager deployment model provide additional features such as fine-grained password policy, audit logs, and account lockout protection.
1919

20-
This article outlines the benefits and considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance. This migration feature is currently in preview.
20+
This article outlines the benefits and considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance.
2121

2222
## Overview of the migration process
2323

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ The SCIM RFC defines a core user and group schema, while also allowing for exten
139139
4. Select **Edit attribute list for AppName**.
140140
5. At the bottom of the attribute list, enter information about the custom attribute in the fields provided. Then select **Add Attribute**.
141141

142-
For SCIM applications, the attribute name must follow the pattern shown in the example below. The "CustomExtensionName" and "CustomAttribute" can be customized per your application's requirements, for example: urn:ietf:params:scim:schemas:extension:2.0:CustomExtensionName:CustomAttribute
142+
For SCIM applications, the attribute name must follow the pattern shown in the example below. The "CustomExtensionName" and "CustomAttribute" can be customized per your application's requirements, for example: urn:ietf:params:scim:schemas:extension:2.0:CustomExtensionName:CustomAttribute or urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User.CustomAttributeName:value
143143

144144
These instructions are only applicable to SCIM-enabled applications. Applications such as ServiceNow and Salesforce are not integrated with Azure AD using SCIM, and therefore they don't require this specific namespace when adding a custom attribute.
145145

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@
6464
items:
6565
- name: Self-service password reset
6666
items:
67-
- name: Deploy self-service password reset
67+
- name: Deployment guide
6868
href: howto-sspr-deployment.md
6969
- name: Pre-register authentication data
7070
href: howto-sspr-authenticationdata.md
@@ -74,7 +74,7 @@
7474
href: howto-sspr-windows.md
7575
- name: Cloud-based MFA
7676
items:
77-
- name: Deploy cloud-based MFA
77+
- name: Deployment guide
7878
href: howto-mfa-getstarted.md
7979
- name: Per user MFA
8080
href: howto-mfa-userstates.md

0 commit comments

Comments
 (0)