Skip to content

Commit b8fb83d

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into normesta-reg-updates
2 parents 38d58cb + a973b1f commit b8fb83d

File tree

77 files changed

+681
-509
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

77 files changed

+681
-509
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -520,6 +520,11 @@
520520
"redirect_url": "/azure/machine-learning",
521521
"redirect_document_id": false
522522
},
523+
{
524+
"source_path": "articles/cognitive-services/LUIS/luis-how-to-add-example-utterances.md",
525+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities",
526+
"redirect_document_id": false
527+
},
523528
{
524529
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-prebuilt-intents-entities.md",
525530
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-machine-learned-entity",

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -392,9 +392,9 @@
392392
href: active-directory-configurable-token-lifetimes.md
393393
- name: Application configuration
394394
items:
395-
- name: Azure portal app registrations training guide (legacy)
395+
- name: Transitioning from App registrations (Legacy) to the new App registrations experience in the Azure portal
396396
href: app-registrations-training-guide-for-app-registrations-legacy-users.md
397-
- name: Application Registration Portal app registration guide
397+
- name: Transitioning from Application Registration Portal to the new App registrations experience in the Azure portal
398398
href: app-registration-portal-training-guide.md
399399
- name: Convert a single-tenant app to a multi-tenant app
400400
href: howto-convert-app-to-be-multi-tenant.md

articles/active-directory/develop/app-registration-portal-training-guide.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
2-
title: Application Registration Portal app registrations training guide - Microsoft identity platform | Azure
3-
description: App registrations in the Azure portal for users familiar with Application registration portal
2+
title: Transitioning from Application Registration Portal to the new App registrations experience in the Azure portal
3+
titleSuffix: Microsoft identity platform
4+
description: An introduction to the new App registration experience in the Azure portal
45
services: active-directory
56
documentationcenter: ''
67
author: archieag
@@ -20,7 +21,7 @@ ms.custom: aaddev
2021
ms.collection: M365-identity-device-management
2122
---
2223

23-
# Training guide: Using App registrations in the Azure portal instead of Application Registration Portal
24+
# Transitioning from Application Registration Portal to the new App registrations experience in the Azure portal
2425

2526
There are many improvements in the new [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience in the Azure portal. If you're more familiar with the Application registration portal (apps.dev.microsoft.com) experience for registering or managing converged applications, referred to as the old experience, this training guide will get you started using the new experience.
2627

@@ -113,15 +114,15 @@ separate pages. Here's where you can find the equivalent functionality:
113114

114115
- Advanced option - Live SDK support is on the Authentication page.
115116

116-
## Application Secrets/Certificates & secrets
117+
## Application secrets/Certificates & secrets
117118

118119
In the new experience, **Application secrets** have been renamed to
119120
**Certificates & secrets**. In addition, **Public keys** are referred to as
120121
**Certificates** and **Passwords** are referred to as **Client secrets**. We
121122
chose to not bring this functionality along in the new experience for
122123
security reasons, hence, you can no longer generate a new key pair.
123124

124-
## Platforms/Authentication - Reply URLs/Redirect URIs
125+
## Platforms/Authentication: Reply URLs/redirect URIs
125126
In the old experience, an app had Platforms section for Web, native, and
126127
Web API to configure Redirect URLs, Logout URL and Implicit flow.
127128

@@ -138,7 +139,7 @@ Web APIs are configured in Expose an API page.
138139
configure settings for your application based on the platform or device
139140
that you want to target. [Learn more](quickstart-configure-app-access-web-apis.md#configure-platform-settings-for-your-application)
140141

141-
## Microsoft Graph Permissions/API permissions
142+
## Microsoft Graph permissions/API permissions
142143

143144
- When selecting an API in the old experience, you could choose from
144145
Microsoft Graph APIs only. In the new experience, you can choose
@@ -172,7 +173,7 @@ the manifest editor or the API, or didn't exist.
172173

173174
- Implicit grant flow (oauth2AllowImplicitFlow) can be found on the
174175
Authentication page. Unlike the old experience, you can enable
175-
access tokens or id tokens, or both.
176+
access tokens or ID tokens, or both.
176177

177178
- Scopes defined by this API (oauth2Permissions) and Authorized client
178179
applications (preAuthorizedApplications) can be configured through
@@ -202,4 +203,4 @@ The new experience has the following limitations:
202203
between Azure AD single-tenant and multi-tenant.
203204

204205
> [!NOTE]
205-
> If you're a personal Microsoft account user in Azure AD tenant, and the tenant admin has restricted access to Azure portal, you may get an access denied. However, if you come through the shortcut by typing App registrations in the search bar or pinning it, you'll be able to access the new experience.
206+
> If you're a personal Microsoft account user in Azure AD tenant, and the tenant admin has restricted access to Azure portal, you may get an access denied. However, if you come through the shortcut by typing App registrations in the search bar or pinning it, you'll be able to access the new experience.

articles/active-directory/manage-apps/application-proxy-configure-cookie-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ Azure Active Directory (Azure AD) has access and session cookies for accessing o
2929
| Use Persistent Cookie | **No** | **Yes** allows Application Proxy to set its access cookies to not expire when the web browser is closed. The persistence lasts until the access token expires, or until the user manually deletes the persistent cookies. | Use **No** because of the security risk associated with keeping users authenticated.<br></br><br></br>We suggest only using **Yes** for older applications that can't share cookies between processes. It's better to update your application to handle sharing cookies between processes instead of using persistent cookies. For example, you might need persistent cookies to allow a user to open Office documents in explorer view from a SharePoint site. Without persistent cookies, this operation might fail if the access cookies aren't shared between the browser, the explorer process, and the Office process. |
3030

3131
## SameSite Cookies
32-
Starting in version [Chrome 80](https://support.google.com/chrome/a/answer/7679408?hl=en) and eventually in browsers leveraging [Chromium](https://blog.chromium.org/2019/10/developers-get-ready-for-new.html), cookies that do not specify the [SameSite](https://web.dev/samesite-cookies-explained) attribute will be treated as if they were set to **SameSite=Lax**. The SameSite attribute declares how cookies should be restricted to a same-site context. When set to Lax, the cookie is only to sent to same-site requests or top-level navigation. However, Application Proxy requires these cookies to be preserved in the third-party context in order to keep users properly signed in during their session. Due to this, we are making updates to the Application Proxy access and session cookies to avoid adverse impact from this change. The updates include:
32+
Starting in version Chrome 80 and eventually in browsers leveraging Chromium, cookies that do not specify the [SameSite](https://web.dev/samesite-cookies-explained) attribute will be treated as if they were set to **SameSite=Lax**. The SameSite attribute declares how cookies should be restricted to a same-site context. When set to Lax, the cookie is only to sent to same-site requests or top-level navigation. However, Application Proxy requires these cookies to be preserved in the third-party context in order to keep users properly signed in during their session. Due to this, we are making updates to the Application Proxy access and session cookies to avoid adverse impact from this change. The updates include:
3333

34-
* Setting the **SameSite** attribute to **None**- This allows Application Proxy access and sessions cookies to be properly sent in the third-party context.
34+
* Setting the **SameSite** attribute to **None**. This allows Application Proxy access and sessions cookies to be properly sent in the third-party context.
3535
* Setting the **Use Secure Cookie** setting to use **Yes** as the default. Chrome also requires the cookies to specify the Secure flag or it will be rejected. This change will apply to all existing applications published through Application Proxy. Note that Application Proxy access cookies have always been set to Secure and only transmitted over HTTPS. This change will only apply to the session cookies.
3636

3737
These changes to Application Proxy cookies will roll out over the course of the next several weeks before the Chrome 80 release date.

articles/active-directory/reports-monitoring/overview-monitoring.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: What is Azure Active Directory monitoring? | Microsoft Docs
44
description: Provides a general overview of Azure Active Directory monitoring.
55
services: active-directory
66
documentationcenter: ''
7-
author: cawrites
7+
author: MarkusVi
88
manager: daveba
99
editor: ''
1010

@@ -16,7 +16,7 @@ ms.tgt_pltfrm: na
1616
ms.workload: identity
1717
ms.subservice: report-monitor
1818
ms.date: 04/18/2019
19-
ms.author: chadam
19+
ms.author: markvi
2020
ms.reviewer: dhanyahk
2121

2222
# Customer intent: As an Azure AD administrator, I want to understand what monitoring solutions are available for Azure AD activity data and how they can help me manage my tenant.

articles/active-directory/reports-monitoring/reference-powershell-reporting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure AD PowerShell cmdlets for reporting | Microsoft Docs
33
description: Reference of the Azure AD PowerShell cmdlets for reporting.
44
services: active-directory
55
documentationcenter: ''
6-
author: cawrites
6+
author: MarkusVi
77
manager: daveba
88
editor: ''
99

@@ -15,7 +15,7 @@ ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
1717
ms.date: 07/12/2019
18-
ms.author: chadam
18+
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

2121
ms.collection: M365-identity-device-management

articles/active-directory/reports-monitoring/reference-reports-data-retention.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: How long does Azure AD store reporting data? | Microsoft Docs
33
description: Learn how long Azure stores the various types of reporting data.
44
services: active-directory
55
documentationcenter: ''
6-
author: cawrites
6+
author: MarkusVi
77
manager: daveba
88
editor: ''
99

@@ -15,7 +15,7 @@ ms.tgt_pltfrm:
1515
ms.workload: identity
1616
ms.subservice: report-monitor
1717
ms.date: 11/13/2018
18-
ms.author: chadam
18+
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

2121
ms.collection: M365-identity-device-management

articles/active-directory/reports-monitoring/reference-reports-latencies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Active Directory reporting latencies | Microsoft Docs
33
description: Learn about the amount of time it takes for reporting events to show up in your Azure portal
44
services: active-directory
55
documentationcenter: ''
6-
author: cawrites
6+
author: MarkusVi
77
manager: daveba
88
editor: ''
99

@@ -15,7 +15,7 @@ ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
1717
ms.date: 05/13/2019
18-
ms.author: chadam
18+
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

2121
ms.collection: M365-identity-device-management

articles/active-directory/reports-monitoring/reference-sign-ins-error-codes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Error codes in the Azure Active Directory portal | Microsoft Docs
33
description: Reference of sign-in activity report error codes.
44
services: active-directory
55
documentationcenter: ''
6-
author: cawrites
6+
author: MarkusVi
77
manager: daveba
88
editor: ''
99

@@ -15,7 +15,7 @@ ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
1717
ms.date: 08/08/2019
18-
ms.author: chadam
18+
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

2121
ms.collection: M365-identity-device-management

articles/active-directory/reports-monitoring/reports-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Frequently asked quesitons around Azure Active Directory reports.
44
services: active-directory
55
documentationcenter: ''
66
author: cawrites
7-
manager: daveba
7+
manager: MarkusVi
88

99
ms.assetid: 534da0b1-7858-4167-9986-7a62fbd10439
1010
ms.service: active-directory
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.subservice: report-monitor
1616
ms.date: 11/13/2018
17-
ms.author: chadam
17+
ms.author: markvi
1818
ms.reviewer: dhanyahk
1919

2020
ms.collection: M365-identity-device-management

0 commit comments

Comments
 (0)