Skip to content

Commit ba0f100

Browse files
committed
Merge branch 'master' of https://github.com/microsoftdocs/azure-docs-pr into asc-melvyn-minortweaks
2 parents 7a3d406 + 97dc1c1 commit ba0f100

File tree

647 files changed

+9343
-5001
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

647 files changed

+9343
-5001
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -429,6 +429,12 @@
429429
"branch": "cli-preview",
430430
"branch_mapping": {}
431431
},
432+
{
433+
"path_to_root": "terraform",
434+
"url": "https://github.com/Azure/terraform",
435+
"branch": "master",
436+
"branch_mapping": {}
437+
},
432438
{
433439
"path_to_root": "samples-qnamaker-nodejs",
434440
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-nodejs",

.openpublishing.redirection.active-directory.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10509,6 +10509,11 @@
1050910509
"source_path": "articles/active-directory/privileged-identity-management/pim-resource-roles-start-access-review.md",
1051010510
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review",
1051110511
"redirect_document_id": false
10512-
}
10512+
},
10513+
{
10514+
"source_path_from_root": "/articles/active-directory-b2c/troubleshoot-custom-policies.md",
10515+
"redirect_url": "/azure/active-directory-b2c/troubleshoot",
10516+
"redirect_document_id": false
10517+
}
1051310518
]
1051410519
}

.openpublishing.redirection.iot-hub.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -125,6 +125,16 @@
125125
"redirect_url": "/azure/iot-hub/about-iot-hub",
126126
"redirect_document_id": false
127127
},
128+
{
129+
"source_path_from_root": "/articles/iot-hub/about-iot-hub.md",
130+
"redirect_url": "/azure/iot-hub/iot-concepts-and-iot-hub",
131+
"redirect_document_id": false
132+
},
133+
{
134+
"source_path_from_root": "/articles/iot-hub/iot-concepts.md",
135+
"redirect_url": "/azure/iot-hub/iot-concepts-and-iot-hub",
136+
"redirect_document_id": false
137+
},
128138
{
129139
"source_path_from_root": "/articles/iot-hub/quickstart-send-telemetry-xamarinforms.md",
130140
"redirect_url": "/azure/iot-hub/about-iot-hub",

.openpublishing.redirection.json

Lines changed: 32 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28129,7 +28129,7 @@
2812928129
"redirect_document_id": false
2813028130
},
2813128131
{
28132-
"source_path_from_root": "/articles/blobs/storage-blob-storage-tiers.md",
28132+
"source_path_from_root": "/articles/storage/blobs/storage-blob-storage-tiers.md",
2813328133
"redirect_url": "/azure/storage/blobs/access-tiers-overview",
2813428134
"redirect_document_id": true
2813528135
},
@@ -46412,7 +46412,36 @@
4641246412
"source_path_from_root": "/articles/iot-dps/quick-enroll-device-tpm-python.md",
4641346413
"redirect_url": "/azure/iot-dps/quick-enroll-device-tpm",
4641446414
"redirect_document_id": false
46415+
},
46416+
{
46417+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/quickstarts/get-started-with-form-recognizer.md",
46418+
"redirect_url": "/azure/applied-ai-services/form-recognizer/quickstarts/try-sample-label-tool",
46419+
"redirect_document_id": false
46420+
},
46421+
{
46422+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/quickstarts/client-library.md",
46423+
"redirect_url": "/azure/applied-ai-services/form-recognizer/quickstarts/try-sdk-rest-api",
46424+
"redirect_document_id": false
46425+
},
46426+
{
46427+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/concept-receipts.md",
46428+
"redirect_url": "/azure/applied-ai-services/form-recognizer/concept-receipt",
46429+
"redirect_document_id": false
46430+
},
46431+
{
46432+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/concept-business-cards.md",
46433+
"redirect_url": "/azure/applied-ai-services/form-recognizer/concept-business-card",
46434+
"redirect_document_id": false
46435+
},
46436+
{
46437+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/concept-identification-cards.md",
46438+
"redirect_url": "/azure/applied-ai-services/form-recognizer/concept-id-document",
46439+
"redirect_document_id": false
46440+
},
46441+
{
46442+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/concept-invoices.md",
46443+
"redirect_url": "/azure/applied-ai-services/form-recognizer/concept-invoice",
46444+
"redirect_document_id": false
4641546445
}
46416-
4641746446
]
46418-
}
46447+
}

CODEOWNERS

Lines changed: 60 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -1,91 +1,90 @@
11
# Testing the new code owners feature in GitHub. Please contact Cory Fowler if you have questions.
2+
#
3+
# Help: https://docs.github.com/repositories/managing-your-repositorys-settings-and-features/customizing-your-repository/about-code-owners
4+
# Background: https://github.blog/2017-07-06-introducing-code-owners/
5+
# NOTE: The people you choose as code owners must have _write_ permissions for the repository. When the code owner is a team, that team must be _visible_ and it must have _write_ permissions, even if all the individual members of the team already have write permissions directly, through organization membership, or through another team membership.
26

3-
# Horizontals
4-
5-
## Azure Policy: Samples and Compliance Controls
6-
articles/**/policy-reference.md @DCtheGeek
7-
articles/**/security-controls-policy.md @DCtheGeek
8-
includes/policy/ @DCtheGeek
7+
# Azure Policy: Samples and Compliance Controls
8+
/articles/**/policy-reference.md @DCtheGeek
9+
/articles/**/security-controls-policy.md @DCtheGeek
10+
/includes/policy/ @DCtheGeek
911

1012
# Azure Monitor
11-
12-
articles/azure-monitor/* @bwren
13-
articles/azure-monitor/agents @bwren
14-
articles/azure-monitor/alerts @rboucher
15-
articles/azure-monitor/app @bwren @lgayhardt
16-
articles/azure-monitor/autoscale @rboucher
17-
articles/azure-monitor/containers @bwren
18-
articles/azure-monitor/essentials @bwren @rboucher
19-
articles/azure-monitor/insights @bwren @rboucher @lgayhardt
20-
articles/azure-monitor/logs @bwren
21-
articles/azure-monitor/visualize @bwren @lgayhardt
22-
articles/azure-monitor/vm @bwren
23-
articles/advisor @rboucher
24-
articles/service-health @rboucher
13+
/articles/azure-monitor/* @bwren
14+
/articles/azure-monitor/agents @bwren
15+
/articles/azure-monitor/alerts @rboucher
16+
/articles/azure-monitor/app @bwren @lgayhardt
17+
/articles/azure-monitor/autoscale @rboucher
18+
/articles/azure-monitor/containers @bwren
19+
/articles/azure-monitor/essentials @bwren @rboucher
20+
/articles/azure-monitor/insights @bwren @rboucher @lgayhardt
21+
/articles/azure-monitor/logs @bwren
22+
/articles/azure-monitor/visualize @bwren @lgayhardt
23+
/articles/azure-monitor/vm @bwren
24+
/articles/advisor @rboucher
25+
/articles/service-health @rboucher
2526

2627
# Azure Active Directory
27-
28-
articles/active-directory-b2c/ @msmimart @yoelhor
29-
articles/active-directory/app-provisioning/ @CelesteDG
30-
articles/active-directory/develop/ @mmacy
31-
articles/active-directory/manage-apps/ @CelesteDG
28+
/articles/active-directory-b2c/ @msmimart @yoelhor
29+
/articles/active-directory/app-provisioning/ @CelesteDG
30+
/articles/active-directory/develop/ @mmacy
31+
/articles/active-directory/manage-apps/ @CelesteDG
3232

3333
# Azure Synapse Analytics
34-
articles/synapse-analytics/ @julieMSFT [email protected] @ryanmajidi @saveenr
35-
articles/synapse-analytics/backuprestore/ @joannapea @julieMSFT
36-
articles/synapse-analytics/catalog-governance/@djpmsft @chanuengg
37-
articles/synapse-analytics/ccid/ @liudan66 @julieMSFT
38-
articles/synapse-analytics/data-integration/ @kromerm @jonburchel
39-
articles/synapse-analytics/machine-learning/ @garyericson @NelGson @midesa
40-
articles/synapse-analytics/metadata/@MikeRys @julieMSFT @jocaplan
41-
articles/synapse-analytics/security/ @RonyMSFT @nanditavalsan @meenalsri @julieMSFT
42-
articles/synapse-analytics/spark/ @euangms @mlee3gsd @midesa
43-
articles/synapse-analytics/sql/ @filippopovic @azaricstefan @anumjs @WilliamDAssafMSFT @jovanpop-msft
44-
articles/synapse-analytics/sql-data-warehouse/ @anumjs @ronortloff @julieMSFT
45-
articles/synapse-analytics/synapse-link/ @Rodrigossz @SnehaGunda @jovanpop-msft
34+
/articles/synapse-analytics/ @julieMSFT @ryanmajidi @saveenr
35+
/articles/synapse-analytics/backuprestore/ @joannapea @julieMSFT
36+
/articles/synapse-analytics/catalog-governance/@djpmsft @chanuengg
37+
/articles/synapse-analytics/ccid/ @liudan66 @julieMSFT
38+
/articles/synapse-analytics/data-integration/ @kromerm @jonburchel
39+
/articles/synapse-analytics/machine-learning/ @garyericson @NelGson @midesa
40+
/articles/synapse-analytics/metadata/@MikeRys @julieMSFT @jocaplan
41+
/articles/synapse-analytics/security/ @RonyMSFT @nanditavalsan @meenalsri @julieMSFT
42+
/articles/synapse-analytics/spark/ @euangms @mlee3gsd @midesa
43+
/articles/synapse-analytics/sql/ @filippopovic @azaricstefan @anumjs @WilliamDAssafMSFT @jovanpop-msft
44+
/articles/synapse-analytics/sql-data-warehouse/ @anumjs @ronortloff @julieMSFT
45+
/articles/synapse-analytics/synapse-link/ @Rodrigossz @SnehaGunda @jovanpop-msft
4646

4747
# Cognitive Services
48-
articles/cognitive-services/ @aahill @patrickfarley @nitinme @mrbullwinkle @laujan
48+
/articles/cognitive-services/ @aahill @patrickfarley @nitinme @mrbullwinkle @laujan
4949

5050
# DevOps
51-
articles/ansible/ @TomArcherMsft
52-
articles/chef/ @TomArcherMsft
53-
articles/jenkins/ @TomArcherMsft
54-
articles/terraform/ @TomArcherMsft
51+
/articles/ansible/ @TomArcherMsft
52+
/articles/chef/ @TomArcherMsft
53+
/articles/jenkins/ @TomArcherMsft
54+
/articles/terraform/ @TomArcherMsft
5555

5656
# compute
57-
articles/virtual-machines/ @cynthn @mimckitt
58-
articles/virtual-machine-scale-sets/ @ju-shim @mimckitt
59-
articles/cloud-services/ @mimckitt
60-
articles/cloud-services-extended-support/ @mimckitt
61-
articles/service-fabric/ @sukanyamsft @mimckitt
62-
articles/container-instances/ @macolso @mimckitt
63-
articles/container-registry/ @dlepow @mimckitt
57+
/articles/virtual-machines/ @cynthn @mimckitt
58+
/articles/virtual-machine-scale-sets/ @ju-shim @mimckitt
59+
/articles/cloud-services/ @mimckitt
60+
/articles/cloud-services-extended-support/ @mimckitt
61+
/articles/service-fabric/ @sukanyamsft @mimckitt
62+
/articles/container-instances/ @macolso @mimckitt
63+
/articles/container-registry/ @dlepow @mimckitt
6464

6565
# Requires Internal Review
66-
articles/best-practices-availability-paired-regions.md @martinekuan @syntaxc4 @snoviking
66+
/articles/best-practices-availability-paired-regions.md @martinekuan @syntaxc4 @snoviking
6767

6868
# Governance
69-
articles/governance/ @DCtheGeek
69+
/articles/governance/ @DCtheGeek
7070

7171
# Security
72-
articles/security/fundamentals/feature-availability.md @msmbaldwin @terrylanfear
72+
/articles/security/fundamentals/feature-availability.md @msmbaldwin @terrylanfear
7373

7474
# Azure Security Center
75-
articles/security-center/ @memildin
76-
includes/*security-controls*.md @memildin
75+
/articles/security-center/ @memildin
76+
/includes/*security-controls*.md @memildin
7777

7878
# DDOS Protection
79-
80-
articles/ddos-protection @aletheatoh @anupamvi
79+
/articles/ddos-protection @aletheatoh @anupamvi
8180

8281
# Lighthouse
83-
articles/lighthouse/ @JnHs
82+
/articles/lighthouse/ @JnHs
8483

8584
# Healthcare APIs
86-
articles/healthcare-apis/ @ginalee-dotcom
85+
/articles/healthcare-apis/ @ginalee-dotcom
8786

8887
# Configuration
89-
*.json @SyntaxC4 @snoviking @martinekuan
90-
.acrolinx-config.edn @MonicaRush @martinekuan
91-
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking @martinekuan
88+
*.json @SyntaxC4 @snoviking
89+
.acrolinx-config.edn @MonicaRush
90+
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking

articles/active-directory-b2c/TOC.yml

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -398,15 +398,13 @@
398398
displayName: rest claims exchange
399399
- name: Secure an API connector
400400
href: secure-rest-api.md
401-
- name: Custom policy
401+
- name: Troubleshooting
402402
items:
403-
- name: Troubleshooting
404-
items:
405-
- name: Collect logs using Application Insights
406-
href: troubleshoot-with-application-insights.md
407-
displayName: troubleshooting, app insights
408-
- name: Troubleshooting custom policies
409-
href: troubleshoot-custom-policies.md
403+
- name: Collect logs using Application Insights
404+
href: troubleshoot-with-application-insights.md
405+
displayName: troubleshooting, app insights
406+
- name: Troubleshooting and error handling
407+
href: troubleshoot.md
410408
- name: UserInfo endpoint
411409
href: userinfo-endpoint.md
412410
- name: Partner integration

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -335,6 +335,9 @@ Custom policies are a set of XML files that you upload to your Azure AD B2C tena
335335

336336
::: zone-end
337337

338+
## Troubleshoot Azure AD B2C user flows and custom policies
339+
Your application needs to handle certain errors coming from Azure B2C service. Learn [how to troubleshoot Azure AD B2C's user flows and custom policies](troubleshoot.md).
340+
338341
## Next steps
339342

340343
Set up a [force password reset](force-password-reset.md).

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -50,15 +50,18 @@ When using the ROPC flow, consider the following:
5050

5151
## Create a resource owner user flow
5252

53-
1. Sign in to the Azure portal as the global administrator of your Azure AD B2C tenant.
54-
2. To switch to your Azure AD B2C tenant, select the B2C directory in the upper-right corner of the portal.
55-
3. Select **User flows**, and select **New user flow**.
56-
4. Select **Sign in using resource owner password credentials (ROPC)**.
57-
5. Under **Version**, make sure **Preview** is selected, and then select **Create**.
58-
7. Provide a name for the user flow, such as *ROPC_Auth*.
59-
8. Under **Application claims**, click **Show more**.
60-
9. Select the application claims that you need for your application, such as Display Name, Email Address, and Identity Provider.
61-
10. Select **OK**, and then select **Create**.
53+
1. Sign in to the [Azure portal](https://portal.azure.com) as the **global administrator** of your Azure AD B2C tenant.
54+
2. Make sure you're using the directory that contains your Azure AD B2C tenant:
55+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
56+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
57+
1. In the Azure portal, search for and select **Azure AD B2C**.
58+
1. Select **User flows**, and select **New user flow**.
59+
1. Select **Sign in using resource owner password credentials (ROPC)**.
60+
1. Under **Version**, make sure **Preview** is selected, and then select **Create**.
61+
1. Provide a name for the user flow, such as *ROPC_Auth*.
62+
1. Under **Application claims**, click **Show more**.
63+
1. Select the application claims that you need for your application, such as Display Name, Email Address, and Identity Provider.
64+
1. Select **OK**, and then select **Create**.
6265

6366
::: zone-end
6467

articles/active-directory-b2c/extensions-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,11 @@ To verify that the b2c-extensions-app is present:
3232

3333
If you accidentally deleted the b2c-extensions-app, you have 30 days to recover it. You can restore the app using the Graph API:
3434

35-
1. Browse to [https://graphexplorer.azurewebsites.net/](https://graphexplorer.azurewebsites.net/).
35+
1. Browse to [https://developer.microsoft.com/en-us/graph/graph-explorer](https://developer.microsoft.com/en-us/graph/graph-explorer).
3636
1. Log in to the site as a global administrator for the Azure AD B2C directory that you want to restore the deleted app for. This global administrator must have an email address similar to the following: `username@{yourTenant}.onmicrosoft.com`.
37-
1. Issue an HTTP GET against the URL `https://graph.windows.net/myorganization/deletedApplications` with api-version=1.6. This operation will list all of the applications that have been deleted within the past 30 days.
37+
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/beta/directory/deleteditems/microsoft.graph.application`. This operation will list all of the applications that have been deleted within the past 30 days.
3838
1. Find the application in the list where the name begins with 'b2c-extensions-app’ and copy its `objectid` property value.
39-
1. Issue an HTTP POST against the URL `https://graph.windows.net/myorganization/deletedApplications/{OBJECTID}/restore`. Replace the `{OBJECTID}` portion of the URL with the `objectid` from the previous step.
39+
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/beta/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `objectid` from the previous step.
4040

4141
You should now be able to [see the restored app](#verifying-that-the-extensions-app-is-present) in the Azure portal.
4242

articles/active-directory-b2c/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: What is Azure Active Directory B2C?
3-
description: Learn how you can use Azure Active Directory B2C to support external identities in your applications, including social login with Facebook, Google, and other identity providers.
3+
description: Learn how you can use Azure Active Directory B2C to support external identities in your applications, including social sign up with Facebook, Google, and other identity providers.
44
services: active-directory-b2c
55
author: msmimart
66
manager: celestedg
@@ -21,10 +21,10 @@ Azure Active Directory B2C provides business-to-customer identity as a service.
2121

2222
Azure AD B2C is a customer identity access management (CIAM) solution capable of supporting millions of users and billions of authentications per day. It takes care of the scaling and safety of the authentication platform, monitoring, and automatically handling threats like denial-of-service, password spray, or brute force attacks.
2323

24-
Azure AD B2C is a separate service from [Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md). It is built on the same technology as Azure AD but for a different purpose - to allow businesses build customer facing application and then allow anyone to sign up into those applications with no restrictions on user account.
24+
Azure AD B2C is a separate service from [Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md). It is built on the same technology as Azure AD but for a different purpose. It allows businesses to build customer facing application, and then allow anyone to sign up into those applications with no restrictions on user account.
2525

2626
## Who uses Azure AD B2C?
27-
Any business or individual who wishes to allow anyone to sign up to their web/mobile applications.
27+
Any business or individual who wishes to authenticate end users to their web/mobile applications using a white-label authentication solution. Apart from authentication, Azure AD B2C service is used for authorization such as access to API resources by authenticated users. Azure AD B2C is meant to be used by **IT administrators** and **developers**.
2828

2929
## Custom-branded identity solution
3030

0 commit comments

Comments
 (0)