Skip to content

Commit ba6e638

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 3da1fe8 + 0fc99ab commit ba6e638

File tree

190 files changed

+1424
-1746
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

190 files changed

+1424
-1746
lines changed

.openpublishing.publish.config.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -259,6 +259,18 @@
259259
"url": "https://github.com/Azure-Samples/cognitive-services-java-sdk-samples",
260260
"branch": "master",
261261
"branch_mapping": {}
262+
},
263+
{
264+
"path_to_root": "aml-sdk-samples",
265+
"url": "https://github.com/Azure/MachineLearningNotebooks",
266+
"branch": "sdk-codetest",
267+
"branch_mapping": {}
268+
},
269+
{
270+
"path_to_root": "cognitive-services-vision-csharp-sdk-quickstarts",
271+
"url": "https://github.com/Azure-Samples/cognitive-services-vision-csharp-sdk-quickstarts",
272+
"branch": "master",
273+
"branch_mapping": {}
262274
}
263275
],
264276
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30510,6 +30510,12 @@
3051030510
"source_path": "articles/iot-central/howto-create-application.md",
3051130511
"redirect_url": "/azure/iot-central/quick-deploy-iot-central",
3051230512
"redirect_document_id" : false
30513+
},
30514+
30515+
{
30516+
"source_path": "articles/backup/backup-mabs-upgrade-to-v2.md",
30517+
"redirect_url": "/azure/backup/backup-mabs-whats-new-mabs",
30518+
"redirect_document_id" : false
3051330519
}
3051430520
]
3051530521
}

articles/active-directory-b2c/technical-profiles-overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,7 @@ A technical profile enables these types of scenarios:
3434
- [SAML2](saml-technical-profile.md) - Federation with any SAML protocol identity provider.
3535
- [Self-Asserted](self-asserted-technical-profile.md) - Interact with the user. For example, collect the user's credential to sign in, render the sign-up page, or password reset.
3636
- **WsFed** - Federation with any WsFed protocol identity provider.
37-
- **Session management** - Handle different types of sessions.
38-
- **User journey context provider**
37+
- [Session management](active-directory-b2c-reference-sso-custom.md) - Handle different types of sessions.
3938
- **Application insights**
4039

4140
## Technical profile flow

articles/active-directory/develop/howto-reactivate-disabled-acs-namespaces.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,16 +22,16 @@ ms.custom: aaddev
2222

2323
On November 2017, we announced that Microsoft Azure Access Control Service (ACS), a service of Azure Active Directory (Azure AD), is being retired on November 7, 2018.
2424

25-
Since then, we've sent multiple emails to the ACS subscriptions’ admin email about the ACS retirement 12 months, 9 months, 6 months, 3 months, 1 month, 2 weeks, 1 week, and 1 day before the retirement date of November 7, 2018.
25+
Since then, we've sent emails to the ACS subscriptions’ admin email about the ACS retirement 12 months, 9 months, 6 months, 3 months, 1 month, 2 weeks, 1 week, and 1 day before the retirement date of November 7, 2018.
2626

27-
On October 3, 2018, we announced (through email and [a blog post](https://azure.microsoft.com/blog/one-month-retirement-notice-access-control-service/)) an extension offer to customers who can't finish their migration before November 7, 2018. The announcement also contained instructions for requesting the extension.
27+
On October 3, 2018, we announced (through email and [a blog post](https://azure.microsoft.com/blog/one-month-retirement-notice-access-control-service/)) an extension offer to customers who can't finish their migration before November 7, 2018. The announcement also had instructions for requesting the extension.
2828

2929
## Why your namespace is disabled
3030

31-
If you haven't opted in for the extension, we will start to disable ACS namespaces starting November 7, 2018. If you missed the communications and would still like to opt in for the extension to February 4, 2019, follow the instructions in the following sections.
31+
If you haven't opted in for the extension, we'll start to disable ACS namespaces starting November 7, 2018. If you missed the communications and would still like to opt in for the extension to February 4, 2019, follow the instructions in the following sections.
3232

3333
> [!NOTE]
34-
> You must be an administrator of the subscription to run the PowerShell commands and request an extension. The permissions to log into the ACS namespace's management portal and PowerShell are the same. Service administrators and co-administrators can log in, but account administrators cannot log in.
34+
> You must be a service administrator or co-administrator of the subscription to run the PowerShell commands and request an extension.
3535
3636
## Find and enable your ACS namespaces
3737

@@ -58,6 +58,9 @@ You can use ACS PowerShell to list all your ACS namespaces and reactivate ones t
5858
```
5959
6060
where `[Command-Name]` is the name of the ACS command.
61+
1. Connect to ACS using the **Connect-AcsAccount** cmdlet.
62+
63+
You may need to change your execution policy by running **Set-ExecutionPolicy** before you can run the command.
6164
1. List your available Azure subscriptions using the **Get-AcsSubscription** cmdlet.
6265
1. List your ACS namespaces using the **Get-AcsNamespace** cmdlet.
6366
1. Confirm that the namespaces are disabled by confirming that `State` is `Disabled`.

articles/active-directory/manage-apps/configure-password-single-sign-on-non-gallery-applications.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,13 @@
22
title: How to configure password single sign-on for a non-gallery applicationn | Microsoft Docs
33
description: How to configure an custom non-gallery application for secure password-based single sign-on when it is not listed in the Azure AD Application Gallery
44
services: active-directory
5-
documentationcenter: ''
65
author: barbkess
76
manager: mtillman
8-
9-
ms.assetid:
107
ms.service: active-directory
118
ms.component: app-mgmt
129
ms.workload: identity
13-
ms.tgt_pltfrm: na
14-
ms.devlang: na
1510
ms.topic: conceptual
16-
ms.date: 07/11/2017
11+
ms.date: 11/12/2018
1712
ms.author: barbkess
1813

1914
---
@@ -112,7 +107,6 @@ To configure single sign-on for an application, follow these steps:
112107

113108
11. Additionally, you can also provide credentials on behalf of the user by selecting the rows of the users and clicking on **Update Credentials** and entering the username and password on behalf of the users. Otherwise, users be prompted to enter the credentials themselves upon launch.
114109

115-
12. **Optional:** For certain social media applications like Twitter and Facebook, there is also the option to enable automatic rollover of the password for the application at a selected frequency. To enable this select **I want Azure AD to automatically manage this user or group's password** while entering credentials on behalf of a user or group. Then select the **Rollover frequency (in weeks)**.
116110

117111
## Assign a user to an application directly
118112

articles/active-directory/managed-identities-azure-resources/qs-configure-cli-windows-vm.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 09/14/2017
16+
ms.date: 11/10/2018
1717
ms.author: daveba
1818
---
1919

@@ -32,14 +32,6 @@ In this article, using the Azure CLI, you learn how to perform the following man
3232

3333
- If you're unfamiliar with managed identities for Azure resources, check out the [overview section](overview.md). **Be sure to review the [difference between a system-assigned and user-assigned managed identity](overview.md#how-does-it-work)**.
3434
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before continuing.
35-
- To perform the management operations in this article, your account needs the following Azure role based access control assignments:
36-
37-
> [!NOTE]
38-
> No additional Azure AD directory role assignments required.
39-
40-
- [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) to create a VM and enable and remove system and/or user-assigned managed identity from an Azure VM.
41-
- [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role to create a user-assigned managed identity.
42-
- [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) role to assign and remove a user-assigned managed identity from and to a VM.
4335
- To run the CLI script examples, you have three options:
4436
- Use [Azure Cloud Shell](../../cloud-shell/overview.md) from the Azure portal (see next section).
4537
- Use the embedded Azure Cloud Shell via the "Try It" button, located in the top right corner of each code block.
@@ -56,7 +48,7 @@ In this section, you learn how to enable and disable the system-assigned managed
5648

5749
### Enable system-assigned managed identity during creation of an Azure VM
5850

59-
To create an Azure VM with the system-assigned managed identity enabled:
51+
To create an Azure VM with the system-assigned managed identity enabled,your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment. No additional Azure AD directory role assignments are required.
6052

6153
1. If you're using the Azure CLI in a local console, first sign in to Azure using [az login](/cli/azure/reference-index#az-login). Use an account that is associated with the Azure subscription under which you would like to deploy the VM:
6254

@@ -78,7 +70,7 @@ To create an Azure VM with the system-assigned managed identity enabled:
7870

7971
### Enable system-assigned managed identity on an existing Azure VM
8072

81-
If you need to enable the system-assigned managed identity on an existing VM:
73+
To enable system-assigned managed identity on a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment. No additional Azure AD directory role assignments are required.
8274

8375
1. If you're using the Azure CLI in a local console, first sign in to Azure using [az login](/cli/azure/reference-index#az-login). Use an account that is associated with the Azure subscription that contains the VM.
8476

@@ -94,6 +86,8 @@ If you need to enable the system-assigned managed identity on an existing VM:
9486

9587
### Disable system-assigned identity from an Azure VM
9688

89+
To disable system-assigned managed identity on a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment. No additional Azure AD directory role assignments are required.
90+
9791
If you have a Virtual Machine that no longer needs the system-assigned identity, but still needs user-assigned identities, use the following command:
9892

9993
```azurecli-interactive
@@ -121,7 +115,7 @@ In this section, you will learn how to add and remove a user-assigned managed id
121115

122116
### Assign a user-assigned managed identity during the creation of an Azure VM
123117

124-
This section walks you through creation of a VM with assignment of a user-assigned managed identity. If you already have a VM you want to use, skip this section and proceed to the next.
118+
To assign a user-assigned identity to a VM during its creation, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) and [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) role assignments. No additional Azure AD directory role assignments are required.
125119

126120
1. You can skip this step if you already have a resource group you would like to use. Create a [resource group](~/articles/azure-resource-manager/resource-group-overview.md#terminology) for containment and deployment of your user-assigned managed identity, using [az group create](/cli/azure/group/#az-group-create). Be sure to replace the `<RESOURCE GROUP>` and `<LOCATION>` parameter values with your own values. :
127121

@@ -161,6 +155,8 @@ This section walks you through creation of a VM with assignment of a user-assign
161155

162156
### Assign a user-assigned managed identity to an existing Azure VM
163157

158+
To assign a user-assigned identity to a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) and [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) role assignments. No additional Azure AD directory role assignments are required.
159+
164160
1. Create a user-assigned identity using [az identity create](/cli/azure/identity#az-identity-create). The `-g` parameter specifies the resource group where the user-assigned identity is created, and the `-n` parameter specifies its name. Be sure to replace the `<RESOURCE GROUP>` and `<USER ASSIGNED IDENTITY NAME>` parameter values with your own values:
165161

166162
> [!IMPORTANT]
@@ -194,7 +190,9 @@ This section walks you through creation of a VM with assignment of a user-assign
194190
195191
### Remove a user-assigned managed identity from an Azure VM
196192
197-
To remove a user-assigned managed identity from a VM use [az vm identity remove](/cli/azure/vm#az-vm-identity-remove). If this is the only user-assigned managed identity assigned to the virtual machine, `UserAssigned` will be removed from the identity type value. Be sure to replace the `<RESOURCE GROUP>` and `<VM NAME>` parameter values with your own values. The `<USER ASSIGNED IDENTITY>` will be the user-assigned identity's `name` property, which can be found in the identity section of the virtual machine using `az vm identity show`:
193+
To remove a user-assigned identity to a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment.
194+
195+
If this is the only user-assigned managed identity assigned to the virtual machine, `UserAssigned` will be removed from the identity type value. Be sure to replace the `<RESOURCE GROUP>` and `<VM NAME>` parameter values with your own values. The `<USER ASSIGNED IDENTITY>` will be the user-assigned identity's `name` property, which can be found in the identity section of the virtual machine using `az vm identity show`:
198196
199197
```azurecli-interactive
200198
az vm identity remove -g <RESOURCE GROUP> -n <VM NAME> --identities <USER ASSIGNED IDENTITY>

articles/active-directory/managed-identities-azure-resources/qs-configure-powershell-windows-vm.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -29,14 +29,6 @@ In this article, using PowerShell, you learn how to perform the following manage
2929

3030
- If you're unfamiliar with managed identities for Azure resources, check out the [overview section](overview.md). **Be sure to review the [difference between a system-assigned and user-assigned managed identity](overview.md#how-does-it-work)**.
3131
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before continuing.
32-
- To perform the management operations in this article, your account needs the following Azure role based access control assignments:
33-
34-
> [!NOTE]
35-
> No additional Azure AD directory role assignments required.
36-
37-
- [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) to create a VM and enable and remove system and/or user-assigned managed identity from an Azure VM.
38-
- [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role to create a user-assigned managed identity.
39-
- [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) role to assign and remove a user-assigned managed identity from and to a VM.
4032
- Install [the latest version of Azure PowerShell](https://www.powershellgallery.com/packages/AzureRM) if you haven't already.
4133

4234
## System-assigned managed identity
@@ -45,7 +37,7 @@ In this section, you will learn how to enable and disable the system-assigned ma
4537

4638
### Enable system-assigned managed identity during creation of an Azure VM
4739

48-
To create an Azure VM with system-assigned managed identity enabled:
40+
To create an Azure VM with the system-assigned managed identity enabled,your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment. No additional Azure AD directory role assignments are required.
4941

5042
1. Refer to one of the following Azure VM Quickstarts, completing only the necessary sections ("Log in to Azure", "Create resource group", "Create networking group", "Create the VM").
5143

@@ -69,7 +61,7 @@ To create an Azure VM with system-assigned managed identity enabled:
6961
7062
### Enable system-assigned managed identity on an existing Azure VM
7163

72-
If you need to enable a system-assigned managed identity on an existing Virtual Machine:
64+
To enable system-assigned managed identity on a VM that was originally provisioned without it, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment. No additional Azure AD directory role assignments are required.
7365

7466
1. Sign in to Azure using `Login-AzureRmAccount`. Use an account that is associated with the Azure subscription that contains the VM.
7567

@@ -95,6 +87,8 @@ If you need to enable a system-assigned managed identity on an existing Virtual
9587
9688
## Disable system-assigned managed identity from an Azure VM
9789

90+
To disable system-assigned managed identity on a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment. No additional Azure AD directory role assignments are required.
91+
9892
If you have a Virtual Machine that no longer needs the system-assigned managed identity but still needs user-assigned managed identities, use the following cmdlet:
9993

10094
1. Sign in to Azure using `Login-AzureRmAccount`. Use an account that is associated with the Azure subscription that contains the VM.
@@ -129,7 +123,7 @@ In this section, you learn how to add and remove a user-assigned managed identit
129123

130124
### Assign a user-assigned managed identity to a VM during creation
131125

132-
To assign a user-assigned managed identity to an Azure VM when creating the VM:
126+
To assign a user-assigned identity to a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) and [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) role assignments. No additional Azure AD directory role assignments are required.
133127

134128
1. Refer to one of the following Azure VM Quickstarts, completing only the necessary sections ("Log in to Azure", "Create resource group", "Create networking group", "Create the VM").
135129

@@ -153,7 +147,7 @@ To assign a user-assigned managed identity to an Azure VM when creating the VM:
153147

154148
### Assign a user-assigned managed identity to an existing Azure VM
155149

156-
To assign a user-assigned managed identity to an existing Azure VM:
150+
To assign a user-assigned identity to a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) and [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) role assignments. No additional Azure AD directory role assignments are required.
157151

158152
1. Sign in to Azure using `Connect-AzureRmAccount`. Use an account that is associated with the Azure subscription that contains the VM.
159153

@@ -188,6 +182,8 @@ To assign a user-assigned managed identity to an existing Azure VM:
188182

189183
### Remove a user-assigned managed identity from an Azure VM
190184

185+
To remove a user-assigned identity to a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment.
186+
191187
If your VM has multiple user-assigned managed identities, you can remove all but the last one using the following commands. Be sure to replace the `<RESOURCE GROUP>` and `<VM NAME>` parameter values with your own values. The `<USER ASSIGNED IDENTITY NAME>` is the user-assigned managed identity's name property, which should remain on the VM. This information can be found by querying the `Identity` property of the VM object. For example, `$vm.Identity`:
192188

193189
```powershell

0 commit comments

Comments
 (0)