Skip to content

Commit bd29f67

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-master
2 parents ba219ff + 57c50fc commit bd29f67

File tree

108 files changed

+2390
-693
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

108 files changed

+2390
-693
lines changed

.openpublishing.redirection.json

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -801,34 +801,44 @@
801801
"redirect_url": "/azure/machine-learning",
802802
"redirect_document_id": false
803803
},
804+
{
805+
"source_path": "articles/cognitive-services/QnAMaker/concepts/data-sources-supported.md",
806+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/reference-document-format-guidelines",
807+
"redirect_document_id": false
808+
},
809+
{
810+
"source_path": "articles/cognitive-services/QnAMaker/tutorials/choosing-capacity-qnamaker-deployment.md",
811+
"redirect_url": "/azure/cognitive-services/QnAMaker/Concepts/azure-resources",
812+
"redirect_document_id": false
813+
},
804814
{
805815
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-publish-kb-nodejs-sdk.md",
806-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
816+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
807817
"redirect_document_id": false
808818
},
809819
{
810820
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-publish-kb-csharp-sdk.md",
811-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
821+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
812822
"redirect_document_id": false
813823
},
814824
{
815825
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/python-sdk.md",
816-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
826+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
817827
"redirect_document_id": false
818828
},
819829
{
820830
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-knowledge-rest-api-nodejs.md",
821-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/publish-kb-nodejs",
831+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/publish-kb-nodejs",
822832
"redirect_document_id": false
823833
},
824834
{
825835
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-postman.md",
826-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
836+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
827837
"redirect_document_id": false
828838
},
829839
{
830840
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-curl.md",
831-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
841+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
832842
"redirect_document_id": false
833843
},
834844
{
@@ -986,11 +996,6 @@
986996
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-new-kb-csharp",
987997
"redirect_document_id": false
988998
},
989-
{
990-
"source_path": "articles/cognitive-services/QnAMaker/Concepts/data-sources-supported.md",
991-
"redirect_url": "/azure/cognitive-services/QnAMaker/concepts/knowledge-base",
992-
"redirect_document_id": false
993-
},
994999
{
9951000
"source_path": "articles/cognitive-services/QnAMaker/How-To/create-knowledge-base.md",
9961001
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/create-publish-knowledge-base",

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,6 @@ Your custom policy and Azure AD B2C tenant are now ready. Next, create an applic
272272
1. Enter a **Name** for the application. For example, *SAMLApp1*.
273273
1. Under **Supported account types**, select **Accounts in this organizational directory only**
274274
1. Under **Redirect URI**, select **Web**, and then enter `https://localhost`. You modify this value later in the application registration's manifest.
275-
1. Select **Grant admin consent to openid and offline_access permissions**.
276275
1. Select **Register**.
277276

278277
### 4.2 Update the app manifest
@@ -334,7 +333,7 @@ The last step is to enable Azure AD B2C as a SAML IdP in your SAML relying party
334333
Some or all the following are typically required:
335334

336335
* **Metadata**: `https://tenant-name.b2clogin.com/tenant-name.onmicrosoft.com/policy-name/Samlp/metadata`
337-
* **Issuer**: `https://tenant-name.onmicrosoft.com/policy-name`
336+
* **Issuer**: `https://tenant-name.b2clogin.com/tenant-name.onmicrosoft.com/policy-name`
338337
* **Login Url/SAML endpoint/SAML Url**: Check the value in the metadata file
339338
* **Certificate**: This is *B2C_1A_SamlIdpCert*, but without the private key. To get the public key of the certificate:
340339

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 16 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -38,11 +38,11 @@ This article gives you an overview of the audit report.
3838

3939
## Who can access the data?
4040

41-
* Users in the **Security Administrator**, **Security Reader**, **Report Reader** or **Global Administrator** roles
41+
* Users in the **Security Administrator**, **Security Reader**, **Report Reader** , **Global Reader** or **Global Administrator** roles
4242

4343
## Audit logs
4444

45-
The Azure AD audit logs provide records of system activities for compliance. To access the audit report, select **Audit logs** in the **Activity** section of **Azure Active Directory**. Note that audit logs may have a latency of up to an hour, so it may take that long for audit activity data to show up in the portal after you have completed the task.
45+
The Azure AD audit logs provide records of system activities for compliance. To access the audit report, select **Audit logs** in the **Monitoring** section of **Azure Active Directory**. Note that audit logs may have a latency of up to an hour, so it may take that long for audit activity data to show up in the portal after you have completed the task.
4646

4747

4848

@@ -87,16 +87,20 @@ You can filter the audit data on the following fields:
8787
The **Service** filter allows you to select from a drop-down list of the following services:
8888

8989
- All
90+
- AAD Management UX
9091
- Access Reviews
91-
- Account Provisioning
92-
- Application SSO
92+
- Account Provisioning
93+
- Application Proxy
9394
- Authentication Methods
9495
- B2C
9596
- Conditional Access
9697
- Core Directory
9798
- Entitlement Management
99+
- Hybrid Authentication
98100
- Identity Protection
99101
- Invited Users
102+
- MIM Service
103+
- MyApps
100104
- PIM
101105
- Self-service Group Management
102106
- Self-service Password Management
@@ -115,7 +119,11 @@ The **Category** filter enables you to select one of the following filters:
115119
- DirectoryManagement
116120
- EntitlementManagement
117121
- GroupManagement
122+
- KerberosDomain
123+
- KeyManagement
124+
- Label
118125
- Other
126+
- PermissionGrantPolicy
119127
- Policy
120128
- ResourceManagement
121129
- RoleManagement
@@ -131,14 +139,13 @@ The **Status** filter allows you to filter based on the status of an audit opera
131139
- Success
132140
- Failure
133141

134-
The **Target** filter allows you to search for a particular target by name or user principal name (UPN). The target name and UPN are case-sensitive.
142+
The **Target** filter allows you to search for a particular target by the starting of the name or user principal name (UPN). The target name and UPN are case-sensitive.
135143

136-
The **Initiated by** filter enables you to define an actor's name or a universal principal name (UPN). The name and UPN are case-sensitive.
144+
The **Initiated by** filter enables you to define what an actor's name or a universal principal name (UPN) starts with. The name and UPN are case-sensitive.
137145

138146
The **Date range** filter enables to you to define a timeframe for the returned data.
139147
Possible values are:
140148

141-
- 1 month
142149
- 7 days
143150
- 24 hours
144151
- Custom
@@ -176,11 +183,11 @@ With user and group-based audit reports, you can get answers to questions such a
176183

177184
- What licenses have been assigned to a group or a user?
178185

179-
If you want to review only auditing data that is related to users, you can find a filtered view under **Audit logs** in the **Activity** section of the **Users** tab. This entry point has **UserManagement** as preselected category.
186+
If you want to review only auditing data that is related to users, you can find a filtered view under **Audit logs** in the **Monitoring** section of the **Users** tab. This entry point has **UserManagement** as preselected category.
180187

181188
![Audit logs](./media/concept-audit-logs/users.png "Audit logs")
182189

183-
If you want to review only auditing data that is related to groups, you can find a filtered view under **Audit logs** in the **Activity** section of the **Groups** tab. This entry point has **GroupManagement** as preselected category.
190+
If you want to review only auditing data that is related to groups, you can find a filtered view under **Audit logs** in the **Monitoring** section of the **Groups** tab. This entry point has **GroupManagement** as preselected category.
184191

185192
![Audit logs](./media/concept-audit-logs/groups.png "Audit logs")
186193

0 commit comments

Comments
 (0)