Skip to content

Commit c48ef4c

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-marmalade
2 parents 3140983 + 6904991 commit c48ef4c

File tree

215 files changed

+2086
-2554
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

215 files changed

+2086
-2554
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -499,6 +499,11 @@
499499
"path_to_root": "azure-cosmosdb-java-v4-getting-started",
500500
"url": "https://github.com/Azure-Samples/azure-cosmos-java-getting-started",
501501
"branch": "master"
502+
},
503+
{
504+
"path_to_root": "azure-storage-snippets",
505+
"url": "https://github.com/azure-samples/AzureStorageSnippets",
506+
"branch": "master"
502507
}
503508
],
504509
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2682,6 +2682,16 @@
26822682
"redirect_url": "/azure/cosmos-db/sql-api-get-started",
26832683
"redirect_document_id": false
26842684
},
2685+
{
2686+
"source_path": "articles/search/search-example-adventureworks-modeling.md",
2687+
"redirect_url": "/azure/search/search-what-is-data-import",
2688+
"redirect_document_id": true
2689+
},
2690+
{
2691+
"source_path": "articles/search/search-example-adventureworks-multilevel-faceting.md",
2692+
"redirect_url": "/azure/search/search-filters-facets",
2693+
"redirect_document_id": true
2694+
},
26852695
{
26862696
"source_path": "articles/search/preview-api-resetskills.md",
26872697
"redirect_url": "/rest/api/searchservice/2019-05-06-preview/reset-skills",
@@ -7556,6 +7566,16 @@
75567566
"redirect_url": "/azure/application-gateway/resource-manager-template-samples",
75577567
"redirect_document_id": false
75587568
},
7569+
{
7570+
"source_path": "articles/application-gateway/application-gateway-create-gateway-cli-nodejs.md",
7571+
"redirect_url": "/azure/application-gateway/quick-create-cli",
7572+
"redirect_document_id": false
7573+
},
7574+
{
7575+
"source_path": "articles/application-gateway/tutorial-create-vmss-cli.md",
7576+
"redirect_url": "/azure/application-gateway/tutorial-url-redirect-cli",
7577+
"redirect_document_id": false
7578+
},
75597579
{
75607580
"source_path": "articles/application-insights/app-insights-azure-diagnostics.md",
75617581
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-to-application-insights",
@@ -51474,6 +51494,56 @@
5147451494
"source_path": "articles/app-service-mobile/app-service-mobile-xamarin-ios-get-started.md",
5147551495
"redirect_url": "/previous-versions/azure/app-service-mobile/app-service-mobile-xamarin-ios-get-started",
5147651496
"redirect_document_id": false
51497+
},
51498+
{
51499+
"source_path": "articles/cognitive-services/Custom-Vision-Service/csharp-tutorial.md",
51500+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/quickstarts/image-classification",
51501+
"redirect_document_id": false
51502+
},
51503+
{
51504+
"source_path": "articles/cognitive-services/Custom-Vision-Service/go-tutorial.md",
51505+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/quickstarts/image-classification",
51506+
"redirect_document_id": false
51507+
},
51508+
{
51509+
"source_path": "articles/cognitive-services/Custom-Vision-Service/java-tutorial.md",
51510+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/quickstarts/image-classification",
51511+
"redirect_document_id": false
51512+
},
51513+
{
51514+
"source_path": "articles/cognitive-services/Custom-Vision-Service/node-tutorial.md",
51515+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/quickstarts/image-classification",
51516+
"redirect_document_id": false
51517+
},
51518+
{
51519+
"source_path": "articles/cognitive-services/Custom-Vision-Service/python-tutorial.md",
51520+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/quickstarts/image-classification",
51521+
"redirect_document_id": false
51522+
},
51523+
{
51524+
"source_path": "articles/cognitive-services/Custom-Vision-Service/csharp-tutorial-od.md",
51525+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/quickstarts/object-detection",
51526+
"redirect_document_id": false
51527+
},
51528+
{
51529+
"source_path": "articles/cognitive-services/Custom-Vision-Service/go-tutorial-object-detection.md",
51530+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/quickstarts/object-detection",
51531+
"redirect_document_id": false
51532+
},
51533+
{
51534+
"source_path": "articles/cognitive-services/Custom-Vision-Service/java-tutorial-od.md",
51535+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/quickstarts/object-detection",
51536+
"redirect_document_id": false
51537+
},
51538+
{
51539+
"source_path": "articles/cognitive-services/Custom-Vision-Service/node-tutorial-object-detection.md",
51540+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/quickstarts/object-detection",
51541+
"redirect_document_id": false
51542+
},
51543+
{
51544+
"source_path": "articles/cognitive-services/Custom-Vision-Service/python-tutorial-od.md",
51545+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/quickstarts/object-detection",
51546+
"redirect_document_id": false
5147751547
}
5147851548
]
5147951549
}

articles/active-directory/authentication/concept-sspr-writeback.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,7 @@ Passwords are written back in all the following situations:
126126
* Any administrator self-service force change password operation, for example, password expiration.
127127
* Any administrator self-service password reset that originates from the [password reset portal](https://passwordreset.microsoftonline.com).
128128
* Any administrator-initiated end-user password reset from the [Azure portal](https://portal.azure.com).
129+
* Any administrator-initiated end-user password reset from the [Microsoft Graph API beta](https://docs.microsoft.com/graph/api/passwordauthenticationmethod-resetpassword?view=graph-rest-beta&tabs=http).
129130

130131
## Unsupported writeback operations
131132

@@ -134,7 +135,7 @@ Passwords aren't written back in any of the following situations:
134135
* **Unsupported end-user operations**
135136
* Any end user resetting their own password by using PowerShell version 1, version 2, or the Microsoft Graph API.
136137
* **Unsupported administrator operations**
137-
* Any administrator-initiated end-user password reset from PowerShell version 1, version 2, or the Microsoft Graph API.
138+
* Any administrator-initiated end-user password reset from PowerShell version 1, version 2, or the Microsoft Graph API (the [Microsoft Graph API beta](https://docs.microsoft.com/graph/api/passwordauthenticationmethod-resetpassword?view=graph-rest-beta&tabs=http) is supported).
138139
* Any administrator-initiated end-user password reset from the [Microsoft 365 admin center](https://admin.microsoft.com).
139140

140141
> [!WARNING]

articles/active-directory/authentication/howto-mfa-nps-extension-vpn.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -363,7 +363,7 @@ The script performs the following actions:
363363

364364
If you want to use your own certificates, you must associate the public key of your certificate with the service principal on Azure AD, and so on.
365365

366-
To use the script, provide the extension with your Azure Active Directory administrative credentials and the Azure Active Directory tenant ID that you copied earlier. Run the script on each NPS server where you install the NPS extension.
366+
To use the script, provide the extension with your Azure Active Directory administrative credentials and the Azure Active Directory tenant ID that you copied earlier. The account must be in the same Azure AD tenant as you wish to enable the extension for. Run the script on each NPS server where you install the NPS extension.
367367

368368
1. Run Windows PowerShell as an administrator.
369369

@@ -373,6 +373,8 @@ To use the script, provide the extension with your Azure Active Directory admini
373373

374374
![Running the AzureMfsNpsExtnConfigSetup.ps1 configuration script](./media/howto-mfa-nps-extension-vpn/image38.png)
375375

376+
If you get a security error due to TLS, enable TLS 1.2 using the `[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12` command from your PowerShell prompt.
377+
376378
After the script verifies the installation of the PowerShell module, it displays the Azure Active Directory PowerShell module sign-in window.
377379

378380
4. Enter your Azure AD administrator credentials and password, and then select **Sign in**.

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,13 +126,13 @@ First, ensure that you have the [MSOnline V1 PowerShell module](https://docs.mic
126126
Identify users who have registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD.
127127

128128
```powershell
129-
Get-MsolUser -All | Where-Object {$._StrongAuthenticationMethods -ne $null -and $._BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
129+
Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods -ne $null -and $_.BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
130130
```
131131

132132
Identify users who have not registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD.
133133

134134
```powershell
135-
Get-MsolUser -All | Where-Object {$._StrongAuthenticationMethods.Count -eq 0 -and $._BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
135+
Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods.Count -eq 0 -and $_.BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
136136
```
137137

138138
Identify users and output methods registered.

articles/active-directory/develop/migrate-adal-msal-java.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,11 @@ If you have been working with the Azure AD for developers (v1.0) endpoint (and A
4040

4141
ADAL4J acquires tokens for resources whereas MSAL for Java acquires tokens for scopes. A number of MSAL for Java classes require a scopes parameter. This parameter is a list of strings that declare the desired permissions and resources that are requested. See [Microsoft Graph's scopes](https://docs.microsoft.com/graph/permissions-reference) to see example scopes.
4242

43+
You can add the `/.default` scope suffix to the resource to help migrate your apps from the v1.0 endpoint (ADAL) to the Microsoft identity platform endpoint (MSAL). For example, for the resource value of `https://graph.microsoft.com`, the equivalent scope value is `https://graph.microsoft.com/.default`. If the resource is not in the URL form, but a resource ID of the form `XXXXXXXX-XXXX-XXXX-XXXXXXXXXXXX`, you can still use the scope value as `XXXXXXXX-XXXX-XXXX-XXXXXXXXXXXX/.default`.
44+
45+
For more details about the different types of scopes, refer
46+
[Permissions and consent in the Microsoft identity platform](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent) and the [Scopes for a Web API accepting v1.0 tokens](https://docs.microsoft.com/azure/active-directory/develop/msal-v1-app-scopes) articles.
47+
4348
## Core classes
4449

4550
In ADAL4J, the `AuthenticationContext` class represents your connection to the Security Token Service (STS), or authorization server, through an Authority. However, MSAL for Java is designed around client applications. It provides two separate classes: `PublicClientApplication` and `ConfidentialClientApplication` to represent client applications. The latter, `ConfidentialClientApplication`, represents an application that is designed to securely maintain a secret such as an application identifier for a daemon app.

articles/active-directory/develop/migrate-python-adal-msal.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,11 @@ See [What's different about the Microsoft identity platform (v2.0) endpoint?](ht
4141

4242
ADAL Python acquires tokens for resources, but MSAL Python acquires tokens for scopes. The API surface in MSAL Python does not have resource parameter anymore. You would need to provide scopes as a list of strings that declare the desired permissions and resources that are requested. To see some example of scopes, see [Microsoft Graph's scopes](https://docs.microsoft.com/graph/permissions-reference).
4343

44+
You can add the `/.default` scope suffix to the resource to help migrate your apps from the v1.0 endpoint (ADAL) to the Microsoft identity platform endpoint (MSAL). For example, for the resource value of `https://graph.microsoft.com`, the equivalent scope value is `https://graph.microsoft.com/.default`. If the resource is not in the URL form, but a resource ID of the form `XXXXXXXX-XXXX-XXXX-XXXXXXXXXXXX`, you can still use the scope value as `XXXXXXXX-XXXX-XXXX-XXXXXXXXXXXX/.default`.
45+
46+
For more details about the different types of scopes, refer
47+
[Permissions and consent in the Microsoft identity platform](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent) and the [Scopes for a Web API accepting v1.0 tokens](https://docs.microsoft.com/azure/active-directory/develop/msal-v1-app-scopes) articles.
48+
4449
### Error handling
4550

4651
Azure Active Directory Authentication Library (ADAL) for Python uses the exception `AdalError` to indicate that there's been a problem. MSAL for Python typically uses error codes, instead. For more information, see [MSAL for Python error handling](https://docs.microsoft.com/azure/active-directory/develop/msal-handling-exceptions?tabs=python).

articles/active-directory/develop/quickstart-v2-windows-desktop.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ In this quickstart, you'll learn how to write a Windows desktop .NET (WPF) appli
3838
>
3939
> 1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
4040
> 1. If your account gives you access to more than one tenant, select your account in the top right corner, and set your portal session to the desired Azure AD tenant.
41-
> 1. Navigate to the Microsoft identity platform for developers [App registrations](https://aka.ms/MobileAppReg) page.
41+
> 1. Go to the [App registrations](https://aka.ms/MobileAppReg) blade for Azure Active Directory in the Azure portal.
4242
> 1. Select **New registration**.
4343
> - In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `Win-App-calling-MsGraph`.
4444
> - In the **Supported account types** section, select **Accounts in any organizational directory and personal Microsoft accounts (for example, Skype, Xbox, Outlook.com)**.

articles/active-directory/fundamentals/concept-fundamentals-continuous-access-evaluation.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,9 @@ ms.collection: M365-identity-device-management
1919

2020
Microsoft services, like Azure Active Directory (Azure AD) and Office 365, use open standards and protocols to maximize interoperability. One of the most critical ones is Open ID Connect (OIDC). When a client application like Outlook connects to a service like Exchange Online, the API requests are authorized using OAuth 2.0 access tokens. By default, those access tokens are valid for one hour. When they expire, the client is redirected back to Azure AD to refresh them. That also provides an opportunity to reevaluate policies for user access – we might choose not to refresh the token because of a Conditional Access policy, or because the user has been disabled in the directory.
2121

22-
We have heard the overwhelming feedback from our customers: a one-hour lag due to access token lifetime for reapplying Conditional Access policies and changes in user state (for example: disabled due to furlough) is not good enough.
22+
Token expiration and refresh is a standard mechanism in the industry. That said, customers have expressed concerns about the lag between when risk conditions change for the user (for example: moving from the corporate office to the local coffee shop, or user credentials discovered on the black market) and when policies can be enforced related to that change. We have experimented with the “blunt object” approach of reduced token lifetimes but found they can degrade user experiences and reliability without eliminating risks.
23+
24+
Timely response to policy violations or security issues really requires a “conversation” between the token issuer, like Azure AD, and the relying party, like Exchange Online. This two-way conversation gives us two important capabilities. The relying party can notice when things have changed, like a client coming from a new location, and tell the token issuer. It also gives the token issuer a way to tell the relying party to stop respecting tokens for a given user due to account compromise, disablement, or other concerns. The mechanism for this conversation is Continuous Access Evaluation (CAE).
2325

2426
Microsoft has been an early participant in the Continuous Access Evaluation Protocol (CAEP) initiative as part of the [Shared Signals and Events](https://openid.net/wg/sse/) working group at the OpenID Foundation. Identity providers and relying parties will be able to leverage the security events and signals defined by the working group to reauthorize or terminate access. It is exciting work and will improve security across many platforms and applications.
2527

articles/active-directory/hybrid/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -153,6 +153,8 @@
153153
href: plan-migrate-adfs-pass-through-authentication.md
154154
- name: Move groups from one forest to another
155155
href: how-to-connect-migrate-groups.md
156+
- name: Migrate to cloud authentication using staged rollout
157+
href: how-to-connect-staged-rollout.md
156158
- name: Hybrid Identity Design Considerations
157159
items:
158160
- name: Hybrid Identity Design Considerations Overview

0 commit comments

Comments
 (0)