Skip to content

Commit c920550

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-master
2 parents 9a966f8 + 4041892 commit c920550

File tree

780 files changed

+18437
-5741
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

780 files changed

+18437
-5741
lines changed

.openpublishing.redirection.json

Lines changed: 85 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -811,16 +811,30 @@
811811
"redirect_url": "/azure/cognitive-services/personalizer/how-to-manage-model",
812812
"redirect_document_id": false
813813
},
814+
{
815+
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-composite-entity.md",
816+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
817+
},
818+
{
819+
"source_path": "articles/cognitive-services/LUIS/tutorial-entity-roles.md",
820+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
821+
},
822+
{
823+
"source_path": "articles/cognitive-services/LUIS/tutorial-list-entity.md",
824+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
825+
},
826+
{
827+
"source_path": "articles/cognitive-services/LUIS/tutorial-regex-entity.md",
828+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
829+
},
814830
{
815831
"source_path": "articles/cognitive-services/LUIS/luis-boundaries.md",
816832
"redirect_url": "/azure/cognitive-services/LUIS/luis-limits"
817833
},
818-
{
819-
"source_path": "articles/cognitive-services/LUIS/luis-migration-api-authoring.md",
820-
"redirect_url": "/azure/cognitive-services/LUIS/luis-migration-authoring-entities",
821-
"redirect_document_id": false
822-
},
823-
834+
{
835+
"source_path": "articles/cognitive-services/LUIS/luis-migration-api-authoring.md",
836+
"redirect_url": "/azure/cognitive-services/LUIS/luis-migration-authoring-entities"
837+
},
824838
{
825839
"source_path": "articles/cognitive-services/LUIS/luis-resources-faq.md",
826840
"redirect_url": "/azure/cognitive-services/LUIS/troubleshooting",
@@ -853,13 +867,11 @@
853867
},
854868
{
855869
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intent-and-list-entity.md",
856-
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-list-entity",
857-
"redirect_document_id": false
870+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
858871
},
859872
{
860873
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intents-regex-entity.md",
861-
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-regex-entity",
862-
"redirect_document_id": false
874+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
863875
},
864876
{
865877
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intent-and-sentiment-analysis.md",
@@ -868,8 +880,7 @@
868880
},
869881
{
870882
"source_path": "articles/cognitive-services/LUIS/luis-how-to-add-example-utterances.md",
871-
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities",
872-
"redirect_document_id": false
883+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
873884
},
874885
{
875886
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-prebuilt-intents-entities.md",
@@ -2436,6 +2447,26 @@
24362447
"redirect_url": "/azure/cosmos-db/how-to-multi-master",
24372448
"redirect_document_id": true
24382449
},
2450+
{
2451+
"source_path": "articles/cosmos-db/analytics-usecases.md",
2452+
"redirect_url": "/azure/cosmos-db/synapse-link",
2453+
"redirect_document_id": true
2454+
},
2455+
{
2456+
"source_path": "articles/cosmos-db/analytics-solution-architectures.md",
2457+
"redirect_url": "/azure/cosmos-db/synapse-link",
2458+
"redirect_document_id": false
2459+
},
2460+
{
2461+
"source_path": "articles/cosmos-db/lambda-architecture.md",
2462+
"redirect_url": "/azure/cosmos-db/synapse-link",
2463+
"redirect_document_id": false
2464+
},
2465+
{
2466+
"source_path": "articles/cosmos-db/globally-distributed-transactional-analytical-storage.md",
2467+
"redirect_url": "/azure/cosmos-db/synapse-link",
2468+
"redirect_document_id": false
2469+
},
24392470
{
24402471
"source_path": "articles/cosmos-db/sql-api-java-get-started.md",
24412472
"redirect_url": "/azure/cosmos-db/create-sql-api-java",
@@ -37627,8 +37658,7 @@
3762737658
},
3762837659
{
3762937660
"source_path": "articles/cognitive-services/LUIS/Add-entities.md",
37630-
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities",
37631-
"redirect_document_id": true
37661+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
3763237662
},
3763337663
{
3763437664
"source_path": "articles/java-add-certificate-ca-store.md",
@@ -44892,8 +44922,7 @@
4489244922
},
4489344923
{
4489444924
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intent-and-hier-entity.md",
44895-
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-entity-roles",
44896-
"redirect_document_id": true
44925+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities"
4489744926
},
4489844927
{
4489944928
"source_path": "articles/azure-monitor/app/previews.md",
@@ -49435,6 +49464,11 @@
4943549464
"redirect_url": "/azure/cognitive-services/translator/translator-info-overview",
4943649465
"redirect_document_id": false
4943749466
},
49467+
{
49468+
"source_path": "articles/cognitive-services/translator/translator-text-how-to-signup.md",
49469+
"redirect_url": "/azure/cognitive-services/translator/translator-how-to-signup",
49470+
"redirect_document_id": false
49471+
},
4943849472
{
4943949473
"source_path": "articles/aks/virtual-kubelet.md",
4944049474
"redirect_url": "/azure/aks/concepts-scale#burst-to-azure-container-instances",
@@ -52083,6 +52117,41 @@
5208352117
"source_path": "articles/visual-studio/vs-storage-cloud-services-what-happened.md",
5208452118
"redirect_url": "/azure/storage",
5208552119
"redirect_document_id": false
52120+
},
52121+
{
52122+
"source_path": "articles/sql-database-edge/index.yml",
52123+
"redirect_url": "/azure/azure-sql-edge/",
52124+
"redirect_document_id": true
52125+
},
52126+
{
52127+
"source_path": "articles/sql-database-edge/deploy-onnx.md",
52128+
"redirect_url": "/azure/azure-sql-edge/deploy-onnx",
52129+
"redirect_document_id": true
52130+
},
52131+
{
52132+
"source_path": "articles/sql-database-edge/deploy-portal.md",
52133+
"redirect_url": "/azure/azure-sql-edge/deploy-portal",
52134+
"redirect_document_id": true
52135+
},
52136+
{
52137+
"source_path": "articles/sql-database-edge/onnx-overview.md",
52138+
"redirect_url": "/azure/azure-sql-edge/onnx-overview",
52139+
"redirect_document_id": true
52140+
},
52141+
{
52142+
"source_path": "articles/sql-database-edge/overview.md",
52143+
"redirect_url": "/azure/azure-sql-edge/overview",
52144+
"redirect_document_id": true
52145+
},
52146+
{
52147+
"source_path": "articles/sql-database-edge/stream-analytics.md",
52148+
"redirect_url": "/azure/azure-sql-edge/stream-analytics",
52149+
"redirect_document_id": true
52150+
},
52151+
{
52152+
"source_path": "articles/sql-database-edge/tutorial-sync-data-factory.md",
52153+
"redirect_url": "/azure/azure-sql-edge/tutorial-sync-data-factory",
52154+
"redirect_document_id": true
5208652155
}
5208752156
]
5208852157
}

articles/active-directory-b2c/access-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/16/2019
11+
ms.date: 05/12/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414

@@ -81,7 +81,7 @@ https://jwt.ms/?code=eyJraWQiOiJjcGltY29yZV8wOTI1MjAxNSIsInZlciI6IjEuMC...
8181
After successfully receiving the authorization code, you can use it to request an access token:
8282

8383
```HTTP
84-
POST <tenant-name>.onmicrosoft.com/oauth2/v2.0/token?p=<policy-name> HTTP/1.1
84+
POST <tenant-name>.onmicrosoft.com/<policy-name>/oauth2/v2.0/token HTTP/1.1
8585
Host: <tenant-name>.b2clogin.com
8686
Content-Type: application/x-www-form-urlencoded
8787

articles/active-directory-b2c/configure-ropc.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/27/2020
12+
ms.date: 05/12/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -36,7 +36,7 @@ The resource owner password credentials (ROPC) flow is an OAuth standard authent
3636

3737
You'll then see an endpoint such as this example:
3838

39-
`https://yourtenant.b2clogin.com/yourtenant.onmicrosoft.com/v2.0/.well-known/openid-configuration?p=B2C_1_ROPC_Auth`
39+
`https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/B2C_1_ROPC_Auth/v2.0/.well-known/openid-configuration`
4040

4141

4242
## Register an application
@@ -46,11 +46,11 @@ The resource owner password credentials (ROPC) flow is an OAuth standard authent
4646
## Test the user flow
4747

4848
Use your favorite API development application to generate an API call, and review the response to debug your user flow. Construct a call like this with the information in the following table as the body of the POST request:
49-
- Replace *\<yourtenant.onmicrosoft.com>* with the name of your B2C tenant.
49+
- Replace *\<tenant-name>.onmicrosoft.com* with the name of your B2C tenant.
5050
- Replace *\<B2C_1A_ROPC_Auth>* with the full name of your resource owner password credentials policy.
5151
- Replace *\<bef2222d56-552f-4a5b-b90a-1988a7d634c3>* with the Application ID from your registration.
5252

53-
`https://yourtenant.b2clogin.com/<yourtenant.onmicrosoft.com>/oauth2/v2.0/token?p=B2C_1_ROPC_Auth`
53+
`https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/B2C_1_ROPC_Auth/oauth2/v2.0/token`
5454

5555
| Key | Value |
5656
| --- | ----- |
@@ -66,8 +66,8 @@ Use your favorite API development application to generate an API call, and revie
6666
The actual POST request looks like the following:
6767

6868
```
69-
POST /yourtenant.onmicrosoft.com/oauth2/v2.0/token?p=B2C_1_ROPC_Auth HTTP/1.1
70-
Host: yourtenant.b2clogin.com
69+
POST /<tenant-name>.onmicrosoft.com/B2C_1_ROPC_Auth/oauth2/v2.0/token HTTP/1.1
70+
Host: <tenant-name>.b2clogin.com
7171
Content-Type: application/x-www-form-urlencoded
7272
7373
username=leadiocl%40trashmail.ws&password=Passxword1&grant_type=password&scope=openid+bef22d56-552f-4a5b-b90a-1988a7d634ce+offline_access&client_id=bef22d56-552f-4a5b-b90a-1988a7d634ce&response_type=token+id_token
@@ -90,7 +90,7 @@ A successful response with offline-access looks like the following example:
9090

9191
Construct a POST call like the one shown here with the information in the following table as the body of the request:
9292

93-
`https://yourtenant.b2clogin.com/<yourtenant.onmicrosoft.com>/oauth2/v2.0/token?p=B2C_1_ROPC_Auth`
93+
`https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/B2C_1_ROPC_Auth/oauth2/v2.0/token`
9494

9595
| Key | Value |
9696
| --- | ----- |

articles/active-directory-b2c/custom-policy-localization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 03/11/2020
11+
ms.date: 05/12/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -251,7 +251,7 @@ In the following example, English (en) and Spanish (es) custom strings are added
251251
1. Switch your browser default language to Spanish. Or you can add the query string parameter, `ui_locales` to the authorization request. For example:
252252

253253
```http
254-
https://yourtenant.b2clogin.com/yourtenant.onmicrosoft.com/oauth2/v2.0/authorize?p=B2C_1A_signup_signin&client_id=0239a9cc-309c-4d41-12f1-31299feb2e82&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login&ui_locales=es
254+
https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/B2C_1A_signup_signin/oauth2/v2.0/authorize&client_id=0239a9cc-309c-4d41-12f1-31299feb2e82&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login&ui_locales=es
255255
```
256256

257257
## Next steps

articles/active-directory-b2c/identity-provider-microsoft-account-custom.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/19/2020
12+
ms.date: 05/12/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -34,8 +34,8 @@ To enable sign-in for users with a Microsoft account, you need to register an ap
3434
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
3535
1. Select **New registration**.
3636
1. Enter a **Name** for your application. For example, *MSAapp1*.
37-
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts (e.g. Skype, Xbox, Outlook.com)**.
38-
1. Under **Redirect URI (optional)**, select **Web** and enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in the text box. Replace `your-tenant-name` with your Azure AD B2C tenant name.
37+
1. Under **Supported account types**, select **Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox)**.
38+
1. Under **Redirect URI (optional)**, select **Web** and enter `https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/oauth2/authresp` in the text box. Replace `<tenant-name>` with your Azure AD B2C tenant name.
3939
1. Select **Register**
4040
1. Record the **Application (client) ID** shown on the application Overview page. You need this when you configure the claims provider in a later section.
4141
1. Select **Certificates & secrets**
@@ -204,7 +204,7 @@ Update the relying party (RP) file that initiates the user journey that you crea
204204
"exp": 1562365200,
205205
"nbf": 1562361600,
206206
"ver": "1.0",
207-
"iss": "https://your-b2c-tenant.b2clogin.com/10000000-0000-0000-0000-000000000000/v2.0/",
207+
"iss": "https://<tenant-name>.b2clogin.com/10000000-0000-0000-0000-000000000000/v2.0/",
208208
"sub": "20000000-0000-0000-0000-000000000000",
209209
"aud": "30000000-0000-0000-0000-000000000000",
210210
"acr": "b2c_1a_signupsigninmsa",

articles/active-directory-b2c/identity-provider-microsoft-account.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 08/08/2019
12+
ms.date: 05/12/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -25,10 +25,10 @@ To use a Microsoft account as an [identity provider](openid-connect.md) in Azure
2525
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
2626
1. Select **New registration**.
2727
1. Enter a **Name** for your application. For example, *MSAapp1*.
28-
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts (e.g. Skype, Xbox, Outlook.com)**. This option targets the widest set of Microsoft identities.
28+
1. Under **Supported account types**, select **Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox)**.
2929

3030
For more information on the different account type selections, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
31-
1. Under **Redirect URI (optional)**, select **Web** and enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in the text box. Replace `your-tenant-name` with your Azure AD B2C tenant name.
31+
1. Under **Redirect URI (optional)**, select **Web** and enter `https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/oauth2/authresp` in the text box. Replace `<tenant-name>` with your Azure AD B2C tenant name.
3232
1. Select **Register**
3333
1. Record the **Application (client) ID** shown on the application Overview page. You need this when you configure the identity provider in the next section.
3434
1. Select **Certificates & secrets**

articles/active-directory-b2c/ropc-custom.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 04/01/2020
12+
ms.date: 05/12/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -242,9 +242,9 @@ Next, update the relying party file that initiates the user journey that you cre
242242

243243
Use your favorite API development application to generate an API call, and review the response to debug your policy. Construct a call like this example with the following information as the body of the POST request:
244244

245-
`https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/v2.0/token?p=B2C_1_ROPC_Auth`
245+
`https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/B2C_1_ROPC_Auth/oauth2/v2.0/token`
246246

247-
- Replace `your-tenant-name` with the name of your Azure AD B2C tenant.
247+
- Replace `<tenant-name>` with the name of your Azure AD B2C tenant.
248248
- Replace `B2C_1A_ROPC_Auth` with the full name of your resource owner password credentials policy.
249249

250250
| Key | Value |
@@ -264,8 +264,8 @@ Use your favorite API development application to generate an API call, and revie
264264
The actual POST request looks like the following example:
265265

266266
```HTTPS
267-
POST /yourtenant.onmicrosoft.com/oauth2/v2.0/token?B2C_1_ROPC_Auth HTTP/1.1
268-
Host: yourtenant.b2clogin.com
267+
POST /<tenant-name>.onmicrosoft.com/oauth2/v2.0/token?B2C_1_ROPC_Auth HTTP/1.1
268+
Host: <tenant-name>.b2clogin.com
269269
Content-Type: application/x-www-form-urlencoded
270270

271271
username=contosouser.outlook.com.ws&password=Passxword1&grant_type=password&scope=openid+bef22d56-552f-4a5b-b90a-1988a7d634ce+offline_access&client_id=bef22d56-552f-4a5b-b90a-1988a7d634ce&response_type=token+id_token
@@ -287,9 +287,9 @@ A successful response with offline-access looks like the following example:
287287

288288
Construct a POST call like the one shown here. Use the information in the following table as the body of the request:
289289

290-
`https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/v2.0/token?p=B2C_1_ROPC_Auth`
290+
`https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/B2C_1_ROPC_Auth/oauth2/v2.0/token`
291291

292-
- Replace `your-tenant-name` with the name of your Azure AD B2C tenant.
292+
- Replace `<tenant-name>` with the name of your Azure AD B2C tenant.
293293
- Replace `B2C_1A_ROPC_Auth` with the full name of your resource owner password credentials policy.
294294

295295
| Key | Value |

0 commit comments

Comments
 (0)