Skip to content

Commit c931efe

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 479af19 + c4700ac commit c931efe

File tree

1,151 files changed

+11696
-3602
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,151 files changed

+11696
-3602
lines changed

.openpublishing.redirection.json

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3040,6 +3040,21 @@
30403040
"redirect_url": "/azure/iot-edge/how-to-install-iot-edge-linux",
30413041
"redirect_document_id": false
30423042
},
3043+
    {
3044+
      "source_path": "articles/iot-edge/how-to-register-device-portal.md",
3045+
      "redirect_url": "/azure/iot-edge/how-to-register-device",
3046+
      "redirect_document_id": false
3047+
    },
3048+
    {
3049+
      "source_path": "articles/iot-edge/how-to-register-device-vscode.md",
3050+
      "redirect_url": "/azure/iot-edge/how-to-register-device",
3051+
      "redirect_document_id": false
3052+
    },
3053+
        {
3054+
      "source_path": "articles/iot-edge/how-to-register-device-cli.md",
3055+
      "redirect_url": "/azure/iot-edge/how-to-register-device",
3056+
      "redirect_document_id": false
3057+
    },
30433058
{
30443059
"source_path": "articles/cognitive-services/cognitive-services-recommendations-quick-start.md",
30453060
"redirect_url": "/azure/cognitive-services/recommendations/overview",
@@ -36168,6 +36183,46 @@
3616836183
"redirect_url": "/azure/key-vault/vs-key-vault-add-connected-service",
3616936184
"redirect_document_id": false
3617036185
},
36186+
{
36187+
"source_path": "articles/iot-central/core/howto-create-event-rules-pnp.md",
36188+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36189+
"redirect_document_id": false
36190+
},
36191+
{
36192+
"source_path": "articles/iot-central/core/howto-create-telemetry-rules-pnp.md",
36193+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36194+
"redirect_document_id": false
36195+
},
36196+
{
36197+
"source_path": "articles/iot-central/core/tutorial-configure-rules-pnp.md",
36198+
"redirect_url": "/azure/iot-central/core/tutorial-create-telemetry-rules",
36199+
"redirect_document_id": false
36200+
},
36201+
{
36202+
"source_path": "articles/iot-central/core/tutorial-monitor-devices-pnp.md",
36203+
"redirect_url": "/azure/iot-central/core/quick-monitor-devices-pnp",
36204+
"redirect_document_id": false
36205+
},
36206+
{
36207+
"source_path": "articles/iot-central/tutorial-add-device-pnp.md",
36208+
"redirect_url": "/azure/iot-central/quick-create-pnp-device-pnp",
36209+
"redirect_document_id": false
36210+
},
36211+
{
36212+
"source_path": "articles/iot-central/tutorial-define-device-type-pnp.md",
36213+
"redirect_url": "/azure/iot-central/quick-create-pnp-device-pnp",
36214+
"redirect_document_id": false
36215+
},
36216+
{
36217+
"source_path": "articles/iot-central/howto-export-data-blob-storage-pnp.md",
36218+
"redirect_url": "/azure/iot-central/howto-export-data-pnp",
36219+
"redirect_document_id": false
36220+
},
36221+
{
36222+
"source_path": "articles/iot-central/howto-export-data-event-hubs-service-bus-pnp.md",
36223+
"redirect_url": "/azure/iot-central/howto-export-data-pnp",
36224+
"redirect_document_id": false
36225+
},
3617136226
{
3617236227
"source_path": "articles/iot-central/howto-generate-connection-string.md",
3617336228
"redirect_url": "/azure/iot-central",

articles/active-directory-b2c/active-directory-b2c-how-to-enable-billing.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -41,14 +41,14 @@ Here's how to make the switch to MAU billing for an existing Azure AD B2C resour
4141

4242
1. Sign in to the [Azure portal](https://portal.azure.com) as the subscription owner.
4343
1. Select the **Directory + subscription** filter in the top menu, and then select the Azure AD B2C directory that you want to upgrade to MAU billing.<br/>
44-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-01-select-b2c-directory.png" alt-text="Directory and subscription filter in Azure portal":::
44+
![Directory and subscription filter in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-01-select-b2c-directory.png)
4545
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
4646
1. On the **Overview** page of the Azure AD B2C tenant, select the link under **Resource name**. You're directed to the Azure AD B2C resource in your Azure AD tenant.<br/>
47-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-02-b2c-resource-link.png" alt-text="Azure AD B2C resource link highlighted in Azure portal":::
47+
![Azure AD B2C resource link highlighted in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-02-b2c-resource-link.png)
4848
1. On the **Overview** page of the Azure AD B2C resource, under **Billable Units**, select the **Per Authentication (Change to MAU)** link.<br/>
49-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-03-change-to-mau-link.png" alt-text="Change to MAU link highlighted in Azure portal":::
49+
![Change to MAU link highlighted in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-03-change-to-mau-link.png)
5050
1. Select **Confirm** to complete the upgrade to MAU billing.<br/>
51-
:::image type="content" source="media/active-directory-b2c-how-to-enable-billing/portal-mau-04-confirm-change-to-mau.png" alt-text="MAU-based billing confirmation dialog in Azure portal":::
51+
![MAU-based billing confirmation dialog in Azure portal](media/active-directory-b2c-how-to-enable-billing/portal-mau-04-confirm-change-to-mau.png)
5252

5353
### What to expect when you transition to MAU billing from per-authentication billing
5454

articles/active-directory-b2c/active-directory-b2c-tutorials-spa.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,9 @@ The sample supports sign-up, sign-in, profile editing, and password reset. This
111111
112112
### Sign up using an email address
113113
114+
> [!WARNING]
115+
> After sign-up or sign-in, you might see an [insufficient permissions error](#error-insufficient-permissions). Due to the code sample's current implementation, this error is expected. This issue will be resolved in a future version of the code sample, at which time this warning will be removed.
116+
114117
1. Select **Login** to initiate the *B2C_1_signupsignin1* user flow you specified in an earlier step.
115118
1. Azure AD B2C presents a sign-in page with a sign-up link. Since you don't yet have an account, select the **Sign up now** link.
116119
1. The sign-up workflow presents a page to collect and verify the user's identity using an email address. The sign-up workflow also collects the user's password and the requested attributes defined in the user flow.
@@ -127,15 +130,15 @@ You can now use your email address and password to sign in to the application.
127130
128131
### Error: insufficient permissions
129132
130-
After you sign in, the app displays an insufficient permissions error - this is **expected**:
133+
After you sign in, the application may return an insufficient permissions error:
131134
132135
```Output
133136
ServerError: AADB2C90205: This application does not have sufficient permissions against this web resource to perform the operation.
134137
Correlation ID: ce15bbcc-0000-0000-0000-494a52e95cd7
135138
Timestamp: 2019-07-20 22:17:27Z
136139
```
137140
138-
You receive this error because the web application is attempting to access a web API protected by the demo directory, *fabrikamb2c*. Because your access token is valid only for your Azure AD directory, the API call is therefore unauthorized.
141+
You receive this error because the web application is attempting to access a web API protected by the demo directory, *fabrikamb2c*. Because your access token is valid only for your Azure AD directory, the API call is unauthorized.
139142
140143
To fix this error, continue on to the next tutorial in the series (see [Next steps](#next-steps)) to create a protected web API for your directory.
141144

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ The following are sample test cases for passwordless authentication with securit
183183
| The user can sign in with FIDO2 device (1809) | User can select Security Key from sign in window, and successfully sign in. |
184184
| The user can register FIDO2 device (1903) | User can register FIDO2 device at Settings > Accounts > sign in options > Security Key |
185185
| The user can reset FIDO2 device (1903) | User can reset FIDO2 device at Settings > Accounts > sign in options > Security Key |
186-
| The user can sign in with FIDO2 device (1809) | User can select Security Key from sign in window, and successfully sign in. |
186+
| The user can sign in with FIDO2 device (1903) | User can select Security Key from sign in window, and successfully sign in. |
187187

188188
**Passwordless FIDO sign in to Azure AD web apps**
189189

articles/active-directory/develop/migrate-objc-adal-msal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ There are two ways to provide scopes in MSAL:
7171

7272
* Provide a list of all the permissions your apps needs. For example:
7373

74-
`@[@"https://graph.microsot.com/directory.read", @"https://graph.microsoft.com/directory.write"]`
74+
`@[@"https://graph.microsoft.com/directory.read", @"https://graph.microsoft.com/directory.write"]`
7575

7676
In this case, the app requests the `directory.read` and `directory.write` permissions. The user will be asked to consent for those permissions if they haven't consented to them before for this app. The application might also receive additional permissions that the user has already consented to for the application. The user will only be prompted to consent for new permissions, or permissions that haven't been granted.
7777

articles/active-directory/develop/msal-js-known-issues-ie-edge-browsers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Known issues on browsers (Microsoft Authentication Library for JavaScript)
2+
title: Known issues on Internet Explorer and Microsoft Edge (MSAL for JavaScript)
33
titleSuffix: Microsoft identity platform
44
description: Learn about know issues when using the Microsoft Authentication Library for JavaScript (MSAL.js) with Internet Explorer and Microsoft Edge browsers.
55
services: active-directory

articles/active-directory/develop/msal-js-known-issues-safari-browser.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Known issues on browsers (Microsoft Authentication Library for JavaScript)
2+
title: Known issues on Safari browser (MSAL for JavaScript)
33
titleSuffix: Microsoft identity platform
44
description: Learn about know issues when using the Microsoft Authentication Library for JavaScript (MSAL.js) with Safari browser.
55
services: active-directory

articles/active-directory/develop/quickstart-v2-android.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.date: 09/16/2019
1717
ms.author: twhitney
18-
ms.custom: aaddev, identityplatformtop40
18+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:Android
1919
#Customer intent: As an application developer, I want to learn how Android native apps can call protected APIs that require login and access tokens using the Microsoft identity platform endpoint.
2020
ms.collection: M365-identity-device-management
2121
---

articles/active-directory/develop/quickstart-v2-aspnet-webapp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.tgt_pltfrm: na
1616
ms.workload: identity
1717
ms.date: 04/11/2019
1818
ms.author: jmprieur
19-
ms.custom: aaddev, identityplatformtop40
19+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:ASP.NET
2020
#Customer intent: As an application developer, I want to know how to write an ASP.NET web app that can sign in personal accounts, as well as work and school accounts from any Azure Active Directory instance.
2121
ms.collection: M365-identity-device-management
2222
---

articles/active-directory/develop/quickstart-v2-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.workload: identity
1616
ms.date: 09/24/2019
1717
ms.author: twhitney
1818
ms.reviewer: jmprieur, saeeda
19-
ms.custom: aaddev, identityplatformtop40
19+
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:iOS
2020
#Customer intent: As an application developer, I want to learn how to sign in users and call Microsoft Graph from my iOS or macOS application.
2121
ms.collection: M365-identity-device-management
2222
---

0 commit comments

Comments
 (0)