Skip to content

Commit cb91143

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-monitor-notactions
2 parents 2a64d94 + ababa61 commit cb91143

File tree

220 files changed

+4568
-2758
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

220 files changed

+4568
-2758
lines changed

.openpublishing.redirection.json

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1756,6 +1756,11 @@
17561756
"redirect_url": "/azure/cosmos-db/conflict-resolution-policies",
17571757
"redirect_document_id": true
17581758
},
1759+
{
1760+
"source_path": "articles/cosmos-db/how-to-custom-synchronization.md",
1761+
"redirect_url": "/azure/cosmos-db/how-to-multi-master",
1762+
"redirect_document_id": true
1763+
},
17591764
{
17601765
"source_path": "articles/cosmos-db/create-sql-api-dotnet-preview.md",
17611766
"redirect_url": "/azure/cosmos-db/create-sql-api-dotnet",
@@ -39782,9 +39787,29 @@
3978239787
},
3978339788
{
3978439789
"source_path": "articles/application-insights/app-insights-troubleshoot-faq.md",
39785-
"redirect_url": "/azure/azure-monitor/app/troubleshoot-faq",
39790+
"redirect_url": "/azure/azure-monitor/faq",
3978639791
"redirect_document_id": true
3978739792
},
39793+
{
39794+
"source_path": "articles/azure-monitor/app/troubleshoot-faq.md",
39795+
"redirect_url": "/azure/azure-monitor/faq",
39796+
"redirect_document_id": false
39797+
},
39798+
{
39799+
"source_path": "articles/azure-monitor/platform/log-faq.md",
39800+
"redirect_url": "/azure/azure-monitor/faq",
39801+
"redirect_document_id": false
39802+
},
39803+
{
39804+
"source_path": "articles/azure-monitor/insights/container-insights-faq.md",
39805+
"redirect_url": "/azure/azure-monitor/faq",
39806+
"redirect_document_id": false
39807+
},
39808+
{
39809+
"source_path": "articles/azure-monitor/insights/vminsights-faq.md",
39810+
"redirect_url": "/azure/azure-monitor/faq",
39811+
"redirect_document_id": false
39812+
},
3978839813
{
3978939814
"source_path": "articles/application-insights/app-insights-usage-cohorts.md",
3979039815
"redirect_url": "/azure/azure-monitor/app/usage-cohorts",
@@ -46555,6 +46580,11 @@
4655546580
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/overview",
4655646581
"redirect_document_id": false
4655746582
},
46583+
{
46584+
"source_path": "articles/load-balancer/load-balancer-standard-overview.md",
46585+
"redirect_url": "/azure/load-balancer/load-balancer-overview",
46586+
"redirect_document_id": false
46587+
},
4655846588
{
4655946589
"source_path": "articles/load-balancer/load-balancer-arm.md",
4656046590
"redirect_url": "/azure/load-balancer/load-balancer-overview",

articles/active-directory-b2c/active-directory-b2c-setup-goog-app.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,14 @@ ms.subservice: B2C
1818

1919
## Create a Google application
2020

21-
To use a Google account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your tenant that represents it. If you don't already have a Google account you can sign up at [https://accounts.google.com/SignUp](https://accounts.google.com/SignUp).
21+
To use a Google account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your Google Developers Console. If you don't already have a Google account you can sign up at [https://accounts.google.com/SignUp](https://accounts.google.com/SignUp).
2222

2323
1. Sign in to the [Google Developers Console](https://console.developers.google.com/) with your Google account credentials.
2424
1. In the upper-left corner of the page, select the project list, and then select **New Project**.
25-
1. Enter a **Project Name**, click **Create**, and then make sure you are using the new project.
25+
1. Enter a **Project Name**, select **Create**.
26+
1. Make sure you are using the new project by selecting the project drop-down in the top-left of the screen, select your project by name, then select **Open**.
27+
1. Select **OAuth consent screen** in the left menu, select **External**, and then select **Create**.
28+
Enter a **Name** for your application. Enter *b2clogin.com* in the **Authorized domains** section and select **Save**.
2629
1. Select **Credentials** in the left menu, and then select **Create credentials** > **Oauth client ID**.
2730
1. Under **Application type**, select **Web application**.
2831
1. Enter a **Name** for your application, enter `https://your-tenant-name.b2clogin.com` in **Authorized JavaScript origins**, and `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Authorized redirect URIs**. Replace `your-tenant-name` with the name of your tenant. You need to use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C.

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -122,10 +122,10 @@ The technical profile also returns claims, that aren't returned by the identity
122122
| --------- | -------- | ----------- |
123123
| ServiceUrl | Yes | The URL of the REST API endpoint. |
124124
| AuthenticationType | Yes | The type of authentication being performed by the RESTful claims provider. Possible values: `None`, `Basic`, `Bearer`, or `ClientCertificate`. The `None` value indicates that the REST API is not anonymous. The `Basic` value indicates that the REST API is secured with HTTP basic authentication. Only verified users, including Azure AD B2C, can access your API. The `ClientCertificate` (recommended) value indicates that the REST API restricts access by using client certificate authentication. Only services that have the appropriate certificates, for example Azure AD B2C, can access your API. The `Bearer` value indicates that the REST API restricts access using client OAuth2 Bearer token. |
125-
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. |
125+
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. The HTTP verbs invoked by each are as follows:<br /><ul><li>`Body`: POST</li><li>`Form`: POST</li><li>`Header`: GET</li><li>`QueryString`: GET</li></ul> |
126126
| ClaimsFormat | No | Specifies the format for the output claims. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the output claim that is sent in the request body in JSON format. The `Form` value is the output claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the output claim that is sent in the request header. The `QueryString` value is the output claim that is sent in the request query string. |
127127
| ClaimUsedForRequestPayload| No | Name of a string claim that contains the payload to be sent to the REST API. |
128-
| DebugMode | No | Runs the technical profile in debug mode. In debug mode, the REST API can return more information. See the returning error message section. |
128+
| DebugMode | No | Runs the technical profile in debug mode. Possible values: `true`, or `false` (default). In debug mode, the REST API can return more information. See the [Returning error message](#returning-error-message) section. |
129129

130130
## Cryptographic keys
131131

@@ -212,7 +212,7 @@ If the type of authentication is set to `Bearer`, the **CryptographicKeys** elem
212212

213213
## Returning error message
214214

215-
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. In an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
215+
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. If an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
216216

217217
| Attribute | Required | Description |
218218
| --------- | -------- | ----------- |

articles/active-directory/develop/msal-js-pass-custom-state-authentication-request.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
1212
ms.workload: identity
13-
ms.date: 05/29/2019
13+
ms.date: 01/16/2020
1414
ms.author: twhitney
1515
ms.reviewer: saeeda
1616
ms.custom: aaddev
@@ -19,6 +19,7 @@ ms.collection: M365-identity-device-management
1919
---
2020

2121
# Pass custom state in authentication requests using MSAL.js
22+
2223
The *state* parameter, as defined by OAuth 2.0, is included in an authentication request and is also returned in the token response to prevent cross-site request forgery attacks. By default, Microsoft Authentication Library for JavaScript (MSAL.js) passes a randomly generated unique *state* parameter value in the authentication requests.
2324

2425
The state parameter can also be used to encode information of the app's state before redirect. You can pass the user's state in the app, such as the page or view they were on, as input to this parameter. The MSAL.js library allows you to pass your custom state as state parameter in the `Request` object:
@@ -37,9 +38,17 @@ export type AuthenticationParameters = {
3738
account?: Account;
3839
sid?: string;
3940
loginHint?: string;
41+
forceRefresh?: boolean;
4042
};
4143
```
4244

45+
> [!Note]
46+
> If you would like to skip a cached token and go to the server, please pass in the boolean `forceRefresh` into the AuthenticationParameters object used to make a login/token request.
47+
> `forceRefresh` should not be used by default, because of the performance impact on your application.
48+
> Relying on the cache will give your users a better experience.
49+
> Skipping the cache should only be used in scenarios where you know the currently cached data does not have up-to-date information.
50+
> Such as an Admin tool that adds roles to a user that needs to get a new token with updated roles.
51+
4352
For example:
4453

4554
```javascript

articles/active-directory/devices/hybrid-azuread-join-federated-domains.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155,6 +155,9 @@ If some of your domain-joined devices are Windows downlevel devices, you must:
155155
- Configure the local intranet settings for device registration
156156
- Install Microsoft Workplace Join for Windows downlevel computers
157157

158+
> [!NOTE]
159+
> Windows 7 support ended on January 14, 2020. For more information, [Support for Windows 7 has ended](https://support.microsoft.com/en-us/help/4057281/windows-7-support-ended-on-january-14-2020).
160+
158161
### Configure the local intranet settings for device registration
159162

160163
To successfully complete hybrid Azure AD join of your Windows downlevel devices and to avoid certificate prompts when devices authenticate to Azure AD, you can push a policy to your domain-joined devices to add the following URLs to the local intranet zone in Internet Explorer:

articles/active-directory/devices/hybrid-azuread-join-managed-domains.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -133,6 +133,9 @@ If some of your domain-joined devices are Windows downlevel devices, you must:
133133
- Configure seamless SSO
134134
- Install Microsoft Workplace Join for Windows downlevel computers
135135

136+
> [!NOTE]
137+
> Windows 7 support ended on January 14, 2020. For more information, [Support for Windows 7 has ended](https://support.microsoft.com/en-us/help/4057281/windows-7-support-ended-on-january-14-2020).
138+
136139
### Configure the local intranet settings for device registration
137140

138141
To successfully complete hybrid Azure AD join of your Windows downlevel devices and to avoid certificate prompts when devices authenticate to Azure AD, you can push a policy to your domain-joined devices to add the following URLs to the local intranet zone in Internet Explorer:

articles/active-directory/devices/hybrid-azuread-join-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ For devices running the Windows desktop operating system, supported version are
6161
### Windows down-level devices
6262

6363
- Windows 8.1
64-
- Windows 7. For support information on Windows 7, see [Support for Windows 7 is ending](https://www.microsoft.com/microsoft-365/windows/end-of-windows-7-support).
64+
- Windows 7 support ended on January 14, 2020. For more information, see [Support for Windows 7 has ended](https://support.microsoft.com/en-us/help/4057281/windows-7-support-ended-on-january-14-2020).
6565
- Windows Server 2012 R2
6666
- Windows Server 2012
6767
- Windows Server 2008 R2. For support information on Windows Server 2008 and 2008 R2, see [Prepare for Windows Server 2008 end of support](https://www.microsoft.com/cloud-platform/windows-server-2008).

articles/active-directory/manage-apps/application-proxy-qlik.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Follow these steps to publish your app. For a more detailed walkthrough of steps
4747
### Application #2:
4848
Follow the same steps as for Application #1, with the following exceptions:
4949

50-
**Step #5**: The Internal URL should now be the QlikSense URL with the authentication port used by the application. The default is **4244** for HTTPS, and 4248 for HTTP. Ex: **https&#58;//demo.qlik.com:4244**</br></br>
50+
**Step #5**: The Internal URL should now be the QlikSense URL with the authentication port used by the application. The default is **4244** for HTTPS, and **4248** for HTTP for QlikSense releases prior to April 2018. The default for QlikSense releases after April 2018 is **443** for HTTPS and **80** for HTTP. Ex: **https&#58;//demo.qlik.com:4244**</br></br>
5151
**Step #10:** Don’t set up SSO, and leave the **Single sign-on disabled**
5252

5353

0 commit comments

Comments
 (0)