Skip to content

Commit cbc5722

Browse files
author
BobbySchmidt2
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into use-key-vault-references-dotnet-core
2 parents fce4c30 + b55fa63 commit cbc5722

File tree

382 files changed

+8940
-4790
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

382 files changed

+8940
-4790
lines changed

.openpublishing.redirection.json

Lines changed: 56 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,12 @@
6262
},
6363
{
6464
"source_path": "articles/machine-learning/data-science-virtual-machine/dsvm-tools-overview.md",
65-
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/overview#included",
65+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/tools-included",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "articles/machine-learning/data-science-virtual-machine/reference-windows-vm.md",
70+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/tools-included",
6671
"redirect_document_id": false
6772
},
6873
{
@@ -1070,6 +1075,51 @@
10701075
"redirect_url": "/azure/cognitive-services/face/overview",
10711076
"redirect_document_id": true
10721077
},
1078+
{
1079+
"source_path": "articles/cognitive-services/translator-speech/quickstarts/csharp.md",
1080+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-translator-speech-api",
1081+
"redirect_document_id": false
1082+
},
1083+
{
1084+
"source_path": "articles/cognitive-services/translator-speech/quickstarts/java.md",
1085+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-translator-speech-api",
1086+
"redirect_document_id": false
1087+
},
1088+
{
1089+
"source_path": "articles/cognitive-services/translator-speech/quickstarts/nodejs.md",
1090+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-translator-speech-api",
1091+
"redirect_document_id": false
1092+
},
1093+
{
1094+
"source_path": "articles/cognitive-services/translator-speech/quickstarts/python.md",
1095+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-translator-speech-api",
1096+
"redirect_document_id": false
1097+
},
1098+
{
1099+
"source_path": "articles/cognitive-services/translator-speech/languages.md",
1100+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-translator-speech-api",
1101+
"redirect_document_id": false
1102+
},
1103+
{
1104+
"source_path": "articles/cognitive-services/translator-speech/languages-reference.md",
1105+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-translator-speech-api",
1106+
"redirect_document_id": false
1107+
},
1108+
{
1109+
"source_path": "articles/cognitive-services/translator-speech/overview.md",
1110+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-translator-speech-api",
1111+
"redirect_document_id": false
1112+
},
1113+
{
1114+
"source_path": "articles/cognitive-services/translator-speech/reference.md",
1115+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-translator-speech-api",
1116+
"redirect_document_id": false
1117+
},
1118+
{
1119+
"source_path": "articles/cognitive-services/translator-speech/tutorial-translator-speech-csharp.md",
1120+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-migrate-from-translator-speech-api",
1121+
"redirect_document_id": true
1122+
},
10731123
{
10741124
"source_path": "articles/machine-learning/service/how-to-deploy-to-aks.md",
10751125
"redirect_url": "/azure/machine-learning/service/how-to-deploy-and-where",
@@ -1920,6 +1970,11 @@
19201970
"redirect_url": "/azure/cosmos-db/sql-api-get-started",
19211971
"redirect_document_id": false
19221972
},
1973+
{
1974+
"source_path": "articles/search/search-traffic-analytics.md",
1975+
"redirect_url": "/azure/search/search-monitor-usage",
1976+
"redirect_document_id": false
1977+
},
19231978
{
19241979
"source_path": "articles/search/knowledge-store-howto.md",
19251980
"redirect_url": "/azure/search/knowledge-store-create-rest",

articles/active-directory-b2c/active-directory-b2c-tutorials-spa-webapi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ git clone https://github.com/Azure-Samples/active-directory-b2c-dotnetcore-webap
6666

6767
### Configure the web API
6868

69-
1. Open the *B2C-WebApi/**appsettings.json*** file in Visual Studio or Visual Studio Code.
69+
1. Open the <em>B2C-WebApi/**appsettings.json**</em> file in Visual Studio or Visual Studio Code.
7070
1. Modify the `AzureAdB2C` block to reflect your tenant name, the application ID of the web API application, the name of your sign-up/sign-in policy, and the scopes you defined earlier. The block should look similar to the following example (with appropriate `Tenant` and `ClientId` values):
7171

7272
```json

articles/active-directory-b2c/active-directory-b2c-ui-customization-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Validate that you're ready by performing the following steps:
114114

115115
To configure UI customization, you copy the **ContentDefinition** and its child elements from the base file to the extensions file.
116116

117-
1. Open the base file of your policy. For example, *`SocialAndLocalAccounts/`**`TrustFrameworkBase.xml`***. This is one of the policy files included in the custom policy starter pack, which you should have obtained in the prerequisite, [Get started with custom policies](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-get-started-custom).
117+
1. Open the base file of your policy. For example, <em>`SocialAndLocalAccounts/`**`TrustFrameworkBase.xml`**</em>. This is one of the policy files included in the custom policy starter pack, which you should have obtained in the prerequisite, [Get started with custom policies](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-get-started-custom).
118118
1. Search for and copy the entire contents of the **ContentDefinitions** element.
119119
1. Open the extension file. For example, *TrustFrameworkExtensions.xml*. Search for the **BuildingBlocks** element. If the element doesn't exist, add it.
120120
1. Paste the entire contents of the **ContentDefinitions** element that you copied as a child of the **BuildingBlocks** element.

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -553,7 +553,7 @@
553553
- name: Authentication
554554
items:
555555
- name: Authentication basics
556-
href: authentication-scenarios.md
556+
href: v1-authentication-scenarios.md
557557
- name: OAuth 2.0 and OpenID Connect protocols
558558
items:
559559
- name: OpenID Connect

articles/active-directory/develop/access-tokens.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -112,8 +112,11 @@ Claims are present only if a value exists to fill it. So, your app shouldn't tak
112112
| `ver` | String, either `1.0` or `2.0` | Indicates the version of the access token. |
113113

114114

115-
> [!Groups overage claim]
115+
> [!NOTE]
116+
> **Groups overage claim**
117+
>
116118
> To ensure that the token size doesn’t exceed HTTP header size limits, Azure AD limits the number of object Ids that it includes in the groups claim. If a user is member of more groups than the overage limit (150 for SAML tokens, 200 for JWT tokens), then Azure AD does not emit the groups claim in the token. Instead, it includes an overage claim in the token that indicates to the application to query the Graph API to retrieve the user’s group membership.
119+
```csharp
117120
{
118121
...
119122
"_claim_names": {
@@ -124,9 +127,11 @@ Claims are present only if a value exists to fill it. So, your app shouldn't tak
124127
"src1": {
125128
"endpoint":"[Graph Url to get this user's group membership from]"
126129
}
127-
}
130+
}
131+
}
128132
...
129-
}
133+
}
134+
```
130135
> You can use the `BulkCreateGroups.ps1` provided in the [App Creation Scripts](https://github.com/Azure-Samples/active-directory-dotnet-webapp-groupclaims/blob/master/AppCreationScripts/) folder to help test overage scenarios.
131136
132137
#### v1.0 basic claims

articles/active-directory/develop/active-directory-authentication-libraries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,5 +81,5 @@ In this scenario, a developer has a web application running on a server that nee
8181
## See Also
8282

8383
- [The Azure Active Directory developer's guide](v1-overview.md)
84-
- [Authentication scenarios for Azure Active directory](authentication-scenarios.md)
84+
- [Authentication scenarios for Azure Active directory](v1-authentication-scenarios.md)
8585
- [Azure Active Directory code samples](sample-v1-code.md)

articles/active-directory/develop/active-directory-devhowto-adal-error-handling.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Fundamentally, there are two cases of AcquireTokenSilent errors:
5151
| Case | Description |
5252
|------|-------------|
5353
| **Case 1**: Error is resolvable with an interactive sign-in | For errors caused by a lack of valid tokens, an interactive request is necessary. Specifically, cache lookup and an invalid/expired refresh token require an AcquireToken call to resolve.<br><br>In these cases, the end user needs to be prompted to sign in. The application can choose to do an interactive request immediately, after end-user interaction (such as hitting a sign-in button), or later. The choice depends on the desired behavior of the application.<br><br>See the code in the following section for this specific case and the errors that diagnose it.|
54-
| **Case 2**: Error is not resolvable with an interactive sign-in | For network and transient/temporary errors, or other failures, performing an interactive AcquireToken request does not resolve the issue. Unnecessary interactive sign-in prompts can also frustrate end users. ADAL automatically attempts a single retry for most errors on AcquireTokenSilent failures.<br><br>The client application can also attempt a retry at some later point, but when and how to do it is dependent on the application behavior and desired end-user experience. For example, the application can do an AcquireTokenSilent retry after a few minutes, or in response to some end-user action. An immediate retry will result in the application being throttled, and should not be attempted.<br><br>A subsequent retry failing with the same error does not mean the client should do an interactive request using AcquireToken, as it does not resolve the error.<br><br>See the code in the following section for this specific case and the errors that diagnose it. |
54+
| **Case 2**: Error is not resolvable with an interactive sign-in | For network and transient/temporary errors, or other failures, performing an interactive AcquireToken request does not resolve the issue. Unnecessary interactive sign-in prompts can also frustrate end users. ADAL automatically attempts a single retry for most errors on AcquireTokenSilent failures.<br><br>The client application can also attempt a retry at some later point, but when and how is dependent on the application behavior and desired end-user experience. For example, the application can do an AcquireTokenSilent retry after a few minutes, or in response to some end-user action. An immediate retry will result in the application being throttled, and should not be attempted.<br><br>A subsequent retry failing with the same error does not mean the client should do an interactive request using AcquireToken, as it does not resolve the error.<br><br>See the code in the following section for this specific case and the errors that diagnose it. |
5555

5656
### .NET
5757

@@ -196,7 +196,7 @@ Error handling in native applications can be defined by two cases:
196196
197197
| | |
198198
|------|-------------|
199-
| **Case 1**:<br>Non-Retryable Error (most cases) | 1. Do not attempt immediate retry. Present the end-user UI based on the specific error that invokes a retry ("Try to Sign in again", "Download Azure AD broker application", etc). |
199+
| **Case 1**:<br>Non-Retryable Error (most cases) | 1. Do not attempt immediate retry. Present the end-user UI based on the specific error that invokes a retry (for example, "Try to Sign in again" or "Download Azure AD broker application"). |
200200
| **Case 2**:<br>Retryable Error | 1. Perform a single retry as the end user may have entered a state that results in a success.<br><br>2. If retry fails, present the end-user UI based on the specific error that invokes a retry ("Try to Sign in again", "Download Azure AD broker app", etc.). |
201201
202202
> [!IMPORTANT]
@@ -208,9 +208,9 @@ Error handling in native applications can be defined by two cases:
208208
The following guidance provides examples for error handling in conjunction with all non-silent AcquireToken(…) ADAL methods, *except*:
209209
210210
- AcquireTokenAsync(…, IClientAssertionCertification, …)
211-
- AcquireTokenAsync(…,ClientCredential, …)
212-
- AcquireTokenAsync(…,ClientAssertion, …)
213-
- AcquireTokenAsync(…,UserAssertion,…)
211+
- AcquireTokenAsync(…, ClientCredential, …)
212+
- AcquireTokenAsync(…, ClientAssertion, …)
213+
- AcquireTokenAsync(…, UserAssertion,…)
214214
215215
Your code would be implemented as follows:
216216
@@ -478,8 +478,8 @@ We've built a [complete sample](https://github.com/Azure-Samples/active-director
478478
479479
## Error and logging reference
480480
481-
### Logging Personal Identifiable Information (PII) & Organizational Identifiable Information (OII)
482-
By default, ADAL logging does not capture or log any PII or OII. The library allows app developers to turn this on through a setter in the Logger class. By turning on PII or OII, the app takes responsibility for safely handling highly-sensitive data and complying with any regulatory requirements.
481+
### Logging Personal Identifiable Information & Organizational Identifiable Information
482+
By default, ADAL logging does not capture or log any personal identifiable information or organizational identifiable information. The library allows app developers to turn this on through a setter in the Logger class. By logging personal identifiable information or organizational identifiable information, the app takes responsibility for safely handling highly sensitive data and complying with any regulatory requirements.
483483
484484
### .NET
485485
@@ -587,7 +587,7 @@ Use the comments section that follows, to provide feedback and help us refine an
587587
<!--Reference style links -->
588588
589589
[AAD-Auth-Libraries]: ./active-directory-authentication-libraries.md
590-
[AAD-Auth-Scenarios]:authentication-scenarios.md
590+
[AAD-Auth-Scenarios]:v1-authentication-scenarios.md
591591
[AAD-Dev-Guide]:azure-ad-developers-guide.md
592592
[AAD-Integrating-Apps]:quickstart-v1-integrate-apps-with-azure-ad.md
593593
[AZURE-portal]: https://portal.azure.com

articles/active-directory/develop/active-directory-graph-api-quickstart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ For the purposes of this Quickstart guide, you can use the Fiddler Web Debugger
8383

8484
In the example below, you use Fiddler Web Debugger to create a new security group ‘MyTestGroup’ in your Azure AD directory.
8585

86-
**Obtain an access token**: To access Azure AD Graph, clients are required to successfully authenticate to Azure AD first. For more information, see [Authentication scenarios for Azure AD](authentication-scenarios.md).
86+
**Obtain an access token**: To access Azure AD Graph, clients are required to successfully authenticate to Azure AD first. For more information, see [Authentication scenarios for Azure AD](v1-authentication-scenarios.md).
8787

8888
**Compose and run a query**: Complete the following steps:
8989

articles/active-directory/develop/active-directory-how-to-integrate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ There are several ways for your application to integrate with Azure AD. Take adv
3333

3434
### Support Azure AD as a way to sign in to your application
3535

36-
**Reduce sign in friction and reduce support costs.** By using Azure AD to sign in to your application, your users won't have one more name and password to remember. As a developer, you'll have one less password to store and protect. Not having to handle forgotten password resets may be a significant savings alone. Azure AD powers sign in for some of the world's most popular cloud applications, including Office 365 and Microsoft Azure. With hundreds of millions users from millions of organizations, chances are your user is already signed in to Azure AD. Learn more about [adding support for Azure AD sign in](authentication-scenarios.md).
36+
**Reduce sign in friction and reduce support costs.** By using Azure AD to sign in to your application, your users won't have one more name and password to remember. As a developer, you'll have one less password to store and protect. Not having to handle forgotten password resets may be a significant savings alone. Azure AD powers sign in for some of the world's most popular cloud applications, including Office 365 and Microsoft Azure. With hundreds of millions users from millions of organizations, chances are your user is already signed in to Azure AD. Learn more about [adding support for Azure AD sign in](v1-authentication-scenarios.md).
3737

3838
**Simplify sign up for your application.** During sign up for your application, Azure AD can send essential information about a user so that you can pre-fill your sign up form or eliminate it completely. Users can sign up for your application using their Azure AD account via a familiar consent experience similar to those found in social media and mobile applications. Any user can sign up and sign in to an application that is integrated with Azure AD without requiring IT involvement. Learn more about [signing-up your application for Azure AD Account login](../../app-service/configure-authentication-provider-aad.md).
3939

@@ -93,5 +93,5 @@ Integration with Azure AD comes with benefits that do not require you to write a
9393

9494
[Get started writing code](v2-overview.md#getting-started).
9595

96-
[Sign users in using Microsoft identity platform](authentication-scenarios.md)
96+
[Sign users in using Microsoft identity platform](v1-authentication-scenarios.md)
9797

articles/active-directory/develop/app-types.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,4 +78,4 @@ Each scenario listed in this document includes a subsection that describes its p
7878

7979
## Next steps
8080

81-
- Learn more about other Azure AD [authentication basics](authentication-scenarios.md)
81+
- Learn more about other Azure AD [authentication basics](v1-authentication-scenarios.md)

0 commit comments

Comments
 (0)