Skip to content

Commit cfa3103

Browse files
author
Glenn Gailey
committed
Merge branch 'patch-4' of https://github.com/ggailey777/azure-docs-pr into storage
2 parents ed2bf87 + fd791da commit cfa3103

File tree

753 files changed

+8619
-4746
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

753 files changed

+8619
-4746
lines changed

.openpublishing.publish.config.json

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -151,17 +151,17 @@
151151
"url": "https://github.com/Azure-Samples/functions-python-tensorflow-tutorial",
152152
"branch": "master",
153153
"branch_mapping": {}
154-
},
154+
},
155155
{
156156
"path_to_root": "functions-quickstart-templates",
157157
"url": "https://github.com/Azure/azure-functions-templates",
158158
"branch": "dev"
159-
},
159+
},
160160
{
161161
"path_to_root": "functions-docs-csharp",
162162
"url": "https://github.com/Azure-Samples/functions-docs-csharp",
163163
"branch": "master"
164-
},
164+
},
165165
{
166166
"path_to_root": "functions-docs-javascript",
167167
"url": "https://github.com/Azure-Samples/functions-docs-javascript",
@@ -171,12 +171,12 @@
171171
"path_to_root": "functions-docs-typescript",
172172
"url": "https://github.com/Azure-Samples/functions-docs-typescript",
173173
"branch": "master"
174-
},
174+
},
175175
{
176176
"path_to_root": "functions-docs-python",
177177
"url": "https://github.com/Azure-Samples/functions-docs-python",
178178
"branch": "master"
179-
},
179+
},
180180
{
181181
"path_to_root": "functions-docs-powershell",
182182
"url": "https://github.com/Azure-Samples/functions-docs-powershell",
@@ -186,6 +186,11 @@
186186
"url": "https://github.com/Azure-Samples/cognitive-services-personalizer-samples",
187187
"branch": "master"
188188
},
189+
{
190+
"path_to_root": "samples-cognitive-services-data-files",
191+
"url": "https://github.com/Azure-Samples/cognitive-services-sample-data-files",
192+
"branch": "master"
193+
},
189194
{
190195
"path_to_root": "samples-luis",
191196
"url": "https://github.com/Azure-Samples/cognitive-services-language-understanding",

.openpublishing.redirection.json

Lines changed: 39 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1745,22 +1745,22 @@
17451745
},
17461746
{
17471747
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-quickstart.md",
1748-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1748+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-csharp",
17491749
"redirect_document_id": false
17501750
},
17511751
{
17521752
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-java-quickstart.md",
1753-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1753+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-java",
17541754
"redirect_document_id": false
17551755
},
17561756
{
17571757
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-node-quickstart.md",
1758-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1758+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-javascript",
17591759
"redirect_document_id": false
17601760
},
17611761
{
17621762
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-python-quickstart.md",
1763-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1763+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-python",
17641764
"redirect_document_id": false
17651765
},
17661766
{
@@ -6768,6 +6768,11 @@
67686768
"redirect_url": "/azure/logic-apps/logic-apps-using-sap-connector",
67696769
"redirect_document_id": true
67706770
},
6771+
{
6772+
"source_path": "articles/connectors/connectors-create-api-googledrive.md",
6773+
"redirect_url": "https://docs.microsoft.com/connectors/googledrive/",
6774+
"redirect_document_id": true
6775+
},
67716776
{
67726777
"source_path": "articles/logic-apps/custom-connector-build-web-api-app-tutorial.md",
67736778
"redirect_url": "https://docs.microsoft.com/connectors/custom-connectors/create-web-api-connector",
@@ -32613,6 +32618,21 @@
3261332618
"redirect_url": "/azure/cognitive-services/bing-web-search/language-support",
3261432619
"redirect_document_id": true
3261532620
},
32621+
{
32622+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-csharp-quick-start.md",
32623+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries?pivots=programming-language-csharp",
32624+
"redirect_document_id": false
32625+
},
32626+
{
32627+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-java-quickstart.md",
32628+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries?pivots=programming-language-java",
32629+
"redirect_document_id": false
32630+
},
32631+
{
32632+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-python-quickstart.md",
32633+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries?pivots=programming-language-python",
32634+
"redirect_document_id": false
32635+
},
3261632636
{
3261732637
"source_path": "articles/cognitive-services/Bing-Autosuggest/bing-autosuggest-supported-languages.md",
3261832638
"redirect_url": "/azure/cognitive-services/bing-autosuggest/language-support",
@@ -46669,6 +46689,11 @@
4666946689
"redirect_url": "/azure/active-directory-domain-services/tutorial-create-instance#update-dns-settings-for-the-azure-virtual-network",
4667046690
"redirect_document_id": false
4667146691
},
46692+
{
46693+
"source_path": "articles/active-directory/authentication/howto-password-ban-bad-configure.md",
46694+
"redirect_url": "/azure/active-directory/authentication/tutorial-configure-custom-password-protection",
46695+
"redirect_document_id": true
46696+
},
4667246697
{
4667346698
"source_path": "articles/media-services/previous/media-services-fmp4-live-ingest-overview.md",
4667446699
"redirect_url": "/azure/media-services/media-services-fmp4-live-ingest-overview",
@@ -49164,10 +49189,20 @@
4916449189
"redirect_url": "/azure/aks/aks-migration",
4916549190
"redirect_document_id": false
4916649191
},
49192+
{
49193+
"source_path": "articles/virtual-machines/workloads/sap/sap-hana-backup-storage-snapshots.md",
49194+
"redirect_url": "sap-hana-backup-guide",
49195+
"redirect_document_id": true
49196+
},
4916749197
{
4916849198
"source_path": "articles/service-fabric/service-fabric-cicd-your-linux-applications-with-jenkins.md",
4916949199
"redirect_url": "/azure/jenkins/service-fabric-cicd-your-linux-applications-with-jenkins",
4917049200
"redirect_document_id": true
49201+
},
49202+
{
49203+
"source_path": "articles/jenkins/install-jenkins-solution-template.md",
49204+
"redirect_url": "/azure/jenkins/install-solution-template-tutorial",
49205+
"redirect_document_id": true
4917149206
}
4917249207
]
4917349208
}

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/03/2020
12+
ms.date: 03/03/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -112,7 +112,7 @@ The self-asserted technical profile calls the validation **login-NonInteractive*
112112

113113
## CompareBooleanClaimToValue
114114

115-
Checks that boolean value of a claims is equal to `true` or `false`, and return the result of the compression.
115+
Checks that boolean value of a claim is equal to `true` or `false`, and return the result of the compression.
116116

117117
| Item | TransformationClaimType | Data Type | Notes |
118118
| ---- | ------------------------ | ---------- | ----- |

articles/active-directory-b2c/custom-policy-configure-user-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,7 @@ The following elements are used to define the claim:
259259
1. Sign in to the [Azure portal](https://portal.azure.com).
260260
2. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
261261
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
262-
4. Select **Identity Experience Framework (Preview)**.
262+
4. Select **Identity Experience Framework**.
263263
5. Select **Upload Custom Policy**, and then upload the two policy files that you changed.
264264
2. Select the sign-up or sign-in policy that you uploaded, and click the **Run now** button.
265265
3. You should be able to sign up using an email address.

articles/active-directory-b2c/custom-policy-reference-sso.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/27/2020
12+
ms.date: 03/02/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -120,20 +120,19 @@ This provider is used to suppress the "choose identity provider" screen. It is t
120120

121121
### SamlSSOSessionProvider
122122

123-
This provider is used for managing the Azure AD B2C SAML sessions between a relying party application or a federated SAML identity provider. When using the SSO provider for storing a SAML identity provider session, the `IncludeSessionIndex` and `RegisterServiceProviders` must be set to `false`. The following `SM-Saml-idp` technical profile is used by the [SAML technical profile](saml-technical-profile.md).
123+
This provider is used for managing the Azure AD B2C SAML sessions between a relying party application or a federated SAML identity provider. When using the SSO provider for storing a SAML identity provider session, the `RegisterServiceProviders` must be set to `false`. The following `SM-Saml-idp` technical profile is used by the [SAML technical profile](saml-technical-profile.md).
124124

125125
```XML
126126
<TechnicalProfile Id="SM-Saml-idp">
127127
<DisplayName>Session Management Provider</DisplayName>
128128
<Protocol Name="Proprietary" Handler="Web.TPEngine.SSO.SamlSSOSessionProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
129129
<Metadata>
130-
<Item Key="IncludeSessionIndex">false</Item>
131130
<Item Key="RegisterServiceProviders">false</Item>
132131
</Metadata>
133132
</TechnicalProfile>
134133
```
135134

136-
When using the provider for storing the B2C SAML session, the `IncludeSessionIndex` and `RegisterServiceProviders` must set to `true`. SAML session logout requires the `SessionIndex` and `NameID` to complete.
135+
When using the provider for storing the B2C SAML session, the `RegisterServiceProviders` must set to `true`. SAML session logout requires the `SessionIndex` and `NameID` to complete.
137136

138137
The following `SM-Saml-idp` technical profile is used by [SAML issuer technical profile](connect-with-saml-service-providers.md)
139138

@@ -147,7 +146,7 @@ The following `SM-Saml-idp` technical profile is used by [SAML issuer technical
147146

148147
| Attribute | Required | Description|
149148
| --- | --- | --- |
150-
| IncludeSessionIndex | No | Indicates to the provider that the session index should be stored. Possible values: `true` (default), or `false`.|
149+
| IncludeSessionIndex | No | Not currently used, can be ignored.|
151150
| RegisterServiceProviders | No | Indicates that the provider should register all SAML service providers that have been issued an assertion. Possible values: `true` (default), or `false`.|
152151

153152

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/24/2020
12+
ms.date: 03/03/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -122,8 +122,9 @@ The technical profile also returns claims, that aren't returned by the identity
122122
| --------- | -------- | ----------- |
123123
| ServiceUrl | Yes | The URL of the REST API endpoint. |
124124
| AuthenticationType | Yes | The type of authentication being performed by the RESTful claims provider. Possible values: `None`, `Basic`, `Bearer`, or `ClientCertificate`. The `None` value indicates that the REST API is not anonymous. The `Basic` value indicates that the REST API is secured with HTTP basic authentication. Only verified users, including Azure AD B2C, can access your API. The `ClientCertificate` (recommended) value indicates that the REST API restricts access by using client certificate authentication. Only services that have the appropriate certificates, for example Azure AD B2C, can access your API. The `Bearer` value indicates that the REST API restricts access using client OAuth2 Bearer token. |
125+
| AllowInsecureAuthInProduction| No| Indicates whether the `AuthenticationType` can be set to `none` in production environment (`DeploymentMode` of the [TrustFrameworkPolicy](trustframeworkpolicy.md) is set to `Production`, or not specified). Possible values: true, or false (default). |
125126
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. The HTTP verbs invoked by each are as follows:<br /><ul><li>`Body`: POST</li><li>`Form`: POST</li><li>`Header`: GET</li><li>`QueryString`: GET</li></ul> |
126-
| ClaimsFormat | No | Specifies the format for the output claims. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the output claim that is sent in the request body in JSON format. The `Form` value is the output claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the output claim that is sent in the request header. The `QueryString` value is the output claim that is sent in the request query string. |
127+
| ClaimsFormat | No | Not currently used, can be ignored. |
127128
| ClaimUsedForRequestPayload| No | Name of a string claim that contains the payload to be sent to the REST API. |
128129
| DebugMode | No | Runs the technical profile in debug mode. Possible values: `true`, or `false` (default). In debug mode, the REST API can return more information. See the [Returning error message](#returning-error-message) section. |
129130
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |

articles/active-directory-b2c/userjourneys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ The **OrchestrationStep** element contains the following attributes:
6060
| Attribute | Required | Description |
6161
| --------- | -------- | ----------- |
6262
| `Order` | Yes | The order of the orchestration steps. |
63-
| `Type` | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
63+
| `Type` | Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**GetClaims** - Indicates that the orchestration step reads the input claims.</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
6464
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples - if the type of the orchestration step is one of following: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`, Azure AD B2C needs to display the identity provider selection without having a technical profile. |
6565
| CpimIssuerTechnicalProfileReferenceId | No | The type of the orchestration step is `SendClaims`. This property defines the technical profile identifier of the claims provider that issues the token for the relying party. If absent, no relying party token is created. |
6666

articles/active-directory-domain-services/troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ If one or more users in your Azure AD tenant can't sign in to the Azure AD DS ma
134134
* You've deployed, or updated to, the [latest recommended release of Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
135135
* You've configured Azure AD Connect to [perform a full synchronization][hybrid-phs].
136136
* Depending on the size of your directory, it may take a while for user accounts and credential hashes to be available in Azure AD DS. Make sure you wait long enough before trying to authenticate against the managed domain.
137-
* If the issue persists after verifying the previous steps, try restarting the *Microsoft Azure AD Sync Service*. From your [management VM][management-vm], open a command prompt and run the following commands:
137+
* If the issue persists after verifying the previous steps, try restarting the *Microsoft Azure AD Sync Service*. From your Azure AD Connect server, open a command prompt and run the following commands:
138138

139139
```console
140140
net stop 'Microsoft Azure AD Sync'

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: conceptual
15-
ms.date: 02/18/2020
15+
ms.date: 03/01/2020
1616
ms.author: mimart
1717
ms.reviewer: arvinh
1818
ms.custom: aaddev;it-pro;seohack1
@@ -757,6 +757,7 @@ TLS 1.2 Cipher Suites minimum bar:
757757
Now that you have desidned your schema and understood the Azure AD SCIM implementation, you can get started developing your SCIM endpoint. Rather than starting from scratch and building the implementation completely on your own, you can rely on a number of open source SCIM libraries published by the SCIM commuinty.
758758
The open source .NET Core [reference code](https://aka.ms/SCIMReferenceCode) published by the Azure AD provisioning team is one such resource that can jump start your development. Once you've built your SCIM endpoint, you'll want to test it out. You can use the collection of [postman tests](https://github.com/AzureAD/SCIMReferenceCode/wiki/Test-Your-SCIM-Endpoint) provided as part of the reference code or run through the sample requests / responses provided [above](https://docs.microsoft.com/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups#user-operations).
759759

760+
Note: The reference code is intended to help you get started building your SCIM endpoint and is provided "AS IS." Contributions from the community are welcome to help build and maintain the code.
760761

761762
## Step 4: Integrate your SCIM endpoint with the Azure AD SCIM client
762763

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@
1313
href: tutorial-enable-azure-mfa.md
1414
- name: Enable password writeback to on-premises
1515
href: tutorial-enable-sspr-writeback.md
16+
- name: Configure custom banned password lists
17+
href: tutorial-configure-custom-password-protection.md
1618
- name: Integrate Azure Identity Protection
1719
href: tutorial-risk-based-sspr-mfa.md
1820
- name: Concepts
@@ -108,8 +110,6 @@
108110
href: howto-registration-mfa-sspr-combined-troubleshoot.md
109111
- name: Azure AD password protection
110112
items:
111-
- name: Configure the banned password list
112-
href: howto-password-ban-bad-configure.md
113113
- name: On-premises integration
114114
items:
115115
- name: Deploy Azure AD password protection

0 commit comments

Comments
 (0)