Skip to content

Commit d05d43e

Browse files
author
dksimpson
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into DKS-US1712683-bing-visual-search
2 parents fabdc5b + 081cb87 commit d05d43e

File tree

245 files changed

+3892
-2032
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

245 files changed

+3892
-2032
lines changed

.openpublishing.redirection.json

Lines changed: 67 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -17552,16 +17552,6 @@
1755217552
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-load-with-data-factory",
1755317553
"redirect_document_id": false
1755417554
},
17555-
{
17556-
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-security-threat-detection.md",
17557-
"redirect_url": "/azure/sql-database/sql-database-threat-detection-overview",
17558-
"redirect_document_id": false
17559-
},
17560-
{
17561-
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-auditing-overview.md",
17562-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17563-
"redirect_document_id": false
17564-
},
1756517555
{
1756617556
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-migrate-code.md",
1756717557
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-overview-develop",
@@ -17827,26 +17817,6 @@
1782717817
"redirect_url": "/azure/synapse-analytics/quickstart-create-sql-pool-portal",
1782817818
"redirect_document_id": false
1782917819
},
17830-
{
17831-
"source_path": "articles/sql-database/sql-database-auditing-get-started.md",
17832-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17833-
"redirect_document_id": false
17834-
},
17835-
{
17836-
"source_path": "articles/sql-database/sql-database-auditing-portal.md",
17837-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17838-
"redirect_document_id": false
17839-
},
17840-
{
17841-
"source_path": "articles/sql-database/sql-database-auditing-powershell.md",
17842-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17843-
"redirect_document_id": false
17844-
},
17845-
{
17846-
"source_path": "articles/sql-database/sql-database-auditing-rest.md",
17847-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17848-
"redirect_document_id": false
17849-
},
1785017820
{
1785117821
"source_path": "articles/sql-database/sql-database-build-multi-tenant-apps.md",
1785217822
"redirect_url": "/azure/sql-database/saas-tenancy-app-design-patterns",
@@ -18557,16 +18527,6 @@
1855718527
"redirect_url": "/azure/sql-database/sql-database-advanced-data-security",
1855818528
"redirect_document_id": false
1855918529
},
18560-
{
18561-
"source_path": "articles/sql-database/sql-database-threat-detection-get-started.md",
18562-
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
18563-
"redirect_document_id": false
18564-
},
18565-
{
18566-
"source_path": "articles/sql-database/sql-database-threat-detection-portal.md",
18567-
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
18568-
"redirect_document_id": false
18569-
},
1857018530
{
1857118531
"source_path": "articles/sql-database/sql-database-troubleshoot-backup-and-restore.md",
1857218532
"redirect_url": "/azure/sql-database/sql-database-recovery-using-backups",
@@ -19302,11 +19262,6 @@
1930219262
"redirect_url": "/azure/load-balancer/load-balancer-get-started-internet-portal",
1930319263
"redirect_document_id": false
1930419264
},
19305-
{
19306-
"source_path": "articles/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-rp.md",
19307-
"redirect_url": "/azure/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-resource-provider",
19308-
"redirect_document_id": false
19309-
},
1931019265
{
1931119266
"source_path": "articles/load-balancer/load-balancer-configure-sqlao.md",
1931219267
"redirect_url": "/azure/virtual-machines/windows/sql/virtual-machines-windows-portal-sql-alwayson-int-listener",
@@ -29647,11 +29602,6 @@
2964729602
"redirect_url": "/azure/data-factory/v1/data-factory-amazon-redshift-connector",
2964829603
"redirect_document_id": true
2964929604
},
29650-
{
29651-
"source_path": "articles/data-factory/connector-azure-sql-database-managed-insance.md",
29652-
"redirect_url": "/azure/data-factory/connector-azure-sql-database-managed-instance",
29653-
"redirect_document_id": false
29654-
},
2965529605
{
2965629606
"source_path": "articles/data-factory/how-to-read-write-partitioned-data.md",
2965729607
"redirect_url": "/azure/data-factory/tutorial-incremental-copy-overview",
@@ -32857,11 +32807,6 @@
3285732807
"redirect_url": "/azure/service-fabric/service-fabric-security-controls",
3285832808
"redirect_document_id": false
3285932809
},
32860-
{
32861-
"source_path": "articles/sql-database/sql-database-security-attributes.md",
32862-
"redirect_url": "/azure/sql-database/sql-database-security-controls",
32863-
"redirect_document_id": false
32864-
},
3286532810
{
3286632811
"source_path": "articles/storage/common/storage-security-attributes.md",
3286732812
"redirect_url": "/azure/storage/common/storage-security-controls",
@@ -52299,11 +52244,6 @@
5229952244
"redirect_url": "/azure/developer/terraform/",
5230052245
"redirect_document_id": false
5230152246
},
52302-
{
52303-
"source_path": "articles/sql-database/sql-database-auditing-and-threat-detection-powershell.md",
52304-
"redirect_url": "/azure/sql-database/scripts/sql-database-auditing-and-threat-detection-powershell",
52305-
"redirect_document_id": true
52306-
},
5230752247
{
5230852248
"source_path": "articles/media-services/azure-media-player/azure-media-player-license.md",
5230952249
"redirect_url": "/legal/azure-media-player/azure-media-player-license",
@@ -52428,6 +52368,72 @@
5242852368
"source_path":"articles/azure-monitor/app/alerts.md",
5242952369
"redirect_url":"/azure/azure-monitor/platform/alerts-log",
5243052370
"redirect_document_id": false
52371+
},
52372+
{
52373+
"source_path": "articles/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-rp.md",
52374+
"redirect_url": "/azure/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-resource-provider",
52375+
"redirect_document_id": false
52376+
},
52377+
{
52378+
"source_path": "articles/sql-database/sql-database-security-attributes.md",
52379+
"redirect_url": "/azure/sql-database/sql-database-security-controls",
52380+
"redirect_document_id": false
52381+
},
52382+
{
52383+
"source_path": "articles/data-factory/connector-azure-sql-database-managed-insance.md",
52384+
"redirect_url": "/azure/data-factory/connector-azure-sql-database-managed-instance",
52385+
"redirect_document_id": false
52386+
},
52387+
{
52388+
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-security-threat-detection.md",
52389+
"redirect_url": "/azure/sql-database/sql-database-threat-detection-overview",
52390+
"redirect_document_id": false
52391+
},
52392+
{
52393+
"source_path": "articles/sql-database/sql-database-threat-detection-get-started.md",
52394+
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
52395+
"redirect_document_id": false
52396+
},
52397+
{
52398+
"source_path": "articles/sql-database/sql-database-threat-detection-portal.md",
52399+
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
52400+
"redirect_document_id": false
52401+
},
52402+
{
52403+
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-auditing-overview.md",
52404+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52405+
"redirect_document_id": false
52406+
},
52407+
{
52408+
"source_path": "articles/sql-database/sql-database-auditing-get-started.md",
52409+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52410+
"redirect_document_id": false
52411+
},
52412+
{
52413+
"source_path": "articles/sql-database/sql-database-auditing-portal.md",
52414+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52415+
"redirect_document_id": false
52416+
},
52417+
{
52418+
"source_path": "articles/sql-database/sql-database-auditing-powershell.md",
52419+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52420+
"redirect_document_id": false
52421+
},
52422+
{
52423+
"source_path": "articles/sql-database/sql-database-auditing-rest.md",
52424+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52425+
"redirect_document_id": false
52426+
},
52427+
{
52428+
"source_path": "articles/sql-database/sql-database-auditing-and-threat-detection-powershell.md",
52429+
"redirect_url": "/azure/sql-database/scripts/sql-database-auditing-and-threat-detection-powershell",
52430+
"redirect_document_id": true
52431+
},
52432+
{
52433+
"source_path": "articles/cdn/endpoint-multiorigin.md",
52434+
"redirect_url": "/azure/cdn/cdn-overview",
52435+
"redirect_document_id": false
5243152436
}
52432-
]
52437+
52438+
]
5243352439
}

articles/active-directory-b2c/custom-policy-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ Next, specify that the application should be treated as a public client:
134134

135135
1. Under **Manage**, select **Authentication**.
136136
1. Select **Try out the new experience** (if shown).
137-
1. Under **Advanced settings**, enable **Treat application as a public client** (select **Yes**).
137+
1. Under **Advanced settings**, enable **Treat application as a public client** (select **Yes**). Ensure that **"allowPublicClient": true** is set in the application manifest.
138138
1. Select **Save**.
139139

140140
Now, grant permissions to the API scope you exposed earlier in the *IdentityExperienceFramework* registration:

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/20/2020
9+
ms.date: 05/20/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -30,7 +30,7 @@ Azure Multi-Factor Authentication can be used, and licensed, in a few different
3030
| EMS or Microsoft 365 E3 and E5 | EMS E3 or Microsoft 365 E3 (that includes EMS and Office 365), includes Azure AD Premium P1. EMS E5 or Microsoft 365 E5 includes Azure AD Premium P2. You can use the same Conditional Access features noted in the following sections to provide multi-factor authentication to users. |
3131
| Azure AD Premium P1 | You can use [Azure AD Conditional Access](../conditional-access/overview.md) to prompt users for multi-factor authentication during certain scenarios or events to fit your business requirements. |
3232
| Azure AD Premium P2 | Provides the strongest security position and improved user experience. Adds [risk-based Conditional Access](../conditional-access/howto-conditional-access-policy-risk.md) to the Azure AD Premium P1 features that adapts to user's patterns and minimizes multi-factor authentication prompts. |
33-
| Office 365 Business Premium, E3, or E5 | Azure Multi-Factor Authentication is either enabled or disabled for all users, for all sign-in events. There is no ability to only enable multi-factor authentication for a subset of users, or only under certain scenarios. Management is through the Office 365 portal. For an improved user experience, upgrade to Azure AD Premium P1 or P2 and use Conditional Access. For more information, see [secure Office 365 resources with multi-factor authentication](https://support.office.com/article/Set-up-multi-factor-authentication-for-Office-365-users-8f0454b2-f51a-4d9c-bcde-2c48e41621c6). |
33+
| Office 365 Business Premium, E3, or E5 | Azure Multi-Factor Authentication can be [enabled on a per-user basis](howto-mfa-userstates.md), or enabled or disabled for all users, for all sign-in events, using security defaults. Management of Azure Multi-Factor Authentication is through the Office 365 portal. For an improved user experience, upgrade to Azure AD Premium P1 or P2 and use Conditional Access. For more information, see [secure Office 365 resources with multi-factor authentication](https://support.office.com/article/Set-up-multi-factor-authentication-for-Office-365-users-8f0454b2-f51a-4d9c-bcde-2c48e41621c6). |
3434
| Azure AD free | You can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to enable multi-factor authentication for all users, every time an authentication request is made. You don't have granular control of enabled users or scenarios, but it does provide that additional security step.<br /> Even when security defaults aren't used to enable multi-factor authentication for everyone, users assigned the *Azure AD Global Administrator* role can be configured to use multi-factor authentication. This feature of the free tier makes sure the critical administrator accounts are protected by multi-factor authentication. |
3535

3636
## Feature comparison of versions

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -115,6 +115,10 @@ In addition to the Microsoft apps, administrators can add any Azure AD registere
115115
- [Custom applications not in the gallery](../manage-apps/add-non-gallery-app.md)
116116
- [Legacy applications published through app delivery controllers and networks](../manage-apps/secure-hybrid-access.md)
117117

118+
> [!NOTE]
119+
> Since Conditional access policy sets the requirements for accessing a service you are not able to apply it to a client (public/native) application. Other words the policy is not set directly on a client (public/native) application, but is applied when a client calls a service. For example, a policy set on SharePoint service applies to the clients calling SharePoint. A policy set on Exchange applies to the attempt to access the email using Outlook client. That is why client (public/native) applications are not available for selection in the Cloud Apps picker and Conditional Access option is not available in the application settings for the client (public/native) application registered in your tenant.
120+
121+
118122
## User actions
119123

120124
User actions are tasks that can be performed by a user. The only currently supported action is **Register security information**, which allows Conditional Access policy to enforce when users who are enabled for combined registration attempt to register their security information. More information can be found in the article, [Combined security information registration](../authentication/concept-registration-mfa-sspr-combined.md).

articles/active-directory/develop/active-directory-v2-protocols.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom: aaddev
1818

1919
# OAuth 2.0 and OpenID Connect protocols on Microsoft identity platform
2020

21-
The Microsoft identity platform endpoint for identity-as-a-service with industry standard protocols, OpenID Connect (OIDC) and OAuth 2.0. While the service is standards-compliant, there can be subtle differences between any two implementations of these protocols. The information here will be useful if you choose to write your code by directly sending and handling HTTP requests or use a third-party open-source library, rather than using one of our [open-source libraries](reference-v2-libraries.md).
21+
The Microsoft identity platform endpoint for identity-as-a-service implements authentication and authorization with industry standard protocols OpenID Connect (OIDC) and OAuth 2.0, respectively. While the service is standards-compliant, there can be subtle differences between any two implementations of these protocols. The information here will be useful if you choose to write your code by directly sending and handling HTTP requests or use a third-party open-source library, rather than using one of our [open-source libraries](reference-v2-libraries.md).
2222

2323
## The basics
2424

articles/active-directory/develop/scenario-web-app-call-api-app-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -269,14 +269,14 @@ The ASP.NET core tutorial uses dependency injection to let you decide the token
269269

270270
```csharp
271271
// Use a distributed token cache by adding:
272-
services.AddSignIn(Configuration, "AzureAd");
272+
services.AddSignIn(Configuration, "AzureAd")
273273
.AddWebAppCallsProtectedWebApi(Configuration,
274274
initialScopes: new string[] { "user.read" })
275275
.AddDistributedTokenCaches();
276276

277277
// Then, choose your implementation.
278278
// For instance, the distributed in-memory cache (not cleared when you stop the app):
279-
services.AddDistributedMemoryCache()
279+
services.AddDistributedMemoryCache();
280280

281281
// Or a Redis cache:
282282
services.AddStackExchangeRedisCache(options =>

articles/active-directory/develop/single-sign-on-saml-protocol.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,10 +89,10 @@ The `Scoping` element, which includes a list of identity providers, is optional
8989
If provided, don't include the `ProxyCount` attribute, `IDPListOption` or `RequesterID` element, as they aren't supported.
9090

9191
### Signature
92-
Don't include a `Signature` element in `AuthnRequest` elements, as Azure AD does not support signed authentication requests.
92+
Don't include a `Signature` element in `AuthnRequest` elements. Azure AD does not validate signed authentication requests. Requestor verification is provided for by only responding to registered Assertion Consumer Service URLs.
9393

9494
### Subject
95-
Azure AD ignores the `Subject` element of `AuthnRequest` elements.
95+
Don't include a `Subject` element. Azure AD doesn't support specifying a subject for a request and will return an error if one is provided.
9696

9797
## Response
9898
When a requested sign-on completes successfully, Azure AD posts a response to the cloud service. A response to a successful sign-on attempt looks like the following sample:

articles/active-directory/develop/v2-conditional-access-dev-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ error_description=AADSTS50076: Due to a configuration change made by your admini
171171

172172
Our app needs to catch the `error=interaction_required`. The application can then use either `acquireTokenPopup()` or `acquireTokenRedirect()` on the same resource. The user is forced to do a multi-factor authentication. After the user completes the multi-factor authentication, the app is issued a fresh access token for the requested resource.
173173

174-
To try out this scenario, see our [JS SPA On-behalf-of code sample](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2/blob/master/Microsoft.Identity.Web/README.md#handle-conditional-access). This code sample uses the Conditional Access policy and web API you registered earlier with a JS SPA to demonstrate this scenario. It shows how to properly handle the claims challenge and get an access token that can be used for your web API. Alternatively, checkout the general [Angular.js code sample](https://github.com/Azure-Samples/active-directory-javascript-graphapi-v2) for guidance on an Angular SPA
174+
To try out this scenario, see our [JS SPA On-behalf-of code sample](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2/blob/a2b257381b410c765ee01ecb611aa6f98c099eb1/2.%20Web%20API%20now%20calls%20Microsoft%20Graph/README.md). This code sample uses the Conditional Access policy and web API you registered earlier with a JS SPA to demonstrate this scenario. It shows how to properly handle the claims challenge and get an access token that can be used for your web API. Alternatively, checkout the general [Angular.js code sample](https://github.com/Azure-Samples/active-directory-javascript-graphapi-v2) for guidance on an Angular SPA
175175

176176
## See also
177177

articles/active-directory/manage-apps/configure-single-sign-on-non-gallery-applications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ When you [add a gallery app](add-gallery-app.md) or a [non-gallery web app](add-
2121
> [!NOTE]
2222
> Adding a gallery app? Find step-by-step setup instructions in the [list of SaaS app tutorials](../saas-apps/tutorial-list.md)
2323
24-
To configure SAML single sign-on for a non-gallery application without writing code, you need to have a subscription along with an Azure AD Premium license and the application must support SAML 2.0. For more information about Azure AD versions, visit [Azure AD pricing](https://azure.microsoft.com/pricing/details/active-directory/).
24+
To configure SAML single sign-on for a non-gallery application without writing code, you need to have an Azure AD subscription and the application must support SAML 2.0. For more information about Azure AD versions, visit [Azure AD pricing](https://azure.microsoft.com/pricing/details/active-directory/).
2525

2626
## Before you begin
2727

articles/active-directory/reports-monitoring/howto-analyze-activity-logs-log-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The logs are pushed to the **AuditLogs** and **SigninLogs** tables in the worksp
5757

5858
1. From the default query view in the previous section, select **Schema** and expand the workspace.
5959

60-
2. Expand the **Log Management** section and then expand either **AuditLogs** or **SignInLogs** to view the log schema.
60+
2. Expand the **Log Management** section and then expand either **AuditLogs** or **SigninLogs** to view the log schema.
6161
![Audit logs](./media/howto-analyze-activity-logs-log-analytics/auditlogschema.png)
6262
![Signin logs](./media/howto-analyze-activity-logs-log-analytics/signinlogschema.png)
6363

0 commit comments

Comments
 (0)