Skip to content

Commit d92a80e

Browse files
committed
Bringing even with master.
2 parents 16f6471 + c241ee1 commit d92a80e

File tree

169 files changed

+1444
-1458
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

169 files changed

+1444
-1458
lines changed

.openpublishing.publish.config.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -259,6 +259,18 @@
259259
"url": "https://github.com/Azure-Samples/cognitive-services-java-sdk-samples",
260260
"branch": "master",
261261
"branch_mapping": {}
262+
},
263+
{
264+
"path_to_root": "aml-sdk-samples",
265+
"url": "https://github.com/Azure/MachineLearningNotebooks",
266+
"branch": "sdk-codetest",
267+
"branch_mapping": {}
268+
},
269+
{
270+
"path_to_root": "cognitive-services-vision-csharp-sdk-quickstarts",
271+
"url": "https://github.com/Azure-Samples/cognitive-services-vision-csharp-sdk-quickstarts",
272+
"branch": "master",
273+
"branch_mapping": {}
262274
}
263275
],
264276
"branch_target_mapping": {

articles/active-directory-b2c/oauth2-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The **InputClaims** and **InputClaimsTransformations** elements are not required
4242

4343
## Output claims
4444

45-
The **OutputClaims** element contains a list of claims returned by the OAuth2 identity provider. You may need to map the name of the claim defined in your policy to the name defined in the identity provider. You can also include claims that aren't returned by the identity provider as long as the you set the `DefaultValue` attribute.
45+
The **OutputClaims** element contains a list of claims returned by the OAuth2 identity provider. You may need to map the name of the claim defined in your policy to the name defined in the identity provider. You can also include claims that aren't returned by the identity provider as long as you set the `DefaultValue` attribute.
4646

4747
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
4848

articles/active-directory-b2c/technical-profiles-overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,7 @@ A technical profile enables these types of scenarios:
3434
- [SAML2](saml-technical-profile.md) - Federation with any SAML protocol identity provider.
3535
- [Self-Asserted](self-asserted-technical-profile.md) - Interact with the user. For example, collect the user's credential to sign in, render the sign-up page, or password reset.
3636
- **WsFed** - Federation with any WsFed protocol identity provider.
37-
- **Session management** - Handle different types of sessions.
38-
- **User journey context provider**
37+
- [Session management](active-directory-b2c-reference-sso-custom.md) - Handle different types of sessions.
3938
- **Application insights**
4039

4140
## Technical profile flow

articles/active-directory/develop/howto-reactivate-disabled-acs-namespaces.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,16 +22,16 @@ ms.custom: aaddev
2222

2323
On November 2017, we announced that Microsoft Azure Access Control Service (ACS), a service of Azure Active Directory (Azure AD), is being retired on November 7, 2018.
2424

25-
Since then, we've sent multiple emails to the ACS subscriptions’ admin email about the ACS retirement 12 months, 9 months, 6 months, 3 months, 1 month, 2 weeks, 1 week, and 1 day before the retirement date of November 7, 2018.
25+
Since then, we've sent emails to the ACS subscriptions’ admin email about the ACS retirement 12 months, 9 months, 6 months, 3 months, 1 month, 2 weeks, 1 week, and 1 day before the retirement date of November 7, 2018.
2626

27-
On October 3, 2018, we announced (through email and [a blog post](https://azure.microsoft.com/blog/one-month-retirement-notice-access-control-service/)) an extension offer to customers who can't finish their migration before November 7, 2018. The announcement also contained instructions for requesting the extension.
27+
On October 3, 2018, we announced (through email and [a blog post](https://azure.microsoft.com/blog/one-month-retirement-notice-access-control-service/)) an extension offer to customers who can't finish their migration before November 7, 2018. The announcement also had instructions for requesting the extension.
2828

2929
## Why your namespace is disabled
3030

31-
If you haven't opted in for the extension, we will start to disable ACS namespaces starting November 7, 2018. If you missed the communications and would still like to opt in for the extension to February 4, 2019, follow the instructions in the following sections.
31+
If you haven't opted in for the extension, we'll start to disable ACS namespaces starting November 7, 2018. If you missed the communications and would still like to opt in for the extension to February 4, 2019, follow the instructions in the following sections.
3232

3333
> [!NOTE]
34-
> You must be an administrator of the subscription to run the PowerShell commands and request an extension. The permissions to log into the ACS namespace's management portal and PowerShell are the same. Service administrators and co-administrators can log in, but account administrators cannot log in.
34+
> You must be a service administrator or co-administrator of the subscription to run the PowerShell commands and request an extension.
3535
3636
## Find and enable your ACS namespaces
3737

@@ -58,6 +58,9 @@ You can use ACS PowerShell to list all your ACS namespaces and reactivate ones t
5858
```
5959
6060
where `[Command-Name]` is the name of the ACS command.
61+
1. Connect to ACS using the **Connect-AcsAccount** cmdlet.
62+
63+
You may need to change your execution policy by running **Set-ExecutionPolicy** before you can run the command.
6164
1. List your available Azure subscriptions using the **Get-AcsSubscription** cmdlet.
6265
1. List your ACS namespaces using the **Get-AcsNamespace** cmdlet.
6366
1. Confirm that the namespaces are disabled by confirming that `State` is `Disabled`.

articles/active-directory/manage-apps/configure-password-single-sign-on-non-gallery-applications.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,13 @@
22
title: How to configure password single sign-on for a non-gallery applicationn | Microsoft Docs
33
description: How to configure an custom non-gallery application for secure password-based single sign-on when it is not listed in the Azure AD Application Gallery
44
services: active-directory
5-
documentationcenter: ''
65
author: barbkess
76
manager: mtillman
8-
9-
ms.assetid:
107
ms.service: active-directory
118
ms.component: app-mgmt
129
ms.workload: identity
13-
ms.tgt_pltfrm: na
14-
ms.devlang: na
1510
ms.topic: conceptual
16-
ms.date: 07/11/2017
11+
ms.date: 11/12/2018
1712
ms.author: barbkess
1813

1914
---
@@ -112,7 +107,6 @@ To configure single sign-on for an application, follow these steps:
112107

113108
11. Additionally, you can also provide credentials on behalf of the user by selecting the rows of the users and clicking on **Update Credentials** and entering the username and password on behalf of the users. Otherwise, users be prompted to enter the credentials themselves upon launch.
114109

115-
12. **Optional:** For certain social media applications like Twitter and Facebook, there is also the option to enable automatic rollover of the password for the application at a selected frequency. To enable this select **I want Azure AD to automatically manage this user or group's password** while entering credentials on behalf of a user or group. Then select the **Rollover frequency (in weeks)**.
116110

117111
## Assign a user to an application directly
118112

articles/active-directory/manage-apps/hide-application-from-user-portal.md

Lines changed: 27 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -2,60 +2,53 @@
22
title: Hide an application from user's experience in Azure Active Directory | Microsoft Docs
33
description: How to hide an application from user's experience in Azure Active Directory access panels or Office 365 launchers.
44
services: active-directory
5-
documentationcenter: ''
65
author: barbkess
76
manager: mtillman
8-
editor: ''
97
ms.service: active-directory
108
ms.component: app-mgmt
119
ms.workload: identity
12-
ms.tgt_pltfrm: na
13-
ms.devlang: na
1410
ms.topic: conceptual
15-
ms.date: 01/04/2018
11+
ms.date: 11/12/2018
1612
ms.author: barbkess
17-
ms.reviewer: asteen
18-
ms.custom: it-pro
13+
ms.reviewer: kasimpso
14+
1915
---
2016

21-
# Hide an application from user's experience in Azure Active Directory
17+
# Hide applications from end-users in Azure Active Directory
18+
19+
Instructions for how to hide applications from end-users' MyApps panel or Office 365 launcher. When an application is hidden, users still have permissions to the application.
2220

23-
If you have an application that you do not want to show on users’ access panels or Office 365 launchers, there are options to hide this app tile. The following two options are available for hiding applications from user's app launchers.
21+
## Prerequisites
2422

25-
- Hide a third-party application from users access panels and Office 365 app launchers
26-
- Hide all Office 365 applications from users access panels
23+
Application administrator privileges are required to hide an application from the MyApps panel and Office 365 launcher.
2724

28-
By hiding the app users still have permissions to the app but will not see them appear on their app launchers. You must have the appropriate permissions to manage the enterprise app, and you must be a global admin for the directory.
25+
Global administrator privileges are required to hide all Office 365 applications.
2926

3027

31-
## Hiding an application from user's end user experiences
32-
You can use the steps below, depending on your situation, to hide applications from the access panel.
28+
## Hide an application from the end user
29+
Use the following steps to hide an application from MyApps panel and Office 365 application launcher.
3330

34-
### How do I hide a third-party app from user’s access panel and O365 app launchers?
35-
Use the following steps to hide an application from a user's access panel and Office 365 app launchers.
31+
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator for your directory.
32+
2. Select **Azure Active Directory**.
33+
3. Select **Enterprise applications**. The **Enterprise applications - All applications** blade opens.
34+
4. Under **Application Type**, select **Enterprise Applications**, if it isn't already selected.
35+
5. Search for the application you want to hide, and click the application. The application's overview opens.
36+
6. Click **Properties**.
37+
7. For the **Visible to users?** question, click **No**.
38+
8. Click **Save**.
3639

37-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that's a global admin for the directory.
38-
2. Select **All services**, enter **Azure Active Directory** in the text box, and then select **Enter**.
39-
3. On the **Azure Active Directory - *directoryname*** screen (that is, the Azure AD screen for the directory you are managing), select **Enterprise applications**.
40-
![Enterprise apps](./media/hide-application-from-user-portal/app1.png)
41-
4. On the **Enterprise applications** screen, select **All applications**. You see a list of the apps you can manage.
42-
5. On the **Enterprise applications - All applications** screen, select an app.</br>
43-
![Enterprise apps](./media/hide-application-from-user-portal/app2.png)
44-
6. On the ***appname*** screen (that is, the screen with the name of the selected app in the title), select Properties.
45-
7. On the ***appname* - Properties** screen, select **Yes** for **Visible to users?**.
46-
![Enterprise apps](./media/hide-application-from-user-portal/app3.png)
47-
8. Select the **Save** command.
4840

49-
### How do I hide Office 365 applications from user's access panel?
41+
## Hide Office 365 applications from the MyApps panel
5042

51-
Use the following steps to hide all Office 365 applications from the access panel. These apps will still be visible in the Office 365 portal.
43+
Use the following steps to hide all Office 365 applications from the MyApps panel. The applications are still visible in the Office 365 portal.
5244

53-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that's a global admin for the directory.
54-
2. Select **All services**, enter **Azure Active Directory** in the text box, and then select **Enter**.
55-
3. On the **Azure Active Directory - *directoryname*** screen (that is, the Azure AD screen for the directory you are managing), select **User settings**.
56-
4. On the **User settings** screen, under **Enterprise applications** select **Yes** for **Users can only see Office 365 apps in the Office 365 portal**.
45+
1. Sign in to the [Azure portal](https://portal.azure.com) as a global administrator for your directory.
46+
2. Select **Azure Active Directory**.
47+
3. Select **User settings**.
48+
4. Under **Enterprise applications**, click **Manage how end users launch and view their applications.**
49+
5. For **Users can only see Office 365 apps in the Office 365 portal**, click **Yes**.
50+
6. Click **Save**.
5751

58-
![Enterprise apps](./media/hide-application-from-user-portal/apps4.png)
5952

6053
## Next steps
6154
* [See all my groups](../fundamentals/active-directory-groups-view-azure-portal.md)

0 commit comments

Comments
 (0)