Skip to content

Commit dbe8049

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into mb-0110-browser-trace
2 parents 4f0d677 + 61419a2 commit dbe8049

File tree

743 files changed

+8915
-3040
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

743 files changed

+8915
-3040
lines changed

.openpublishing.redirection.json

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3930,6 +3930,61 @@
39303930
"redirect_url": "/azure/architecture/cloud-adoption-guide/subscription-governance",
39313931
"redirect_document_id": true
39323932
},
3933+
{
3934+
"source_path": "articles/azure-supportability/index.yml",
3935+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request",
3936+
"redirect_document_id": false
3937+
},
3938+
{
3939+
"source_path": "articles/azure-supportability/classic-deployment-model-quota-increase-requests.md",
3940+
"redirect_url": "/azure/azure-portal/supportability/classic-deployment-model-quota-increase-requests",
3941+
"redirect_document_id": true
3942+
},
3943+
{
3944+
"source_path": "articles/azure-supportability/create-manage-support-requests-using-access-control.md",
3945+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request#role-based-access-control",
3946+
"redirect_document_id": true
3947+
},
3948+
{
3949+
"source_path": "articles/azure-supportability/how-to-create-azure-support-request.md",
3950+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request",
3951+
"redirect_document_id": true
3952+
},
3953+
{
3954+
"source_path": "articles/azure-supportability/how-to-use-file-uploader.md",
3955+
"redirect_url": "/azure/azure-portal/supportability/how-to-use-file-uploader",
3956+
"redirect_document_id": true
3957+
},
3958+
{
3959+
"source_path": "articles/azure-supportability/low-priority-quota.md",
3960+
"redirect_url": "/azure/azure-portal/supportability/low-priority-quota",
3961+
"redirect_document_id": true
3962+
},
3963+
{
3964+
"source_path": "articles/azure-supportability/networking-quota-requests.md",
3965+
"redirect_url": "/azure/azure-portal/supportability/networking-quota-requests",
3966+
"redirect_document_id": true
3967+
},
3968+
{
3969+
"source_path": "articles/azure-supportability/per-vm-quota-requests.md",
3970+
"redirect_url": "/azure/azure-portal/supportability/per-vm-quota-requests",
3971+
"redirect_document_id": true
3972+
},
3973+
{
3974+
"source_path": "articles/azure-supportability/regional-quota-requests.md",
3975+
"redirect_url": "/azure/azure-portal/supportability/regional-quota-requests",
3976+
"redirect_document_id": true
3977+
},
3978+
{
3979+
"source_path": "articles/azure-supportability/resource-manager-core-quotas-request.md",
3980+
"redirect_url": "/azure/azure-portal/supportability/resource-manager-core-quotas-request",
3981+
"redirect_document_id": true
3982+
},
3983+
{
3984+
"source_path": "articles/azure-supportability/sku-series-unavailable.md",
3985+
"redirect_url": "/azure/azure-portal/supportability/sku-series-unavailable",
3986+
"redirect_document_id": true
3987+
},
39333988
{
39343989
"source_path": "articles/azure-toolkit-for-eclipse-debugging-azure-applications.md",
39353990
"redirect_url": "/java/azure/eclipse/azure-toolkit-for-eclipse",
@@ -24605,6 +24660,16 @@
2460524660
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-java",
2460624661
"redirect_document_id": false
2460724662
},
24663+
{
24664+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-nodejs-v10.md",
24665+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs-legacy",
24666+
"redirect_document_id": false
24667+
},
24668+
{
24669+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-v10.md",
24670+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-legacy",
24671+
"redirect_document_id": false
24672+
},
2460824673
{
2460924674
"source_path": "articles/storage/blobs/storage-nodejs-how-to-use-blob-storage.md",
2461024675
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs",

CODEOWNERS

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,6 @@ articles/terraform/ @TomArcherMsft
1212
articles/governance/ @DCtheGeek
1313

1414
# Configuration
15-
*.json @SyntaxC4
16-
.acrolinx-config.edn @MonicaRush
17-
articles/zone-pivot-groups.yml @SyntaxC4
15+
*.json @SyntaxC4 @snoviking @arob98
16+
.acrolinx-config.edn @MonicaRush @arob98
17+
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking @arob98

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ During the audit stage, many organizations find out that:
3131

3232
It is also possible for stronger password validation to affect your existing Active Directory domain controller deployment automation. We recommend that at least one DC promotion and one DC demotion happen during the audit period evaluation in order to help uncover such issues in advance. For more information, see:
3333

34-
* [Ntdsutil.exe is unable to set a weak Directory Services Repair Mode password](howto-password-ban-bad-on-premises-troubleshoot.md##ntdsutilexe-fails-to-set-a-weak-dsrm-password)
34+
* [Ntdsutil.exe is unable to set a weak Directory Services Repair Mode password](howto-password-ban-bad-on-premises-troubleshoot.md#ntdsutilexe-fails-to-set-a-weak-dsrm-password)
3535
* [Domain controller replica promotion fails because of a weak Directory Services Repair Mode password](howto-password-ban-bad-on-premises-troubleshoot.md#domain-controller-replica-promotion-fails-because-of-a-weak-dsrm-password)
3636
* [Domain controller demotion fails due to a weak local Administrator password](howto-password-ban-bad-on-premises-troubleshoot.md#domain-controller-demotion-fails-due-to-a-weak-local-administrator-password)
3737

articles/active-directory/b2b/direct-federation.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,8 +80,7 @@ First, your partner organization needs to configure their identity provider with
8080
Azure AD B2B can be configured to federate with identity providers that use the SAML protocol with specific requirements listed below. For more information about setting up a trust between your SAML identity provider and Azure AD, see [Use a SAML 2.0 Identity Provider (IdP) for Single Sign-On](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-fed-saml-idp).
8181

8282
> [!NOTE]
83-
> NOTE
84-
The target domain for direct federation must not be DNS-verified on Azure AD. The authentication URL domain must match the target domain or it must be the domain of an allowed identity provider. See the [Limitations](#limitations) section for details.
83+
> The target domain for direct federation must not be DNS-verified on Azure AD. The authentication URL domain must match the target domain or it must be the domain of an allowed identity provider. See the [Limitations](#limitations) section for details.
8584
8685
#### Required SAML 2.0 attributes and claims
8786
The following tables show requirements for specific attributes and claims that must be configured at the third-party identity provider. To set up direct federation, the following attributes must be received in the SAML 2.0 response from the identity provider. These attributes can be configured by linking to the online security token service XML file or by entering them manually.

articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,9 @@ These application roles are defined in the [Azure portal](https://portal.azure.c
3333
### Declare app roles using Azure portal
3434

3535
1. Sign in to the [Azure portal](https://portal.azure.com).
36-
1. On the top bar, select your account, and then **Switch Directory**.
37-
1. Once the **Directory + subscription** pane opens, choose the Active Directory tenant where you wish to register your application, from the **Favorites** or **All Directories** list.
38-
1. Select **All services** in the left-hand nav, and choose **Azure Active Directory**.
36+
1. Select the **Directory + Subscription** icon in the portal toolbar.
37+
1. In the **Favorites** or **All Directories** list, choose the Active Directory tenant where you wish to register your application.
38+
1. In the Azure portal, search for and select **Azure Active Directory**.
3939
1. In the **Azure Active Directory** pane, select **App registrations** to view a list of all your applications.
4040
1. Select the application you want to define app roles in. Then select **Manifest**.
4141
1. Edit the app manifest by locating the `appRoles` setting and adding all your Application Roles.

articles/active-directory/develop/reference-v2-libraries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ For any standards-compliant library, you can use the Microsoft identity platform
104104
* For issues and new feature requests in library code, contact the library owner.
105105
* For issues and new feature requests in the service-side protocol implementation, contact Microsoft.
106106
* [File a feature request](https://feedback.azure.com/forums/169401-azure-active-directory) for additional features you want to see in the protocol.
107-
* [Create a support request](https://docs.microsoft.com/azure/azure-supportability/how-to-create-azure-support-request) if you find an issue where the Microsoft identity platform endpoint isn't compliant with OAuth 2.0 or OpenID Connect 1.0.
107+
* [Create a support request](https://docs.microsoft.com/azure/azure-portal/supportability/how-to-create-azure-support-request) if you find an issue where the Microsoft identity platform endpoint isn't compliant with OAuth 2.0 or OpenID Connect 1.0.
108108

109109
## Related content
110110

articles/active-directory/devices/troubleshoot-hybrid-join-windows-current.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,7 @@ Applicable only for federated domain accounts.
244244
Reasons for failure:
245245

246246
- Unable to get an Access token silently for DRS resource.
247-
- Windows 10 devices acquire auth token from the federation service using Integrated Windows Authentication to an active WS-Trust endpoint. Details: [Federation Service Configuration](hybrid-azuread-join-manual.md##set-up-issuance-of-claims)
247+
- Windows 10 devices acquire auth token from the federation service using Integrated Windows Authentication to an active WS-Trust endpoint. Details: [Federation Service Configuration](hybrid-azuread-join-manual.md#set-up-issuance-of-claims)
248248

249249
**Common error codes:**
250250

articles/active-directory/hybrid/how-to-connect-install-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ After entering the forest name and clicking **Add Directory**, a pop-up dialog
7777
| Option | Description |
7878
| --- | --- |
7979
| Create new account | Select this option if you want Azure AD Connect wizard to create the AD DS account required by Azure AD Connect for connecting to the AD forest during directory synchronization. When this option is selected, enter the username and password for an enterprise admin account. The enterprise admin account provided will be used by Azure AD Connect wizard to create the required AD DS account. You can enter the domain part in either NetBios or FQDN format, that is, FABRIKAM\administrator or fabrikam.com\administrator. |
80-
| Use existing account | Select this option if you want to provide an existing AD DS account to be used Azure AD Connect for connecting to the AD forest during directory synchronization. You can enter the domain part in either NetBios or FQDN format, that is, FABRIKAM\syncuser or fabrikam.com\syncuser. This account can be a regular user account because it only needs the default read permissions. However, depending on your scenario, you may need more permissions. For more information, see [Azure AD Connect Accounts and permissions](reference-connect-accounts-permissions.md##create-the-ad-ds-connector-account). |
80+
| Use existing account | Select this option if you want to provide an existing AD DS account to be used Azure AD Connect for connecting to the AD forest during directory synchronization. You can enter the domain part in either NetBios or FQDN format, that is, FABRIKAM\syncuser or fabrikam.com\syncuser. This account can be a regular user account because it only needs the default read permissions. However, depending on your scenario, you may need more permissions. For more information, see [Azure AD Connect Accounts and permissions](reference-connect-accounts-permissions.md#create-the-ad-ds-connector-account). |
8181

8282
![Connect Directory](./media/how-to-connect-install-custom/connectdir02.png)
8383

articles/active-directory/hybrid/how-to-connect-sso-quick-start.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ To test the feature for a specific user, ensure that all the following condition
208208
- The user signs in on a corporate device.
209209
- The device is joined to your Active Directory domain. The device _doesn't_ need to be [Azure AD Joined](../active-directory-azureadjoin-overview.md).
210210
- The device has a direct connection to your domain controller (DC), either on the corporate wired or wireless network or via a remote access connection, such as a VPN connection.
211-
- You have [rolled out the feature](##step-3-roll-out-the-feature) to this user through Group Policy.
211+
- You have [rolled out the feature](#step-3-roll-out-the-feature) to this user through Group Policy.
212212

213213
To test the scenario where the user enters only the username, but not the password:
214214
- Sign in to `https://myapps.microsoft.com/` in a new private browser session.

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-datalake.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: tutorial
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 11/20/2017
16+
ms.date: 01/10/2020
1717
ms.author: markvi
1818
ms.collection: M365-identity-device-management
1919
---
@@ -34,9 +34,9 @@ In this tutorial, you learn how to:
3434

3535
[!INCLUDE [msi-tut-prereqs](../../../includes/active-directory-msi-tut-prereqs.md)]
3636

37-
## Grant your VM access to Azure Data Lake Store
37+
## Grant access
3838

39-
Now you can grant your VM access to files and folders in Azure Data Lake Store. For this step, you can use an existing Data Lake Store instance or create a new one. To create a Data Lake Store instance by using the Azure portal, follow the [Azure Data Lake Store quickstart](https://docs.microsoft.com/azure/data-lake-store/data-lake-store-get-started-portal). There are also quickstarts that use Azure CLI and Azure PowerShell in the [Azure Data Lake Store documentation](https://docs.microsoft.com/azure/data-lake-store/data-lake-store-overview).
39+
This section shows how to grant your VM access to files and folders in Azure Data Lake Store. For this step, you can use an existing Data Lake Store instance or create a new one. To create a Data Lake Store instance by using the Azure portal, follow the [Azure Data Lake Store quickstart](https://docs.microsoft.com/azure/data-lake-store/data-lake-store-get-started-portal). There are also quickstarts that use Azure CLI and Azure PowerShell in the [Azure Data Lake Store documentation](https://docs.microsoft.com/azure/data-lake-store/data-lake-store-overview).
4040

4141
In Data Lake Store, create a new folder and grant our Linux VM system-assigned managed identity permission to read, write, and execute files in that folder:
4242

@@ -54,9 +54,9 @@ In Data Lake Store, create a new folder and grant our Linux VM system-assigned m
5454

5555
Managed identities for Azure resources can now perform all operations on files in the folder that you created. For more information on managing access to Data Lake Store, see [Access Control in Data Lake Store](https://docs.microsoft.com/azure/data-lake-store/data-lake-store-access-control).
5656

57-
## Get an access token and call the Data Lake Store file system
57+
## Get an access token
5858

59-
Azure Data Lake Store natively supports Azure AD authentication, so it can directly accept access tokens obtained via using managed identities for Azure resources. To authenticate to the Data Lake Store file system, you send an access token issued by Azure AD to your Data Lake Store file system endpoint. The access token is in an authorization header in the format "Bearer \<ACCESS_TOKEN_VALUE\>". To learn more about Data Lake Store support for Azure AD authentication, see [Authentication with Data Lake Store using Azure Active Directory](https://docs.microsoft.com/azure/data-lake-store/data-lakes-store-authentication-using-azure-active-directory).
59+
This section shows how to obtain an access token and call the Data Lake Store file system. Azure Data Lake Store natively supports Azure AD authentication, so it can directly accept access tokens obtained via using managed identities for Azure resources. To authenticate to the Data Lake Store file system, you send an access token issued by Azure AD to your Data Lake Store file system endpoint. The access token is in an authorization header in the format "Bearer \<ACCESS_TOKEN_VALUE\>". To learn more about Data Lake Store support for Azure AD authentication, see [Authentication with Data Lake Store using Azure Active Directory](https://docs.microsoft.com/azure/data-lake-store/data-lakes-store-authentication-using-azure-active-directory).
6060

6161
In this tutorial, you authenticate to the REST API for the Data Lake Store file system by using cURL to make REST requests.
6262

0 commit comments

Comments
 (0)