Skip to content

Commit e17f863

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1679050dj
2 parents 5dcd3fe + f7bc984 commit e17f863

File tree

215 files changed

+1936
-1173
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

215 files changed

+1936
-1173
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32264,11 +32264,6 @@
3226432264
"redirect_url": "/azure/expressroute/expressroute-security-controls",
3226532265
"redirect_document_id": false
3226632266
},
32267-
{
32268-
"source_path": "articles/key-vault/key-vault-security-controls.md",
32269-
"redirect_url": "/azure/key-vault/security-baseline",
32270-
"redirect_document_id": false
32271-
},
3227232267
{
3227332268
"source_path": "articles/key-vault/automation-manage-key-vault.md",
3227432269
"redirect_url": "/azure/key-vault/",

articles/active-directory-b2c/manage-user-accounts-graph-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ The application displays a list of commands you can execute. For example, get al
146146

147147
### Code discussion
148148

149-
The sample code uses the [Microsoft Graph SDK](https://docs.microsoft.com/graph/sdks/sdks-overview), which is designed to simplify building high-quality, efficient, and resilient applications that access Microsoft Graph. So, you don't need to make a direct all the Microsoft Graph API.
149+
The sample code uses the [Microsoft Graph SDK](https://docs.microsoft.com/graph/sdks/sdks-overview), which is designed to simplify building high-quality, efficient, and resilient applications that access Microsoft Graph.
150150

151151
Any request to the Microsoft Graph API requires an access token for authentication. The solution makes use of the [Microsoft.Graph.Auth](https://www.nuget.org/packages/Microsoft.Graph.Auth/) NuGet package that provides an authentication scenario-based wrapper of the Microsoft Authentication Library (MSAL) for use with the Microsoft Graph SDK.
152152

articles/active-directory-b2c/relyingparty.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 02/24/2020
11+
ms.date: 04/03/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -121,7 +121,7 @@ The **SingleSignOn** element contains in the following attribute:
121121

122122
| Attribute | Required | Description |
123123
| --------- | -------- | ----------- |
124-
| Scope | Yes | The scope of the single sign-on behavior. Possible values: `Suppressed`, `Tenant`, `Application`, or `Policy`. The `Suppressed` value indicates that the behavior is suppressed. For example, in the case of a single sign-on session, no session is maintained for the user and the user is always prompted for an identity provider selection. The `TrustFramework` value indicates that the behavior is applied for all policies in the trust framework. For example, a user navigating through two policy journeys for a trust framework is not prompted for an identity provider selection. The `Tenant` value indicates that the behavior is applied to all policies in the tenant. For example, a user navigating through two policy journeys for a tenant is not prompted for an identity provider selection. The `Application` value indicates that the behavior is applied to all policies for the application making the request. For example, a user navigating through two policy journeys for an application is not prompted for an identity provider selection. The `Policy` value indicates that the behavior only applies to a policy. For example, a user navigating through two policy journeys for a trust framework is prompted for an identity provider selection when switching between policies. |
124+
| Scope | Yes | The scope of the single sign-on behavior. Possible values: `Suppressed`, `Tenant`, `Application`, or `Policy`. The `Suppressed` value indicates that the behavior is suppressed, and the user is always prompted for an identity provider selection. The `Tenant` value indicates that the behavior is applied to all policies in the tenant. For example, a user navigating through two policy journeys for a tenant is not prompted for an identity provider selection. The `Application` value indicates that the behavior is applied to all policies for the application making the request. For example, a user navigating through two policy journeys for an application is not prompted for an identity provider selection. The `Policy` value indicates that the behavior only applies to a policy. For example, a user navigating through two policy journeys for a trust framework is prompted for an identity provider selection when switching between policies. |
125125
| KeepAliveInDays | Yes | Controls how long the user remains signed in. Setting the value to 0 turns off KMSI functionality. For more information, see [Keep me signed in](custom-policy-keep-me-signed-in.md). |
126126
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more information, see [Web sign-in with OpenID Connect](openid-connect.md). |
127127

@@ -186,7 +186,7 @@ The **Protocol** element contains the following attribute:
186186

187187
| Attribute | Required | Description |
188188
| --------- | -------- | ----------- |
189-
| Name | Yes | The name of a valid protocol supported by Azure AD B2C that is used as part of the technical profile. Possible values: `OpenIdConnect` or `SAML2`. The `OpenIdConnect` value represents the OpenID Connect 1.0 protocol standard as per OpenID foundation specification. The `SAML2` represents the SAML 2.0 protocol standard as per OASIS specification. Do not use a SAML token in production. |
189+
| Name | Yes | The name of a valid protocol supported by Azure AD B2C that is used as part of the technical profile. Possible values: `OpenIdConnect` or `SAML2`. The `OpenIdConnect` value represents the OpenID Connect 1.0 protocol standard as per OpenID foundation specification. The `SAML2` represents the SAML 2.0 protocol standard as per OASIS specification. |
190190

191191
## OutputClaims
192192

articles/active-directory-domain-services/change-sku.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: daveba
88
ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
11-
ms.topic: conceptual
11+
ms.topic: how-to
1212
ms.date: 01/31/2020
1313
ms.author: iainfou
1414

@@ -26,7 +26,7 @@ This article shows you how to change the SKU for an existing Azure AD DS managed
2626
To complete this article, you need the following resources and privileges:
2727

2828
* An active Azure subscription.
29-
* If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3030
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
3131
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3232
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.

articles/active-directory-domain-services/check-health.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 8999eec3-f9da-40b3-997a-7a2587911e96
99
ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
12-
ms.topic: conceptual
12+
ms.topic: how-to
1313
ms.date: 01/21/2020
1414
ms.author: iainfou
1515

articles/active-directory-domain-services/create-gmsa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: e6faeddd-ef9e-4e23-84d6-c9b3f7d16567
99
ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
12-
ms.topic: conceptual
12+
ms.topic: how-to
1313
ms.date: 03/30/2020
1414
ms.author: iainfou
1515

articles/active-directory-domain-services/create-ou.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 52602ad8-2b93-4082-8487-427bdcfa8126
99
ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
12-
ms.topic: conceptual
12+
ms.topic: how-to
1313
ms.date: 03/31/2020
1414
ms.author: iainfou
1515

articles/active-directory-domain-services/delete-aadds.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 89e407e1-e1e0-49d1-8b89-de11484eee46
99
ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
12-
ms.topic: conceptual
12+
ms.topic: how-to
1313
ms.date: 03/30/2020
1414
ms.author: iainfou
1515

articles/active-directory-domain-services/deploy-azure-app-proxy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 938a5fbc-2dd1-4759-bcce-628a6e19ab9d
99
ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
12-
ms.topic: conceptual
12+
ms.topic: how-to
1313
ms.date: 03/31/2020
1414
ms.author: iainfou
1515

articles/active-directory-domain-services/deploy-kcd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 938a5fbc-2dd1-4759-bcce-628a6e19ab9d
99
ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
12-
ms.topic: conceptual
12+
ms.topic: how-to
1313
ms.date: 03/30/2020
1414
ms.author: iainfou
1515

0 commit comments

Comments
 (0)