Skip to content

Commit e33a654

Browse files
committed
Merge master
2 parents d0b27da + 246d38d commit e33a654

File tree

764 files changed

+10820
-7623
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

764 files changed

+10820
-7623
lines changed

.openpublishing.redirection.json

Lines changed: 66 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1995,6 +1995,26 @@
19951995
"redirect_url": "/azure/cognitive-services/bing-video-search/quickstarts/client-libraries?pivots=programming-language-python",
19961996
"redirect_document_id": false
19971997
},
1998+
{
1999+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-c-sharp.md",
2000+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-csharp",
2001+
"redirect_document_id": false
2002+
},
2003+
{
2004+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-java.md",
2005+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-java",
2006+
"redirect_document_id": false
2007+
},
2008+
{
2009+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-node.md",
2010+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-javascript",
2011+
"redirect_document_id": false
2012+
},
2013+
{
2014+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-python.md",
2015+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-python",
2016+
"redirect_document_id": false
2017+
},
19982018
{
19992019
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
20002020
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",
@@ -2902,7 +2922,7 @@
29022922
},
29032923
{
29042924
"source_path": "articles/machine-learning/service/overview-more-machine-learning.md",
2905-
"redirect_url": "/azure/architecture/data-guide/technology-choices/data-science-and-machine-learning",
2925+
"redirect_url": "https://docs.microsoft.com/azure/architecture/data-guide/technology-choices/data-science-and-machine-learning",
29062926
"redirect_document_id": false
29072927
},
29082928
{
@@ -2982,7 +3002,7 @@
29823002
},
29833003
{
29843004
"source_path": "articles/machine-learning/service/support-for-aml-services.md",
2985-
"redirect_url": "https://aka.ms/aml-forum-service",
3005+
"redirect_url": "https://social.msdn.microsoft.com/Forums/home?forum=AzureMachineLearningService",
29863006
"redirect_document_id": false
29873007
},
29883008
{
@@ -3072,17 +3092,17 @@
30723092
},
30733093
{
30743094
"source_path": "articles/machine-learning/studio/live-chat.md",
3075-
"redirect_url": "https://social.msdn.microsoft.com/Forums/en-US/home?forum=MachineLearning",
3095+
"redirect_url": "https://social.msdn.microsoft.com/Forums/home?forum=MachineLearning",
30763096
"redirect_document_id": false
30773097
},
30783098
{
30793099
"source_path": "articles/machine-learning/studio/datamarket-deprecation.md",
3080-
"redirect_url": "https://microsoft.com/cognitive",
3100+
"redirect_url": "https://azure.microsoft.com/services/cognitive-services/",
30813101
"redirect_document_id": false
30823102
},
30833103
{
30843104
"source_path": "articles/machine-learning/r-developers-guide.md",
3085-
"redirect_url": "/azure/architecture/data-guide/technology-choices/r-developers-guide",
3105+
"redirect_url": "https://docs.microsoft.com/azure/architecture/data-guide/technology-choices/r-developers-guide",
30863106
"redirect_document_id": false
30873107
},
30883108
{
@@ -5110,6 +5130,11 @@
51105130
"redirect_url": "/azure/active-directory/develop/msal-overview",
51115131
"redirect_document_id": true
51125132
},
5133+
{
5134+
"source_path": "articles/active-directory/develop/shared-device-mode.md",
5135+
"redirect_url": "/azure/active-directory/develop/msal-android-shared-devices",
5136+
"redirect_document_id": true
5137+
},
51135138
{
51145139
"source_path": "articles/azure-resource-manager/resource-group-authenticate-service-principal.md",
51155140
"redirect_url": "/azure/active-directory/develop/howto-authenticate-service-principal-powershell",
@@ -15156,7 +15181,7 @@
1515615181
},
1515715182
{
1515815183
"source_path": "articles/machine-learning/service/how-to-create-portal-experiments.md",
15159-
"redirect_url": "/azure/machine-learning/how-to-create-portal-experiments",
15184+
"redirect_url": "/azure/machine-learning/tutorial-first-experiment-automated-ml",
1516015185
"redirect_document_id": false
1516115186
},
1516215187
{
@@ -29739,6 +29764,26 @@
2973929764
"redirect_url": "/azure/sentinel/fusion",
2974029765
"redirect_document_id": false
2974129766
},
29767+
{
29768+
"source_path": "articles/security-center/security-center-apply-system-updates.md",
29769+
"redirect_url": "/azure/security-center/security-center-virtual-machine-protection",
29770+
"redirect_document_id": false
29771+
},
29772+
{
29773+
"source_path": "articles/security-center/security-center-investigation.md",
29774+
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#security-alerts-investigation",
29775+
"redirect_document_id": false
29776+
},
29777+
{
29778+
"source_path": "articles/security-center/security-center-threat-intel.md",
29779+
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#menu_securityeventsmap",
29780+
"redirect_document_id": false
29781+
},
29782+
{
29783+
"source_path": "articles/security-center/security-center-apply-disk-encryption.md",
29784+
"redirect_url": "/azure/security-center/security-center-virtual-machine-protection",
29785+
"redirect_document_id": false
29786+
},
2974229787
{
2974329788
"source_path": "articles/security-center/security-center-confidence-score.md",
2974429789
"redirect_url": "/azure/security-center/security-center-intro",
@@ -47324,6 +47369,11 @@
4732447369
"redirect_url": "https://feedback.azure.com/forums/169401-azure-active-directory?category_id=160593",
4732547370
"redirect_document_id": false
4732647371
},
47372+
{
47373+
"source_path": "articles/active-directory-domain-services/compatible-software.md",
47374+
"redirect_url": "/azure/active-directory-domain-services/overview",
47375+
"redirect_document_id": false
47376+
},
4732747377
{
4732847378
"source_path": "articles/active-directory-domain-services/active-directory-ds-troubleshooting.md",
4732947379
"redirect_url": "/azure/active-directory-domain-services/troubleshoot",
@@ -50498,6 +50548,16 @@
5049850548
{
5049950549
"source_path": "articles/sql-database/sql-database-managed-instance-index.yml",
5050050550
"redirect_url": "/azure/sql-database/sql-database-managed-instance"
50551+
},
50552+
{
50553+
"source_path": "articles/aks/integrate-azure.md",
50554+
"redirect_url": "/azure/aks/",
50555+
"redirect_document_id": false
50556+
},
50557+
{
50558+
"source_path": "articles/aks/use-cosmosdb-osba-mongo-app.md",
50559+
"redirect_url": "/azure/aks/",
50560+
"redirect_document_id": false
5050150561
}
5050250562
]
5050350563
}

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/16/2020
12+
ms.date: 04/01/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -132,7 +132,7 @@ The following claims transformation demonstrates how to check the value of a boo
132132
<InputParameter Id="valueToCompareTo" DataType="boolean" Value="true" />
133133
</InputParameters>
134134
<OutputClaims>
135-
<OutputClaim ClaimTypeReferenceId="accountEnabled" TransformationClaimType="compareResult"/>
135+
<OutputClaim ClaimTypeReferenceId="accountEnabled" TransformationClaimType="compareResult"/>
136136
</OutputClaims>
137137
</ClaimsTransformation>
138138
```
@@ -163,6 +163,7 @@ Use this claim transformation to perform logical negation on a claim.
163163
<ClaimsTransformation Id="CheckWhetherEmailBePresented" TransformationMethod="NotClaims">
164164
<InputClaims>
165165
<InputClaim ClaimTypeReferenceId="userExists" TransformationClaimType="inputClaim" />
166+
</InputClaims>
166167
<OutputClaims>
167168
<OutputClaim ClaimTypeReferenceId="userExists" TransformationClaimType="outputClaim" />
168169
</OutputClaims>
@@ -198,7 +199,6 @@ The following claims transformation demonstrates how to `Or` two boolean ClaimTy
198199
<OutputClaim ClaimTypeReferenceId="presentTOSSelfAsserted" TransformationClaimType="outputClaim" />
199200
</OutputClaims>
200201
</ClaimsTransformation>
201-
</ClaimsTransformation>
202202
```
203203

204204
### Example

articles/active-directory-b2c/claimstransformations.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,7 @@ For examples of claims transformations, see the following reference pages:
159159
- [Date](date-transformations.md)
160160
- [Integer](integer-transformations.md)
161161
- [JSON](json-transformations.md)
162+
- [Phone number](phone-number-claims-transformations.md)
162163
- [General](general-transformations.md)
163164
- [Social account](social-transformations.md)
164165
- [String](string-transformations.md)

articles/active-directory-b2c/custom-policy-localization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: B2C
1717

1818
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1919

20-
Language customization in Azure Active Directory B2C (Azure AD B2C) allows you to accommodate different languages to suit your customer' needs. Microsoft provides the translations for 36 languages, but you can also provide your own translations for any language. Even if your experience is provided for only a single language, you can customize any text on the pages.
20+
Language customization in Azure Active Directory B2C (Azure AD B2C) allows you to accommodate different languages to suit your customer' needs. Microsoft provides the translations for [36 languages](https://docs.microsoft.com/azure/active-directory-b2c/user-flow-language-customization#supported-languages), but you can also provide your own translations for any language. Even if your experience is provided for only a single language, you can customize any text on the pages.
2121

2222
This article shows you how to support multiple locales or languages in the policy for user journeys. Localization requires three steps: set-up the explicit list of supported languages, provide language-specific strings and collections, and edit the [content definition](contentdefinitions.md) for the page.
2323

articles/active-directory-b2c/manage-user-accounts-graph-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ The application displays a list of commands you can execute. For example, get al
146146

147147
### Code discussion
148148

149-
The sample code uses the [Microsoft Graph SDK](https://docs.microsoft.com/graph/sdks/sdks-overview), which is designed to simplify building high-quality, efficient, and resilient applications that access Microsoft Graph. So, you don't need to make a direct all the Microsoft Graph API.
149+
The sample code uses the [Microsoft Graph SDK](https://docs.microsoft.com/graph/sdks/sdks-overview), which is designed to simplify building high-quality, efficient, and resilient applications that access Microsoft Graph.
150150

151151
Any request to the Microsoft Graph API requires an access token for authentication. The solution makes use of the [Microsoft.Graph.Auth](https://www.nuget.org/packages/Microsoft.Graph.Auth/) NuGet package that provides an authentication scenario-based wrapper of the Microsoft Authentication Library (MSAL) for use with the Microsoft Graph SDK.
152152

articles/active-directory-b2c/relyingparty.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 02/24/2020
11+
ms.date: 04/03/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -121,7 +121,7 @@ The **SingleSignOn** element contains in the following attribute:
121121

122122
| Attribute | Required | Description |
123123
| --------- | -------- | ----------- |
124-
| Scope | Yes | The scope of the single sign-on behavior. Possible values: `Suppressed`, `Tenant`, `Application`, or `Policy`. The `Suppressed` value indicates that the behavior is suppressed. For example, in the case of a single sign-on session, no session is maintained for the user and the user is always prompted for an identity provider selection. The `TrustFramework` value indicates that the behavior is applied for all policies in the trust framework. For example, a user navigating through two policy journeys for a trust framework is not prompted for an identity provider selection. The `Tenant` value indicates that the behavior is applied to all policies in the tenant. For example, a user navigating through two policy journeys for a tenant is not prompted for an identity provider selection. The `Application` value indicates that the behavior is applied to all policies for the application making the request. For example, a user navigating through two policy journeys for an application is not prompted for an identity provider selection. The `Policy` value indicates that the behavior only applies to a policy. For example, a user navigating through two policy journeys for a trust framework is prompted for an identity provider selection when switching between policies. |
124+
| Scope | Yes | The scope of the single sign-on behavior. Possible values: `Suppressed`, `Tenant`, `Application`, or `Policy`. The `Suppressed` value indicates that the behavior is suppressed, and the user is always prompted for an identity provider selection. The `Tenant` value indicates that the behavior is applied to all policies in the tenant. For example, a user navigating through two policy journeys for a tenant is not prompted for an identity provider selection. The `Application` value indicates that the behavior is applied to all policies for the application making the request. For example, a user navigating through two policy journeys for an application is not prompted for an identity provider selection. The `Policy` value indicates that the behavior only applies to a policy. For example, a user navigating through two policy journeys for a trust framework is prompted for an identity provider selection when switching between policies. |
125125
| KeepAliveInDays | Yes | Controls how long the user remains signed in. Setting the value to 0 turns off KMSI functionality. For more information, see [Keep me signed in](custom-policy-keep-me-signed-in.md). |
126126
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more information, see [Web sign-in with OpenID Connect](openid-connect.md). |
127127

@@ -186,7 +186,7 @@ The **Protocol** element contains the following attribute:
186186

187187
| Attribute | Required | Description |
188188
| --------- | -------- | ----------- |
189-
| Name | Yes | The name of a valid protocol supported by Azure AD B2C that is used as part of the technical profile. Possible values: `OpenIdConnect` or `SAML2`. The `OpenIdConnect` value represents the OpenID Connect 1.0 protocol standard as per OpenID foundation specification. The `SAML2` represents the SAML 2.0 protocol standard as per OASIS specification. Do not use a SAML token in production. |
189+
| Name | Yes | The name of a valid protocol supported by Azure AD B2C that is used as part of the technical profile. Possible values: `OpenIdConnect` or `SAML2`. The `OpenIdConnect` value represents the OpenID Connect 1.0 protocol standard as per OpenID foundation specification. The `SAML2` represents the SAML 2.0 protocol standard as per OASIS specification. |
190190

191191
## OutputClaims
192192

articles/active-directory-b2c/ropc-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/27/2020
12+
ms.date: 04/01/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---

articles/active-directory-domain-services/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -145,8 +145,6 @@
145145
href: faqs.md
146146
- name: Service updates
147147
href: https://azure.microsoft.com/updates/?product=active-directory-ds
148-
- name: Compatible third-party software
149-
href: compatible-software.md
150148
- name: Pricing
151149
href: https://azure.microsoft.com/pricing/details/active-directory-ds/
152150
- name: Azure AD feedback forum

articles/active-directory-domain-services/compatible-software.md

Lines changed: 0 additions & 41 deletions
This file was deleted.

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Microsoft's passwordless authentication methods enable different scenarios. Cons
5656
| **Web app sign-in**: <br> from a mobile or non-windows device | **Yes** | **No** | **No** |
5757
| **Computer sign in**: <br> Non-Windows computer | **No** | **No** | **No** |
5858

59-
For information on selecting the best method for your organization, see [Deciding a passwordless method](https://docs.microsoft.com/azure/security/fundamentals/ad-passwordless#deciding-a-passwordless-method).
59+
For information on selecting the best method for your organization, see [Deciding a passwordless method](https://docs.microsoft.com/azure/active-directory/authentication/concept-authentication-passwordless#choose-a-passwordless-method).
6060

6161
## Prerequisites
6262

@@ -130,7 +130,7 @@ See [Best practices for a pilot](https://aka.ms/deploymentplans) on the deployme
130130

131131
The Microsoft Authenticator app is a free download from Google Play or the Apple App Store. [Learn more about downloading the Microsoft Authenticator app](https://www.microsoft.com/p/microsoft-authenticator/9nblgggzmcj6). Have users download the Microsoft Authenticator app. and follow the directions to enable phone sign in.
132132

133-
It turns any iOS or Android phone into a strong, passwordless credential. Users sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using biometrics or a PIN to confirm. [See details on how the Microsoft Authenticator app works](https://docs.microsoft.com/azure/security/fundamentals/ad-passwordless#user-using-microsoft-authenticator-for-passwordless-sign-in).
133+
It turns any iOS or Android phone into a strong, passwordless credential. Users sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using biometrics or a PIN to confirm. [See details on how the Microsoft Authenticator app works](https://docs.microsoft.com/azure/active-directory/authentication/concept-authentication-passwordless#microsoft-authenticator-app).
134134

135135
![sign in with the Authenticator app](./media/howto-authentication-passwordless-deployment/passwordless-dp-sign-in.png)
136136

0 commit comments

Comments
 (0)