Skip to content

Commit e4bb45d

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1679050ar
2 parents 0732b8c + 87303f5 commit e4bb45d

File tree

247 files changed

+2883
-1543
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

247 files changed

+2883
-1543
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7049,6 +7049,11 @@
70497049
"redirect_url": "/azure/app-service-mobile",
70507050
"redirect_document_id": false
70517051
},
7052+
{
7053+
"source_path": "articles/application-gateway/application-gateway-covid-guidelines.md",
7054+
"redirect_url": "/azure/application-gateway/high-traffic-support",
7055+
"redirect_document_id": false
7056+
},
70527057
{
70537058
"source_path": "articles/application-gateway/application-gateway-backend-ssl.md",
70547059
"redirect_url": "/azure/application-gateway/ssl-overview",
@@ -26594,6 +26599,21 @@
2659426599
"redirect_url": "/azure/virtual-machines/linux/tutorial-lamp-stack",
2659526600
"redirect_document_id": false
2659626601
},
26602+
{
26603+
"source_path": "articles/vpn-gateway/nva-working-remotely-support.md",
26604+
"redirect_url": "/azure/vpn-gateway/nva-work-remotely-support",
26605+
"redirect_document_id": false
26606+
},
26607+
{
26608+
"source_path": "articles/expressroute/working-remotely-support.md",
26609+
"redirect_url": "/azure/expressroute/work-remotely-support",
26610+
"redirect_document_id": false
26611+
},
26612+
{
26613+
"source_path": "articles/bastion/working-remotely-support.md",
26614+
"redirect_url": "/azure/bastion/work-remotely-support",
26615+
"redirect_document_id": false
26616+
},
2659726617
{
2659826618
"source_path": "articles/vpn-gateway/vpn-gateway-site-to-site-create.md",
2659926619
"redirect_url": "/azure/vpn-gateway/vpn-gateway-howto-site-to-site-classic-portal",
@@ -43745,6 +43765,11 @@
4374543765
"redirect_url": "/azure/cognitive-services/acoustics/what-is-acoustics",
4374643766
"redirect_document_id": false
4374743767
},
43768+
{
43769+
"source_path": "articles/cognitive-services/Acoustics/index.md",
43770+
"redirect_url": "/azure/cognitive-services/acoustics/what-is-acoustics",
43771+
"redirect_document_id": false
43772+
},
4374843773
{
4374943774
"source_path": "articles/iot-central/howto-export-data.md",
4375043775
"redirect_url": "/azure/iot-central/core/howto-export-data-event-hubs-service-bus",

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/16/2020
12+
ms.date: 03/24/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -251,7 +251,7 @@ The following technical profile deletes a social user account using **alternativ
251251
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md) |
252252
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
253253

254-
## Error messages
254+
### Error messages
255255

256256
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
257257

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 88 additions & 90 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/custom-policy-keep-me-signed-in.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 02/27/2020
11+
ms.date: 03/24/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -103,7 +103,15 @@ We recommend that you set the value of SessionExpiryInSeconds to be a short peri
103103
</RelyingParty>
104104
```
105105

106-
4. Save your changes and then upload the file.
107-
5. To test the custom policy that you uploaded, in the Azure portal, go to the policy page, and then select **Run now**.
106+
## Test your policy
108107

109-
You can find the sample policy [here](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/keep%20me%20signed%20in).
108+
1. Save your changes, and then upload the file.
109+
1. To test the custom policy you uploaded, in the Azure portal, go to the policy page, and then select **Run now**.
110+
1. Type your **username** and **password**, select **Keep me signed in**, and then click **sign-in**.
111+
1. Go back to the Azure portal. Go to the policy page, and then select **Copy** to copy the sign-in URL.
112+
1. In the browser address bar, remove the `&prompt=login` query string parameter, which forces the user to enter their credentials on that request.
113+
1. In the browser, click **Go**. Now Azure AD B2C will issue an access token without prompting you to sign-in again.
114+
115+
## Next steps
116+
117+
Find the sample policy [here](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/keep%20me%20signed%20in).

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,16 @@ The technical profile also returns claims that aren't returned by the identity p
8888
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token. |
8989
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
9090

91+
### Error messages
92+
93+
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the OpenID Connect technical profile. The error messages can be [localized](localization-string-ids.md#sign-up-or-sign-in-error-messages).
94+
95+
| Attribute | Required | Description |
96+
| --------- | -------- | ----------- |
97+
| UserMessageIfClaimsPrincipalDoesNotExist | No | The message to display to the user if an account with the provided username not found in the directory. |
98+
| UserMessageIfInvalidPassword | No | The message to display to the user if the password is incorrect. |
99+
| UserMessageIfOldPasswordUsed| No | The message to display to the user if an old password used.|
100+
91101
## Cryptographic keys
92102

93103
The **CryptographicKeys** element contains the following attribute:

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ The following example demonstrates the use of a self-asserted technical profile
174174

175175
## Persist claims
176176

177-
If the **PersistedClaims** element is absent, the self-asserted technical profile doesn't persist the data to Azure AD B2C. Instead, a call is made to a validation technical profile that's responsible for persisting the data. For example, the sign-up policy uses the `LocalAccountSignUpWithLogonEmail` self-asserted technical profile to collect the new user profile. The `LocalAccountSignUpWithLogonEmail` technical profile calls the validation technical profile to create the account in Azure AD B2C.
177+
The PersistedClaims element is not used. The self-asserted technical profile doesn't persist the data to Azure AD B2C. Instead, a call is made to a validation technical profile that's responsible for persisting the data. For example, the sign-up policy uses the `LocalAccountSignUpWithLogonEmail` self-asserted technical profile to collect the new user profile. The `LocalAccountSignUpWithLogonEmail` technical profile calls the validation technical profile to create the account in Azure AD B2C.
178178

179179
## Validation technical profiles
180180

articles/active-directory-domain-services/troubleshoot-account-lockout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The most common reasons for an account to be locked out, without any malicious i
5252

5353
## Troubleshoot account lockouts with security audits
5454

55-
To troubleshoot when account lockout events occur and where they're coming from, [enable security audits for Azure AD DS (currently in preview)][security-audit-events]. Audit events are only captured from the time you enable the feature. Ideally, you should enable security audits *before* there's an account lockout issue to troubleshoot. If a user account repeatedly has lockout issues, you can enable security audits ready for the next time the situation occurs.
55+
To troubleshoot when account lockout events occur and where they're coming from, [enable security audits for Azure AD DS][security-audit-events]. Audit events are only captured from the time you enable the feature. Ideally, you should enable security audits *before* there's an account lockout issue to troubleshoot. If a user account repeatedly has lockout issues, you can enable security audits ready for the next time the situation occurs.
5656

5757
Once you have enabled security audits, the following sample queries show you how to review *Account Lockout Events*, code *4740*.
5858

articles/active-directory-domain-services/tutorial-create-management-vm.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,6 @@ To get started, connect to the Windows Server VM as follows:
8787

8888
![Connect to Windows virtual machine using Bastion in the Azure portal](./media/join-windows-vm/connect-to-vm.png)
8989

90-
You can also [create and use an Azure Bastion host (currently in preview)][azure-bastion] to allow access only through the Azure portal over TLS.
9190
1. Enter the credentials for your VM, then select **Connect**.
9291

9392
![Connect through the Bastion host in the Azure portal](./media/join-windows-vm/connect-to-bastion.png)

articles/active-directory/hybrid/howto-troubleshoot-upn-changes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ Create a defined procedure for changing UPNs on individual users as part of norm
105105

106106
The following sections detail potential known issues and workarounds when UPNs are changed.
107107

108-
## App provisioning known issues and workarounds
108+
## user provisioning known issues and workarounds
109109

110110
[Software as a service (SaaS)](https://azure.microsoft.com/overview/what-is-saas/) and Line of Business (LoB) applications often rely on UPNs to find users and store user profile information, including roles. Applications that use [Just in Time provisioning](https://docs.microsoft.com/azure/active-directory/app-provisioning/user-provisioning) to create a user profile when users sign in to the app for the first time can be affected by UPN changes.
111111

@@ -228,10 +228,10 @@ The user needs to select the drop-down menu on the account enabled for Phone sig
228228
## Security Key (FIDO2) known issues and workarounds
229229

230230
**Known issues** <br>
231-
Users are not able to sign in to Windows Azure AD Join or Hybrid Join devices using a security key enrolled before the UPN change.
231+
When multiple users are registered on the same key, the sign in screen shows an account selection page where the old UPN is displayed. Sign ins using Security Keys are not affected by UPN changes.
232232

233233
**Workaround**<br>
234-
Users must [reset the security key and re-register](https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-security-key#known-issues).
234+
To remove references to old UPNs, users must [reset the security key and re-register](https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-security-key#known-issues).
235235

236236
## OneDrive known issues and workarounds
237237

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ This article gives you an overview of the sign-ins report.
4343

4444
### What Azure AD license do you need to access sign-in activity?
4545

46-
- The sign-in activity report is available in all editions of Azure AD.
46+
- The sign-in activity report is available in [all editions of Azure AD](reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data).
4747

4848
- If you want to access the sign-in data using an API, your tenant must have an [Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) license associated with it.
4949

@@ -173,13 +173,17 @@ The **Location** - The location the connection was initiated from:
173173
**Correlation ID** - The correlation ID of the activity.
174174

175175

176+
177+
176178
**Conditional access** - The status of the applied conditional access rules
177179

178-
- Not applied
180+
- **Not applied**: No policy applied to the user and application during sign-in.
181+
182+
- **Success**: One or more conditional access policies applied to the user and application (but not necessarily the other conditions) during sign-in.
183+
184+
- **Failure**: One or more conditional access policies applied and was not satisfied during sign-in.
179185

180-
- Success
181186

182-
- Failure
183187

184188

185189

0 commit comments

Comments
 (0)