Skip to content

Commit e50e583

Browse files
committed
resolving merge conflicts with master
2 parents db76b5f + 401c26b commit e50e583

File tree

237 files changed

+2481
-2462
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

237 files changed

+2481
-2462
lines changed

.openpublishing.redirection.json

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -345,6 +345,17 @@
345345
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/dsvm-tools-languages",
346346
"redirect_document_id": true
347347
},
348+
{
349+
"source_path": "articles/machine-learning/data-science-virtual-machine/reference-centos-vm.md",
350+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/reference-deprecation",
351+
"redirect_document_id": false
352+
},
353+
{
354+
"source_path": "articles/machine-learning/data-science-virtual-machine/linux-dsvm-intro.md",
355+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/reference-deprecation",
356+
"redirect_document_id": true
357+
},
358+
348359
{
349360
"source_path": "articles/machine-learning/service/how-to-understand-accuracy-metrics.md",
350361
"redirect_url": "/azure/machine-learning/service/how-to-understand-automated-ml",
@@ -4055,11 +4066,21 @@
40554066
"redirect_url": "/azure/azure-government/documentation-government-welcome",
40564067
"redirect_document_id": false
40574068
},
4069+
{
4070+
"source_path": "articles/azure-government/documentation-government-k8.md",
4071+
"redirect_url": "/azure/azure-government",
4072+
"redirect_document_id": false
4073+
},
40584074
{
40594075
"source_path": "articles/azure-portal/resource-group-portal-linked-resources.md",
40604076
"redirect_url": "/azure/azure-portal/azure-portal-dashboards",
40614077
"redirect_document_id": false
40624078
},
4079+
{
4080+
"source_path": "articles/azure-resource-manager/templates/template-tutorial-create-linked-templates.md",
4081+
"redirect_url": "/azure/azure-resource-manager/templates/deployment-tutorial-linked-template",
4082+
"redirect_document_id": false
4083+
},
40634084
{
40644085
"source_path": "articles/azure-resource-manager/templates/template-tutorial-create-encrypted-storage-accounts.md",
40654086
"redirect_url": "/azure/azure-resource-manager/templates/template-tutorial-use-template-reference",
@@ -7586,7 +7607,7 @@
75867607
},
75877608
{
75887609
"source_path": "articles/azure-functions/functions-add-output-binding-storage-queue-python.md",
7589-
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-cli.md?pivots=programming-language-python",
7610+
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-cli?pivots=programming-language-python",
75907611
"redirect_document_id": false
75917612
},
75927613
{
@@ -19189,6 +19210,11 @@
1918919210
"redirect_url": "/azure/backup/backup-overview",
1919019211
"redirect_document_id": false
1919119212
},
19213+
{
19214+
"source_path": "articles/backup/tutorial-backup-azure-files.md",
19215+
"redirect_url": "/azure/backup/backup-afs",
19216+
"redirect_document_id": false
19217+
},
1919219218
{
1919319219
"source_path": "articles/backup/backup-azure-backup-ibiza-faq.md",
1919419220
"redirect_url": "/azure/backup/backup-azure-backup-faq",

articles/active-directory-b2c/secure-rest-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ To support bearer token authentication in your custom policy, modify the REST AP
268268
1. Ensure you add the claim used above as an input claim:
269269

270270
```xml
271-
<InputClaim ClaimTyeReferenceId="bearerToken"/>
271+
<InputClaim ClaimTypeReferenceId="bearerToken"/>
272272
```
273273

274274
After you add the above snippets, your technical profile should look like the following XML code:
@@ -288,7 +288,7 @@ After you add the above snippets, your technical profile should look like the fo
288288
<Item Key="AllowInsecureAuthInProduction">false</Item>
289289
</Metadata>
290290
<InputClaims>
291-
<InputClaim ClaimTyeReferenceId="bearerToken"/>
291+
<InputClaim ClaimTypeReferenceId="bearerToken"/>
292292
</InputClaims>
293293
...
294294
</TechnicalProfile>

articles/active-directory-domain-services/troubleshoot-account-lockout.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: troubleshooting
12-
ms.date: 10/02/2019
12+
ms.date: 04/06/2020
1313
ms.author: iainfou
1414

1515
#Customer intent: As a directory administrator, I want to troubleshoot why user accounts are locked out in an Azure Active Directory Domain Services managed domain.
@@ -31,11 +31,11 @@ The default account lockout thresholds are configured using fine-grained passwor
3131

3232
### Fine-grained password policy
3333

34-
Fine-grained password policies (FGPPs) let you apply specific restrictions for password and account lockout policies to different users in a domain. FGPP only affects users created in Azure AD DS. Cloud users and domain users synchronized into the Azure AD DS managed domain from Azure AD aren't affected by the password policies.
34+
Fine-grained password policies (FGPPs) let you apply specific restrictions for password and account lockout policies to different users in a domain. FGPP only affects users within an Azure AD DS managed domain. Cloud users and domain users synchronized into the Azure AD DS managed domain from Azure AD are only affected by the password policies within Azure AD DS. Their accounts in Azure AD or an on-premises directory aren't impacted.
3535

3636
Policies are distributed through group association in the Azure AD DS managed domain, and any changes you make are applied at the next user sign-in. Changing the policy doesn't unlock a user account that's already locked out.
3737

38-
For more information on fine-grained password policies, see [Configure password and account lockout policies][configure-fgpp].
38+
For more information on fine-grained password policies, and the differences between users created directly in Azure AD DS versus synchronized in from Azure AD, see [Configure password and account lockout policies][configure-fgpp].
3939

4040
## Common account lockout reasons
4141

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ Use the following table to choose which method will support your requirements an
159159

160160
## Next steps
161161

162-
[Enable FIDO2 security key passwordlesss options in your organization](howto-authentication-passwordless-security-key.md)
162+
[Enable FIDO2 security key passwordless options in your organization](howto-authentication-passwordless-security-key.md)
163163

164164
[Enable phone-based passwordless options in your organization](howto-authentication-passwordless-phone.md)
165165

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 04/02/2020
9+
ms.date: 04/06/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -32,9 +32,9 @@ The following options are available to include when creating a Conditional Acces
3232
- All users
3333
- All users that exist in the directory including B2B guests.
3434
- Select users and groups
35-
- All guest and external users (preview)
35+
- All guest and external users
3636
- This selection includes any B2B guests and external users including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
37-
- Directory roles (preview)
37+
- Directory roles
3838
- Allows administrators to select specific Azure AD directory roles used to determine assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role.
3939
- Users and groups
4040
- Allows targeting of specific sets of users. For example, organizations can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of group in Azure AD, including dynamic or assigned security and distribution groups.
@@ -48,9 +48,9 @@ When organizations both include and exclude a user or group the user or group is
4848

4949
The following options are available to exclude when creating a Conditional Access policy.
5050

51-
- All guest and external users (preview)
51+
- All guest and external users
5252
- This selection includes any B2B guests and external users including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
53-
- Directory roles (preview)
53+
- Directory roles
5454
- Allows administrators to select specific Azure AD directory roles used to determine assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role.
5555
- Users and groups
5656
- Allows targeting of specific sets of users. For example, organizations can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of group in Azure AD, including dynamic or assigned security and distribution groups.

articles/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
3939

4040
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
4141
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
42-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically.
42+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals are not blocked by Conditional Access.
4343
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
4444

4545
## Create a Conditional Access policy

articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
2929

3030
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
3131
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
32-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically.
32+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals are not blocked by Conditional Access.
3333
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
3434

3535
## Application exclusions

articles/active-directory/conditional-access/howto-conditional-access-policy-azure-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
3131

3232
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
3333
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
34-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically.
34+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals are not blocked by Conditional Access.
3535
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
3636

3737
## Create a Conditional Access policy

articles/active-directory/conditional-access/howto-conditional-access-policy-block-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
3030

3131
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
3232
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
33-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically.
33+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals are not blocked by Conditional Access.
3434
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
3535

3636
## Create a Conditional Access policy
Loading

0 commit comments

Comments
 (0)