Skip to content

Commit e66efea

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into service-health
2 parents edafe01 + 7bb5de5 commit e66efea

File tree

201 files changed

+2050
-1206
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

201 files changed

+2050
-1206
lines changed

.openpublishing.redirection.json

Lines changed: 55 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -801,34 +801,49 @@
801801
"redirect_url": "/azure/machine-learning",
802802
"redirect_document_id": false
803803
},
804+
{
805+
"source_path": "articles/cognitive-services/QnAMaker/concepts/data-sources-supported.md",
806+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/reference-document-format-guidelines",
807+
"redirect_document_id": false
808+
},
809+
{
810+
"source_path": "articles/cognitive-services/QnAMaker/tutorials/choosing-capacity-qnamaker-deployment.md",
811+
"redirect_url": "/azure/cognitive-services/QnAMaker/Concepts/azure-resources",
812+
"redirect_document_id": false
813+
},
804814
{
805815
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-publish-kb-nodejs-sdk.md",
806-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
816+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
807817
"redirect_document_id": false
808818
},
809819
{
810820
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-publish-kb-csharp-sdk.md",
811-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
821+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
812822
"redirect_document_id": false
813823
},
814824
{
815825
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/python-sdk.md",
816-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/quickstart-sdk",
826+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/quickstart-sdk",
817827
"redirect_document_id": false
818828
},
819829
{
820830
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/create-knowledge-rest-api-nodejs.md",
821-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/publish-kb-nodejs",
831+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/publish-kb-nodejs",
822832
"redirect_document_id": false
823833
},
824834
{
825835
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-postman.md",
826-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
836+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
827837
"redirect_document_id": false
828838
},
829839
{
830840
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-curl.md",
831-
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
841+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
842+
"redirect_document_id": false
843+
},
844+
{
845+
"source_path": "articles/cognitive-services/personalizer/how-to-learning-policy.md",
846+
"redirect_url": "/azure/cognitive-services/personalizer/how-to-manage-model",
832847
"redirect_document_id": false
833848
},
834849
{
@@ -981,11 +996,6 @@
981996
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-new-kb-csharp",
982997
"redirect_document_id": false
983998
},
984-
{
985-
"source_path": "articles/cognitive-services/QnAMaker/Concepts/data-sources-supported.md",
986-
"redirect_url": "/azure/cognitive-services/QnAMaker/concepts/knowledge-base",
987-
"redirect_document_id": false
988-
},
989999
{
9901000
"source_path": "articles/cognitive-services/QnAMaker/How-To/create-knowledge-base.md",
9911001
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/create-publish-knowledge-base",
@@ -1661,6 +1671,26 @@
16611671
"redirect_url": "/azure/cognitive-services/bing-web-search/bing-web-stats",
16621672
"redirect_document_id": false
16631673
},
1674+
{
1675+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-quickstart.md",
1676+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1677+
"redirect_document_id": false
1678+
},
1679+
{
1680+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-java-quickstart.md",
1681+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1682+
"redirect_document_id": false
1683+
},
1684+
{
1685+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-node-quickstart.md",
1686+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1687+
"redirect_document_id": false
1688+
},
1689+
{
1690+
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-python-quickstart.md",
1691+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1692+
"redirect_document_id": false
1693+
},
16641694
{
16651695
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
16661696
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",
@@ -27188,8 +27218,8 @@
2718827218
},
2718927219
{
2719027220
"source_path": "articles/storage/storage-java-jenkins-continuous-integration-solution.md",
27191-
"redirect_url": "/azure/storage/common/storage-java-jenkins-continuous-integration-solution",
27192-
"redirect_document_id": true
27221+
"redirect_url": "/azure/jenkins/storage-java-jenkins-continuous-integration-solution",
27222+
"redirect_document_id": false
2719327223
},
2719427224
{
2719527225
"source_path": "articles/storage/storage-manage-access-to-resources.md",
@@ -45118,7 +45148,7 @@
4511845148
},
4511945149
{
4512045150
"source_path": "articles/iot-central/howto-connect-nodejs.md",
45121-
"redirect_url": "/azure/iot-central/core/howto-connect-nodejs/",
45151+
"redirect_url": "/azure/iot-central/core/tutorial-connect-device/",
4512245152
"redirect_document_id": true
4512345153
},
4512445154
{
@@ -45598,7 +45628,7 @@
4559845628
},
4559945629
{
4560045630
"source_path": "articles/iot-central/core/howto-connect-nodejs.md",
45601-
"redirect_url": "/azure/iot-central/core/",
45631+
"redirect_url": "/azure/iot-central/core/tutorial-connect-device/",
4560245632
"redirect_document_id": false
4560345633
},
4560445634
{
@@ -48936,6 +48966,16 @@
4893648966
"source_path": "articles/aks/jenkins-continuous-deployment.md",
4893748967
"redirect_url": "/azure/jenkins/jenkins-continuous-deployment",
4893848968
"redirect_document_id": false
48969+
},
48970+
{
48971+
"source_path": "articles/storage/common/storage-java-jenkins-continuous-integration-solution.md",
48972+
"redirect_url": "/azure/jenkins/storage-java-jenkins-continuous-integration-solution",
48973+
"redirect_document_id": false
48974+
},
48975+
{
48976+
"source_path": "articles/aks/acs-aks-migration.md",
48977+
"redirect_url": "/azure/aks/aks-migration",
48978+
"redirect_document_id": false
4893948979
}
4894048980
]
4894148981
}

.vscode/settings.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,5 +54,8 @@
5454
"XAML",
5555
"XML",
5656
"YAML"
57+
],
58+
"cSpell.words": [
59+
"auditd"
5760
]
5861
}

articles/active-directory-b2c/code-samples.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ The following tables provide links to samples for applications including iOS, An
3535
| [dotnet-webapp-and-webapi](https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi) | A combined sample for a .NET web application that calls a .NET Web API, both secured using Azure AD B2C. |
3636
| [dotnetcore-webapp](https://github.com/Azure-Samples/active-directory-b2c-dotnetcore-webapp) | An ASP.NET Core web application that can sign in a user using Azure AD B2C, get an access token using MSAL.NET and call an API. |
3737
| [openidconnect-nodejs](https://github.com/AzureADQuickStarts/B2C-WebApp-OpenIDConnect-NodeJS) | A Node.js app that provides a quick and easy way to set up a Web application with Express using OpenID Connect. |
38-
| [javascript-nodejs-webapp](https://github.com/AzureADQuickStarts/active-directory-b2c-javascript-nodejs-webapp) | A node.js server that provides a quick and easy way to set up a REST API service using the OAuth2 protocol. |
3938
| [javascript-nodejs-webapi](https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi) | A small node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using passport.js. |
4039
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/master/README_B2C.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
4140

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,6 @@ Your custom policy and Azure AD B2C tenant are now ready. Next, create an applic
272272
1. Enter a **Name** for the application. For example, *SAMLApp1*.
273273
1. Under **Supported account types**, select **Accounts in this organizational directory only**
274274
1. Under **Redirect URI**, select **Web**, and then enter `https://localhost`. You modify this value later in the application registration's manifest.
275-
1. Select **Grant admin consent to openid and offline_access permissions**.
276275
1. Select **Register**.
277276

278277
### 4.2 Update the app manifest
@@ -334,7 +333,7 @@ The last step is to enable Azure AD B2C as a SAML IdP in your SAML relying party
334333
Some or all the following are typically required:
335334

336335
* **Metadata**: `https://tenant-name.b2clogin.com/tenant-name.onmicrosoft.com/policy-name/Samlp/metadata`
337-
* **Issuer**: `https://tenant-name.onmicrosoft.com/policy-name`
336+
* **Issuer**: `https://tenant-name.b2clogin.com/tenant-name.onmicrosoft.com/policy-name`
338337
* **Login Url/SAML endpoint/SAML Url**: Check the value in the metadata file
339338
* **Certificate**: This is *B2C_1A_SamlIdpCert*, but without the private key. To get the public key of the certificate:
340339

articles/active-directory-b2c/page-layout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/10/2020
12+
ms.date: 02/26/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -29,7 +29,7 @@ Page layout packages are periodically updated to include fixes and improvements
2929

3030
- All pages
3131
- Accessibility fixes
32-
- You can now add the `data-preload="true"` attribute in your HTML tags to control the load order for CSS and JavaScript.
32+
- You can now add the `data-preload="true"` attribute [in your HTML tags](custom-policy-ui-customization.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
3333
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
3434
- Control the order in which your `script` tags are fetched and executed before the page load.
3535
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions

articles/active-directory-b2c/phone-number-claims-transformations.md

Lines changed: 35 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/14/2020
12+
ms.date: 02/26/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -22,9 +22,39 @@ This article provides reference and examples for using the phone number claims t
2222

2323
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
2424

25+
## ConvertPhoneNumberClaimToString
26+
27+
Converts a `phoneNumber` data type into a `string` data type.
28+
29+
| Item | TransformationClaimType | Data Type | Notes |
30+
| ---- | ----------------------- | --------- | ----- |
31+
| InputClaim | phoneNumber | phoneNumber | The ClaimType to convert to a string. |
32+
| OutputClaim | phoneNumberString | string | The ClaimType that is produced after this claims transformation has been invoked. |
33+
34+
In this example, the cellPhoneNumber claim with a value type of `phoneNumber` is converted to a cellPhone claim with a value type of `string`.
35+
36+
```XML
37+
<ClaimsTransformation Id="PhoneNumberToString" TransformationMethod="ConvertPhoneNumberClaimToString">
38+
<InputClaims>
39+
<InputClaim ClaimTypeReferenceId="cellPhoneNumber" TransformationClaimType="phoneNumber" />
40+
</InputClaims>
41+
<OutputClaims>
42+
<OutputClaim ClaimTypeReferenceId="cellPhone" TransformationClaimType="phoneNumberString" />
43+
</OutputClaims>
44+
</ClaimsTransformation>
45+
```
46+
47+
### Example
48+
49+
- Input claims:
50+
- **phoneNumber**: +11234567890 (phoneNumber)
51+
- Output claims:
52+
- **phoneNumberString**: +11234567890 (string)
53+
54+
2555
## ConvertStringToPhoneNumberClaim
2656

27-
This claim validates the format of the phone number. If it is in a valid format, change it to a standard format used by Azure AD B2C. If the provided phone number is not in a valid format, an error message is returned.
57+
This claim transformation validates the format of the phone number. If it is in a valid format, change it to a standard format used by Azure AD B2C. If the provided phone number is not in a valid format, an error message is returned.
2858

2959
| Item | TransformationClaimType | Data Type | Notes |
3060
| ---- | ----------------------- | --------- | ----- |
@@ -64,10 +94,10 @@ The self-asserted technical profile that calls the validation technical profile
6494
### Example 1
6595

6696
- Input claims:
67-
- **phoneNumberString**: 045 456-7890
97+
- **phoneNumberString**: 033 456-7890
6898
- **country**: DK
6999
- Output claims:
70-
- **outputClaim**: +450546148120
100+
- **outputClaim**: +450334567890
71101

72102
### Example 2
73103

@@ -76,6 +106,7 @@ The self-asserted technical profile that calls the validation technical profile
76106
- Output claims:
77107
- **outputClaim**: +11234567890
78108

109+
79110
## GetNationalNumberAndCountryCodeFromPhoneNumberString
80111

81112
This extracts the country code and the national number from the input claim, and optionally throws an exception if the supplied phone number is not valid.

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -968,6 +968,9 @@ To host the service within Internet Information Services, a developer would buil
968968

969969
Requests from Azure Active Directory include an OAuth 2.0 bearer token. Any service receiving the request should authenticate the issuer as being Azure Active Directory for the expected Azure Active Directory tenant, for access to the Microsoft Graph API service. In the token, the issuer is identified by an iss claim, like "iss":"https://sts.windows.net/cbb1a5ac-f33b-45fa-9bf5-f37db0fed422/". In this example, the base address of the claim value, https://sts.windows.net, identifies Azure Active Directory as the issuer, while the relative address segment, cbb1a5ac-f33b-45fa-9bf5-f37db0fed422, is a unique identifier of the Azure Active Directory tenant for which the token was issued. The audience for the token will be the application template ID for the app in the gallery. The application template ID for all custom apps is 8adf8e6e-67b2-4cf2-a259-e3dc5476c621. The application template ID for each app in the gallery varies. Please contact [email protected] for questions on the application template ID for a gallery application. Each of the applications registered in a single tenant may receive the same `iss` claim with SCIM requests.
970970

971+
> [!NOTE]
972+
> It's ***not*** recommended to leave this field blank and rely on a token generated by Azure AD. This option is primarily available for testing purposes.
973+
971974
Developers using the CLI libraries provided by Microsoft for building a SCIM service can authenticate requests from Azure Active Directory using the Microsoft.Owin.Security.ActiveDirectory package by following these steps:
972975

973976
First, in a provider, implement the Microsoft.SystemForCrossDomainIdentityManagement.IProvider.StartupBehavior property by having it return a method to be called whenever the service is started:
@@ -1452,6 +1455,8 @@ Follow the checklist below to ensure that your application is onboarded quicky a
14521455
> [!div class="checklist"]
14531456
> * Support a [SCIM 2.0 ](https://docs.microsoft.com/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups#step-2-understand-the-azure-ad-scim-implementation) user and group endpoint (Only one is required but both are recommended)
14541457
> * Support at least 25 requests per second per tenant (Required)
1458+
> * Establish engineering and support contacts to guide customers post gallery onboarding (Required)
1459+
> * 3 Non-expiring test credentials for your application (Required)
14551460
> * Support the OAuth authorization code grant or a long lived token as described below (Required)
14561461
> * Establish an engineering and support point of contact to support customers post gallery onboarding (Required)
14571462
> * Support updating multiple group memberships with a single PATCH (Recommended)

articles/active-directory/cloud-provisioning/how-to-configure.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ manager: daveba
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 12/05/2019
10+
ms.date: 02/26/2020
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

16-
# Azure AD Connect cloud provisioning new agent configuration
16+
# Create a new configuration for Azure AD Connect cloud-based provisioning
1717

1818
After you've installed the agent, you need to sign in to the Azure portal and configure Azure Active Directory (Azure AD) Connect cloud provisioning. Follow these steps to enable the agent.
1919

@@ -51,7 +51,8 @@ You can scope the agent to synchronize specific users and groups by using on-pre
5151

5252
![Selected security groups option](media/how-to-configure/scope3.png)
5353

54-
1. Or you can change the scope to include only specific organizational units. Select **Done** and **Save**.
54+
1. Or you can change the scope to include only specific organizational units. Select **Done** and **Save**.
55+
2. Once you have changed the scope, you should [restart provisioning](#restart-provisioning) to initiate an immediate synchronization of the changes.
5556

5657
![Selected organizational units option](media/how-to-configure/scope4.png)
5758

articles/active-directory/cloud-provisioning/how-to-install.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: daveba
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 12/02/2019
10+
ms.date: 02/26/2020
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -91,7 +91,7 @@ To verify that the agent is running, follow these steps.
9191
![Services screen](media/how-to-troubleshoot/troubleshoot1.png)
9292

9393
>[!IMPORTANT]
94-
>The agent has been installed but it must be configured and enabled before it will start synchronizing users. To configure a new agent, see [Azure AD Connect cloud provisioning new agent configuration](how-to-configure.md).
94+
>The agent has been installed but it must be configured and enabled before it will start synchronizing users. To configure a new agent, see [Create a new configuration for Azure AD Connect cloud-based provisioning](how-to-configure.md).
9595
9696

9797

articles/active-directory/cloud-provisioning/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
### YamlMime:Landing
22

33
title: Azure AD Connect cloud provisioning documentation
4-
summary: Cloud provisioning helps simplify and automate the management of on-premises users by keeping everything in the cloud.
4+
summary: Cloud provisioning helps simplify and automate the management of Azure AD users, through cloud-managed rules for synchronizing those users from existing AD forests.
55

66

77

0 commit comments

Comments
 (0)