Skip to content

Commit e8f1cae

Browse files
authored
Merge branch 'master' into master
2 parents 8687ee5 + 23cf7e5 commit e8f1cae

File tree

2,389 files changed

+36336
-19711
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,389 files changed

+36336
-19711
lines changed

.openpublishing.redirection.json

Lines changed: 139 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -165,6 +165,12 @@
165165
"redirect_url": "/azure/iot-fundamentals/iot-introduction",
166166
"redirect_document_id": false
167167
},
168+
169+
{
170+
"source_path": "articles/iot-hub/iot-hub-create-using-cli-nodejs.md",
171+
"redirect_url": "/azure/iot-hub/iot-hub-create-using-cli",
172+
"redirect_document_id": true
173+
},
168174
{
169175
"source_path": "articles/cognitive-services/custom-decision-service/custom-decision-service-tutorial-analytics.md",
170176
"redirect_url": "/azure/cognitive-services/custom-decision-service",
@@ -2877,7 +2883,32 @@
28772883
},
28782884
{
28792885
"source_path": "articles/automation/automation-sec-configure-azure-runas-account.md",
2880-
"redirect_url": "/azure/automation/automation-create-runas-account",
2886+
"redirect_url": "/azure/automation/manage-runas-account",
2887+
"redirect_document_id": false
2888+
},
2889+
{
2890+
"source_path": "articles/automation/automation-create-runas-account.md",
2891+
"redirect_url": "/azure/automation/manage-runas-account",
2892+
"redirect_document_id": false
2893+
},
2894+
{
2895+
"source_path": "articles/automation/automation-manage-account.md",
2896+
"redirect_url": "/azure/automation/manage-runas-account",
2897+
"redirect_document_id": false
2898+
},
2899+
{
2900+
"source_path": "articles/automation/automation-create-aduser-account.md",
2901+
"redirect_url": "/azure/automation/automation-credentials",
2902+
"redirect_document_id": false
2903+
},
2904+
{
2905+
"source_path": "articles/automation/automation-verify-runas-authentication.md",
2906+
"redirect_url": "/azure/automation/manage-runas-account",
2907+
"redirect_document_id": false
2908+
},
2909+
{
2910+
"source_path": "articles/automation/automation-runbook-settings.md",
2911+
"redirect_url": "/azure/automation/automation-runbook-execution",
28812912
"redirect_document_id": false
28822913
},
28832914
{
@@ -8372,6 +8403,11 @@
83728403
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/cli-samples",
83738404
"redirect_document_id": false
83748405
},
8406+
{
8407+
"source_path": "articles/cosmos-db/access-control.md",
8408+
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/secure-access-to-data",
8409+
"redirect_document_id": false
8410+
},
83758411
{
83768412
"source_path": "articles/documentdb/documentdb-automation-resource-manager-cli-nodejs.md",
83778413
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/cli-samples",
@@ -8389,7 +8425,7 @@
83898425
},
83908426
{
83918427
"source_path": "articles/documentdb/table-powershell.md",
8392-
"redirect_url": "https://docs.microsoft.com/en-us/azure/cosmos-db/table-introduction",
8428+
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/table-introduction",
83938429
"redirect_document_id": false
83948430
},
83958431
{
@@ -9112,6 +9148,11 @@
91129148
"redirect_url": "/azure/lab-services/classroom-labs/tutorial-setup-lab-account",
91139149
"redirect_document_id": false
91149150
},
9151+
{
9152+
"source_path": "articles/log-analytics/log-analytics-add-solutions.md",
9153+
"redirect_url": "/azure/monitoring/monitoring-solutions",
9154+
"redirect_document_id": false
9155+
},
91159156
{
91169157
"source_path": "articles/log-analytics/log-analytics-security.md",
91179158
"redirect_url": "/azure/log-analytics/log-analytics-data-security",
@@ -9124,7 +9165,7 @@
91249165
},
91259166
{
91269167
"source_path": "articles/log-analytics/log-analytics-configuration-assessment.md",
9127-
"redirect_url": "/azure/log-analytics/log-analytics-add-solutions",
9168+
"redirect_url": "/azure/monitoring/monitoring-solutions-inventory",
91289169
"redirect_document_id": false
91299170
},
91309171
{
@@ -12833,6 +12874,11 @@
1283312874
"redirect_url": "./end-user/microsoft-authenticator-app-how-to",
1283412875
"redirect_document_id": false
1283512876
},
12877+
{
12878+
"source_path": "articles/service-fabric/service-fabric-get-started-standalone-cluster.md",
12879+
"redirect_url": "/azure/service-fabric/service-fabric-cluster-creation-for-windows-server",
12880+
"redirect_document_id": false
12881+
},
1283612882
{
1283712883
"source_path": "articles/service-fabric/service-fabric-update-vmss-sku.md",
1283812884
"redirect_url": "/azure/service-fabric/service-fabric-cluster-upgrade",
@@ -23971,6 +24017,11 @@
2397124017
"redirect_url": "/azure/active-directory/authentication/howto-mfa-userdevicesettings",
2397224018
"redirect_document_id": true
2397324019
},
24020+
{
24021+
"source_path": "articles/network-watcher/prepare-flow-log.md",
24022+
"redirect_url": "/azure/network-watcher/network-watcher-nsg-flow-logging-overview",
24023+
"redirect_document_id": true
24024+
},
2397424025
{
2397524026
"source_path": "articles/network-watcher/network-watcher-nsg-flow-logging-cli-nodejs.md",
2397624027
"redirect_url": "/azure/network-watcher/network-watcher-nsg-flow-logging-cli",
@@ -25571,6 +25622,11 @@
2557125622
"redirect_url": "/azure/storage/queues/storage-queues-introduction",
2557225623
"redirect_document_id": false
2557325624
},
25625+
{
25626+
"source_path": "articles/storage/data-lake-storage/index.md",
25627+
"redirect_url": "/azure/storage/data-lake-storage/introduction",
25628+
"redirect_document_id": false
25629+
},
2557425630
{
2557525631
"source_path": "articles/dev-spaces/index.md",
2557625632
"redirect_url": "/azure/dev-spaces/azure-dev-spaces",
@@ -26411,6 +26467,31 @@
2641126467
"redirect_url": "/azure/azure-stack/user/azure-stack-create-vm-template",
2641226468
"redirect_document_id": false
2641326469
},
26470+
{
26471+
"source_path": "articles/azure-stack/user/azure-stack-powershell-download.md",
26472+
"redirect_url": "/azure/azure-stack/azure-stack-powershell-download",
26473+
"redirect_document_id": false
26474+
},
26475+
{
26476+
"source_path": "articles/azure-stack/azure-stack-extension-host-prepare.md",
26477+
"redirect_url": "/azure/azure-stack",
26478+
"redirect_document_id": false
26479+
},
26480+
{
26481+
"source_path": "articles/azure-stack/user/azure-stack-metrics-azure-data.md",
26482+
"redirect_url": "/azure/azure-stack",
26483+
"redirect_document_id": false
26484+
},
26485+
{
26486+
"source_path": "articles/azure-stack/user/azure-stack-metrics-monitor.md",
26487+
"redirect_url": "/azure/azure-stack",
26488+
"redirect_document_id": false
26489+
},
26490+
{
26491+
"source_path": "articles/azure-stack/user/azure-stack-metrics-supported.md",
26492+
"redirect_url": "/azure/azure-stack",
26493+
"redirect_document_id": false
26494+
},
2641426495
{
2641526496
"source_path": "articles/active-directory/application-proxy-teams.md",
2641626497
"redirect_url": "/azure/active-directory/manage-apps/application-proxy-integrate-with-teams",
@@ -26981,6 +27062,21 @@
2698127062
"redirect_url": "/azure/active-directory/user-help/active-directory-saas-access-panel-user-help",
2698227063
"redirect_document_id": true
2698327064
},
27065+
{
27066+
"source_path": "articles/active-directory/user-help/microsoft-authenticator-app-phone-signin-faq.md",
27067+
"redirect_url": "/azure/active-directory/user-help/microsoft-authenticator-app-how-to",
27068+
"redirect_document_id": false
27069+
},
27070+
{
27071+
"source_path": "articles/active-directory/user-help/device-management-azuread-registered-devices-windows10-setup.md",
27072+
"redirect_url": "/azure/active-directory/user-help/user-help-register-device-on-network",
27073+
"redirect_document_id": true
27074+
},
27075+
{
27076+
"source_path": "articles/active-directory/user-help/device-management-azuread-joined-devices-setup.md",
27077+
"redirect_url": "/azure/active-directory/user-help/user-help-join-device-on-network",
27078+
"redirect_document_id": true
27079+
},
2698427080
{
2698527081
"source_path": "articles/hdinsight/kafka/apache-kafka-azure-functions.md",
2698627082
"redirect_url": "/azure/hdinsight/kafka/apache-kafka-introduction",
@@ -27234,6 +27330,46 @@
2723427330
"source_path": "articles/active-directory/active-directory-conditional-access-mam.md",
2723527331
"redirect_url": "/azure/active-directory/conditional-access/app-based-conditional-access",
2723627332
"redirect_document_id": true
27333+
},
27334+
{
27335+
"source_path": "articles/active-directory/active-directory-conditional-access-no-modern-authentication.md",
27336+
"redirect_url": "/azure/active-directory/conditional-access/conditional-access-for-exo-and-spo",
27337+
"redirect_document_id": true
27338+
},
27339+
{
27340+
"source_path": "articles/cognitive-services/speech-service/speech-scenarios.md",
27341+
"redirect_url": "/azure/cognitive-services/speech-service/overview",
27342+
"redirect_document_id": true
27343+
},
27344+
{
27345+
"source_path": "articles/aks/aks-ssh.md",
27346+
"redirect_url": "/azure/aks/ssh",
27347+
"redirect_document_id": true
27348+
},
27349+
{
27350+
"source_path": "articles/cognitive-services/luis/Home.md",
27351+
"redirect_url": "/azure/cognitive-services/luis/what-is-luis",
27352+
"redirect_document_id": true
27353+
},
27354+
{
27355+
"source_path": "articles/data-factory/data-factory-monitor-oms.md",
27356+
"redirect_url": "/azure/data-factory/monitor-using-azure-monitor",
27357+
"redirect_document_id": true
27358+
},
27359+
{
27360+
"source_path": "articles/virtual-machines/linux/ansible-create-complete-vm.md",
27361+
"redirect_url": "/azure/virtual-machines/linux/ansible-create-vm",
27362+
"redirect_document_id": true
27363+
},
27364+
{
27365+
"source_path": "articles/networking/networking-virtual-datacenter.md",
27366+
"redirect_url": "/azure/architecture/vdc/networking-virtual-datacenter",
27367+
"redirect_document_id": true
27368+
},
27369+
{
27370+
"source_path": "articles/security-center/security-center-disk-encryption.md",
27371+
"redirect_url": "/azure/security/azure-security-disk-encryption-overview",
27372+
"redirect_document_id": false
2723727373
}
2723827374
]
2723927375
}

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -261,6 +261,8 @@
261261
href: https://azure.microsoft.com/roadmap/?category=security-identity
262262
- name: Frequently asked questions
263263
href: active-directory-b2c-faqs.md
264+
- name: Getting help
265+
href: /azure/active-directory/develop/developer-support-help-options
264266
- name: Pricing
265267
href: https://azure.microsoft.com/pricing/details/active-directory-b2c/
266268
- name: Pricing calculator

articles/active-directory-b2c/active-directory-b2c-reference-threat-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,4 +24,4 @@ Azure AD B2C uses detection and mitigation techniques like SYN cookies, and rate
2424

2525
Azure AD B2C also has mitigation techniques in place for password attacks. Mitigation includes brute-force password attacks and dictionary password attacks. Passwords that are set by users are required to be reasonably complex. By using various signals, Azure AD B2C analyzes the integrity of requests. Azure AD B2C is designed to intelligently differentiate intended users from hackers and botnets. Azure AD B2C provides a sophisticated strategy to lock accounts based on the passwords entered, in the likelihood of an attack.
2626

27-
For more information, visit the [Microsoft Trust Center](https://www.microsoft.com/en-us/trustcenter/default.aspx).
27+
For more information, visit the [Microsoft Trust Center](https://www.microsoft.com/trustcenter/default.aspx).

articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/04/2017
11+
ms.date: 08/15/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -109,7 +109,7 @@ You can define Azure AD as a claims provider by adding Azure AD to the `<ClaimsP
109109
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name" />
110110
<OutputClaim ClaimTypeReferenceId="surName" PartnerClaimType="family_name" />
111111
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="name" />
112-
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="contosoAuthentication" />
112+
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
113113
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="AzureADContoso" />
114114
</OutputClaims>
115115
<OutputClaimsTransformations>

articles/active-directory-b2c/active-directory-b2c-setup-sf-app-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 06/11/2017
11+
ms.date: 08/15/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -146,7 +146,7 @@ You need to define Salesforce as a claims provider so users can sign in by using
146146
<OutputClaim ClaimTypeReferenceId="surname" PartnerClaimType="family_name"/>
147147
<OutputClaim ClaimTypeReferenceId="email" PartnerClaimType="email"/>
148148
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="username"/>
149-
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="externalIdp"/>
149+
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication"/>
150150
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="SAMLIdp" />
151151
</OutputClaims>
152152
<OutputClaimsTransformations>

articles/active-directory-b2c/active-directory-b2c-user-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -359,7 +359,7 @@ You can view and monitor logging information in near-real time.
359359
After you complete the [Get started with custom policies][B2C-GetStartedCustom] walkthrough, we recommend that you build your scenario by using your own custom policy files. For your reference, we have provided [Sample policy files][UserMigrationSample].
360360

361361
[AD-PasswordPolicies]: https://docs.microsoft.com/azure/active-directory/active-directory-passwords-policy
362-
[AD-Powershell]: https://docs.microsoft.com/en-us/powershell/azure/active-directory/install-adv2
362+
[AD-Powershell]: https://docs.microsoft.com/powershell/azure/active-directory/install-adv2
363363
[AppService-Deploy]: https://docs.microsoft.com/aspnet/core/tutorials/publish-to-azure-webapp-using-vs
364364
[B2C-AppRegister]: https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-app-registration
365365
[B2C-GetStarted]: https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-get-started

articles/active-directory-b2c/manage-user-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Depending on application regulation, parental consent might need to be granted b
4242

4343
The following is an example of a user flow for gathering parental consent:
4444

45-
1. An [Azure Active Directory Graph API](https://msdn.microsoft.com/en-us/library/azure/ad/graph/api/api-catalog) operation identifies the user as a minor and returns the user data to the application in the form of an unsigned JSON token.
45+
1. An [Azure Active Directory Graph API](https://msdn.microsoft.com/library/azure/ad/graph/api/api-catalog) operation identifies the user as a minor and returns the user data to the application in the form of an unsigned JSON token.
4646

4747
2. The application processes the JSON token and shows a screen to the minor, notifying him or her that parental consent is required and requesting the consent of a parent online.
4848

@@ -52,7 +52,7 @@ The following is an example of a user flow for gathering parental consent:
5252

5353
5. When either the minor or the adult revokes consent, the Azure AD Graph API can be used to change **consentProvidedForMinor** to **denied**. Alternatively, the application may choose to delete a minor whose consent has been revoked. It is optionally possible to customize the user flow so that the authenticated minor (or parent that is using the minor’s account) can revoke consent. Azure AD B2C records **consentProvidedForMinor** as **denied**.
5454

55-
For more information about **legalAgeGroupClassification**, **consentProvidedForMinor**, and **ageGroup**, see [User resource type](https://developer.microsoft.com/en-us/graph/docs/api-reference/beta/resources/user). For more information about custom attributes, see [Use custom attributes to collect information about your consumers](active-directory-b2c-reference-custom-attr.md). When you address extended attributes by using the Azure AD Graph API, you must use the long version of the attribute, such as *extension_18b70cf9bb834edd8f38521c2583cd86_dateOfBirth*: *2011-01-01T00:00:00Z*.
55+
For more information about **legalAgeGroupClassification**, **consentProvidedForMinor**, and **ageGroup**, see [User resource type](https://developer.microsoft.com/graph/docs/api-reference/beta/resources/user). For more information about custom attributes, see [Use custom attributes to collect information about your consumers](active-directory-b2c-reference-custom-attr.md). When you address extended attributes by using the Azure AD Graph API, you must use the long version of the attribute, such as *extension_18b70cf9bb834edd8f38521c2583cd86_dateOfBirth*: *2011-01-01T00:00:00Z*.
5656

5757
## Gather date of birth and country data
5858

articles/active-directory-b2c/manage-user-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.component: B2C
1515

1616
# Manage user data in Azure Active Directory B2C
1717

18-
This article discusses how you can manage the user data in Azure Active Directory (Azure AD) B2C by using the operations that are provided by the [Azure Active Directory Graph API](https://msdn.microsoft.com/en-us/library/azure/ad/graph/api/api-catalog). Managing user data includes deleting or exporting data from audit logs.
18+
This article discusses how you can manage the user data in Azure Active Directory (Azure AD) B2C by using the operations that are provided by the [Azure Active Directory Graph API](https://msdn.microsoft.com/library/azure/ad/graph/api/api-catalog). Managing user data includes deleting or exporting data from audit logs.
1919

2020
[!INCLUDE [gdpr-intro-sentence.md](../../includes/gdpr-intro-sentence.md)]
2121

articles/active-directory-domain-services/active-directory-ds-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ If one or more users in your Azure AD tenant are unable to sign in to the newly
135135
* **External accounts:** Ensure that the affected user account is not an external account in the Azure AD tenant. Examples of external accounts include Microsoft accounts (for example, '[email protected]') or user accounts from an external Azure AD directory. Since Azure AD Domain Services does not have credentials for such user accounts, these users cannot sign in to the managed domain.
136136
* **Synced accounts:** If the affected user accounts are synchronized from an on-premises directory, verify that:
137137

138-
* You have deployed or updated to the [latest recommended release of Azure AD Connect](https://www.microsoft.com/en-us/download/details.aspx?id=47594).
138+
* You have deployed or updated to the [latest recommended release of Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
139139
* You have configured Azure AD Connect to [perform a full synchronization](active-directory-ds-getting-started-password-sync.md).
140140
* Depending on the size of your directory, it may take a while for user accounts and credential hashes to be available in Azure AD Domain Services. Ensure you wait long enough before retrying authentication.
141141
* If the issue persists after verifying the preceding steps, try restarting the Microsoft Azure AD Sync Service. From your sync machine, launch a command prompt and execute the following commands:

0 commit comments

Comments
 (0)