Skip to content

Commit eb2d9ad

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1679050af
2 parents 7b2433b + dcb46c5 commit eb2d9ad

File tree

394 files changed

+4484
-2595
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

394 files changed

+4484
-2595
lines changed

.openpublishing.redirection.json

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7049,6 +7049,11 @@
70497049
"redirect_url": "/azure/app-service-mobile",
70507050
"redirect_document_id": false
70517051
},
7052+
{
7053+
"source_path": "articles/application-gateway/application-gateway-covid-guidelines.md",
7054+
"redirect_url": "/azure/application-gateway/high-traffic-support",
7055+
"redirect_document_id": false
7056+
},
70527057
{
70537058
"source_path": "articles/application-gateway/application-gateway-backend-ssl.md",
70547059
"redirect_url": "/azure/application-gateway/ssl-overview",
@@ -26594,6 +26599,21 @@
2659426599
"redirect_url": "/azure/virtual-machines/linux/tutorial-lamp-stack",
2659526600
"redirect_document_id": false
2659626601
},
26602+
{
26603+
"source_path": "articles/vpn-gateway/nva-working-remotely-support.md",
26604+
"redirect_url": "/azure/vpn-gateway/nva-work-remotely-support",
26605+
"redirect_document_id": false
26606+
},
26607+
{
26608+
"source_path": "articles/expressroute/working-remotely-support.md",
26609+
"redirect_url": "/azure/expressroute/work-remotely-support",
26610+
"redirect_document_id": false
26611+
},
26612+
{
26613+
"source_path": "articles/bastion/working-remotely-support.md",
26614+
"redirect_url": "/azure/bastion/work-remotely-support",
26615+
"redirect_document_id": false
26616+
},
2659726617
{
2659826618
"source_path": "articles/vpn-gateway/vpn-gateway-site-to-site-create.md",
2659926619
"redirect_url": "/azure/vpn-gateway/vpn-gateway-howto-site-to-site-classic-portal",
@@ -43745,6 +43765,11 @@
4374543765
"redirect_url": "/azure/cognitive-services/acoustics/what-is-acoustics",
4374643766
"redirect_document_id": false
4374743767
},
43768+
{
43769+
"source_path": "articles/cognitive-services/Acoustics/index.md",
43770+
"redirect_url": "/azure/cognitive-services/acoustics/what-is-acoustics",
43771+
"redirect_document_id": false
43772+
},
4374843773
{
4374943774
"source_path": "articles/iot-central/howto-export-data.md",
4375043775
"redirect_url": "/azure/iot-central/core/howto-export-data-event-hubs-service-bus",
@@ -50325,6 +50350,18 @@
5032550350
"source_path": "articles/sql-data-warehouse/what-is-a-data-warehouse-unit-dwu-cdwu.md",
5032650351
"redirect_url": "/azure/synapse-analytics/sql-data-warehouse/what-is-a-data-warehouse-unit-dwu-cdwu",
5032750352
"redirect_document_id": true
50353+
},
50354+
{
50355+
"source_path": "articles/cognitive-services/speech-service/quickstart-voice-assistant-java-android.md",
50356+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-java&tabs=android"
50357+
},
50358+
{
50359+
"source_path": "articles/cognitive-services/speech-service/quickstart-voice-assistant-java-jre.md",
50360+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-java&tabs=jre"
50361+
},
50362+
{
50363+
"source_path": "articles/cognitive-services/Speech-Service/quickstart-voice-assistant-csharp-uwp.md",
50364+
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-csharp&tabs=uwp"
5032850365
}
5032950366
]
5033050367
}

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/16/2020
12+
ms.date: 03/24/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -251,7 +251,7 @@ The following technical profile deletes a social user account using **alternativ
251251
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md) |
252252
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
253253

254-
## Error messages
254+
### Error messages
255255

256256
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
257257

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 88 additions & 90 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/custom-policy-keep-me-signed-in.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 02/27/2020
11+
ms.date: 03/24/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -103,7 +103,15 @@ We recommend that you set the value of SessionExpiryInSeconds to be a short peri
103103
</RelyingParty>
104104
```
105105

106-
4. Save your changes and then upload the file.
107-
5. To test the custom policy that you uploaded, in the Azure portal, go to the policy page, and then select **Run now**.
106+
## Test your policy
108107

109-
You can find the sample policy [here](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/keep%20me%20signed%20in).
108+
1. Save your changes, and then upload the file.
109+
1. To test the custom policy you uploaded, in the Azure portal, go to the policy page, and then select **Run now**.
110+
1. Type your **username** and **password**, select **Keep me signed in**, and then click **sign-in**.
111+
1. Go back to the Azure portal. Go to the policy page, and then select **Copy** to copy the sign-in URL.
112+
1. In the browser address bar, remove the `&prompt=login` query string parameter, which forces the user to enter their credentials on that request.
113+
1. In the browser, click **Go**. Now Azure AD B2C will issue an access token without prompting you to sign-in again.
114+
115+
## Next steps
116+
117+
Find the sample policy [here](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/keep%20me%20signed%20in).

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,16 @@ The technical profile also returns claims that aren't returned by the identity p
8888
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token. |
8989
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
9090

91+
### Error messages
92+
93+
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the OpenID Connect technical profile. The error messages can be [localized](localization-string-ids.md#sign-up-or-sign-in-error-messages).
94+
95+
| Attribute | Required | Description |
96+
| --------- | -------- | ----------- |
97+
| UserMessageIfClaimsPrincipalDoesNotExist | No | The message to display to the user if an account with the provided username not found in the directory. |
98+
| UserMessageIfInvalidPassword | No | The message to display to the user if the password is incorrect. |
99+
| UserMessageIfOldPasswordUsed| No | The message to display to the user if an old password used.|
100+
91101
## Cryptographic keys
92102

93103
The **CryptographicKeys** element contains the following attribute:

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ The following example demonstrates the use of a self-asserted technical profile
174174

175175
## Persist claims
176176

177-
If the **PersistedClaims** element is absent, the self-asserted technical profile doesn't persist the data to Azure AD B2C. Instead, a call is made to a validation technical profile that's responsible for persisting the data. For example, the sign-up policy uses the `LocalAccountSignUpWithLogonEmail` self-asserted technical profile to collect the new user profile. The `LocalAccountSignUpWithLogonEmail` technical profile calls the validation technical profile to create the account in Azure AD B2C.
177+
The PersistedClaims element is not used. The self-asserted technical profile doesn't persist the data to Azure AD B2C. Instead, a call is made to a validation technical profile that's responsible for persisting the data. For example, the sign-up policy uses the `LocalAccountSignUpWithLogonEmail` self-asserted technical profile to collect the new user profile. The `LocalAccountSignUpWithLogonEmail` technical profile calls the validation technical profile to create the account in Azure AD B2C.
178178

179179
## Validation technical profiles
180180

articles/active-directory-domain-services/troubleshoot-account-lockout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The most common reasons for an account to be locked out, without any malicious i
5252

5353
## Troubleshoot account lockouts with security audits
5454

55-
To troubleshoot when account lockout events occur and where they're coming from, [enable security audits for Azure AD DS (currently in preview)][security-audit-events]. Audit events are only captured from the time you enable the feature. Ideally, you should enable security audits *before* there's an account lockout issue to troubleshoot. If a user account repeatedly has lockout issues, you can enable security audits ready for the next time the situation occurs.
55+
To troubleshoot when account lockout events occur and where they're coming from, [enable security audits for Azure AD DS][security-audit-events]. Audit events are only captured from the time you enable the feature. Ideally, you should enable security audits *before* there's an account lockout issue to troubleshoot. If a user account repeatedly has lockout issues, you can enable security audits ready for the next time the situation occurs.
5656

5757
Once you have enabled security audits, the following sample queries show you how to review *Account Lockout Events*, code *4740*.
5858

articles/active-directory-domain-services/tutorial-create-management-vm.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,6 @@ To get started, connect to the Windows Server VM as follows:
8787

8888
![Connect to Windows virtual machine using Bastion in the Azure portal](./media/join-windows-vm/connect-to-vm.png)
8989

90-
You can also [create and use an Azure Bastion host (currently in preview)][azure-bastion] to allow access only through the Azure portal over TLS.
9190
1. Enter the credentials for your VM, then select **Connect**.
9291

9392
![Connect through the Bastion host in the Azure portal](./media/join-windows-vm/connect-to-bastion.png)

articles/active-directory/develop/reference-aadsts-error-codes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -270,6 +270,7 @@ Search on the numeric part of the returned error code. For example, if you rece
270270
| AADSTS1000000 | UserNotBoundError - The Bind API requires the Azure AD user to also authenticate with an external IDP, which hasn't happened yet. |
271271
| AADSTS1000002 | BindCompleteInterruptError - The bind completed successfully, but the user must be informed. |
272272
| AADSTS7000112 | UnauthorizedClientApplicationDisabled - The application is disabled. |
273+
| AADSTS7500529 | The value ‘SAMLId-Guid’ is not a valid SAML ID - Azure AD uses this attribute to populate the InResponseTo attribute of the returned response. ID must not begin with a number, so a common strategy is to prepend a string like "id" to the string representation of a GUID. For example, id6c1c178c166d486687be4aaf5e482730 is a valid ID. |
273274

274275
## Next steps
275276

0 commit comments

Comments
 (0)