Skip to content

Commit eb38121

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents b35ac36 + 441db70 commit eb38121

File tree

133 files changed

+1252
-1627
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

133 files changed

+1252
-1627
lines changed

.openpublishing.redirection.json

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -345,6 +345,17 @@
345345
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/dsvm-tools-languages",
346346
"redirect_document_id": true
347347
},
348+
{
349+
"source_path": "articles/machine-learning/data-science-virtual-machine/reference-centos-vm.md",
350+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/reference-deprecation",
351+
"redirect_document_id": false
352+
},
353+
{
354+
"source_path": "articles/machine-learning/data-science-virtual-machine/linux-dsvm-intro.md",
355+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/reference-deprecation",
356+
"redirect_document_id": true
357+
},
358+
348359
{
349360
"source_path": "articles/machine-learning/service/how-to-understand-accuracy-metrics.md",
350361
"redirect_url": "/azure/machine-learning/service/how-to-understand-automated-ml",
@@ -4055,11 +4066,21 @@
40554066
"redirect_url": "/azure/azure-government/documentation-government-welcome",
40564067
"redirect_document_id": false
40574068
},
4069+
{
4070+
"source_path": "articles/azure-government/documentation-government-k8.md",
4071+
"redirect_url": "/azure/azure-government",
4072+
"redirect_document_id": false
4073+
},
40584074
{
40594075
"source_path": "articles/azure-portal/resource-group-portal-linked-resources.md",
40604076
"redirect_url": "/azure/azure-portal/azure-portal-dashboards",
40614077
"redirect_document_id": false
40624078
},
4079+
{
4080+
"source_path": "articles/azure-resource-manager/templates/template-tutorial-create-linked-templates.md",
4081+
"redirect_url": "/azure/azure-resource-manager/templates/deployment-tutorial-linked-template",
4082+
"redirect_document_id": false
4083+
},
40634084
{
40644085
"source_path": "articles/azure-resource-manager/templates/template-tutorial-create-encrypted-storage-accounts.md",
40654086
"redirect_url": "/azure/azure-resource-manager/templates/template-tutorial-use-template-reference",
@@ -7586,7 +7607,7 @@
75867607
},
75877608
{
75887609
"source_path": "articles/azure-functions/functions-add-output-binding-storage-queue-python.md",
7589-
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-cli.md?pivots=programming-language-python",
7610+
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-cli?pivots=programming-language-python",
75907611
"redirect_document_id": false
75917612
},
75927613
{
@@ -19189,6 +19210,11 @@
1918919210
"redirect_url": "/azure/backup/backup-overview",
1919019211
"redirect_document_id": false
1919119212
},
19213+
{
19214+
"source_path": "articles/backup/tutorial-backup-azure-files.md",
19215+
"redirect_url": "/azure/backup/backup-afs",
19216+
"redirect_document_id": false
19217+
},
1919219218
{
1919319219
"source_path": "articles/backup/backup-azure-backup-ibiza-faq.md",
1919419220
"redirect_url": "/azure/backup/backup-azure-backup-faq",

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 04/02/2020
9+
ms.date: 04/06/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -32,9 +32,9 @@ The following options are available to include when creating a Conditional Acces
3232
- All users
3333
- All users that exist in the directory including B2B guests.
3434
- Select users and groups
35-
- All guest and external users (preview)
35+
- All guest and external users
3636
- This selection includes any B2B guests and external users including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
37-
- Directory roles (preview)
37+
- Directory roles
3838
- Allows administrators to select specific Azure AD directory roles used to determine assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role.
3939
- Users and groups
4040
- Allows targeting of specific sets of users. For example, organizations can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of group in Azure AD, including dynamic or assigned security and distribution groups.
@@ -48,9 +48,9 @@ When organizations both include and exclude a user or group the user or group is
4848

4949
The following options are available to exclude when creating a Conditional Access policy.
5050

51-
- All guest and external users (preview)
51+
- All guest and external users
5252
- This selection includes any B2B guests and external users including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
53-
- Directory roles (preview)
53+
- Directory roles
5454
- Allows administrators to select specific Azure AD directory roles used to determine assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role.
5555
- Users and groups
5656
- Allows targeting of specific sets of users. For example, organizations can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of group in Azure AD, including dynamic or assigned security and distribution groups.

articles/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
3939

4040
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
4141
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
42-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically.
42+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals are not blocked by Conditional Access.
4343
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
4444

4545
## Create a Conditional Access policy

articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
2929

3030
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
3131
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
32-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically.
32+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals are not blocked by Conditional Access.
3333
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
3434

3535
## Application exclusions

articles/active-directory/conditional-access/howto-conditional-access-policy-azure-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
3131

3232
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
3333
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
34-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically.
34+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals are not blocked by Conditional Access.
3535
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
3636

3737
## Create a Conditional Access policy

articles/active-directory/conditional-access/howto-conditional-access-policy-block-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
3030

3131
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
3232
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
33-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically.
33+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals are not blocked by Conditional Access.
3434
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
3535

3636
## Create a Conditional Access policy
Loading

0 commit comments

Comments
 (0)