Skip to content

Commit ebbd3ad

Browse files
authored
Merge branch 'master' into issue#80635
2 parents 8e4616b + 96f4f20 commit ebbd3ad

File tree

667 files changed

+9796
-5461
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

667 files changed

+9796
-5461
lines changed

.openpublishing.publish.config.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -788,7 +788,19 @@
788788
"url": "https://github.com/Azure/azure-docs-bicep-samples/",
789789
"branch": "main",
790790
"branch_mapping": {}
791-
}
791+
},
792+
{
793+
"path_to_root": "msdocs-python-flask-webapp-quickstart",
794+
"url": "https://github.com/Azure-Samples/msdocs-python-flask-webapp-quickstart",
795+
"branch": "main",
796+
"branch_mapping": {}
797+
},
798+
{
799+
"path_to_root": "msdocs-python-django-webapp-quickstart",
800+
"url": "https://github.com/Azure-Samples/msdocs-python-django-webapp-quickstart",
801+
"branch": "main",
802+
"branch_mapping": {}
803+
}
792804
],
793805
"branch_target_mapping": {
794806
"live": [

.openpublishing.redirection.active-directory.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7085,6 +7085,21 @@
70857085
"redirect_url": "/azure/active-directory/reports-monitoring/overview-reports",
70867086
"redirect_document_id": false
70877087
},
7088+
{
7089+
"source_path_from_root": "/articles/active-directory/hybrid/how-to-connect-fed-hybrid-azure-ad-join-post-config-tasks.md",
7090+
"redirect_url": "/azure/active-directory/devices/howto-hybrid-azure-ad-join",
7091+
"redirect_document_id": true
7092+
},
7093+
{
7094+
"source_path_from_root": "/articles/active-directory/devices/hybrid-azuread-join-federated-domains.md",
7095+
"redirect_url": "/azure/active-directory/devices/howto-hybrid-azure-ad-join",
7096+
"redirect_document_id": false
7097+
},
7098+
{
7099+
"source_path_from_root": "/articles/active-directory/devices/hybrid-azuread-join-managed-domains.md",
7100+
"redirect_url": "/azure/active-directory/devices/howto-hybrid-azure-ad-join",
7101+
"redirect_document_id": false
7102+
},
70887103
{
70897104
"source_path_from_root": "/articles/active-directory/reporting-azure-monitor-diagnostics-azure-storage-account.md",
70907105
"redirect_url": "/azure/active-directory/reports-monitoring/quickstart-azure-monitor-route-logs-to-storage-account",

.openpublishing.redirection.healthcare-apis.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -374,7 +374,7 @@
374374
},
375375
{
376376
"source_path_from_root": "/articles/healthcare-apis/data-transformation/move-to-synapse.md",
377-
"redirect_url": "/azure/healthcare-apis/fhir/move-to-synapse",
377+
"redirect_url": "/azure/healthcare-apis/fhir/copy-to-synapse",
378378
"redirect_document_id": true
379379
},
380380
{
@@ -429,7 +429,7 @@
429429
},
430430
{
431431
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/access-fhir-postman-tutorial.md",
432-
"redirect_url": "/azure/healthcare-apis/use-postman",
432+
"redirect_url": "/azure/healthcare-apis/fhir/use-postman",
433433
"redirect_document_id": true
434434
},
435435
{

.openpublishing.redirection.json

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14892,6 +14892,11 @@
1489214892
"redirect_url": "/azure/data-factory/v1/data-factory-onprem-postgresql-connector",
1489314893
"redirect_document_id": true
1489414894
},
14895+
{
14896+
"source_path_from_root": "/articles/postgresql/howto-manage-firewall-using-cli.md",
14897+
"redirect_url": "/azure/postgresql/quickstart-create-server-database-azure-cli#configure-a-server-based-firewall-rule",
14898+
"redirect_document_id": true
14899+
},
1489514900
{
1489614901
"source_path_from_root": "/articles/data-factory/data-factory-onprem-sybase-connector.md",
1489714902
"redirect_url": "/azure/data-factory/v1/data-factory-onprem-sybase-connector",
@@ -45231,6 +45236,26 @@
4523145236
"source_path_from_root": "/articles/azure/cognitive-services/translator/custom-translator/v2-preview/project-overview.md",
4523245237
"redirect_url": "/azure/cognitive-services/translator/custom-translator/v2-preview/beginners-guide",
4523345238
"redirect_document_id": true
45234-
}
45239+
},
45240+
{
45241+
"source_path_from_root": "/articles/azure-monitor/agents/azure-monitor-agent-install.md",
45242+
"redirect_url": "/azure/azure-monitor/agents/azure-monitor-agent-manage",
45243+
"redirect_document_id": true
45244+
},
45245+
{
45246+
"source_path_from_root": "/articles/azure/virtual-desktop/azure-advisor.md",
45247+
"redirect_url": "/azure/advisor/advisor-overview",
45248+
"redirect_document_id": false
45249+
},
45250+
{
45251+
"source_path_from_root": "/articles/azure/cognitive-services/translator/tutorial-wpf-translation-csharp.md",
45252+
"redirect_url": "/ai-builder/flow-text-translation?toc=/azure/cognitive-services/translator/toc.json&bc=/azure/cognitive-services/translator/breadcrumb/toc.json",
45253+
"redirect_document_id": false
45254+
},
45255+
{
45256+
"source_path_from_root": "/articles/azure/cognitive-services/translator/tutorial-build-flask-app-translation-synthesis.md",
45257+
"redirect_url": "/learn/modules/translate-text-with-translator-service?toc=/azure/cognitive-services/translator/toc.json&bc=/azure/cognitive-services/translator/breadcrumb/toc.json",
45258+
"redirect_document_id": false
45259+
}
4523545260
]
4523645261
}

articles/active-directory-b2c/billing.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,8 @@ To change your pricing tier, follow these steps:
110110
1. Select the pricing tier that includes the features you want to enable.
111111

112112
![Screenshot that shows how to select the pricing tier.](media/billing/select-tier.png)
113+
114+
Learn about the [Azure AD features, which are supported in Azure AD B2C](supported-azure-ad-features.md).
113115

114116

115117
## Switch to MAU billing (pre-November 2019 Azure AD B2C tenants)

articles/active-directory-b2c/identity-provider-adfs-saml.md

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,11 +236,32 @@ You can configure how to sign the SAML request in Azure AD B2C. The [XmlSignatur
236236

237237
#### Option 2: Set the signature algorithm in AD FS
238238

239-
Alternatively, you can configure the expected the SAML request signature algorithm in AD FS.
239+
Alternatively, you can configure the expected SAML request signature algorithm in AD FS.
240240

241241
1. In Server Manager, select **Tools**, and then select **AD FS Management**.
242242
1. Select the **Relying Party Trust** you created earlier.
243243
1. Select **Properties**, then select **Advance**
244244
1. Configure the **Secure hash algorithm**, and select **OK** to save the changes.
245245

246+
### The HTTP-Redirect request does not contain the required parameter 'Signature' for a signed request (AADB2C90168)
247+
248+
#### Option 1: Set the ResponsesSigned to false in Azure AD B2C
249+
250+
You can disable the requirement of signed message in Azure AD B2C. The following example configures Azure AD B2C to not require 'Signature' parameter for the signed request.
251+
252+
```xml
253+
<Metadata>
254+
<Item Key="WantsEncryptedAssertions">false</Item>
255+
<Item Key="PartnerEntity">https://your-AD-FS-domain/federationmetadata/2007-06/federationmetadata.xml</Item>
256+
<Item Key="ResponsesSigned">false</Item>
257+
</Metadata>
258+
```
259+
260+
#### Option 2: Set the relying party in AD FS to sign both Message and Assertion
261+
262+
Alternatively, you can configure the relying party in AD FS as mentioned below:
263+
264+
1. Open PowerShell as Administrator and run ```Set-AdfsRelyingPartyTrust -TargetName <RP Name> -SamlResponseSignature MessageAndAssertion``` cmdlet to sign both Message and Assertion.
265+
2. Run ```Set-AdfsRelyingPartyTrust -TargetName <RP Name>``` and confirm the **SamlResponseSignature** property is set as **MessageAndAssertion**.
266+
246267
::: zone-end

articles/active-directory-b2c/oauth2-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -340,7 +340,7 @@ The following table lists the OAuth2 identity provider generic metadata. The met
340340
| `ProviderName` | No | The name of the identity provider. |
341341
| `ResponseErrorCodeParamName` | No | The name of the parameter that contains the error message returned over HTTP 200 (Ok). |
342342
| `IncludeClaimResolvingInClaimsHandling`  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
343-
| `ResolveJsonPathsInJsonTokens` | No | Indicates whether the technical profile resolves JSON paths. Possible values: `true`, or `false` (default). Use this metadata to read data from a nested JSON element. In an [OutputClaim](technicalprofiles.md#output-claims), set the `PartnerClaimType` to the JSON path element you want to output. For example: `firstName.localized`, or `data.0.to.0.email`.|
343+
| `ResolveJsonPathsInJsonTokens` | No | Indicates whether the technical profile resolves JSON paths. Possible values: `true`, or `false` (default). Use this metadata to read data from a nested JSON element. In an [OutputClaim](technicalprofiles.md#output-claims), set the `PartnerClaimType` to the JSON path element you want to output. For example: `firstName.localized`, or `data[0].to[0].email`.|
344344

345345
## Cryptographic keys
346346

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ The technical profile also returns claims, that aren't returned by the identity
119119
| ClaimUsedForRequestPayload| No | Name of a string claim that contains the payload to be sent to the REST API. |
120120
| DebugMode | No | Runs the technical profile in debug mode. Possible values: `true`, or `false` (default). In debug mode, the REST API can return more information. See the [Returning error message](#returning-validation-error-message) section. |
121121
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
122-
| ResolveJsonPathsInJsonTokens | No | Indicates whether the technical profile resolves JSON paths. Possible values: `true`, or `false` (default). Use this metadata to read data from a nested JSON element. In an [OutputClaim](technicalprofiles.md#output-claims), set the `PartnerClaimType` to the JSON path element you want to output. For example: `firstName.localized`, or `data.0.to.0.email`.|
122+
| ResolveJsonPathsInJsonTokens | No | Indicates whether the technical profile resolves JSON paths. Possible values: `true`, or `false` (default). Use this metadata to read data from a nested JSON element. In an [OutputClaim](technicalprofiles.md#output-claims), set the `PartnerClaimType` to the JSON path element you want to output. For example: `firstName.localized`, or `data[0].to[0].email`.|
123123
| UseClaimAsBearerToken| No| The name of the claim that contains the bearer token.|
124124

125125
## Error handling

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 01/25/2022
9+
ms.date: 01/28/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -59,9 +59,7 @@ Exchange Online, SharePoint Online, Teams, and MS Graph can synchronize key Cond
5959
This process enables the scenario where users lose access to organizational files, email, calendar, or tasks from Microsoft 365 client apps or SharePoint Online immediately after network location changes.
6060

6161
> [!NOTE]
62-
> Not all client app and resource provider combinations are supported. See table below. The first column of this table refers to web applications launched via web browser (i.e. PowerPoint launched in web browser) while the remaining four columns refer to native applications running on each platform described. Additionally, references to "Office" encompass Word, Excel, and PowerPoint.
63-
64-
Token lifetimes for Office web apps are reduced to 1 hour when a Conditional Access policy is set.
62+
> Not all client app and resource provider combinations are supported. See the following tables. The first column of this table refers to web applications launched via web browser (i.e. PowerPoint launched in web browser) while the remaining four columns refer to native applications running on each platform described. Additionally, references to "Office" encompass Word, Excel, and PowerPoint.
6563
6664
| | Outlook Web | Outlook Win32 | Outlook iOS | Outlook Android | Outlook Mac |
6765
| :--- | :---: | :---: | :---: | :---: | :---: |
@@ -70,7 +68,7 @@ Token lifetimes for Office web apps are reduced to 1 hour when a Conditional Acc
7068

7169
| | Office web apps | Office Win32 apps | Office for iOS | Office for Android | Office for Mac |
7270
| :--- | :---: | :---: | :---: | :---: | :---: |
73-
| **SharePoint Online** | Not Supported | Supported | Supported | Supported | Supported |
71+
| **SharePoint Online** | Not Supported \* | Supported | Supported | Supported | Supported |
7472
| **Exchange Online** | Not Supported | Supported | Supported | Supported | Supported |
7573

7674
| | OneDrive web | OneDrive Win32 | OneDrive iOS | OneDrive Android | OneDrive Mac |
@@ -79,9 +77,11 @@ Token lifetimes for Office web apps are reduced to 1 hour when a Conditional Acc
7977

8078
| | Teams web | Teams Win32 | Teams iOS | Teams Android | Teams Mac |
8179
| :--- | :---: | :---: | :---: | :---: | :---: |
82-
| **Teams Service** | Supported | Supported | Supported | Supported | Supported |
83-
| **SharePoint Online** | Supported | Supported | Supported | Supported | Supported |
84-
| **Exchange Online** | Supported | Supported | Supported | Supported | Supported |
80+
| **Teams Service** | Partially supported | Partially supported | Partially supported | Partially supported | Partially supported |
81+
| **SharePoint Online** | Partially supported | Partially supported | Partially supported | Partially supported | Partially supported |
82+
| **Exchange Online** | Partially supported | Partially supported | Partially supported | Partially supported | Partially supported |
83+
84+
> \* Token lifetimes for Office web apps are reduced to 1 hour when a Conditional Access policy is set.
8585
8686
## Client Capabilities
8787

@@ -201,7 +201,7 @@ For an explanation of the office update channels, see [Overview of update channe
201201

202202
### Coauthoring in Office apps
203203

204-
When multiple users are collaborating on a document at the same time, their access to the document may not be immediately revoked by CAE based on user revocation or policy change events. In this case, the user loses access completely after:
204+
When multiple users are collaborating on a document at the same time, their access to the document may not be immediately revoked by CAE based on policy change events. In this case, the user loses access completely after:
205205

206206
- Closing the document
207207
- Closing the Office app

articles/active-directory/conditional-access/howto-conditional-access-policy-compliant-device.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,11 @@ Organizations who have deployed Microsoft Intune can use the information returne
2222
* Requiring a PIN to unlock
2323
* Requiring device encryption
2424
* Requiring a minimum or maximum operating system version
25-
* Requiring a device is not jailbroken or rooted
25+
* Requiring a device isn't jailbroken or rooted
2626

27-
This policy compliance information is forwarded to Azure AD where Conditional Access can make decisions to grant or block access to resources. More information about device compliance policies can be found in the article, [Set rules on devices to allow access to resources in your organization using Intune](/intune/protect/device-compliance-get-started)
27+
Policy compliance information is sent to Azure AD where Conditional Access decides to grant or block access to resources. More information about device compliance policies can be found in the article, [Set rules on devices to allow access to resources in your organization using Intune](/intune/protect/device-compliance-get-started)
28+
29+
Requiring a hybrid Azure AD joined device is dependent on your devices already being hybrid Azure AD joined. For more information, see the article [Configure hybrid Azure AD join](../devices/howto-hybrid-azure-ad-join.md).
2830

2931
## Template deployment
3032

@@ -59,7 +61,7 @@ After confirming your settings using [report-only mode](howto-conditional-access
5961
6062
### Known behavior
6163

62-
On Windows 7, iOS, Android, macOS, and some third-party web browsers Azure AD identifies the device using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser the user is prompted to select the certificate. The end user must select this certificate before they can continue to use the browser.
64+
On Windows 7, iOS, Android, macOS, and some third-party web browsers, Azure AD identifies the device using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser the user is prompted to select the certificate. The end user must select this certificate before they can continue to use the browser.
6365

6466
## Next steps
6567

0 commit comments

Comments
 (0)