Skip to content

Commit ef0904b

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into lahugh-outputfiles
2 parents fcb9029 + 13ee749 commit ef0904b

File tree

1,952 files changed

+28025
-17093
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,952 files changed

+28025
-17093
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,2 @@
11
{:allowed-branchname-matches ["^master$" "^release..*"]
2-
:allowed-filename-matches ["articles" "includes"]
3-
4-
:template-header
5-
"
6-
## Acrolinx Scorecards
7-
8-
**A minimum Acrolinx score of 80 is required.**
9-
10-
Click the scorecard links for each article to review the Acrolinx feedback on grammar, spelling, punctuation, writing style, and terminology:
11-
12-
| Article | Score | Issues | Scorecard |
13-
| ------- | ----- | ------ | --------- |
14-
"
15-
16-
;; do not remove the spaces at the end of lines! That is markdown for
17-
;; linebreak
18-
:template-change
19-
"| **${github/filename}** | ${acrolinx/qualityscore} | ${acrolinx/flags/issues} | [link](${acrolinx/scorecard}) |
20-
"
21-
22-
:template-footer
23-
"
24-
**More info about Acrolinx**
25-
26-
- [Install Acrolinx locally for VSCode](https://review.docs.microsoft.com/en-us/help/contribute/contribute-acrolinx-vscode)
27-
- [Report false positives or issues](https://aka.ms/acrolinxbug)
28-
29-
"}
2+
:allowed-filename-matches ["articles" "includes"]}

.openpublishing.publish.config.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -247,6 +247,36 @@
247247
"url": "https://github.com/Azure-Samples/cognitive-services-qnamaker-python",
248248
"branch": "master",
249249
"branch_mapping": {}
250+
},
251+
{
252+
"path_to_root": "cognitive-services-dotnet-sdk-samples",
253+
"url": "https://github.com/Azure-Samples/cognitive-services-dotnet-sdk-samples",
254+
"branch": "master",
255+
"branch_mapping": {}
256+
},
257+
{
258+
"path_to_root": "cognitive-services-java-sdk-samples",
259+
"url": "https://github.com/Azure-Samples/cognitive-services-java-sdk-samples",
260+
"branch": "master",
261+
"branch_mapping": {}
262+
},
263+
{
264+
"path_to_root": "aml-sdk-samples",
265+
"url": "https://github.com/Azure/MachineLearningNotebooks",
266+
"branch": "sdk-codetest",
267+
"branch_mapping": {}
268+
},
269+
{
270+
"path_to_root": "cognitive-services-vision-csharp-sdk-quickstarts",
271+
"url": "https://github.com/Azure-Samples/cognitive-services-vision-csharp-sdk-quickstarts",
272+
"branch": "master",
273+
"branch_mapping": {}
274+
},
275+
{
276+
"path_to_root": "cognitive-face-csharp-sample",
277+
"url": "https://github.com/Azure-Samples/Cognitive-Face-CSharp-sample",
278+
"branch": "master",
279+
"branch_mapping": {}
250280
}
251281
],
252282
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 70 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/machine-learning/service/how-to-choose-a-dev-environment.md",
5+
"redirect_url": "/azure/machine-learning/service/how-to-configure-environment",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/frontdoor/front-door-powershell-reference.md",
510
"redirect_url": "/powershell/module/azurerm.frontdoor",
@@ -150,6 +155,21 @@
150155
"redirect_url": "/azure/active-directory/users-groups-roles/users-sharing-accounts",
151156
"redirect_document_id": true
152157
},
158+
{
159+
"source_path": "articles/active-directory/fundamentals/active-directory-administer.md",
160+
"redirect_url": "/azure/active-directory/fundamentals/active-directory-whatis",
161+
"redirect_document_id": false
162+
},
163+
{
164+
"source_path": "articles/active-directory/fundamentals/identity-fundamentals.md",
165+
"redirect_url": "/azure/active-directory/fundamentals/active-directory-whatis",
166+
"redirect_document_id": false
167+
},
168+
{
169+
"source_path": "articles/active-directory/fundamentals/understand-azure-identity-solutions.md",
170+
"redirect_url": "/azure/active-directory/fundamentals/active-directory-whatis",
171+
"redirect_document_id": false
172+
},
153173
{
154174
"source_path": "articles/active-directory/fundamentals/active-directory-groups-restore-azure-portal.md",
155175
"redirect_url": "/azure/active-directory/users-groups-roles/groups-restore-deleted",
@@ -356,6 +376,16 @@
356376
"redirect_url": "/azure/cosmos-db/conflict-resolution-policies",
357377
"redirect_document_id": true
358378
},
379+
{
380+
"source_path": "articles/cosmos-db/manage-account.md",
381+
"redirect_url": "/azure/cosmos-db/how-to-manage-database-account",
382+
"redirect_document_id": false
383+
},
384+
{
385+
"source_path": "articles/cosmos-db/indexing-policies.md",
386+
"redirect_url": "/azure/cosmos-db/indexing-policy",
387+
"redirect_document_id": true
388+
},
359389
{
360390
"source_path": "articles/cosmos-db/distribute-data-globally-benefits.md",
361391
"redirect_url": "/azure/cosmos-db/distribute-data-globally",
@@ -7844,6 +7874,11 @@
78447874
"redirect_url": "/azure/cosmos-db/enable-multi-master",
78457875
"redirect_document_id": false
78467876
},
7877+
{
7878+
"source_path": "articles/cosmos-db/sql-api-resources.md",
7879+
"redirect_url": "/azure/cosmos-db/databases-containers-items",
7880+
"redirect_document_id": false
7881+
},
78477882
{
78487883
"source_path": "articles/cosmos-db/multi-master-oss-nosql.md",
78497884
"redirect_url": "/azure/cosmos-db/consistency-levels-across-apis",
@@ -9266,7 +9301,7 @@
92669301
},
92679302
{
92689303
"source_path": "articles/documentdb/documentdb-indexing-policies.md",
9269-
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/indexing-policies",
9304+
"redirect_url": "/azure/cosmos-db/indexing-policy",
92709305
"redirect_document_id": false
92719306
},
92729307
{
@@ -9999,6 +10034,11 @@
999910034
"redirect_url": "/azure/log-analytics/log-analytics-data-security",
1000010035
"redirect_document_id": false
1000110036
},
10037+
{
10038+
"source_path": "articles/log-analytics/log-analytics-concept-hybrid.md",
10039+
"redirect_url": "/azure/log-analytics/log-analytics-agent-overview",
10040+
"redirect_document_id": false
10041+
},
1000210042
{
1000310043
"source_path": "articles/log-analytics/log-analytics-change-tracking.md",
1000410044
"redirect_url": "/azure/automation/automation-change-tracking",
@@ -11069,6 +11109,11 @@
1106911109
"redirect_url": "/azure/monitoring-and-diagnostics/alert-log",
1107011110
"redirect_document_id": false
1107111111
},
11112+
{
11113+
"source_path": "articles/monitoring-and-diagnostics/monitoring-overview-unified-alerts.md",
11114+
"redirect_url": "/azure/monitoring-and-diagnostics/monitoring-overview-alerts",
11115+
"redirect_document_id": false
11116+
},
1107211117
{
1107311118
"source_path": "articles/monitoring-and-diagnostics/monitoring-create-activity-log-alerts-with-resource-manager-template.md",
1107411119
"redirect_url": "/azure/monitoring-and-diagnostics/alert-activity-log",
@@ -27052,11 +27097,6 @@
2705227097
"redirect_url": "/azure/cloud-shell/overview",
2705327098
"redirect_document_id": false
2705427099
},
27055-
{
27056-
"source_path": "articles/dms/index.md",
27057-
"redirect_url": "/azure/dms/dms-overview",
27058-
"redirect_document_id": false
27059-
},
2706027100
{
2706127101
"source_path": "articles/guides/developer/index.md",
2706227102
"redirect_url": "/azure/guides/developer/azure-developer-guide",
@@ -27244,7 +27284,7 @@
2724427284
},
2724527285
{
2724627286
"source_path": "articles/active-directory/application-proxy-sso-overview.md",
27247-
"redirect_url": "/azure/active-directory/manage-apps/application-proxy-single-sign-on",
27287+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
2724827288
"redirect_document_id": false
2724927289
},
2725027290
{
@@ -28410,8 +28450,8 @@
2841028450
},
2841128451
{
2841228452
"source_path": "articles/active-directory/application-config-sso-how-to-choose-sign-on-method.md",
28413-
"redirect_url": "/azure/active-directory/manage-apps/single-sign-on-modes",
28414-
"redirect_document_id": true
28453+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
28454+
"redirect_document_id": false
2841528455
},
2841628456
{
2841728457
"source_path": "articles/active-directory/application-config-sso-how-to-configure-federated-sso-gallery.md",
@@ -28638,6 +28678,16 @@
2863828678
"redirect_url": "/azure/active-directory/manage-apps/developer-guidance-for-integrating-applications",
2863928679
"redirect_document_id": true
2864028680
},
28681+
{
28682+
"source_path": "articles/active-directory/manage-apps/application-proxy-single-sign-on.md",
28683+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
28684+
"redirect_document_id": false
28685+
},
28686+
{
28687+
"source_path": "articles/active-directory/manage-apps/single-sign-on-modes.md",
28688+
"redirect_url": "/azure/active-directory/manage-apps/what-is-single-sign-on",
28689+
"redirect_document_id": false
28690+
},
2864128691
{
2864228692
"source_path": "articles/virtual-machines/linux/classic/cli-use-docker.md",
2864328693
"redirect_url": "/azure/virtual-machines/linux/dockerextension",
@@ -30515,6 +30565,17 @@
3051530565
"source_path": "articles/iot-central/howto-create-application.md",
3051630566
"redirect_url": "/azure/iot-central/quick-deploy-iot-central",
3051730567
"redirect_document_id" : false
30568+
},
30569+
{
30570+
"source_path": "articles/media-services/latest/create-account-cli-quickstart.md",
30571+
"redirect_url": "/azure/media-services/latest/create-account-cli-how-to",
30572+
"redirect_document_id" : false
30573+
},
30574+
{
30575+
"source_path": "articles/backup/backup-mabs-upgrade-to-v2.md",
30576+
"redirect_url": "/azure/backup/backup-mabs-whats-new-mabs",
30577+
"redirect_document_id" : false
3051830578
}
30579+
3051930580
]
3052030581
}

articles/active-directory-b2c/active-directory-b2c-configure-signup-self-asserted-custom.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -273,8 +273,8 @@ Verified email is enabled by default in the `<TechnicalProfile Id="LocalAccountS
273273

274274
## Next steps
275275

276-
Add the new claim to the flows for social account logins by changing the TechnicalProfiles listed below. These are used by social/federated account logins to write and read the user data using the alternativeSecurityId as the locator.
277-
```xml
278-
<TechnicalProfile Id="AAD-UserWriteUsingAlternativeSecurityId">
279-
<TechnicalProfile Id="AAD-UserReadUsingAlternativeSecurityId">
280-
```
276+
If your policy supports social accounts, add the new claim to the flows for social account logins by changing the technical profiles listed below. These claims are used by social account logins to collect and write data from the user.
277+
278+
1. Locate the technical profile **SelfAsserted-Social** and add the output claim. The order of the claims in **OutputClaims** controls the order that Azure AD B2C renders the claims on the screen. For example, `<OutputClaim ClaimTypeReferenceId="city" />`.
279+
2. Locate the technical profile **AAD-UserWriteUsingAlternativeSecurityId** and add the persist claim. For example, `<PersistedClaim ClaimTypeReferenceId="city" />`.
280+
3. Locate the technical profile **AAD-UserReadUsingAlternativeSecurityId** and add the output claim. For example, `<OutputClaim ClaimTypeReferenceId="city" />`.

articles/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/05/2018
11+
ms.date: 11/07/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -17,24 +17,24 @@ ms.component: B2C
1717

1818
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1919

20-
This article shows you how to enable sign-in for an ADFS user account by using [custom policies](active-directory-b2c-overview-custom.md) in Azure Active Directory (Azure AD) B2C.
20+
This article shows you how to enable sign-in for an ADFS user account by using [custom policies](active-directory-b2c-overview-custom.md) in Azure Active Directory (Azure AD) B2C. You enable sign-in by adding a [SAML technical profile](saml-technical-profile.md) to a custom policy.
2121

2222
## Prerequisites
2323

2424
- Complete the steps in [Get started with custom policies in Azure Active Directory B2C](active-directory-b2c-get-started-custom.md).
25-
- Make sure that you have access to the certificate .pfx file with the private key that was issued by ADFS.
25+
- Make sure that you have access to a certificate .pfx file with a private key. You can generate your own signed certificate and upload it to Azure AD B2C. Azure AD B2C uses this certificate to sign the SAML request sent to your SAML identity provider.
2626

2727
## Create a policy key
2828

29-
You need to store your ADFS certificate in your Azure AD B2C tenant.
29+
You need to store your certificate in your Azure AD B2C tenant.
3030

3131
1. Sign in to the [Azure portal](https://portal.azure.com/).
3232
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
3333
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
3434
4. On the Overview page, select **Identity Experience Framework - PREVIEW**.
3535
5. Select **Policy Keys** and then select **Add**.
3636
6. For **Options**, choose `Upload`.
37-
7. Enter a **Name** for the policy key. For example, `ADFSSamlCert`. The prefix `B2C_1A_` is added automatically to the name of your key.
37+
7. Enter a **Name** for the policy key. For example, `SamlCert`. The prefix `B2C_1A_` is added automatically to the name of your key.
3838
8. Browse to and select your certificate .pfx file with the private key.
3939
9. Click **Create**.
4040

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,8 @@ You now have an application that has permission to create, read and update users
6262
>
6363
>
6464
65-
## Configure delete permissions for your application
66-
Currently, the *Read and write directory data* permission does **NOT** include the ability to do any deletions such as deleting users. If you want to give your application the ability to delete users, you'll need to do these extra steps that involve PowerShell, otherwise, you can skip to the next section.
65+
## Configure delete or update password permissions for your application
66+
Currently, the *Read and write directory data* permission does **NOT** include the ability to delete users or update user passwords. If you want to give your application the ability to delete users or update passwords, you'll need to do these extra steps that involve PowerShell, otherwise, you can skip to the next section.
6767

6868
First, if you don't already have it installed, install the [Azure AD PowerShell v1 module (MSOnline)](https://docs.microsoft.com/powershell/azure/active-directory/install-msonlinev1?view=azureadps-1.0):
6969

@@ -80,15 +80,15 @@ After you install the PowerShell module connect to your Azure AD B2C tenant.
8080
Connect-MsolService
8181
```
8282

83-
Now we'll use the **Application ID** in the script below to assign the application the user account administrator role which will allow it to delete users. These roles have well-known identifiers, so all you need to do is input your **Application ID** in the script below.
83+
Now we'll use the **Application ID** in the script below to assign the application the user account administrator role. These roles have well-known identifiers, so all you need to do is input your **Application ID** in the script below.
8484

8585
```powershell
8686
$applicationId = "<YOUR_APPLICATION_ID>"
8787
$sp = Get-MsolServicePrincipal -AppPrincipalId $applicationId
8888
Add-MsolRoleMember -RoleObjectId fe930be7-5e62-47db-91af-98c3a49a38b1 -RoleMemberObjectId $sp.ObjectId -RoleMemberType servicePrincipal
8989
```
9090

91-
Your application now also has permissions to delete users from your B2C tenant.
91+
Your application now also has permissions to delete users or update passwords from your B2C tenant.
9292

9393
## Download, configure, and build the sample code
9494
First, download the sample code and get it running. Then we will take a closer look at it. You can [download the sample code as a .zip file](https://github.com/AzureADQuickStarts/B2C-GraphAPI-DotNet/archive/master.zip). You can also clone it into a directory of your choice:

articles/active-directory-b2c/active-directory-b2c-reference-oauth-code.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,6 @@ ms.component: B2C
1717
You can use the OAuth 2.0 authorization code grant in apps installed on a device to gain access to protected resources, such as web APIs. By using the Azure Active Directory B2C (Azure AD B2C) implementation of OAuth 2.0, you can add sign-up, sign-in,
1818
and other identity management tasks to your mobile and desktop apps. This article is language-independent. In the article, we describe how to send and receive HTTP messages without using any open-source libraries.
1919

20-
<!-- TODO: Need link to libraries -->
21-
2220
The OAuth 2.0 authorization code flow is described in [section 4.1 of the OAuth 2.0 specification](http://tools.ietf.org/html/rfc6749). You can use it for authentication and authorization in most [application types](active-directory-b2c-apps.md), including web applications and natively installed applications. You can use the OAuth 2.0 authorization code flow to securely acquire access tokens and refresh tokens for your applications, which can be used to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). The refresh token allows the client to acquire new access (and refresh) tokens once the access token expires, typically after one hour.
2321

2422
This article focuses on the **public clients** OAuth 2.0 authorization code flow. A public client is any client application that cannot be trusted to securely maintain the integrity of a secret password. This includes mobile apps, desktop applications, and essentially any application that runs on a device and needs to get access tokens.
@@ -77,7 +75,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
7775
| redirect_uri |Required |The redirect URI of your app, where authentication responses are sent and received by your app. It must exactly match one of the redirect URIs that you registered in the portal, except that it must be URL-encoded. |
7876
| scope |Required |A space-separated list of scopes. A single scope value indicates to Azure Active Directory (Azure AD) both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app needs a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
7977
| response_mode |Recommended |The method that you use to send the resulting authorization code back to your app. It can be `query`, `form_post`, or `fragment`. |
80-
| state |Recommended |A value included in the request that is returned in the token response. It can be a string of any content that you want to use. Usually, a randomly generated unique value is used, to prevent cross-site request forgery attacks. The state also is used to encode information about the user's state in the app before the authentication request occurred. For example, the page the user was on, or the policy that was being executed. |
78+
| state |Recommended |A value included in the request that can be a string of any content that you want to use. Usually, a randomly generated unique value is used, to prevent cross-site request forgery attacks. The state also is used to encode information about the user's state in the app before the authentication request occurred. For example, the page the user was on, or the policy that was being executed. |
8179
| p |Required |The policy that is executed. It's the name of a policy that is created in your Azure AD B2C directory. The policy name value should begin with **b2c\_1\_**. To learn more about policies, see [Azure AD B2C built-in policies](active-directory-b2c-reference-policies.md). |
8280
| prompt |Optional |The type of user interaction that is required. Currently, the only valid value is `login`, which forces the user to enter their credentials on that request. Single sign-on will not take effect. |
8381

0 commit comments

Comments
 (0)