Skip to content

Commit f10fd33

Browse files
committed
Merge remote-tracking branch 'refs/remotes/MicrosoftDocs/master'
2 parents d3e1550 + b64aee7 commit f10fd33

File tree

1,038 files changed

+11598
-5272
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,038 files changed

+11598
-5272
lines changed

.openpublishing.redirection.json

Lines changed: 21 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/active-directory/users-groups-roles/groups-update-rule.md",
5+
"redirect_url": "/articles/active-directory/users-groups-roles/groups-create-rule",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/sql-database/sql-database-feature-restrictions.md",
510
"redirect_url": "/azure/sql-database",
@@ -45,6 +50,11 @@
4550
"redirect_url": "/azure//virtual-machines/windows/sql/virtual-machines-windows-portal-sql-create-failover-cluster-premium-file-share",
4651
"redirect_document_id": false
4752
},
53+
{
54+
"source_path": "articles/virtual-machines/linux/cli-manage-nodejs.md",
55+
"redirect_url": "/azure/virtual-machines/linux/create-cli-complete",
56+
"redirect_document_id": false
57+
},
4858
{
4959
"source_path": "articles/virtual-machines/windows/maintenance-and-updates.md",
5060
"redirect_url": "/azure/virtual-machines/maintenance-and-updates?toc=/azure/virtual-machines/windows/toc.json&bc=/azure/virtual-machines/windows/breadcrumb/toc.json",
@@ -14498,7 +14508,7 @@
1449814508
},
1449914509
{
1450014510
"source_path": "articles/machine-learning/machine-learning-algorithm-cheat-sheet.md",
14501-
"redirect_url": "/azure/machine-learning/studio/algorithm-cheat-sheet",
14511+
"redirect_url": "/azure/machine-learning/algorithm-cheat-sheet",
1450214512
"redirect_document_id": false
1450314513
},
1450414514
{
@@ -24595,6 +24605,16 @@
2459524605
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-java",
2459624606
"redirect_document_id": false
2459724607
},
24608+
{
24609+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-nodejs-v10.md",
24610+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs-legacy",
24611+
"redirect_document_id": false
24612+
},
24613+
{
24614+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-v10.md",
24615+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-legacy",
24616+
"redirect_document_id": false
24617+
},
2459824618
{
2459924619
"source_path": "articles/storage/blobs/storage-nodejs-how-to-use-blob-storage.md",
2460024620
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs",
@@ -40869,11 +40889,6 @@
4086940889
"redirect_url": "/azure/azure-monitor/platform/data-platform",
4087040890
"redirect_document_id": false
4087140891
},
40872-
{
40873-
"source_path": "articles/azure-monitor/platform/data-sources-reference.md",
40874-
"redirect_url": "/azure/azure-monitor/platform/data-sources",
40875-
"redirect_document_id": false
40876-
},
4087740892
{
4087840893
"source_path": "articles/azure-monitor/platform/collect-activity-logs-subscriptions.md",
4087940894
"redirect_url": "/azure/azure-monitor/platform/activity-log-collect-tenants",

CODEOWNERS

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,17 @@
11
# Testing the new code owners feature in GitHub. Please contact Cory Fowler if you have questions.
2-
# articles/storage/ @tamram @robinsh
3-
# articles/virtual-machines/ @iainfoulds @cynthn
4-
# articles/virtual-machines/linux/ @iainfoulds @cynthn
5-
# articles/virtual-machines/windows/ @iainfoulds @cynthn
6-
# articles/application-insights/ @SergeyKanzhelev
7-
# articles/cosmos-db/ @mimig1
8-
9-
# All Articles
10-
articles/ @apex-docs-pr-reviewers
11-
122
# Cognitive Services
133
articles/cognitive-services/ @diberry @erhopf, @nitinme
144

155
# DevOps
16-
176
articles/ansible/ @TomArcherMsft
187
articles/chef/ @TomArcherMsft
198
articles/jenkins/ @TomArcherMsft
209
articles/terraform/ @TomArcherMsft
2110

2211
# Governance
23-
2412
articles/governance/ @DCtheGeek
13+
14+
# Configuration
15+
*.json @SyntaxC4
16+
.acrolinx-config.edn @MonicaRush
17+
articles/zone-pivot-groups.yml @SyntaxC4

FETCH_HEAD

Whitespace-only changes.

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ OpenID Connect is an authentication protocol, built on top of OAuth 2.0, that ca
2020

2121
[OpenID Connect](https://openid.net/specs/openid-connect-core-1_0.html) extends the OAuth 2.0 *authorization* protocol for use as an *authentication* protocol. This authentication protocol allows you to perform single sign-on. It introduces the concept of an *ID token*, which allows the client to verify the identity of the user and obtain basic profile information about the user.
2222

23-
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. If you want to add identity management to your mobile or desktop applications using Azure AD B2C, you should use [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) rather than OpenID Connect. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
23+
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
2424

2525
Azure AD B2C extends the standard OpenID Connect protocol to do more than simple authentication and authorization. It introduces the [user flow parameter](active-directory-b2c-reference-policies.md), which enables you to use OpenID Connect to add user experiences to your application, such as sign-up, sign-in, and profile management.
2626

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ Your custom policy and Azure AD B2C tenant are now ready. Next, create an applic
269269
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
270270
1. Select **App registrations (Preview)**, and then select **New registration**.
271271
1. Enter a **Name** for the application. For example, *SAMLApp1*.
272-
1. Under **Supported account types**, select **Accounts in any organizational directory or any identity provider.**
272+
1. Under **Supported account types**, select **Accounts in this organizational directory only**
273273
1. Under **Redirect URI**, select **Web**, and then enter `https://localhost`. You modify this value later in the application registration's manifest.
274274
1. Select **Grant admin consent to openid and offline_access permissions**.
275275
1. Select **Register**.
@@ -281,11 +281,11 @@ For SAML apps, there are several properties you need to configure in the applica
281281
1. In the [Azure portal](https://portal.azure.com), navigate to the application registration that you created in the previous section.
282282
1. Under **Manage**, select **Manifest** to open the manifest editor. You modify several properties in the following sections.
283283

284-
#### IdentifierUri
284+
#### identifierUris
285285

286-
The `IdentifierUri` is a string collection containing user-defined URI(s) that uniquely identify a Web app within its Azure AD B2C tenant. The identifier URI must be from a verified domain within your organization's directory. For example, `https://contoso.onmicrosoft.com/app-name`. Your service provider must set this value in the `Issuer` element of a SAML request.
286+
The `identifierUris` is a string collection containing user-defined URI(s) that uniquely identify a Web app within its Azure AD B2C tenant. Your service provider must set this value in the `Issuer` element of a SAML request.
287287

288-
#### SamlMetadataUrl
288+
#### samlMetadataUrl
289289

290290
This property represents service provider's publicly available metadata URL. The metadata URL can point to a metadata file uploaded to any anonymously accessible endpoint, for example blob storage.
291291

@@ -299,7 +299,7 @@ For this tutorial which uses the SAML test application, use the following value
299299
"samlMetadataUrl":"https://samltestapp2.azurewebsites.net/Metadata",
300300
```
301301

302-
#### ReplyUrlWithType (Optional)
302+
#### replyUrlsWithType (Optional)
303303

304304
If you do not provide a metadata URI, you can explicitly specify the reply URL. This optional property represents the `AssertionConsumerServiceUrl` (`SingleSignOnService` URL in the service provider metadata) and the `BindingType` is assumed to be `HTTP POST`.
305305

@@ -316,7 +316,7 @@ For this tutorial, in which you use the SAML test application, set the `url` pro
316316
],
317317
```
318318

319-
#### LogoutUrl (Optional)
319+
#### logoutUrl (Optional)
320320

321321
This optional property represents the `Logout` URL (`SingleLogoutService` URL in the relying party metadata), and the `BindingType` for this is assumed to be `Http-Redirect`.
322322

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ Using PowerShell is a good option when you need to bulk enable users. As an exam
133133
To disable MFA, use this script:
134134

135135
```PowerShell
136-
Get-MsolUser -UserPrincipalName [email protected] | Set-MsolUser -StrongAuthenticationMethods @()
136+
Get-MsolUser -UserPrincipalName [email protected] | Set-MsolUser -StrongAuthenticationRequirements @()
137137
```
138138

139139
which can also be shortened to:

articles/active-directory/authentication/howto-password-ban-bad-on-premises-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Follow the guidance in the article [Configuring the custom banned password list]
2525

2626
## Enable Password Protection
2727

28-
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory**, **Authentication methods**, then **Password Protection**.
28+
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory**, **Security**,**Authentication methods**, then **Password Protection**.
2929
1. Set **Enable Password Protection on Windows Server Active Directory** to **Yes**
3030
1. As mentioned in the [Deployment guide](howto-password-ban-bad-on-premises-deploy.md#deployment-strategy), it is recommended to initially set the **Mode** to **Audit**
3131
* After you are comfortable with the feature, you can switch the **Mode** to **Enforced**

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Based on your organizational requirements, smart lockout values may need to be c
6565
To check or modify the smart lockout values for your organization, use the following steps:
6666

6767
1. Sign in to the [Azure portal](https://portal.azure.com).
68-
1. Search for and select *Azure Active Directory*. Select **Authentication methods** > **Password protection**.
68+
1. Search for and select *Azure Active Directory*. Select **Security** > **Authentication methods** > **Password protection**.
6969
1. Set the **Lockout threshold**, based on how many failed sign-ins are allowed on an account before its first lockout. The default is 10.
7070
1. Set the **Lockout duration in seconds**, to the length in seconds of each lockout. The default is 60 seconds (one minute).
7171

articles/active-directory/cloud-provisioning/what-is-cloud-provisioning.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,7 @@ The following table provides a comparison between Azure AD Connect and Azure AD
5757
| Support for writeback (passwords, devices, groups) || |
5858
| Azure AD Domain Services support|| |
5959
| Exchange hybrid configuration || |
60+
| Support for more than 50,000 objects per AD domain || |
6061

6162
## Next steps
6263

articles/active-directory/conditional-access/concept-baseline-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Baseline policies are a set of predefined policies that help protect organizatio
2222
Managing customized Conditional Access policies requires an Azure AD Premium license.
2323

2424
> [!IMPORTANT]
25-
> Baseline policies are being depricated. See [What's new in Azure Active Directory?](../fundamentals/whats-new.md#replacement-of-baseline-policies-with-security-defaults) for more information.
25+
> Baseline policies are being deprecated. See [What's new in Azure Active Directory?](../fundamentals/whats-new.md#replacement-of-baseline-policies-with-security-defaults) for more information.
2626
2727
## Baseline policies
2828

0 commit comments

Comments
 (0)