Skip to content

Commit f189f9d

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into azurecli2
2 parents 39403b4 + 76323fb commit f189f9d

File tree

450 files changed

+4981
-3147
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

450 files changed

+4981
-3147
lines changed

.openpublishing.publish.config.json

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -151,17 +151,17 @@
151151
"url": "https://github.com/Azure-Samples/functions-python-tensorflow-tutorial",
152152
"branch": "master",
153153
"branch_mapping": {}
154-
},
154+
},
155155
{
156156
"path_to_root": "functions-quickstart-templates",
157157
"url": "https://github.com/Azure/azure-functions-templates",
158158
"branch": "dev"
159-
},
159+
},
160160
{
161161
"path_to_root": "functions-docs-csharp",
162162
"url": "https://github.com/Azure-Samples/functions-docs-csharp",
163163
"branch": "master"
164-
},
164+
},
165165
{
166166
"path_to_root": "functions-docs-javascript",
167167
"url": "https://github.com/Azure-Samples/functions-docs-javascript",
@@ -171,12 +171,12 @@
171171
"path_to_root": "functions-docs-typescript",
172172
"url": "https://github.com/Azure-Samples/functions-docs-typescript",
173173
"branch": "master"
174-
},
174+
},
175175
{
176176
"path_to_root": "functions-docs-python",
177177
"url": "https://github.com/Azure-Samples/functions-docs-python",
178178
"branch": "master"
179-
},
179+
},
180180
{
181181
"path_to_root": "functions-docs-powershell",
182182
"url": "https://github.com/Azure-Samples/functions-docs-powershell",
@@ -186,6 +186,11 @@
186186
"url": "https://github.com/Azure-Samples/cognitive-services-personalizer-samples",
187187
"branch": "master"
188188
},
189+
{
190+
"path_to_root": "samples-cognitive-services-data-files",
191+
"url": "https://github.com/Azure-Samples/cognitive-services-sample-data-files",
192+
"branch": "master"
193+
},
189194
{
190195
"path_to_root": "samples-luis",
191196
"url": "https://github.com/Azure-Samples/cognitive-services-language-understanding",

.openpublishing.redirection.json

Lines changed: 39 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1745,22 +1745,22 @@
17451745
},
17461746
{
17471747
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-quickstart.md",
1748-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1748+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-csharp",
17491749
"redirect_document_id": false
17501750
},
17511751
{
17521752
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-java-quickstart.md",
1753-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1753+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-java",
17541754
"redirect_document_id": false
17551755
},
17561756
{
17571757
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-node-quickstart.md",
1758-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1758+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-javascript",
17591759
"redirect_document_id": false
17601760
},
17611761
{
17621762
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-python-quickstart.md",
1763-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1763+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-python",
17641764
"redirect_document_id": false
17651765
},
17661766
{
@@ -6768,6 +6768,11 @@
67686768
"redirect_url": "/azure/logic-apps/logic-apps-using-sap-connector",
67696769
"redirect_document_id": true
67706770
},
6771+
{
6772+
"source_path": "articles/connectors/connectors-create-api-googledrive.md",
6773+
"redirect_url": "https://docs.microsoft.com/connectors/googledrive/",
6774+
"redirect_document_id": true
6775+
},
67716776
{
67726777
"source_path": "articles/logic-apps/custom-connector-build-web-api-app-tutorial.md",
67736778
"redirect_url": "https://docs.microsoft.com/connectors/custom-connectors/create-web-api-connector",
@@ -32613,6 +32618,21 @@
3261332618
"redirect_url": "/azure/cognitive-services/bing-web-search/language-support",
3261432619
"redirect_document_id": true
3261532620
},
32621+
{
32622+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-csharp-quick-start.md",
32623+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries?pivots=programming-language-csharp",
32624+
"redirect_document_id": false
32625+
},
32626+
{
32627+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-java-quickstart.md",
32628+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries?pivots=programming-language-java",
32629+
"redirect_document_id": false
32630+
},
32631+
{
32632+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-python-quickstart.md",
32633+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries?pivots=programming-language-python",
32634+
"redirect_document_id": false
32635+
},
3261632636
{
3261732637
"source_path": "articles/cognitive-services/Bing-Autosuggest/bing-autosuggest-supported-languages.md",
3261832638
"redirect_url": "/azure/cognitive-services/bing-autosuggest/language-support",
@@ -46669,6 +46689,11 @@
4666946689
"redirect_url": "/azure/active-directory-domain-services/tutorial-create-instance#update-dns-settings-for-the-azure-virtual-network",
4667046690
"redirect_document_id": false
4667146691
},
46692+
{
46693+
"source_path": "articles/active-directory/authentication/howto-password-ban-bad-configure.md",
46694+
"redirect_url": "/azure/active-directory/authentication/tutorial-configure-custom-password-protection",
46695+
"redirect_document_id": true
46696+
},
4667246697
{
4667346698
"source_path": "articles/media-services/previous/media-services-fmp4-live-ingest-overview.md",
4667446699
"redirect_url": "/azure/media-services/media-services-fmp4-live-ingest-overview",
@@ -49164,10 +49189,20 @@
4916449189
"redirect_url": "/azure/aks/aks-migration",
4916549190
"redirect_document_id": false
4916649191
},
49192+
{
49193+
"source_path": "articles/virtual-machines/workloads/sap/sap-hana-backup-storage-snapshots.md",
49194+
"redirect_url": "sap-hana-backup-guide",
49195+
"redirect_document_id": true
49196+
},
4916749197
{
4916849198
"source_path": "articles/service-fabric/service-fabric-cicd-your-linux-applications-with-jenkins.md",
4916949199
"redirect_url": "/azure/jenkins/service-fabric-cicd-your-linux-applications-with-jenkins",
4917049200
"redirect_document_id": true
49201+
},
49202+
{
49203+
"source_path": "articles/jenkins/install-jenkins-solution-template.md",
49204+
"redirect_url": "/azure/jenkins/install-solution-template-tutorial",
49205+
"redirect_document_id": true
4917149206
}
4917249207
]
4917349208
}

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/03/2020
12+
ms.date: 03/03/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -112,7 +112,7 @@ The self-asserted technical profile calls the validation **login-NonInteractive*
112112

113113
## CompareBooleanClaimToValue
114114

115-
Checks that boolean value of a claims is equal to `true` or `false`, and return the result of the compression.
115+
Checks that boolean value of a claim is equal to `true` or `false`, and return the result of the compression.
116116

117117
| Item | TransformationClaimType | Data Type | Notes |
118118
| ---- | ------------------------ | ---------- | ----- |

articles/active-directory-b2c/custom-policy-configure-user-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,7 @@ The following elements are used to define the claim:
259259
1. Sign in to the [Azure portal](https://portal.azure.com).
260260
2. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
261261
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
262-
4. Select **Identity Experience Framework (Preview)**.
262+
4. Select **Identity Experience Framework**.
263263
5. Select **Upload Custom Policy**, and then upload the two policy files that you changed.
264264
2. Select the sign-up or sign-in policy that you uploaded, and click the **Run now** button.
265265
3. You should be able to sign up using an email address.

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/02/2020
12+
ms.date: 03/03/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -124,7 +124,7 @@ The technical profile also returns claims, that aren't returned by the identity
124124
| AuthenticationType | Yes | The type of authentication being performed by the RESTful claims provider. Possible values: `None`, `Basic`, `Bearer`, or `ClientCertificate`. The `None` value indicates that the REST API is not anonymous. The `Basic` value indicates that the REST API is secured with HTTP basic authentication. Only verified users, including Azure AD B2C, can access your API. The `ClientCertificate` (recommended) value indicates that the REST API restricts access by using client certificate authentication. Only services that have the appropriate certificates, for example Azure AD B2C, can access your API. The `Bearer` value indicates that the REST API restricts access using client OAuth2 Bearer token. |
125125
| AllowInsecureAuthInProduction| No| Indicates whether the `AuthenticationType` can be set to `none` in production environment (`DeploymentMode` of the [TrustFrameworkPolicy](trustframeworkpolicy.md) is set to `Production`, or not specified). Possible values: true, or false (default). |
126126
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. The HTTP verbs invoked by each are as follows:<br /><ul><li>`Body`: POST</li><li>`Form`: POST</li><li>`Header`: GET</li><li>`QueryString`: GET</li></ul> |
127-
| ClaimsFormat | No | Specifies the format for the output claims. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the output claim that is sent in the request body in JSON format. The `Form` value is the output claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the output claim that is sent in the request header. The `QueryString` value is the output claim that is sent in the request query string. |
127+
| ClaimsFormat | No | Not currently used, can be ignored. |
128128
| ClaimUsedForRequestPayload| No | Name of a string claim that contains the payload to be sent to the REST API. |
129129
| DebugMode | No | Runs the technical profile in debug mode. Possible values: `true`, or `false` (default). In debug mode, the REST API can return more information. See the [Returning error message](#returning-error-message) section. |
130130
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@
1313
href: tutorial-enable-azure-mfa.md
1414
- name: Enable password writeback to on-premises
1515
href: tutorial-enable-sspr-writeback.md
16+
- name: Configure custom banned password lists
17+
href: tutorial-configure-custom-password-protection.md
1618
- name: Integrate Azure Identity Protection
1719
href: tutorial-risk-based-sspr-mfa.md
1820
- name: Concepts
@@ -108,8 +110,6 @@
108110
href: howto-registration-mfa-sspr-combined-troubleshoot.md
109111
- name: Azure AD password protection
110112
items:
111-
- name: Configure the banned password list
112-
href: howto-password-ban-bad-configure.md
113113
- name: On-premises integration
114114
items:
115115
- name: Deploy Azure AD password protection

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ If you're a vendor and want to get your device on this list of supported devices
8787
- End users can register and manage these passwordless authentication methods in their account portal
8888
- End users can sign in with these passwordless authentication methods
8989
- Microsoft Authenticator App: Works in scenarios where Azure AD authentication is used, including across all browsers, during Windows 10 Out Of Box (OOBE) setup, and with integrated mobile apps on any operating system.
90-
- Security keys: Work on lock screen for Windows 10 and the web in supported browsers like Microsoft Edge.
90+
- Security keys: Work on lock screen for Windows 10 and the web in supported browsers like Microsoft Edge (both legacy and new Edge).
9191

9292
## Next steps
9393

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ You cannot change the usage model (per enabled user or per authentication) after
3838

3939
If you purchased enough licenses to cover all users that are enabled for MFA, you can delete the MFA provider altogether.
4040

41-
If your MFA provider is not linked to an Azure AD tenant, or you link the new MFA provider to a different Azure AD tenant, user settings and configuration options are not transferred. Also, existing Azure MFA Servers need to be reactivated using activation credentials generated through the MFA Provider. Reactivating the MFA Servers to link them to the MFA Provider doesn't impact phone call and text message authentication, but mobile app notifications stop working for all users until they reactivate the mobile app.
41+
If your MFA provider is not linked to an Azure AD tenant, or you link the new MFA provider to a different Azure AD tenant, user settings and configuration options are not transferred. Also, existing Azure MFA Servers need to be reactivated using activation credentials generated through the MFA Provider.
4242

4343
### Removing an authentication provider
4444

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ This document focuses on enabling FIDO2 security key based passwordless authenti
3232
| [Combined security information registration preview](concept-registration-mfa-sspr-combined.md) | X | X |
3333
| Compatible [FIDO2 security keys](concept-authentication-passwordless.md#fido2-security-keys) | X | X |
3434
| WebAuthN requires Windows 10 version 1809 or higher | X | X |
35-
| [Azure AD joined devices](../devices/concept-azure-ad-join.md) require Windows 10 version 1809 or higher | X | |
35+
| [Azure AD joined devices](../devices/concept-azure-ad-join.md) require Windows 10 version 1903 or higher | X | |
3636
| [Hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md) require Windows 10 Insider Build 18945 or higher | | X |
3737
| Fully patched Windows Server 2016/2019 Domain Controllers. | | X |
3838
| [Azure AD Connect](../hybrid/how-to-connect-install-roadmap.md#install-azure-ad-connect) version 1.4.32.0 or later | | X |
@@ -51,6 +51,7 @@ The following scenarios aren't supported:
5151
- Log in to a server using a security key.
5252
- If you haven't used your security key to sign in to your device while online, you can't use it to sign in or unlock offline.
5353
- Signing in or unlocking a Windows 10 device with a security key containing multiple Azure AD accounts. This scenario utilizes the last account added to the security key. WebAuthN allows users to choose the account they wish to use.
54+
- Unlock a device running Windows 10 version 1809. For the best experience, use Windows 10 version 1903 or higher.
5455

5556
## Prepare devices for preview
5657

articles/active-directory/authentication/howto-password-ban-bad-configure.md

Lines changed: 0 additions & 61 deletions
This file was deleted.

0 commit comments

Comments
 (0)