Skip to content

Commit f57a6e1

Browse files
author
Larry Franks
committed
Merge branch 'master' of github.com:microsoftdocs/azure-docs-pr into encryption-update
2 parents 2501e5d + d5b53b6 commit f57a6e1

File tree

1,093 files changed

+13755
-5234
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,093 files changed

+13755
-5234
lines changed

.openpublishing.redirection.json

Lines changed: 65 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3930,6 +3930,61 @@
39303930
"redirect_url": "/azure/architecture/cloud-adoption-guide/subscription-governance",
39313931
"redirect_document_id": true
39323932
},
3933+
{
3934+
"source_path": "articles/azure-supportability/index.yml",
3935+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request",
3936+
"redirect_document_id": false
3937+
},
3938+
{
3939+
"source_path": "articles/azure-supportability/classic-deployment-model-quota-increase-requests.md",
3940+
"redirect_url": "/azure/azure-portal/supportability/classic-deployment-model-quota-increase-requests",
3941+
"redirect_document_id": true
3942+
},
3943+
{
3944+
"source_path": "articles/azure-supportability/create-manage-support-requests-using-access-control.md",
3945+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request#role-based-access-control",
3946+
"redirect_document_id": true
3947+
},
3948+
{
3949+
"source_path": "articles/azure-supportability/how-to-create-azure-support-request.md",
3950+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request",
3951+
"redirect_document_id": true
3952+
},
3953+
{
3954+
"source_path": "articles/azure-supportability/how-to-use-file-uploader.md",
3955+
"redirect_url": "/azure/azure-portal/supportability/how-to-use-file-uploader",
3956+
"redirect_document_id": true
3957+
},
3958+
{
3959+
"source_path": "articles/azure-supportability/low-priority-quota.md",
3960+
"redirect_url": "/azure/azure-portal/supportability/low-priority-quota",
3961+
"redirect_document_id": true
3962+
},
3963+
{
3964+
"source_path": "articles/azure-supportability/networking-quota-requests.md",
3965+
"redirect_url": "/azure/azure-portal/supportability/networking-quota-requests",
3966+
"redirect_document_id": true
3967+
},
3968+
{
3969+
"source_path": "articles/azure-supportability/per-vm-quota-requests.md",
3970+
"redirect_url": "/azure/azure-portal/supportability/per-vm-quota-requests",
3971+
"redirect_document_id": true
3972+
},
3973+
{
3974+
"source_path": "articles/azure-supportability/regional-quota-requests.md",
3975+
"redirect_url": "/azure/azure-portal/supportability/regional-quota-requests",
3976+
"redirect_document_id": true
3977+
},
3978+
{
3979+
"source_path": "articles/azure-supportability/resource-manager-core-quotas-request.md",
3980+
"redirect_url": "/azure/azure-portal/supportability/resource-manager-core-quotas-request",
3981+
"redirect_document_id": true
3982+
},
3983+
{
3984+
"source_path": "articles/azure-supportability/sku-series-unavailable.md",
3985+
"redirect_url": "/azure/azure-portal/supportability/sku-series-unavailable",
3986+
"redirect_document_id": true
3987+
},
39333988
{
39343989
"source_path": "articles/azure-toolkit-for-eclipse-debugging-azure-applications.md",
39353990
"redirect_url": "/java/azure/eclipse/azure-toolkit-for-eclipse",
@@ -24605,6 +24660,16 @@
2460524660
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-java",
2460624661
"redirect_document_id": false
2460724662
},
24663+
{
24664+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-nodejs-v10.md",
24665+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs-legacy",
24666+
"redirect_document_id": false
24667+
},
24668+
{
24669+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-v10.md",
24670+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-legacy",
24671+
"redirect_document_id": false
24672+
},
2460824673
{
2460924674
"source_path": "articles/storage/blobs/storage-nodejs-how-to-use-blob-storage.md",
2461024675
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs",
@@ -40879,11 +40944,6 @@
4087940944
"redirect_url": "/azure/azure-monitor/platform/data-platform",
4088040945
"redirect_document_id": false
4088140946
},
40882-
{
40883-
"source_path": "articles/azure-monitor/platform/data-sources-reference.md",
40884-
"redirect_url": "/azure/azure-monitor/platform/data-sources",
40885-
"redirect_document_id": false
40886-
},
4088740947
{
4088840948
"source_path": "articles/azure-monitor/platform/collect-activity-logs-subscriptions.md",
4088940949
"redirect_url": "/azure/azure-monitor/platform/activity-log-collect-tenants",

CODEOWNERS

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,17 @@
11
# Testing the new code owners feature in GitHub. Please contact Cory Fowler if you have questions.
2-
# articles/storage/ @tamram @robinsh
3-
# articles/virtual-machines/ @iainfoulds @cynthn
4-
# articles/virtual-machines/linux/ @iainfoulds @cynthn
5-
# articles/virtual-machines/windows/ @iainfoulds @cynthn
6-
# articles/application-insights/ @SergeyKanzhelev
7-
# articles/cosmos-db/ @mimig1
8-
9-
# All Articles
10-
articles/ @apex-docs-pr-reviewers
11-
122
# Cognitive Services
133
articles/cognitive-services/ @diberry @erhopf, @nitinme
144

155
# DevOps
16-
176
articles/ansible/ @TomArcherMsft
187
articles/chef/ @TomArcherMsft
198
articles/jenkins/ @TomArcherMsft
209
articles/terraform/ @TomArcherMsft
2110

2211
# Governance
23-
2412
articles/governance/ @DCtheGeek
13+
14+
# Configuration
15+
*.json @SyntaxC4 @snoviking @arob98
16+
.acrolinx-config.edn @MonicaRush @arob98
17+
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking @arob98

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ OpenID Connect is an authentication protocol, built on top of OAuth 2.0, that ca
2020

2121
[OpenID Connect](https://openid.net/specs/openid-connect-core-1_0.html) extends the OAuth 2.0 *authorization* protocol for use as an *authentication* protocol. This authentication protocol allows you to perform single sign-on. It introduces the concept of an *ID token*, which allows the client to verify the identity of the user and obtain basic profile information about the user.
2222

23-
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. If you want to add identity management to your mobile or desktop applications using Azure AD B2C, you should use [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) rather than OpenID Connect. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
23+
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
2424

2525
Azure AD B2C extends the standard OpenID Connect protocol to do more than simple authentication and authorization. It introduces the [user flow parameter](active-directory-b2c-reference-policies.md), which enables you to use OpenID Connect to add user experiences to your application, such as sign-up, sign-in, and profile management.
2626

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ During the audit stage, many organizations find out that:
3131

3232
It is also possible for stronger password validation to affect your existing Active Directory domain controller deployment automation. We recommend that at least one DC promotion and one DC demotion happen during the audit period evaluation in order to help uncover such issues in advance. For more information, see:
3333

34-
* [Ntdsutil.exe is unable to set a weak Directory Services Repair Mode password](howto-password-ban-bad-on-premises-troubleshoot.md##ntdsutilexe-fails-to-set-a-weak-dsrm-password)
34+
* [Ntdsutil.exe is unable to set a weak Directory Services Repair Mode password](howto-password-ban-bad-on-premises-troubleshoot.md#ntdsutilexe-fails-to-set-a-weak-dsrm-password)
3535
* [Domain controller replica promotion fails because of a weak Directory Services Repair Mode password](howto-password-ban-bad-on-premises-troubleshoot.md#domain-controller-replica-promotion-fails-because-of-a-weak-dsrm-password)
3636
* [Domain controller demotion fails due to a weak local Administrator password](howto-password-ban-bad-on-premises-troubleshoot.md#domain-controller-demotion-fails-due-to-a-weak-local-administrator-password)
3737

articles/active-directory/b2b/direct-federation.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,8 +80,7 @@ First, your partner organization needs to configure their identity provider with
8080
Azure AD B2B can be configured to federate with identity providers that use the SAML protocol with specific requirements listed below. For more information about setting up a trust between your SAML identity provider and Azure AD, see [Use a SAML 2.0 Identity Provider (IdP) for Single Sign-On](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-fed-saml-idp).
8181

8282
> [!NOTE]
83-
> NOTE
84-
The target domain for direct federation must not be DNS-verified on Azure AD. The authentication URL domain must match the target domain or it must be the domain of an allowed identity provider. See the [Limitations](#limitations) section for details.
83+
> The target domain for direct federation must not be DNS-verified on Azure AD. The authentication URL domain must match the target domain or it must be the domain of an allowed identity provider. See the [Limitations](#limitations) section for details.
8584
8685
#### Required SAML 2.0 attributes and claims
8786
The following tables show requirements for specific attributes and claims that must be configured at the third-party identity provider. To set up direct federation, the following attributes must be received in the SAML 2.0 response from the identity provider. These attributes can be configured by linking to the online security token service XML file or by entering them manually.

articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,9 @@ These application roles are defined in the [Azure portal](https://portal.azure.c
3333
### Declare app roles using Azure portal
3434

3535
1. Sign in to the [Azure portal](https://portal.azure.com).
36-
1. On the top bar, select your account, and then **Switch Directory**.
37-
1. Once the **Directory + subscription** pane opens, choose the Active Directory tenant where you wish to register your application, from the **Favorites** or **All Directories** list.
38-
1. Select **All services** in the left-hand nav, and choose **Azure Active Directory**.
36+
1. Select the **Directory + Subscription** icon in the portal toolbar.
37+
1. In the **Favorites** or **All Directories** list, choose the Active Directory tenant where you wish to register your application.
38+
1. In the Azure portal, search for and select **Azure Active Directory**.
3939
1. In the **Azure Active Directory** pane, select **App registrations** to view a list of all your applications.
4040
1. Select the application you want to define app roles in. Then select **Manifest**.
4141
1. Edit the app manifest by locating the `appRoles` setting and adding all your Application Roles.

articles/active-directory/develop/reference-v2-libraries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ For any standards-compliant library, you can use the Microsoft identity platform
104104
* For issues and new feature requests in library code, contact the library owner.
105105
* For issues and new feature requests in the service-side protocol implementation, contact Microsoft.
106106
* [File a feature request](https://feedback.azure.com/forums/169401-azure-active-directory) for additional features you want to see in the protocol.
107-
* [Create a support request](https://docs.microsoft.com/azure/azure-supportability/how-to-create-azure-support-request) if you find an issue where the Microsoft identity platform endpoint isn't compliant with OAuth 2.0 or OpenID Connect 1.0.
107+
* [Create a support request](https://docs.microsoft.com/azure/azure-portal/supportability/how-to-create-azure-support-request) if you find an issue where the Microsoft identity platform endpoint isn't compliant with OAuth 2.0 or OpenID Connect 1.0.
108108

109109
## Related content
110110

articles/active-directory/devices/troubleshoot-hybrid-join-windows-current.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,7 @@ Applicable only for federated domain accounts.
244244
Reasons for failure:
245245

246246
- Unable to get an Access token silently for DRS resource.
247-
- Windows 10 devices acquire auth token from the federation service using Integrated Windows Authentication to an active WS-Trust endpoint. Details: [Federation Service Configuration](hybrid-azuread-join-manual.md##set-up-issuance-of-claims)
247+
- Windows 10 devices acquire auth token from the federation service using Integrated Windows Authentication to an active WS-Trust endpoint. Details: [Federation Service Configuration](hybrid-azuread-join-manual.md#set-up-issuance-of-claims)
248248

249249
**Common error codes:**
250250

articles/active-directory/hybrid/how-to-connect-install-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ After entering the forest name and clicking **Add Directory**, a pop-up dialog
7777
| Option | Description |
7878
| --- | --- |
7979
| Create new account | Select this option if you want Azure AD Connect wizard to create the AD DS account required by Azure AD Connect for connecting to the AD forest during directory synchronization. When this option is selected, enter the username and password for an enterprise admin account. The enterprise admin account provided will be used by Azure AD Connect wizard to create the required AD DS account. You can enter the domain part in either NetBios or FQDN format, that is, FABRIKAM\administrator or fabrikam.com\administrator. |
80-
| Use existing account | Select this option if you want to provide an existing AD DS account to be used Azure AD Connect for connecting to the AD forest during directory synchronization. You can enter the domain part in either NetBios or FQDN format, that is, FABRIKAM\syncuser or fabrikam.com\syncuser. This account can be a regular user account because it only needs the default read permissions. However, depending on your scenario, you may need more permissions. For more information, see [Azure AD Connect Accounts and permissions](reference-connect-accounts-permissions.md##create-the-ad-ds-connector-account). |
80+
| Use existing account | Select this option if you want to provide an existing AD DS account to be used Azure AD Connect for connecting to the AD forest during directory synchronization. You can enter the domain part in either NetBios or FQDN format, that is, FABRIKAM\syncuser or fabrikam.com\syncuser. This account can be a regular user account because it only needs the default read permissions. However, depending on your scenario, you may need more permissions. For more information, see [Azure AD Connect Accounts and permissions](reference-connect-accounts-permissions.md#create-the-ad-ds-connector-account). |
8181

8282
![Connect Directory](./media/how-to-connect-install-custom/connectdir02.png)
8383

articles/active-directory/hybrid/how-to-connect-sso-quick-start.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ To test the feature for a specific user, ensure that all the following condition
208208
- The user signs in on a corporate device.
209209
- The device is joined to your Active Directory domain. The device _doesn't_ need to be [Azure AD Joined](../active-directory-azureadjoin-overview.md).
210210
- The device has a direct connection to your domain controller (DC), either on the corporate wired or wireless network or via a remote access connection, such as a VPN connection.
211-
- You have [rolled out the feature](##step-3-roll-out-the-feature) to this user through Group Policy.
211+
- You have [rolled out the feature](#step-3-roll-out-the-feature) to this user through Group Policy.
212212

213213
To test the scenario where the user enters only the username, but not the password:
214214
- Sign in to `https://myapps.microsoft.com/` in a new private browser session.

0 commit comments

Comments
 (0)