Skip to content

Commit f7e653d

Browse files
committed
2 parents bb9e152 + 44a32b1 commit f7e653d

File tree

1,842 files changed

+43629
-35365
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,842 files changed

+43629
-35365
lines changed

.openpublishing.redirection.json

Lines changed: 140 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1780,6 +1780,11 @@
17801780
"redirect_url": "/azure/search/search-get-started-postman",
17811781
"redirect_document_id": false
17821782
},
1783+
{
1784+
"source_path": "articles/search/knowledge-store-connect-powerbi.md",
1785+
"redirect_url": "/azure/search/knowledge-store-create-portal",
1786+
"redirect_document_id": true
1787+
},
17831788
{
17841789
"source_path": "articles/search/search-create-index-rest-api.md",
17851790
"redirect_url": "/azure/search/search-get-started-powershell",
@@ -2575,11 +2580,6 @@
25752580
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-storage-sas",
25762581
"redirect_document_id": false
25772582
},
2578-
{
2579-
"source_path": "articles/storage/storage-security-attributes.md",
2580-
"redirect_url": "/azure/storage",
2581-
"redirect_document_id": false
2582-
},
25832583
{
25842584
"source_path": "articles/active-directory/pp/msi-tutorial-linux-vm-access-storage-sas.md",
25852585
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-storage-sas",
@@ -3060,6 +3060,11 @@
30603060
"redirect_url": "/azure/virtual-machines/linux/key-vault-setup",
30613061
"redirect_document_id": true
30623062
},
3063+
{
3064+
"source_path": "articles/key-vault/key-vault-whatis.md",
3065+
"redirect_url": "/azure/key-vault/basic-concepts",
3066+
"redirect_document_id": false
3067+
},
30633068
{
30643069
"source_path": "articles/key-vault/key-vault-versions.md",
30653070
"redirect_url": "/azure/key-vault",
@@ -5122,7 +5127,7 @@
51225127
},
51235128
{
51245129
"source_path": "articles/azure-functions/durable-functions-checkpointing-and-replay.md",
5125-
"redirect_url": "/azure/azure-functions/durable/durable-functions-checkpointing-and-replay",
5130+
"redirect_url": "/azure/azure-functions/durable/durable-functions-orchestrations",
51265131
"redirect_document_id": false
51275132
},
51285133
{
@@ -5245,6 +5250,16 @@
52455250
"redirect_url": "/azure/azure-functions/durable/durable-functions-webjobs-sdk",
52465251
"redirect_document_id": false
52475252
},
5253+
{
5254+
"source_path": "articles/azure-functions/durable/durable-functions-concepts.md",
5255+
"redirect_url": "/azure/azure-functions/durable/durable-functions-overview",
5256+
"redirect_document_id": false
5257+
},
5258+
{
5259+
"source_path": "articles/azure-functions/durable/durable-functions-checkpointing-and-replay.md",
5260+
"redirect_url": "/azure/azure-functions/durable/durable-functions-orchestrations",
5261+
"redirect_document_id": false
5262+
},
52485263
{
52495264
"source_path": "articles/azure-functions/functions-bindings-storage.md",
52505265
"redirect_url": "/azure/azure-functions/functions-bindings-storage-blob",
@@ -28314,11 +28329,106 @@
2831428329
"redirect_url": "/azure/security/fundamentals/threat-detection",
2831528330
"redirect_document_id": true
2831628331
},
28332+
{
28333+
"source_path": "articles/storage/storage-security-attributes.md",
28334+
"redirect_url": "/azure/storage/common/storage-security-controls",
28335+
"redirect_document_id": false
28336+
},
2831728337
{
2831828338
"source_path": "articles/security/common-security-attributes.md",
28319-
"redirect_url": "/azure/security/fundamentals/common-security-attributes",
28339+
"redirect_url": "/azure/security/fundamentals/security-controls",
2832028340
"redirect_document_id": true
2832128341
},
28342+
{
28343+
"source_path": "articles/api-management/api-management-security-attributes.md",
28344+
"redirect_url": "/azure/api-management/api-management-security-controls",
28345+
"redirect_document_id": false
28346+
},
28347+
{
28348+
"source_path": "articles/app-service/app-service-security-attributes.md",
28349+
"redirect_url": "/azure/app-service/app-service-security-controls",
28350+
"redirect_document_id": false
28351+
},
28352+
{
28353+
"source_path": "articles/azure-resource-manager/azure-resource-manager-security-attributes.md",
28354+
"redirect_url": "/azure/azure-resource-manager/azure-resource-manager-security-controls",
28355+
"redirect_document_id": false
28356+
},
28357+
{
28358+
"source_path": "articles/backup/backup-security-attributes.md",
28359+
"redirect_url": "/azure/backup/backup-security-controls",
28360+
"redirect_document_id": false
28361+
},
28362+
{
28363+
"source_path": "articles/cosmos-db/cosmos-db-security-attributes.md",
28364+
"redirect_url": "/azure/cosmos-db/cosmos-db-security-controls",
28365+
"redirect_document_id": false
28366+
},
28367+
{
28368+
"source_path": "articles/event-hubs/event-hubs-security-attributes.md",
28369+
"redirect_url": "/azure/event-hubs/event-hubs-security-controls",
28370+
"redirect_document_id": false
28371+
},
28372+
{
28373+
"source_path": "articles/expressroute/expressroute-security-attributes.md",
28374+
"redirect_url": "/azure/expressroute/expressroute-security-controls",
28375+
"redirect_document_id": false
28376+
},
28377+
{
28378+
"source_path": "articles/key-vault/key-vault-security-attributes.md",
28379+
"redirect_url": "/azure/key-vault/key-vault-security-controls",
28380+
"redirect_document_id": false
28381+
},
28382+
{
28383+
"source_path": "articles/load-balancer/load-balancer-security-attributes.md",
28384+
"redirect_url": "/azure/load-balancer/load-balancer-security-controls",
28385+
"redirect_document_id": false
28386+
},
28387+
{
28388+
"source_path": "articles/service-bus-messaging/service-bus-messaging-security-attributes.md",
28389+
"redirect_url": "/azure/service-bus-messaging/service-bus-messaging-security-controls",
28390+
"redirect_document_id": false
28391+
},
28392+
{
28393+
"source_path": "articles/service-bus-relay/service-bus-relay-security-attributes.md",
28394+
"redirect_url": "/azure/service-bus-relay/service-bus-relay-security-controls",
28395+
"redirect_document_id": false
28396+
},
28397+
{
28398+
"source_path": "articles/service-fabric/service-fabric-security-attributes.md",
28399+
"redirect_url": "/azure/service-fabric/service-fabric-security-controls",
28400+
"redirect_document_id": false
28401+
},
28402+
{
28403+
"source_path": "articles/sql-database/sql-database-security-attributes.md",
28404+
"redirect_url": "/azure/sql-database/sql-database-security-controls",
28405+
"redirect_document_id": false
28406+
},
28407+
{
28408+
"source_path": "articles/storage/common/storage-security-attributes.md",
28409+
"redirect_url": "/azure/storage/common/storage-security-controls",
28410+
"redirect_document_id": false
28411+
},
28412+
{
28413+
"source_path": "articles/virtual-machines/linux/virtual-machines-linux-security-attributes.md",
28414+
"redirect_url": "/azure/virtual-machines/linux/virtual-machines-linux-security-controls",
28415+
"redirect_document_id": false
28416+
},
28417+
{
28418+
"source_path": "articles/virtual-machines/windows/virtual-machines-windows-security-attributes.md",
28419+
"redirect_url": "/azure/virtual-machines/windows/virtual-machines-windows-security-controls",
28420+
"redirect_document_id": false
28421+
},
28422+
{
28423+
"source_path": "articles/virtual-machine-scale-sets/virtual-machine-scale-sets-security-attributes.md",
28424+
"redirect_url": "/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-security-controls",
28425+
"redirect_document_id": false
28426+
},
28427+
{
28428+
"source_path": "articles/vpn-gateway/vpn-gateway-security-attributes.md",
28429+
"redirect_url": "/azure/vpn-gateway/vpn-gateway-security-controls",
28430+
"redirect_document_id": false
28431+
},
2832228432
{
2832328433
"source_path": "articles/security/quick-encrypt-vm-powershell.md",
2832428434
"redirect_url": "/azure/security/azure-disk-encryption-linux-powershell-quickstart",
@@ -37634,8 +37744,8 @@
3763437744
"redirect_document_id": false
3763537745
},
3763637746
{
37637-
"source_path": "articles/azure-monitor/log-query/simple-logs.md",
37638-
"redirect_url": "/azure/azure-monitor/log-query/log-query-overview",
37747+
"source_path": "articles/azure-monitor/log-query/runbook-datacollect.md",
37748+
"redirect_url": "/azure/azure-monitor/platform/data-collector-api",
3763937749
"redirect_document_id": false
3764037750
},
3764137751
{
@@ -38738,6 +38848,11 @@
3873838848
"redirect_url": "/azure/analysis-services/analysis-services-overview",
3873938849
"redirect_document_id": false
3874038850
},
38851+
{
38852+
"source_path": "articles/analysis-services/analysis-services-compat-level.md",
38853+
"redirect_url": "https://docs.microsoft.com/analysis-services/tabular-models/compatibility-level-for-tabular-models-in-analysis-services",
38854+
"redirect_document_id": false
38855+
},
3874138856
{
3874238857
"source_path": "articles/azure-monitor/app/java-live.md",
3874338858
"redirect_url": "/azure/azure-monitor/app/java-get-started",
@@ -41471,6 +41586,21 @@
4147141586
"redirect_url": "https://github.com/Azure-Samples/cognitive-services-quickstart-code/tree/master/php/ComputerVision/use-domain-model",
4147241587
"redirect_document_id": false
4147341588
},
41589+
{
41590+
"source_path": "articles/cognitive-services/Computer-vision/quickstarts-sdk/csharp-analyze-sdk.md",
41591+
"redirect_url": "/azure/cognitive-services/Computer-vision/quickstarts-sdk/csharp-sdk",
41592+
"redirect_document_id": false
41593+
},
41594+
{
41595+
"source_path": "articles/cognitive-services/Computer-vision/quickstarts-sdk/csharp-hand-text-sdk.md",
41596+
"redirect_url": "/azure/cognitive-services/Computer-vision/quickstarts-sdk/csharp-sdk",
41597+
"redirect_document_id": false
41598+
},
41599+
{
41600+
"source_path": "articles/cognitive-services/Computer-vision/quickstarts-sdk/csharp-thumb-sdk.md",
41601+
"redirect_url": "/azure/cognitive-services/Computer-vision/quickstarts-sdk/csharp-sdk",
41602+
"redirect_document_id": false
41603+
},
4147441604
{
4147541605
"source_path": "articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Upload-Images.md",
4147641606
"redirect_url": "/azure/cognitive-services/content-moderator",
@@ -41648,7 +41778,7 @@
4164841778
},
4164941779
{
4165041780
"source_path": "articles/azure-monitor/insights/service-map-configure.md",
41651-
"redirect_url": "/azure/azure-monitor/insights/vminsights-enable-hybrid-cloud",
41781+
"redirect_url": "/azure/azure-monitor/insights/vminsights-enable-overview",
4165241782
"redirect_document_id": false
4165341783
},
4165441784
{

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,13 +38,15 @@ After you have a B2C tenant, you need to register your application using the [Az
3838
3939
1. Sign in to the [Azure portal](https://portal.azure.com).
4040
2. Choose your Azure AD B2C tenant by selecting your account in the top right corner of the page.
41-
3. In the left-hand navigation pane, choose **All Services**, click **App Registrations**, and click **Add**.
41+
3. In the left-hand navigation pane, choose **All Services**, click **App Registrations**, and click **New registration**.
4242
4. Follow the prompts and create a new application.
43-
1. Select **Web App / API** as the Application Type.
44-
2. Provide **any Sign-on URL** (e.g. `https://B2CGraphAPI`) as it's not relevant for this example.
43+
1. Add an appropriate name
44+
2. Select **Accounts in this Organizational directory only**
45+
3. Select **Web** as the Application Type and provide **any Sign-on URL** (e.g. `https://B2CGraphAPI`) as it's not relevant for this example.
46+
4. Click Register.
4547
5. The application will now show up in the list of applications, click on it to obtain the **Application ID** (also known as Client ID). Copy it as you'll need it in a later section.
46-
6. In the Settings menu, click **Keys**.
47-
7. In the **Passwords** section, enter the key description and select a duration, and then click **Save**. Copy the key value (also known as Client Secret) for use in a later section.
48+
6. In the Settings menu, click **Certificates & secrets**.
49+
7. In the **Client secrets** section, click on **New client secret**, provide a description for the secret and select a duration, and then click **Add**. Copy the value of the secret (also known as Client Secret) for use in a later section.
4850

4951
## Configure create, read and update permissions for your application
5052
Now you need to configure your application to get all the required permissions to create, read, update and delete users.

articles/active-directory-b2c/active-directory-b2c-overview-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The customer identity and access management (CIAM) service in Azure includes:
5151

5252
Azure AD B2C interacts with identity providers, users, other systems, and with the local user directory in sequence to achieve an identity task. For example, sign in a user, register a new user, or reset a password. The Identity Experience Framework and a policy (also called a user journey or a trust framework policy) establishes multi-party trust and explicitly defines the actors, the actions, the protocols, and the sequence of steps to complete.
5353

54-
The Identity Experience Framework is a fully configurable, policy-driven, cloud-based Azure platform that orchestrates trust between entities in standard protocol formats such as OpenID Connect, OAuth, SAML, WSFed, and a few non-standard ones, for example REST API-based system-to-system claims exchanges. The framework creates user-friendly, white-labeled experiences that support HTML and CSS.
54+
The Identity Experience Framework is a fully configurable, policy-driven, cloud-based Azure platform that orchestrates trust between entities in standard protocol formats such as OpenID Connect, OAuth, SAML, and a few non-standard ones, for example REST API-based system-to-system claims exchanges. The framework creates user-friendly, white-labeled experiences that support HTML and CSS.
5555

5656
A custom policy is represented as one or several XML-formatted files that refer to each other in a hierarchical chain. The XML elements define the claims schema, claims transformations, content definitions, claims providers, technical profiles, and user journey orchestration steps, among other elements. A custom policy is accessible as one or several XML files that are executed by the Identity Experience Framework when invoked by a relying party. Developers configuring custom policies must define the trusted relationships in careful detail to include metadata endpoints, exact claims exchange definitions, and configure secrets, keys, and certificates as needed by each identity provider.
5757

articles/active-directory-b2c/active-directory-b2c-quickstarts-desktop-app.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Quickstart - Set up sign-in for a desktop app using Azure Active Directory B2C | Microsoft Docs
3-
description: Run a sample ASP.NET desktop application that uses Azure Active Directory B2C to provide account sign-in.
2+
title: Quickstart - Set up sign-in for a desktop app using Azure Active Directory B2C
3+
description: Run a sample WPF desktop application that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
1111
ms.custom: mvc
12-
ms.date: 11/30/2018
12+
ms.date: 09/12/2019
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -23,7 +23,7 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
2323
## Prerequisites
2424

2525
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
26-
- A social account from either Facebook, Google, Microsoft, or Twitter.
26+
- A social account from either Facebook, Google, or Microsoft.
2727
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop/archive/master.zip) or clone the sample web app from GitHub.
2828

2929
```
@@ -41,10 +41,10 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
4141
4242
![Screenshot of the sample WPF application](media/active-directory-b2c-quickstarts-desktop-app/wpf-sample-application.png)
4343
44-
The sample supports several sign-up options. These options include using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
44+
The sample supports several sign-up options. These options include using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, or Microsoft.
4545
4646
47-
2. Azure AD B2C presents a custom login page for a fictitious brand called Wingtip Toys for the sample web app. To sign up using a social identity provider, click the button of the identity provider you want to use.
47+
2. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
4848
4949
![Sign In or Sign Up page showing identity providers](media/active-directory-b2c-quickstarts-desktop-app/sign-in-or-sign-up-wpf.png)
5050
@@ -62,7 +62,7 @@ Azure AD B2C provides functionality to allow users to update their profiles. The
6262
6363
![Edit profile button highlighted in WPF sample app](media/active-directory-b2c-quickstarts-desktop-app/edit-profile-wpf.png)
6464
65-
2. Choose the identity provider associated with the account you created. For example, if you used Twitter as the identity provider when you created your account, choose Twitter to modify the associated profile details.
65+
2. Choose the identity provider associated with the account you created. For example, if you used Facebook as the identity provider when you created your account, choose Facebook to modify the associated profile details.
6666
6767
3. Change your **Display name** or **City**, and then click **Continue**.
6868

articles/active-directory-b2c/active-directory-b2c-quickstarts-spa.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Quickstart - Set up sign-in for a single-page app using Azure Active Directory B2C | Microsoft Docs
2+
title: Quickstart - Set up sign-in for a single-page app using Azure Active Directory B2C
33
description: Run a sample single-page application that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
11-
ms.date: 10/24/2018
11+
ms.date: 09/12/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -23,7 +23,7 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
2323

2424
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
2525
- Install [Node.js](https://nodejs.org/en/download/)
26-
- A social account from either Facebook, Google, Microsoft, or Twitter.
26+
- A social account from either Facebook, Google, or Microsoft.
2727
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp/archive/master.zip) or clone the sample web app from GitHub.
2828

2929
```
@@ -54,9 +54,9 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
5454
5555
![Single-page application sample app shown in browser](media/active-directory-b2c-quickstarts-spa/sample-app-spa.png)
5656
57-
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
57+
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, or Microsoft.
5858
59-
2. Azure AD B2C presents a custom login page for a fictitious brand called Wingtip Toys for the sample web app. To sign up using a social identity provider, click the button of the identity provider you want to use.
59+
2. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
6060
6161
![Sign In or Sign Up page showing identity provider buttons](media/active-directory-b2c-quickstarts-spa/sign-in-or-sign-up-spa.png)
6262

0 commit comments

Comments
 (0)