Skip to content

Commit fced44f

Browse files
committed
Resolved conflicts
2 parents fdf86ca + 303879e commit fced44f

File tree

691 files changed

+8417
-4679
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

691 files changed

+8417
-4679
lines changed

.openpublishing.redirection.json

Lines changed: 16 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16944,6 +16944,11 @@
1694416944
"redirect_url": "/azure/storage/common/storage-quickstart-create-account?tabs=powershell",
1694516945
"redirect_document_id": false
1694616946
},
16947+
{
16948+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-javascript-client-libraries.md",
16949+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-legacy",
16950+
"redirect_document_id": false
16951+
},
1694716952
{
1694816953
"source_path": "articles/storage/blobs/data-lake-storage-evaluation.md",
1694916954
"redirect_url": "/azure/storage/blobs/data-lake-storage-upgrade",
@@ -18554,6 +18559,11 @@
1855418559
"redirect_url": "/azure/virtual-machines/workloads/redhat/redhat-rhui",
1855518560
"redirect_document_id": false
1855618561
},
18562+
{
18563+
"source_path": "articles/virtual-machines/linux/rhel-images.md",
18564+
"redirect_url": "/azure/virtual-machines/workloads/redhat/redhat-images",
18565+
"redirect_document_id": false
18566+
},
1855718567
{
1855818568
"source_path": "articles/virtual-machine-scale-sets/virtual-machine-scale-sets-advanced-autoscale.md",
1855918569
"redirect_url": "/azure/monitoring-and-diagnostics/insights-advanced-autoscale-virtual-machine-scale-sets",
@@ -35199,12 +35209,7 @@
3519935209
"source_path": "articles/multi-factor-authentication/end-user/index.md",
3520035210
"redirect_url": "/azure/multi-factor-authentication/end-user/multi-factor-authentication-end-user",
3520135211
"redirect_document_id": false
35202-
},
35203-
{
35204-
"source_path": "articles/networking/index.md",
35205-
"redirect_url": "/azure/networking/networking-overview",
35206-
"redirect_document_id": false
35207-
},
35212+
},
3520835213
{
3520935214
"source_path": "articles/notification-hubs/configure-android-device-messaging.md",
3521035215
"redirect_url": "/azure//notification-hubs/configure-google-firebase-cloud-messaging",
@@ -49604,6 +49609,11 @@
4960449609
"source_path": "articles/postgresql/howto-tls-configurations.md",
4960549610
"redirect_url": "/azure/postgresql/concepts-ssl-connection-security",
4960649611
"redirect_document_id": false
49612+
},
49613+
{
49614+
"source_path": "articles/lab-services/classroom-labs/class-type-deep-learning-natural-processing.md",
49615+
"redirect_url": "/azure/lab-services/classroom-labs/class-type-deep-learning-natural-language-processing",
49616+
"redirect_document_id": false
4960749617
}
4960849618
]
4960949619
}

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Any parameter name included as part of an OIDC or OAuth2 request can be mapped t
108108
| ----- | ----------- | --------|
109109
| {SAML:AuthnContextClassReferences} | The `AuthnContextClassRef` element value, from the SAML request. | urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport |
110110
| {SAML:NameIdPolicyFormat} | The `Format` attribute, from the `NameIDPolicy` element of the SAML request. | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
111-
| {SAML:Issuer} | The SAML `Issuer` element value of the SAML request.| https://contoso.com |
111+
| {SAML:Issuer} | The SAML `Issuer` element value of the SAML request.| `https://contoso.com` |
112112
| {SAML:AllowCreate} | The `AllowCreate` attribute value, from the `NameIDPolicy` element of the SAML request. | True |
113113
| {SAML:ForceAuthn} | The `ForceAuthN` attribute value, from the `AuthnRequest` element of the SAML request. | True |
114114
| {SAML:ProviderName} | The `ProviderName` attribute value, from the `AuthnRequest` element of the SAML request.| Contoso.com |

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -333,7 +333,7 @@ The last step is to enable Azure AD B2C as a SAML IdP in your SAML relying party
333333
Some or all the following are typically required:
334334

335335
* **Metadata**: `https://tenant-name.b2clogin.com/tenant-name.onmicrosoft.com/policy-name/Samlp/metadata`
336-
* **Issuer**: `https://tenant-name.b2clogin.com/tenant-name.onmicrosoft.com/policy-name`
336+
* **Issuer**: Use the entityID in the metadata file
337337
* **Login Url/SAML endpoint/SAML Url**: Check the value in the metadata file
338338
* **Certificate**: This is *B2C_1A_SamlIdpCert*, but without the private key. To get the public key of the certificate:
339339

articles/active-directory-b2c/customize-ui-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 01/30/2020
12+
ms.date: 03/19/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -80,6 +80,7 @@ Review the following guidance before using your own HTML and CSS files to custom
8080
- Limited support for Internet Explorer 9 and 8
8181
- Google Chrome 42.0 and above
8282
- Mozilla Firefox 38.0 and above
83+
- Safari for iOS and macOS, version 12 and above
8384
- Don't include **form tags** in your HTML. Form tags interfere with the POST operations generated by the HTML injected by Azure AD B2C.
8485

8586
### Where do I store UI content?

articles/active-directory-b2c/identity-provider-twitter-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ To use Twitter as an identity provider in Azure AD B2C, you need to create a Twi
3232
1. Sign in to the [Twitter Developers](https://developer.twitter.com/en/apps) website with your Twitter account credentials.
3333
2. Select **Create an app**.
3434
3. Enter an **App name** and an **Application description**.
35-
4. In **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, https://contosob2c.b2clogin.com.
35+
4. In **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`.
3636
5. For the **Callback URL**, enter `https://your-tenant.b2clogin.com/your-tenant.onmicrosoft.com/your-policy-Id/oauth1/authresp`. Replace `your-tenant` with the name of your tenant name and `your-policy-Id` with the identifier of your policy. For example, `b2c_1A_signup_signin_twitter`. You need to use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C.
3737
6. At the bottom of the page, read and accept the terms, and then select **Create**.
3838
7. On the **App details** page, select **Edit > Edit details**, check the box for **Enable Sign in with Twitter**, and then select **Save**.

articles/active-directory-b2c/identity-provider-twitter.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ To use Twitter as an identity provider in Azure AD B2C, you need to create a Twi
2323
1. Sign in to the [Twitter Developers](https://developer.twitter.com/en/apps) website with your Twitter account credentials.
2424
1. Select **Create an app**.
2525
1. Enter an **App name** and an **Application description**.
26-
1. In **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, https://contosob2c.b2clogin.com.
26+
1. In **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`.
2727
1. For the **Callback URL**, enter `https://your-tenant.b2clogin.com/your-tenant.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Replace `your-tenant` with the name of your tenant name and `your-user-flow-Id` with the identifier of your user flow. For example, `b2c_1A_signup_signin_twitter`. You need to use all lowercase letters when entering your tenant name and user flow id even if they are defined with uppercase letters in Azure AD B2C.
2828
1. At the bottom of the page, read and accept the terms, and then select **Create**.
2929
1. On the **App details** page, select **Edit > Edit details**, check the box for **Enable Sign in with Twitter**, and then select **Save**.

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,8 @@
9191
href: password-policy.md
9292
- name: Enable security audit events
9393
href: security-audit-events.md
94+
- name: Analyze audit events with Azure Monitor Workbooks
95+
href: use-azure-monitor-workbooks.md
9496
- name: Domain-join VMs
9597
items:
9698
- name: Windows Server VM from template
67.9 KB
Loading
123 KB
Loading
36.4 KB
Loading

0 commit comments

Comments
 (0)