Skip to content

Commit fef78c3

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into app-config-cd-ci
2 parents f96860f + b51e856 commit fef78c3

File tree

162 files changed

+2539
-871
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

162 files changed

+2539
-871
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44955,6 +44955,11 @@
4495544955
"redirect_url": "/azure/azure-monitor/app/proactive-diagnostics",
4495644956
"redirect_document_id": false
4495744957
},
44958+
{
44959+
"source_path": "articles/storage/scripts/storage-common-transfer-between-storage-accounts.md",
44960+
"redirect_url": "https://docs.microsoft.com/previous-versions/azure/storage/storage-common-transfer-between-storage-accounts",
44961+
"redirect_document_id": false
44962+
},
4495844963
{
4495944964
"source_path": "articles/storage/common/storage-use-azcopy.md",
4496044965
"redirect_url": "/azure/storage/common/storage-use-azcopy-v10",

CODEOWNERS

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,9 @@ articles/chef/ @TomArcherMsft
88
articles/jenkins/ @TomArcherMsft
99
articles/terraform/ @TomArcherMsft
1010

11+
# Requires Internal Review
12+
articles/best-practices-availability-paired-regions.md @jpconnock @arob98 @syntaxc4 @tysonn @snoviking
13+
1114
# Governance
1215
articles/governance/ @DCtheGeek
1316

articles/active-directory-b2c/cookie-definitions.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,10 @@ To safeguard access to sites, web browsers will introduce a new secure-by-defaul
2626

2727
Developers must use the new cookie setting, `SameSite=None`, to designate cookies for cross-site access. When the `SameSite=None` attribute is present, an additional `Secure` attribute must be used so cross-site cookies can only be accessed over HTTPS connections. Validate and test all your applications, including those applications that use Azure AD B2C.
2828

29-
For more information, see [Effect on customer websites and Microsoft services and products in Chrome version 80 or later](https://support.microsoft.com/help/4522904/potential-disruption-to-customer-websites-in-latest-chrome).
29+
For more information, see:
30+
31+
* [Handle SameSite cookie changes in Chrome browser](../active-directory/develop/howto-handle-samesite-cookie-changes-chrome-browser.md)
32+
* [Effect on customer websites and Microsoft services and products in Chrome version 80 or later](https://support.microsoft.com/help/4522904/potential-disruption-to-customer-websites-in-latest-chrome)
3033

3134
## Cookies
3235

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 26 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 01/31/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -75,7 +75,7 @@ The following example localizes the Facebook identity provider to Arabic:
7575
<LocalizedString ElementType="ClaimsProvider" StringId="FacebookExchange">فيس بوك</LocalizedString>
7676
```
7777

78-
## Sign-up or sign-in error messages
78+
### Sign-up or sign-in error messages
7979

8080
| ID | Default value |
8181
| -- | ------------- |
@@ -128,7 +128,7 @@ The following are the IDs for a content definition with an ID of `api.localaccou
128128
| **ver_intro_msg** | Verification is necessary. Please click Send button. |
129129
| **ver_input** | Verification code |
130130

131-
## Sign-up and self asserted pages error messages
131+
### Sign-up and self asserted pages error messages
132132

133133
| ID | Default value |
134134
| -- | ------------- |
@@ -199,6 +199,29 @@ The following example shows the use of some of the user interface elements in th
199199

200200
![Sign-up page email verification UX elements](./media/localization-string-ids/localization-mfa2.png)
201201

202+
## Verification display control user interface elements
203+
204+
The following are the IDs for a [Verification display control](display-control-verification.md)
205+
206+
| ID | Default value |
207+
| -- | ------------- |
208+
|verification_control_but_change_claims |Change |
209+
|verification_control_fail_send_code |Failed to send the code, please try again later. |
210+
|verification_control_fail_verify_code |Failed to verify the code, please try again later. |
211+
|verification_control_but_send_code |Send Code |
212+
|verification_control_but_send_new_code |Send New Code |
213+
|verification_control_but_verify_code |Verify Code |
214+
215+
### Verification display control error messages
216+
217+
| ID | Default value |
218+
| -- | ------------- |
219+
|UserMessageIfMaxRetryAttempted |One time password provided verification has exceeded maximum number of attempts |
220+
|UserMessageIfSessionDoesNotExist |One time password verification session has expired |
221+
|UserMessageIfSessionConflict |One time password verification session has conflict |
222+
|UserMessageIfInvalidCode |One time password provided for verification is incorrect |
223+
224+
202225

203226

204227

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -190,6 +190,23 @@ If your previous computer certificate has expired, and a new certificate has bee
190190
> [!NOTE]
191191
> If you use your own certificates instead of generating certificates with the PowerShell script, make sure that they align to the NPS naming convention. The subject name must be **CN=\<TenantID\>,OU=Microsoft NPS Extension**.
192192
193+
### Microsoft Azure Government additional steps
194+
195+
For customers that use Azure Government cloud, the following additional configuration steps are required on each NPS server:
196+
197+
1. Open **Registry Editor** on the NPS server.
198+
1. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa`. Set the following key values:
199+
200+
| Registry key | Value |
201+
|--------------------|-----------------------------------|
202+
| AZURE_MFA_HOSTNAME | adnotifications.windowsazure.us |
203+
| STS_URL | https://login.microsoftonline.us/ |
204+
205+
1. Repeat the previous two steps to set the registry key values for each NPS server.
206+
1. Restart the NPS service for each NPS server.
207+
208+
For minimal impact, take each NPS server out of the NLB rotation one at a time and wait for all connections to drain.
209+
193210
### Certificate rollover
194211

195212
With release 1.0.1.32 of the NPS extension, reading multiple certificates is now supported. This capability will help facilitate rolling certificate updates prior to their expiration. If your organization is running a previous version of the NPS extension, you should upgrade to version 1.0.1.32 or higher.

articles/active-directory/cloud-provisioning/tutorial-pilot-aadc-aadccp.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,7 @@ Azure AD Connect sync synchronizes changes occurring in your on-premises directo
6464

6565
**Name:** Give the rule a meaningful name<br>
6666
**Description:** Add a meaningful description<br>
67+
6768
**Connected System:** Choose the AD connector that you are writing the custom sync rule for<br>
6869
**Connected System Object Type:** User<br>
6970
**Metaverse Object Type:** Person<br>

articles/active-directory/develop/TOC.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -740,18 +740,18 @@
740740
items:
741741
- name: Glossary
742742
href: developer-glossary.md
743-
- name: Azure roadmap
744-
href: https://azure.microsoft.com/roadmap/?category=security-identity
743+
- name: Videos
744+
href: identity-videos.md
745745
- name: Azure AD blog
746746
href: https://cloudblogs.microsoft.com/enterprisemobility/?product=azure-active-directory
747747
- name: Microsoft identity platform developer blog
748748
href: https://developer.microsoft.com/en-us/identity/blogs/
749+
- name: Azure roadmap
750+
href: https://azure.microsoft.com/roadmap/?category=security-identity
749751
- name: Try Sign in with Microsoft
750752
href: https://azure.microsoft.com/develop/identity/signin/
753+
- name: Managed identities for Azure resources
754+
href: https://docs.microsoft.com/azure/active-directory/managed-service-identity/overview
751755
- name: Getting help
752756
displayName: support, help options
753757
href: developer-support-help-options.md
754-
- name: Managed identities for Azure resources
755-
href: https://docs.microsoft.com/azure/active-directory/managed-service-identity/overview
756-
- name: Microsoft identity platform videos
757-
href: identity-videos.md

articles/active-directory/develop/scenario-protected-web-api-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The bearer token that's set in the header when the app is called holds informati
4444
Here's a C# code example that shows a client calling the API after it acquires a token with Microsoft Authentication Library for .NET (MSAL.NET):
4545

4646
```csharp
47-
var scopes = new[] {$"api://.../access_as_user}";
47+
var scopes = new[] {$"api://.../access_as_user"};
4848
var result = await app.AcquireToken(scopes)
4949
.ExecuteAsync();
5050

articles/active-directory/hybrid/how-to-connect-pta-user-privacy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ To view logs related to the Pass-through Authentication Agent, open the **Event
6868

6969
### Delete Authentication Agent trace log files
7070

71-
You should regularly check the contents of <strong>%ProgramData%\Microsoft\Azure AD Connect Authentication Agent\Trace\</strong> and delete the contents of this folder every 48 hours.
71+
You should regularly check the contents of **%ProgramData%\Microsoft\Azure AD Connect Authentication Agent\Trace** and delete the contents of this folder every 48 hours.
7272

7373
>[!IMPORTANT]
7474
>If the Authentication Agent service is running, you'll not be able to delete the current log file in the folder. Stop the service before trying again. To avoid user sign-in failures, you should have already configured Pass-through Authentication for [high availability](how-to-connect-pta-quick-start.md#step-4-ensure-high-availability).

articles/aks/azure-disk-customer-managed-keys.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: mlearned
1212

1313
# Bring your own keys (BYOK) with Azure disks in Azure Kubernetes Service (AKS)
1414

15-
Azure Storage encrypts all data in a storage account at rest. By default, data is encrypted with Microsoft-managed keys. For additional control over encryption keys, you can supply [customer-managed keys][customer-managed-keys] to use for encryption of both the OS and data disks for your AKS clusters.
15+
Azure Storage encrypts all data in a storage account at rest. By default, data is encrypted with Microsoft-managed keys. For additional control over encryption keys, you can supply [customer-managed keys][customer-managed-keys] to use for encryption at rest for both the OS and data disks for your AKS clusters.
1616

1717
> [!NOTE]
1818
> BYOK Linux and Windows based AKS clusters are available in [Azure regions][supported-regions] that support server side encryption of Azure managed disks.
@@ -101,7 +101,7 @@ Create a **new resource group** and AKS cluster, then use your key to encrypt th
101101
102102
```azurecli-interactive
103103
# Retrieve the DiskEncryptionSet value and set a variable
104-
diskEncryptionSetId=$(az resource show -n diskEncryptionSetName -g myResourceGroup --resource-type "Microsoft.Compute/diskEncryptionSets" --query [id] -o tsv)
104+
diskEncryptionSetId=$(az resource show -n mydiskEncryptionSetName -g myResourceGroup --resource-type "Microsoft.Compute/diskEncryptionSets" --query [id] -o tsv)
105105
106106
# Create a resource group for the AKS cluster
107107
az group create -n myResourceGroup -l myAzureRegionName

0 commit comments

Comments
 (0)