Skip to content

Commit 7094425

Browse files
committed
resolved merge conflict
1 parent 55f44ea commit 7094425

File tree

2,489 files changed

+35851
-19687
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,489 files changed

+35851
-19687
lines changed

.openpublishing.publish.config.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@
164164
{
165165
"path_to_root": "samples-cognitive-services-speech-sdk",
166166
"url": "https://github.com/Azure-Samples/cognitive-services-speech-sdk",
167-
"branch": "docs",
167+
"branch": "docs-201807",
168168
"branch_mapping": {}
169169
},
170170
{

.openpublishing.redirection.json

+300-30
Large diffs are not rendered by default.

.vscode/c_cpp_properties.json

+6-2
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,11 @@
1010
"path": [
1111
"C:\\Users\\miriamb\\AppData\\Local\\Arduino15\\packages\\AZ3166\\hardware\\stm32f4\\1.1.0\\cores\\arduino"
1212
]
13-
}
13+
},
14+
"intelliSenseMode": "msvc-x64",
15+
"cStandard": "c11",
16+
"cppStandard": "c++17"
1417
}
15-
]
18+
],
19+
"version": 4
1620
}

articles/active-directory-b2c/active-directory-b2c-apps.md

+40-35
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-create-custom-attributes-profile-edit-custom.md

+80-80
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-quickstarts-spa.md

+5-9
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
11-
ms.date: 2/13/2018
11+
ms.date: 7/13/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -25,7 +25,7 @@ In this quickstart, you use an Azure AD B2C enabled sample single-page app to si
2525

2626
* [Visual Studio 2017](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
2727
* Install [Node.js](https://nodejs.org/en/download/)
28-
* A social account from either Facebook, Google, Microsoft, or Twitter.
28+
* A Facebook account.
2929

3030
## Download the sample
3131

@@ -59,21 +59,17 @@ Browse to the app's URL `http://localhost:6420` in a web browser.
5959

6060
Click the **Login** button to start the Azure AD B2C **Sign Up or Sign In** workflow based on an Azure AD B2C policy.
6161

62-
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
62+
The sample is intended to support several sign-up options including creating a local account using an email address. For this quickstart, use a Facebook account.
6363

6464
### Sign up using a social identity provider
6565

6666
Azure AD B2C presents a custom login page for a fictitious brand called Wingtip Toys for the sample web app.
6767

68-
1. To sign up using a social identity provider, click the button of the identity provider you want to use.
69-
70-
![Sign In or Sign Up provider](media/active-directory-b2c-quickstarts-spa/sign-in-or-sign-up-spa.png)
68+
1. To sign up using a social identity provider, click the button of the Facebook identity provider.
7169

7270
You authenticate (sign-in) using your social account credentials and authorize the application to read information from your social account. By granting access, the application can retrieve profile information from the social account such as your name and city.
7371

74-
2. Finish the sign-in process for the identity provider. For example, if you chose Twitter, enter your Twitter credentials and click **Sign in**.
75-
76-
![Authenticate and authorize using a social account](media/active-directory-b2c-quickstarts-spa/twitter-authenticate-authorize-spa.png)
72+
2. Finish the sign-in process for the identity provider by entering your credentials.
7773

7874
Your new account profile details are pre-populated with information from your social account.
7975

articles/active-directory-b2c/active-directory-b2c-reference-oauth-code.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ and other identity management tasks to your mobile and desktop apps. This articl
1919

2020
<!-- TODO: Need link to libraries -->
2121

22-
The OAuth 2.0 authorization code flow is described in [section 4.1 of the OAuth 2.0 specification](http://tools.ietf.org/html/rfc6749). You can use it for authentication and authorization in most app types, including [web apps](active-directory-b2c-apps.md#web-apps) and [natively installed apps](active-directory-b2c-apps.md#mobile-and-native-apps). You can use the OAuth 2.0 authorization code flow to securely acquire *access tokens* for your apps, which can be used to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md#the-basics).
22+
The OAuth 2.0 authorization code flow is described in [section 4.1 of the OAuth 2.0 specification](http://tools.ietf.org/html/rfc6749). You can use it for authentication and authorization in most [application types](active-directory-b2c-apps.md), including web applications and natively installed applications. You can use the OAuth 2.0 authorization code flow to securely acquire access tokens for your applicationss, which can be used to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md).
2323

24-
This article focuses on the **public clients** OAuth 2.0 authorization code flow. A public client is any client application that cannot be trusted to securely maintain the integrity of a secret password. This includes mobile apps, desktop apps, and essentially any application that runs on a device and needs to get access tokens.
24+
This article focuses on the **public clients** OAuth 2.0 authorization code flow. A public client is any client application that cannot be trusted to securely maintain the integrity of a secret password. This includes mobile apps, desktop applications, and essentially any application that runs on a device and needs to get access tokens.
2525

2626
> [!NOTE]
2727
> To add identity management to a web app by using Azure AD B2C, use [OpenID Connect](active-directory-b2c-reference-oidc.md) instead of OAuth 2.0.
2828
29-
Azure AD B2C extends the standard OAuth 2.0 flows to do more than simple authentication and authorization. It introduces the [policy parameter](active-directory-b2c-reference-policies.md). With built-in policies, you can use OAuth 2.0 to add user experiences to your app, such as sign-up, sign-in, and profile management. In this article, we show you how to use OAuth 2.0 and policies to implement each of these experiences in your native applications. We also show you how to get access tokens for accessing web APIs.
29+
Azure AD B2C extends the standard OAuth 2.0 flows to do more than simple authentication and authorization. It introduces the [policy parameter](active-directory-b2c-reference-policies.md). With built-in policies, you can use OAuth 2.0 to add user experiences to your application, such as sign-up, sign-in, and profile management. In this article, we show you how to use OAuth 2.0 and policies to implement each of these experiences in your native applications. We also show you how to get access tokens for accessing web APIs.
3030

3131
In the example HTTP requests in this article, we use our sample Azure AD B2C directory, **fabrikamb2c.onmicrosoft.com**. We also use our sample application and policies. You can try the requests yourself by using these values, or you can replace them with your own values.
3232
Learn how to [get your own Azure AD B2C directory, application, and policies](#use-your-own-azure-ad-b2c-directory).
@@ -186,7 +186,7 @@ POST fabrikamb2c.onmicrosoft.com/oauth2/v2.0/token?p=b2c_1_sign_in HTTP/1.1
186186
Host: https://login.microsoftonline.com
187187
Content-Type: application/x-www-form-urlencoded
188188
189-
grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access&refresh_token=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob
189+
grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&client_secret=JqQX2PNo9bpM0uEihUPzyrh&scope=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6 offline_access&refresh_token=AwABAAAAvPM1KaPlrEqdFSBzjqfTGBCmLdgfSTLEMPGYuNHSUYBrq...&redirect_uri=urn:ietf:wg:oauth:2.0:oob
190190
```
191191

192192
| Parameter | Required? | Description |

articles/active-directory-domain-services/active-directory-ds-getting-started-password-sync.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Here are the instructions you need to provide users, so they can change their pa
7474
A few minutes after you have changed your password, the new password is usable in Azure Active Directory Domain Services. After about 20 minutes, you can sign in to computers joined to the managed domain using the newly changed password.
7575

7676
## Related Content
77-
* [How to update your own password](../active-directory/active-directory-passwords-update-your-own-password.md)
77+
* [How to update your own password](../active-directory/user-help/active-directory-passwords-update-your-own-password.md)
7878
* [Getting started with Password Management in Azure AD](../active-directory/authentication/quickstart-sspr.md)
7979
* [Enable password hash synchronization to Azure Active Directory Domain Services for a synced Azure AD tenant](active-directory-ds-getting-started-password-sync-synced-tenant.md)
8080
* [Administer an Azure Active Directory Domain Services-managed domain](active-directory-ds-admin-guide-administer-domain.md)

articles/active-directory-domain-services/active-directory-ds-suspension.md

+61-26
Original file line numberDiff line numberDiff line change
@@ -14,56 +14,92 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 07/09/2018
17+
ms.date: 07/18/2018
1818
ms.author: ergreenl
1919

2020
---
2121
# Suspended domains
22-
When Azure AD Domain Services is unable to service a managed domain for a long period of time, the managed domain is put into a suspended state. This article will explain why managed domains are suspended, the length of suspension, and how to remediate a suspended domain.
22+
When Azure AD Domain Services is unable to service a managed domain for a long period of time, the managed domain is put into a suspended state. This article explains why managed domains are suspended, and how to remediate a suspended domain.
2323

2424

25-
## Overview of suspended domains
25+
## States your managed domain can be in
2626

2727
![Suspended domain timeline](media\active-directory-domain-services-suspension\suspension-timeline.PNG)
2828

29-
The preceding graphic outlines how a domain is suspended, how long it will be suspended, and ultimately, the deletion of a managed domain. The following sections detail the reasons why a domain can be suspended and how to unsuspend a managed domain.
29+
The preceding graphic outlines the possible states an Azure AD Domain Services managed domain can be in.
3030

31+
### 'Running' state
32+
A managed domain that is configured correctly and operating regularly is in the **Running** state.
3133

32-
## Why are managed domains suspended?
34+
**What you can expect:**
35+
* Microsoft can regularly monitor the health of your managed domain.
36+
* Domain controllers for your managed domain are patched and updated regularly.
37+
* Changes from Azure Active Directory are regularly synchronized to your managed domain.
38+
* Regular backups are taken for your managed domain.
3339

34-
Managed domains are suspended when they are in a state where Azure AD Domain Services is unable to manage the domain. This can be caused by a misconfiguration that blocks access to resources needed by Azure AD Domain Services, or an inactive Azure subscription. After 15 days of being unable to service a managed domain, Azure AD Domain Services will suspend the domain.
3540

36-
The exact reasons why your domain could be suspended are listed below:
37-
* Having one or more of the following alerts present on your domain for 15 consecutive days:
38-
* [AADDS104: Network Error](active-directory-ds-troubleshoot-nsg.md).
39-
* Your Azure subscription is expired or inactive
41+
### 'Needs Attention' state
42+
A managed domain is in the **Needs Attention** state, if one or more issues require an administrator to take action. The health page of your managed domain will list one or more alerts in this state. For example, if you've configured a restrictive NSG for your virtual network, Microsoft may be unable to update and monitor your managed domain. This invalid configuration results in an alert being generated and your managed domain is put in the 'Needs Attention' state.
4043

44+
Each alert has a set of resolution steps. Some alerts are transient and will get automatically resolved by the service. You can resolve some other alerts by following the instructions in the corresponding resolution steps for that alert. To resolve some critical alerts, you need to contact Microsoft support.
4145

42-
## What happens when a domain is suspended?
46+
For more information, see [how to troubleshoot alerts on a managed domain](active-directory-ds-troubleshoot-alerts.md).
4347

44-
When a domain is suspended, Azure AD Domain Services stops the virtual machines that service your managed domain. This means that backups are no longer taken, users are unable to sign-in to your domain, and synchronization with Azure AD is no longer performed.
48+
**What you can expect:**
4549

46-
The domain will only stay in a suspension state for a maximum of 15 days. In order to ensure a timely recovery, it is recommended you address the suspension as soon as possible.
50+
In some instances (for example, if you have an invalid network configuration), the domain controllers for your managed domain may be unreachable. Microsoft can't guarantee your managed domain is monitored, patched, updated, or backed-up on a regular basis in this state.
4751

48-
## How do I know if my domain is suspended?
49-
The managed domain will receive an [alert](active-directory-ds-troubleshoot-alerts.md) on the Azure AD Domain Services Health page in the Azure portal that declares the domain suspended. In addition, the state of the domain will be labelled "Suspended".
52+
* Your managed domain is in an unhealthy state and ongoing health monitoring may stop, until the alert is resolved.
53+
* Domain controllers for your managed domain may not be patched or updated.
54+
* Changes from Azure Active Directory may not be synchronized to your managed domain.
55+
* Backups for your managed domain may be taken, if possible.
56+
* If you resolve the alerts impacting your managed domain, it may be possible to restore your managed domain to the 'Running' state.
57+
* Critical alerts are triggered for configuration issues where Microsoft is unable to reach your domain controllers. If such alerts aren't resolved within 15 days, your managed domain will be put in the 'Suspended' state.
5058

5159

52-
## Unsuspending and restoring domains
60+
### 'Suspended' state
61+
A managed domain is put in the **Suspended** state for the following reasons:
62+
* One or more critical alerts haven't been resolved in 15 days. Critical alerts can be caused by a misconfiguration that blocks access to resources needed by Azure AD Domain Services.
63+
* For example, if the managed domain has alert [AADDS104: Network Error](active-directory-ds-troubleshoot-nsg.md) unresolved for over 15 days.
64+
* There's a billing issue with your Azure subscription or your Azure subscription has expired.
5365

54-
To unsuspend a domain, the following steps are needed:
66+
Managed domains are suspended when Microsoft is unable to manage, monitor, patch, or backup the domain on an ongoing basis.
5567

56-
1. Navigate to the [Azure AD Domain Services page](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.AAD%2FdomainServices) on the Azure portal
57-
2. Click on the domain you wish to unsuspend
58-
3. On the left-hand navigation, click **Health**
59-
4. Click on the suspension alert (The Alert ID will be either AADDS503 or AADDS504, depending on the cause of suspension).
60-
5. Click on the resolution link provided in the alert and follow the steps to resolving your suspension.
68+
**What you can expect:**
69+
* Domain controllers for your managed domain are de-provisioned and aren't reachable within the virtual network.
70+
* Secure LDAP access to the managed domain over the internet (if enabled) stops working.
71+
* You notice failures in authenticating to the managed domain, logging on to domain joined virtual machines, and connecting over LDAP/LDAPS.
72+
* Backups for your managed domain are no longer taken.
73+
* Synchronization with Azure AD stops.
74+
* Resolve the alert causing your managed domain to be in the 'Suspended' state and then contact support.
75+
* Support may restore your managed domain, only if a backup that is less than 30 days old exists.
76+
77+
The managed domain will only stay in a suspended state for 15 days. To recover your managed domain, Microsoft recommends you resolve critical alerts immediately.
78+
79+
80+
### 'Deleted' state
81+
A managed domain that stays in the 'Suspended' state for 15 days is **Deleted**.
82+
83+
**What you can expect:**
84+
* All resources and backups for the managed domain are deleted.
85+
* You can't restore the managed domain and need to create a new managed domain to use Azure AD Domain Services.
86+
* Once deleted, you aren't billed for the managed domain.
6187

62-
Your domain can only be restored from the date of last backup. The date of your last backup is displayed on the Health page of your managed domain. Any changes since the last backup will not be restored upon unsuspension. In addition, Azure AD Domain Services can only store backups for up to 30 days. If the latest backup is more than 30 days old, the backup must be deleted and Azure AD Domain Services will be unable to restore from a backup.
6388

64-
## Deleting domains
89+
## How do you know if your managed domain is suspended?
90+
You see an [alert](active-directory-ds-troubleshoot-alerts.md) on the Azure AD Domain Services Health page in the Azure portal that declares the domain suspended. The state of the domain also shows "Suspended".
6591

66-
If the domain is suspended for more than 15 days, Azure AD Domain Services deletes the managed domain due to inactivity and the inability to service the domain. You will no longer be billed for Azure AD Domain Services. To restore your managed domain, you will need to recreate it.
92+
93+
## Restore a suspended domain
94+
To restore a domain in the 'Suspended' state, complete the following steps:
95+
96+
1. Navigate to the [Azure AD Domain Services page](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.AAD%2FdomainServices) on the Azure portal
97+
2. Click on the managed domain.
98+
3. On the left-hand navigation, click **Health**.
99+
4. Click on the alert. The alert ID will be either AADDS503 or AADDS504, depending on the cause of suspension.
100+
5. Click on the resolution link provided in the alert and follow the steps to resolve the alert.
101+
102+
Your managed domain can only be restored to the date of last backup. The date of your last backup is displayed on the Health page of your managed domain. Any changes that occurred after the last backup won't be restored. Backups for a managed domain are stored for up to 30 days. Backups older than 30 days are deleted.
67103

68104

69105
## Next steps
@@ -72,5 +108,4 @@ If the domain is suspended for more than 15 days, Azure AD Domain Services delet
72108
- [Contact the product team](active-directory-ds-contact-us.md)
73109

74110
## Contact Us
75-
76111
Contact the Azure Active Directory Domain Services product team to [share feedback or for support](active-directory-ds-contact-us.md).

articles/active-directory/TOC.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,9 @@
143143
## Manage passwords
144144
### [Passwords overview](authentication/active-directory-passwords-overview.md)
145145
### User documents
146-
#### [Reset or change your password](active-directory-passwords-update-your-own-password.md)
146+
#### [Reset or change your password](user-help/active-directory-passwords-update-your-own-password.md)
147147
#### [Password best practices](active-directory-secure-passwords.md)
148-
#### [Register for self-service password reset](active-directory-passwords-reset-register.md)
148+
#### [Register for self-service password reset](user-help/active-directory-passwords-reset-register.md)
149149
### [SSPR How it works](authentication/concept-sspr-howitworks.md)
150150
### [SSPR Deployment guide](authentication/howto-sspr-deployment.md)
151151
### [SSPR and Windows 10](authentication/tutorial-sspr-windows.md)
@@ -174,8 +174,8 @@
174174
### [Plan Azure AD Join](active-directory-azureadjoin-deployment-aadjoindirect.md)
175175
### [FAQs](device-management-faq.md)
176176
### Tasks
177-
#### [Set up Azure AD registered Windows 10 devices](device-management-azuread-registered-devices-windows10-setup.md)
178-
#### [Set up Azure AD joined devices](device-management-azuread-joined-devices-setup.md)
177+
#### [Set up Azure AD registered Windows 10 devices](user-help/device-management-azuread-registered-devices-windows10-setup.md)
178+
#### [Set up Azure AD joined devices](user-help/device-management-azuread-joined-devices-setup.md)
179179
#### [Set up hybrid Azure AD joined devices](device-management-hybrid-azuread-joined-devices-setup.md)
180180
#### [Deploy on-premises](active-directory-device-registration-on-premises-setup.md)
181181
#### [Azure AD join during Windows 10 first-run experience](device-management-azuread-joined-devices-frx.md)

0 commit comments

Comments
 (0)