Skip to content

Commit 0d18dfc

Browse files
Merge pull request #9792 from MicrosoftDocs/main
Auto Publish – main to live - 2025-09-29 18:00 UTC
2 parents 79db936 + cee4f16 commit 0d18dfc

File tree

4 files changed

+26
-3
lines changed

4 files changed

+26
-3
lines changed

support/azure/app-service/troubleshoot-domain-and-tls-ssl-certificates.md renamed to support/azure/app-service/connection-issues-with-ssl-or-tls/troubleshoot-domain-and-tls-ssl-certificates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -384,4 +384,4 @@ Also, if your CA gives you multiple certificates in the certificate chain, you h
384384
For an App Service certificate, you purchase through the Azure portal or by using a Powershell/CLI command. A certificate-signing request isn't needed. However, Azure Key Vault supports storing digital certificates issued by any CA. It supports creating a certificate-signing request with a private/public key pair. The certificate-signing request can be signed by any CA (an internal enterprise CA or an external public CA). For more information, see [Create a certificate-signing request](/azure/key-vault/certificates/create-certificate-signing-request).
385385

386386

387-
[!INCLUDE [Azure Help Support](../../includes/azure-help-support.md)]
387+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

support/azure/app-service/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
- name: Connection issues with SSL or TLS
44
items:
55
- name: Troubleshoot domain and TLS/SSL certificates
6-
href: troubleshoot-domain-and-tls-ssl-certificates.md
6+
href: ./connection-issues-with-ssl-or-tls/troubleshoot-domain-and-tls-ssl-certificates.md
77
- name: Use Azure App Service Certificate with Azure Front Door
88
href: ./connection-issues-with-ssl-or-tls/use-azure-app-service-certificate-with-azure-front-door.md
99
- name: Use Azure App Service Certificate with Application Gateway

support/azure/azure-storage/files/file-sync/file-sync-troubleshoot-managed-identities.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -221,3 +221,14 @@ Set-AzStorageSyncServerEndpointPermission -ResourceGroupName <string> -StorageSy
221221
This issue occurs when the **Allow Azure services on the trusted services list to access this storage account** exception isn't enabled on a storage account. To resolve this issue, enable this exception by following instructions in [Grant access to trusted Azure services and restrict access to the storage account public endpoint to specific virtual networks](/azure/storage/file-sync/file-sync-networking-endpoints#grant-access-to-trusted-azure-services-and-restrict-access-to-the-storage-account-public-endpoint-to-specific-virtual-networks).
222222

223223
[!INCLUDE [Azure Help Support](../../../../includes/azure-help-support.md)]
224+
225+
226+
## Unsupported cross-tenant configurations
227+
228+
Cross-tenant topologies where the server resource (Arc-enabled server or Azure VM) and the Storage Sync Service are in **different Microsoft Entra tenants** aren't supported. Managed identity and Azure RBAC require tokens issued by the same tenant; cross-tenant authorization fails in this scenario. Do not attempt cross-tenant setups.
229+
230+
**Mitigation:** Align the Storage Sync Service, server resource identity, storage account RBAC assignments, and managed identity to the **same tenant**, then retry.
231+
232+
> [!NOTE]
233+
> This requirement applies to **both** Arc-enabled servers and Azure VMs.
234+

support/windows-server/networking/disable-http-proxy-auth-features.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to disable HTTP proxy features
33
description: Describes how to disable specific features of Windows HTTP proxies.
4-
ms.date: 05/27/2025
4+
ms.date: 09/26/2025
55
manager: dcscontentpm
66
audience: itpro
77
ms.topic: troubleshooting
@@ -60,3 +60,15 @@ After you disable WPAD, you must manually configure all proxies. The registry ke
6060

6161
> [!IMPORTANT]
6262
> In addition to setting the registry key, WPAD should also be disabled in the Windows **Settings** UI, because third-party apps and Internet browsers may rely on these settings for Proxy Auto-Discovery.
63+
64+
## How to disable proxy sorting
65+
66+
In Windows Server and Windows client, when multiple proxies are configured, the system sorts them based on their response time. If you want to disable this feature, you can do so by setting a DWORD value for the following registry subkey to **1**:
67+
68+
```console
69+
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\WinHTTP\DisableProxySort
70+
```
71+
72+
After you disable proxy sorting, you'll need to restart the _WinHTTP Web Proxy Auto-Discovery Service_ (`WinHttpAutoProxySvc`) service for the change to take effect. Once restarted, the system uses the order in which the proxies were configured, without sorting them by response time.
73+
74+
If first proxy in list is unavailable, there will be a delay while the service determines that proxy is unreachable and moves to next proxy. To avoid this delay, ensure that all configured proxies are reachable or enable proxy sorting again.

0 commit comments

Comments
 (0)