Skip to content

Commit 012868a

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into ds-qsrt1720628
2 parents 7bef526 + 0f205a4 commit 012868a

File tree

24 files changed

+235
-73
lines changed

24 files changed

+235
-73
lines changed

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/20/2020
12+
ms.date: 05/18/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit
@@ -19,8 +19,6 @@ ms.custom: fasttrack-edit
1919

2020
In this article, you learn how to configure Azure Active Directory B2C (Azure AD B2C) to act as a Security Assertion Markup Language (SAML) identity provider (IdP) to your applications.
2121

22-
[!INCLUDE [active-directory-b2c-public-preview](../../includes/active-directory-b2c-public-preview.md)]
23-
2422
## Scenario overview
2523

2624
Organizations that use Azure AD B2C as their customer identity and access management solution might require interaction with identity providers or applications that are configured to authenticate using the SAML protocol.

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 04/28/2020
12+
ms.date: 05/19/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -65,7 +65,7 @@ Custom policy/Identity Experience Framework capabilities are under constant and
6565
| [OAuth2 implicit flow](implicit-flow-single-page-application.md) | | | X | |
6666
| [OAuth2 resource owner password credentials](ropc-custom.md) | | X | | |
6767
| [OIDC Connect](openid-connect.md) | | | X | |
68-
| [SAML2](connect-with-saml-service-providers.md) | |X | | POST and Redirect bindings. |
68+
| [SAML2](connect-with-saml-service-providers.md) | | |X | POST and Redirect bindings. |
6969
| OAuth1 | | | | Not supported. |
7070
| WSFED | X | | | |
7171

articles/active-directory/cloud-provisioning/how-to-install.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: daveba
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 02/26/2020
10+
ms.date: 05/19/2020
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -72,14 +72,7 @@ To verify the agent is being seen by Azure, follow these steps.
7272

7373
![On-premises provisioning agents screen](media/how-to-install/verify1.png)</br>
7474

75-
### Verify the port
76-
To verify that Azure is listening on port 443 and that your agent can communicate with it, follow these steps.
7775

78-
https://aadap-portcheck.connectorporttest.msappproxy.net/
79-
80-
This test verifies that your agents can communicate with Azure over port 443. Open a browser, and go to the previous URL from the server where the agent is installed.
81-
82-
![Verification of port reachability](media/how-to-install/verify2.png)
8376

8477
### On the local server
8578
To verify that the agent is running, follow these steps.

articles/active-directory/develop/publisher-verification-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 05/08/2020
11+
ms.date: 05/19/2020
1212
ms.author: ryanwi
1313
ms.custom: aaddev
1414
ms.reviewer: jesakowi
1515
---
1616

1717
# Publisher verification (preview)
1818

19-
Publisher verification (preview) helps admins and end users understand the authenticity of application developers integrating with the Microsoft identity platform. In other words, is the publisher a known source or a bad actor disguising themselves as a well-known publisher? When an application is marked as publisher verified, it means that the publisher has verified their identity using a [Microsoft Partner Network](https://partner.microsoft.com/membership) account that has completed the [verification](/partner-center/verification-responses) process and has associated this MPN account with their application registration.
19+
Publisher verification (preview) helps admins and end users understand the authenticity of application developers integrating with the Microsoft identity platform. When an application is marked as publisher verified, it means that the publisher has verified their identity using a [Microsoft Partner Network](https://partner.microsoft.com/membership) account that has completed the [verification](/partner-center/verification-responses) process and has associated this MPN account with their application registration.
2020

2121
A blue "verified" badge appears on the Azure AD consent prompt and other screens:
2222
![Consent prompt](./media/publisher-verification-overview/consent-prompt.png)

articles/active-directory/devices/hybrid-azuread-join-manual.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ If you have more than one verified domain name, you need to provide the followin
198198

199199
* `http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid`
200200

201-
If you're already issuing an ImmutableID claim (for example, alternate login ID), you need to provide one corresponding claim for computers:
201+
If you're already issuing an ImmutableID claim (for example, using `mS-DS-ConsistencyGuid` or another attribute as the source value for the ImmutableID), you need to provide one corresponding claim for computers:
202202

203203
* `http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID`
204204

@@ -327,7 +327,7 @@ To get a list of your verified company domains, you can use the [Get-MsolDomain]
327327

328328
![List of company domains](./media/hybrid-azuread-join-manual/01.png)
329329

330-
### Issue ImmutableID for the computer when one for users exists (for example, an alternate login ID is set)
330+
### Issue ImmutableID for the computer when one for users exists (for example, using mS-DS-ConsistencyGuid as the source for ImmutableID)
331331

332332
The `http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID` claim must contain a valid value for computers. In AD FS, you can create an issuance transform rule as follows:
333333

articles/backup/azure-file-share-support-matrix.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@ You can use the [Azure Backup service](https://docs.microsoft.com/azure/backup/b
1414
Backup for Azure file shares is available in the following GEOS:
1515

1616
**GA regions**:<br>
17-
Australia South East (ASE), Canada Central (CNC), West Central US (WCUS), West US 2 (WUS 2), India South (INS), North Central US (NCUS), Japan East (JPE), Brazil South (BRS), South East Asia (SEA),Switzerland West (SZW), UAE Central (UAC), Norway East (NWE),India West (INW), Australia Central (ACL), Korea Central (KRC), Japan West (JPW), South Africa North (SAN), UK West (UKW), Korea South (KRS), Germany North (GN), Norway West (NWW), South Africa West (SAW), Switzerland North (SZN), Germany West Central (GWC), UAE North(UAN), France Central (FRC), India Central (INC), Canada East (CNE), East Asia (EA), Australia East (AE), Central US (CUS), West US (WUS), US Gov Arizona (UGA), US Gov Texas (UGT), US Gov Virginia (UGV), US DoD Central (UDC), US DoD East (UDE)
17+
Australia South East (ASE), Canada Central (CNC), West Central US (WCUS), South Central US (SCUS), West US 2 (WUS 2), India South (INS), North Central US (NCUS), Japan East (JPE), Brazil South (BRS), South East Asia (SEA),Switzerland West (SZW), UAE Central (UAC), Norway East (NWE),India West (INW), Australia Central (ACL), Korea Central (KRC), Japan West (JPW), South Africa North (SAN), UK South (UKS), UK West (UKW), Korea South (KRS), North Europe (NE), Germany North (GN), Norway West (NWW), South Africa West (SAW), Switzerland North (SZN), Germany West Central (GWC), UAE North(UAN), France Central (FRC), India Central (INC), Canada East (CNE), East Asia (EA), Australia East (AE), Central US (CUS), West US (WUS), US Gov Arizona (UGA), US Gov Texas (UGT), US Gov Virginia (UGV), US DoD Central (UDC), US DoD East (UDE)
1818

1919
**Supported regions (as part of preview) but not yet GA**:<br>
20-
East US (EUS), East US 2 (EUS2), North Europe (NE), South Central US (SCUS), UK South (UKS), West Europe (WE)
20+
East US (EUS), East US 2 (EUS2), West Europe (WE)
2121

2222
## Supported storage accounts
2323

articles/backup/backup-azure-files-faq.md

Lines changed: 73 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,9 +75,80 @@ All snapshots taken by Azure Backup can be accessed by viewing snapshots in the
7575

7676
Refer to the [support matrix](azure-file-share-support-matrix.md) for details on maximum retention. Azure Backup does a real-time calculation of the number of snapshots when you enter the retention values while configuring backup policy. As soon as the number of snapshots corresponding to your defined retention values exceeds 200, the portal will show a warning requesting you to adjust your retention values. This is so you don’t exceed the limit of maximum number of snapshots supported by Azure Files for any file share at any point in time.
7777

78-
### What happens when I change the Backup policy for an Azure file share?
78+
### What is the impact on existing recovery points and snapshots when I modify the Backup policy for an Azure file share to switch from “Daily Policy" to "GFS Policy”?
7979

80-
When a new policy is applied on file share(s), schedule and retention of the new policy is followed. If retention is extended, existing recovery points are marked to keep them as per new policy. If retention is reduced, they're marked for pruning in the next cleanup job and deleted.
80+
When you modify a Daily backup policy to GFS policy (adding weekly/monthly/yearly retention), the behavior is as follows:
81+
82+
- **Retention**: If you're adding weekly/monthly/yearly retention as part of modifying the policy, all the future recovery points created as part of the scheduled backup will be tagged according to the new policy. All the existing recovery points will still be considered as daily recovery points and so won’t be tagged as weekly/monthly/yearly.
83+
84+
- **Snapshots and recovery points cleanup**:
85+
86+
- If daily retention is extended, the expiration date of the existing recovery points is updated according to the daily retention value configured in the new policy.
87+
- If daily retention is reduced, the existing recovery points and snapshots are marked for deletion in the next cleanup run job according to the daily retention value configured in the new policy, and then deleted.
88+
89+
Here's an example of how this works:
90+
91+
#### Existing Policy [P1]
92+
93+
|Retention Type |Schedule |Retention |
94+
|---------|---------|---------|
95+
|Daily | Every day at 8 PM | 100 days |
96+
97+
#### New Policy [Modified P1]
98+
99+
| Retention Type | Schedule | Retention |
100+
| -------------- | ------------------------------ | --------- |
101+
| Daily | Every day at 9 PM | 50 days |
102+
| Weekly | On Sunday at 9 PM | 3 weeks |
103+
| Monthly | On Last Monday at 9 PM | 1 month |
104+
| Yearly | In Jan on Third Sunday at 9 PM | 4 years |
105+
106+
#### Impact
107+
108+
1. The expiration date of existing recovery points will be adjusted according to the daily retention value of the new policy: that is, 50 days. So any recovery point that’s older than 50 days will be marked for deletion.
109+
110+
2. The existing recovery points won’t be tagged as weekly/monthly/yearly based on new policy.
111+
112+
3. All the future backups will be triggered according to the new schedule: that is, at 9 PM.
113+
114+
4. The expiration date of all future recovery points will be aligned with the new policy.
115+
116+
>[!NOTE]
117+
>The policy changes will affect only the recovery points created as part of the scheduled backup job run. For on-demand backups, retention is determined by the **Retain Till** value specified at the time of taking backup.
118+
119+
### What is the impact on existing recovery points when I modify an existing GFS Policy?
120+
121+
When a new policy is applied on file shares, all the future scheduled backups will be taken according to the schedule configured in the modified policy. The retention of all existing recovery points is aligned according to the new retention values configured. So if the retention is extended, existing recovery points are marked to be retained according to the new policy. If the retention is reduced, they're marked for clean-up in the next cleanup job and then deleted.
122+
123+
Here's an example of how this works:
124+
125+
#### Existing Policy [P2]
126+
127+
| Retention Type | Schedule | Retention |
128+
| -------------- | ------------------ | --------- |
129+
| Daily | Every day at 8 PM | 50 days |
130+
| Weekly | On Monday at 8 PM | 3 weeks |
131+
132+
#### New Policy [Modified P2]
133+
134+
| Retention Type | Schedule | Retention |
135+
| -------------- | ---------------------- | --------- |
136+
| Daily | Every day at 9 PM | 10 days |
137+
| Weekly | On Monday at 9 PM | 2 weeks |
138+
| Monthly | On Last Monday at 9 PM | 2 months |
139+
140+
#### Impact of change
141+
142+
1. The expiration date of existing daily recovery points will be aligned according to the new daily retention value, that is 10 days. So any daily recovery point older than 10 days will be deleted.
143+
144+
2. The expiration date of existing weekly recovery points will be aligned according to the new weekly retention value, that is two weeks. So any weekly recovery point older than two weeks will be deleted.
145+
146+
3. The monthly recovery points will only be created as part of future backups based on the new policy configuration.
147+
148+
4. The expiration date of all future recovery points will be aligned with the new policy.
149+
150+
>[!NOTE]
151+
>The policy changes will affect only the recovery points created as part of the scheduled backup. For on-demand backups, retention is determined by the **Retain Till** value specified at the time of taking the backup.
81152
82153
## Next steps
83154

articles/batch/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,9 @@
1515
href: quick-run-dotnet.md
1616
- name: Run a Batch job - Python
1717
href: quick-run-python.md
18+
- name: Create a Batch account - ARM template
19+
href: quick-create-template.md
20+
displayName: Resource Manager
1821
- name: Tutorials
1922
items:
2023
- name: Parallel file processing - .NET
390 KB
Loading
Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
---
2+
title: Azure Quickstart - Create a Batch account - Azure Resource Manager template
3+
description: Quickly learn to run a Batch job with the Azure CLI. Create and manage Azure resources from the command line or in scripts.
4+
ms.topic: quickstart
5+
ms.date: 05/19/2020
6+
ms.custom: subject-armqs
7+
---
8+
9+
# Quickstart: Create a Batch account by using Azure Resource Manager template
10+
11+
You need a Batch account to create compute resources (pools of compute nodes) and Batch jobs. You can link an Azure Storage account with your Batch account, which is useful to deploy applications and store input and output data for most real-world workloads.
12+
13+
This quickstart shows how to use an Azure Resource Manager template to create a Batch account, including storage. After completing this quickstart, you will understand the key concepts of the Batch service and be ready to try Batch with more realistic workloads at larger scale.
14+
15+
[!INCLUDE [About Azure Resource Manager](../../includes/resource-manager-quickstart-introduction.md)]
16+
17+
## Prerequisites
18+
19+
You must have an active Azure subscription.
20+
21+
- [!INCLUDE [quickstarts-free-trial-note](../../includes/quickstarts-free-trial-note.md)]
22+
23+
## Create a storage account
24+
25+
### Review the template
26+
27+
The template used in this quickstart is from [Azure Quickstart templates](https://github.com/Azure/azure-quickstart-templates/tree/master/101-batchaccount-with-storage).
28+
29+
:::code language="json" source="~/quickstart-templates/101-batchaccount-with-storage/azuredeploy.json":::
30+
31+
Two Azure resources are defined in the template:
32+
33+
- [Microsoft.Storage/storageAccounts](https://docs.microsoft.com/azure/templates/microsoft.storage/storageaccounts): Creates a storage account.
34+
- [Microsoft.Batch/batchAccounts](https://docs.microsoft.com/azure/templates/microsoft.batch/batchaccounts): Creates a Batch account.
35+
36+
### Deploy the template
37+
38+
1. Select the following image to sign in to Azure and open a template. The template creates an Azure Batch account and a storage account.
39+
40+
[![Deploy to Azure](../media/template-deployments/deploy-to-azure.svg)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2F101-batchaccount-with-storage%2Fazuredeploy.json)
41+
42+
1. Select or enter the following values.
43+
44+
![Resource Manager template, Batch account creation, deploy portal](media/quick-create-template/batch-template.png)
45+
46+
- **Subscription**: select an Azure subscription.
47+
- **Resource group**: select **Create new**, enter a unique name for the resource group, and then click **OK**.
48+
- **Location**: select a location. For example, **Central US**.
49+
- **Batch Account Name**: Leave the default value.
50+
- **Storage Accountsku**: select a storage account type. For example, **Standard_LRS**.
51+
- **Location**: Leave the default so that the resources will be in the same location as your resource group.
52+
- I agree to the terms and conditions state above: **Select**.
53+
54+
1. Select **Purchase**.
55+
56+
After a few minutes, you should see a notification that the Batch account was successfully created.
57+
58+
In this example, the Azure portal is used to deploy the template. In addition to the Azure portal, you can also use the Azure PowerShell, Azure CLI, and REST API. To learn other deployment methods, see [Deploy templates](../azure-resource-manager/templates/deploy-powershell.md).
59+
60+
## Validate the deployment
61+
62+
You can validate the deployment in the Azure portal by navigating to the resource group you created. In the **Overview** screen, confirm that the Batch account and the storage account are present.
63+
64+
## Clean up resources
65+
66+
If you plan to continue on to work with subsequent [tutorials](./tutorial-parallel-dotnet.md), you may wish to leave these resources in place. Or, if you no longer need them, you can [delete the resource group](../azure-resource-manager/management/delete-resource-group.md?tabs=azure-portal#delete-resource-group), which will also delete the Batch account and the storage account that you created.
67+
68+
## Next steps
69+
70+
In this quickstart, you created a Batch account and a storage account. To learn more about Azure Batch, continue to the Azure Batch tutorials.
71+
72+
> [!div class="nextstepaction"]
73+
> [Azure Batch tutorials](./tutorial-parallel-dotnet.md)

0 commit comments

Comments
 (0)