Skip to content

Commit 016592b

Browse files
authored
Merge pull request #116227 from v-kents/Microsoft/azure-docs-migration
migrate PR from Microsoft repo
2 parents ac47234 + f784d22 commit 016592b

File tree

10 files changed

+42
-63
lines changed

10 files changed

+42
-63
lines changed

articles/active-directory/authentication/howto-mfa-nps-extension-vpn.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -242,9 +242,9 @@ In this section, you configure your VPN server to use RADIUS authentication. The
242242
b. For the **Shared secret**, select **Change**, and then enter the shared secret password that you created and recorded earlier.
243243

244244
c. In the **Time-out (seconds)** box, enter a value of **30**.
245-
The timeout value is necessary to allow enough time to complete the second authentication factor.
245+
The timeout value is necessary to allow enough time to complete the second authentication factor. Some VPNs or regions require time-out settings greater than 30 seconds to prevent users from receiving multiple phone calls. If users do experience this issue, increase the **Time-out (seconds)** value in increments of 30 seconds until the issue doesn't reoccur.
246246

247-
![Add RADIUS Server window configuring the Time-out](./media/howto-mfa-nps-extension-vpn/image16.png)
247+
![Add RADIUS Server window configuring the Time-out](./media/howto-mfa-nps-extension-vpn/image16.png)
248248

249249
8. Select **OK**.
250250

articles/active-directory/conditional-access/howto-conditional-access-policy-registration.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,7 @@ Some may choose to use device state instead of location in step 6 above:
5858

5959
> [!WARNING]
6060
> If you use device state as a condition in your policy this may impact guest users in the directory. [Report-only mode](concept-conditional-access-report-only.md) can help determine the impact of policy decisions.
61+
> Note that report-only mode is not applicable for CA policies with "User Actions" scope.
6162
6263
## Next steps
6364

articles/active-directory/develop/active-directory-saml-claims-customization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -164,9 +164,9 @@ To add a claim condition:
164164

165165
The order in which you add the conditions are important. Azure AD evaluates the conditions from top to bottom to decide which value to emit in the claim.
166166

167-
For example, Brita Simon is a guest user in the Contoso tenant. She belongs to another organization that also uses Azure AD. Given the below configuration for the Fabrikam application, when Brita tries to sign in to Fabrikam, Azure AD will evaluate the conditions as follow.
167+
For example, Britta Simon is a guest user in the Contoso tenant. She belongs to another organization that also uses Azure AD. Given the below configuration for the Fabrikam application, when Britta tries to sign in to Fabrikam, Azure AD will evaluate the conditions as follow.
168168

169-
First, Azure AD verifies if Brita's user type is `All guests`. Since, this is true then Azure AD assigns the source for the claim to `user.extensionattribute1`. Second, Azure AD verifies if Brita's user type is `AAD guests`, since this is also true then Azure AD assigns the source for the claim to `user.mail`. Finally, the claim is emitted with value `user.email` for Brita.
169+
First, Azure AD verifies if Britta's user type is `All guests`. Since, this is true then Azure AD assigns the source for the claim to `user.extensionattribute1`. Second, Azure AD verifies if Britta's user type is `AAD guests`, since this is also true then Azure AD assigns the source for the claim to `user.mail`. Finally, the claim is emitted with value `user.mail` for Britta.
170170

171171
![Claims conditional configuration](./media/active-directory-saml-claims-customization/sso-saml-user-conditional-claims.png)
172172

articles/active-directory/saas-apps/policystat-tutorial.md

Lines changed: 16 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -76,10 +76,9 @@ To configure and test Azure AD single sign-on with PolicyStat, you need to compl
7676

7777
1. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
7878
2. **[Configure PolicyStat Single Sign-On](#configure-policystat-single-sign-on)** - to configure the Single Sign-On settings on application side.
79-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
80-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
81-
5. **[Create PolicyStat test user](#create-policystat-test-user)** - to have a counterpart of Britta Simon in PolicyStat that is linked to the Azure AD representation of user.
82-
6. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
79+
3. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
80+
4. **[Create PolicyStat test user](#create-policystat-test-user)** - to have a counterpart of Britta Simon in PolicyStat that is linked to the Azure AD representation of user.
81+
5. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
8382

8483
### Configure Azure AD single sign-on
8584

@@ -162,59 +161,34 @@ To configure Azure AD single sign-on with PolicyStat, perform the following step
162161

163162
![Administrator Menu](./media/policystat-tutorial/ic808633.png "Administrator Menu")
164163

165-
3. In the **Setup** section, select **Enable Single Sign-on Integration**.
166-
167-
![Single Sign-On Configuration](./media/policystat-tutorial/ic808634.png "Single Sign-On Configuration")
168-
169-
4. Click **Configure Attributes**, and then, in the **Configure Attributes** section, perform the following steps:
170-
171-
![Single Sign-On Configuration](./media/policystat-tutorial/ic808635.png "Single Sign-On Configuration")
172-
173-
a. In the **Username Attribute** textbox, type **uid**.
174-
175-
b. In the **First Name Attribute** textbox, type **firstname** of user **Britta**.
176-
177-
c. In the **Last Name Attribute** textbox, type **lastname** of user **Simon**.
178-
179-
d. In the **Email Attribute** textbox, type **emailaddress** of user `[email protected]`.
180-
181-
e. Click **Save Changes**.
182-
183-
5. Click **Your IDP Metadata**, and then, in the **Your IDP Metadata** section, perform the following steps:
164+
3. Click **Your IDP Metadata**, and then, in the **Your IDP Metadata** section, perform the following steps:
184165

185166
![Single Sign-On Configuration](./media/policystat-tutorial/ic808636.png "Single Sign-On Configuration")
186167

187168
a. Open your downloaded metadata file, copy the content, and then paste it into the **Your Identity Provider Metadata** textbox.
188169

189170
b. Click **Save Changes**.
190171

191-
### Create an Azure AD test user
192-
193-
The objective of this section is to create a test user in the Azure portal called Britta Simon.
194-
195-
1. In the Azure portal, in the left pane, select **Azure Active Directory**, select **Users**, and then select **All users**.
196-
197-
![The "Users and groups" and "All users" links](common/users.png)
198-
199-
2. Select **New user** at the top of the screen.
172+
4. Click **Configure Attributes**, and then, in the **Configure Attributes** section, perform the following steps:
173+
174+
a. In the **Username Attribute** textbox, type **uid**.
200175

201-
![New user Button](common/new-user.png)
176+
b. In the **First Name Attribute** textbox, type your First Name Attribute claim name from Azure **http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname**.
202177

203-
3. In the User properties, perform the following steps.
178+
c. In the **Last Name Attribute** textbox, type your Last Name Attribute claim name from Azure **http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname**.
204179

205-
![The User dialog box](common/user-properties.png)
180+
d. In the **Email Attribute** textbox, type your Email Attribute claim name from Azure **http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress**.
206181

207-
a. In the **Name** field enter **BrittaSimon**.
208-
209-
b. In the **User name** field type [email protected]. For example, [email protected]
182+
e. Click **Save Changes**.
210183

211-
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
184+
5. In the **Setup** section, select **Enable Single Sign-on Integration**.
185+
186+
![Single Sign-On Configuration](./media/policystat-tutorial/ic808634.png "Single Sign-On Configuration")
212187

213-
d. Click **Create**.
214188

215189
### Assign the Azure AD test user
216190

217-
In this section, you enable Britta Simon to use Azure single sign-on by granting access to PolicyStat.
191+
In this section, you enable your own account to use Azure single sign-on by granting access to PolicyStat.
218192

219193
1. In the Azure portal, select **Enterprise Applications**, select **All applications**, then select **PolicyStat**.
220194

@@ -232,7 +206,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
232206

233207
![The Add Assignment pane](common/add-assign-user.png)
234208

235-
5. In the **Users and groups** dialog select **Britta Simon** in the Users list, then click the **Select** button at the bottom of the screen.
209+
5. In the **Users and groups** dialog select your account in the Users list, then click the **Select** button at the bottom of the screen.
236210

237211
6. If you are expecting any role value in the SAML assertion then in the **Select Role** dialog select the appropriate role for the user from the list, then click the **Select** button at the bottom of the screen.
238212

@@ -258,4 +232,3 @@ When you click the PolicyStat tile in the Access Panel, you should be automatica
258232
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
259233

260234
- [What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
261-

articles/aks/private-clusters.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,8 @@ As mentioned, VNet peering is one way to access your private cluster. To use VNe
9898
* IP authorized ranges cannot be applied to the private api server endpoint, they only apply to the public API server
9999
* Availability Zones are currently supported for certain regions, see the beginning of this document
100100
* [Azure Private Link service limitations][private-link-service] apply to private clusters.
101-
* No support for Azure DevOps integration out of the box with private clusters
101+
* No support for virtual nodes in a private cluster to spin private Azure Container Instances (ACI) in a private Azure virtual network
102+
* No support for Azure DevOps Microsoft-hosted Agents with private clusters. Consider to use [Self-hosted Agents][devops-agents].
102103
* For customers that need to enable Azure Container Registry to work with private AKS, the Container Registry virtual network must be peered with the agent cluster virtual network.
103104
* No current support for Azure Dev Spaces
104105
* No support for converting existing AKS clusters into private clusters
@@ -116,4 +117,4 @@ As mentioned, VNet peering is one way to access your private cluster. To use VNe
116117
[virtual-network-peering]: ../virtual-network/virtual-network-peering-overview.md
117118
[azure-bastion]: ../bastion/bastion-create-host-portal.md
118119
[express-route-or-vpn]: ../expressroute/expressroute-about-virtual-network-gateways.md
119-
120+
[devops-agents]: https://docs.microsoft.com/azure/devops/pipelines/agents/agents?view=azure-devops

articles/azure-cache-for-redis/cache-remove-tls-10-11.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,12 @@ This article provides general guidance about how to detect dependencies on these
2828

2929
The dates when these changes take effect are:
3030

31-
| Cloud | Phase 1 Start Date | Phase 2 Start Date |
32-
|---------------------|--------------------|-------------------------|
33-
| Azure (global) | January 13, 2020 | May 11, 2020 |
34-
| Azure Government | March 13, 2020 | May 11, 2020 |
35-
| Azure Germany | March 13, 2020 | May 11, 2020 |
36-
| Azure China | March 13, 2020 | May 11, 2020 |
31+
| Cloud | Phase 1 Start Date | Phase 2 Start Date |
32+
|----------------------|--------------------|-------------------------|
33+
| Azure (global) | January 13, 2020 | May 11, 2020 |
34+
| Azure Government | March 13, 2020 | May 11, 2020 |
35+
| Azure Germany | March 13, 2020 | May 11, 2020 |
36+
| Azure China 21Vianet | March 13, 2020 | May 11, 2020 |
3737

3838
## Check whether your application is already compliant
3939

@@ -52,7 +52,12 @@ Redis .NET clients use the earliest TLS version by default on .NET Framework 4.5
5252

5353
### .NET Core
5454

55-
Redis .NET Core clients use the latest TLS version by default.
55+
Redis .NET Core clients default to the OS default TLS version which obviously depends on the OS itself.
56+
57+
Depending on when the OS was released and if any other patches changed the default TLS version, the OS TLS version could be quite varied. While there is no complete information about this, for Windows OS specifically you can find more information [here](https://docs.microsoft.com/dotnet/framework/network-programming/tls#support-for-tls-12).
58+
59+
However, if you are using a old OS or just wanted to be sure we recommend to configure the preferred TLS version manually through the client.
60+
5661

5762
### Java
5863

articles/azure-monitor/learn/quick-collect-linux-computer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ For example: `https://user01:[email protected]:30443`
111111
112112
Azure Monitor can collect events from the Linux Syslog and performance counters that you specify for longer term analysis and reporting. It can also take action when it detects a particular condition. Follow these steps to configure collection of events from the Linux Syslog, and several common performance counters to start with.
113113
114-
1. In the lower-left corner of the Azure portal, select **More services**. In the search box, enter **Log Analytics**. As you type, the list filters based on your input. Select **Log Analytics workspaces**.
114+
1. In the Azure portal, select **All services**. In the list of resources, type Log Analytics. As you type, the list filters based on your input. Select **Log Analytics workspaces** and in your list of Log Analytics workspaces, select the workspace you are looking for and select **Advanced settings** of the **Log Analytics** workspace.
115115
116116
2. Select **Data**, and then select **Syslog**.
117117

articles/sql-database/sql-database-powershell-samples.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The following table includes links to sample Azure PowerShell scripts for Azure
4444
| [Configure auditing and threat-detection](scripts/sql-database-auditing-and-threat-detection-powershell.md?toc=%2fpowershell%2fmodule%2ftoc.json)| This PowerShell script configures auditing and threat detection policies for an Azure SQL database. |
4545
| **Restore, copy, and import a database**||
4646
| [Restore a database](scripts/sql-database-restore-database-powershell.md?toc=%2fpowershell%2fmodule%2ftoc.json)| This PowerShell script restores an Azure SQL database from a geo-redundant backup and restores a deleted Azure SQL database to the latest backup. |
47-
| [Copy a database to new server](scripts/sql-database-copy-database-to-new-server-powershell.md?toc=%2fpowershell%2fmodule%2ftoc.json)| This PowerShell script creates a copy of an existing Azure SQL database in a new Azure SQL server. |
47+
| [Copy a database to a new server](scripts/sql-database-copy-database-to-new-server-powershell.md?toc=%2fpowershell%2fmodule%2ftoc.json)| This PowerShell script creates a copy of an existing Azure SQL database in a new Azure SQL server. |
4848
| [Import a database from a bacpac file](scripts/sql-database-import-from-bacpac-powershell.md?toc=%2fpowershell%2fmodule%2ftoc.json)| This PowerShell script imports a database to an Azure SQL server from a bacpac file. |
4949
| **Sync data between databases**||
5050
| [Sync data between SQL databases](scripts/sql-database-sync-data-between-sql-databases.md?toc=%2fpowershell%2fmodule%2ftoc.json) | This PowerShell script configures Data Sync to sync between multiple Azure SQL databases. |

articles/virtual-machines/scripts/virtual-machines-powershell-sample-collect-vm-details.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom: mvc
1919

2020
# Collect details about all VMs in a subscription with PowerShell
2121

22-
This script creates a csv that contains the VM Name, Resource Group Name, Region, Virtual Network, Subnet, Private IP Address, OS Type, and Public IP Address of the VMs in the provided subscription.
22+
This script creates a csv that contains the VM Name, Resource Group Name, Region, Vm Size, Virtual Network, Subnet, Private IP Address, OS Type, and Public IP Address of the VMs in the provided subscription.
2323

2424
If you don't have an [Azure subscription](https://docs.microsoft.com/azure/guides/developer/azure-developer-guide#understanding-accounts-subscriptions-and-billing), create a [free account](https://azure.microsoft.com/free) before you begin.
2525

@@ -44,7 +44,7 @@ $vms = Get-AzVM
4444
$publicIps = Get-AzPublicIpAddress
4545
$nics = Get-AzNetworkInterface | ?{ $_.VirtualMachine -NE $null}
4646
foreach ($nic in $nics) {
47-
$info = "" | Select VmName, ResourceGroupName, Region, VirturalNetwork, Subnet, PrivateIpAddress, OsType, PublicIPAddress
47+
$info = "" | Select VmName, ResourceGroupName, Region, VmSize, VirturalNetwork, Subnet, PrivateIpAddress, OsType, PublicIPAddress
4848
$vm = $vms | ? -Property Id -eq $nic.VirtualMachine.id
4949
foreach($publicIp in $publicIps) {
5050
if($nic.IpConfigurations.id -eq $publicIp.ipconfiguration.Id) {
@@ -55,12 +55,13 @@ foreach ($nic in $nics) {
5555
$info.VMName = $vm.Name
5656
$info.ResourceGroupName = $vm.ResourceGroupName
5757
$info.Region = $vm.Location
58+
$info.VmSize = $vm.HardwareProfile.VmSize
5859
$info.VirturalNetwork = $nic.IpConfigurations.subnet.Id.Split("/")[-3]
5960
$info.Subnet = $nic.IpConfigurations.subnet.Id.Split("/")[-1]
6061
$info.PrivateIpAddress = $nic.IpConfigurations.PrivateIpAddress
6162
$report+=$info
6263
}
63-
$report | ft VmName, ResourceGroupName, Region, VirturalNetwork, Subnet, PrivateIpAddress, OsType, PublicIPAddress
64+
$report | ft VmName, ResourceGroupName, Region, VmSize, VirturalNetwork, Subnet, PrivateIpAddress, OsType, PublicIPAddress
6465
$report | Export-CSV "$home/$reportName"
6566
```
6667

articles/virtual-machines/windows/disk-encryption-faq.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,6 @@ The [Azure Disk Encryption overview](disk-encryption-overview.md) article lists
4444

4545
You can encrypt both boot and data volumes, but you can't encrypt the data without first encrypting the OS volume.
4646

47-
After you've encrypted the OS volume, disabling encryption on the OS volume isn't supported.
48-
4947
## Can I encrypt an unmounted volume with Azure Disk Encryption?
5048

5149
No, Azure Disk Encryption only encrypts mounted volumes.

0 commit comments

Comments
 (0)