You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-nps-extension-vpn.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -242,9 +242,9 @@ In this section, you configure your VPN server to use RADIUS authentication. The
242
242
b. For the **Shared secret**, select **Change**, and then enter the shared secret password that you created and recorded earlier.
243
243
244
244
c. In the **Time-out (seconds)** box, enter a value of **30**.
245
-
The timeout value is necessary to allow enough time to complete the second authentication factor.
245
+
The timeout value is necessary to allow enough time to complete the second authentication factor. Some VPNs or regions require time-out settings greater than 30 seconds to prevent users from receiving multiple phone calls. If users do experience this issue, increase the **Time-out (seconds)** value in increments of 30 seconds until the issue doesn't reoccur.
246
246
247
-

247
+

Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/howto-conditional-access-policy-registration.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,6 +58,7 @@ Some may choose to use device state instead of location in step 6 above:
58
58
59
59
> [!WARNING]
60
60
> If you use device state as a condition in your policy this may impact guest users in the directory. [Report-only mode](concept-conditional-access-report-only.md) can help determine the impact of policy decisions.
61
+
> Note that report-only mode is not applicable for CA policies with "User Actions" scope.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-saml-claims-customization.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -164,9 +164,9 @@ To add a claim condition:
164
164
165
165
The order in which you add the conditions are important. Azure AD evaluates the conditions from top to bottom to decide which value to emit in the claim.
166
166
167
-
For example, Brita Simon is a guest user in the Contoso tenant. She belongs to another organization that also uses Azure AD. Given the below configuration for the Fabrikam application, when Brita tries to sign in to Fabrikam, Azure AD will evaluate the conditions as follow.
167
+
For example, Britta Simon is a guest user in the Contoso tenant. She belongs to another organization that also uses Azure AD. Given the below configuration for the Fabrikam application, when Britta tries to sign in to Fabrikam, Azure AD will evaluate the conditions as follow.
168
168
169
-
First, Azure AD verifies if Brita's user type is `All guests`. Since, this is true then Azure AD assigns the source for the claim to `user.extensionattribute1`. Second, Azure AD verifies if Brita's user type is `AAD guests`, since this is also true then Azure AD assigns the source for the claim to `user.mail`. Finally, the claim is emitted with value `user.email` for Brita.
169
+
First, Azure AD verifies if Britta's user type is `All guests`. Since, this is true then Azure AD assigns the source for the claim to `user.extensionattribute1`. Second, Azure AD verifies if Britta's user type is `AAD guests`, since this is also true then Azure AD assigns the source for the claim to `user.mail`. Finally, the claim is emitted with value `user.mail` for Britta.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/policystat-tutorial.md
+16-43Lines changed: 16 additions & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,10 +76,9 @@ To configure and test Azure AD single sign-on with PolicyStat, you need to compl
76
76
77
77
1.**[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
78
78
2.**[Configure PolicyStat Single Sign-On](#configure-policystat-single-sign-on)** - to configure the Single Sign-On settings on application side.
79
-
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
80
-
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
81
-
5.**[Create PolicyStat test user](#create-policystat-test-user)** - to have a counterpart of Britta Simon in PolicyStat that is linked to the Azure AD representation of user.
82
-
6.**[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
79
+
3.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
80
+
4.**[Create PolicyStat test user](#create-policystat-test-user)** - to have a counterpart of Britta Simon in PolicyStat that is linked to the Azure AD representation of user.
81
+
5.**[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
83
82
84
83
### Configure Azure AD single sign-on
85
84
@@ -162,59 +161,34 @@ To configure Azure AD single sign-on with PolicyStat, perform the following step
a. Open your downloaded metadata file, copy the content, and then paste it into the **Your Identity Provider Metadata** textbox.
188
169
189
170
b. Click **Save Changes**.
190
171
191
-
### Create an Azure AD test user
192
-
193
-
The objective of this section is to create a test user in the Azure portal called Britta Simon.
194
-
195
-
1. In the Azure portal, in the left pane, select **Azure Active Directory**, select **Users**, and then select **All users**.
196
-
197
-

198
-
199
-
2. Select **New user** at the top of the screen.
172
+
4. Click **Configure Attributes**, and then, in the **Configure Attributes** section, perform the following steps:
173
+
174
+
a. In the **Username Attribute** textbox, type **uid**.
200
175
201
-

176
+
b. In the **First Name Attribute** textbox, type your First Name Attribute claim name from Azure **http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname**.
202
177
203
-
3. In the User properties, perform the following steps.
178
+
c. In the **Last Name Attribute** textbox, type your Last Name Attribute claim name from Azure **http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname**.
204
179
205
-

180
+
d. In the **Email Attribute** textbox, type your Email Attribute claim name from Azure **http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress**.
5. In the **Users and groups** dialog select **Britta Simon** in the Users list, then click the **Select** button at the bottom of the screen.
209
+
5. In the **Users and groups** dialog select your account in the Users list, then click the **Select** button at the bottom of the screen.
236
210
237
211
6. If you are expecting any role value in the SAML assertion then in the **Select Role** dialog select the appropriate role for the user from the list, then click the **Select** button at the bottom of the screen.
238
212
@@ -258,4 +232,3 @@ When you click the PolicyStat tile in the Access Panel, you should be automatica
258
232
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
259
233
260
234
-[What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
Copy file name to clipboardExpand all lines: articles/aks/private-clusters.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,8 @@ As mentioned, VNet peering is one way to access your private cluster. To use VNe
98
98
* IP authorized ranges cannot be applied to the private api server endpoint, they only apply to the public API server
99
99
* Availability Zones are currently supported for certain regions, see the beginning of this document
100
100
*[Azure Private Link service limitations][private-link-service] apply to private clusters.
101
-
* No support for Azure DevOps integration out of the box with private clusters
101
+
* No support for virtual nodes in a private cluster to spin private Azure Container Instances (ACI) in a private Azure virtual network
102
+
* No support for Azure DevOps Microsoft-hosted Agents with private clusters. Consider to use [Self-hosted Agents][devops-agents].
102
103
* For customers that need to enable Azure Container Registry to work with private AKS, the Container Registry virtual network must be peered with the agent cluster virtual network.
103
104
* No current support for Azure Dev Spaces
104
105
* No support for converting existing AKS clusters into private clusters
@@ -116,4 +117,4 @@ As mentioned, VNet peering is one way to access your private cluster. To use VNe
| Azure (global) | January 13, 2020 | May 11, 2020 |
34
+
| Azure Government | March 13, 2020 | May 11, 2020 |
35
+
| Azure Germany | March 13, 2020 | May 11, 2020 |
36
+
| Azure China 21Vianet| March 13, 2020 | May 11, 2020 |
37
37
38
38
## Check whether your application is already compliant
39
39
@@ -52,7 +52,12 @@ Redis .NET clients use the earliest TLS version by default on .NET Framework 4.5
52
52
53
53
### .NET Core
54
54
55
-
Redis .NET Core clients use the latest TLS version by default.
55
+
Redis .NET Core clients default to the OS default TLS version which obviously depends on the OS itself.
56
+
57
+
Depending on when the OS was released and if any other patches changed the default TLS version, the OS TLS version could be quite varied. While there is no complete information about this, for Windows OS specifically you can find more information [here](https://docs.microsoft.com/dotnet/framework/network-programming/tls#support-for-tls-12).
58
+
59
+
However, if you are using a old OS or just wanted to be sure we recommend to configure the preferred TLS version manually through the client.
Copy file name to clipboardExpand all lines: articles/azure-monitor/learn/quick-collect-linux-computer.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,7 +111,7 @@ For example: `https://user01:[email protected]:30443`
111
111
112
112
Azure Monitor can collect events from the Linux Syslog and performance counters that you specify for longer term analysis and reporting. It can also take action when it detects a particular condition. Follow these steps to configure collection of events from the Linux Syslog, and several common performance counters to start with.
113
113
114
-
1. In the lower-left corner of the Azure portal, select **More services**. In the search box, enter **Log Analytics**. As you type, the list filters based on your input. Select **Log Analytics workspaces**.
114
+
1. In the Azure portal, select **All services**. In the list of resources, type Log Analytics. As you type, the list filters based on your input. Select **Log Analytics workspaces** and in your list of Log Analytics workspaces, select the workspace you are looking for and select **Advanced settings** of the **Log Analytics** workspace.
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-powershell-samples.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ The following table includes links to sample Azure PowerShell scripts for Azure
44
44
|[Configure auditing and threat-detection](scripts/sql-database-auditing-and-threat-detection-powershell.md?toc=%2fpowershell%2fmodule%2ftoc.json)| This PowerShell script configures auditing and threat detection policies for an Azure SQL database. |
45
45
|**Restore, copy, and import a database**||
46
46
|[Restore a database](scripts/sql-database-restore-database-powershell.md?toc=%2fpowershell%2fmodule%2ftoc.json)| This PowerShell script restores an Azure SQL database from a geo-redundant backup and restores a deleted Azure SQL database to the latest backup. |
47
-
|[Copy a database to new server](scripts/sql-database-copy-database-to-new-server-powershell.md?toc=%2fpowershell%2fmodule%2ftoc.json)| This PowerShell script creates a copy of an existing Azure SQL database in a new Azure SQL server. |
47
+
|[Copy a database to a new server](scripts/sql-database-copy-database-to-new-server-powershell.md?toc=%2fpowershell%2fmodule%2ftoc.json)| This PowerShell script creates a copy of an existing Azure SQL database in a new Azure SQL server. |
48
48
|[Import a database from a bacpac file](scripts/sql-database-import-from-bacpac-powershell.md?toc=%2fpowershell%2fmodule%2ftoc.json)| This PowerShell script imports a database to an Azure SQL server from a bacpac file. |
49
49
|**Sync data between databases**||
50
50
|[Sync data between SQL databases](scripts/sql-database-sync-data-between-sql-databases.md?toc=%2fpowershell%2fmodule%2ftoc.json)| This PowerShell script configures Data Sync to sync between multiple Azure SQL databases. |
Copy file name to clipboardExpand all lines: articles/virtual-machines/scripts/virtual-machines-powershell-sample-collect-vm-details.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.custom: mvc
19
19
20
20
# Collect details about all VMs in a subscription with PowerShell
21
21
22
-
This script creates a csv that contains the VM Name, Resource Group Name, Region, Virtual Network, Subnet, Private IP Address, OS Type, and Public IP Address of the VMs in the provided subscription.
22
+
This script creates a csv that contains the VM Name, Resource Group Name, Region, Vm Size, Virtual Network, Subnet, Private IP Address, OS Type, and Public IP Address of the VMs in the provided subscription.
23
23
24
24
If you don't have an [Azure subscription](https://docs.microsoft.com/azure/guides/developer/azure-developer-guide#understanding-accounts-subscriptions-and-billing), create a [free account](https://azure.microsoft.com/free) before you begin.
0 commit comments