Skip to content

Commit 04293a4

Browse files
authored
Merge pull request #295106 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 3d01584 + 5531470 commit 04293a4

File tree

8 files changed

+25
-25
lines changed

8 files changed

+25
-25
lines changed

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -496,18 +496,18 @@ The following IDs are used for a [time-based one-time password (TOTP) display co
496496
</LocalizedResources>
497497
```
498498

499-
## Restful service error messages
499+
## RESTful service error messages
500500

501-
The following IDs are used for [Restful service technical profile](restful-technical-profile.md) error messages:
501+
The following IDs are used for [RESTful service technical profile](restful-technical-profile.md) error messages:
502502

503503
| ID | Default value |
504504
| --- | ------------- |
505-
| `DefaultUserMessageIfRequestFailed` | Failed to establish connection to restful service end point. Restful service URL: {0} |
506-
| `UserMessageIfCircuitOpen` | {0} Restful Service URL: {1} |
507-
| `UserMessageIfDnsResolutionFailed` | Failed to resolve the hostname of the restful service endpoint. Restful service URL: {0} |
508-
| `UserMessageIfRequestTimeout` | Failed to establish connection to restful service end point within timeout limit {0} seconds. Restful service URL: {1} |
505+
| `DefaultUserMessageIfRequestFailed` | Failed to establish connection to restful service end point. RESTful service URL: {0} |
506+
| `UserMessageIfCircuitOpen` | {0} RESTful Service URL: {1} |
507+
| `UserMessageIfDnsResolutionFailed` | Failed to resolve the hostname of the restful service endpoint. RESTful service URL: {0} |
508+
| `UserMessageIfRequestTimeout` | Failed to establish connection to restful service end point within timeout limit {0} seconds. RESTful service URL: {1} |
509509

510-
### Restful service example
510+
### RESTful service example
511511

512512
```xml
513513
<LocalizedResources Id="api.localaccountsignup.en">

articles/iot-operations/connect-to-cloud/concept-dataflow-enrich.md

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -19,19 +19,11 @@ You can enrich data by using the *contextualization datasets* function. When inc
1919

2020
To load sample data into the state store, use the [state store CLI](https://github.com/Azure-Samples/explore-iot-operations/tree/main/tools/statestore-cli).
2121

22-
For example, consider the following dataset with a few records, represented as JSON records:
22+
For example, consider the following dataset with a few records, using the [JSON lines format](https://jsonlines.org/):
2323

2424
```json
25-
{
26-
"Position": "Analyst",
27-
"BaseSalary": 70000,
28-
"WorkingHours": "Regular"
29-
},
30-
{
31-
"Position": "Receptionist",
32-
"BaseSalary": 43000,
33-
"WorkingHours": "Regular"
34-
}
25+
{ "Position": "Analyst", "BaseSalary": 70000, "WorkingHours": "Regular" }
26+
{ "Position": "Receptionist", "BaseSalary": 43000, "WorkingHours": "Regular" }
3527
```
3628

3729
The mapper accesses the reference dataset stored in the Azure IoT Operations [state store](../create-edge-apps/concept-about-state-store-protocol.md) by using a key value based on a *condition* specified in the mapping configuration. Key names in the state store correspond to a dataset in the data flow configuration.

articles/reliability/availability-zones-service-support.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,7 @@ In the Product Catalog, always-available services are listed as "non-regional" s
4646
| --- | --- |
4747
| [Azure AI Search](/azure/search/search-reliability#availability-zones) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
4848
| Azure Bot Services | ![An icon that signifies this service is always available.](media/icon-always-available.svg) |
49+
| Azure Document Intelligence Service | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
4950

5051
### Analytics
5152

articles/sap/automation/configure-sap-parameters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ The following tables contain the parameters stored in the *sap-parameters.yaml*
130130
> | Parameter | Description | Type |
131131
> | ---------------------------- | ---------------------------------------------------------------------------------------------------------------- | ---------- |
132132
> | `domain_name` | Defines the Windows domain name, for example, sap.contoso.net | Required |
133-
> | `domain` | Defines the Windows domain Netbios name, for example, sap | Optional |
133+
> | `domain` | Defines the Windows domain NetBIOS name, for example, sap | Optional |
134134
> | SQL | | |
135135
> | `use_sql_for_SAP` | Uses the SAP-defined SQL Server media, defaults to `true` | Optional |
136136
> | `win_cluster_share_type` | Defines the cluster type (CSD/FS), defaults to CSD | Optional |

articles/sap/workloads/high-availability-guide-suse-pacemaker.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -792,7 +792,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
792792

793793
11. **[A]** Install the Azure Python SDK and Azure Identity Python module.
794794

795-
For **SLES 12 SP5**, if your `fence-agents` version is lower then `4.9.0+git.1624456340.8d746be9-3.41.3`, and for **SLES 15 SP3 and below**, you need to install below additional packages.
795+
For **SLES 12 SP5**, if your `fence-agents` version is lower than `4.9.0+git.1624456340.8d746be9-3.41.3`, and for **SLES 15 SP3 and below**, you need to install below additional packages.
796796

797797
```bash
798798
# You might need to activate the public cloud extension first

articles/security/develop/threat-modeling-tool-input-validation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -319,7 +319,7 @@ For the last point regarding file format signature validation, refer to the clas
319319
| **Applicable Technologies** | Generic |
320320
| **Attributes** | N/A |
321321
| **References** | N/A |
322-
| **Steps** | <p>If you use the Parameters collection, SQL treats the input is as a literal value rather then as executable code. The Parameters collection can be used to enforce type and length constraints on input data. Values outside of the range trigger an exception. If type-safe SQL parameters are not used, attackers might be able to execute injection attacks that are embedded in the unfiltered input.</p><p>Use type safe parameters when constructing SQL queries to avoid possible SQL injection attacks that can occur with unfiltered input. You can use type safe parameters with stored procedures and with dynamic SQL statements. Parameters are treated as literal values by the database and not as executable code. Parameters are also checked for type and length.</p>|
322+
| **Steps** | <p>If you use the Parameters collection, SQL treats the input is as a literal value rather than as executable code. The Parameters collection can be used to enforce type and length constraints on input data. Values outside of the range trigger an exception. If type-safe SQL parameters are not used, attackers might be able to execute injection attacks that are embedded in the unfiltered input.</p><p>Use type safe parameters when constructing SQL queries to avoid possible SQL injection attacks that can occur with unfiltered input. You can use type safe parameters with stored procedures and with dynamic SQL statements. Parameters are treated as literal values by the database and not as executable code. Parameters are also checked for type and length.</p>|
323323

324324
### Example
325325
The following code shows how to use type safe parameters with the SqlParameterCollection when calling a stored procedure.
@@ -622,7 +622,7 @@ namespace MyApi.Controllers
622622
| **Applicable Technologies** | Generic |
623623
| **Attributes** | N/A |
624624
| **References** | N/A |
625-
| **Steps** | <p>If you use the Parameters collection, SQL treats the input is as a literal value rather then as executable code. The Parameters collection can be used to enforce type and length constraints on input data. Values outside of the range trigger an exception. If type-safe SQL parameters are not used, attackers might be able to execute injection attacks that are embedded in the unfiltered input.</p><p>Use type safe parameters when constructing SQL queries to avoid possible SQL injection attacks that can occur with unfiltered input. You can use type safe parameters with stored procedures and with dynamic SQL statements. Parameters are treated as literal values by the database and not as executable code. Parameters are also checked for type and length.</p>|
625+
| **Steps** | <p>If you use the Parameters collection, SQL treats the input is as a literal value rather than as executable code. The Parameters collection can be used to enforce type and length constraints on input data. Values outside of the range trigger an exception. If type-safe SQL parameters are not used, attackers might be able to execute injection attacks that are embedded in the unfiltered input.</p><p>Use type safe parameters when constructing SQL queries to avoid possible SQL injection attacks that can occur with unfiltered input. You can use type safe parameters with stored procedures and with dynamic SQL statements. Parameters are treated as literal values by the database and not as executable code. Parameters are also checked for type and length.</p>|
626626

627627
### Example
628628
The following code shows how to use type safe parameters with the SqlParameterCollection when calling a stored procedure.

articles/site-recovery/vmware-azure-mobility-install-configuration-mgr.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -239,6 +239,13 @@ elif [ -f /etc/redhat-release ]; then
239239
echo $OS >> /tmp/MobSvc/sccm.log
240240
cp *RHEL7*.tar.gz /tmp/MobSvc
241241
fi
242+
elif grep -q 'Red Hat Enterprise Linux release 8.* (Ootpa)' /etc/redhat-release || \
243+
grep -q 'CentOS Linux release 8.* (Core)' /etc/redhat-release; then
244+
if uname -a | grep -q x86_64; then
245+
OS="RHEL8-64"
246+
echo $OS >> /tmp/MobSvc/sccm.log
247+
cp *RHEL8*.tar.gz /tmp/MobSvc
248+
fi
242249
fi
243250
elif [ -f /etc/SuSE-release ] && grep -q 'VERSION = 11' /etc/SuSE-release; then
244251
if grep -q "SUSE Linux Enterprise Server 11" /etc/SuSE-release && grep -q 'PATCHLEVEL = 3' /etc/SuSE-release; then
@@ -273,7 +280,7 @@ fi
273280
Install()
274281
{
275282
echo "Perform Installation." >> /tmp/MobSvc/sccm.log
276-
./install -q -d ${INSTALL_DIR} -r Agent -v VmWare
283+
./install -q -d ${INSTALL_DIR} -r MS -v VmWare -c CSLegacy -a Install
277284
RET_VAL=$?
278285
echo "Installation Returncode: $RET_VAL" >> /tmp/MobSvc/sccm.log
279286
if [ $RET_VAL -eq 0 ]; then
@@ -302,7 +309,7 @@ Configure()
302309
Upgrade()
303310
{
304311
echo "Perform Upgrade." >> /tmp/MobSvc/sccm.log
305-
./install -q -v VmWare
312+
./install -q -v VmWare -r MS -v VmWare -c CSLegacy -a Upgrade
306313
RET_VAL=$?
307314
echo "Upgrade Returncode: $RET_VAL" >> /tmp/MobSvc/sccm.log
308315
if [ $RET_VAL -eq 0 ]; then

articles/synapse-analytics/sql/overview-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Synapse SQL pools enable you to use built-in security features to secure your da
9494
| **Permissions - [Database-level](/sql/relational-databases/security/authentication-access/database-level-roles?view=azure-sqldw-latest&preserve-view=true)** | Yes | Yes, you can grant, deny, or revoke permissions on the database objects. |
9595
| **Permissions - Schema-level** | Yes, including ability to GRANT, DENY, and REVOKE permissions to users/logins on the schema | Yes, you can specify schema-level permissions including ability to GRANT, DENY, and REVOKE permissions to users/logins on the schema. |
9696
| **Permissions - Object-level** | Yes, including ability to GRANT, DENY, and REVOKE permissions to users | Yes, you can GRANT, DENY, and REVOKE permissions to users/logins on the system objects that are supported. |
97-
| **Permissions - [Column-level security](../sql-data-warehouse/column-level-security.md?toc=%2fazure%2fsynapse-analytics%2ftoc.json)** | Yes | Column-level security is supported in serverless SQL pools for views and not for external tables. In case of external tables one can create a logical view on top of the external table and than apply Column-level security.
97+
| **Permissions - [Column-level security](../sql-data-warehouse/column-level-security.md?toc=%2fazure%2fsynapse-analytics%2ftoc.json)** | Yes | Column-level security is supported in serverless SQL pools for views and not for external tables. In case of external tables one can create a logical view on top of the external table and then apply Column-level security.
9898
| **Row-level security** | [Yes](/sql/relational-databases/security/row-level-security?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json&view=azure-sqldw-latest&preserve-view=true) | No, there is no built-in support for the row-level security. Use custom views as a [workaround](https://techcommunity.microsoft.com/t5/azure-synapse-analytics-blog/how-to-implement-row-level-security-in-serverless-sql-pools/ba-p/2354759). |
9999
| **Data masking** | [Yes](../guidance/security-white-paper-access-control.md#dynamic-data-masking) | No, built-in data masking is not supported in the serverless SQL pools. Use wrapper SQL views that explicitly mask some columns as a workaround. |
100100
| **Built-in/system security &amp; identity functions** | Some Transact-SQL security functions and operators: `CURRENT_USER`, `HAS_DBACCESS`, `IS_MEMBER`, `IS_ROLEMEMBER`, `SESSION_USER`, `SUSER_NAME`, `SUSER_SNAME`, `SYSTEM_USER`, `USER`, `USER_NAME`, `EXECUTE AS`, `OPEN/CLOSE MASTER KEY` | Some Transact-SQL security functions and operators are supported: `CURRENT_USER`, `HAS_DBACCESS`, `HAS_PERMS_BY_NAME`, `IS_MEMBER`, `IS_ROLEMEMBER`, `IS_SRVROLEMEMBER`, `SESSION_USER`, `SESSION_CONTEXT`, `SUSER_NAME`, `SUSER_SNAME`, `SYSTEM_USER`, `USER`, `USER_NAME`, `EXECUTE AS`, and `REVERT`. Security functions cannot be used to query external data (store the result in variable that can be used in the query). |

0 commit comments

Comments
 (0)