You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/devices/troubleshoot-device-dsregcmd.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,7 +131,7 @@ This section lists the status of various attributes for the user currently logge
131
131
-**CanReset:** - Denotes if the Windows Hello key can be reset by the user.
132
132
-**Possible values:** - DestructiveOnly, NonDestructiveOnly, DestructiveAndNonDestructive, or Unknown if error.
133
133
-**WorkplaceJoined:** - Set to “YES” if Azure AD registered accounts have been added to the device in the current NTUSER context.
134
-
-**WamDefaultSet:** - Set to “YES” if a WAM default WebAccount is created for the logged in user. This field could display an error if dsreg /status is run in admin context.
134
+
-**WamDefaultSet:** - Set to “YES” if a WAM default WebAccount is created for the logged in user. This field could display an error if dsreg /status is run from an elevated command prompt.
135
135
-**WamDefaultAuthority:** - Set to “organizations” for Azure AD.
136
136
-**WamDefaultId:** - Always “https://login.microsoft.com” for Azure AD.
137
137
-**WamDefaultGUID:** - The WAM provider’s (Azure AD/Microsoft account) GUID for the default WAM WebAccount.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ This page is updated monthly, so revisit it regularly. If you're looking for ite
45
45
46
46
We're planning to replace the current custom controls preview with an approach that allows partner-provided authentication capabilities to work seamlessly with the Azure Active Directory administrator and end user experiences. Today, partner MFA solutions face the following limitations: they work only after a password has been entered; they don't serve as MFA for step-up authentication in other key scenarios; and they don't integrate with end user or administrative credential management functions. The new implementation will allow partner-provided authentication factors to work alongside built-in factors for key scenarios, including registration, usage, MFA claims, step up authentication, reporting, and logging.
47
47
48
-
Custom controls will continue to be supported in preview alongside the new design until it reaches general availability. At that point, we'll give customers time to migrate to the new design. Because of the limitations of the current approach, we won't onboard new providers until the new design is available. We are working closely with customers and providers and will communicate the timeline as we get closer. [Learn more](https://docs.microsoft.com/azure/active-directory/conditional-access/controls).
48
+
Custom controls will continue to be supported in preview alongside the new design until it reaches general availability. At that point, we'll give customers time to migrate to the new design. Because of the limitations of the current approach, we won't onboard new providers until the new design is available. We are working closely with customers and providers and will communicate the timeline as we get closer. [Learn more](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/upcoming-changes-to-custom-controls/ba-p/1144696#).
Copy file name to clipboardExpand all lines: articles/automation/source-control-integration.md
+25-18Lines changed: 25 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
10
10
11
11
Source control integration in Azure Automation supports single-direction synchronization from your source control repository. Source control allows you to keep your runbooks in your Automation account up to date with scripts in your GitHub or Azure Repos source control repository. This feature makes it easy to promote code that has been tested in your development environment to your production Automation account.
12
12
13
-
Using source control integration, you can easily collaborate with your team, track changes, and roll back to earlier versions of your runbooks. For example, source control allows you to synchronize different branches in source control with your development, test, and production Automation accounts.
13
+
Source control integration lets you easily collaborate with your team, track changes, and roll back to earlier versions of your runbooks. For example, source control allows you to synchronize different branches in source control with your development, test, and production Automation accounts.
14
14
15
15
>[!NOTE]
16
16
>This article has been updated to use the new Azure PowerShell Az module. You can still use the AzureRM module, which will continue to receive bug fixes until at least December 2020. To learn more about the new Az module and AzureRM compatibility, see [Introducing the new Azure PowerShell Az module](https://docs.microsoft.com/powershell/azure/new-azureps-module-az?view=azps-3.5.0). For Az module installation instructions on your Hybrid Runbook Worker, see [Install the Azure PowerShell Module](https://docs.microsoft.com/powershell/azure/install-az-ps?view=azps-3.5.0). For your Automation account, you can update your modules to the latest version using [How to update Azure PowerShell modules in Azure Automation](automation-update-azure-modules.md).
@@ -36,11 +36,11 @@ Azure Automation supports three types of source control:
36
36
37
37
This section tells how to configure source control for your Automation account. You can use either the Azure portal or PowerShell.
38
38
39
-
### Configure source control -- Azure portal
39
+
### Configure source control in Azure portal
40
40
41
41
Use this procedure to configure source control using the Azure portal.
42
42
43
-
1.Within your Automation account, select **Source Control** and click **+ Add**.
43
+
1.In your Automation account, select **Source Control** and click **Add**.
@@ -66,14 +66,14 @@ Use this procedure to configure source control using the Azure portal.
66
66

67
67
68
68
> [!NOTE]
69
-
> The login for your source control repository might be different from your login for the Azure portal. Ensure that you are logged in with the correct account for your source control repository when configuring source control. If there is a doubt, open a new tab in your browser, log out from **visualstudio.com** or **github.com**, and try connecting to source control again.
69
+
> The login for your source control repository might be different from your login for the Azure portal. Ensure that you are logged in with the correct account for your source control repository when configuring source control. If there is a doubt, open a new tab in your browser, log out from **dev.azure.com**, **visualstudio.com**, or **github.com**, and try reconnecting to source control.
70
70
71
-
### Configure source control -- PowerShell
71
+
### Configure source control in PowerShell
72
72
73
73
You can also use PowerShell to configure source control in Azure Automation. To use the PowerShell cmdlets for this operation, you need a personal access token (PAT). Use the [New-AzAutomationSourceControl](https://docs.microsoft.com/powershell/module/az.automation/new-azautomationsourcecontrol?view=azps-3.5.0
74
74
) cmdlet to create the source control connection. This cmdlet requires a secure string for the PAT. To learn how to create a secure string, see [ConvertTo-SecureString](/powershell/module/microsoft.powershell.security/convertto-securestring?view=powershell-6).
75
75
76
-
The following subsections illustrate PowerShell creation of the source control connection for GitHub, Azure Repos (Git), and Azure Repos (TFVC).
76
+
The following subsections illustrate PowerShell creation of the source control connection for GitHub, Azure Repos (Git), and Azure Repos (TFVC).
#### Create source control connection for Azure Repos (Git)
85
85
86
+
> [!NOTE]
87
+
> Azure Repos (Git) uses a URL that accesses **dev.azure.com** instead of **visualstudio.com**, used in earlier formats. The older URL format `https://<accountname>.visualstudio.com/<projectname>/_git/<repositoryname>` is deprecated but still supported. The new format is preferred.
#### Create source control connection for Azure Repos (TFVC)
91
95
96
+
> [!NOTE]
97
+
> Azure Repos (TFVC) uses a URL that accesses **dev.azure.com** instead of **visualstudio.com**, used in earlier formats. The older URL format `https://<accountname>.visualstudio.com/<projectname>/_versionControl` is deprecated but still supported. The new format is preferred.
@@ -190,7 +197,7 @@ If multiple people are editing runbooks in your source control repository using
190
197
191
198
## Updating the PAT
192
199
193
-
Currently, there is no way to use the Azure portal to update the PAT in source control. After your PAT has expired or been revoked, you can update source control with a new access token in one of these ways:
200
+
Currently, you can't use the Azure portal to update the PAT in source control. When your PAT is expired or revoked, you can update source control with a new access token in one of these ways:
194
201
195
202
* Use the [REST API](https://docs.microsoft.com/rest/api/automation/sourcecontrol/update).
196
203
* Use the [Update-AzAutomationSourceControl](/powershell/module/az.automation/update-azautomationsourcecontrol) cmdlet.
When a workspace deployment fails, the workspace is still created in a failed state. Delete the failed workspace and create a new workspace that resolves the deployment errors. When you delete the failed workspace, the managed resource group and any successfully deployed resources are also deleted.
When a workspace deployment fails, the workspace is still created in a failed state. Delete the failed workspace and create a new workspace that resolves the deployment errors. When you delete the failed workspace, the managed resource group and any successfully deployed resources are also deleted.
60
+
59
61
## Create a Spark cluster in Databricks
60
62
61
63
1. In the Azure portal, go to the Databricks workspace that you created, and then click **Launch Workspace**.
When a workspace deployment fails, the workspace is still created in a failed state. Delete the failed workspace and create a new workspace that resolves the deployment errors. When you delete the failed workspace, the managed resource group and any successfully deployed resources are also deleted.
Copy file name to clipboardExpand all lines: articles/azure-functions/durable/durable-functions-http-features.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -253,7 +253,7 @@ If any of these limitations might affect your use case, consider instead using a
253
253
254
254
Customizing the behavior of the orchestration's internal HTTP client is possible using [Azure Functions .NET dependency injection](https://docs.microsoft.com/azure/azure-functions/functions-dotnet-dependency-injection). This ability can be useful for making small behavioral changes. It can also be useful for unit testing the HTTP client by injecting mock objects.
255
255
256
-
The following example demonstrates using dependency injection to disable SSL certificate validation for orchestrator functions that call external HTTP endpoints.
256
+
The following example demonstrates using dependency injection to disable TLS/SSL certificate validation for orchestrator functions that call external HTTP endpoints.
257
257
258
258
```csharp
259
259
publicclassStartup : FunctionsStartup
@@ -271,7 +271,7 @@ public class MyDurableHttpMessageHandlerFactory : IDurableHttpMessageHandlerFact
Copy file name to clipboardExpand all lines: articles/azure-portal/azure-portal-dashboard-share-access.md
+8-12Lines changed: 8 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.devlang: NA
13
13
ms.topic: conceptual
14
14
ms.tgt_pltfrm: NA
15
15
ms.workload: na
16
-
ms.date: 01/29/2020
16
+
ms.date: 03/23/2020
17
17
ms.author: mblythe
18
18
19
19
---
@@ -36,7 +36,7 @@ With Role-Based Access Control (RBAC), you can assign users to roles at three di
36
36
* resource group
37
37
* resource
38
38
39
-
The permissions you assign inherit from subscription down to the resource. The published dashboard is a resource. You may already have users assigned to roles for the subscription that apply for the published dashboard.
39
+
The permissions you assign inherit from the subscription down to the resource. The published dashboard is a resource. You may already have users assigned to roles for the subscription that apply for the published dashboard.
40
40
41
41
Let's say you have an Azure subscription and various members of your team have been assigned the roles of *owner*, *contributor*, or *reader* for the subscription. Users who are owners or contributors can list, view, create, modify, or delete dashboards within the subscription. Users who are readers can list and view dashboards, but can't modify or delete them. Users with reader access can make local edits to a published dashboard, such as when troubleshooting an issue, but they can't publish those changes back to the server. They can make a private copy of the dashboard for themselves.
42
42
@@ -56,35 +56,31 @@ Before assigning access, you must publish the dashboard.
56
56
57
57

58
58
59
-
By default, sharing publishes your dashboard to a resource group named **dashboards**.
59
+
By default, sharing publishes your dashboard to a resource group named **dashboards**. To select a different resource group, clear the checkbox.
60
60
61
61
Your dashboard is now published. If the permissions inherited from the subscription are suitable, you don't need to do anything more. Other users in your organization can access and modify the dashboard based on their subscription level role.
62
62
63
63
## Assign access to a dashboard
64
64
65
65
You can assign a group of users to a role for that dashboard.
66
66
67
-
1. After publishing the dashboard, in **Sharing + access control**, select **Manage users**.
67
+
1. After publishing the dashboard, select the **Share** or **Unshare** option to access **Sharing + access control**.
68
68
69
-

69
+
1. In **Sharing + access control**, select **Manage users**.
70
70
71
-
To access **Sharing + access control** from a dashboard, select the **Share** or **Unshare** option.
71
+

72
72
73
73
1. Select **Role assignments** to see existing users that are already assigned a role for this dashboard.
74
74
75
-
1. To add a new user or group, select **Add**.
75
+
1. To add a new user or group, select **Add** then **Add role assignment**.
76
76
77
77

78
78
79
79
1. Select the role that represents the permissions to grant. For this example, select **Contributor**.
80
80
81
81
1. Select the user or group to assign to the role. If you don't see the user or group you're looking for in the list, use the search box. Your list of available groups depends on the groups you've created in Active Directory.
82
82
83
-
1. When you have finished adding users or groups, select **OK**.
84
-
85
-
The new assignment is added to the list of users. Its **Access** is listed as **Assigned** rather than **Inherited**.
0 commit comments