You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| tenant-id | Tenant ID or URL of the Azure Active Directory service. | Yes | N/A |
63
-
| header-name | The name of the HTTP header holding the token. | One of `header-name`, `query-parameter-name` or `token-value` must be specified. |N/A|
63
+
| header-name | The name of the HTTP header holding the token. | One of `header-name`, `query-parameter-name` or `token-value` must be specified. |`Authorization`|
64
64
| query-parameter-name | The name of the query parameter holding the token. | One of `header-name`, `query-parameter-name` or `token-value` must be specified. | N/A |
65
65
| token-value | Expression returning a string containing the token. You must not return `Bearer` as part of the token value. | One of `header-name`, `query-parameter-name` or `token-value` must be specified. | N/A |
66
66
| failed-validation-httpcode | HTTP status code to return if the JWT doesn't pass validation. | No | 401 |
@@ -102,23 +102,7 @@ The `validate-azure-ad-token` policy enforces the existence and validity of a JS
<key>{{jwt-signing-key}}</key> <!-- signing key specified as a named value -->
109
-
</issuer-signing-keys>
110
-
<audiences>
111
-
<audience>@(context.Request.OriginalUrl.Host)</audience> <!-- audience is set to API Management host name -->
112
-
</audiences>
113
-
<issuers>
114
-
<issuer>http://contoso.com/</issuer>
115
-
</issuers>
116
-
</validate-jwt>
117
-
```
118
-
119
-
### Simple token validation
120
-
121
-
The following policy is the minimal form of the `validate-azure-ad-token` policy. It expects the JWT to be provided in the `Authorization` header using the `Bearer` scheme. In this example, the Azure AD tenant ID and client application ID are provided using named values.
105
+
The following policy is the minimal form of the `validate-azure-ad-token` policy. It expects the JWT to be provided in the default `Authorization` header using the `Bearer` scheme. In this example, the Azure AD tenant ID and client application ID are provided using named values.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-linux-database-consistent-enhanced-pre-post.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ The new _enhanced_ pre-post script framework has the following key benefits:
31
31
32
32
The following the list of databases are covered under the enhanced framework:
33
33
34
-
-[Oracle (Generally Available)](../virtual-machines/workloads/oracle/oracle-database-backup-azure-backup.md) - [Link to support matrix](backup-support-matrix-iaas.md#support-matrix-for-managed-pre-post-scripts-for-linux-databases)
34
+
-[Oracle (Generally Available)](../virtual-machines/workloads/oracle/oracle-database-backup-azure-backup.md) - [Link to support matrix](backup-support-matrix-iaas.md#support-matrix-for-managed-pre-and-post-scripts-for-linux-databases)
0 commit comments