Skip to content

Commit 0ab02ce

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into alerts-articles
2 parents 852d84a + e65315c commit 0ab02ce

File tree

131 files changed

+2432
-1266
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

131 files changed

+2432
-1266
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34262,6 +34262,11 @@
3426234262
"source_path_from_root": "/articles/virtual-machines/linux/copy-files-to-linux-vm-using-scp.md",
3426334263
"redirect_url": "/azure/virtual-machines/copy-files-to-vm-using-scp",
3426434264
"redirect_document_id": false
34265+
},
34266+
{
34267+
"source_path_from_root": "/articles/web-application-firewall/afds/waf-front-door-rate-limit-powershell.md",
34268+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-rate-limit-configure",
34269+
"redirect_document_id": true
3426534270
}
3426634271
]
3426734272
}

articles/active-directory/manage-apps/configure-user-consent.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,15 @@
22
title: Configure how users consent to applications
33
description: Learn how to manage how and when users can consent to applications that will have access to your organization's data.
44
services: active-directory
5-
author: psignoret
5+
author: yuhko-msft
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
1111
ms.date: 08/10/2022
12-
ms.author: phsignor
12+
ms.author: yuhko
13+
ms.reviewer: phsignor
1314
ms.custom: contperf-fy21q2, contperf-fy22q2
1415

1516
#customer intent: As an admin, I want to configure how end-users consent to applications.

articles/active-directory/manage-apps/manage-app-consent-policies.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,14 @@
22
title: Manage app consent policies
33
description: Learn how to manage built-in and custom app consent policies to control when consent can be granted.
44
services: active-directory
5-
author: psignoret
5+
author: yuhko-msft
66
ms.service: active-directory
77
ms.subservice: app-mgmt
88
ms.workload: identity
99
ms.topic: how-to
1010
ms.date: 09/02/2021
11-
ms.author: phsignor
11+
ms.author: yuhko
12+
ms.reviewer: phsignor
1213
ms.custom: contperf-fy21q2
1314

1415
#customer intent: As an admin, I want to manage app consent policies for enterprise applications in Azure AD

articles/active-directory/managed-identities-azure-resources/qs-configure-template-windows-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ In this section, you assign a user-assigned managed identity to an Azure VM usin
120120
121121
### Assign a user-assigned managed identity to an Azure VM
122122

123-
To assign a user-assigned identity to a VM, your account needs the [Virtual Machine Contributor](../../role-based-access-control/built-in-roles.md#virtual-machine-contributor) and [Managed Identity Operator](../../role-based-access-control/built-in-roles.md#managed-identity-operator) role assignments. No other Azure AD directory role assignments are required.
123+
To assign a user-assigned identity to a VM, your account needs the [Managed Identity Operator](../../role-based-access-control/built-in-roles.md#managed-identity-operator) role assignment. No other Azure AD directory role assignments are required.
124124

125125
1. Under the `resources` element, add the following entry to assign a user-assigned managed identity to your VM. Be sure to replace `<USERASSIGNEDIDENTITY>` with the name of the user-assigned managed identity you created.
126126

articles/active-directory/saas-apps/fortigate-ssl-vpn-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 05/13/2022
12+
ms.date: 09/08/2022
1313
ms.author: jeedes
1414
---
1515

@@ -219,7 +219,7 @@ To complete these steps, you'll need the values you recorded earlier:
219219
set entity-id < Identifier (Entity ID)Entity ID>
220220
set single-sign-on-url < Reply URL Reply URL>
221221
set single-logout-url <Logout URL>
222-
set idp-entity-id <Azure AD Identifier>
222+
set idp-entity-id <Azure Login URL>
223223
set idp-single-sign-on-url <Azure AD Identifier>
224224
set idp-single-logout-url <Azure Logout URL>
225225
set idp-cert <Base64 SAML Certificate Name>

articles/active-directory/saas-apps/infrascale-cloud-backup-tutorial.md

Lines changed: 4 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/24/2022
12+
ms.date: 09/08/2022
1313
ms.author: jeedes
1414

1515
---
@@ -78,28 +78,11 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7878
b. In the **Reply URL** textbox, type the URL:
7979
`https://dashboard.managedoffsitebackup.net/Account/AssertionConsumerService`
8080

81-
c. In the **Sign-on URL** text box, type one of the following URLs:
82-
83-
| **Sign-on URL** |
84-
|------------|
85-
| `https://dashboard.avgonlinebackup.com/Account/SingleSignOn` |
86-
| `https://dashboard.infrascale.com/Account/SingleSignOn` |
87-
| `https://dashboard.managedoffsitebackup.net/Account/SingleSignOn` |
88-
| `https://dashboard.sosonlinebackup.com/Account/SingleSignOn` |
89-
|`https://dashboard.trustboxbackup.com/Account/SingleSignOn` |
90-
| `https://radialpoint-dashboard.managedoffsitebackup.net/Account/SingleSignOn` |
91-
| `https://dashboard-cw.infrascale.com/Account/SingleSignOn` |
92-
| `https://dashboard.digicelcloudbackup.com/Account/SingleSignOn` |
93-
| `https://dashboard-cw.sosonlinebackup.com/Account/SingleSignOn` |
94-
|`https://dashboard.my-data.dk/Account/SingleSignOn` |
95-
|`https://dashboard.beesafe.nu/Account/SingleSignOn` |
96-
|`https://dashboard.bekcloud.com/Account/SingleSignOn` |
97-
| `https://dashboard.alltimesecure.com/Account/SingleSignOn` |
98-
| `https://dashboard-ec1.sosonlinebackup.com/Account/SingleSignOn` |
99-
| `https://dashboard.glcsecurecloud.com/Account/SingleSignOninfrascalecloudbackup.com/infrascalecloudbackup.com/` |
81+
c. The **Sign-on URL** text box requires a specific URL for your company. The general pattern of the URL is:
82+
`https://[OptionalPrefix]dashboard[OptionalSuffix].CompanySpecificString.[com/net,etc]/Account/SingleSignOn`
10083

10184
> [!Note]
102-
> The Identifier value is not real. Update this value with the actual Identifier URL. Contact [Infrascale Cloud Backup support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
85+
> Do not enter this in the Sign-on URL text box. The Identifier value is not a real URL – just a general pattern. Update this value with the actual Identifier URL obtained from Infrascale. Contact [Infrascale Cloud Backup support team](mailto:[email protected]) to get the value.
10386
10487
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
10588

articles/active-directory/verifiable-credentials/decentralized-identifier-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.reviewer:
1919

2020
Our digital and physical lives are increasingly linked to the apps, services, and devices we use to access a rich set of experiences. This digital transformation allows us to interact with hundreds of companies and thousands of other users in ways that were previously unimaginable.
2121

22-
But identity data has too often been exposed in security breaches. These breaches affect our social, professional, and financial lives. Microsoft believes that there’s a better way. Every person has a right to an identity that they own and control, one that securely stores elements of their digital identity and preserves privacy. This primer explains how we are joining hands with a diverse community to build an open, trustworthy, interoperable, and standards-based Decentralized Identity (DID) solution for individuals and organizations.
22+
But identity data has too often been exposed in security breaches. These breaches affect our social, professional, and financial lives. Microsoft believes that there’s a better way. Every person has a right to an identity that they own and control, one that securely stores elements of their digital identity and preserves privacy. This primer explains how we are joining hands with a diverse community to build an open, trustworthy, interoperable, and standards-based Decentralized Identity solution for individuals and organizations.
2323

2424
## Why we need Decentralized Identity
2525

articles/aks/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@
4444
href: quickstart-helm.md
4545
- name: Develop with Dapr
4646
href: quickstart-dapr.md
47-
- name: Subscribe to AKS events with Event Grid (Preview)
47+
- name: Subscribe to AKS events with Event Grid
4848
href: quickstart-event-grid.md
4949
- name: Tutorials
5050
items:

articles/aks/quickstart-event-grid.md

Lines changed: 2 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Subscribe to Azure Kubernetes Service events with Azure Event Grid (Preview)
2+
title: Subscribe to Azure Kubernetes Service events with Azure Event Grid
33
description: Use Azure Event Grid to subscribe to Azure Kubernetes Service events
44
services: container-service
55
author: zr-msft
@@ -8,70 +8,17 @@ ms.date: 07/12/2021
88
ms.author: zarhoads
99
---
1010

11-
# Quickstart: Subscribe to Azure Kubernetes Service (AKS) events with Azure Event Grid (Preview)
11+
# Quickstart: Subscribe to Azure Kubernetes Service (AKS) events with Azure Event Grid
1212

1313
Azure Event Grid is a fully managed event routing service that provides uniform event consumption using a publish-subscribe model.
1414

1515
In this quickstart, you'll create an AKS cluster and subscribe to AKS events.
1616

17-
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
18-
1917
## Prerequisites
2018

2119
* An Azure subscription. If you don't have an Azure subscription, you can create a [free account](https://azure.microsoft.com/free).
2220
* [Azure CLI][azure-cli-install] or [Azure PowerShell][azure-powershell-install] installed.
2321

24-
### Register the `EventgridPreview` preview feature
25-
26-
To use the feature, you must also enable the `EventgridPreview` feature flag on your subscription.
27-
28-
### [Azure CLI](#tab/azure-cli)
29-
30-
Register the `EventgridPreview` feature flag by using the [az feature register][az-feature-register] command, as shown in the following example:
31-
32-
```azurecli-interactive
33-
az feature register --namespace "Microsoft.ContainerService" --name "EventgridPreview"
34-
```
35-
36-
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the [az feature list][az-feature-list] command:
37-
38-
```azurecli-interactive
39-
az feature list -o table --query "[?contains(name, 'Microsoft.ContainerService/EventgridPreview')].{Name:name,State:properties.state}"
40-
```
41-
42-
When ready, refresh the registration of the *Microsoft.ContainerService* resource provider by using the [az provider register][az-provider-register] command:
43-
44-
```azurecli-interactive
45-
az provider register --namespace Microsoft.ContainerService
46-
```
47-
48-
[!INCLUDE [event-grid-register-provider-cli.md](../../includes/event-grid-register-provider-cli.md)]
49-
50-
### [Azure PowerShell](#tab/azure-powershell)
51-
52-
Register the `EventgridPreview` feature flag by using the [Register-AzProviderPreviewFeature][register-azproviderpreviewfeature] cmdlet, as shown in the following example:
53-
54-
```azurepowershell-interactive
55-
Register-AzProviderPreviewFeature -ProviderNamespace Microsoft.ContainerService -Name EventgridPreview
56-
```
57-
58-
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the [Get-AzProviderPreviewFeature][get-azproviderpreviewfeature] cmdlet:
59-
60-
```azurepowershell-interactive
61-
Get-AzProviderPreviewFeature -ProviderNamespace Microsoft.ContainerService -Name EventgridPreview |
62-
Format-Table -Property Name, @{name='State'; expression={$_.Properties.State}}
63-
```
64-
65-
When ready, refresh the registration of the *Microsoft.ContainerService* resource provider by using the [Register-AzResourceProvider][register-azresourceprovider] command:
66-
67-
```azurepowershell-interactive
68-
Register-AzResourceProvider -ProviderNamespace Microsoft.ContainerService
69-
```
70-
71-
[!INCLUDE [event-grid-register-provider-powershell.md](../../includes/event-grid-register-provider-powershell.md)]
72-
73-
---
74-
7522
## Create an AKS cluster
7623

7724
### [Azure CLI](#tab/azure-cli)
@@ -267,12 +214,6 @@ To learn more about AKS, and walk through a complete code to deployment example,
267214
[new-azeventhub]: /powershell/module/az.eventhub/new-azeventhub
268215
[az-eventgrid-event-subscription-create]: /cli/azure/eventgrid/event-subscription#az-eventgrid-event-subscription-create
269216
[new-azeventgridsubscription]: /powershell/module/az.eventgrid/new-azeventgridsubscription
270-
[az-feature-register]: /cli/azure/feature#az_feature_register
271-
[register-azproviderpreviewfeature]: /powershell/module/az.resources/register-azproviderpreviewfeature
272-
[az-feature-list]: /cli/azure/feature#az_feature_list
273-
[get-azproviderpreviewfeature]: /powershell/module/az.resources/get-azproviderpreviewfeature
274-
[az-provider-register]: /cli/azure/provider#az_provider_register
275-
[register-azresourceprovider]: /powershell/module/az.resources/register-azresourceprovider
276217
[az-group-delete]: /cli/azure/group#az_group_delete
277218
[sp-delete]: kubernetes-service-principal.md#other-considerations
278219
[remove-azresourcegroup]: /powershell/module/az.resources/remove-azresourcegroup

articles/api-management/api-management-howto-mutual-certificates-for-clients.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,8 @@ For more information, see [API Management access restriction policies](api-manag
4545
You can also create policy expressions with the [`context` variable](api-management-policy-expressions.md#ContextVariables) to check client certificates. Examples in the following sections show expressions using the `context.Request.Certificate` property and other `context` properties.
4646

4747
> [!IMPORTANT]
48-
> Starting May 2021, the `context.Request.Certificate` property only requests the certificate when the API Management instance's [`hostnameConfiguration`](/rest/api/apimanagement/current-ga/api-management-service/create-or-update#hostnameconfiguration) sets the `negotiateClientCertificate` property to True. By default, `negotiateClientCertificate` is set to False.
48+
> * Starting May 2021, the `context.Request.Certificate` property only requests the certificate when the API Management instance's [`hostnameConfiguration`](/rest/api/apimanagement/current-ga/api-management-service/create-or-update#hostnameconfiguration) sets the `negotiateClientCertificate` property to True. By default, `negotiateClientCertificate` is set to False.
49+
> * If TLS renegotiation is disabled in your client, you may see TLS errors when requesting the certificate using the `context.Request.Certificate` property. If this occurs, enable TLS renegotation settings in the client.
4950
5051
### Checking the issuer and subject
5152

0 commit comments

Comments
 (0)