Skip to content

Commit 12d39b6

Browse files
authored
Merge pull request #293912 from MicrosoftDocs/main
01/31/2025 AM Publishing
2 parents 45e37ca + b436c67 commit 12d39b6

File tree

40 files changed

+109
-211
lines changed

40 files changed

+109
-211
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5223,6 +5223,11 @@
52235223
"source_path_from_root": "/articles/reliability/cross-region-replication-azure-no-pair.md",
52245224
"redirect_url": "/azure/reliability/regions-multi-region-nonpaired",
52255225
"redirect_document_id": false
5226+
},
5227+
{
5228+
"source_path_from_root": "/articles/reliability/reliability-hdinsight-on-aks.md",
5229+
"redirect_url": "/azure/reliability/overview-reliability-guidance",
5230+
"redirect_document_id": false
52265231
}
52275232
]
52285233
}

articles/active-directory-b2c/identity-provider-generic-saml-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -422,7 +422,7 @@ Upon an application sign-out request, Azure AD B2C attempts to sign out from you
422422

423423
## Debug SAML protocol
424424

425-
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Microsoft Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
425+
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for Firefox, or [Microsoft Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
426426

427427
Using these tools, you can check the integration between Azure AD B2C and your SAML identity provider. For example:
428428

articles/active-directory-b2c/troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Use **Run now** and `https://jwt.ms` to test your policies independently of your
165165

166166
## Troubleshoot SAML protocol
167167

168-
To help configure and debug the integration with your service provider, you can use a browser extension for the SAML protocol, for example, [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
168+
To help configure and debug the integration with your service provider, you can use a browser extension for the SAML protocol, for example, [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for Firefox, or [Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
169169

170170
The following screenshot demonstrates how the SAML DevTools extension presents the SAML request Azure AD B2C sends to the identity provider, and the SAML response.
171171

articles/app-service/environment/networking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ For more information about Private Endpoint and Web App, see [Azure Web App Priv
141141

142142
## DNS
143143

144-
The following sections describe the DNS considerations and configuration that apply inbound to and outbound from your App Service Environment. The examples use the domain suffix `appserviceenvironment.net` from Azure Public Cloud. If you're using other clouds like Azure Government, you need to use their respective domain suffix. For App Service Environment domains, the site name is truncated at 40 characters because of DNS limits. If you have a slot, the slot name is truncated at 19 characters.
144+
The following sections describe the DNS considerations and configuration that apply inbound to and outbound from your App Service Environment. The examples use the domain suffix `appserviceenvironment.net` from Azure Public Cloud. If you're using other clouds like Azure Government, you need to use their respective domain suffix. For App Service Environment domains, the site name is truncated at 59 characters because of DNS limits. For App Service Environment domains with slots, the site name is truncated at 40 characters and the slot name is truncated at 19 characters because of DNS limits.
145145

146146
### DNS configuration to your App Service Environment
147147

articles/app-service/wordpress-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ Key tools for debugging and monitoring WordPress sites include:
9090
- **[SSH Access](configure-linux-open-ssh-session.md?pivots=container-linux)**
9191

9292
### PhpMyAdmin
93-
WordPress on App Service utilizes an Azure Database for MySQL flexible server, which is integrated into a VNET. This setup restricts database access to within the VNET. WordPress on App Service includes phpMyAdmin by default. You can access it at: https://`<your-site-link>`/phpmyadmin.
93+
WordPress on App Service utilizes an Azure Database for MySQL Flexible Server, which is integrated into a VNET. This setup restricts database access to within the VNET. WordPress on App Service includes phpMyAdmin by default. You can access it at: https://`<your-site-link>`/phpmyadmin.
9494

9595
If you are using Managed Identities, you can log in to phpMyAdmin by using the value from DATABASE_USERNAME environment variable as the username and the token as the password. To find the token use your Kudu SSH to run the following command:
9696

articles/azure-resource-manager/templates/template-specs-create-portal-forms.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Create portal forms for template spec
3-
description: Learn how to create forms that are displayed in the Azure portal forms. Use the form to deploying a template spec
3+
description: Learn how to create forms that are displayed in the Azure portal forms. Use the form to deploy a template spec.
44
ms.topic: tutorial
55
ms.custom: devx-track-azurepowershell, devx-track-azurecli
6-
ms.date: 03/20/2024
6+
ms.date: 01/30/2025
77
---
88

99
# Tutorial: Create Azure portal forms for a template spec
@@ -24,9 +24,9 @@ For Azure PowerShell, use [version 6.0.0 or later](/powershell/azure/install-azu
2424

2525
## Create template
2626

27-
To show the different portal elements that are available in a form, you'll use an ARM template with several parameters. The following template creates a key vault, configures permissions to key vault for a user, and adds a secret.
27+
To show the different portal elements that are available in a form, use an ARM template with several parameters. The following template creates a key vault, configures permissions to key vault for a user, and adds a secret.
2828

29-
Copy this file and save it locally. This tutorial assumes you've named it **keyvault.json** but you can give it any name.
29+
Copy this file and save it locally. This tutorial assumes you named it **keyvault.json** but you can give it any name.
3030

3131
```json
3232
{
@@ -182,15 +182,15 @@ Copy this file and save it locally. This tutorial assumes you've named it **keyv
182182

183183
## Create default form
184184

185-
The Azure portal provides a sandbox for creating and previewing forms. This sandbox can render a form from an existing ARM template. You'll use this default form to get started with creating a form for your template spec. For more information about the form structure, see [FormViewType](https://github.com/Azure/portaldocs/blob/main/portal-sdk/generated/dx-view-formViewType.md).
185+
The Azure portal provides a sandbox for creating and previewing forms. This sandbox can render a form from an existing ARM template. Use this default form to get started with creating a form for your template spec. For more information about the form structure, see [FormViewType](https://github.com/Azure/portaldocs/blob/main/portal-sdk/generated/dx-view-formViewType.md).
186186

187-
1. Open the [Form view sandbox](https://aka.ms/form/sandbox).
187+
1. Open the [Form view sandbox](https://also known as.ms/form/sandbox).
188188

189189
:::image type="content" source="./media/template-specs-create-portal-forms/deploy-template-spec-config.png" alt-text="Screenshot of Azure portal form view sandbox interface.":::
190190

191-
1. In **Package Type**, select **CustomTemplate**. Make sure you select the package type before specify deployment template.
192-
1. In **Deployment template (optional)**, select the key vault template you saved locally. When prompted if you want to overwrite current changes, select **Yes**. The autogenerated form is displayed in the code window. The form is editable from the portal. To customize the form, see [customize form](#customize-form).
193-
If you look closely into the autogenerated form, the default title is called **Test Form View**, and there's only one step called **basics** defined.
191+
1. In **Package Type**, select **CustomTemplate**. Make sure you select the package type before specifying deployment template.
192+
1. In **Deployment template (optional)**, select the key vault template you saved locally. When prompted if you want to overwrite current changes, select **Yes**. The autogenerated form is displayed in the code window. You can edit the form from the portal. To customize the form, see [customize form](#customize-form).
193+
If you look closely at the autogenerated form, the default title is **Test Form View**. There's only one step called **basics** defined.
194194

195195
```json
196196
{
@@ -216,43 +216,43 @@ The Azure portal provides a sandbox for creating and previewing forms. This sand
216216
}
217217
```
218218

219-
1. To see that works it without any modifications, select **Preview**.
219+
1. To see that it works without any modifications, select **Preview**.
220220

221221
:::image type="content" source="./media/template-specs-create-portal-forms/view-portal-basic.png" alt-text="Screenshot of the generated basic Azure portal form.":::
222222

223-
The sandbox displays the form. It has fields for selecting a subscription, resource group, and region. It also fields for all of the parameters from the template.
223+
The sandbox displays the form. It has fields for selecting a subscription, resource group, and region. It also has fields for all of the parameters from the template.
224224

225-
Most of the fields are text boxes, but some fields are specific for the type of parameter. When your template includes allowed values for a parameter, the autogenerated form uses a drop-down element. The drop-down element is pre-populated with the allowed values.
225+
Most of the fields are text boxes, but some fields are specific for the type of parameter. When your template includes allowed values for a parameter, the autogenerated form uses a drop-down element. The drop-down element is prepopulated with the allowed values.
226226

227-
In between the title and **Project details**, there are no tabs because the default form only has one step defined. In the **Customize form** section, you'll break the parameters into multiple tabs.
227+
Between the title and **Project details**, there are no tabs because the default form only has one step defined. In the **Customize form** section, you break the parameters into multiple tabs.
228228

229229
> [!WARNING]
230-
> Don't select **Create** as it will launch a real deployment. You'll have a chance to deploy the template spec later in this tutorial.
230+
> Don't select **Create** as it launches a real deployment. You have a chance to deploy the template spec later in this tutorial.
231231

232232
1. To exit from the preview, select **Cancel**.
233233

234234
## Customize form
235235

236-
The default form is a good starting point for understanding forms but usually you'll want to customize it. You can edit it in the sandbox or in Visual Studio Code. The preview option is only available in the sandbox.
236+
The default form is a good starting point for understanding forms but usually you want to customize it. You can edit it in the sandbox or in Visual Studio Code. The preview option is only available in the sandbox.
237237

238238
1. Give the form a **title** that describes its use.
239239

240240
::: code language="json" source="~/azure-docs-json-samples/azure-resource-manager/ui-forms/keyvaultform.json" range="1-6" highlight="6" :::
241241

242-
1. Your default form had all of the fields for your template combined into one step called **Basics**. To help users to understand the values they're providing, divide the form into steps. Each step contains fields related to a logical part of the solution to deploy.
242+
1. Your default form had all of the fields for your template combined into one step called **Basics**. To help users understand the values they're providing, divide the form into steps. Each step contains fields related to a logical part of the solution to deploy.
243243

244-
Find the step labeled **Basics**. You'll keep this step but add steps below it. The new steps will focus on configuring the key vault, setting user permissions, and specifying the secret. Make sure you add a comma after the basics step.
244+
Find the step labeled **Basics**. Keep this step but add steps that focus on configuring the key vault, setting user permissions, and specifying the secret. Add a comma after the basics step.
245245

246246
::: code language="json" source="~/azure-docs-json-samples/azure-resource-manager/ui-forms/steps.json" highlight="15-32" :::
247247

248248
> [!IMPORTANT]
249249
> Properties in the form are case-sensitive. Make sure you use the casing shown in the examples.
250250

251-
1. Select **Preview**. You'll see the steps, but most of them don't have any elements.
251+
1. Select **Preview**. You see the steps, but most of them don't have any elements.
252252

253253
:::image type="content" source="./media/template-specs-create-portal-forms/view-steps.png" alt-text="Screenshot of Azure portal form with multiple steps.":::
254254

255-
1. Now, move elements to the appropriate steps. Start with the elements labeled **Secret Name** and **Secret Value**. Remove these elements from the **Basics** step and add them to the **Secret** step.
255+
1. Move elements to the appropriate steps. Start with the elements labeled **Secret Name** and **Secret Value**. Remove these elements from the **Basics** step and add them to the **Secret** step.
256256

257257
```json
258258
{
@@ -294,7 +294,7 @@ The default form is a good starting point for understanding forms but usually yo
294294
}
295295
```
296296

297-
1. When you move elements, you need to fix the `outputs` section. Currently, the outputs section references those elements as if they were still in the basics step. Fix the syntax so it references the elements in the `secret` step.
297+
1. When you move elements, fix the `outputs` section. Currently, the outputs section references those elements as if they were still in the basics step. Fix the syntax so it references the elements in the `secret` step.
298298

299299
```json
300300
"outputs": {
@@ -305,7 +305,7 @@ The default form is a good starting point for understanding forms but usually yo
305305
}
306306
```
307307

308-
1. Continue moving elements to the appropriate steps. Rather than go through each one, take a look at the updated form.
308+
1. Continue moving elements to the appropriate steps. Rather than go through each one, look at the updated form.
309309

310310
::: code language="json" source="~/azure-docs-json-samples/azure-resource-manager/ui-forms/keyvaultform.json" :::
311311

@@ -345,19 +345,19 @@ To test the form, go to the portal and navigate to your template spec. Select **
345345

346346
:::image type="content" source="./media/template-specs-create-portal-forms/deploy-template-spec.png" alt-text="Screenshot of Azure template spec overview with deploy option highlighted.":::
347347

348-
You'll see the form you created. Go through the steps and provide values for the fields.
348+
You see the form you created. Go through the steps and provide values for the fields.
349349

350-
On the **Basics** step, you'll see a field for **Region**. This field is used for the location of the resource group. On the **Key Vault** step, you'll see a field for **Location**. This field is used for the location of the key vault.
350+
On the **Basics** step, you see a field for **Region**. This field is for the location of the resource group. On the **Key Vault** step, you see a field for **Location**. This field is for the location of the key vault.
351351

352-
On the **Permissions** step, you can provide your own user ID for the object ID. Use the default value (`["list"]`) for key and secret permissions. You'll improve that option in the next section.
352+
On the **Permissions** step, provide your user ID for the object ID. Use the default value (`["list"]`) for key and secret permissions. You improve that option in the next section.
353353

354-
When you have finished providing values, select **Create** to deploy the template spec.
354+
When you finish providing values, select **Create** to deploy the template spec.
355355

356356
## Improve the form
357357

358-
In the previous section, you added steps and moved elements, but you didn't change any of the default behaviors. In this section, you'll make changes that improve the experience for users of your template spec.
358+
In the previous section, you added steps and moved elements, but you didn't change any of the default behaviors. In this section, you make changes that improve the experience for users of your template spec.
359359

360-
Previously, the two permissions fields were text boxes. Now, you'll use a drop-down. Set the type to `Microsoft.Common.DropDown`.
360+
Previously, the two permissions fields were text boxes. Now, you use a drop-down. Set the type to `Microsoft.Common.DropDown`.
361361

362362
Update `keysPermissions`:
363363

@@ -367,13 +367,13 @@ And `secretsPermissions`:
367367

368368
::: code language="json" source="~/azure-docs-json-samples/azure-resource-manager/ui-forms/keyvaultform2.json" range="253-255" highlight="3" :::
369369

370-
These fields need to pass an array to the template. A regular drop-down won't work because it only lets you select one value. To select more than one value and pass them as an array, add the `multiselect` field and set to `true`.
370+
These fields need to pass an array to the template. A regular drop-down doesn't work because it only lets you select one value. To select more than one value and pass them as an array, add the `multiselect` field and set it to `true`.
371371

372372
::: code language="json" source="~/azure-docs-json-samples/azure-resource-manager/ui-forms/keyvaultform2.json" range="169-173" highlight="5" :::
373373

374374
::: code language="json" source="~/azure-docs-json-samples/azure-resource-manager/ui-forms/keyvaultform2.json" range="253-257" highlight="5" :::
375375

376-
Finally, you must specify the allowed values for the drop-down and a default value.
376+
Finally, specify the allowed values for the drop-down and a default value.
377377

378378
::: code language="json" source="~/azure-docs-json-samples/azure-resource-manager/ui-forms/keyvaultform2.json" range="169-304" highlight="6-8,12-81,90-92,96-133" :::
379379

@@ -407,7 +407,7 @@ Redeploy your template spec with the improved portal form.
407407

408408
:::image type="content" source="./media/template-specs-create-portal-forms/view-portal.png" alt-text="Screenshot of Azure portal form for providing values to a template spec.":::
409409

410-
Notice that your permission fields are now drop-down that allow multiple values.
410+
Notice that your permission fields are now drop-downs that allow multiple values.
411411

412412
## Next steps
413413

0 commit comments

Comments
 (0)