Skip to content

Commit 13b21cc

Browse files
authored
Merge pull request #112054 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 003271d + f10c12b commit 13b21cc

File tree

7 files changed

+29
-28
lines changed

7 files changed

+29
-28
lines changed

articles/active-directory/users-groups-roles/roles-delegate-by-task.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,9 @@ Configure company properties | Global Administrator |
7373

7474
Task | Least privileged role | Additional roles
7575
---- | --------------------- | ----------------
76-
Passthrough authentication | Global Administrator |
77-
Read all configuration | Global reader |
78-
Seamless single sign-on | Global Administrator |
76+
Passthrough authentication | Hybrid Identity Administrator |
77+
Read all configuration | Global reader | Hybrid Identity Administrator |
78+
Seamless single sign-on | Hybrid Identity Administrator |
7979

8080
## Connect Health
8181

articles/app-service/containers/configure-language-php.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The default PHP image for App Service uses Apache, and it doesn't let you custom
8383
<IfModule mod_rewrite.c>
8484
RewriteEngine on
8585
86-
RewriteRule ^.*$ /public/$1 [NC,L,QSA]
86+
RewriteRule ^(.*)$ /public/$1 [NC,L,QSA]
8787
</IfModule>
8888
```
8989

articles/application-gateway/application-gateway-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ For the v2 SKU, open the public IP resource and select **Configuration**. The **
6767

6868
*Keep-Alive timeout* governs how long the Application Gateway will wait for a client to send another HTTP request on a persistent connection before reusing it or closing it. *TCP idle timeout* governs how long a TCP connection is kept open in case of no activity.
6969

70-
The *Keep-Alive timeout* in the Application Gateway v1 SKU is 120 seconds and in the v2 SKU it's 75 seconds. The *TCP idle timeout* is a 4-minute default on the frontend virtual IP (VIP) of both v1 and v2 SKU of Application Gateway.
70+
The *Keep-Alive timeout* in the Application Gateway v1 SKU is 120 seconds and in the v2 SKU it's 75 seconds. The *TCP idle timeout* is a 4-minute default on the frontend virtual IP (VIP) of both v1 and v2 SKU of Application Gateway. You can't change these values.
7171

7272
### Does the IP or DNS name change over the lifetime of the application gateway?
7373

articles/hdinsight/kafka/rest-proxy.md

Lines changed: 21 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ For REST proxy endpoint requests, client applications should get an OAuth token.
6969
You can use the python code below to interact with the REST proxy on your Kafka cluster. To use the code sample, follow these steps:
7070

7171
1. Save the sample code on a machine with Python installed.
72-
1. Install required python dependencies by executing `pip3 install adal` and `pip install msrestazure`.
72+
1. Install required python dependencies by executing `pip3 install msal`.
7373
1. Modify the code section **Configure these properties** and update the following properties for your environment:
7474

7575
|Property |Description |
@@ -79,7 +79,7 @@ You can use the python code below to interact with the REST proxy on your Kafka
7979
|Client Secret|The secret for the application that you registered in the security group.|
8080
|Kafkarest_endpoint|Get this value from the **Properties** tab in the cluster overview as described in the [deployment section](#create-a-kafka-cluster-with-rest-proxy-enabled). It should be in the following format – `https://<clustername>-kafkarest.azurehdinsight.net`|
8181

82-
1. From the command line, execute the python file by executing `python <filename.py>`
82+
1. From the command line, execute the python file by executing `sudo python3 <filename.py>`
8383

8484
This code does the following action:
8585

@@ -90,13 +90,9 @@ For more information on getting OAuth tokens in python, see [Python Authenticati
9090

9191
```python
9292
#Required python packages
93-
#pip3 install adal
94-
#pip install msrestazure
93+
#pip3 install msal
9594

96-
import adal
97-
from msrestazure.azure_active_directory import AdalAuthentication
98-
from msrestazure.azure_cloud import AZURE_PUBLIC_CLOUD
99-
import requests
95+
import msal
10096

10197
#--------------------------Configure these properties-------------------------------#
10298
# Tenant ID for your Azure Subscription
@@ -109,19 +105,24 @@ client_secret = 'password'
109105
kafkarest_endpoint = "https://<clustername>-kafkarest.azurehdinsight.net"
110106
#--------------------------Configure these properties-------------------------------#
111107

112-
#getting token
113-
login_endpoint = AZURE_PUBLIC_CLOUD.endpoints.active_directory
114-
resource = "https://hib.azurehdinsight.net"
115-
context = adal.AuthenticationContext(login_endpoint + '/' + tenant_id)
108+
# Scope
109+
scope = 'https://hib.azurehdinsight.net/.default'
110+
#Authority
111+
authority = 'https://login.microsoftonline.com/' + tenant_id
116112

117-
token = context.acquire_token_with_client_credentials(
118-
resource,
119-
client_id,
120-
client_secret)
113+
# Create a preferably long-lived app instance which maintains a token cache.
114+
app = msal.ConfidentialClientApplication(
115+
client_id , client_secret, authority,
116+
#cache - For details on how look at this example: https://github.com/Azure-Samples/ms-identity-python-webapp/blob/master/app.py
117+
)
121118

122-
accessToken = 'Bearer ' + token['accessToken']
119+
# The pattern to acquire a token looks like this.
120+
result = None
123121

124-
print(accessToken)
122+
result = app.acquire_token_for_client(scopes=[scope])
123+
124+
print(result)
125+
accessToken = result['access_token']
125126

126127
# relative url
127128
getstatus = "/v1/metadata/topics"
@@ -132,10 +133,10 @@ response = requests.get(request_url, headers={'Authorization': accessToken})
132133
print(response.content)
133134
```
134135

135-
Find below another sample on how to get a token from Azure for REST proxy using a curl command. Notice that we need the `resource=https://hib.azurehdinsight.net` specified while getting a token.
136+
Find below another sample on how to get a token from Azure for REST proxy using a curl command. **Notice that we need the `scope=https://hib.azurehdinsight.net/.default` specified while getting a token.**
136137

137138
```cmd
138-
curl -X POST -H "Content-Type: application/x-www-form-urlencoded" -d 'client_id=<clientid>&client_secret=<clientsecret>&grant_type=client_credentials&resource=https://hib.azurehdinsight.net' 'https://login.microsoftonline.com/<tenantid>/oauth2/token'
139+
curl -X POST -H "Content-Type: application/x-www-form-urlencoded" -d 'client_id=<clientid>&client_secret=<clientsecret>&grant_type=client_credentials&scope=https://hib.azurehdinsight.net/.default' 'https://login.microsoftonline.com/<tenantid>/oauth2/v2.0/token'
139140
```
140141

141142
## Next steps

articles/service-fabric/service-fabric-tutorial-dotnet-app-enable-https-endpoint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ In this tutorial series you learn how to:
3636
Before you begin this tutorial:
3737

3838
* If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
39-
* [Install Visual Studio 2019](https://www.visualstudio.com/) version 15.5 or later with the **Azure development** and **ASP.NET and web development** workloads.
39+
* [Install Visual Studio 2019](https://www.visualstudio.com/) version 16.5 or later with the **Azure development** and **ASP.NET and web development** workloads.
4040
* [Install the Service Fabric SDK](service-fabric-get-started.md)
4141

4242
## Obtain a certificate or create a self-signed development certificate

articles/virtual-machines/custom-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ In Azure Resource Manager (ARM), there is a [base64 function](https://docs.micro
4949
"computerName": "[parameters('virtualMachineName')]",
5050
"adminUsername": "[parameters('adminUsername')]",
5151
"adminPassword": "[parameters('adminPassword')]",
52-
"customDataBase64": "[variables('customData')]"
52+
"customData": "[variables('customDataBase64')]"
5353
},
5454
```
5555

articles/virtual-machines/linux/redhat-create-upload-vhd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ This section assumes that you have already obtained an ISO file from the Red Hat
112112

113113
1. Run the following commands to deprovision the virtual machine and prepare it for provisioning on Azure:
114114

115-
# Mote: if you are migrating a specific virtual machine and do not wish to create a generalized image,
115+
# Note: if you are migrating a specific virtual machine and do not wish to create a generalized image,
116116
# skip the deprovision step
117117
# sudo waagent -force -deprovision
118118

0 commit comments

Comments
 (0)