Skip to content

Commit 1887fea

Browse files
authored
Merge pull request #183643 from MicrosoftDocs/master
Merge default branch to live Sunday 4:00 PM
2 parents e3f1d84 + a790f8d commit 1887fea

File tree

49 files changed

+312
-138
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+312
-138
lines changed

articles/active-directory/governance/entitlement-management-access-package-approval-policy.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,21 @@ If you selected a multi-stage approval, you'll need to add an approver for each
114114

115115
1. Specify the number of days the second approver has to approve the request in the box under **Decision must be made in how many days?**.
116116

117+
1. Set the Require approver justification toggle to **Yes** or **No**.
118+
119+
You also have the option to add an additional stage for a three-stage approval process. For example, you might want an employee’s manager to be the first stage approver for an access package. But, one of the resources in the access package contains confidential information. In this case, you could designate the resource owner as a second approver and a security reviewer as the third approver (Preview).
120+
121+
1. Add the **Third Approver (Preview)**:
122+
123+
If the users are in your directory, add a specific user as the third approver by clicking **Add approvers** under Choose specific approvers.
124+
125+
If the users aren't in your directory, select **Internal sponsor** or **External sponsor** as the third approver. After selecting the approver, add the fallback approvers.
126+
127+
> [!NOTE]
128+
> <ul>Like the second stage, if the users are in your directory and **Manager as approver** is selected in either the first or second stage of approval, you will only see an option to select specific approvers for the third stage of approval.</ul><ul>If you want to designate the manager as a third approver, you can adjust your selections in the previous approval stages to ensure that **Manager as approver** isn’t selected. Then, you should see **Manager as approver** as an option in the dropdown.</ul><ul>If the users aren’t in your directory and you have not selected **Internal sponsor** or **External sponsor** as approvers in previous stages, you will see them as options for **Third Approver**. Otherwise, you will only be able to select **Choose specific approvers**.</ul>
129+
130+
1. Specify the number of days the third approver (Preview) has to approve the request in the box under **Decision must be made in how many days?**.
131+
117132
1. Set the Require approver justification toggle to **Yes** or **No**.
118133

119134
### Alternate approvers

articles/active-directory/managed-identities-azure-resources/managed-identities-status.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The following Azure services support managed identities for Azure resources:
3838
| Azure Container Registry | [Use an Azure-managed identity in ACR Tasks](../../container-registry/container-registry-tasks-authentication-managed-identity.md) |
3939
| Azure Cognitive Services | [Configure customer-managed keys with Azure Key Vault for Cognitive Services](../../cognitive-services/encryption/cognitive-services-encryption-keys-portal.md) |
4040
| Azure Data Box | [Use customer-managed keys in Azure Key Vault for Azure Data Box](../../databox/data-box-customer-managed-encryption-key-portal.md) |
41-
| Azure Data Explorer | [Configure managed identities for your Azure Data Explorer cluster](https://docs.microsoft.com/azure/data-explorer/configure-managed-identities-cluster?tabs=portal) |
41+
| Azure Data Explorer | [Configure managed identities for your Azure Data Explorer cluster](/azure/data-explorer/configure-managed-identities-cluster?tabs=portal) |
4242
| Azure Data Factory | [Managed identity for Data Factory](../../data-factory/data-factory-service-identity.md) |
4343
| Azure Data Lake Storage Gen1 | [Customer-managed keys for Azure Storage encryption](../../storage/common/customer-managed-keys-overview.md) |
4444
| Azure Data Share | [Roles and requirements for Azure Data Share](../../data-share/concepts-roles-permissions.md) |
@@ -50,7 +50,7 @@ The following Azure services support managed identities for Azure resources:
5050
| Azure Kubernetes Service (AKS) | [Use managed identities in Azure Kubernetes Service](../../aks/use-managed-identity.md) |
5151
| Azure Logic Apps | [Authenticate access to Azure resources using managed identities in Azure Logic Apps](../../logic-apps/create-managed-service-identity.md) |
5252
| Azure Log Analytics cluster | [Azure Monitor customer-managed key](../../azure-monitor/logs/customer-managed-keys.md)
53-
| Azure Machine Learning Services | [Use Managed identities with Azure Machine Learning](/machine-learning/how-to-use-managed-identities.md?tabs=python) |
53+
| Azure Machine Learning Services | [Use Managed identities with Azure Machine Learning](/azure/machine-learning/how-to-use-managed-identities?tabs=python) |
5454
| Azure Managed Disk | [Use the Azure portal to enable server-side encryption with customer-managed keys for managed disks](../../virtual-machines/disks-enable-customer-managed-keys-portal.md) |
5555
| Azure Media services | [Managed identities](../../media-services/latest/concept-managed-identities.md) |
5656
| Azure Monitor | [Azure Monitor customer-managed key](../../azure-monitor/logs/customer-managed-keys.md?tabs=portal) |

articles/active-directory/managed-identities-azure-resources/services-azure-active-directory-support.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,19 +23,19 @@ The following services support Azure AD authentication. New services are added t
2323
| Azure Batch | [Authenticate Batch service solutions with Active Directory](../../batch/batch-aad-auth.md) |
2424
| Azure Container Registry | [Authenticate with an Azure container registry](../../container-registry/container-registry-authentication.md) |
2525
| Azure Cognitive Services | [Authenticate requests to Azure Cognitive Services](../../cognitive-services/authentication.md?tabs=powershell#authenticate-with-azure-active-directory) |
26-
| Azure Databricks | [Authenticate using Azure Active Directory tokens](https://docs.microsoft.com/azure/databricks/dev-tools/api/latest/aad/)
27-
| Azure Data Explorer | [How-To Authenticate with Azure Active Directory for Azure Data Explorer Access](https://docs.microsoft.com/azure/data-explorer/kusto/management/access-control/how-to-authenticate-with-aad) |
26+
| Azure Databricks | [Authenticate using Azure Active Directory tokens](/azure/databricks/dev-tools/api/latest/aad/)
27+
| Azure Data Explorer | [How-To Authenticate with Azure Active Directory for Azure Data Explorer Access](/azure/data-explorer/kusto/management/access-control/how-to-authenticate-with-aad) |
2828
| Azure Data Lake Storage Gen1 | [Authentication with Azure Data Lake Storage Gen1 using Azure Active Directory](../../data-lake-store/data-lakes-store-authentication-using-azure-active-directory.md) |
2929
| Azure Digital Twins | [Set up an Azure Digital Twins instance and authentication (portal)](../../digital-twins/how-to-set-up-instance-portal.md#set-up-user-access-permissions) |
3030
| Azure Event Hubs | [Authenticate an application with Azure Active Directory to access Event Hubs resources](../../event-hubs/authenticate-application.md)
3131
| Azure IoT Hub | [Control access to IoT Hub](../../iot-hub/iot-hub-devguide-security.md) |
3232
| Azure Key Vault | [Authentication in Azure Key Vault](../../key-vault/general/authentication.md)
3333
| Azure Kubernetes Service (AKS) | [Control access to cluster resources using Kubernetes role-based access control and Azure Active Directory identities in Azure Kubernetes Service](../../aks/azure-ad-rbac.md) |
34-
| Azure Machine Learning Services | [Set up authentication for Azure Machine Learning resources and workflows](/machine-learning/how-to-setup-authentication.md) |
34+
| Azure Machine Learning Services | [Set up authentication for Azure Machine Learning resources and workflows](/azure/machine-learning/how-to-setup-authentication) |
3535
| Azure Maps | [Manage authentication in Azure Maps](../../azure-maps/how-to-manage-authentication.md) |
3636
| Azure Media services | [Access the Azure Media Services API with Azure AD authentication](../../media-services/previous/media-services-use-aad-auth-to-access-ams-api.md) |
3737
| Azure Monitor | [Azure AD authentication for Application Insights (Preview)](../../azure-monitor/app/azure-ad-authentication.md?tabs=net) |
38-
| Azure Resource Manager | [Azure security baseline for Azure Resource Manager](https://docs.microsoft.com/security/benchmark/azure/baselines/resource-manager-security-baseline?toc=/azure/azure-resource-manager/management/toc.json)
38+
| Azure Resource Manager | [Azure security baseline for Azure Resource Manager](/security/benchmark/azure/baselines/resource-manager-security-baseline?toc=/azure/azure-resource-manager/management/toc.json)
3939
| Azure Service Fabric | [Set up Azure Active Directory for client authentication](../../service-fabric/service-fabric-cluster-creation-setup-aad.md) |
4040
| Azure Service Bus | [Service Bus authentication and authorization](../../service-bus-messaging/service-bus-authentication-and-authorization.md)
4141
| Azure SignalR Service | [Authorize access with Azure Active Directory for Azure SignalR Service](../../azure-signalr/signalr-concept-authorize-azure-active-directory.md) |
@@ -47,6 +47,6 @@ The following services support Azure AD authentication. New services are added t
4747

4848
## Next steps
4949

50-
- [Azure China developer guide](https://docs.microsoft.com/azure/china/resources-developer-guide)
50+
- [Azure China developer guide](/azure/china/resources-developer-guide)
5151
- [Compare Azure Government and global Azure](../../azure-government/compare-azure-government-global-azure.md)
5252
- [Azure services that can use Managed identities to access other services](managed-identities-status.md)

articles/application-gateway/configuration-infrastructure.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,9 @@ Application Gateway (Standard_v2 or WAF_v2 SKU) can support up to 125 instances
3535
> [!IMPORTANT]
3636
> Although a /24 subnet is not required per Application Gateway v2 SKU deployment, it is highly recommended. This is to ensure that Application Gateway v2 has sufficient space for autoscaling expansion and maintenance upgrades. You should ensure that the Application Gateway v2 subnet has sufficient address space to accommodate the number of instances required to serve your maximum expected traffic. If you specify the maximum instance count, then the subnet should have capacity for at least that many addresses. For capacity planning around instance count, see [instance count details](understanding-pricing.md#instance-count).
3737
38+
> [!TIP]
39+
> IP addresses are allocated from the beginning of the defined subnet space for gateway instances. As instances are created and removed due to creation of gateways or scaling events, it can become difficult to understand what the next available address is in the subnet. To be able to determine the next address to use for a future gateway and have a contiguous addressing theme for frontend IPs, consider assigning frontend IP addresses from the upper half of the defined subset space. For example, if my subnet address space is 10.5.5.0/24, consider setting the frontend IP of your gateways starting with 10.5.5.254 and then following with 10.5.5.253, 10.5.5.252, 10.5.5.251, and so forth for future gateways.
40+
3841
> [!TIP]
3942
> It is possible to change the subnet of an existing Application Gateway within the same virtual network. You can do this using Azure PowerShell or Azure CLI. For more information, see [Frequently asked questions about Application Gateway](application-gateway-faq.yml#can-i-change-the-virtual-network-or-subnet-for-an-existing-application-gateway)
4043

articles/automation/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@
3838
- name: Automation runbook types
3939
href: automation-runbook-types.md
4040
- name: PowerShell DSC
41-
href: /powershell/dsc/overview/overview
41+
href: /powershell/dsc/overview
4242
- name: Automation network configuration details
4343
href: automation-network-configuration.md
4444
- name: Security

articles/azure-functions/functions-how-to-azure-devops.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,11 @@ YAML pipelines aren't available for Azure DevOps 2019 and earlier.
1818

1919
* A GitHub account, where you can create a repository. If you don't have one, you can [create one for free](https://github.com).
2020

21-
* An Azure DevOps organization. If you don't have one, you can [create one for free](//azure/devops/get-started/pipelines-sign-up.md). (An Azure DevOps organization is different from your GitHub organization. You can give your DevOps organization and your GitHub organization the same name if you want alignment between them.)
21+
* An Azure DevOps organization. If you don't have one, you can [create one for free](/azure/devops/pipelines/get-started/pipelines-sign-up). (An Azure DevOps organization is different from your GitHub organization. You can give your DevOps organization and your GitHub organization the same name if you want alignment between them.)
2222

2323
If your team already has one, then make sure you're an administrator of the Azure DevOps project that you want to use.
2424

25-
* An ability to run pipelines on Microsoft-hosted agents. You can either purchase a [parallel job](/azure/devops/licensing/concurrent-jobs.md) or you can request a free tier. To request a free tier, follow the instructions in [this article](/azure/devops/licensing/concurrent-jobs.md). Note that it may take us 2-3 business days to grant access to the free tier.
25+
* An ability to run pipelines on Microsoft-hosted agents. You can either purchase a [parallel job](/azure/devops/pipelines/licensing/concurrent-jobs) or you can request a free tier. To request a free tier, follow the instructions in [this article](/azure/devops/pipelines/licensing/concurrent-jobs). Note that it may take us 2-3 business days to grant access to the free tier.
2626

2727
## Create your function app
2828

@@ -235,7 +235,7 @@ steps:
235235
236236
## Deploy your app
237237
238-
You'll deploy with the [Azure Function App Deploy](/azure/devops/pipelines/tasks/deploy/azure-function-app.md) task. This task requires an [Azure service connection](/azure/devops/pipelines/library/service-endpoints) as an input. An Azure service connection stores the credentials to connect from Azure Pipelines to Azure.
238+
You'll deploy with the [Azure Function App Deploy](/azure/devops/pipelines/tasks/deploy/azure-function-app) task. This task requires an [Azure service connection](/azure/devops/pipelines/library/service-endpoints) as an input. An Azure service connection stores the credentials to connect from Azure Pipelines to Azure.
239239
240240
# [YAML](#tab/yaml)
241241
@@ -282,7 +282,7 @@ You can automatically deploy your code to Azure Functions as a custom container
282282

283283
# [YAML](#tab/yaml/)
284284

285-
The simplest way to deploy to a container is to use the [Azure Function App on Container Deploy task](/azure/devops/pipelines/tasks/deploy/azure-rm-functionapp-containers.md).
285+
The simplest way to deploy to a container is to use the [Azure Function App on Container Deploy task](/azure/devops/pipelines/tasks/deploy/azure-rm-functionapp-containers).
286286

287287
To deploy, add the following snippet at the end of your YAML file:
288288

@@ -312,7 +312,7 @@ The snippet pushes the Docker image to your Azure Container Registry. The **Azur
312312

313313
# [Classic](#tab/classic/)
314314

315-
The best way to deploy your function app as a container is to use the [Azure Function App on Container Deploy task](/azure/devops/pipelines/tasks/deploy/azure-rm-functionapp-containers.md) in your release pipeline.
315+
The best way to deploy your function app as a container is to use the [Azure Function App on Container Deploy task](/azure/devops/pipelines/tasks/deploy/azure-rm-functionapp-containers) in your release pipeline.
316316

317317

318318
How you deploy your app depends on your app's programming language. Each language has a template with specific deploy steps. If you can't find a template for your language, select the generic **Azure App Service Deployment** template.

articles/azure-netapp-files/cross-region-replication-introduction.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ Azure NetApp Files volume replication is supported between various [Azure region
4040
| North America | East US | West US |
4141
| North America | East US 2 | Central US |
4242
| North America | North Central US | South Central US|
43+
| North America | West US 3 | East US |
4344
| Norway | Norway East | Norway West |
4445
| Switzerland | Switzerland North | Switzerland West |
4546
| UK | UK South | UK West |

0 commit comments

Comments
 (0)