Skip to content

Commit 19c67b7

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into crosstenant
2 parents fc635fc + 8596cfb commit 19c67b7

File tree

1,043 files changed

+12382
-6925
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,043 files changed

+12382
-6925
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -528,7 +528,7 @@
528528
{
529529
"path_to_root": "azure-sdk-for-go-samples",
530530
"url": "https://github.com/Azure-Samples/azure-sdk-for-go-samples",
531-
"branch": "master",
531+
"branch": "main",
532532
"branch_mapping": {}
533533
},
534534
{

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@
6262
},
6363
{
6464
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds.md",
65-
"redirect_url": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
65+
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
6666
"redirect_document_id": false
6767
},
6868
{

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14968,6 +14968,11 @@
1496814968
"redirect_url": "/azure/defender-for-iot/organizations/tutorial-qradar",
1496914969
"redirect_document_id": false
1497014970
},
14971+
{
14972+
"source_path_from_root": "/articles/iot-edge/how-to-devops-starter.md",
14973+
"redirect_url": "/azure/iot-edge/how-to-continuous-integration-continuous-deployment-classic/",
14974+
"redirect_document_id": false
14975+
},
1497114976
{
1497214977
"source_path_from_root": "/articles/ansible/index.yml",
1497314978
"redirect_url": "/azure/developer/ansible/",
@@ -25208,6 +25213,11 @@
2520825213
"redirect_url": "/azure/azure-sql/managed-instance/scripts/create-configure-managed-instance-cli",
2520925214
"redirect_document_id": false
2521025215
},
25216+
{
25217+
"source_path_from_root": "/articles/azure-sql/managed-instance/azure-app-sync-network-configuration.md",
25218+
"redirect_url": "/azure/azure-sql/managed-instance/index.yml",
25219+
"redirect_document_id": false
25220+
},
2521125221
{
2521225222
"source_path_from_root": "/articles/sql-database/scripts/sql-database-copy-database-to-new-server-cli.md",
2521325223
"redirect_url": "/azure/azure-sql/database/scripts/copy-database-to-new-server-cli",

articles/active-directory-b2c/partner-f5.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Tutorial to enable Secure Hybrid Access to applications with Azure AD B2C and F5 BIG-IP
33
titleSuffix: Azure AD B2C
44
description: Learn how to integrate Azure AD B2C authentication with F5 BIG-IP for secure hybrid access
5-
author: NishthaBabith-V
6-
ms.author: v-nisba
5+
author: KarenH444
6+
ms.author: celested
77
manager: CelesteDG
88
ms.reviewer: kengaderdus
99
ms.service: active-directory

articles/active-directory-b2c/quickstart-web-app-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ In this quickstart, you use an ASP.NET application to sign in using a social ide
3131
git clone https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi.git
3232
```
3333
34-
There are two projects are in the sample solution:
34+
There are two projects in the sample solution:
3535
3636
- **TaskWebApp** - A web application that creates and edits a task list. The web application uses the **sign-up or sign-in** user flow to sign up or sign in users.
3737
- **TaskService** - A web API that supports the create, read, update, and delete task list functionality. The web API is protected by Azure AD B2C and called by the web application.

articles/active-directory-domain-services/network-considerations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ As you design the virtual network for Azure AD DS, the following considerations
4242
4343
A managed domain connects to a subnet in an Azure virtual network. Design this subnet for Azure AD DS with the following considerations:
4444

45-
* A managed domain must be deployed in its own subnet. Don't use an existing subnet or a gateway subnet.
45+
* A managed domain must be deployed in its own subnet. Don't use an existing subnet or a gateway subnet. This includes the usage of remote gateways settings in the virtual network peering which puts the managed domain in an unsupported state.
4646
* A network security group is created during the deployment of a managed domain. This network security group contains the required rules for correct service communication.
4747
* Don't create or use an existing network security group with your own custom rules.
4848
* A managed domain requires 3-5 IP addresses. Make sure that your subnet IP address range can provide this number of addresses.
@@ -188,4 +188,4 @@ For more information about some of the network resources and connection options
188188

189189
* [Azure virtual network peering](../virtual-network/virtual-network-peering-overview.md)
190190
* [Azure VPN gateways](../vpn-gateway/vpn-gateway-about-vpn-gateway-settings.md)
191-
* [Azure network security groups](../virtual-network/network-security-groups-overview.md)
191+
* [Azure network security groups](../virtual-network/network-security-groups-overview.md)

articles/active-directory/app-provisioning/provision-on-demand.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 05/11/2021
11+
ms.date: 03/09/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -147,7 +147,8 @@ There are currently a few known limitations to on-demand provisioning. Post your
147147
* Amazon Web Services (AWS) application does not support on-demand provisioning.
148148
* On-demand provisioning of groups and roles isn't supported.
149149
* On-demand provisioning supports disabling users that have been unassigned from the application. However, it doesn't support disabling or deleting users that have been disabled or deleted from Azure AD. Those users won't appear when you search for a user.
150+
* Provisioning multiple roles on a user isn't supported by on-demand provisioning.
150151

151152
## Next steps
152153

153-
* [Troubleshooting provisioning](./application-provisioning-config-problem.md)
154+
* [Troubleshooting provisioning](./application-provisioning-config-problem.md)

articles/active-directory/app-provisioning/skip-out-of-scope-deletions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Copy the updated text from Step 3 into the "Request Body".
7676

7777
Click on “Run Query”.
7878

79-
You should get the output as "Success – Status Code 204".
79+
You should get the output as "Success – Status Code 204". If you receive an error you may need to check that your account has Read/Write permissions for ServicePrincipalEndpoint. You can find this permission by clicking on the *Modify permissions* tab in Graph Explorer.
8080

8181
![PUT response](./media/skip-out-of-scope-deletions/skip-06.png)
8282

articles/active-directory/app-provisioning/use-scim-to-build-users-and-groups-endpoints.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ The default token validation code is configured to use an Azure AD token and req
9999

100100
After you deploy the SCIM endpoint, you can test to ensure that it's compliant with SCIM RFC. This example provides a set of tests in Postman that validate CRUD (create, read, update, and delete) operations on users and groups, filtering, updates to group membership, and disabling users.
101101

102-
The endpoints are in the `{host}/scim/` directory, and you can use standard HTTP requests to interact with them. To modify the `/scim/` route, see *TokenController.cs* in **SCIMReferenceCode** > **Microsoft.SCIM.WebHostSample** > **Controllers**.
102+
The endpoints are in the `{host}/scim/` directory, and you can use standard HTTP requests to interact with them. To modify the `/scim/` route, see *ControllerConstant.cs* in **AzureADProvisioningSCIMreference** > **ScimReferenceApi** > **Controllers**.
103103

104104
> [!NOTE]
105105
> You can only use HTTP endpoints for local tests. The Azure AD provisioning service requires that your endpoint support HTTPS.
@@ -141,4 +141,4 @@ To develop a SCIM-compliant user and group endpoint with interoperability for a
141141

142142
> [!div class="nextstepaction"]
143143
> [Tutorial: Develop and plan provisioning for a SCIM endpoint](use-scim-to-provision-users-and-groups.md)
144-
> [Tutorial: Configure provisioning for a gallery app](configure-automatic-user-provisioning-portal.md)
144+
> [Tutorial: Configure provisioning for a gallery app](configure-automatic-user-provisioning-portal.md)

articles/active-directory/app-proxy/application-proxy-high-availability-load-balancing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Connectors establish their connections based on principles for high availability
2828
![Diagram showing connections between users and connectors](media/application-proxy-high-availability-load-balancing/application-proxy-connections.png)
2929

3030
1. A user on a client device tries to access an on-premises application published through Application Proxy.
31-
2. The request goes through an Azure Load Balancer to determine which Application Proxy service instance should take the request. Per region, there are tens of instances available to accept the request. This method helps to evenly distribute the traffic across the service instances.
31+
2. The request goes through an Azure Load Balancer to determine which Application Proxy service instance should take the request. There are tens of instances available to accept the requests for all traffic in the region. This method helps to evenly distribute the traffic across the service instances.
3232
3. The request is sent to [Service Bus](../../service-bus-messaging/index.yml).
3333
4. Service Bus signals to an available connector. The connector then picks up the request from Service Bus.
3434
- In step 2, requests go to different Application Proxy service instances, so connections are more likely to be made with different connectors. As a result, connectors are almost evenly used within the group.
@@ -89,4 +89,4 @@ Refer to your software vendor's documentation to understand the load-balancing r
8989
- [Enable single-sign on](application-proxy-configure-single-sign-on-with-kcd.md)
9090
- [Enable Conditional Access](./application-proxy-integrate-with-sharepoint-server.md)
9191
- [Troubleshoot issues you're having with Application Proxy](application-proxy-troubleshoot.md)
92-
- [Learn how Azure AD architecture supports high availability](../fundamentals/active-directory-architecture.md)
92+
- [Learn how Azure AD architecture supports high availability](../fundamentals/active-directory-architecture.md)

0 commit comments

Comments
 (0)