Skip to content

Commit 1a0fe16

Browse files
authored
Merge pull request #178868 from MicrosoftDocs/master
11/05 AM Publish
2 parents 8946cfa + 3667f1a commit 1a0fe16

30 files changed

+479
-217
lines changed

articles/active-directory/enterprise-users/domains-verify-custom-subdomain.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: enterprise-users
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 10/28/2021
13+
ms.date: 11/05/2021
1414
ms.author: curtand
1515
ms.reviewer: sumitp
1616

@@ -37,7 +37,7 @@ Because subdomains inherit the authentication type of the root domain by default
3737
New-MsolDomain -Name "child.mydomain.com" -Authentication Federated
3838
```
3939

40-
1. Use [Azure AD Graph Explorer](https://graphexplorer.azurewebsites.net) to GET the domain. Because the domain isn't a root domain, it inherits the root domain authentication type. Your command and results might look as follows, using your own tenant ID:
40+
1. Use the following example to GET the domain. Because the domain isn't a root domain, it inherits the root domain authentication type. Your command and results might look as follows, using your own tenant ID:
4141

4242
```http
4343
GET https://graph.windows.net/{tenant_id}/domains?api-version=1.6
@@ -61,7 +61,7 @@ Because subdomains inherit the authentication type of the root domain by default
6161
},
6262
```
6363

64-
### Use Azure AD Graph Explorer API to make this a root domain
64+
### Use Microsoft Graph API to make this a root domain
6565

6666
Use the following command to promote the subdomain:
6767

@@ -77,7 +77,7 @@ POST https://graph.windows.net/{tenant_id}/domains/child.mydomain.com/promote?ap
7777
Set-MsolDomainAuthentication -DomainName child.mydomain.com -Authentication Managed
7878
```
7979

80-
1. Verify via GET in Azure AD Graph Explorer that subdomain authentication type is now managed:
80+
1. Verify via GET in Microsoft Graph API that subdomain authentication type is now managed:
8181

8282
```http
8383
GET https://graph.windows.net/{{tenant_id} }/domains?api-version=1.6

articles/aks/http-proxy.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ Some more complex solutions may require creating a chain of trust to establish s
2121
## Limitations and other details
2222

2323
The following scenarios are **not** supported:
24+
- Monitoring addon
2425
- Different proxy configurations per node pool
2526
- Updating proxy settings post cluster creation
2627
- User/Password authentication

articles/automation/automation-security-overview.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides an overview of Azure Automation account authe
44
keywords: automation security, secure automation; automation authentication
55
services: automation
66
ms.subservice: process-automation
7-
ms.date: 10/26/2021
7+
ms.date: 11/05/2021
88
ms.topic: conceptual
99
ms.custom: devx-track-azurepowershell
1010
---
@@ -33,6 +33,9 @@ A managed identity from Azure Active Directory (Azure AD) allows your runbook to
3333

3434
Managed identities are the recommended way to authenticate in your runbooks, and is the default authentication method for your Automation account.
3535

36+
> [!NOTE]
37+
> When you create an Automation account, the option to create a Run As account is no longer available. However, we continue to support a RunAs account for existing and new Automation accounts. You can [create a Run As account](create-run-as-account.md) in your Automation account from the Azure portal or by using PowerShell.
38+
3639
Here are some of the benefits of using managed identities:
3740

3841
- Using a managed identity instead of the Automation Run As account simplifies management. You don't have to renew the certificate used by a Run As account.
@@ -63,7 +66,7 @@ To create or renew a Run As account, permissions are needed at three levels:
6366
- Automation account
6467

6568
> [!NOTE]
66-
> Azure Automation does not automatically create the Run As account. It has been replaced by using managed identities.
69+
> Azure Automation does not automatically create the Run As account, it has been replaced by using managed identities. However, we continue to support a RunAs account for existing and new Automation accounts. You can [create a Run As account](create-run-as-account.md) in your Automation account from the Azure portal or by using PowerShell.
6770
6871
### Subscription permissions
6972

articles/availability-zones/az-region.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Azure provides the most extensive global footprint of any cloud provider and is
2929
| East US | Norway East | | Korea Central |
3030
| East US 2 | UK South | | Southeast Asia |
3131
| South Central US | West Europe | | East Asia |
32-
| US Gov Virginia | Sweden* | | |
32+
| US Gov Virginia | Sweden | | |
3333
| West US 2 | | | |
3434
| West US 3 | | | |
3535

@@ -208,4 +208,4 @@ You can access Azure availability zones by using your Azure subscription. To lea
208208

209209
- [Building solutions for high availability using availability zones](/azure/architecture/high-availability/building-solutions-for-high-availability)
210210
- [High availability with Azure services](/azure/architecture/framework/resiliency/overview)
211-
- [Design patterns for high availability](/azure/architecture/framework/resiliency/app-design)
211+
- [Design patterns for high availability](/azure/architecture/framework/resiliency/app-design)

0 commit comments

Comments
 (0)