Skip to content

Commit 22115d3

Browse files
authored
Merge pull request #113438 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents cc10735 + bed9391 commit 22115d3

11 files changed

+11
-17
lines changed

articles/active-directory/develop/msal-net-system-browser-android-considerations.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ ms.author: marsma
1515
ms.reviewer: saeeda
1616
ms.custom: aaddev
1717
#Customer intent: As an application developer, I want to learn about considerations for using Xamarin Android and MSAL.NET so I can decide if this platform meets my application development needs.
18-
ms.collection: M365-identity-device-management
1918
---
2019

2120
# Xamarin Android system browser considerations for using MSAL.NET

articles/active-directory/develop/msal-net-uwp-considerations.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ ms.author: marsma
1515
ms.reviewer: saeeda
1616
ms.custom: aaddev
1717
#Customer intent: As an application developer, I want to learn about considerations for using Universal Windows Platform and MSAL.NET so that I can decide if this platform meets my application development needs.
18-
ms.collection: M365-identity-device-management
1918
---
2019

2120
# Considerations for using Universal Windows Platform with MSAL.NET

articles/active-directory/develop/msal-net-xamarin-android-considerations.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ ms.author: marsma
1515
ms.reviewer: saeeda
1616
ms.custom: aaddev
1717
#Customer intent: As an application developer, I want to learn about considerations for using Xamarin Android and MSAL.NET so that I can decide if this platform meets my application development needs.
18-
ms.collection: M365-identity-device-management
1918
---
2019

2120
# Considerations for using Xamarin Android with MSAL.NET

articles/active-directory/develop/msal-net-xamarin-ios-considerations.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ ms.author: marsma
1515
ms.reviewer: saeeda
1616
ms.custom: aaddev
1717
#Customer intent: As an application developer, I want to learn about considerations for using Xamarin iOS and MSAL.NET so I can decide if this platform meets my application development needs.
18-
ms.collection: M365-identity-device-management
1918
---
2019

2120
# Considerations for using Xamarin iOS with MSAL.NET

articles/active-directory/develop/scenario-mobile-app-registration.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ ms.author: jmprieur
1515
ms.reviewer: brandwe
1616
ms.custom: aaddev
1717
#Customer intent: As an application developer, I want to know how to write a mobile app that calls web APIs by using the Microsoft identity platform for developers.
18-
ms.collection: M365-identity-device-management
1918
---
2019

2120
# Register mobile apps that call web APIs

articles/active-directory/hybrid/how-to-connect-fed-group-claims.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,15 @@ ms.author: billmath
1414
author: billmath
1515
---
1616

17-
# Configure group claims for applications with Azure Active Directory (Public Preview)
17+
# Configure group claims for applications with Azure Active Directory
1818

1919
Azure Active Directory can provide a users group membership information in tokens for use within applications. Two main patterns are supported:
2020

21-
- Groups identified by their Azure Active Directory object identifier (OID) attribute (Generally Available)
22-
- Groups identified by sAMAccountName or GroupSID attributes for Active Directory (AD) synchronized groups and users (Public Preview)
21+
- Groups identified by their Azure Active Directory object identifier (OID) attribute
22+
- Groups identified by sAMAccountName or GroupSID attributes for Active Directory (AD) synchronized groups and users
2323

2424
> [!IMPORTANT]
25-
> There are a number of caveats to note for this preview functionality:
25+
> There are a number of caveats to note for this functionality:
2626
>
2727
>- Support for use of sAMAccountName and security identifier (SID) attributes synced from on-premises is designed to enable moving existing applications from AD FS and other identity providers. Groups managed in Azure AD do not contain the attributes necessary to emit these claims.
2828
>- In larger organizations the number of groups a user is a member of may exceed the limit that Azure Active Directory will add to a token. 150 groups for a SAML token, and 200 for a JWT. This can lead to unpredictable results. If your users have large numbers of group memberships, we recommend using the option to restrict the groups emitted in claims to the relevant groups for the application.

articles/active-directory/user-help/index.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ metadata:
1010
ms.service: active-directory
1111
ms.subservice: user-help
1212
ms.topic: landing-page
13-
ms.collection: M365-identity-device-management
1413
author: curtand
1514
ms.author: curtand
1615
ms.date: 08/26/2019

articles/advisor/advisor-high-availability-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Azure Advisor will identify Azure Cosmos DB accounts that are using old versions
8080

8181
## Upgrade your Azure Cosmos DB Java SDK to the latest version from Maven
8282

83-
Azure Advisor will identify Azure Cosmos DB accounts that are using old versions of the Java SDK and recommend upgrading to the latest version from Maven for the latest fixes, performance improvements, and new feature capabilities. [Learn more about Cosmos DB Java SDK](https://aka.ms/cosmosdb/sql-api-sdk-dotnet)
83+
Azure Advisor will identify Azure Cosmos DB accounts that are using old versions of the Java SDK and recommend upgrading to the latest version from Maven for the latest fixes, performance improvements, and new feature capabilities. [Learn more about Cosmos DB Java SDK](https://aka.ms/cosmosdb/sql-api-sdk-async-java)
8484

8585
## Upgrade your Azure Cosmos DB Spark Connector to the latest version from Maven
8686

articles/azure-monitor/app/asp-net-core.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ The [Application Insights SDK for ASP.NET Core](https://nuget.org/packages/Micro
2424
* **IDE**: Visual Studio, VS Code, or command line.
2525

2626
> [!NOTE]
27-
> If you are using ASP.NET Core 3.X along with Application Insights, please use the [2.8.0](https://www.nuget.org/packages/Microsoft.ApplicationInsights.AspNetCore/2.8.0) version or higher. This is the only version that supports ASP.NET Core 3.X.
27+
> ASP.NET Core 3.X requires [Application Insights 2.8.0](https://www.nuget.org/packages/Microsoft.ApplicationInsights.AspNetCore/2.8.0) or later.
2828
2929
## Prerequisites
3030

articles/key-vault/general/best-practices.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@ ms.author: mbaldwin
1717

1818
## Control Access to your vault
1919

20-
Azure Key Vault is a cloud service that safeguards encryption keys and secrets like certificates, connection strings, and passwords. Because this data is sensitive and business critical, you need to secure access to your key vaults by allowing only authorized applications and users. This [article](secure-your-key-vault.md)) provides an overview of the Key Vault access model. It explains authentication and authorization, and describes how to secure access to your key vaults.
20+
Azure Key Vault is a cloud service that safeguards encryption keys and secrets like certificates, connection strings, and passwords. Because this data is sensitive and business critical, you need to secure access to your key vaults by allowing only authorized applications and users. This [article](secure-your-key-vault.md) provides an overview of the Key Vault access model. It explains authentication and authorization, and describes how to secure access to your key vaults.
2121

2222
Suggestions while controlling access to your vault are as follows:
2323
1. Lock down access to your subscription, resource group and Key Vaults (RBAC)
2424
2. Create Access policies for every vault
2525
3. Use least privilege access principal to grant access
26-
4. Turn on Firewall and [VNET Service Endpoints](overview-vnet-service-endpoints.md))
26+
4. Turn on Firewall and [VNET Service Endpoints](overview-vnet-service-endpoints.md)
2727

2828
## Use separate Key Vault
2929

@@ -35,9 +35,9 @@ Make sure you take regular back ups of your [vault](https://blogs.technet.micros
3535

3636
## Turn on Logging
3737

38-
[Turn on logging](logging.md)) for your Vault. Also set up alerts.
38+
[Turn on logging](logging.md) for your Vault. Also set up alerts.
3939

4040
## Turn on recovery options
4141

42-
1. Turn on [Soft Delete](overview-soft-delete.md)).
42+
1. Turn on [Soft Delete](overview-soft-delete.md).
4343
2. Turn on purge protection if you want to guard against force deletion of the secret / vault even after soft-delete is turned on.

0 commit comments

Comments
 (0)