Skip to content

Commit 2882484

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into 3-15-vs
2 parents a460741 + 8598cc1 commit 2882484

File tree

161 files changed

+1524
-815
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

161 files changed

+1524
-815
lines changed

articles/active-directory/app-provisioning/skip-out-of-scope-deletions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Copy the updated text from Step 3 into the "Request Body".
7676

7777
Click on “Run Query”.
7878

79-
You should get the output as "Success – Status Code 204".
79+
You should get the output as "Success – Status Code 204". If you receive an error you may need to check that your account has Read/Write permissions for ServicePrincipalEndpoint. You can find this permission by clicking on the *Modify permissions* tab in Graph Explorer.
8080

8181
![PUT response](./media/skip-out-of-scope-deletions/skip-06.png)
8282

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-product-data-sources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ You can use the **Data Collectors** dashboard in CloudKnox Permissions Managemen
6262
1. Select the ellipses **(...)** at the end of the row in the table.
6363
1. Select **Edit Configuration**.
6464

65-
The **M-CIEM Onboarding - Summary** box displays.
65+
The **CloudKnox Onboarding - Summary** box displays.
6666

6767
1. Select **Edit** (the pencil icon) for each field you want to change.
6868
1. Select **Verify now & save**.

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection: M365-identity-device-management
1616
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy authentication doesn't support multifactor authentication (MFA). MFA is in many environments a common requirement to address identity theft.
1717

1818
> [!NOTE]
19-
> Effective October 1, 2022, we will begin to permanently disable Basic Authentication for Exchange Online in all Microsoft 365 tenants regardless of usage, except for SMTP Authentication.
19+
> Effective October 1, 2022, we will begin to permanently disable Basic Authentication for Exchange Online in all Microsoft 365 tenants regardless of usage, except for SMTP Authentication. Read more [here](/exchange/clients-and-mobile-in-exchange-online/deprecation-of-basic-authentication-exchange-online)
2020
2121
Alex Weinert, Director of Identity Security at Microsoft, in his March 12, 2020 blog post [New tools to block legacy authentication in your organization](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/new-tools-to-block-legacy-authentication-in-your-organization/ba-p/1225302#) emphasizes why organizations should block legacy authentication and what other tools Microsoft provides to accomplish this task:
2222

articles/active-directory/hybrid/how-to-connect-install-prerequisites.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,6 @@ Before you install Azure AD Connect, there are a few things that you need.
3636

3737
### On-premises Active Directory
3838
* The Active Directory schema version and forest functional level must be Windows Server 2003 or later. The domain controllers can run any version as long as the schema version and forest-level requirements are met.
39-
* If you plan to use the feature *password writeback*, the domain controllers must be on Windows Server 2016 or later.
4039
* The domain controller used by Azure AD must be writable. Using a read-only domain controller (RODC) *isn't supported*, and Azure AD Connect doesn't follow any write redirects.
4140
* Using on-premises forests or domains by using "dotted" (name contains a period ".") NetBIOS names *isn't supported*.
4241
* We recommend that you [enable the Active Directory recycle bin](how-to-connect-sync-recycle-bin.md).

articles/active-directory/standards/memo-22-09-meet-identity-requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
# Meeting identity requirements of Memorandum 22-09 with Azure Active Directory
1919

20-
This series of articles offer guidance for employing Azure Active Directory (Azure AD) as a centralized identity management system for implementing Zero Trust principles as described by the US Federal Government’s Office of Management and Budget (OMB) [Memorandum M-22-09](https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf). Throughout this document wee refer to it as "The memo."
20+
This series of articles offer guidance for employing Azure Active Directory (Azure AD) as a centralized identity management system for implementing Zero Trust principles as described by the US Federal Government’s Office of Management and Budget (OMB) [Memorandum M-22-09](https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf). Throughout this document we refer to it as "The memo."
2121

2222
The release of Memorandum 22-09 is designed to support Zero trust initiatives within federal agencies; it also provides regulatory guidance in supporting Federal Cybersecurity and Data Privacy Laws. The Memo cites the [Department of Defense (DoD) Zero Trust Reference Architecture](https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v1.1(U)_Mar21.pdf),
2323

articles/applied-ai-services/form-recognizer/includes/get-started/java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ You will create the following directory structure:
9292

9393
:::image type="content" source="../../media/quickstarts/java-directories.png" alt-text="Screenshot: Java directory structure":::
9494

95-
Navigate to the java directory and create a file called *FormRecognizer.java*. Open it in your preferred editor or IDE and add the following package declaration and `import` statements:
95+
Navigate to the Java directory and create a file called *FormRecognizer.java*. Open it in your preferred editor or IDE and add the following package declaration and `import` statements:
9696

9797
```java
9898
import com.azure.ai.formrecognizer.*;

articles/azure-functions/bring-dependency-to-functions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ One of the simplest ways to bring in dependencies is to put the files/artifact t
8484
| - local.settings.json
8585
| - pom.xml
8686
```
87-
For java specifically, you need to specifically include the artifacts into the build/target folder when copying resources. Here's an example on how to do it in Maven:
87+
For Java specifically, you need to specifically include the artifacts into the build/target folder when copying resources. Here's an example on how to do it in Maven:
8888

8989
```xml
9090
...

articles/azure-functions/functions-how-to-github-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -330,7 +330,7 @@ env:
330330
AZURE_FUNCTIONAPP_NAME: your-app-name # set this to your function app name on Azure
331331
POM_XML_DIRECTORY: '.' # set this to the directory which contains pom.xml file
332332
POM_FUNCTIONAPP_NAME: your-app-name # set this to the function app name in your local development environment
333-
JAVA_VERSION: '1.8.x' # set this to the java version to use
333+
JAVA_VERSION: '1.8.x' # set this to the Java version to use
334334
335335
jobs:
336336
build-and-deploy:

articles/azure-functions/functions-versions.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,8 @@ The following are some changes to be aware of before upgrading a 3.x app to 4.x.
149149

150150
- Default and maximum timeouts are now enforced in 4.x Linux consumption function apps. ([#1915](https://github.com/Azure/Azure-Functions/issues/1915))
151151

152+
- Azure Functions 4.x uses Azure.Identity and Azure.Security.KeyVault.Secrets for the Key Vault provider and has deprecated the use of Microsoft.Azure.KeyVault. See the Key Vault option in [Secret Repositories](security-concepts.md#secret-repositories) for more information on how to configure function app settings. ([#2048](https://github.com/Azure/Azure-Functions/issues/2048))
153+
152154
- Function apps that share storage accounts will fail to start if their computed hostnames are the same. Use a separate storage account for each function app. ([#2049](https://github.com/Azure/Azure-Functions/issues/2049))
153155

154156
::: zone pivot="programming-language-csharp"
330 KB
Loading

0 commit comments

Comments
 (0)