Skip to content

Commit 2ab484c

Browse files
authored
Merge pull request #159504 from MicrosoftDocs/master
Unscheduled publish
2 parents a9f131f + e829cdf commit 2ab484c

File tree

5 files changed

+7
-106
lines changed

5 files changed

+7
-106
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19668,6 +19668,11 @@
1966819668
"redirect_url": "/azure/devtest-labs/use-paas-services",
1966919669
"redirect_document_id": true
1967019670
},
19671+
{
19672+
"source_path_from_root": "/articles/digital-twins/how-to-create-twin-level-role-based-access-control.md",
19673+
"redirect_url": "/azure/digital-twins/how-to-use-tags",
19674+
"redirect_document_id": false
19675+
},
1967119676
{
1967219677
"source_path_from_root": "/articles/digital-twins/how-to-use-cli.md",
1967319678
"redirect_url": "/azure/digital-twins/concepts-cli",

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 05/18/2021
9+
ms.date: 05/19/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -67,7 +67,7 @@ Policy 1: All users with the directory role of Global administrator, accessing t
6767
1. Confirm your settings and set **Enable policy** to **On**.
6868
1. Select **Create** to create to enable your policy.
6969

70-
Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding filters for devices using rule expression device.extensionAttribute1 not equals SAW and for Access controls, Block.
70+
Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding filters for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
7171

7272
1. Select **New policy**.
7373
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.

articles/digital-twins/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,8 +101,6 @@
101101
href: how-to-create-azure-function.md
102102
- name: Query the twin graph
103103
href: how-to-query-graph.md
104-
- name: Create twin-level RBAC with marker tags
105-
href: how-to-create-twin-level-role-based-access-control.md
106104
- name: Develop client apps
107105
items:
108106
- name: Make requests with Postman

articles/digital-twins/how-to-create-twin-level-role-based-access-control.md

Lines changed: 0 additions & 102 deletions
This file was deleted.

0 commit comments

Comments
 (0)