Skip to content

Commit 2c6372f

Browse files
authored
Merge pull request #216752 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents f889353 + 2c8c60d commit 2c6372f

File tree

8 files changed

+15
-16
lines changed

8 files changed

+15
-16
lines changed

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ On Windows 7, iOS, Android, and macOS Azure AD identifies the device using a cli
127127

128128
#### Chrome support
129129

130-
For Chrome support in **Windows 10 Creators Update (version 1703)** or later, install the [Windows 10 Accounts](https://chrome.google.com/webstore/detail/windows-10-accounts/ppnbnpeolgkicgegkbkbjmhlideopiji) or [Office Online](https://chrome.google.com/webstore/detail/office/ndjpnladcallmjemlbaebfadecfhkepb) extensions. These extensions are required when a Conditional Access policy requires device-specific details.
130+
For Chrome support in **Windows 10 Creators Update (version 1703)** or later, install the [Windows Accounts](https://chrome.google.com/webstore/detail/windows-accounts/ppnbnpeolgkicgegkbkbjmhlideopiji) or [Office](https://chrome.google.com/webstore/detail/office/ndjpnladcallmjemlbaebfadecfhkepb) extensions. These extensions are required when a Conditional Access policy requires device-specific details.
131131

132132
To automatically deploy this extension to Chrome browsers, create the following registry key:
133133

articles/active-directory/devices/howto-hybrid-azure-ad-join.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Hybrid Azure AD join requires devices to have access to the following Microsoft
4242
- Your organization's Security Token Service (STS) (**For federated domains**)
4343

4444
> [!WARNING]
45-
> If your organization uses proxy servers that intercept SSL traffic for scenarios like data loss prevention or Azure AD tenant restrictions, ensure that traffic to `https://devices.login.microsoftonline.com` is excluded from TLS break-and-inspect. Failure to exclude this URL may cause interference with client certificate authentication, cause issues with device registration, and device-based Conditional Access.
45+
> If your organization uses proxy servers that intercept SSL traffic for scenarios like data loss prevention or Azure AD tenant restrictions, ensure that traffic to `https://device.login.microsoftonline.com` is excluded from TLS break-and-inspect. Failure to exclude this URL may cause interference with client certificate authentication, cause issues with device registration, and device-based Conditional Access.
4646
4747
If your organization requires access to the internet via an outbound proxy, you can use [Web Proxy Auto-Discovery (WPAD)](/previous-versions/tn-archive/cc995261(v=technet.10)) to enable Windows 10 or newer computers for device registration with Azure AD. To address issues configuring and managing WPAD, see [Troubleshooting Automatic Detection](/previous-versions/tn-archive/cc302643(v=technet.10)).
4848

articles/azure-arc/kubernetes/tutorial-use-gitops-flux2.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,6 @@ To manage GitOps through the Azure CLI or the Azure portal, you need the followi
4545
> For new AKS clusters created with “az aks create”, the cluster will be MSI-based by default. For already created SPN-based clusters that need to be converted to MSI run “az aks update -g $RESOURCE_GROUP -n $CLUSTER_NAME --enable-managed-identity”. For more information, refer to [managed identity docs](../../aks/use-managed-identity.md).
4646
4747
* Read and write permissions on the `Microsoft.ContainerService/managedClusters` resource type.
48-
* Registration of your subscription with the `AKS-ExtensionManager` feature flag. Use the following command:
49-
50-
```console
51-
az feature register --namespace Microsoft.ContainerService --name AKS-ExtensionManager
52-
```
5348

5449
### Common to both cluster types
5550

articles/cloud-shell/troubleshooting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -184,8 +184,8 @@ In order to **delete** your user settings Cloud Shell saves for you such as pref
184184
Bash:
185185

186186
```
187-
token=$(az account get-access-token --resource "https://management.azure.com/" | jq -r ".accessToken")
188-
curl -X DELETE https://management.azure.com/providers/Microsoft.Portal/usersettings/cloudconsole?api-version=2017-12-01-preview -H Authorization:"Bearer $token"
187+
token="Bearer $(az account get-access-token --resource "https://management.azure.com/" | jq -r ".accessToken")"
188+
curl -X DELETE https://management.azure.com/providers/Microsoft.Portal/usersettings/cloudconsole?api-version=2017-12-01-preview -H Authorization:"$token"
189189
```
190190

191191
PowerShell:

articles/deployment-environments/quickstart-create-access-environments.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,19 +81,19 @@ Run the following steps in Azure CLI to create an Environment and configure reso
8181
az devcenter dev catalog-item list --dev-center <name> --project-name <name> -o table
8282
```
8383
84-
1. Create an environment by using a *catalog-item* ('infra-as-code' template) from the list of available catalog items.
84+
1. Create an environment by using a *catalog-item* ('infra-as-code' template defined in the [manifest.yaml](configure-catalog-item.md#add-a-new-catalog-item) file) from the list of available catalog items.
8585
```azurecli
8686
az devcenter dev environment create --dev-center-name <devcenter-name>
8787
--project-name <project-name> -n <name> --environment-type <environment-type-name>
8888
--catalog-item-name <catalog-item-name> ---catalog-name <catalog-name>
8989
```
9090
91-
If the specific *catalog-item* requires any parameters use `--deployment-parameters` and provide the parameters as a json-string or json-file, for example:
91+
If the specific *catalog-item* requires any parameters use `--parameters` and provide the parameters as a json-string or json-file, for example:
9292
```json
9393
$params = "{ 'name': 'firstMsi', 'location': 'northeurope' }"
9494
az devcenter dev environment create --dev-center-name <devcenter-name>
9595
--project-name <project-name> -n <name> --environment-type <environment-type-name>
96-
--catalog-item-name <catalog-item-name> ---catalog-name <catalog-name>
96+
--catalog-item-name <catalog-item-name> --catalog-name <catalog-name>
9797
--parameters $params
9898
```
9999

articles/deployment-environments/quickstart-create-and-configure-devcenter.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,13 +106,17 @@ After you've created a dev center, the next step is to attach an [identity](conc
106106
|**Name**|Provide a name for your catalog.|
107107
|**Git clone URI**|Provide the URI to your GitHub or ADO repository.|
108108
|**Branch**|Provide the repository branch that you would like to connect.|
109-
|**Folder path**|Provide the repo path in which the [catalog item](concept-environments-key-concepts.md#catalog-items) exist.|
109+
|**Folder path**|Provide the repo relative path in which the [catalog item](concept-environments-key-concepts.md#catalog-items) exist.|
110110
|**Secret identifier**|Provide the secret identifier that which contains your Personal Access Token (PAT) for the repository|
111111

112112
:::image type="content" source="media/quickstart-create-and-configure-devcenter/add-new-catalog-form.png" alt-text="Screenshot of add new catalog page.":::
113113

114114
1. Confirm that the catalog is successfully added by checking the **Notifications**.
115115

116+
1. Select the specific repo, and then select **Sync**.
117+
118+
:::image type="content" source="media/configure-catalog-item/sync-catalog-items.png" alt-text="Screenshot showing how to sync the catalog." :::
119+
116120
## Create Environment types
117121

118122
Environment types help you define the different types of environments your development teams can deploy. You can apply different settings per environment type.

articles/private-link/private-endpoint-dns.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ For Azure services, use the recommended zone names as described in the following
7272
| Azure Container Registry (Microsoft.ContainerRegistry/registries) / registry | privatelink.azurecr.io </br> {region}.privatelink.azurecr.io | azurecr.io </br> {region}.azurecr.io |
7373
| Azure App Configuration (Microsoft.AppConfiguration/configurationStores) / configurationStores | privatelink.azconfig.io | azconfig.io |
7474
| Azure Backup (Microsoft.RecoveryServices/vaults) / AzureBackup | privatelink.{region}.backup.windowsazure.com | {region}.backup.windowsazure.com |
75-
| Azure Site Recovery (Microsoft.RecoveryServices/vaults) / AzureSiteRecovery | privatelink.{region}.siterecovery.windowsazure.com | {region}.siterecovery.windowsazure.com |
75+
| Azure Site Recovery (Microsoft.RecoveryServices/vaults) / AzureSiteRecovery | privatelink.siterecovery.windowsazure.com | {region}.siterecovery.windowsazure.com |
7676
| Azure Event Hubs (Microsoft.EventHub/namespaces) / namespace | privatelink.servicebus.windows.net | servicebus.windows.net |
7777
| Azure Service Bus (Microsoft.ServiceBus/namespaces) / namespace | privatelink.servicebus.windows.net | servicebus.windows.net |
7878
| Azure IoT Hub (Microsoft.Devices/IotHubs) / iotHub | privatelink.azure-devices.net<br/>privatelink.servicebus.windows.net<sup>1</sup> | azure-devices.net<br/>servicebus.windows.net |
@@ -127,7 +127,7 @@ For Azure services, use the recommended zone names as described in the following
127127
| Azure Search (Microsoft.Search/searchServices) / searchService | privatelink.search.windows.us | search.windows.us |
128128
| Azure App Configuration (Microsoft.AppConfiguration/configurationStores) / configurationStores | privatelink.azconfig.azure.us | azconfig.azure.us |
129129
| Azure Backup (Microsoft.RecoveryServices/vaults) / AzureBackup | privatelink.{region}.backup.windowsazure.us | {region}.backup.windowsazure.us |
130-
| Azure Site Recovery (Microsoft.RecoveryServices/vaults) / AzureSiteRecovery | privatelink.{region}.siterecovery.windowsazure.us | {region}.siterecovery.windowsazure.us |
130+
| Azure Site Recovery (Microsoft.RecoveryServices/vaults) / AzureSiteRecovery | privatelink.siterecovery.windowsazure.us | {region}.siterecovery.windowsazure.us |
131131
| Azure Event Hubs (Microsoft.EventHub/namespaces) / namespace | privatelink.servicebus.usgovcloudapi.net | servicebus.usgovcloudapi.net|
132132
| Azure Service Bus (Microsoft.ServiceBus/namespaces) / namespace | privatelink.servicebus.usgovcloudapi.net| servicebus.usgovcloudapi.net |
133133
| Azure IoT Hub (Microsoft.Devices/IotHubs) / iotHub | privatelink.azure-devices.us<br/>privatelink.servicebus.windows.us<sup>1</sup> | azure-devices.us<br/>servicebus.usgovcloudapi.net |

articles/virtual-network/create-peering-different-deployment-models-subscriptions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ This tutorial uses different accounts for each subscription. If you're using an
153153
--name myVnetAToMyVnetB \
154154
--resource-group $rgName \
155155
--vnet-name myVnetA \
156-
--remote-vnet-id /subscriptions/<SubscriptionB-id>/resourceGroups/Default-Networking/providers/Microsoft.ClassicNetwork/virtualNetworks/myVnetB \
156+
--remote-vnet /subscriptions/<SubscriptionB-id>/resourceGroups/Default-Networking/providers/Microsoft.ClassicNetwork/virtualNetworks/myVnetB \
157157
--allow-vnet-access
158158
```
159159

0 commit comments

Comments
 (0)