You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/highground-tutorial.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,15 +81,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
81
81
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
82
82
83
83
a. In the **Identifier** text box, type a URL using the following pattern:
84
-
`https://<SUBDOMAIN>.highground.com/`
84
+
`https://app.highground.com/`
85
85
86
86
b. In the **Reply URL** text box, type a URL using the following pattern:
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [HighGround Client support team](https://youearnedit.freshdesk.com/support/home) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
Copy file name to clipboardExpand all lines: articles/azure-government/documentation-government-services-database.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,9 +47,9 @@ For details on this service and how to use it, see [Azure SQL Server Stretch Dat
47
47
For details on this service and how to use it, see [Azure Cosmos DB documentation](../cosmos-db/index.yml).
48
48
49
49
### Variations
50
-
Azure Cosmos DB is generally available in Azure Government with parity to the public version. One exception is the **Add Azure Cognitive Search** function currently, which isn't available in Cosmos DB for Azure Government.
50
+
Azure Cosmos DB is generally available in Azure Government with parity to the public version.
51
51
52
-
Also, the URLs for accessing Cosmos DB in Azure Government are different:
52
+
The URLs for accessing Cosmos DB in Azure Government are different:
53
53
54
54
| Service Type | Azure Public | Azure Government |
55
55
| --- | --- | --- |
@@ -90,7 +90,7 @@ The following information identifies the Azure Government boundary for Azure Cac
90
90
For details on this service and how to use it, see [Azure Database for PostgreSQL documentation](../postgresql/index.yml).
91
91
92
92
### Variations
93
-
Advanced Threat Protection, Query Performance Insights and Performance Recommendations for Azure Database for PostgreSQL are **not** available in Azure Government.
93
+
Advanced Threat Protectionand Private endpoint connections for Azure Database for PostgreSQL are **not** available in Azure Government.
94
94
95
95
The URLs for accessing and managing Azure Database for PostgreSQL in Azure Government are different:
96
96
@@ -109,8 +109,6 @@ The following information identifies the Azure Government boundary for Azure Dat
109
109
For details on this service and how to use it, see [Azure Database for MariaDB documentation](../mariadb/index.yml).
110
110
111
111
### Variations
112
-
Query Performance Insights and Performance Recommendations for Azure Database for MariaDB are **not** available in Azure Government.
113
-
114
112
The URLs for accessing and managing Azure Database for MariaDB in Azure Government are different:
115
113
116
114
| Service Type | Azure Public | Azure Government |
@@ -128,7 +126,7 @@ The following information identifies the Azure Government boundary for Azure Dat
128
126
For details on this service and how to use it, see [Azure Database for MySQL documentation](../mysql/index.yml).
129
127
130
128
### Variations
131
-
Advanced Threat Protection, Query Performance Insights and Performance Recommendations for Azure Database for MySQL are **not** available in Azure Government.
129
+
Advanced Threat Protectionand Private endpoint connections for Azure Database for MySQL are **not** available in Azure Government.
132
130
133
131
The URLs for accessing and managing Azure Database for MySQL in Azure Government are different:
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/templates/define-resource-dependency.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ Resource Manager evaluates the dependencies between resources, and deploys them
12
12
13
13
## dependsOn
14
14
15
-
Within your template, the dependsOn element enables you to define one resource as a dependent on one or more resources. Its value is a comma-separated list of resource names. The list can include resources that are [conditionally deployed](conditional-resource-deployment.md). When a conditional resource isn't deployed, Azure Resource Manager automatically removes it from the required dependencies.
15
+
Within your template, the dependsOn element enables you to define one resource as a dependent on one or more resources. Its value is a JSON array of strings, each of which is a resource name. The array can include resources that are [conditionally deployed](conditional-resource-deployment.md). When a conditional resource isn't deployed, Azure Resource Manager automatically removes it from the required dependencies.
16
16
17
17
The following example shows a virtual machine scale set that depends on a load balancer, virtual network, and a loop that creates multiple storage accounts. These other resources aren't shown in the following example, but they would need to exist elsewhere in the template.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-manage-mars.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ There are two ways to stop protecting Files and Folders backup:
84
84
85
85
-**Stop protection and retain backup data**.
86
86
- This option will stop all future backup jobs from protection.
87
-
- Azure Backup service will retain the recovery points that have been backed up based on the retention policy.
87
+
- Azure Backup service will retain all existing recovery points indefinitely. Recovery points will not be checked for expiration until protection is resumed.
88
88
- You'll be able to restore the backed-up data for unexpired recovery points.
89
89
- If you decide to resume protection, then you can use the *Re-enable backup schedule* option. After that, data would be retained based on the new retention policy.
0 commit comments