Skip to content

Commit 2d0051c

Browse files
authored
Merge pull request #111562 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents b6ee2fd + 1e9388d commit 2d0051c

File tree

13 files changed

+130
-120
lines changed

13 files changed

+130
-120
lines changed

articles/active-directory/hybrid/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ landingContent:
5454
url: whatis-phs.md
5555
- text: What is passthrough authentication?
5656
url: how-to-connect-pta.md
57-
- text: What is federtation?
57+
- text: What is federation?
5858
url: whatis-fed.md
5959
- text: What is single sign-on?
6060
url: how-to-connect-sso.md
@@ -100,4 +100,4 @@ landingContent:
100100

101101

102102

103-
103+

articles/active-directory/saas-apps/highground-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,15 +81,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8181
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
8282

8383
a. In the **Identifier** text box, type a URL using the following pattern:
84-
`https://<SUBDOMAIN>.highground.com/`
84+
`https://app.highground.com/`
8585

8686
b. In the **Reply URL** text box, type a URL using the following pattern:
87-
`https://<SUBDOMAIN>.highground.com/svc/SSONoAuth/<companyName>`
87+
`https://app.highground.com/svc/SSONoAuth/SAML?groupid=<company-guid>`
8888

8989
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
9090

9191
In the **Sign-on URL** text box, type a URL using the following pattern:
92-
`https://app.highground.com/#/login/<companyName>`
92+
`https://app.highground.com/#/login/<company-slug>`
9393

9494
> [!NOTE]
9595
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [HighGround Client support team](https://youearnedit.freshdesk.com/support/home) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.

articles/azure-government/documentation-government-services-database.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -47,9 +47,9 @@ For details on this service and how to use it, see [Azure SQL Server Stretch Dat
4747
For details on this service and how to use it, see [Azure Cosmos DB documentation](../cosmos-db/index.yml).
4848

4949
### Variations
50-
Azure Cosmos DB is generally available in Azure Government with parity to the public version. One exception is the **Add Azure Cognitive Search** function currently, which isn't available in Cosmos DB for Azure Government.
50+
Azure Cosmos DB is generally available in Azure Government with parity to the public version.
5151

52-
Also, the URLs for accessing Cosmos DB in Azure Government are different:
52+
The URLs for accessing Cosmos DB in Azure Government are different:
5353

5454
| Service Type | Azure Public | Azure Government |
5555
| --- | --- | --- |
@@ -90,7 +90,7 @@ The following information identifies the Azure Government boundary for Azure Cac
9090
For details on this service and how to use it, see [Azure Database for PostgreSQL documentation](../postgresql/index.yml).
9191

9292
### Variations
93-
Advanced Threat Protection, Query Performance Insights and Performance Recommendations for Azure Database for PostgreSQL are **not** available in Azure Government.
93+
Advanced Threat Protection and Private endpoint connections for Azure Database for PostgreSQL are **not** available in Azure Government.
9494

9595
The URLs for accessing and managing Azure Database for PostgreSQL in Azure Government are different:
9696

@@ -109,8 +109,6 @@ The following information identifies the Azure Government boundary for Azure Dat
109109
For details on this service and how to use it, see [Azure Database for MariaDB documentation](../mariadb/index.yml).
110110

111111
### Variations
112-
Query Performance Insights and Performance Recommendations for Azure Database for MariaDB are **not** available in Azure Government.
113-
114112
The URLs for accessing and managing Azure Database for MariaDB in Azure Government are different:
115113

116114
| Service Type | Azure Public | Azure Government |
@@ -128,7 +126,7 @@ The following information identifies the Azure Government boundary for Azure Dat
128126
For details on this service and how to use it, see [Azure Database for MySQL documentation](../mysql/index.yml).
129127

130128
### Variations
131-
Advanced Threat Protection, Query Performance Insights and Performance Recommendations for Azure Database for MySQL are **not** available in Azure Government.
129+
Advanced Threat Protection and Private endpoint connections for Azure Database for MySQL are **not** available in Azure Government.
132130

133131
The URLs for accessing and managing Azure Database for MySQL in Azure Government are different:
134132

articles/azure-resource-manager/templates/define-resource-dependency.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Resource Manager evaluates the dependencies between resources, and deploys them
1212

1313
## dependsOn
1414

15-
Within your template, the dependsOn element enables you to define one resource as a dependent on one or more resources. Its value is a comma-separated list of resource names. The list can include resources that are [conditionally deployed](conditional-resource-deployment.md). When a conditional resource isn't deployed, Azure Resource Manager automatically removes it from the required dependencies.
15+
Within your template, the dependsOn element enables you to define one resource as a dependent on one or more resources. Its value is a JSON array of strings, each of which is a resource name. The array can include resources that are [conditionally deployed](conditional-resource-deployment.md). When a conditional resource isn't deployed, Azure Resource Manager automatically removes it from the required dependencies.
1616

1717
The following example shows a virtual machine scale set that depends on a load balancer, virtual network, and a loop that creates multiple storage accounts. These other resources aren't shown in the following example, but they would need to exist elsewhere in the template.
1818

articles/backup/backup-azure-manage-mars.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ There are two ways to stop protecting Files and Folders backup:
8484

8585
- **Stop protection and retain backup data**.
8686
- This option will stop all future backup jobs from protection.
87-
- Azure Backup service will retain the recovery points that have been backed up based on the retention policy.
87+
- Azure Backup service will retain all existing recovery points indefinitely. Recovery points will not be checked for expiration until protection is resumed.
8888
- You'll be able to restore the backed-up data for unexpired recovery points.
8989
- If you decide to resume protection, then you can use the *Re-enable backup schedule* option. After that, data would be retained based on the new retention policy.
9090
- **Stop protection and delete backup data**.

0 commit comments

Comments
 (0)