You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/roles/admin-units-assign-roles.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ The following Azure AD roles can be assigned with administrative unit scope. Add
50
50
|[SharePoint Administrator](permissions-reference.md#sharepoint-administrator)| Can manage Microsoft 365 groups in the assigned administrative unit only. For SharePoint sites associated with Microsoft 365 groups in an administrative unit, can also update site properties (site name, URL, and external sharing policy) using the Microsoft 365 admin center. Cannot use the SharePoint admin center or SharePoint APIs to manage sites. |
51
51
|[Teams Administrator](permissions-reference.md#teams-administrator)| Can manage Microsoft 365 groups in the assigned administrative unit only. Can manage team members in the Microsoft 365 admin center for teams associated with groups in the assigned administrative unit only. Cannot use the Teams admin center. |
52
52
|[Teams Devices Administrator](permissions-reference.md#teams-devices-administrator)| Can perform management related tasks on Teams certified devices. |
53
-
|[User Administrator](permissions-reference.md#user-administrator)| Can manage all aspects of users and groups, including resetting passwords for limited admins within the assigned administrative unit only. |
53
+
|[User Administrator](permissions-reference.md#user-administrator)| Can manage all aspects of users and groups, including resetting passwords for limited admins within the assigned administrative unit only. Cannot currently manage users' profile photographs. |
54
54
|[<Custom role>](custom-create.md)| Can perform actions that apply to users, groups, or devices, according to the definition of the custom role. |
55
55
56
56
Certain role permissions apply only to non-administrator users when assigned with the scope of an administrative unit. In other words, administrative unit scoped [Helpdesk Administrators](permissions-reference.md#helpdesk-administrator) can reset passwords for users in the administrative unit only if those users do not have administrator roles. The following list of permissions are restricted when the target of an action is another administrator:
Copy file name to clipboardExpand all lines: articles/application-gateway/ingress-controller-install-new.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,9 +46,9 @@ Follow the steps below to create an Azure Active Directory (Azure AD) [service p
46
46
The `appId` and `password` values from the JSON output will be used in the following steps
47
47
48
48
49
-
1. Use the `appId` from the previous command's output to get the `objectId` of the new service principal:
49
+
1. Use the `appId` from the previous command's output to get the `id` of the new service principal:
50
50
```azurecli
51
-
objectId=$(az ad sp show --id $appId --query "objectId" -o tsv)
51
+
objectId=$(az ad sp show --id $appId --query "id" -o tsv)
52
52
```
53
53
The output of this command is `objectId`, which will be used in the Azure Resource Manager template below
54
54
@@ -250,8 +250,13 @@ Kubernetes. We'll use it to install the `application-gateway-kubernetes-ingress`
250
250
nano helm-config.yaml
251
251
```
252
252
253
+
> [!NOTE]
254
+
> **For deploying to Sovereign Clouds (e.g., Azure Government)**, the `appgw.environment` configuration parameter must be added and set to the appropriate value as documented below.
255
+
256
+
253
257
Values:
254
258
- `verbosityLevel`: Sets the verbosity level of the AGIC logging infrastructure. See [Logging Levels](https://github.com/Azure/application-gateway-kubernetes-ingress/blob/463a87213bbc3106af6fce0f4023477216d2ad78/docs/troubleshooting.md#logging-levels) for possible values.
Copy file name to clipboardExpand all lines: articles/communication-services/quickstarts/call-automation/includes/callflow-for-customer-interactions-csharp.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ You can download the sample app from [GitHub](https://github.com/Azure-Samples/c
20
20
21
21
- An Azure account with an active subscription.
22
22
- Azure Communication Services resource. See [Create an Azure Communication Services resource](../../create-communication-resource.md?tabs=windows&pivots=platform-azp). Note the resource connection string for this quickstart by navigating to your resource selecting 'Keys' from the left side menu.
23
-
-[Acquire a phone number for your Communication Service resource](../../telephony/get-phone-number.md?pivots=programming-language-csharp). Note the phone number you acquired for use in this quickstart.
23
+
-[Acquire a phone number for your Communication Service resource](../../telephony/get-phone-number.md?pivots=programming-language-csharp) or connect your carrier using [Azure direct routing](../../../concepts/telephony/direct-routing-infrastructure.md). Note the phone number you acquired or provisioned using Azure direct routing for use in this quickstart.
24
24
- The latest [.NET library](https://dotnet.microsoft.com/download/dotnet-core) for your operating system. .NET 6.0 or higher is recommended as this quickstart uses the minimal API feature.
25
25
- The latest version of Visual Studio 2022 (17.4.0 or higher)
26
26
- An audio file for the message you want to play in the call. This audio should be accessible via a url.
In this quick-start, you'll use the new [Visual Studio Dev Tunnels](/connectors/custom-connectors/port-tunneling) feature to obtain a public domain name so that your local application is reachable by the Call Automation platform on the Internet. The public name is needed to receive the Event Grid `IncomingCall` event and Call Automation events using webhooks.
47
47
48
+
Note by default the dev tunnels are disabled in Visual Studio. To enable dev tunnels, please go to Tools, than Options and enable dev tunnels in Preview Features menu.
49
+
48
50
If you haven't already configured your workstation, be sure to follow the steps in [this guide](/connectors/custom-connectors/port-tunneling). Once configured, your workstation will acquire a public domain name automatically allowing us to use the environment variable `["VS_TUNNEL_URL"]` as shown below.
49
51
50
52
Set up your Event Grid subscription to receive the `IncomingCall` event by reading [this guide](../../../concepts/call-automation/incoming-call-notification.md).
@@ -157,4 +159,4 @@ Within Visual Studio select the Run button or press F5 on your keyboard. You sho
157
159
158
160
In order to receive the `IncomingCall` event for the inbound PSTN call, you must configure an Event Grid subscription as described in this [concepts guide](../../../concepts/call-automation/incoming-call-notification.md). The most important thing to remember is that an Event Grid webhook subscription must be validated against a working web server. Since you've started the project in the previous step, and you have a public FQDN, set the webhook address in your subscription to the Dev Tunnel obtained by Visual Studio plus the path to your POST endpoint (i.e. `https://<dev_tunnel_fqdn>/api/incomingCall`).
159
161
160
-
Once your webhook subscription has been validated, it will show up in the portal and you're now ready to test your application by making an inbound call.
162
+
Once your webhook subscription has been validated, it will show up in the portal and you're now ready to test your application by making an inbound call.
The billing account name is the same parameter that you used in the API parameters. It's the enrollment ID that you see in the EA portal and the Azure portal.
Copy file name to clipboardExpand all lines: articles/storage/blobs/lifecycle-management-policy-configure.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ For a blob snapshot or version, the condition that is checked is the number of d
30
30
31
31
## Optionally enable access time tracking
32
32
33
-
Before you configure a lifecycle management policy, you can choose to enable blob access time tracking. When access time tracking is enabled, a lifecycle management policy can include an action based on the time that the blob was last accessed with a read or write operation.
33
+
Before you configure a lifecycle management policy, you can choose to enable blob access time tracking. When access time tracking is enabled, a lifecycle management policy can include an action based on the time that the blob was last accessed with a read or write operation.To minimize the effect on read access latency, only the first read of the last 24 hours updates the last access time. Subsequent reads in the same 24-hour period don't update the last access time. If a blob is modified between reads, the last access time is the more recent of the two values.
34
34
35
35
#### [Portal](#tab/azure-portal)
36
36
@@ -229,4 +229,4 @@ A lifecycle management policy must be read or written in full. Partial updates a
229
229
## See also
230
230
231
231
-[Optimize costs by automatically managing the data lifecycle](lifecycle-management-overview.md)
232
-
-[Hot, Cool, and Archive access tiers for blob data](access-tiers-overview.md)
232
+
-[Hot, Cool, and Archive access tiers for blob data](access-tiers-overview.md)
Copy file name to clipboardExpand all lines: articles/virtual-desktop/troubleshoot-insights.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ manager: femila
12
12
This article presents known issues and solutions for common problems in Azure Virtual Desktop Insights.
13
13
14
14
>[!IMPORTANT]
15
-
>[The Log Analytics Agent is currently being deprecated](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). While Azure Virtual Desktop Insights currently uses the Log Analytics Agent for Azure Virtual Desktop support, you'll eventually need to migrate to Azure Virtual Desktop Insights by August 31, 2024. We'll provide instructions for how to migrate when we release the update that allows Azure Virtual Desktop Insights to support the Azure Virtual Desktop Insights Agent. Until then, continue to use the Log Analytics Agent.
15
+
>[The Log Analytics Agent is currently being deprecated](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). While Azure Virtual Desktop Insights currently uses the Log Analytics Agent for Azure Virtual Desktop support, you'll eventually need to migrate to Azure Virtual Desktop Insights by August 31, 2024. We'll provide instructions for how to migrate when we release the update that allows Azure Virtual Desktop Insights to support the Azure Monitor Agent. Until then, continue to use the Log Analytics Agent.
0 commit comments