Skip to content

Commit 2e3ba28

Browse files
authored
Merge pull request #253732 from MicrosoftDocs/main
10/04 OOB Publish at 7am
2 parents 12385d5 + b11c259 commit 2e3ba28

File tree

66 files changed

+1846
-11
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+1846
-11
lines changed

articles/active-directory/external-identities/hybrid-on-premises-to-cloud.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: how-to
9-
ms.date: 11/17/2022
9+
ms.date: 10/04/2023
1010

1111
ms.author: cmulligan
1212
author: csmulligan
@@ -21,10 +21,10 @@ ms.collection: M365-identity-device-management
2121

2222
Before Microsoft Entra ID, organizations with on-premises identity systems have traditionally managed partner accounts in their on-premises directory. In such an organization, when you start to move apps to Microsoft Entra ID, you want to make sure your partners can access the resources they need. It shouldn't matter whether the resources are on-premises or in the cloud. Also, you want your partner users to be able to use the same sign-in credentials for both on-premises and Microsoft Entra resources.
2323

24-
If you create accounts for your external partners in your on-premises directory (for example, you create an account with a sign-in name of "msullivan" for an external user named Maria Sullivan in your partners.contoso.com domain), you can now sync these accounts to the cloud. Specifically, you can use [Microsoft Entra Connect](../hybrid/connect/whatis-azure-ad-connect.md) to sync the partner accounts to the cloud, which creates a user account with UserType = Guest. This enables your partner users to access cloud resources using the same credentials as their local accounts, without giving them more access than they need.
24+
If you create accounts for your external partners in your on-premises directory (for example, you create an account with a sign-in name of "msullivan" for an external user named Maria Sullivan in your partners.contoso.com domain), you can now sync these accounts to the cloud. Specifically, you can use [Microsoft Entra Connect](../hybrid/connect/whatis-azure-ad-connect.md) to sync the partner accounts to the cloud, which creates a user account with UserType = Guest. This enables your partner users to access cloud resources using the same credentials as their local accounts, without giving them more access than they need. For more information about converting local guest accounts see [Convert local guest accounts to Microsoft Entra B2B guest accounts](/azure/active-directory/architecture/10-secure-local-guest).
2525

2626
> [!NOTE]
27-
> See also how to [invite internal users to B2B collaboration](invite-internal-users.md). With this feature, you can invite internal guest users to use B2B collaboration, regardless of whether you've synced their accounts from your on-premises directory to the cloud. Once the user accepts the invitation to use B2B collaboration, they'll be able to use their own identities and credentials to sign in to the resources you want them to access. You won’t need to maintain passwords or manage account lifecycles.
27+
> See also how to [invite internal users to B2B collaboration](invite-internal-users.md). With this feature, you can invite internal guest users to use B2B collaboration, regardless of whether you've synced their accounts from your on-premises directory to the cloud. Once the user accepts the invitation to use B2B collaboration, they'll be able to use their own identities and credentials to sign in to the resources you want them to access. You won’t need to maintain passwords or manage account lifecycles.
2828
2929
## Identify unique attributes for UserType
3030

@@ -49,4 +49,4 @@ For implementation instructions, see [Enable synchronization of UserType](../hyb
4949

5050
- [Microsoft Entra B2B collaboration for hybrid organizations](hybrid-organizations.md)
5151
- [Grant B2B users in Microsoft Entra ID access to your on-premises applications](hybrid-cloud-to-on-premises.md)
52-
- For an overview of Microsoft Entra Connect, see [Integrate your on-premises directories with Microsoft Entra ID](../hybrid/whatis-hybrid-identity.md).
52+

articles/ai-services/speech-service/includes/quickstarts/keyword-recognition/csharp.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ var keywordModel = KeywordRecognitionModel.FromFile("your/path/to/Activate_devic
3030
using var audioConfig = AudioConfig.FromDefaultMicrophoneInput();
3131
using var keywordRecognizer = new KeywordRecognizer(audioConfig);
3232
```
33+
> [!IMPORTANT]
34+
> If you prefer testing a keyword model directly with audio samples via the `AudioConfig.fromStreamInput()` method, make sure you use samples that have at least 1.5 seconds of silence before the first keyword. This is to provide an adequate time for the Keyword recognition engine to initialize and to get to the listening state prior to detecting the first keyword.
3335
3436
Next, running keyword recognition is done with one call to `RecognizeOnceAsync()` by passing your model object. This starts a keyword recognition session that lasts until the keyword is recognized. Thus, you generally use this design pattern in multi-threaded applications, or in use cases where you may be waiting for a wake-word indefinitely.
3537

articles/azure-netapp-files/create-active-directory-connections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Several features of Azure NetApp Files require that you have an Active Directory
4646
* Alternatively, an AD domain user account with `msDS-SupportedEncryptionTypes` write permission on the AD connection admin account can also be used to set the Kerberos encryption type property on the AD connection admin account.
4747

4848
>[!NOTE]
49-
>It's _not_ recommended nor required to add the Azure NetApp Files AD admin account to the AD domain groups listed above. Nor is it recommended or required to grant `msDS-SupportedEncryptionTypes` write permission to the Azure NetApp Files AD admin account.
49+
>When you modify the setting to enable AES on the AD connection admin account, it is a best practice to use a user account that has write permission to the AD object that is not the Azure NetApp Files AD admin. You can do so with another domain admin account or by delegating control to an account. For more information, see [Delegating Administration by Using OU Objects](/windows-server/identity/ad-ds/plan/delegating-administration-by-using-ou-objects).
5050
5151
If you set both AES-128 and AES-256 Kerberos encryption on the admin account of the AD connection, the highest level of encryption supported by your AD DS will be used.
5252

articles/communication-services/concepts/numbers/phone-number-management-for-ireland.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,14 +45,11 @@ More details on eligible subscription types are as follows:
4545
## Azure subscription billing locations where Ireland phone numbers are available
4646
| Country/Region |
4747
| :---------- |
48-
|Canada|
4948
|Denmark|
5049
|Ireland|
5150
|Italy|
52-
|Puerto Rico|
5351
|Sweden|
54-
|United Kingdom|
55-
|United States|
52+
5653

5754

5855
## Find information about other countries/regions

articles/communication-services/concepts/numbers/phone-number-management-for-italy.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,7 @@ More details on eligible subscription types are as follows:
5151
| :---------- |
5252
|Canada|
5353
|Denmark|
54+
|France|
5455
|Ireland|
5556
|Italy|
5657
|Puerto Rico|

articles/index.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -829,6 +829,15 @@ productDirectory:
829829
- devops
830830
url: load-testing/index.yml
831831
# Card
832+
- title: Microsoft Playwright Testing (Preview)
833+
summary: Run end-to-end Playwright tests at scale
834+
imageSrc: ./media/index/playwright-testing-icon.svg
835+
azureCategories:
836+
- devops
837+
- developer-tools
838+
- web
839+
url: playwright-testing/index.yml
840+
# Card
832841
- title: Azure Managed Grafana
833842
summary: Deploy Grafana dashboards as a fully managed Azure service
834843
imageSrc: ./media/index/managed-grafana.svg
Lines changed: 33 additions & 0 deletions
Loading

0 commit comments

Comments
 (0)