Skip to content

Commit 2f8ce53

Browse files
authored
Merge pull request #252793 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 53aed77 + 2164ecc commit 2f8ce53

File tree

2 files changed

+9
-5
lines changed

2 files changed

+9
-5
lines changed

articles/active-directory/authentication/tutorial-enable-sspr-writeback.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ To enable SSPR writeback, first enable the writeback option in Microsoft Entra C
114114
1. Sign in to your Microsoft Entra Connect server and start the **Microsoft Entra Connect** configuration wizard.
115115
1. On the **Welcome** page, select **Configure**.
116116
1. On the **Additional tasks** page, select **Customize synchronization options**, and then select **Next**.
117-
1. On the **Connect to Microsoft Entra ID** page, enter a global administrator credential for your Azure tenant, and then select **Next**.
117+
1. On the **Connect to Microsoft Entra ID** page, enter a Global Administrator credential for your Azure tenant, and then select **Next**.
118118
1. On the **Connect directories** and **Domain/OU** filtering pages, select **Next**.
119119
1. On the **Optional features** page, select the box next to **Password writeback** and select **Next**.
120120

@@ -132,7 +132,7 @@ With password writeback enabled in Microsoft Entra Connect, now configure Micros
132132

133133
To enable password writeback in SSPR, complete the following steps:
134134

135-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
135+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as [Global Administrator](../roles/permissions-reference.md#global-administrator).
136136
1. Browse to **Protection** > **Password reset**, then choose **On-premises integration**.
137137
1. Check the option for **Write back passwords to your on-premises directory** .
138138
1. (optional) If Microsoft Entra Connect provisioning agents are detected, you can additionally check the option for **Write back passwords with Microsoft Entra Connect cloud sync**.
@@ -147,15 +147,15 @@ To enable password writeback in SSPR, complete the following steps:
147147

148148
If you no longer want to use the SSPR writeback functionality you have configured as part of this tutorial, complete the following steps:
149149

150-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
150+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as [Global Administrator](../roles/permissions-reference.md#global-administrator).
151151
1. Browse to **Protection** > **Password reset**, then choose **On-premises integration**.
152152
1. Uncheck the option for **Write back passwords to your on-premises directory**.
153153
1. Uncheck the option for **Write back passwords with Microsoft Entra Connect cloud sync**.
154154
1. Uncheck the option for **Allow users to unlock accounts without resetting their password**.
155155
1. When ready, select **Save**.
156156

157157
If you no longer want to use the Microsoft Entra Connect cloud sync for SSPR writeback functionality but want to continue using Microsoft Entra Connect Sync agent for writebacks complete the following steps:
158-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
158+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as [Global Administrator](../roles/permissions-reference.md#global-administrator).
159159
1. Browse to **Protection** > **Password reset**, then choose **On-premises integration**.
160160
1. Uncheck the option for **Write back passwords with Microsoft Entra Connect cloud sync**.
161161
1. When ready, select **Save**.

articles/databox-online/azure-stack-edge-gpu-2309-release-notes.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: alkohli
77
ms.service: databox
88
ms.subservice: edge
99
ms.topic: article
10-
ms.date: 09/21/2023
10+
ms.date: 09/25/2023
1111
ms.author: alkohli
1212
---
1313

@@ -21,6 +21,10 @@ The release notes are continuously updated, and as critical issues requiring a w
2121

2222
This article applies to the **Azure Stack Edge 2309** release, which maps to software version **3.2.2380.1652**.
2323

24+
> [!Warning]
25+
> In this release, you must update the packet core version to AP5GC 2308 before you update to Azure Stack Edge 2309. For detailed steps, see [Azure Private 5G Core 2308 release notes](../private-5g-core/azure-private-5g-core-release-notes-2308.md).
26+
> If you update to Azure Stack Edge 2309 before updating to Packet Core 2308.0.1, you will experience a total system outage. In this case, you must delete and re-create the Azure Kubernetes service cluster on your Azure Stack Edge device.
27+
2428
## Supported update paths
2529

2630
To apply the 2309 update, your device must be running version 2203 or later.

0 commit comments

Comments
 (0)