Skip to content

Commit 309fc95

Browse files
authored
Merge pull request #211288 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 3e8b518 + 4fa4f42 commit 309fc95

File tree

5 files changed

+37
-6
lines changed

5 files changed

+37
-6
lines changed

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ Content-type: application/json
144144
| -------------------------------------------------- | ----------------- | -------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
145145
| version | String | Yes | The version of your API. |
146146
| action | String | Yes | Value must be `Continue`. |
147-
| \<builtInUserAttribute> | \<attribute-type> | No | They can returned in the token if selected as an **Application claim**. |
147+
| \<builtInUserAttribute> | \<attribute-type> | No | They can be returned in the token if selected as an **Application claim**. |
148148
| \<extension\_{extensions-app-id}\_CustomAttribute> | \<attribute-type> | No | The claim does not need to contain `_<extensions-app-id>_`, it is *optional*. They can returned in the token if selected as an **Application claim**. |
149149

150150
::: zone-end

articles/active-directory/managed-identities-azure-resources/how-to-view-associated-resources-for-an-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ https://management.azure.com/subscriptions/{resourceID of user-assigned identity
6464

6565
| Parameter | Example |Description |
6666
|---|---|---|
67-
| $filter | ```'type' eq 'microsoft.cognitiveservices/account' and contains(name, 'test')``` | An OData expression that allows you to filter any of the available fields: name, type, resourceGroup, subscriptionId, subscriptionDisplayName<br/><br/>The following operations are supported: ```and```, ```or```, ```eq``` and ```contains``` |
67+
| $filter | ```type eq 'microsoft.cognitiveservices/account' and contains(name, 'test')``` | An OData expression that allows you to filter any of the available fields: name, type, resourceGroup, subscriptionId, subscriptionDisplayName<br/><br/>The following operations are supported: ```and```, ```or```, ```eq``` and ```contains``` |
6868
| $orderby | ```name asc``` | An OData expression that allows you to order by any of the available fields |
6969
| $skip | 50 | The number of items you want to skip while paging through the results. |
7070
| $top | 10 | The number of resources to return. 0 will return only a count of the resources. |

articles/active-directory/saas-apps/jiramicrosoft-tutorial.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,37 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
118118

119119
![The Certificate download link](common/copy-metadataurl.png)
120120

121+
122+
123+
124+
1. The Name ID attribute in Azure AD can be mapped to any desired user attribute by editing the Attributes & Claims section.
125+
126+
> [!div class="mx-imgBorder"]
127+
> ![Screenshot showing how to edit Attributes and Claims.](common/edit-attribute.png)
128+
129+
a. After clicking on Edit, any desired user attribute can be mapped by clicking on Unique User Identifier (Name ID).
130+
131+
> [!div class="mx-imgBorder"]
132+
> ![Screenshot showing the NameID in Attributes and Claims.](common/attribute-nameID.png)
133+
134+
b. On the next screen, the desired attribute name like user.userprincipalname can be selected as an option from the Source Attribute dropdown menu.
135+
136+
> [!div class="mx-imgBorder"]
137+
> ![Screenshot showing how to select Attributes and Claims.](common/attribute-select.png)
138+
139+
c. The selection can then be saved by clicking on the Save button at the top.
140+
141+
> [!div class="mx-imgBorder"]
142+
> ![Screenshot showing how to save Attributes and Claims.](common/attribute-save.png)
143+
144+
d. Now, the user.userprincipalname attribute source in Azure AD is mapped to the Name ID attribute name in Azure AD which will be compared with the username attribute in Atlassian by the SSO plugin.
145+
146+
> [!div class="mx-imgBorder"]
147+
> ![Screenshot showing how to review Attributes and Claims.](common/attribute-review.png)
148+
149+
> [!NOTE]
150+
> The SSO service provided by Microsoft Azure supports SAML authentication which is able to perform user identification using different attributes such as givenname (first name), surname (last name), email (email address), and user principal name (username). We recommend not to use email as an authentication attribute as email addresses are not always verified by Azure AD. The plugin compares the values of Atlassian username attribute with the NameID attribute in Azure AD in order to determine the valid user authentication.
151+
121152
### Create an Azure AD test user
122153

123154
In this section, you'll create a test user in the Azure portal called B.Simon.

articles/education-hub/azure-dev-tools-teaching/program-faq.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -200,15 +200,15 @@ sections:
200200
answer: |
201201
:::row:::
202202
:::column span="":::
203-
Microsoft Access<br>
203+
Access<br>
204204
Advanced Threat Analytics<br>
205205
Agents for Visual Studio<br>
206206
BizTalk Server<br>
207207
SQL Server Mobile Report Publisher (formerly Datazen Enterprize)<br>
208208
Host Integration Server<br>
209209
Machine Learning Server (formerly R Server)<br>
210210
Hyper-V Server<br>
211-
Microsoft Project<br>
211+
Project Professional<br>
212212
Remote Tools for Visual Studio<br>
213213
SharePoint Server<br>
214214
Skype for Business Server<br>
@@ -220,7 +220,7 @@ sections:
220220
SQL Server Web<br>
221221
System Center<br>
222222
Azure DevOps Server (formerly Visual Studio Team Foundation Server)<br>
223-
Microsoft Visio<br>
223+
Visio Professional<br>
224224
Visual Studio Code<br>
225225
Visual Studio Community<br>
226226
Visual Studio Enterprise<br>

articles/event-hubs/apache-kafka-configurations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Property | Recommended Values | Permitted Range | Notes
5353

5454
Property | Recommended Values | Permitted Range | Notes
5555
---|---:|-----:|---
56-
`retries` | > 0 | | Default is 2. We recommend that you keep this value.
56+
`retries` | 2 | | Default is 2147483647.
5757
`request.timeout.ms` | 30000 .. 60000 | > 20000| Event Hubs will internally default to a minimum of 20,000 ms. `librdkafka` default value is 5000, which can be problematic. *While requests with lower timeout values are accepted, client behavior isn't guaranteed.*
5858
`partitioner` | `consistent_random` | See librdkafka documentation | `consistent_random` is default and best. Empty and null keys are handled ideally for most cases.
5959
`compression.codec` | `none` || Compression currently not supported.

0 commit comments

Comments
 (0)