Skip to content

Commit 31e33a2

Browse files
authored
Merge pull request #180541 from MicrosoftDocs/master
11/19 AM Publish
2 parents 2bad805 + c8abf1f commit 31e33a2

File tree

105 files changed

+752
-406
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+752
-406
lines changed

articles/active-directory-b2c/identity-provider-id-me.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ zone_pivot_groups: b2c-policy-type
3535

3636
## Create an ID.me application
3737

38-
To enable sign-in for users with an ID.me account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in [ID.me Developer Resources for API & SDK](https://developers.id.me/). For more information, see [OAuth Integration Guide](https://developers.id.me/documentation/oauth/overview/kyc). If you don't already have an ID.me developer account, you can sign up at [https://developers.id.me/registration/new](https://developers.id.me/registration/new).
38+
To enable sign-in for users with an ID.me account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in [ID.me Developer Resources for API & SDK](https://developers.id.me/). For more information, see [OAuth Integration Guide](https://developers.id.me/documentation/). If you don't already have an ID.me developer account, you can sign up at [https://developers.id.me/registration/new](https://developers.id.me/registration/new).
3939

4040
1. Sign in to the [ID.me Developer Resources for API & SDK](https://developers.id.me/) with your ID.me account credentials.
4141
1. Select **View My Applications**, and select **Continue**.
@@ -169,4 +169,4 @@ Next, you need a claims transformation to create the displayName claim. Add the
169169

170170
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
171171

172-
::: zone-end
172+
::: zone-end

articles/active-directory-b2c/phone-authentication-user-flows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Set up the local account identity provider
2+
title: Set up phone sign-up and sign-in for user flows
33
titleSuffix: Azure AD B2C
44
description: Define the identity types you can use (email, username, phone number) for local account authentication when you set up user flows in your Azure Active Directory B2C tenant.
55
services: active-directory-b2c

articles/active-directory/authentication/how-to-authentication-sms-supported-apps.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/28/2021
9+
ms.date: 11/19/2021
1010
ms.author: justinha
1111
author: aanjusingh
1212
manager: daveba
@@ -24,15 +24,14 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
2424
| Office 365- Microsoft Online Services* || |
2525
| Microsoft One Note || |
2626
| Microsoft Teams |||
27-
| Microsoft Intune/ Company portal |||
27+
| Microsoft Intune Company portal |||
2828
| My Apps Portal ||Not available|
2929
| Microsoft Forms ||Not available|
3030
| Microsoft Edge || |
3131
| Microsoft Power BI || |
3232
| Microsoft Stream || |
3333
| Microsoft Power Apps || |
3434
| Microsoft Azure |||
35-
| Microsoft Authenticator | ||
3635
| Azure Virtual Desktop || |
3736

3837
*_SMS sign-in isn't available for office applications, such as Word, Excel, etc., when accessed directly on the web, but is available when accessed through the [Office 365 web app](https://www.office.com)_

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ The **Location** - The location the connection was initiated from:
162162

163163

164164
> [!NOTE]
165-
> Due to privacy commitments, Azure AD does not populate this field this field to the home tenant in the case of a cross-tenant scenario.
165+
> Due to privacy commitments, Azure AD does not populate this field to the home tenant in the case of a cross-tenant scenario.
166166
167167

168168
|Name|Modern authentication|Description|

articles/aks/configure-kubenet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ az network vnet create \
121121
To allow an AKS cluster to interact with other Azure resources, an Azure Active Directory service principal is used. The service principal needs to have permissions to manage the virtual network and subnet that the AKS nodes use. To create a service principal, use the [az ad sp create-for-rbac][az-ad-sp-create-for-rbac] command:
122122

123123
```azurecli-interactive
124-
az ad sp create-for-rbac --skip-assignment
124+
az ad sp create-for-rbac
125125
```
126126

127127
The following example output shows the application ID and password for your service principal. These values are used in additional steps to assign a role to the service principal and then create the AKS cluster:

articles/aks/kubernetes-service-principal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,10 +61,10 @@ New-AzAksCluster -Name myAKSCluster -ResourceGroupName myResourceGroup
6161

6262
### [Azure CLI](#tab/azure-cli)
6363

64-
To manually create a service principal with the Azure CLI, use the [az ad sp create-for-rbac][az-ad-sp-create] command. In the following example, the `--skip-assignment` parameter prevents any additional default assignments being assigned:
64+
To manually create a service principal with the Azure CLI, use the [az ad sp create-for-rbac][az-ad-sp-create] command.
6565

6666
```azurecli-interactive
67-
az ad sp create-for-rbac --skip-assignment --name myAKSClusterServicePrincipal
67+
az ad sp create-for-rbac --name myAKSClusterServicePrincipal
6868
```
6969

7070
The output is similar to the following example. Make a note of your own `appId` and `password`. These values are used when you create an AKS cluster in the next section.

articles/aks/limit-egress-traffic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -423,7 +423,7 @@ A cluster identity (managed identity or service principal) is used by AKS to cre
423423
```azurecli
424424
# Create SP and Assign Permission to Virtual Network
425425
426-
az ad sp create-for-rbac -n "${PREFIX}sp" --skip-assignment
426+
az ad sp create-for-rbac -n "${PREFIX}sp"
427427
```
428428

429429
Now replace the `APPID` and `PASSWORD` below with the service principal appid and service principal password autogenerated by the previous command output. We'll reference the VNET resource ID to grant the permissions to the service principal so AKS can deploy resources into it.

articles/aks/open-service-mesh-about.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,10 +45,6 @@ OSM can assist your AKS deployments with the following scenarios:
4545

4646
- Collection and viewing of KPIs from application traffic
4747

48-
## OSM service quotas and limits (preview)
49-
50-
OSM preview limitations for service quotas and limits can be found on the AKS [Quotas and regional limits page](./quotas-skus-regions.md).
51-
5248
<!-- LINKS - internal -->
5349

5450
[kubernetes-service]: concepts-network.md#services

articles/aks/update-credentials.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,10 +64,10 @@ Now continue on to [update AKS cluster with new service principal credentials](#
6464

6565
If you chose to update the existing service principal credentials in the previous section, skip this step. Continue to [update AKS cluster with new service principal credentials](#update-aks-cluster-with-new-service-principal-credentials).
6666

67-
To create a service principal and then update the AKS cluster to use these new credentials, use the [az ad sp create-for-rbac][az-ad-sp-create] command. In the following example, the `--skip-assignment` parameter prevents any additional default assignments being assigned:
67+
To create a service principal and then update the AKS cluster to use these new credentials, use the [az ad sp create-for-rbac][az-ad-sp-create] command.
6868

6969
```azurecli-interactive
70-
az ad sp create-for-rbac --skip-assignment
70+
az ad sp create-for-rbac
7171
```
7272

7373
The output is similar to the following example. Make a note of your own `appId` and `password`. These values are used in the next step.

articles/aks/virtual-nodes-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,10 @@ az network vnet subnet create \
8383

8484
To allow an AKS cluster to interact with other Azure resources, a cluster identity is used. This cluster identity can be automatically created by the Azure CLI or portal, or you can pre-create one and assign additional permissions. By default, this cluster identity is a managed identity. For more information, see [Use managed identities](use-managed-identity.md). You can also use a service principal as your cluster identity. The following steps show you how to manually create and assign the service principal to your cluster.
8585

86-
Create a service principal using the [az ad sp create-for-rbac][az-ad-sp-create-for-rbac] command. The `--skip-assignment` parameter limits any additional permissions from being assigned.
86+
Create a service principal using the [az ad sp create-for-rbac][az-ad-sp-create-for-rbac] command.
8787

8888
```azurecli-interactive
89-
az ad sp create-for-rbac --skip-assignment
89+
az ad sp create-for-rbac
9090
```
9191

9292
The output is similar to the following example:

0 commit comments

Comments
 (0)