Skip to content

Commit 36f3cf9

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into yelevin/analytics-tutorial
2 parents 121a3e0 + 9504ec3 commit 36f3cf9

File tree

84 files changed

+1049
-520
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+1049
-520
lines changed

articles/active-directory-b2c/azure-ad-b2c-global-identity-funnel-based-design.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure Active Directory B2C global identity framework funnel-based design considerations
2+
title: Build a global identity solution with funnel-based approach
33
titleSuffix: Azure AD B2C
44
description: Learn the funnel-based design consideration for Azure AD B2C to provide customer identity management for global customers.
55
services: active-directory-b2c

articles/active-directory-b2c/azure-ad-b2c-global-identity-region-based-design.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure Active Directory B2C global identity framework region-based design considerations
2+
title: Build a global identity solution with region-based approach
33
titleSuffix: Azure AD B2C
44
description: Learn the region-based design consideration for Azure AD B2C to provide customer identity management for global customers.
55
services: active-directory-b2c

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,11 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 12/06/2022
9+
ms.date: 01/07/2023
1010

1111
ms.author: justinha
1212
author: justinha
13+
ms.reviewer: jpettere
1314
manager: amycolannino
1415

1516
ms.collection: M365-identity-device-management
@@ -98,9 +99,12 @@ Tenants are set to either Pre-migration or Migration in Progress by default, dep
9899

99100
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/reason.png" alt-text="Screenshot of reasons for rollback.":::
100101

101-
## Known issues
102-
103-
* Currently, all users must be enabled for at least one MFA method that isn't passwordless and the user can register in interrupt mode. Possible methods include Microsoft Authenticator, SMS, voice calls, and software OATH/mobile app code. The method(s) can be enabled in any policy. If a user is not eligible for at least one of those methods, the user will see an error during registration and when visiting My Security Info. We're working to improve this experience to enable fully passwordless configurations.
102+
>[!NOTE]
103+
>After all authentication methods are fully migrated, the following elements of the legacy SSPR policy remain active:
104+
> - The **Number of methods required to reset** control: admins can continue to change how many authentication methods must be verified before a user can perform SSPR.
105+
> - The SSPR administrator policy: admins can continue to register and use any methods listed under the legacy SSPR administrator policy or methods they're enabled to use in the Authentication methods policy.
106+
>
107+
> In the future, both of these features will be integrated with the Authentication methods policy.
104108
105109
## Next steps
106110

articles/active-directory/authentication/how-to-authentication-methods-manage.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,11 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 12/12/2022
9+
ms.date: 01/07/2023
1010

1111
ms.author: justinha
1212
author: justinha
13+
ms.reviewer: jpettere
1314
manager: amycolannino
1415

1516
ms.collection: M365-identity-device-management

articles/active-directory/develop/msal-acquire-cache-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ The format of the scope value varies depending on the resource (the API) receivi
4545

4646
For Microsoft Graph only, the `user.read` scope maps to `https://graph.microsoft.com/User.Read`, and both scope formats can be used interchangeably.
4747

48-
Certain web APIs such as the Azure Resource Manager API (https://management.core.windows.net/) expect a trailing forward slash ('/') in the audience claim (`aud`) of the access token. In this case, pass the scope as `https://management.core.windows.net//user_impersonation`, including the double forward slash ('//').
48+
Certain web APIs such as the Azure Resource Manager API (`https://management.core.windows.net/`) expect a trailing forward slash ('/') in the audience claim (`aud`) of the access token. In this case, pass the scope as `https://management.core.windows.net//user_impersonation`, including the double forward slash ('//').
4949

5050
Other APIs might require that *no scheme or host* is included in the scope value, and expect only the app ID (a GUID) and the scope name, for example:
5151

articles/aks/includes/keda/current-version-callout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
author: tomkerkhove
33

4-
ms.service: container-service
4+
ms.service: azure-kubernetes-service
55
ms.topic: include
66
ms.date: 05/24/2022
77
ms.author: tomkerkhove

articles/azure-functions/functions-event-grid-blob-trigger.md

Lines changed: 149 additions & 145 deletions
Large diffs are not rendered by default.

articles/azure-government/compare-azure-government-global-azure.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -242,6 +242,10 @@ The following features have known limitations in Azure Government:
242242
- Limitations with multi-factor authentication:
243243
- Trusted IPs isn't supported in Azure Government. Instead, use Conditional Access policies with named locations to establish when multi-factor authentication should and shouldn't be required based off the user's current IP address.
244244

245+
### National clouds and MSAL
246+
247+
The Microsoft Authentication Library (MSAL) enables application developers in national clouds to acquire tokens in order to authenticate and call secured web APIs. For feature variations and limitations, see [National clouds and MSAL](../active-directory/develop/msal-national-cloud.md).
248+
245249
## Management and governance
246250

247251
This section outlines variations and considerations when using Management and Governance services in the Azure Government environment. For service availability, see [Products available by region](https://azure.microsoft.com/global-infrastructure/services/?products=managed-applications,azure-policy,network-watcher,monitor,traffic-manager,automation,scheduler,site-recovery,cost-management,backup,blueprints,advisor&regions=usgov-non-regional,us-dod-central,us-dod-east,usgov-arizona,usgov-texas,usgov-virginia&rar=true).

articles/azure-monitor/alerts/alerts-dynamic-thresholds.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,12 +107,12 @@ To identify weekly seasonality, the Dynamic Thresholds model requires at least t
107107

108108
## Dynamic Thresholds is showing values that are not within the range of expected values
109109

110-
When a metric exhibits large fluctuation, Dynamic Thresholds builds a wider model around the metric values. This model can result in a lower border below zero when the metric only has positive values, or in an upper border above 100% when the metric can't exceed 100%. This scenario can happen when:
110+
When a metric value exhibits large fluctuations, dynamic thresholds may build a wide model around the metric values, which can result in a lower or higher boundary than expected. This scenario can happen when:
111111

112112
- The sensitivity is set to low.
113113
- The metric exhibits an irregular behavior with high variance, which appears as spikes or dips in the data.
114114

115-
When the lower bound has a negative value, it's plausible for the metric to reach a zero value given the metric's irregular behavior. Consider choosing a higher sensitivity or a larger **Aggregation granularity (Period)** to make the model less sensitive. Or, use the **Ignore data before** option to exclude a recent irregularity from the historical data used to build the model.
115+
Consider making the model less sensitive by choosing a higher sensitivity or selecting a larger **Aggregation granularity (Period)**.  You can also use the **Ignore data before** option to exclude a recent irregularity from the historical data used to build the model.
116116

117117
## The Dynamic Thresholds alert rule is too noisy or fires too much
118118

articles/cognitive-services/openai/tutorials/embeddings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: cognitive-services
88
ms.subservice: openai
99
ms.topic: tutorial
1010
ms.date: 12/14/2022
11-
author: mrbullwinkle
11+
author: noabenefraim
1212
ms.author: mbullwin
1313
recommendations: false
1414
ms.custom:

0 commit comments

Comments
 (0)