Skip to content

Commit 386b2e8

Browse files
authored
Merge pull request #202229 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 36f4e0b + 2670a27 commit 386b2e8

File tree

8 files changed

+69
-54
lines changed

8 files changed

+69
-54
lines changed

articles/cloud-services-extended-support/enable-key-vault-virtual-machine.md

Lines changed: 54 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -51,46 +51,63 @@ To use the Azure Key Vault VM extension, you need to have an Azure Active Direct
5151
- If you are using RBAC preview, search for the name of the AAD app you created and assign it to the Key Vault Secrets User (preview) role.
5252
- If you are using vault access policies, then assign **Secret-Get** permissions to the AAD app you created. For more information, see [Assign access policies](../key-vault/general/assign-access-policy-portal.md)
5353

54-
7. Install first version of the certificates created in the first step and the Key Vault VM extension using the ARM template as shown below:
54+
7. Install first
55+
step and the Key Vault VM extension using the ARM template snippet for `cloudService` resource as shown below:
5556

5657
```json
58+
{
59+
"osProfile":
5760
{
58-
"osProfile":{
59-
"secrets":[
60-
{
61-
"sourceVault":{
62-
"id":"[parameters('sourceVaultValue')]"
63-
},
64-
"vaultCertificates":[
65-
{
66-
"certificateUrl":"[parameters('bootstrpCertificateUrlValue')]"
67-
}
68-
]
69-
}
70-
]
71-
}{
72-
"name":"KVVMExtensionForPaaS",
73-
"properties":{
74-
"type":"KeyVaultForPaaS",
75-
"autoUpgradeMinorVersion":true,
76-
"typeHandlerVersion":"1.0",
77-
"publisher":"Microsoft.Azure.KeyVault",
78-
"settings":{
79-
"secretsManagementSettings":{
80-
"pollingIntervalInS":"3600",
81-
"certificateStoreName":"My",
82-
"certificateStoreLocation":"LocalMachine",
83-
"linkOnRenewal":false,
84-
"requireInitialSync":false,
85-
"observedCertificates":"[parameters('keyVaultObservedCertificates']"
86-
},
87-
"authenticationSettings":{
88-
"clientId":"Your AAD app ID",
89-
"clientCertificateSubjectName":"Your boot strap certificate subject name [Do not include the 'CN=' in the subject name]"
61+
"secrets":
62+
[
63+
{
64+
"sourceVault":
65+
{
66+
"id": "[parameters('sourceVaultValue')]"
67+
},
68+
"vaultCertificates":
69+
[
70+
{
71+
"certificateUrl": "[parameters('bootstrpCertificateUrlValue')]"
72+
}
73+
]
9074
}
91-
}
92-
}
93-
}
75+
]
76+
},
77+
"extensionProfile":
78+
{
79+
"extensions":
80+
[
81+
{
82+
"name": "KVVMExtensionForPaaS",
83+
"properties":
84+
{
85+
"type": "KeyVaultForPaaS",
86+
"autoUpgradeMinorVersion": true,
87+
"typeHandlerVersion": "1.0",
88+
"publisher": "Microsoft.Azure.KeyVault",
89+
"settings":
90+
{
91+
"secretsManagementSettings":
92+
{
93+
"pollingIntervalInS": "3600",
94+
"certificateStoreName": "My",
95+
"certificateStoreLocation": "LocalMachine",
96+
"linkOnRenewal": false,
97+
"requireInitialSync": false,
98+
"observedCertificates": "[parameters('keyVaultObservedCertificates']"
99+
},
100+
"authenticationSettings":
101+
{
102+
"clientId": "Your AAD app ID",
103+
"clientCertificateSubjectName": "Your boot strap certificate subject name [Do not include the 'CN=' in the subject name]"
104+
}
105+
}
106+
}
107+
}
108+
]
109+
}
110+
}
94111
```
95112
You might need to specify the certificate store for boot strap certificate in ServiceDefinition.csdef like below:
96113

@@ -101,4 +118,4 @@ To use the Azure Key Vault VM extension, you need to have an Azure Active Direct
101118
```
102119

103120
## Next steps
104-
Further improve your deployment by [enabling monitoring in Cloud Services (extended support)](enable-alerts.md)
121+
Further improve your deployment by [enabling monitoring in Cloud Services (extended support)](enable-alerts.md)

articles/communication-services/quickstarts/ui-library/includes/get-started-call/ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ platform :ios, '14.0'
4343
4444
target 'UILibraryQuickStart' do
4545
use_frameworks!
46-
pod 'AzureCommunicationUICalling', '1.0.0-beta.2'
46+
pod 'AzureCommunicationUICalling', '1.0.0'
4747
end
4848
```
4949

articles/confidential-computing/virtual-machine-solutions-amd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ You can create confidential VMs that run on AMD processors in the following size
2424

2525
| Size family | Description |
2626
| ------------------ | ----------------------------------------------------------------------------------- |
27-
| **DCasv5-series** | Confidential VM with remote storage only. No local temporary desk. |
27+
| **DCasv5-series** | Confidential VM with remote storage only. No local temporary disk. |
2828
| **DCadsv5-series** | Confidential VM with a local temporary disk. |
2929
| **ECasv5-series** | Memory-optimized confidential VM with remote storage only. No local temporary disk. |
3030
| **ECadsv5-series** | Memory-optimized confidential VM with a local temporary disk. |

articles/cost-management-billing/reservations/view-reservations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,8 @@ When you use the PowerShell script to assign the ownership role and it runs succ
133133
- Accept pipeline input: False
134134
- Accept wildcard characters: False
135135

136-
[User Access Administrators](../../role-based-access-control/built-in-roles.md#user-access-administrator) can add the users to Reservation Administrator and Reservation Reader roles.
136+
## Tenant-level access
137+
[User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) rights are required before you can grant users or groups the Reservation Administrator and Reservation Reader roles at the tenant level.
137138

138139
## Add a Reservation Administrator role at the tenant level
139140

articles/iot-central/core/overview-iot-central-developer.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,13 +29,13 @@ The following sections describe the main types of device you can connect to an I
2929

3030
### IoT device
3131

32-
A IoT device is a standalone device connects directly to IoT Central. A IoT device typically sends telemetry from its onboard or connected sensors to your IoT Central application. Standalone devices can also report property values, receive writable property values, and respond to commands.
32+
An IoT device is a standalone device that connects directly to IoT Central. An IoT device typically sends telemetry from its onboard or connected sensors to your IoT Central application. Standalone devices can also report property values, receive writable property values, and respond to commands.
3333

3434
### IoT Edge device
3535

3636
An IoT Edge device connects directly to IoT Central. An IoT Edge device can send its own telemetry, report its properties, and respond to writable property updates and commands. IoT Edge modules process data locally on the IoT Edge device. An IoT Edge device can also act as an intermediary for other devices known as downstream devices. Scenarios that use IoT Edge devices include:
3737

38-
- Aggregate or filter telemetry before it's sent to IoT Central. This approach can help to reduce the costs of sending data to IoT Central.
38+
- Aggregate or filter telemetry before it's sent to IoT Central. This approach can help reduce the costs of sending data to IoT Central.
3939
- Enable devices that can't connect directly to IoT Central to connect through the IoT Edge device. For example, a downstream device might use bluetooth to connect to the IoT Edge device, which then connects over the internet to IoT Central.
4040
- Control downstream devices locally to avoid the latency associated with connecting to IoT Central over the internet.
4141

@@ -62,7 +62,7 @@ When you register a device with IoT Central, you're telling IoT Central the ID o
6262
6363
There are three ways to register a device in an IoT Central application:
6464

65-
- Automatically register devices when they first try to connect. This scenario enables OEMs to mass manufacture devices that can connect without first being registered. To learn more, see [Automatically register devices](concepts-device-authentication.md#automatically-register-devices).
65+
- Automatically register devices when they first try to connect. This scenario enables OEMs to mass manufacture devices that can connect without being registered first. To learn more, see [Automatically register devices](concepts-device-authentication.md#automatically-register-devices).
6666
- Add devices in bulk from a CSV file. To learn more, see [Import devices](howto-manage-devices-in-bulk.md#import-devices).
6767
- Use the **Devices** page in your IoT Central application to register devices individually. To learn more, see [Add a device](howto-manage-devices-individually.md#add-a-device).
6868

@@ -75,7 +75,7 @@ You only need to register a device once in your IoT Central application.
7575

7676
### Provision a device
7777

78-
When a device first tries to connect to your IoT Central application, it starts the process by connecting to the Device Provisioning Service (DPS). DPS checks the device's credentials and, if they're valid, provisions the device with connection string for one of IoT Central's internal IoT hubs. DPS uses the _group enrollment_ configurations in your IoT Central application to manage this provisioning process for you.
78+
When a device first tries to connect to your IoT Central application, it starts the process by connecting to the Device Provisioning Service (DPS). DPS checks the device's credentials and, if they're valid, provisions the device with the connection string for one of IoT Central's internal IoT hubs. DPS uses the _group enrollment_ configurations in your IoT Central application to manage this provisioning process for you.
7979

8080
> [!TIP]
8181
> The device also sends the **ID scope** value that tells DPS which IoT Central application the device is connecting to. You can look up the **ID scope** in your IoT Central application on the **Permissions > Device connection groups** page.
@@ -85,7 +85,7 @@ Typically, a device should cache the connection string it receives from DPS but
8585
Using DPS enables:
8686

8787
- IoT Central to onboard and connect devices at scale.
88-
- You to generate device credentials and configure the devices offline without registering the devices through IoT Central UI.
88+
- You to generate device credentials and configure the devices offline without registering the devices through the IoT Central UI.
8989
- You to use your own device IDs to register devices in IoT Central. Using your own device IDs simplifies integration with existing back-office systems.
9090
- A single, consistent way to connect devices to IoT Central.
9191

@@ -106,7 +106,7 @@ All data exchanged between devices and your Azure IoT Central is encrypted. IoT
106106

107107
Device developers typically use one of the device SDKs to implement devices that connect to an IoT Central application. Some scenarios, such as for devices that can't connect to the internet, also require a gateway.
108108

109-
A solution design must take into account the required device connectivity pattern. These patterns fall in to two broad categories. Both categories include devices sending telemetry to your IoT Central application:
109+
A solution design must take into account the required device connectivity pattern. These patterns fall into two broad categories. Both categories include devices sending telemetry to your IoT Central application:
110110

111111
### Persistent connections
112112

articles/service-bus-messaging/service-bus-queues-topics-subscriptions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ A related benefit is **load-leveling**, which enables producers and consumers to
1818
Using queues to intermediate between message producers and consumers provides an inherent loose coupling between the components. Because producers and consumers aren't aware of each other, a consumer can be upgraded without having any effect on the producer.
1919

2020
### Create queues
21-
You can create queues using the [Azure portal](service-bus-quickstart-portal.md), [PowerShell](service-bus-quickstart-powershell.md), [CLI](service-bus-quickstart-cli.md), or [Resource Manager templates](service-bus-resource-manager-namespace-queue.md). Then, send and receive messages using clients written in [C#](service-bus-dotnet-get-started-with-queues.md), [Java](service-bus-java-how-to-use-queues.md), [Python](service-bus-python-how-to-use-queues.md), and [JavaScript](service-bus-nodejs-how-to-use-queues.md).
21+
You can create queues using the [Azure portal](service-bus-quickstart-portal.md), [PowerShell](service-bus-quickstart-powershell.md), [CLI](service-bus-quickstart-cli.md), or [Azure Resource Manager templates (ARM templates)](service-bus-resource-manager-namespace-queue.md). Then, send and receive messages using clients written in [C#](service-bus-dotnet-get-started-with-queues.md), [Java](service-bus-java-how-to-use-queues.md), [Python](service-bus-python-how-to-use-queues.md), and [JavaScript](service-bus-nodejs-how-to-use-queues.md).
2222

2323
### Receive modes
2424
You can specify two different modes in which Service Bus receives messages.
@@ -41,7 +41,7 @@ A queue allows processing of a message by a single consumer. In contrast to queu
4141
The message-sending functionality of a queue maps directly to a topic and its message-receiving functionality maps to a subscription. Among other things, this feature means that subscriptions support the same patterns described earlier in this section regarding queues: competing consumer, temporal decoupling, load leveling, and load balancing.
4242

4343
### Create topics and subscriptions
44-
Creating a topic is similar to creating a queue, as described in the previous section. You can create topics and subscriptions using the [Azure portal](service-bus-quickstart-topics-subscriptions-portal.md), [PowerShell](service-bus-quickstart-powershell.md), [CLI](service-bus-tutorial-topics-subscriptions-cli.md), or [Resource Manager templates](service-bus-resource-manager-namespace-topic.md). Then, send messages to a topic and receive messages from subscriptions using clients written in [C#](service-bus-dotnet-how-to-use-topics-subscriptions.md), [Java](service-bus-java-how-to-use-topics-subscriptions.md), [Python](service-bus-python-how-to-use-topics-subscriptions.md), and [JavaScript](service-bus-nodejs-how-to-use-topics-subscriptions.md).
44+
Creating a topic is similar to creating a queue, as described in the previous section. You can create topics and subscriptions using the [Azure portal](service-bus-quickstart-topics-subscriptions-portal.md), [PowerShell](service-bus-quickstart-powershell.md), [CLI](service-bus-tutorial-topics-subscriptions-cli.md), or [ARM templates](service-bus-resource-manager-namespace-topic.md). Then, send messages to a topic and receive messages from subscriptions using clients written in [C#](service-bus-dotnet-how-to-use-topics-subscriptions.md), [Java](service-bus-java-how-to-use-topics-subscriptions.md), [Python](service-bus-python-how-to-use-topics-subscriptions.md), and [JavaScript](service-bus-nodejs-how-to-use-topics-subscriptions.md).
4545

4646
### Rules and actions
4747
In many scenarios, messages that have specific characteristics must be processed in different ways. To enable this processing, you can configure subscriptions to find messages that have desired properties and then perform certain modifications to those properties. While Service Bus subscriptions see all messages sent to the topic, it is possible to only copy a subset of those messages to the virtual subscription queue. This filtering is accomplished using subscription filters. Such modifications are called **filter actions**. When a subscription is created, you can supply a filter expression that operates on the properties of the message. The properties can be both the system properties (for example, **Label**) and custom application properties (for example, **StoreName**.) The SQL filter expression is optional in this case. Without a SQL filter expression, any filter action defined on a subscription will be done on all the messages for that subscription.

articles/storage/blobs/access-tiers-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,6 @@ ms.reviewer: fryu
1414

1515
# Hot, Cool, and Archive access tiers for blob data
1616

17-
We sometimes use the first person plural in content.
18-
1917
Data stored in the cloud grows at an exponential pace. To manage costs for your expanding storage needs, it can be helpful to organize your data based on how frequently it will be accessed and how long it will be retained. Azure storage offers different access tiers so that you can store your blob data in the most cost-effective manner based on how it's being used. Azure Storage access tiers include:
2018

2119
- **Hot tier** - An online tier optimized for storing data that is accessed or modified frequently. The Hot tier has the highest storage costs, but the lowest access costs.

articles/virtual-machines/windows/build-image-with-packer.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,15 +42,14 @@ Create a service principal with [New-AzADServicePrincipal](/powershell/module/az
4242

4343
```azurepowershell
4444
$sp = New-AzADServicePrincipal -DisplayName "PackerSP$(Get-Random)"
45-
$BSTR = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($sp.Secret)
46-
$plainPassword = [System.Runtime.InteropServices.Marshal]::PtrToStringAuto($BSTR)
45+
$plainPassword = (New-AzADSpCredential -ObjectId $sp.Id).SecretText
4746
```
4847

4948
Then output the password and application ID.
5049

5150
```powershell
5251
$plainPassword
53-
$sp.ApplicationId
52+
$sp.AppId
5453
```
5554

5655

@@ -68,7 +67,7 @@ Create a file named *windows.json* and paste the following content. Enter your o
6867

6968
| Parameter | Where to obtain |
7069
|-------------------------------------|----------------------------------------------------|
71-
| *client_id* | View service principal ID with `$sp.applicationId` |
70+
| *client_id* | View service principal ID with `$sp.AppId` |
7271
| *client_secret* | View the auto-generated password with `$plainPassword` |
7372
| *tenant_id* | Output from `$sub.TenantId` command |
7473
| *subscription_id* | Output from `$sub.SubscriptionId` command |

0 commit comments

Comments
 (0)