Skip to content

Commit 3db51f5

Browse files
authored
Merge pull request #200752 from MicrosoftDocs/main
6/07 AM Publish
2 parents 4361011 + 70cadad commit 3db51f5

File tree

129 files changed

+4481
-3931
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

129 files changed

+4481
-3931
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -977,6 +977,7 @@
977977
"articles/container-apps/.openpublishing.redirection.container-apps.json",
978978
"articles/spring-cloud/.openpublishing.redirection.spring-cloud.json",
979979
"articles/load-testing/.openpublishing.redirection.azure-load-testing.json",
980-
"articles/azure-video-indexer/.openpublishing.redirection.azure-video-indexer.json"
980+
"articles/azure-video-indexer/.openpublishing.redirection.azure-video-indexer.json",
981+
"articles/machine-learning/.openpublishing.redirection.machine-learning.json"
981982
]
982983
}

.openpublishing.redirection.json

Lines changed: 30 additions & 3266 deletions
Large diffs are not rendered by default.

articles/active-directory/app-provisioning/application-provisioning-config-problem-scim-compatibility.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 08/25/2021
11+
ms.date: 05/25/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -27,10 +27,10 @@ The provisioning service uses the concept of a job to operate against an applica
2727
If you are using an application in the gallery, the job generally contains the name of the app (e.g. zoom snowFlake, dataBricks, etc.). You can skip this documentation when using a gallery application. This primarily applies for non-gallery applications with jobID SCIM or customAppSSO.
2828

2929
## SCIM 2.0 compliance issues and status
30-
In the table below, any item marked as fixed means that the proper behavior can be found on the SCIM job. We have worked to ensure backwards compatibility for the changes we have made. However, we do not recommend implementing old behavior. We recommend using the new behavior for any new implementations and updating existing implementations.
30+
In the table below, any item marked as fixed means that the proper behavior can be found on the SCIM job. We have worked to ensure backwards compatibility for the changes we have made. We recommend using the new behavior for any new implementations and updating existing implementations. Please note that the customappSSO behavior that was the default prior to December 2018 is not supported anymore.
3131

3232
> [!NOTE]
33-
> For the changes made in 2018, you can revert back to the customappsso behavior. For the changes made since 2018, you can use the URLs to revert back to the older behavior. We have worked to ensure backwards compatibility for the changes we have made by allowing you to revert back to the old jobID or by using a flag. However, as previously mentioned, we do not recommend implementing old behavior. We recommend using the new behavior for any new implementations and updating existing implementations.
33+
> For the changes made in 2018, it is possible to revert back to the customappsso behavior. For the changes made since 2018, you can use the URLs to revert back to the older behavior. We have worked to ensure backwards compatibility for the changes we have made by allowing you to revert back to the old jobID or by using a flag. However, as previously mentioned, we do not recommend implementing old behavior as it is not supported anymore. We recommend using the new behavior for any new implementations and updating existing implementations.
3434
3535
| **SCIM 2.0 compliance issue** | **Fixed?** | **Fix date** | **Backwards compatibility** |
3636
|---|---|---|

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-create-custom-queries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ This article describes how you can use the **Audit** dashboard in Permissions Ma
108108
1. In the **Audit** dashboard, load the query you want to duplicate.
109109
2. Select the ellipses menu **(…)** on the far right, and then select **Duplicate**.
110110

111-
CloudKnox creates a copy of the query. Both the copy of the query and the original query display in the **Saved Queries** list.
111+
Permissions Management creates a copy of the query. Both the copy of the query and the original query display in the **Saved Queries** list.
112112

113113
You can rename the original or copy of the query, change it, and save it without changing the other query.
114114

27.2 KB
Loading
9.8 KB
Loading
27.5 KB
Loading

articles/active-directory/saas-apps/tap-app-security-provisioning-tutorial.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,9 +45,14 @@ The scenario outlined in this tutorial assumes that you already have the followi
4545

4646
## Step 2. Configure TAP App Security to support provisioning with Azure AD
4747

48-
Contact [TAP App Security support](mailto:[email protected]) in order to obtain a SCIM Token.
49-
50-
48+
1. Log in to [TAP App Security back-end control panel](https://app.tapappsecurity.com/).
49+
1. Navigate to **Single Sign On > Active Directory**.
50+
1. Click on the **Integrate Active Directory app** button. Then enter the domain of your organization and click **Save** button.
51+
[![Screenshot on how to add domain.](media/tap-app-security-provisioning-tutorial/add-domain.png)](media/tap-app-security-provisioning-tutorial/add-domain.png#lightbox)
52+
1. After entering the domain, a new line in the table appears showing domain name and its status as **initialize**. Click on the gear icon to reveal technical data about TAP app Security server and to complete initialization.
53+
[![Screenshot showing initialize.](media/tap-app-security-provisioning-tutorial/initialize.png)](media/tap-app-security-provisioning-tutorial/initialize.png#lightbox)
54+
1. Technical data about TAP App Security servers is revealed.You can now copy the **Tenant Url** and **Authorization Token** from this page to be used later on while setting up provisioning in Azure AD.
55+
[![Screenshot showing domain details.](media/tap-app-security-provisioning-tutorial/domain-details.png)](media/tap-app-security-provisioning-tutorial/domain-details.png#lightbox)
5156
## Step 3. Add TAP App Security from the Azure AD application gallery
5257

5358
Add TAP App Security from the Azure AD application gallery to start managing provisioning to TAP App Security. If you have previously setup TAP App Security for SSO, you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).

articles/aks/learn/quick-windows-container-deploy-cli.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,6 @@ az aks create \
9797
--generate-ssh-keys \
9898
--windows-admin-username $WINDOWS_USERNAME \
9999
--vm-set-type VirtualMachineScaleSets \
100-
--kubernetes-version 1.20.7 \
101100
--network-plugin azure
102101
```
103102

articles/api-management/api-management-howto-integrate-internal-vnet-appgateway.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,11 @@ By combining API Management provisioned in an internal virtual network with the
2323
* Use a single API Management resource and have a subset of APIs defined in API Management available for external consumers.
2424
* Provide a turnkey way to switch access to API Management from the public internet on and off.
2525

26+
For architectural guidance, see:
27+
* **Basic enterprise integration**: [Reference architecture](/azure/architecture/reference-architectures/enterprise-integration/basic-enterprise-integration?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json)
28+
* **API Management landing zone accelerator**: [Reference architecture](/azure/architecture/example-scenario/integration/app-gateway-internal-api-management-function?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json) and [design guidance](/azure/cloud-adoption-framework/scenarios/app-platform/api-management/land?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json)
29+
30+
2631
> [!NOTE]
2732
> This article has been updated to use the [Application Gateway WAF_v2 SKU](../application-gateway/application-gateway-autoscaling-zone-redundant.md).
2833

0 commit comments

Comments
 (0)