Skip to content

Commit 3ec8475

Browse files
authored
Merge pull request #277165 from MicrosoftDocs/main
6/4/2024 AM Publish
2 parents e886ec3 + 3dba832 commit 3ec8475

File tree

58 files changed

+233
-144
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+233
-144
lines changed

articles/active-directory-b2c/identity-provider-generic-saml-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -422,7 +422,7 @@ Upon an application sign-out request, Azure AD B2C attempts to sign out from you
422422

423423
## Debug SAML protocol
424424

425-
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Microsoft Edge or IE Developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
425+
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Microsoft Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
426426

427427
Using these tools, you can check the integration between Azure AD B2C and your SAML identity provider. For example:
428428

articles/active-directory-b2c/page-layout.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
179179
- Added support for [display controls](display-controls.md) in custom policies.
180180

181181
**1.2.0**
182-
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer (IE) to properly save this information.
182+
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer to properly save this information.
183183
- Added a configurable user input validation delay for improved user experience.
184184
- Accessibility fixes
185185
- Fix an accessibility issue so that error messages are read by Narrator.
@@ -273,7 +273,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
273273
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your sign-in name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
274274

275275
**1.2.0**
276-
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer (IE) to properly save this information.
276+
- The username/email and password fields now use the `form` HTML element to allow Microsoft Edge and Internet Explorer to properly save this information.
277277
- Accessibility fixes
278278
- You can now add the `data-preload="true"` attribute [in your HTML tags](customize-ui-with-html.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
279279
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
@@ -313,7 +313,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
313313

314314
**1.2.7**
315315
- Fixed accessibility issue on label for retries code.
316-
- Fixed issue caused by incompatibility of default parameter on IE 11.
316+
- Fixed issue caused by incompatibility of default parameter on Internet Explorer 11.
317317
- Set up `H1` heading and enable by default.
318318
- Updated HandlebarJS version to 4.7.7.
319319

articles/active-directory-b2c/troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Use **Run now** and `https://jwt.ms` to test your policies independently of your
165165

166166
## Troubleshoot SAML protocol
167167

168-
To help configure and debug the integration with your service provider, you can use a browser extension for the SAML protocol, for example, [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Edge or IE Developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
168+
To help configure and debug the integration with your service provider, you can use a browser extension for the SAML protocol, for example, [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
169169

170170
The following screenshot demonstrates how the SAML DevTools extension presents the SAML request Azure AD B2C sends to the identity provider, and the SAML response.
171171

articles/ai-services/content-safety/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ To use the Content Safety APIs, you must create your Azure AI Content Safety res
116116
|---|---|---|---|---|---|---|
117117
| East US |||||||
118118
| East US 2 || | || ||
119-
| West US | | | | || |
119+
| West US | | | | || |
120120
| West US 2 || | | | ||
121121
| Central US || | | | ||
122122
| North Central US || | | | ||

articles/app-service/quickstart-dotnetcore.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -240,12 +240,6 @@ Retrieve and initialize [the ASP.NET Core web app template](https://github.com/A
240240
241241
## 2. Publish your web app
242242
243-
The AZD template contains files that will generate the following required resources for your application to run in App service:
244-
245-
- A new [resource group](../azure-resource-manager/management/overview.md#terminology) to contain all of the Azure resources for the service.
246-
- A new [App Service plan](overview-hosting-plans.md) that specifies the location, size, and features of the web server farm that hosts your app.
247-
- A new [App Service app](overview-hosting-plans.md) instance to run the deployed application.
248-
249243
Follow these steps to create your App Service resources and publish your project:
250244
251245
:::zone target="docs" pivot="development-environment-vs"
@@ -538,6 +532,12 @@ Follow these steps to create your App Service resources and publish your project
538532
539533
:::zone target="docs" pivot="development-environment-azd"
540534
535+
The AZD template contains files that will generate the following required resources for your application to run in App service:
536+
537+
- A new [resource group](../azure-resource-manager/management/overview.md#terminology) to contain all of the Azure resources for the service.
538+
- A new [App Service plan](overview-hosting-plans.md) that specifies the location, size, and features of the web server farm that hosts your app.
539+
- A new [App Service app](overview-hosting-plans.md) instance to run the deployed application.
540+
541541
1. Sign into your Azure account by using the az login command and following the prompt:
542542
543543
```bash

articles/azure-maps/how-to-use-map-control.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ You can embed a map in a web page by using the Map Control client-side JavaScrip
135135
6. Optionally, you may find it helpful to add the following `meta` elements to the `head` element of the page:
136136

137137
```HTML
138-
<!-- Ensures that IE and Edge uses the latest version and doesn't emulate an older version -->
138+
<!-- Ensures that Internet Explorer and Edge uses the latest version and doesn't emulate an older version -->
139139
<meta http-equiv="x-ua-compatible" content="IE=Edge">
140140

141141
<!-- Ensures the web page looks good on all screen sizes. -->
@@ -152,7 +152,7 @@ You can embed a map in a web page by using the Map Control client-side JavaScrip
152152

153153
<meta charset="utf-8">
154154

155-
<!-- Ensures that IE and Edge uses the latest version and doesn't emulate an older version -->
155+
<!-- Ensures that Internet Explorer and Edge uses the latest version and doesn't emulate an older version -->
156156
<meta http-equiv="x-ua-compatible" content="IE=Edge">
157157

158158
<!-- Ensures the web page looks good on all screen sizes. -->

articles/azure-maps/how-to-use-spatial-io-module.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ You can load the Azure Maps spatial IO module using one of the two options:
7777

7878
<meta charset="utf-8">
7979

80-
<!-- Ensures that IE and Edge uses the latest version and doesn't emulate an older version -->
80+
<!-- Ensures that Internet Explorer and Edge uses the latest version and doesn't emulate an older version -->
8181
<meta http-equiv="x-ua-compatible" content="IE=Edge">
8282

8383
<!-- Ensures the web page looks good on all screen sizes. -->
@@ -157,7 +157,7 @@ You can load the Azure Maps spatial IO module using one of the two options:
157157

158158
<meta charset="utf-8">
159159

160-
<!-- Ensures that IE and Edge uses the latest version and doesn't emulate an older version -->
160+
<!-- Ensures that Internet Explorer and Edge uses the latest version and doesn't emulate an older version -->
161161
<meta http-equiv="x-ua-compatible" content="IE=Edge">
162162

163163
<!-- Ensures the web page looks good on all screen sizes. -->

articles/azure-monitor/agents/azure-monitor-agent-data-collection-endpoint.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,8 @@ Azure Monitor Agent supports [Azure virtual network service tags](../../virtual-
1717

1818
Azure Virtual network service tags can be used to define network access controls on [network security groups](../../virtual-network/network-security-groups-overview.md#security-rules), [Azure Firewall](../../firewall/service-tags.md), and user-defined routes. Use service tags in place of specific IP addresses when you create security rules and routes. For scenarios where Azure virtual network service tags cannot be used, the Firewall requirements are given below.
1919

20-
Note:
21-
22-
Data Collection Endpoints public IP addresses are not part of the abovementioned network service tags, so, if you have a Custom Logs or IIS logs Data collection Rules then consider allowing the Data collection Endpoint's public IP addresses for those scenarios to work until supported by Network service tags.
20+
>[!NOTE]
21+
> Data collection endpoint public IP addresses are not part of the abovementioned network service tags. If you have custom logs or IIS log data collection rules, consider allowing the data collection endpoint's public IP addresses for these scenarios to work until these scenarios are supported by network service tags.
2322
2423
## Firewall requirements
2524

articles/azure-monitor/agents/diagnostics-extension-schema-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ The top-level element of the diagnostics configuration file.
7171
|Attributes|Description|
7272
|----------------|-----------------|
7373
| **overallQuotaInMB** | The maximum amount of local disk space that may be consumed by the various types of diagnostic data collected by Azure Diagnostics. The default setting is 4096 MB.<br />
74-
|**useProxyServer** | Configure Azure Diagnostics to use the proxy server settings as set in IE settings.|
74+
|**useProxyServer** | Configure Azure Diagnostics to use the proxy server settings as set in Internet Explorer settings.|
7575
|**sinks** | Added in 1.5. Optional. Points to a sink location to also send diagnostic data for all child elements that support sinks. Sink example is Application Insights or Event Hubs. Note you need to add the *resourceId* property under the *Metrics* element if you want events uploaded to Event Hubs to have a resource ID. |
7676

7777

articles/azure-monitor/app/javascript-sdk-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ For instructions on how to add SDK configuration, see [Add SDK configuration](./
5151
| disableIkeyDeprecationMessage<br><br>Disable instrumentation Key deprecation error message. If true, error messages are NOT sent. | boolean | true |
5252
| disableInstrumentationKeyValidation<br><br>If true, instrumentation key validation check is bypassed. Default value is false. | boolean | false |
5353
| disableTelemetry<br><br>If true, telemetry isn't collected or sent. Default is false. | boolean | false |
54-
| disableXhr<br><br>Don't use XMLHttpRequest or XDomainRequest (for IE < 9) by default instead attempt to use fetch() or sendBeacon. If no other transport is available, it uses XMLHttpRequest | boolean | false |
54+
| disableXhr<br><br>Don't use XMLHttpRequest or XDomainRequest (for Internet Explorer < version 9) by default instead attempt to use fetch() or sendBeacon. If no other transport is available, it uses XMLHttpRequest | boolean | false |
5555
| distributedTracingMode<br><br>Sets the distributed tracing mode. If AI_AND_W3C mode or W3C mode is set, W3C trace context headers (traceparent/tracestate) are generated and included in all outgoing requests. AI_AND_W3C is provided for back-compatibility with any legacy Application Insights instrumented services. | numeric or `DistributedTracingModes` | `DistributedTracing Modes.AI_AND_W3C` |
5656
| enableAjaxErrorStatusText<br><br>Default false. If true, include response error data text boolean in dependency event on failed AJAX requests. | boolean | false |
5757
| enableAjaxPerfTracking<br><br>Default false. Flag to enable looking up and including extra browser window.performance timings in the reported Ajax (XHR and fetch) reported metrics. | boolean | false |

0 commit comments

Comments
 (0)