Skip to content

Commit 3f7cadc

Browse files
authored
Merge pull request #253477 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents efbfd71 + 5b43a43 commit 3f7cadc

File tree

5 files changed

+6
-8
lines changed

5 files changed

+6
-8
lines changed

articles/active-directory/fundamentals/add-custom-domain.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,8 +96,6 @@ If you can't verify a custom domain name, try the following suggestions:
9696

9797
- **Wait at least an hour and try again.** DNS records must propagate before you can verify the domain. This process can take an hour or more.
9898

99-
- **If you are trying to verify a child domain, verify the parent domain first.** Make sure the parent domain is created and verified first before you try to verify a child domain.
100-
10199
- **Make sure the DNS record is correct.** Go back to the domain name registrar site. Make sure the entry is there, and that it matches the DNS entry information provided in the Microsoft Entra admin center.
102100

103101
- If you can't update the record on the registrar site, share the entry with someone who has permissions to add the entry and verify it's correct.

articles/active-directory/fundamentals/how-to-create-delete-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Reviewing the default user permissions may also help you determine the type of u
3939

4040
The required role of least privilege varies based on the type of user you're adding and if you need to assign Microsoft Entra roles at the same time. **Global Administrator** can create users and assign roles, but whenever possible you should use the least privileged role.
4141

42-
| Role | Task |
42+
| Task | Role |
4343
| -- | -- |
4444
| Create a new user | User Administrator |
4545
| Invite an external guest | Guest Inviter |

articles/ai-services/speech-service/speech-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: eric-urban
77
manager: nitinme
88
ms.service: azure-ai-speech
99
ms.topic: overview
10-
ms.date: 09/16/2022
10+
ms.date: 10/02/2023
1111
ms.author: eur
1212
---
1313

articles/service-fabric/service-fabric-reverseproxy-setup.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ After you have a Resource Manager template, you can enable the reverse proxy wit
5757

5858
```json
5959
{
60-
"apiVersion": "2016-09-01",
60+
"apiVersion": "2021-06-01",
6161
"type": "Microsoft.ServiceFabric/clusters",
6262
"name": "[parameters('clusterName')]",
6363
"location": "[parameters('clusterLocation')]",
@@ -77,7 +77,7 @@ After you have a Resource Manager template, you can enable the reverse proxy wit
7777

7878
```json
7979
{
80-
"apiVersion": "2016-09-01",
80+
"apiVersion": "2021-06-01",
8181
"type": "Microsoft.ServiceFabric/clusters",
8282
"name": "[parameters('clusterName')]",
8383
"location": "[parameters('clusterLocation')]",

articles/storage/blobs/anonymous-read-access-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Allowing or disallowing anonymous access requires version 2019-04-01 or later of
5959

6060
### Permissions for disallowing anonymous access
6161

62-
To set the **AllowBlobPublicAccess** property for the storage account, a user must have permissions to create and manage storage accounts. Azure role-based access control (Azure RBAC) roles that provide these permissions include the **Microsoft.Storage/storageAccounts/write** action. Built-in roles with this action include:
62+
To set the **AllowBlobAnonymousAccess** property for the storage account, a user must have permissions to create and manage storage accounts. Azure role-based access control (Azure RBAC) roles that provide these permissions include the **Microsoft.Storage/storageAccounts/write** action. Built-in roles with this action include:
6363

6464
- The Azure Resource Manager [Owner](../../role-based-access-control/built-in-roles.md#owner) role
6565
- The Azure Resource Manager [Contributor](../../role-based-access-control/built-in-roles.md#contributor) role
@@ -305,4 +305,4 @@ Get-AzStorageContainer -Context $ctx | Select Name, PublicAccess
305305

306306
- [Prevent anonymous read access to containers and blobs](anonymous-read-access-prevent.md)
307307
- [Access public containers and blobs anonymously with .NET](anonymous-read-access-client.md)
308-
- [Authorizing access to Azure Storage](../common/authorize-data-access.md)
308+
- [Authorizing access to Azure Storage](../common/authorize-data-access.md)

0 commit comments

Comments
 (0)