Skip to content

Commit 3fe71ce

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into tamram23-0406
2 parents 344d59d + b98d2a6 commit 3fe71ce

File tree

5 files changed

+23
-14
lines changed

5 files changed

+23
-14
lines changed

articles/active-directory/hybrid/migrate-from-federation-to-cloud-authentication.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Modern authentication clients (Office 2016 and Office 2013, iOS, and Android app
9494
9595
To plan for rollback, use the [documented current federation settings](#document-current-federation-settings) and check the [federation design and deployment documentation](/windows-server/identity/ad-fs/deployment/windows-server-2012-r2-ad-fs-deployment-guide).
9696
97-
The rollback process should include converting managed domains to federated domains by using the [Convert-MSOLDomainToFederated](/powershell/module/msonline/convert-msoldomaintofederated) cmdlet. If necessary, configuring extra claims rules.
97+
The rollback process should include converting managed domains to federated domains by using the [Convert-MSOLDomainToFederated](/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdomainfederationconfiguration?view=graph-powershell-1.0&preserve-view=true) cmdlet. If necessary, configuring extra claims rules.
9898
9999
## Migration considerations
100100
@@ -136,7 +136,7 @@ The following table explains the behavior for each option. For more information,
136136
| rejectMfaByFederatedIdp | Azure AD always performs MFA and rejects MFA that federated identity provider performs. |
137137
138138
>[!NOTE]
139-
> The **federatedIdpMfaBehavior** setting is an evolved version of the **SupportsMfa** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).
139+
> The **federatedIdpMfaBehavior** setting is an evolved version of the **SupportsMfa** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdomainfederationconfiguration?view=graph-powershell-1.0&preserve-view=true).
140140
141141
For domains that have already set the **SupportsMfa** property, these rules determine how **federatedIdpMfaBehavior** and **SupportsMfa** work together:
142142
@@ -251,9 +251,11 @@ Sign in to the [Azure portal](https://portal.azure.com/), browse to **Azure Acti
251251

252252
4. On the **User sign-in** page:
253253

254-
- If you select **Pass-through authentication** option button, check **Enable single sign-on**, and then select **Next**.
254+
- If you select **Pass-through authentication** option button, and if SSO is needed for Windows 7 and 8.1 devices, check **Enable single sign-on**, and then select **Next**.
255255

256-
- If you select the **Password hash synchronization** option button, make sure to select the **Do not convert user accounts** check box. The option is deprecated. Check **Enable single sign-on**, and then select **Next**.
256+
- If you select the **Password hash synchronization** option button, make sure to select the **Do not convert user accounts** check box. The option is deprecated. If SSO is needed for Windows 7 and 8.1 devices, check **Enable single sign-on**, and then select **Next**.
257+
258+
Learn more: [Enable seamless SSO using PowerShell](how-to-connect-staged-rollout.md#pre-work-for-seamless-sso).
257259

258260
![Check enable single sign-on on User sign-in page](media/deploy-cloud-user-authentication/user-sign-in.png)
259261

@@ -268,6 +270,8 @@ Sign in to the [Azure portal](https://portal.azure.com/), browse to **Azure Acti
268270

269271
The domain administrator credentials aren't stored in Azure AD Connect or Azure AD and get discarded when the process successfully finishes. They are used to turn ON this feature.
270272

273+
Learn more: [Seamless SSO technical deep dive.](how-to-connect-sso-how-it-works.md)
274+
271275
6. On the **Ready to configure** page, make sure that the **Start the synchronization process when configuration completes** check box is selected. Then, select **Configure**.
272276

273277
![Ready to configure page](media/deploy-cloud-user-authentication/ready-to-configure.png)

articles/azure-cache-for-redis/cache-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ The **maxfragmentationmemory-reserved** setting configures the amount of memory
203203
When choosing a new memory reservation value (**maxmemory-reserved** or **maxfragmentationmemory-reserved**), consider how this change might affect a cache that is already running with large amounts of data in it. For instance, if you have a 53-GB cache with 49 GB of data, then change the reservation value to 8 GB, this change drops the max available memory for the system down to 45 GB. If either your current `used_memory` or your `used_memory_rss` values are higher than the new limit of 45 GB, then the system will have to evict data until both `used_memory` and `used_memory_rss` are below 45 GB. Eviction can increase server load and memory fragmentation. For more information on cache metrics such as `used_memory` and `used_memory_rss`, see [Create your own metrics](cache-how-to-monitor.md#create-your-own-metrics).
204204

205205
> [!IMPORTANT]
206-
> The **maxmemory-reserved** and **maxfragmentationmemory-reserved** settings are available only for Standard and Premium caches.
206+
> The **maxmemory-reserved** and **maxfragmentationmemory-reserved** settings are available for Basic,Standard and Premium caches.
207207
>
208208
209209
#### Keyspace notifications (advanced settings)

articles/cosmos-db/nosql/troubleshoot-changefeed-functions.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ealsur
55
ms.service: cosmos-db
66
ms.subservice: nosql
77
ms.custom: ignite-2022
8-
ms.date: 01/03/2023
8+
ms.date: 04/07/2023
99
ms.author: maquaran
1010
ms.topic: troubleshooting
1111
ms.reviewer: mjbrown
@@ -42,17 +42,17 @@ The error text itself tells you which Azure Cosmos DB database and container the
4242

4343
To resolve this issue:
4444

45-
1. Verify the `ConnectionStringSetting` attribute and that it references a setting that exists in your Azure function app.
45+
1. Verify the `Connection` attribute and that it references a setting that exists in your Azure function app.
4646

4747
The value on this attribute shouldn't be the connection string itself, but the name of the configuration setting.
4848

49-
1. Verify that the `databaseName` and `collectionName` values exist in your Azure Cosmos DB account.
49+
1. Verify that the `databaseName` and `containerName` values exist in your Azure Cosmos DB account.
5050

5151
If you're using automatic value replacement (using `%settingName%` patterns), make sure that the name of the setting exists in your Azure function app.
5252

53-
1. If you don't specify a `LeaseCollectionName/leaseCollectionName` value, the default is `leases`. Verify that such a container exists.
53+
1. If you don't specify a `LeaseContainerName/leaseContainerName` value, the default is `leases`. Verify that such a container exists.
5454

55-
Optionally, you can set the `CreateLeaseCollectionIfNotExists` attribute in your trigger to `true` to automatically create it.
55+
Optionally, you can set the `CreateLeaseContainerIfNotExists` attribute in your trigger to `true` to automatically create it.
5656

5757
1. Verify your [Azure Cosmos DB account's firewall configuration](../how-to-configure-firewall.md) to ensure that it's not blocking the Azure function.
5858

@@ -108,6 +108,8 @@ This scenario can have multiple causes. Consider trying any or all of the follow
108108

109109
* The speed at which your trigger receives new changes is dictated by the speed at which you're processing them. Verify the function's [execution time, or duration](../../azure-functions/analyze-telemetry-data.md). If your function is slow, that will increase the time it takes for the trigger to get new changes. If you see a recent increase in duration, a recent code change might be affecting it. If the speed at which you're receiving operations on your Azure Cosmos DB container is faster than the speed of your trigger, it will keep lagging behind. You might want to investigate the function's code to determine the most time-consuming operation and how to optimize it.
110110

111+
* You can use [Debug logs](how-to-configure-cosmos-db-trigger.md#enabling-trigger-specific-logs) to check the Diagnostics and verify if there are networking delays.
112+
111113
### Some changes are repeated in my trigger
112114

113115
The concept of a *change* is an operation on a document. The most common scenarios where events for the same document are received are:
@@ -122,6 +124,8 @@ The concept of a *change* is an operation on a document. The most common scenari
122124

123125
You might find that some of the changes that occurred in your Azure Cosmos DB container aren't being picked up by the Azure function. Or some changes are missing at the destination when you're copying them. If so, try the solutions in this section.
124126

127+
* Make sure you have [logs](how-to-configure-cosmos-db-trigger.md#enabling-trigger-specific-logs) enabled. Verify no errors are happening during processing.
128+
125129
* When your Azure function receives the changes, it often processes them and could, optionally, send the result to another destination. When you're investigating missing changes, make sure that you measure which changes are being received at the ingestion point (that is, when the Azure function starts), not at the destination.
126130

127131
* If some changes are missing on the destination, this could mean that some error is happening during the Azure function execution after the changes were received.

articles/sap/workloads/get-started.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.assetid: ad8e5c75-0cf6-4564-ae62-ea1246b4e5f2
1414
ms.topic: article
1515
ms.tgt_pltfrm: vm-linux
1616
ms.workload: infrastructure-services
17-
ms.date: 03/27/2023
17+
ms.date: 04/06/2023
1818
ms.author: juergent
1919
ms.custom: H1Hack27Feb2017
2020

@@ -65,6 +65,7 @@ In the SAP workload documentation space, you can find the following areas:
6565

6666
## Change Log
6767

68+
- April 6, 2023: Updates for RHEL 9 in [Setting up Pacemaker on RHEL in Azure](./high-availability-guide-rhel-pacemaker.md)
6869
- March 26, 2023: Adding recommended sector size in [SAP HANA Azure virtual machine Premium SSD v2 storage configurations](./hana-vm-premium-ssd-v2.md)
6970
- March 1, 2023: Change in [HA for SAP HANA on Azure VMs on RHEL](./sap-hana-high-availability-rhel.md) to add configuration for cluster default properties
7071
- February 21, 2023: Correct link to HANA hardware directory in [SAP HANA infrastructure configurations and operations on Azure](./hana-vm-operations.md) and fixed a bug in [SAP HANA Azure virtual machine Premium SSD v2 storage configurations](./hana-vm-premium-ssd-v2.md)

articles/vpn-gateway/openvpn-azure-ad-client-mac.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ titleSuffix: Azure VPN Gateway
55
author: cherylmc
66
ms.service: vpn-gateway
77
ms.topic: conceptual
8-
ms.date: 11/22/2022
8+
ms.date: 04/07/2023
99
ms.author: cherylmc
1010

1111
---
@@ -47,7 +47,7 @@ Before you can connect and authenticate using Azure AD, you must first configure
4747
1. Navigate to the profile file that you want to import, select it, then click **Open**.
4848

4949
:::image type="content" source="media/openvpn-azure-ad-client-mac/import-2.png" alt-text="Screenshot of Azure VPN Client import clicking open.":::
50-
1. View the connection profile information, then click **Save**.
50+
1. View the connection profile information. Change the **Certificate Information** value to show **DigiCert Global Root G2**, rather than the default or blank, then click **Save**.
5151

5252
:::image type="content" source="media/openvpn-azure-ad-client-mac/import-3.png" alt-text="Screenshot of Azure VPN Client saving the imported profile settings.":::
5353
1. In the VPN connections pane, select the connection profile that you saved. Then, click **Connect**.
@@ -63,7 +63,7 @@ Before you can connect and authenticate using Azure AD, you must first configure
6363

6464
:::image type="content" source="media/openvpn-azure-ad-client-mac/add-1.png" alt-text="Screenshot of Azure VPN Client selecting Add.":::
6565

66-
1. On the **Azure VPN Client** page, you can configure the profile settings.
66+
1. On the **Azure VPN Client** page, you can configure the profile settings. Change the **Certificate Information** value to show **DigiCert Global Root G2**, rather than the default or blank, then click **Save**.
6767

6868
:::image type="content" source="media/openvpn-azure-ad-client-mac/add-2.png" alt-text="Screenshot of Azure VPN Client profile settings.":::
6969

0 commit comments

Comments
 (0)