Skip to content

Commit 418ace1

Browse files
authored
Merge pull request #302311 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 1fa5204 + 4a817cb commit 418ace1

22 files changed

+98
-59
lines changed

articles/active-directory-b2c/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Manage your Azure AD B2C environment.
8484
| Use the Microsoft Graph API to automate the management of your B2C tenants | Microsoft Graph APIs:<br/>Manage [Identity Experience Framework](/graph/api/resources/trustframeworkpolicy?preserve-view=true&view=graph-rest-beta) (custom policies)<br/>[Keys](/graph/api/resources/trustframeworkkeyset?preserve-view=true&view=graph-rest-beta)<br/>[User Flows](/graph/api/resources/identityuserflow?preserve-view=true&view=graph-rest-beta) |
8585
| Integrate with Azure DevOps | A [CI/CD pipeline](deploy-custom-policies-devops.md) makes moving code between different environments easy and ensures production readiness always. |
8686
| Deploy custom policy | Azure AD B2C relies on caching to deliver performance to your end users. When you deploy a custom policy using whatever method, expect a delay of up to **30 minutes** for your users to see the changes. As a result of this behavior, consider the following practices when you deploy your custom policies: <br> - If you're deploying to a development environment, set the `DeploymentMode` attribute in your custom policy file's `<TrustFrameworkPolicy>` element to `Production`. <br> - Deploy your updated policy files to a production environment when traffic in your app is low. <br> - When you deploy to a production environment to update existing policy files, upload the updated files with new names, which act as new versions of the policies. Then, update your app references to the new names/versions. You can remove the old policy files afterward or keep them as your last known good configuration for easy rollback.<br> - If you need to deploy to a production environment to update existing policy files without versioning, make the new policy backward compatible with the old policy by following some simple rules. If you need to change a technical profile, claim, or [SubJourney](subjourneys.md), create a new version of it, publish the policy, and wait for 30 minutes for Azure AD B2C caches to pick up the new version. Then, in a subsequent update, make changes to use the new version and perform another policy update. Wait for another 30 minutes, then you can delete the old version of the elements if needed. Ensure all of your business logic is inside SubJourneys.<br> - You can set the `DeploymentMode` to `Development` in a production environment to bypass the caching behavior. However, we don't recommend this practice. If you [Collect Azure AD B2C logs with Application Insights](troubleshoot-with-application-insights.md), all claims sent to and from identity providers are collected, which is a security and performance risk. |
87-
| Deploy app registration updates | When you modify your application registration in your Azure AD B2C tenant, such as updating the application's redirect URI, expect a delay of up to **2 hours (3600s)** for the changes to take effect in the production environment. We recommend that you modify your application registration in your production environment when traffic in your app is low.|
87+
| Deploy app registration updates | When you modify your application registration in your Azure AD B2C tenant, such as updating the application's redirect URI, expect a delay of up to **2 hours (7200s)** for the changes to take effect in the production environment. We recommend that you modify your application registration in your production environment when traffic in your app is low.|
8888
| Integrate with Azure Monitor | [Audit log events](view-audit-logs.md) are only retained for seven days. [Integrate with Azure Monitor](azure-monitor.md) to retain the logs for long-term use, or integrate with third-party security information and event management (SIEM) tools to gain insights into your environment. |
8989
| Setup active alerting and monitoring | [Track user behavior](./analytics-with-application-insights.md) in Azure AD B2C using Application Insights. |
9090

articles/azure-maps/how-to-dataset-geojson.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ One thing to consider when adding to an existing dataset is how the feature IDs
8686
8787
If your original dataset was created from a GoeJSON source and you wish to add another facility created from a drawing package, you can append it to your existing dataset by referencing its `conversionId`, as demonstrated by this HTTP POST request:
8888
89-
```shttp
89+
```https
9090
https://us.atlas.microsoft.com/datasets?api-version=2023-03-01-preview&conversionId={conversionId}&outputOntology=facility-2.0&datasetId={datasetId}
9191
```
9292

articles/azure-signalr/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ landingContent:
120120
links:
121121
- text: Use private endpoints
122122
url: howto-private-endpoints.md
123-
- text: Manage network acess
123+
- text: Manage network access
124124
url: howto-network-access-control.md
125125
- text: Custom domain
126126
url: howto-custom-domain.md
11.5 KB
Loading

articles/azure-signalr/signalr-howto-configure-application-firewall.md

Lines changed: 40 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ The Application Firewall provides sophisticated control over client connections
1717

1818
## What Does the Application Firewall Do?
1919

20-
The Application Firewall consists of various rule lists. Currently, there are two rule lists called *Client Connection Count Rules* and *Client Traffic Control Rules*. Future updates will support more rule lists to control aspects such as connection lifetime.
20+
The Application Firewall consists of various rule lists. Currently, there are two rule lists called *Client Connection Count Rules* and *Client Traffic Control Rules* and a configuration *Max Client Lifetime*. Future updates will support more rule lists to control aspects such as connection lifetime.
2121

2222
This guideline is divided into three parts:
2323
1. Introduction to different application firewall rules.
@@ -69,6 +69,9 @@ Client Traffic Control Rules restrict the inbound throughput of client connectio
6969
This rule limits the inbound throughput of the same claim.
7070

7171

72+
## Max Client Lifetime configuration
73+
This setting controls the maximum lifetime of a client connection, in seconds. When the client connection lifetime reaches the specified time, the service will automatically clean up the session and close the connection. To disable this limit, set the value to 0.
74+
7275
## Set up Application Firewall
7376

7477
# [Portal](#tab/Portal)
@@ -112,42 +115,43 @@ resource signalr 'Microsoft.SignalRService/signalr@2024-10-01-preview' = {
112115
claimName: 'paidUser'
113116
}
114117
]
115-
clientTrafficControlRules:[
118+
clientTrafficControlRules:[
116119
// Add or remove rules as needed
117-
{
118-
// This rule will be skipped if no userId is set
119-
type: 'TrafficThrottleByUserIdRule'
120-
// Every minute
121-
aggregationWindowInSeconds: 60
122-
// 10MB
123-
maxInboundMessageBytes: 10485760
124-
}
125-
{
126-
type: 'TrafficThrottleByJwtSignatureRule'
127-
// Every 30 seconds
128-
aggregationWindowInSeconds: 30
129-
// 5MB
130-
maxInboundMessageBytes: 5242880
131-
}
132-
{
133-
// This rule will be skipped if no freeUser claim is set
134-
type: 'TrafficThrottleByJwtCustomClaimRule'
135-
// Every 10 minutes
136-
aggregationWindowInSeconds: 600
137-
// 1MB
138-
maxInboundMessageBytes: 1048576
139-
claimName: 'freeUser'
140-
}
141-
{
142-
// This rule will be skipped if no paidUser claim is set
143-
type: 'TrafficThrottleByJwtCustomClaimRule'
144-
// Every 30 seconds
145-
aggregationWindowInSeconds: 30
146-
// 1MB
147-
maxInboundMessageBytes: 1048576
148-
claimName: 'paidUser'
149-
}
150-
]
120+
{
121+
// This rule will be skipped if no userId is set
122+
type: 'TrafficThrottleByUserIdRule'
123+
// Every minute
124+
aggregationWindowInSeconds: 60
125+
// 10MB
126+
maxInboundMessageBytes: 10485760
127+
}
128+
{
129+
type: 'TrafficThrottleByJwtSignatureRule'
130+
// Every 30 seconds
131+
aggregationWindowInSeconds: 30
132+
// 5MB
133+
maxInboundMessageBytes: 5242880
134+
}
135+
{
136+
// This rule will be skipped if no freeUser claim is set
137+
type: 'TrafficThrottleByJwtCustomClaimRule'
138+
// Every 10 minutes
139+
aggregationWindowInSeconds: 600
140+
// 1MB
141+
maxInboundMessageBytes: 1048576
142+
claimName: 'freeUser'
143+
}
144+
{
145+
// This rule will be skipped if no paidUser claim is set
146+
type: 'TrafficThrottleByJwtCustomClaimRule'
147+
// Every 30 seconds
148+
aggregationWindowInSeconds: 30
149+
// 1MB
150+
maxInboundMessageBytes: 1048576
151+
claimName: 'paidUser'
152+
}
153+
],
154+
maxClientConnectionLifetimeInSeconds: 30
151155
}
152156
}
153157
}

articles/azure-vmware/native-first-party-principle-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about enabling first-party application service principal for
44
ms.topic: how-to
55
ms.service: azure-vmware
66
ms.date: 4/21/2025
7-
#cusom intent: As a cloud administrator, I want to enable first-party application service principal for Azure VMware Solution Generation 2 Private Clouds so that I can manage the Azure VMware Solution experiences.
7+
#customer intent: As a cloud administrator, I want to enable first-party application service principal for Azure VMware Solution Generation 2 Private Clouds so that I can manage the Azure VMware Solution experiences.
88
# Customer intent: As a cloud administrator, I want to enable the first-party application service principal for Azure VMware Solution Generation 2 private clouds so that I can effectively manage and deploy the cloud infrastructure.
99
---
1010

articles/batch/batch-get-resource-counts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ You can use a similar pattern for REST and other supported languages to get task
4545
The List Pool Node Counts operation counts compute nodes by the following states in each pool. Separate aggregate counts are provided for dedicated nodes and Spot nodes in each pool.
4646

4747
- **Creating**: An Azure-allocated VM that hasn't yet started to join a pool.
48-
- **Idle**: A compute node that's availale and currently not running any tasks.
48+
- **Idle**: A compute node that's available and currently not running any tasks.
4949
- **LeavingPool**: A node that is leaving the pool, either because the user explicitly removed it or because the pool is resizing or autoscaling down.
5050
- **Offline**: A node that Batch cannot use to schedule new tasks.
5151
- **Preempted**: A Spot node that was removed from the pool because Azure reclaimed the VM. A `preempted` node can be reinitialized when replacement Spot VM capacity is available.

articles/data-factory/connector-postgresql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ When copying data from PostgreSQL, the following mappings are used from PostgreS
260260
|`Integer`|`Int32`|`Int32`|
261261
|`BigInt`|`Int64`|`Int64`|
262262
|`Decimal` (Precision <= 28)|`Decimal`|`Decimal`|
263-
|`Decimal` (Precision > 28)|Unsupport |`String`|
263+
|`Decimal` (Precision > 28)|Unsupported |`String`|
264264
|`Numeric`|`Decimal`|`Decimal`|
265265
|`Real`|`Single`|`Single`|
266266
|`Double`|`Double`|`Double`|

articles/data-factory/data-flow-expressions-usage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2285,7 +2285,7 @@ ___
22852285
<a name="substringIndex" ></a>
22862286

22872287
### <code>substringIndex</code>
2288-
<code><b>substringIndex(<i>&lt;string to subset&gt;</i> : string, <i>&lt;delimiter&gt;</i> : string, &lt;count of delimiter occurences&gt;</i> : integral]) => string</b></code><br/><br/>
2288+
<code><b>substringIndex(<i>&lt;string to subset&gt;</i> : string, <i>&lt;delimiter&gt;</i> : string, &lt;count of delimiter occurrences&gt;</i> : integral]) => string</b></code><br/><br/>
22892289
Extracts the substring before `count` occurrences of the delimiter. If `count` is positive, everything to the left of the final delimiter (counting from the left) is returned. If `count` is negative, everything to the right of the final delimiter (counting from the right) is returned.
22902290
* ``substringIndex('111-222-333', '-', 1) -> '111'``
22912291
* ``substringIndex('111-222-333', '-', 2) -> '111-222'``

articles/frontdoor/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ For more information, see [Select the certificate for Azure Front Door to deploy
6969

7070
### Adopt custom domains
7171

72-
Adopt custom domains for your Front Door endpoints to ensure better availaility and flexiility while managing your domains and traffic. Don't hardcode AFD provided domains (like *.azurefd.z01.net) in your clients/codebases/firewall. Use custom domains for such scenarios.
72+
Adopt custom domains for your Front Door endpoints to ensure better availability and flexibility while managing your domains and traffic. Don't hardcode AFD provided domains (like *.azurefd.z01.net) in your clients/codebases/firewall. Use custom domains for such scenarios.
7373

7474
### Use the same domain name on Front Door and your origin
7575

0 commit comments

Comments
 (0)