Skip to content

Commit 47a47f1

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into upEm
2 parents 7321313 + 4730b28 commit 47a47f1

File tree

9 files changed

+20
-24
lines changed

9 files changed

+20
-24
lines changed

articles/active-directory-b2c/relyingparty.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ The **SingleSignOn** element contains in the following attribute:
123123
| --------- | -------- | ----------- |
124124
| Scope | Yes | The scope of the single sign-on behavior. Possible values: `Suppressed`, `Tenant`, `Application`, or `Policy`. The `Suppressed` value indicates that the behavior is suppressed. For example, in the case of a single sign-on session, no session is maintained for the user and the user is always prompted for an identity provider selection. The `TrustFramework` value indicates that the behavior is applied for all policies in the trust framework. For example, a user navigating through two policy journeys for a trust framework is not prompted for an identity provider selection. The `Tenant` value indicates that the behavior is applied to all policies in the tenant. For example, a user navigating through two policy journeys for a tenant is not prompted for an identity provider selection. The `Application` value indicates that the behavior is applied to all policies for the application making the request. For example, a user navigating through two policy journeys for an application is not prompted for an identity provider selection. The `Policy` value indicates that the behavior only applies to a policy. For example, a user navigating through two policy journeys for a trust framework is prompted for an identity provider selection when switching between policies. |
125125
| KeepAliveInDays | Yes | Controls how long the user remains signed in. Setting the value to 0 turns off KMSI functionality. For more information, see [Keep me signed in](custom-policy-keep-me-signed-in.md). |
126-
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more infomation, see [Web sign-in with OpenID Connect](openid-connect.md). |
126+
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more information, see [Web sign-in with OpenID Connect](openid-connect.md). |
127127

128128

129129
## JourneyInsights

articles/active-directory-b2c/string-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -370,7 +370,7 @@ Copies localized strings into claims.
370370
To use the GetLocalizedStringsTransformation claims transformation:
371371

372372
1. Define a [localization string](localization.md) and associate it with a [self-asserted-technical-profile](self-asserted-technical-profile.md).
373-
1. The `ElementType` of the `LocalizedString` element must set to `GetLocalizedStringsTransformationClaimType`.
373+
1. The `ElementType` of the `LocalizedString` element must be set to `GetLocalizedStringsTransformationClaimType`.
374374
1. The `StringId` is a unique identifier that you define, and use it later in your claims transformation.
375375
1. In the claims transformation, specify the list of claims to be set with the localized string. The `ClaimTypeReferenceId` is a reference to a ClaimType already defined in the ClaimsSchema section in the policy. The `TransformationClaimType` is the name of the localized string as defined in the `StringId` of the `LocalizedString` element.
376376
1. In a [self-asserted technical profile](self-asserted-technical-profile.md), or a [display control](display-controls.md) input or output claims transformation, make a reference to your claims transformation.

articles/active-directory/develop/scenario-daemon-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Here are some examples of use cases for daemon apps:
4141
- Desktop applications (like Windows services on Windows or daemon processes on Linux) that perform batch jobs, or an operating system service that runs in the background
4242
- Web APIs that need to manipulate directories, not specific users
4343

44-
There's another common case where non-daemon applications use client credentials: even when they act on behalf of users, they need to access a web API or a resource under own their identity for technical reasons. An example is access to secrets in Azure Key Vault or an Azure SQL database for a cache.
44+
There's another common case where non-daemon applications use client credentials: even when they act on behalf of users, they need to access a web API or a resource under their own identity for technical reasons. An example is access to secrets in Azure Key Vault or an Azure SQL database for a cache.
4545

4646
Applications that acquire a token for their own identities:
4747

articles/aks/azure-files-dynamic-pv.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -27,11 +27,13 @@ A storage class is used to define how an Azure file share is created. A storage
2727

2828
* *Standard_LRS* - standard locally redundant storage (LRS)
2929
* *Standard_GRS* - standard geo-redundant storage (GRS)
30+
* *Standard_ZRS* - standard zone redundant storage (GRS)
3031
* *Standard_RAGRS* - standard read-access geo-redundant storage (RA-GRS)
3132
* *Premium_LRS* - premium locally redundant storage (LRS)
33+
* *Premium_ZRS* - premium zone redundant storage (GRS)
3234

3335
> [!NOTE]
34-
> Azure Files support premium storage in AKS clusters that run Kubernetes 1.13 or higher.
36+
> Azure Files support premium storage in AKS clusters that run Kubernetes 1.13 or higher, minimum premium file share is 100GB
3537
3638
For more information on Kubernetes storage classes for Azure Files, see [Kubernetes Storage Classes][kubernetes-storage-classes].
3739

@@ -46,11 +48,10 @@ provisioner: kubernetes.io/azure-file
4648
mountOptions:
4749
- dir_mode=0777
4850
- file_mode=0777
49-
- uid=1000
50-
- gid=1000
51+
- uid=0
52+
- gid=0
5153
- mfsymlinks
52-
- nobrl
53-
- cache=none
54+
- cache=strict
5455
parameters:
5556
skuName: Standard_LRS
5657
```
@@ -161,7 +162,7 @@ Volumes:
161162

162163
## Mount options
163164

164-
The default value for *fileMode* and *dirMode* is *0755* for Kubernetes version 1.9.1 and above. If using a cluster with Kuberetes version 1.8.5 or greater and dynamically creating the persistent volume with a storage class, mount options can be specified on the storage class object. The following example sets *0777*:
165+
The default value for *fileMode* and *dirMode* is *0777* for Kubernetes version 1.13.0 and above. If dynamically creating the persistent volume with a storage class, mount options can be specified on the storage class object. The following example sets *0777*:
165166

166167
```yaml
167168
kind: StorageClass
@@ -172,17 +173,14 @@ provisioner: kubernetes.io/azure-file
172173
mountOptions:
173174
- dir_mode=0777
174175
- file_mode=0777
175-
- uid=1000
176-
- gid=1000
176+
- uid=0
177+
- gid=0
177178
- mfsymlinks
178-
- nobrl
179-
- cache=none
179+
- cache=strict
180180
parameters:
181181
skuName: Standard_LRS
182182
```
183183
184-
If using a cluster of version 1.8.0 - 1.8.4, a security context can be specified with the *runAsUser* value set to *0*. For more information on Pod security context, see [Configure a Security Context][kubernetes-security-context].
185-
186184
## Next steps
187185
188186
For associated best practices, see [Best practices for storage and backups in AKS][operator-best-practices-storage].
@@ -222,4 +220,4 @@ Learn more about Kubernetes persistent volumes using Azure Files.
222220
[kubernetes-rbac]: concepts-identity.md#role-based-access-controls-rbac
223221
[operator-best-practices-storage]: operator-best-practices-storage.md
224222
[concepts-storage]: concepts-storage.md
225-
[node-resource-group]: faq.md#why-are-two-resource-groups-created-with-aks
223+
[node-resource-group]: faq.md#why-are-two-resource-groups-created-with-aks

articles/app-service/app-service-web-tutorial-dotnetcore-sqldb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ What you learn how to:
3636
To complete this tutorial:
3737

3838
* [Install Git](https://git-scm.com/)
39-
* [Install .NET Core](https://www.microsoft.com/net/core/)
39+
* [Install .NET Core SDK](https://dotnet.microsoft.com/download)
4040

4141
## Create local .NET Core app
4242

articles/event-hubs/event-hubs-capture-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,10 +91,11 @@ A full end-to-end sample is available in the Streaming at Scale repository:
9191

9292
### Use Apache Spark
9393

94-
[Apache Spark][Apache Spark] is a "unified analytics engine for large-scale data processing." It supports different languages, including SQL, and can easily access Azure Blob storage. There are two options to run Apache Spark in Azure, and both provide easy access to Azure Blob storage:
94+
[Apache Spark][Apache Spark] is a "unified analytics engine for large-scale data processing." It supports different languages, including SQL, and can easily access Azure Blob storage. There are a few options to run Apache Spark in Azure, and each provides easy access to Azure Blob storage:
9595

9696
- [HDInsight: Address files in Azure storage][HDInsight: Address files in Azure storage]
9797
- [Azure Databricks: Azure Blob storage][Azure Databricks: Azure Blob Storage]
98+
- [Azure Kubernetes Service](https://docs.microsoft.com/azure/aks/spark-job)
9899

99100
### Use Avro Tools
100101

articles/machine-learning/studio/tutorial-part3-credit-risk-deploy.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -222,11 +222,7 @@ The Web service is an Azure web service that can receive and return data using R
222222
* **Request/Response** - The user sends one or more rows of credit data to the service by using an HTTP protocol, and the service responds with one or more sets of results.
223223
* **Batch Execution** - The user stores one or more rows of credit data in an Azure blob and then sends the blob location to the service. The service scores all the rows of data in the input blob, stores the results in another blob, and returns the URL of that container.
224224

225-
The quickest and easiest way to access a Classic web service is through the [Azure ML Request-Response Service Web App](https://azure.microsoft.com/marketplace/partners/microsoft/azuremlaspnettemplateforrrs/) or [Azure ML Batch Execution Service Web App Template](https://azure.microsoft.com/marketplace/partners/microsoft/azuremlbeswebapptemplate/).
226-
227-
These web app templates can build a custom web app that knows your web service's input data and what it will return. All you need to do is provide access to your web service and data, and the template does the rest.
228-
229-
For more information on using the web app templates, see [Consume an Azure Machine Learning Web service with a web app template](/azure/machine-learning/studio/consume-web-services).
225+
For more information on accessing and consuming the web service, see [Consume an Azure Machine Learning Web service with a web app template](/azure/machine-learning/studio/consume-web-services).
230226

231227

232228

articles/virtual-desktop/tenant-setup-azure-active-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Assigning an Azure Active Directory user the TenantCreator application role allo
6767
6868
To assign the TenantCreator application role:
6969
70-
1. Go to the[Azure portal](https://portal.azure.com)to manage the TenantCreator application role. Search for and select **Enterprise applications**. If you're working with multiple Azure Active Directory tenants, it's a best practice to open a private browser session and copy and paste the URLs into the address bar.
70+
1. Go to the [Azure portal](https://portal.azure.com) to manage the TenantCreator application role. Search for and select **Enterprise applications**. If you're working with multiple Azure Active Directory tenants, it's a best practice to open a private browser session and copy and paste the URLs into the address bar.
7171
7272
![Screenshot of searching for Enterprise applications in the Azure portal](media/azure-portal-enterprise-applications.png)
7373
2. Within **Enterprise applications**, search for **Windows Virtual Desktop**. You'll see the two applications that you provided consent for in the previous section. Of these two apps, select **Windows Virtual Desktop**.

articles/virtual-machines/windows/disk-encryption.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ For now, customer-managed keys have the following restrictions:
6868
- All resources related to your customer-managed keys (Azure Key Vaults, disk encryption sets, VMs, disks, and snapshots) must be in the same subscription and region.
6969
- Disks, snapshots, and images encrypted with customer-managed keys cannot move to another subscription.
7070
- If you use the Azure portal to create your disk encryption set, you cannot use snapshots for now.
71+
- Managed disks encrypted using customer-managed keys cannot also be encrypted with Azure Disk Encryption.
7172

7273
### PowerShell
7374

0 commit comments

Comments
 (0)