Skip to content

Commit 4b7a835

Browse files
authored
Merge pull request #287886 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 1d08f8e + 72f3cd4 commit 4b7a835

File tree

150 files changed

+617
-729
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

150 files changed

+617
-729
lines changed

articles/active-directory-b2c/partner-asignio.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 06/21/2024
9+
ms.date: 10/03/2024
1010
ms.author: gasinh
1111
ms.reviewer: kengaderdus
1212
ms.subservice: B2C
@@ -65,7 +65,7 @@ The following diagram illustrates the implementation.
6565

6666
1. User opens Azure AD B2C sign in page on their mobile or web application, and then signs in or signs up.
6767
2. Azure AD B2C redirects the user to Asignio using an OpenID Connect (OIDC) request.
68-
3. The user is redirected to the Asignio web application for biometric sign in. If the user hasn't registered their Asignio Signature, they can use an SMS One-Time-Password (OTP) to authenticate. After authentication, user receives a registration link to create their Asignio Signature.
68+
3. The user is redirected to the Asignio web application for biometric sign in. If the user didn't register their Asignio Signature, they can use an SMS One-Time-Password (OTP) to authenticate. After authentication, user receives a registration link to create their Asignio Signature.
6969
4. The user authenticates with Asignio Signature and facial verification, or voice and facial verification.
7070
5. The challenge response goes to Asignio.
7171
6. Asignio returns the OIDC response to Azure AD B2C sign in.
@@ -76,11 +76,11 @@ The following diagram illustrates the implementation.
7676

7777
Configurating an application with Asignio is with the Asignio Partner Administration site.
7878

79-
1. Go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page to request access for your organization.
79+
1. To request access for your organization, go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page.
8080
2. With credentials, sign into Asignio Partner Administration.
8181
3. Create a record for the Azure AD B2C application using your Azure AD B2C tenant. When you use Azure AD B2C with Asignio, Azure AD B2C manages connected applications. Asignio apps represent apps in the Azure portal.
8282
4. In the Asignio Partner Administration site, generate a Client ID and Client Secret.
83-
5. Note and store Client ID and Client Secret. You'll use them later. Asignio doesn't store Client Secrets.
83+
5. Note and store Client ID and Client Secret. You use them later. Asignio doesn't store Client Secrets.
8484
6. Enter the redirect URI in your site the user is returned to after authentication. Use the following URI pattern.
8585

8686
`[https://<your-b2c-domain>.b2clogin.com/<your-b2c-domain>.onmicrosoft.com/oauth2/authresp]`.
@@ -99,6 +99,9 @@ For this tutorial, you're registering `https://jwt.ms`, a Microsoft web applica
9999

100100
Complete [Tutorial: Register a web application in Azure Active Directory B2C](tutorial-register-applications.md?tabs=app-reg-ga)
101101

102+
>[!NOTE]
103+
>Enable implicit flow only for testing purposes. Don’t enable implicit flow in production.
104+
102105
## Configure Asignio as an identity provider in Azure AD B2C
103106

104107
For the following instructions, use the Microsoft Entra tenant with the Azure subscription.

articles/active-directory-b2c/partner-trusona.md

Lines changed: 22 additions & 19 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/partner-xid.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 10/03/2024
1010
ms.author: gasinh
1111
ms.subservice: B2C
1212

@@ -40,7 +40,7 @@ The following diagram shows the architecture.
4040

4141
![Diagram of the xID architecture.](./media/partner-xid/partner-xid-architecture-diagram.png)
4242

43-
1. At the Azure AD B2C sign-in page user signs in or signs up.
43+
1. At the Azure AD B2C sign-in page, the user signs in or signs up.
4444
2. Azure AD B2C redirects the user to xID authorize API endpoint using an OpenID Connect (OIDC) request. An OIDC endpoint has endpoint information. xID identity provider (IdP) redirects the user to the xID authorization sign in page. User enters email address.
4545
3. xID IdP sends push notification to user mobile device.
4646
4. User opens the xID app, checks the request, enters a PIN, or uses biometrics. xID app activates the private key and creates an electronic signature.
@@ -56,7 +56,7 @@ The following diagram shows the architecture.
5656

5757
## Install xID
5858

59-
1. To request API documents, fill out the request form. Go to [Contact Us](https://xid.inc/contact-us).
59+
1. To request API documents, fill out the request form. Go to [Contact Us](https://xid.inc/contact-us).
6060
2. In the message, indicate you're using Azure AD B2C.
6161
3. An xID sales representative contacts you.
6262
4. Follow the instructions in the xID API document.
@@ -78,6 +78,9 @@ For testing, you register `https://jwt.ms`, a Microsoft web application with dec
7878

7979
Complete [Tutorial: Register a web application in Azure AD B2C](tutorial-register-applications.md?tabs=app-reg-ga)
8080

81+
>[!NOTE]
82+
>Enable implicit flow only for testing purposes. Don’t enable implicit flow in production.
83+
8184
<a name='create-a-xid-policy-key'></a>
8285

8386
## Create an xID policy key
@@ -407,7 +410,7 @@ There are identity claims xID supports referenced as part of the policy. Claims
407410

408411
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/main/LocalAccounts/SignUpOrSignin.xml), specifies the user journey the Azure AD B2C executes.
409412

410-
1. In the relying party,locate the **DefaultUserJourney** element.
413+
1. In the relying party, locate the **DefaultUserJourney** element.
411414
2. Update the **ReferenceId** to match the user journey ID you added to the identity provider.
412415

413416
In the following example, for the xID user journey, the **ReferenceId** is set to `CombinedSignInAndSignUp`.

articles/app-service/overview-tls.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,9 @@ ms.collection: ce-skilling-ai-copilot
1111
---
1212
# Azure App Service TLS overview
1313

14+
> [!NOTE]
15+
> Customers may be aware of [the retirement notification of TLS 1.0 and 1.1 for interactions with Azure services](https://azure.microsoft.com/updates/azure-support-tls-will-end-by-31-october-2024-2/). This retirement does not affect applications running on App Service or Azure Functions. Applications on either App Service or Azure Functions configured to accept TLS 1.0 or TLS 1.1 for incoming requests will continue to run unaffected.
16+
1417
## What does TLS do in App Service?
1518

1619
Transport Layer Security (TLS) is a widely adopted security protocol designed to secure connections and communications between servers and clients. App Service allows customers to use TLS/SSL certificates to secure incoming requests to their web apps. App Service currently supports different set of TLS features for customers to secure their web apps.

articles/application-gateway/configuration-http-settings.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-application-gateway
77
ms.topic: conceptual
8-
ms.date: 09/30/2023
8+
ms.date: 10/03/2024
99
ms.author: greglin
1010
---
1111

@@ -35,8 +35,7 @@ Please refer to TLS offload and End-to-End TLS documentation for Application Gat
3535
## Connection draining
3636

3737
Connection draining helps you gracefully remove backend pool members during planned service updates. It applies to backend instances that are
38-
- explicitly removed from the backend pool,
39-
- removed during scale-in operations, or
38+
- explicitly removed from the backend pool, or
4039
- reported as unhealthy by the health probes.
4140

4241
You can apply this setting to all backend pool members by enabling Connection Draining in the Backend Setting. It ensures that all deregistering instances in a backend pool don't receive any new requests/connections while maintaining the existing connections until the configured timeout value. This is also true for WebSocket connections.

articles/application-gateway/features.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -105,9 +105,8 @@ For more information, see [WebSocket support](application-gateway-websocket.md)
105105
## Connection draining
106106

107107
Connection draining helps you achieve graceful removal of backend pool members during planned service updates or problems with backend health. This setting is enabled via the [Backend Setting](configuration-http-settings.md) and is applied to all backend pool members during rule creation. Once enabled, the application gateway ensures all deregistering instances of a backend pool don't receive any new requests while allowing existing requests to complete within a configured time limit. It applies to cases where backend instances are:
108-
- explicitly removed from the backend pool after a configuration change by a user
109-
- reported as unhealthy by the health probes, or
110-
- removed during a scale-in operation
108+
- explicitly removed from the backend pool after a configuration change by a user, or
109+
- reported as unhealthy by the health probes
111110

112111
The only exception is when requests continue to be proxied to the deregistering instances because of gateway-managed session affinity.
113112

articles/azure-cache-for-redis/cache-whats-new.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,17 @@ ms.custom: references_regions
77

88

99
ms.topic: conceptual
10-
ms.date: 08/05/2024
10+
ms.date: 10/03/2024
1111

1212
---
1313

1414
# What's New in Azure Cache for Redis
1515

1616
## September 2024
1717

18-
###Enterprise tier E1 SKU GA ###
19-
The E1 SKU, which is intended primarily for dev/test scenarios, is now generally available. It runs on smaller burstable virtual machines. As a result, E1 offers variable performance depending on how much CPU is consumed. Unlike other Enterprise offerings, it isn't possible to scale E1 out. However, it is still possible to scale up to a larger SKU. The E1 SKU also does not support active geo-replication.
18+
### Enterprise tier E1 SKU GA
19+
20+
The E1 SKU, part of the Enterprise tier, is now in General Availability (GA). The E1 SKU doesn't scale out and is intended primarily for dev/test scenarios. The E1 SKU also doesn't support active geo-replication.
2021

2122
## August 2024
2223

@@ -44,7 +45,7 @@ You are able to manually trigger an upgrade to the latest version of Redis softw
4445

4546
### Enterprise tier E1 (preview) SKU
4647

47-
The E1 SKU is intended primarily for dev/test scenarios. It runs on smaller [burstable virtual machines](/azure/virtual-machines/b-series-cpu-credit-model/b-series-cpu-credit-model). As a result, E1 offers variable performance depending on how much CPU is consumed. Unlike other Enterprise offerings, it isn't possible to scale E1 out. However, it is still possible to scale up to a larger SKU. The E1 SKU also does not support [active geo-replication](cache-how-to-active-geo-replication.md).
48+
The E1 SKU is intended primarily for dev/test scenarios. It runs on smaller [burstable virtual machines](/azure/virtual-machines/b-series-cpu-credit-model/b-series-cpu-credit-model). As a result, E1 offers variable performance depending on how much CPU is consumed. Unlike other Enterprise offerings, it isn't possible to scale out E1. However, it's still possible to scale up to a larger SKU. The E1 SKU also doesn't support [active geo-replication](cache-how-to-active-geo-replication.md).
4849

4950

5051
### .NET Output cache and HybridCache

articles/container-apps/billing.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-container-apps
77
ms.custom:
88
- ignite-2023
99
ms.topic: conceptual
10-
ms.date: 05/02/2024
10+
ms.date: 10/02/2024
1111
ms.author: cshoe
1212
---
1313

@@ -122,6 +122,12 @@ Code interpreter sessions are billed based on running duration for the number al
122122

123123
Custom container sessions are billed using the [Dedicated plan](#dedicated-plan), based on the amount of compute resources used to run the session pool and active sessions.
124124

125+
Each custom container session pool runs on dedicated *E16* compute instances. The number of instances allocated to the session pool is based on the number of active and ready sessions in the pool. To view the number of instances currently allocated to a session pool, use the following Azure CLI command to retrieve the pool's `nodeCount` property. Replace the `<PLACEHOLDERS>` with your values.
126+
127+
```bash
128+
az containerapp sessionpool show --resource-group <RESOURCE_GROUP> --name <POOL_NAME> --query "properties.nodeCount"
129+
```
130+
125131
## General terms
126132

127133
- For pricing details in your account's currency, see [Azure Container Apps Pricing](https://azure.microsoft.com/pricing/details/container-apps/).

articles/container-apps/sessions-custom-container.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-apps
55
author: anthonychu
66
ms.service: azure-container-apps
77
ms.topic: conceptual
8-
ms.date: 06/26/2024
8+
ms.date: 10/02/2024
99
ms.author: antchu
1010
ms.collection: ce-skilling-ai-copilot
1111
---
@@ -240,6 +240,10 @@ This request is forwarded to the custom container session with the identifier fo
240240

241241
In the example, the session's container receives the request at `http://0.0.0.0:<INGRESS_PORT>/<API_PATH_EXPOSED_BY_CONTAINER>`.
242242

243+
## Billing
244+
245+
Custom container sessions are billed based on the resources consumed by the session pool. For more information, see [Azure Container Apps billing](billing.md#custom-container).
246+
243247
## Next steps
244248

245249
> [!div class="nextstepaction"]

articles/data-factory/apply-dataops.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ ms.author: makromer
66
ms.reviewer: jburchel
77
ms.topic: conceptual
88
ms.date: 01/05/2024
9+
ms.subservice: ci-cd
910
---
1011

1112
# Applying DataOps to Azure Data Factory

0 commit comments

Comments
 (0)