Skip to content

Commit 51760bc

Browse files
authored
Merge pull request #302136 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 2bb5683 + aaf416c commit 51760bc

File tree

11 files changed

+17
-16
lines changed

11 files changed

+17
-16
lines changed

articles/automation/automation-runbook-types.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,7 @@ The following are the current limitations and known issues with PowerShell runbo
6767
> [!NOTE]
6868
> Currently, PowerShell 7.4 runtime version is supported for both Cloud and Hybrid jobs in all Public regions except Brazil Southeast and Gov clouds.
6969
70+
- Powershell 7.4 is only available in [runtime environment experience](runtime-environment-overview.md).
7071
- For the PowerShell 7.4 runtime version, the module activities aren't extracted for the imported modules. Use [Azure Automation extension for VS Code](automation-runbook-authoring.md) to simplify runbook authoring experience.
7172
- PowerShell 7.x doesn't support workflows. For more information, see [PowerShell workflow](/powershell/scripting/whats-new/differences-from-windows-powershell#powershell-workflow) for more details.
7273
- PowerShell 7.x currently doesn't support signed runbooks.

articles/azure-government/azure-secure-isolation-guidance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ When you create a key vault in a resource group, you can [manage access](/azure/
174174
#### Managed HSM
175175
**[Managed HSM](/azure/key-vault/managed-hsm/overview)** provides a single-tenant, fully managed, highly available, zone-resilient (where available) HSM as a service to store and manage your cryptographic keys. It's most suitable for applications and usage scenarios that handle high value keys. It also helps you meet the most stringent security, compliance, and regulatory requirements. Managed HSM uses [FIPS 140 Level 3 validated HSMs](/azure/compliance/offerings/offering-fips-140-2) to protect your cryptographic keys. Each managed HSM pool is an isolated single-tenant instance with its own [security domain](/azure/key-vault/managed-hsm/security-domain) controlled by you and isolated cryptographically from instances belonging to other customers. Cryptographic isolation relies on [Intel Software Guard Extensions](https://software.intel.com/sgx) (SGX) technology that provides encrypted code and data to help ensure your control over cryptographic keys.
176176

177-
When a managed HSM is created, the requestor also provides a list of data plane administrators. Only these administrators are able to [access the managed HSM data plane](/azure/key-vault/managed-hsm/access-control) to perform key operations and manage data plane role assignments (managed HSM local RBAC). The permission model for both the management and data planes uses the same syntax, but permissions are enforced at different levels, and role assignments use different scopes. Management plane Azure RBAC is enforced by Azure Resource Manager while data plane-managed HSM local RBAC is enforced by the managed HSM itself.
177+
When a managed HSM is created, the requester also provides a list of data plane administrators. Only these administrators are able to [access the managed HSM data plane](/azure/key-vault/managed-hsm/access-control) to perform key operations and manage data plane role assignments (managed HSM local RBAC). The permission model for both the management and data planes uses the same syntax, but permissions are enforced at different levels, and role assignments use different scopes. Management plane Azure RBAC is enforced by Azure Resource Manager while data plane-managed HSM local RBAC is enforced by the managed HSM itself.
178178

179179
> [!IMPORTANT]
180180
> Unlike with key vaults, granting your users management plane access to a managed HSM doesn't grant them any access to data plane to access keys or data plane role assignments managed HSM local RBAC. This isolation is implemented by design to prevent inadvertent expansion of privileges affecting access to keys stored in managed HSMs.

articles/confidential-computing/confidential-nodes-aks-addon.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,9 @@ You don't have to check for backward compatibility with PSW and DCAP. The provid
5555

5656
### Out-of-proc attestation for confidential workloads
5757

58-
The out-of-proc attestation model works for confidential workloads. The quote requestor and quote generation are executed separately, but on the same physical machine. The quote generation happens in a centralized manner and serves requests for QUOTES from all entities. Properly define the interface and make the interface discoverable for any entity to request quotes.
58+
The out-of-proc attestation model works for confidential workloads. The quote requester and quote generation are executed separately, but on the same physical machine. The quote generation happens in a centralized manner and serves requests for QUOTES from all entities. Properly define the interface and make the interface discoverable for any entity to request quotes.
5959

60-
![Diagram of quote requestor and quote generation interface.](./media/confidential-nodes-out-of-proc-attestation/aesmmanager.png)
60+
![Diagram of quote requester and quote generation interface.](./media/confidential-nodes-out-of-proc-attestation/aesmmanager.png)
6161

6262
The abstract model applies to confidential workload scenarios. This model uses the already available AESM service. AESM is containerized and deployed as a daemon set across the Kubernetes cluster. Kubernetes guarantees a single instance of an AESM service container, wrapped in a pod, to be deployed on each agent node. The new SGX Quote daemon set has a dependency on the `sgx-device-plugin` daemon set, since the AESM service container would request EPC memory from `sgx-device-plugin` for launching QE and PCE enclaves.
6363

articles/cost-management-billing/manage/mca-request-billing-ownership.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,9 @@ You can also go along with the following video that outlines each step of the pr
5757

5858
>[!VIDEO https://www.youtube.com/embed/gfiUI2YLsgc]
5959
60-
### Required permission for the transfer requestor
60+
### Required permission for the transfer requester
6161

62-
The product transfer requestor must have one of the following permissions:
62+
The product transfer requester must have one of the following permissions:
6363

6464
For a Microsoft Customer Agreement, the person must have an owner or contributor role for the billing account or for the relevant billing profile or invoice section. For more information, see [Billing roles and tasks](understand-mca-roles.md#invoice-section-roles-and-tasks).
6565

articles/cost-management-billing/manage/mpa-request-ownership.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ When there's a currency change during or after an EA enrollment transfer, reserv
5252

5353
Before you begin, make sure that the people involved in the product transfer have the required permissions.
5454

55-
### Required permission for the transfer requestor
55+
### Required permission for the transfer requester
5656

5757
To request the billing ownership, you must have the **Admin Agent** or [billing admin](/partner-center/account-settings/permissions-overview#billing-admin-role) role. To learn more, see [Partner Center - Assign users roles and permissions](/partner-center/permissions-overview).
5858

articles/databox/data-box-disk-deploy-picked-up.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -193,9 +193,9 @@ If needed, you can contact Quantium Solution Support (Japanese language) at the
193193
194194
Subject: Microsoft Azure Pickup - XZ00001234567
195195
Body:
196-
a. Requestor name
197-
b. Requestor contact number
198-
c. Requestor collection address
196+
a. Requester name
197+
b. Requester contact number
198+
c. Requester collection address
199199
d. Preferred collection date
200200
```
201201

articles/iot-operations/create-edge-apps/concept-about-state-store-protocol.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ The following example output shows state store RESP3 payloads:
125125
126126
### Response format
127127

128-
When the state store detects an invalid RESP3 payload, it still returns a response to the requestor's `Response Topic`. Examples of invalid payloads include an invalid command, an illegal RESP3, or integer overflow. An invalid payload starts with the string `-ERR` and contains more details.
128+
When the state store detects an invalid RESP3 payload, it still returns a response to the requester's `Response Topic`. Examples of invalid payloads include an invalid command, an illegal RESP3, or integer overflow. An invalid payload starts with the string `-ERR` and contains more details.
129129

130130
> [!NOTE]
131131
> A `GET`, `DEL`, or `VDEL` request on a nonexistent key is not considered an error.

articles/site-recovery/hyper-v-azure-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ An app-consistent snapshot is a point-in-time snapshot of the application data i
139139
2. To generate VSS snapshots for the VM, check that Hyper-V Integration Services is installed on the VM, and that the Backup (VSS) Integration Service is enabled.
140140
- Ensure that the Integration Services VSS service/daemons are running on the guest, and are in an **OK** state.
141141
- You can check this from an elevated PowerShell session on the Hyper-V host with command **Get-VMIntegrationService -VMName\<VMName>-Name VSS** You can also get this information by logging into the guest VM. [Learn more](/windows-server/virtualization/hyper-v/manage/manage-hyper-v-integration-services).
142-
- Ensure that the Backup/VSS integration Services on the VM is running and in healthy state. If not, restart these services, and the Hyper-V Volume Shadow Copy requestor service on the Hyper-V host server.
142+
- Ensure that the Backup/VSS integration Services on the VM is running and in healthy state. If not, restart these services, and the Hyper-V Volume Shadow Copy requester service on the Hyper-V host server.
143143

144144
### Common errors
145145

articles/traffic-manager/traffic-manager-load-balancing-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ In this tutorial, we first define a customer use case and see how it can be made
2323
At a conceptual level, each of these services plays a distinct role in the load-balancing hierarchy.
2424

2525
* **Traffic Manager** provides global DNS load balancing. It looks at incoming DNS requests and responds with a healthy endpoint, in accordance with the routing policy the customer has selected. Options for routing methods are:
26-
* Performance routing to send the requestor to the closest endpoint in terms of latency.
26+
* Performance routing to send the requester to the closest endpoint in terms of latency.
2727
* Priority routing to direct all traffic to an endpoint, with other endpoints as backup.
2828
* Weighted round-robin routing, which distributes traffic based on the weighting that is assigned to each endpoint.
2929
* Geography-based routing to distribute the traffic to your application endpoints based on geographic location of the user.

articles/virtual-wan/how-to-network-virtual-appliance-inbound.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ The following section describes some common troubleshooting scenarios.
141141

142142
### <a name="healthprobeconfigs"></a> Load balancer health probes
143143

144-
NVA with internet inbound/DNAT capabilities relies on the NVA responding to three different Azure Load Balancer health probes to ensure the NVA is functioning as expected and route traffic. Health probe requests are always made from the nonpublically routable Azure IP Address [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). You should see a three-way TCP handshake performed with 168.63.129.16 in your NVA logs.
144+
NVA with internet inbound/DNAT capabilities relies on the NVA responding to three different Azure Load Balancer health probes to ensure the NVA is functioning as expected and route traffic. Health probe requests are always made from the nonpublicly routable Azure IP Address [168.63.129.16](../virtual-network/what-is-ip-address-168-63-129-16.md). You should see a three-way TCP handshake performed with 168.63.129.16 in your NVA logs.
145145

146146
For more information on Azure Load Balancer health probes, see [health probe documentation](../load-balancer/load-balancer-custom-probe-overview.md).
147147

0 commit comments

Comments
 (0)