Skip to content

Commit 52ebe66

Browse files
authored
Merge pull request #239377 from MicrosoftDocs/repo_sync_working_branch
Resolve syncing conflicts from repo_sync_working_branch to main
2 parents 9761cfa + 553189f commit 52ebe66

File tree

10 files changed

+18
-13
lines changed

10 files changed

+18
-13
lines changed

articles/active-directory/develop/howto-restore-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ This is because organization-specific settings are stored on a separate object,
5959
2. Select **Restore app registration**.
6060

6161
## Permanently delete an application
62-
You can manually permanently delete an application from your organization. A permanently deleted application can't be restored by you, another administrator, or by Microsoft customer support.
62+
You can manually permanently delete an application from your organization. A permanently deleted application can't be restored by you, another administrator, or by Microsoft customer support. However, this does not permanently delete the corresponding service principal. A service principal cannot be restored without having an active corresponding application, so the service principal can be manually deleted, which is also permanent. If no action is taken the service principal will be permanently deleted 30 days after deleting the application.
6363

6464
### To permanently delete an application
6565

articles/active-directory/manage-apps/application-management-certs-faq.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,9 @@ You can find the steps [here](manage-certificates-for-federated-single-sign-on.m
3030

3131
By default, Azure AD configures a certificate to expire after three years when it is created automatically during SAML single sign-on configuration. Because you can't change the date of a certificate after you save it, you need to create a new certificate. For steps on how to do so, please refer [Customize the expiration date for your federation certificate and roll it over to a new certificate](manage-certificates-for-federated-single-sign-on.md#customize-the-expiration-date-for-your-federation-certificate-and-roll-it-over-to-a-new-certificate).
3232

33+
> [!NOTE]
34+
> The recommended way to create SAML applications is through the Azure AD Application Gallery, which will automatically create a three-year valid X509 certificate for you.
35+
3336
## How can I automate the certificates expiration notifications?
3437

3538
Azure AD will send an email notification 60, 30, and 7 days before the SAML certificate expires. You may add more than one email address to receive notifications.

articles/active-directory/manage-apps/configure-admin-consent-workflow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ To enable the admin consent workflow and choose reviewers:
4747

4848
- **Select users, groups, or roles that will be designated as reviewers for admin consent requests** - Reviewers can view, block, or deny admin consent requests, but only global administrators can approve admin consent requests. People designated as reviewers can view incoming requests in the **My Pending** tab after they have been set as reviewers. Any new reviewers won't be able to act on existing or expired admin consent requests.
4949
- **Selected users will receive email notifications for requests** - Enable or disable email notifications to the reviewers when a request is made.
50-
- **Selected users will receive request expiration reminders** - Enable or disable reminder email notifications to the reviewers when a request is about to expire.
50+
- **Selected users will receive request expiration reminders** - Enable or disable reminder email notifications to the reviewers when a request is about to expire. The first about-to-expire reminder email is likely sent out in the middle of the configured "Consent request expires after (days)." For example, if consent is configured to expire in three days, the first reminder email is usually sent out on the second day, and the last expiration email is almost immediately out once the consent is expired.
5151
- **Consent request expires after (days)** - Specify how long requests stay valid.
5252

5353
1. Select **Save**. It can take up to an hour for the workflow to become enabled.

articles/aks/start-stop-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ When using the cluster stop/start feature, the following conditions apply:
2222

2323
- This feature is only supported for Virtual Machine Scale Set backed clusters.
2424
- The cluster state of a stopped AKS cluster is preserved for up to 12 months. If your cluster is stopped for more than 12 months, you can't recover the state. For more information, see the [AKS support policies](support-policies.md).
25-
- You can only start or delete a stopped AKS cluster. To perform other operations, like scaling or upgrading, you need to start your cluster first.
25+
- You can only perform start or delete operations on a stopped AKS cluster. To perform other operations, like scaling or upgrading, you need to start your cluster first.
2626
- If you provisioned PrivateEndpoints linked to private clusters, they need to be deleted and recreated again when starting a stopped AKS cluster.
2727
- Because the stop process drains all nodes, any standalone pods (i.e. pods not managed by a Deployment, StatefulSet, DaemonSet, Job, etc.) will be deleted.
2828
- When you start your cluster back up, the following behavior is expected:

articles/azure-cache-for-redis/cache-how-to-premium-persistence.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ On the **Enterprise** and **Enterprise Flash** tiers, data is persisted to a man
100100
The first backup starts once the backup frequency interval elapses.
101101

102102
> [!NOTE]
103-
> When RDB files are backed up to storage, they are stored in the form of page blobs.
103+
> When RDB files are backed up to storage, they are stored in the form of page blobs. If you're using a storage account with HNS enabled, persistence will tend to fail because page blobs aren't supported in storage accounts with HNS enabled (ADLS Gen2).
104104
105105
9. To enable AOF persistence, select **AOF** and configure the settings.
106106

articles/mysql/flexible-server/scripts/sample-cli-create-connect-private-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,9 @@ Use the following steps to test connectivity to the MySQL server from the VM by
3737
1. To SSH into the VM, start by getting the public IP address and then use MySQL tools to connect
3838

3939
```bash
40-
publicIp=$(az vm list-ip-addresses --resource-group $resourceGroup --name $vm --query "[].virtualMachine.network.publicIpAddresses[0].ipAddress" --output tsv)
40+
PUBLIC_IP=$(az vm list-ip-addresses --resource-group $RESOURCE_GROUP --name $VM --query "[].virtualMachine.network.publicIpAddresses[0].ipAddress" --output tsv)
4141

42-
ssh azureuser@$publicIp
42+
ssh azureuser@$PUBLIC_IP
4343
```
4444

4545
1. Download MySQL tools and connect to the server. Substitute <server_name> and <admin_user> with your values.
@@ -58,7 +58,7 @@ Use the following steps to test connectivity to the MySQL server from the VM by
5858
[!INCLUDE [cli-clean-up-resources.md](../../../../includes/cli-clean-up-resources.md)]
5959

6060
```azurecli
61-
az group delete --name $resourceGroup
61+
az group delete --name $RESOURCE_GROUP
6262
```
6363

6464
## Sample reference

articles/mysql/single-server/concepts-connectivity-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The following table lists the gateway IP addresses of the Azure Database for MyS
5959
| East US | 40.71.8.203, 40.71.83.113 | 40.121.158.30 | 191.238.6.43 |
6060
| East US 2 | 40.70.144.38, 52.167.105.38 | 52.177.185.181 | |
6161
| France Central | 40.79.137.0, 40.79.129.1 | | |
62-
| France South | 40.79.177.0 | | |
62+
| France South | 40.79.177.0, 40.79.176.40 | | |
6363
| Germany Central | 51.4.144.100 | | |
6464
| Germany North | 51.116.56.0 | | |
6565
| Germany North East | 51.5.144.179 | | |

articles/postgresql/flexible-server/concepts-extensions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ az postgres flexible-server parameter set --resource-group <your resource group>
4141
```json
4242
{
4343

44-
"$schema": https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#,
44+
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
4545

4646
"contentVersion": "1.0.0.0",
4747

articles/service-connector/how-to-integrate-storage-queue.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -94,10 +94,10 @@ Use the connection details below to connect compute services to Queue Storage. F
9494

9595
#### Java - Spring Boot secret / connection string
9696

97-
| Application properties | Description | Example value |
98-
|----------------------------|----------------------------|--------------------------|
99-
| azure.storage.account-name | Queue storage account name | `<storage-account-name>` |
100-
| azure.storage.account-key | Queue storage account key | `<account-key>` |
97+
| Application properties | Description | Example value |
98+
|----------------------------------------|----------------------------|--------------------------|
99+
| spring.cloud.azure.storage.account | Queue storage account name | `<storage-account-name>` |
100+
| spring.cloud.azure.storage.access-key | Queue storage account key | `<account-key>` |
101101

102102
## Next steps
103103

includes/active-directory-develop-quickstart-register-app.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,8 @@ Client secrets are considered less secure than certificate credentials. Applicat
137137

138138
For application security recommendations, see [Microsoft identity platform best practices and recommendations](../articles/active-directory/develop/identity-platform-integration-checklist.md#security).
139139

140+
If you're using an Azure DevOps service connection that automatically creates a service principal, you need to update the client secret from the Azure DevOps portal site instead of directly updating the client secret. Refer to this document on how to update the client secret from the Azure DevOps portal site:
141+
[Troubleshoot Azure Resource Manager service connections](/azure/devops/pipelines/release/azure-rm-endpoint?view=azure-devops#service-principals-token-expired).
140142

141143
### Add a federated credential
142144

0 commit comments

Comments
 (0)