Skip to content

Commit 543355b

Browse files
authored
Merge pull request #274852 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 279afde + 534fd7a commit 543355b

File tree

7 files changed

+27
-22
lines changed

7 files changed

+27
-22
lines changed

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in-federation.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ Notice the claims transformations we defined in [step 3.2](#step-32---define-cla
225225

226226
Just like in sign-in with a local account, you need to configure the [Microsoft Entra Technical Profiles](active-directory-technical-profile.md), which you use to connect to Microsoft Entra ID storage, to store or read a user social account.
227227

228-
1. In the `ContosoCustomPolicy.XML` file, locate the `AAD-UserRead` technical profile and then add a new technical profile by using the following code:
228+
1. In the `ContosoCustomPolicy.XML` file, locate the `AAD-UserRead` technical profile and then add a new technical profile below it by using the following code:
229229

230230
```xml
231231
<TechnicalProfile Id="AAD-UserWriteUsingAlternativeSecurityId">
@@ -517,6 +517,7 @@ Use the following steps to add a combined local and social account:
517517
```xml
518518
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="localIdpAuthentication" AlwaysUseDefaultValue="true" />
519519
```
520+
Make sure you also add the `authenticationSource` claim in the output claims collection of the `UserSignInCollector` self-asserted technical profile.
520521

521522
1. In the `UserJourneys` section, add a new user journey, `LocalAndSocialSignInAndSignUp` by using the following code:
522523

articles/ai-services/use-key-vault.md

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ namespace key_vault_console_app
206206

207207
## Run the application
208208

209-
Run the application by selecting the **Debug** button at the top of Visual studio. Your key and endpoint secrets will be retrieved from your key vault.
209+
Run the application by selecting the **Debug** button at the top of Visual Studio. Your key and endpoint secrets will be retrieved from your key vault.
210210

211211
## Send a test Language service call (optional)
212212

@@ -376,18 +376,17 @@ In your project, add the following dependencies to your `pom.xml` file.
376376

377377
```xml
378378
<dependencies>
379-
380-
<dependency>
381-
<groupId>com.azure</groupId>
382-
<artifactId>azure-security-keyvault-secrets</artifactId>
383-
<version>4.2.3</version>
384-
</dependency>
385-
<dependency>
386-
<groupId>com.azure</groupId>
387-
<artifactId>azure-identity</artifactId>
388-
<version>1.2.0</version>
389-
</dependency>
390-
</dependencies>
379+
<dependency>
380+
<groupId>com.azure</groupId>
381+
<artifactId>azure-security-keyvault-secrets</artifactId>
382+
<version>4.2.3</version>
383+
</dependency>
384+
<dependency>
385+
<groupId>com.azure</groupId>
386+
<artifactId>azure-identity</artifactId>
387+
<version>1.2.0</version>
388+
</dependency>
389+
</dependencies>
391390
```
392391

393392
## Import the example code

articles/azure-cache-for-redis/cache-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -191,4 +191,4 @@ If you're not using managed identity and instead authorizing a storage account w
191191
## Related content
192192

193193
- [Learn more](cache-overview.md#service-tiers) about Azure Cache for Redis features
194-
- [What are managed identifies](../active-directory/managed-identities-azure-resources/overview.md)
194+
- [What are managed identities](../active-directory/managed-identities-azure-resources/overview.md)

articles/azure-vmware/configure-azure-elastic-san.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,11 @@ Once your SDDC express route is connected with the private endpoint for your Ela
9494

9595
To delete the Elastic SAN-based datastore, use the following steps from the Azure portal.
9696

97-
1. From the left navigation in your Azure VMware Solution private cloud, select **Storage**, then **Storage list**.
98-
1. Under **Virtual network**, select **Disconnect** to disconnect the datastore from the Cluster(s).
97+
1. From the left navigation in your Azure VMware Solution private cloud, select **Storage**, then **Datastore list**.
98+
1. On the far right is an **ellipsis**. Select **Delete** to disconnect the datastore from the Cluster(s).
99+
100+
:::image type="content" source="media/configure-azure-elastic-san/elastic-san-datastore-list-ellipsis-removal.png" alt-text="Screenshot showing Elastic SAN volume removal." border="false"lightbox="media/configure-azure-elastic-san/elastic-san-datastore-list-ellipsis-removal.png":::
101+
99102
1. Optionally you can delete the volume you previously created in your Elastic SAN.
103+
> [!NOTE]
104+
> This operation can't be completed if virtual machines or virtual disks reside on an Elastic SAN VMFS Datastore.
22.1 KB
Loading

articles/certification/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Overview of the Edge Secured-core program
33
description: An overview of the Edge Secured-core program for our partners and customers. Use these resources to start the certification process. Find out how to certify your device, from IoT device requirements to the device being published.
4-
author: sufon
4+
author: sufenfong
55
ms.author: sufon
66
ms.topic: overview
77
ms.date: 02/07/2024
@@ -16,7 +16,7 @@ ms.service: certification
1616
Edge Secured-Core is Microsoft's recommended standard for highly secured embedded devices. Such devices must include hardware security features, must be shipped in a secured state, and must be able to connect to services that enable that security monitoring and maintenance for the lifetime of the device.
1717

1818
## Program purpose ##
19-
Edge Secured-core is a security certification for devices running a full operating system. Edge Secured-core currently supports Windows IoT and Azure Sphere OS. Linux support is coming in the future. Devices meeting this criteria enable these promises:
19+
Edge Secured-core is a security certification for devices running a full operating system. Edge Secured-core currently supports [Windows IoT Enterprise](/windows/iot/iot-enterprise/whats-new/release-history) and Azure Sphere OS. Linux support is coming in the future. Devices meeting this criteria enable these promises:
2020

2121
1. Hardware-based device identity
2222
2. Capable of enforcing system integrity

articles/migrate/how-to-create-azure-vmware-solution-assessment.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This article describes how to create an Azure VMware Solution assessment for on-
2222
- Make sure you've [created](./create-manage-projects.md) an Azure Migrate project.
2323
- If you've already created a project, make sure you've [added](how-to-assess.md) the Azure Migrate: Discovery and assessment tool.
2424
- To create an assessment, you need to set up an Azure Migrate appliance for [VMware vSphere](how-to-set-up-appliance-vmware.md), which discovers the on-premises servers, and sends metadata and performance data to Azure Migrate: Discovery and assessment. [Learn more](migrate-appliance.md).
25-
- You could also [import the server metadata](./tutorial-discover-import.md) in comma-separated values (CSV) format.
25+
- You could also [import the server metadata](./tutorial-discover-import.md) in comma-separated values (CSV) format or [import your RVTools XLSX file](./tutorial-import-vmware-using-rvtools-xlsx.md).
2626

2727

2828
## Azure VMware Solution (AVS) Assessment overview
@@ -59,7 +59,7 @@ There are two types of sizing criteria that you can use to create Azure VMware S
5959
1. In **Discovery source**:
6060

6161
- If you discovered servers using the appliance, select **Servers discovered from Azure Migrate appliance**.
62-
- If you discovered servers using an imported CSV file, select **Imported servers**.
62+
- If you discovered servers using an imported CSV or RVTools file, select **Imported servers**.
6363

6464
1. Click **Edit** to review the assessment properties.
6565

@@ -153,7 +153,7 @@ You can click on **Sizing assumptions** to understand the assumptions that went
153153

154154
3. Review the Suggested tool:
155155
- **VMware HCX Advanced or Enterprise**: For VMware vSphere VMs, VMware Hybrid Cloud Extension (HCX) solution is the suggested migration tool to migrate your on-premises workload to your Azure VMware Solution (AVS) private cloud. [Learn More](../azure-vmware/configure-vmware-hcx.md).
156-
- **Unknown**: For servers imported via a CSV file, the default migration tool is unknown. Though for VMware vSphere VMs, it is suggested to use the VMware Hybrid Cloud Extension (HCX) solution.
156+
- **Unknown**: For servers imported via a CSV or RVTools file, the default migration tool is unknown. Though for VMware vSphere VMs, it is suggested to use the VMware Hybrid Cloud Extension (HCX) solution.
157157

158158
4. Click on an **AVS readiness** status. You can view VM readiness details, and drill down to see VM details, including compute, storage, and network settings.
159159

0 commit comments

Comments
 (0)