Skip to content

Commit 57d425c

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into gdpStorSimpleUpd-030520
2 parents 750272f + c0a9cb3 commit 57d425c

File tree

169 files changed

+1249
-947
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

169 files changed

+1249
-947
lines changed

.openpublishing.redirection.json

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1701,6 +1701,26 @@
17011701
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-python",
17021702
"redirect_document_id": false
17031703
},
1704+
{
1705+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-search-sdk-quickstart.md",
1706+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-csharp",
1707+
"redirect_document_id": false
1708+
},
1709+
{
1710+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-sdk-java-quickstart.md",
1711+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-java",
1712+
"redirect_document_id": false
1713+
},
1714+
{
1715+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-search-sdk-node-quickstart.md",
1716+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-javascript",
1717+
"redirect_document_id": false
1718+
},
1719+
{
1720+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-sdk-python-quickstart.md",
1721+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-python",
1722+
"redirect_document_id": false
1723+
},
17041724
{
17051725
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
17061726
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",
@@ -6706,6 +6726,10 @@
67066726
"redirect_url": "/azure/logic-apps/logic-apps-using-sap-connector",
67076727
"redirect_document_id": true
67086728
},
6729+
{
6730+
"source_path": "articles/scheduler/get-started-portal.md",
6731+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
6732+
},
67096733
{
67106734
"source_path": "articles/connectors/connectors-create-api-googledrive.md",
67116735
"redirect_url": "https://docs.microsoft.com/connectors/googledrive/",

articles/active-directory-b2c/relyingparty.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ The **SingleSignOn** element contains in the following attribute:
123123
| --------- | -------- | ----------- |
124124
| Scope | Yes | The scope of the single sign-on behavior. Possible values: `Suppressed`, `Tenant`, `Application`, or `Policy`. The `Suppressed` value indicates that the behavior is suppressed. For example, in the case of a single sign-on session, no session is maintained for the user and the user is always prompted for an identity provider selection. The `TrustFramework` value indicates that the behavior is applied for all policies in the trust framework. For example, a user navigating through two policy journeys for a trust framework is not prompted for an identity provider selection. The `Tenant` value indicates that the behavior is applied to all policies in the tenant. For example, a user navigating through two policy journeys for a tenant is not prompted for an identity provider selection. The `Application` value indicates that the behavior is applied to all policies for the application making the request. For example, a user navigating through two policy journeys for an application is not prompted for an identity provider selection. The `Policy` value indicates that the behavior only applies to a policy. For example, a user navigating through two policy journeys for a trust framework is prompted for an identity provider selection when switching between policies. |
125125
| KeepAliveInDays | Yes | Controls how long the user remains signed in. Setting the value to 0 turns off KMSI functionality. For more information, see [Keep me signed in](custom-policy-keep-me-signed-in.md). |
126-
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more infomation, see [Web sign-in with OpenID Connect](openid-connect.md). |
126+
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more information, see [Web sign-in with OpenID Connect](openid-connect.md). |
127127

128128

129129
## JourneyInsights

articles/active-directory-b2c/string-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -370,7 +370,7 @@ Copies localized strings into claims.
370370
To use the GetLocalizedStringsTransformation claims transformation:
371371

372372
1. Define a [localization string](localization.md) and associate it with a [self-asserted-technical-profile](self-asserted-technical-profile.md).
373-
1. The `ElementType` of the `LocalizedString` element must set to `GetLocalizedStringsTransformationClaimType`.
373+
1. The `ElementType` of the `LocalizedString` element must be set to `GetLocalizedStringsTransformationClaimType`.
374374
1. The `StringId` is a unique identifier that you define, and use it later in your claims transformation.
375375
1. In the claims transformation, specify the list of claims to be set with the localized string. The `ClaimTypeReferenceId` is a reference to a ClaimType already defined in the ClaimsSchema section in the policy. The `TransformationClaimType` is the name of the localized string as defined in the `StringId` of the `LocalizedString` element.
376376
1. In a [self-asserted technical profile](self-asserted-technical-profile.md), or a [display control](display-controls.md) input or output claims transformation, make a reference to your claims transformation.

articles/active-directory/develop/scenario-daemon-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Here are some examples of use cases for daemon apps:
4141
- Desktop applications (like Windows services on Windows or daemon processes on Linux) that perform batch jobs, or an operating system service that runs in the background
4242
- Web APIs that need to manipulate directories, not specific users
4343

44-
There's another common case where non-daemon applications use client credentials: even when they act on behalf of users, they need to access a web API or a resource under own their identity for technical reasons. An example is access to secrets in Azure Key Vault or an Azure SQL database for a cache.
44+
There's another common case where non-daemon applications use client credentials: even when they act on behalf of users, they need to access a web API or a resource under their own identity for technical reasons. An example is access to secrets in Azure Key Vault or an Azure SQL database for a cache.
4545

4646
Applications that acquire a token for their own identities:
4747

articles/active-directory/user-help/multi-factor-authentication-end-user-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 8f3aef42-7f66-4656-a7cd-d25a971cb9eb
99
ms.workload: identity
1010
ms.service: active-directory
1111
ms.subservice: user-help
12-
ms.topic: troubleshooting
12+
ms.topic: conceptual
1313
ms.date: 02/20/2020
1414
ms.author: curtand
1515
ms.reviewer: kexia

articles/aks/azure-files-dynamic-pv.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -27,11 +27,13 @@ A storage class is used to define how an Azure file share is created. A storage
2727

2828
* *Standard_LRS* - standard locally redundant storage (LRS)
2929
* *Standard_GRS* - standard geo-redundant storage (GRS)
30+
* *Standard_ZRS* - standard zone redundant storage (GRS)
3031
* *Standard_RAGRS* - standard read-access geo-redundant storage (RA-GRS)
3132
* *Premium_LRS* - premium locally redundant storage (LRS)
33+
* *Premium_ZRS* - premium zone redundant storage (GRS)
3234

3335
> [!NOTE]
34-
> Azure Files support premium storage in AKS clusters that run Kubernetes 1.13 or higher.
36+
> Azure Files support premium storage in AKS clusters that run Kubernetes 1.13 or higher, minimum premium file share is 100GB
3537
3638
For more information on Kubernetes storage classes for Azure Files, see [Kubernetes Storage Classes][kubernetes-storage-classes].
3739

@@ -46,11 +48,10 @@ provisioner: kubernetes.io/azure-file
4648
mountOptions:
4749
- dir_mode=0777
4850
- file_mode=0777
49-
- uid=1000
50-
- gid=1000
51+
- uid=0
52+
- gid=0
5153
- mfsymlinks
52-
- nobrl
53-
- cache=none
54+
- cache=strict
5455
parameters:
5556
skuName: Standard_LRS
5657
```
@@ -161,7 +162,7 @@ Volumes:
161162

162163
## Mount options
163164

164-
The default value for *fileMode* and *dirMode* is *0755* for Kubernetes version 1.9.1 and above. If using a cluster with Kuberetes version 1.8.5 or greater and dynamically creating the persistent volume with a storage class, mount options can be specified on the storage class object. The following example sets *0777*:
165+
The default value for *fileMode* and *dirMode* is *0777* for Kubernetes version 1.13.0 and above. If dynamically creating the persistent volume with a storage class, mount options can be specified on the storage class object. The following example sets *0777*:
165166

166167
```yaml
167168
kind: StorageClass
@@ -172,17 +173,14 @@ provisioner: kubernetes.io/azure-file
172173
mountOptions:
173174
- dir_mode=0777
174175
- file_mode=0777
175-
- uid=1000
176-
- gid=1000
176+
- uid=0
177+
- gid=0
177178
- mfsymlinks
178-
- nobrl
179-
- cache=none
179+
- cache=strict
180180
parameters:
181181
skuName: Standard_LRS
182182
```
183183
184-
If using a cluster of version 1.8.0 - 1.8.4, a security context can be specified with the *runAsUser* value set to *0*. For more information on Pod security context, see [Configure a Security Context][kubernetes-security-context].
185-
186184
## Next steps
187185
188186
For associated best practices, see [Best practices for storage and backups in AKS][operator-best-practices-storage].
@@ -222,4 +220,4 @@ Learn more about Kubernetes persistent volumes using Azure Files.
222220
[kubernetes-rbac]: concepts-identity.md#role-based-access-controls-rbac
223221
[operator-best-practices-storage]: operator-best-practices-storage.md
224222
[concepts-storage]: concepts-storage.md
225-
[node-resource-group]: faq.md#why-are-two-resource-groups-created-with-aks
223+
[node-resource-group]: faq.md#why-are-two-resource-groups-created-with-aks

articles/app-service/app-service-web-tutorial-dotnetcore-sqldb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ What you learn how to:
3636
To complete this tutorial:
3737

3838
* [Install Git](https://git-scm.com/)
39-
* [Install .NET Core](https://www.microsoft.com/net/core/)
39+
* [Install .NET Core SDK](https://dotnet.microsoft.com/download)
4040

4141
## Create local .NET Core app
4242

articles/app-service/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,8 +87,6 @@
8787
href: networking-features.md
8888
- name: Application Gateway with service endpoints
8989
href: networking/app-gateway-with-service-endpoints.md
90-
- name: Private endpoints
91-
href: networking/private-endpoint.md
9290
- name: Inbound and outbound IPs
9391
href: overview-inbound-outbound-ips.md
9492
- name: Virtual Network Integration

0 commit comments

Comments
 (0)