Skip to content

Commit 583d3ee

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into communication-services-articles
2 parents 5d3dedd + de31ad4 commit 583d3ee

File tree

209 files changed

+4186
-7624
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

209 files changed

+4186
-7624
lines changed

.openpublishing.redirection.json

Lines changed: 11 additions & 111 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/devtest-labs/devtest-lab-integrate-ci-cd.md",
5+
"redirect_url": "/previous-versions/azure/devtest-labs/devtest-lab-integrate-ci-cd",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/devtest-labs/integrate-environments-devops-pipeline.md",
10+
"redirect_url": "/previous-versions/azure/devtest-labs/integrate-environments-devops-pipeline",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "articles/confidential-computing/virtual-machine-solutions.md",
515
"redirect_url": "/azure/virtual-machines/",
@@ -2010,21 +2020,6 @@
20102020
"redirect_url": "/azure/migrate/migrate-services-overview",
20112021
"redirect_document_id": false
20122022
},
2013-
{
2014-
"source_path_from_root": "/articles/monitoring/management-overview-monitoring.md",
2015-
"redirect_url": "/azure/monitoring/",
2016-
"redirect_document_id": false
2017-
},
2018-
{
2019-
"source_path_from_root": "/articles/monitoring/monitoring-container-health.md",
2020-
"redirect_url": "/azure/monitoring/monitoring-container-insights-overview",
2021-
"redirect_document_id": false
2022-
},
2023-
{
2024-
"source_path_from_root": "/articles/monitoring/monitoring-walkthrough-servicemap.md",
2025-
"redirect_url": "/azure/monitoring/monitoring-service-map",
2026-
"redirect_document_id": false
2027-
},
20282023
{
20292024
"source_path_from_root": "/articles/multi-factor-authentication/end-user/index.md",
20302025
"redirect_url": "/azure/multi-factor-authentication/end-user/multi-factor-authentication-end-user",
@@ -2210,101 +2205,6 @@
22102205
"redirect_url": "/azure/openshift/delete-cluster",
22112206
"redirect_document_id": false
22122207
},
2213-
{
2214-
"source_path_from_root": "/articles/operations-management-suite/index.md",
2215-
"redirect_url": "/azure/monitoring",
2216-
"redirect_document_id": false
2217-
},
2218-
{
2219-
"source_path_from_root": "/articles/operations-management-suite/oms-solution-agenthealth.md",
2220-
"redirect_url": "/azure/monitoring/monitoring-solution-agenthealth",
2221-
"redirect_document_id": false
2222-
},
2223-
{
2224-
"source_path_from_root": "/articles/operations-management-suite/oms-solution-office-365.md",
2225-
"redirect_url": "/azure/monitoring/monitoring-solution-office-365",
2226-
"redirect_document_id": false
2227-
},
2228-
{
2229-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-architecture.md",
2230-
"redirect_url": "/azure/monitoring",
2231-
"redirect_document_id": false
2232-
},
2233-
{
2234-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-integration.md",
2235-
"redirect_url": "/azure/monitoring",
2236-
"redirect_document_id": false
2237-
},
2238-
{
2239-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-overview.md",
2240-
"redirect_url": "/azure/monitoring",
2241-
"redirect_document_id": false
2242-
},
2243-
{
2244-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-runbook-datacollect.md",
2245-
"redirect_url": "/azure/monitoring/monitoring-runbook-datacollect",
2246-
"redirect_document_id": false
2247-
},
2248-
{
2249-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-sdk.md",
2250-
"redirect_url": "/azure/monitoring",
2251-
"redirect_document_id": false
2252-
},
2253-
{
2254-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-service-map-scom.md",
2255-
"redirect_url": "/azure/monitoring/monitoring-service-map-scom",
2256-
"redirect_document_id": false
2257-
},
2258-
{
2259-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-service-map.md",
2260-
"redirect_url": "/azure/monitoring/monitoring-service-map",
2261-
"redirect_document_id": false
2262-
},
2263-
{
2264-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solution-targeting.md",
2265-
"redirect_url": "/azure/monitoring/monitoring-solution-targeting",
2266-
"redirect_document_id": false
2267-
},
2268-
{
2269-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-best-practices.md",
2270-
"redirect_url": "/azure/monitoring/monitoring-solutions-best-practices",
2271-
"redirect_document_id": false
2272-
},
2273-
{
2274-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-creating.md",
2275-
"redirect_url": "/azure/monitoring/monitoring-solutions-creating",
2276-
"redirect_document_id": false
2277-
},
2278-
{
2279-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-resources-automation.md",
2280-
"redirect_url": "/azure/monitoring/monitoring-solutions-resources-automation",
2281-
"redirect_document_id": false
2282-
},
2283-
{
2284-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-resources-searches-alerts.md",
2285-
"redirect_url": "/azure/monitoring/monitoring-solutions-resources-searches-alerts",
2286-
"redirect_document_id": false
2287-
},
2288-
{
2289-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-resources-views.md",
2290-
"redirect_url": "/azure/monitoring/monitoring-solutions-resources-views",
2291-
"redirect_document_id": false
2292-
},
2293-
{
2294-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions-solution-file.md",
2295-
"redirect_url": "/azure/monitoring/monitoring-solutions-solution-file",
2296-
"redirect_document_id": false
2297-
},
2298-
{
2299-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-solutions.md",
2300-
"redirect_url": "/azure/monitoring/monitoring-solutions",
2301-
"redirect_document_id": false
2302-
},
2303-
{
2304-
"source_path_from_root": "/articles/operations-management-suite/operations-management-suite-walkthrough-servicemap.md",
2305-
"redirect_url": "/azure/monitoring/monitoring-service-map",
2306-
"redirect_document_id": false
2307-
},
23082208
{
23092209
"source_path_from_root": "/articles/operator-service-manager/overview.md",
23102210
"redirect_url": "azure/operator-service-manager/azure-operator-service-manager-overview",
@@ -3701,4 +3601,4 @@
37013601
"redirect_document_id": false
37023602
}
37033603
]
3704-
}
3604+
}

articles/active-directory-b2c/identity-provider-ping-one.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ zone_pivot_groups: b2c-policy-type
2525

2626
## Create a PingOne application
2727

28-
To enable sign-in for users with a PingOne (Ping Identity) account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in the Ping Identity Administrator Console. For more information, see [Adding or updating an OIDC application](https://docs.pingidentity.com/access/sources/dita/topic?resourceid=p14e_add_update_oidc_application) in the Ping Identity documentation. If you don't already have a PingOne account, you can sign up at [`https://admin.pingone.com/web-portal/register`](https://admin.pingone.com/web-portal/register).
28+
To enable sign-in for users with a PingOne (Ping Identity) account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in the Ping Identity Administrator Console. If you don't already have a PingOne account, you can sign up at [`https://admin.pingone.com/web-portal/register`](https://admin.pingone.com/web-portal/register).
2929

3030
1. Sign in to the Ping Identity Administrator Console with your PingOne account credentials.
3131
1. In the left menu of the page, select **Connections**, then next to **Applications**, select **+**.

articles/active-directory-b2c/partner-grit-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Biometric authentication has the following benefits:
3232

3333
To get started, you'll need:
3434

35-
- License to [Grit's Visual IEF builder](https://www.gritiefedit.com/). Contact [Grit support](mailto:[email protected]) for licensing details. For this tutorial you don't need a license.
35+
- License to [Grit's Visual IEF builder](/azure/active-directory-b2c/partner-grit-editor). Contact [Grit support](mailto:[email protected]) for licensing details. For this tutorial you don't need a license.
3636

3737
- An Azure subscription. If you don't have one, get a [free account](https://azure.microsoft.com/free/).
3838

@@ -62,7 +62,7 @@ Contact [Grit support](mailto:[email protected]) for details to get o
6262

6363
### Configure Grit's biometric authentication with Azure AD B2C
6464

65-
1. Navigate to <https://www.gritiefedit.com> and enter your email if you're asked for it.
65+
1. Navigate to </azure/active-directory-b2c/partner-grit-editor> and enter your email if you're asked for it.
6666

6767
1. Press cancel in the quick start wizard.
6868

articles/active-directory-b2c/partner-grit-editor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ To get started with the IEF Editor, ensure the following prerequisites are met:
3131

3232
- A Microsoft Entra subscription. If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/).
3333
- An Azure AD B2C tenant linked to the Azure subscription. Learn more at [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).
34-
- [Visual IEF Editor](https://www.gritiefedit.com) is free and works only with Google Chrome browser.
34+
- [Visual IEF Editor](/azure/active-directory-b2c/partner-grit-editor) is free and works only with Google Chrome browser.
3535
- Review and download policies from [Azure AD B2C customer policies starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack)
3636
- Install Google Chrome browser
3737

@@ -43,7 +43,7 @@ The following illustration shows a sample code-development workflow from XML fil
4343

4444
| Step | Description |
4545
|:-----|:------|
46-
| 1. | Go to https://www.gritiefedit.com and upload the policies from [Azure AD B2C customer policies starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack) using the upload policy button in the user interface.|
46+
| 1. | Go to /azure/active-directory-b2c/partner-grit-editor and upload the policies from [Azure AD B2C customer policies starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack) using the upload policy button in the user interface.|
4747
| 2. | Using the Visual IEF editor tool, select and edit any user journey and self asserted profile that needs update/modification.|
4848
|3. | Once the files are updated, select the download button. All the policies will be downloaded to the local machine.|
4949
|4. | Check in the files in GitHub or CI/CD pipeline. |

articles/active-directory-b2c/partner-ping-identity.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -107,16 +107,14 @@ Use the instructions in the following sections to configure PingAccess and PingF
107107

108108
To configure PingFederate as the token provider for PingAccess, ensure connectivity from PingFederate to PingAccess. Confirm connectivity from PingAccess to PingFederate.
109109

110-
For more information, see [Configure PingFederate as the token provider for PingAccess](https://docs.pingidentity.com/access/sources/dita/topic?category=pingaccess&Releasestatus_ce=Current&resourceid=pa_configure_pf_as_the_token_provider_for_pa) in the Ping Identity documentation.
111-
112110
### Configure a PingAccess application for header-based authentication
113111

114112
Use the following instructions to create a PingAccess application for the target web application, for header-based authentication.
115113

116114
#### Create a virtual host
117115

118116
>[!IMPORTANT]
119-
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?](https://docs.pingidentity.com/access/sources/dita/topic?category=pingaccess&Releasestatus_ce=Current&resourceid=pa_what_can_I_configure_with_pa) in the Ping Identity documentation.
117+
>Create a virtual host for every application.
120118
121119
To create a virtual host:
122120

articles/application-gateway/application-gateway-backend-health-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -417,7 +417,7 @@ This behavior can occur for one or more of the following reasons:
417417
Next hop: Azure Firewall private IP address
418418

419419
> [!NOTE]
420-
> If the application gateway is not able to access the CRL endpoints, it marks the backend health status as "unknown" and cause fast update failures. To prevent these issues, check that your application gateway subnet is able to access `crl.microsoft.com` and `crl3.digicert.com`. This can be done by configuring your Network Security Groups to send traffic to the CRL endpoints.
420+
> If the application gateway is not able to access the CRL endpoints, it might mark the backend health status as "unknown". To prevent these issues, check that your application gateway subnet is able to access `crl.microsoft.com` and `crl3.digicert.com`. This can be done by configuring your Network Security Groups to send traffic to the CRL endpoints.
421421
422422
## Next steps
423423

articles/application-gateway/for-containers/custom-health-probe.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application gateway
55
author: greg-lindsay
66
ms.service: azure-appgw-for-containers
77
ms.topic: conceptual
8-
ms.date: 9/16/2024
8+
ms.date: 10/28/2024
99
ms.author: greglin
1010
---
1111

@@ -35,7 +35,7 @@ The following properties make up custom health probes:
3535
| (http) host | The hostname specified in the request to the backend target. |
3636
| (http) path | The specific path of the request. If a single file should be loaded, the path might be /index.html. |
3737
| (http -> match) statusCodes | Contains two properties, `start` and `end`, that define the range of valid HTTP status codes returned from the backend. |
38-
| UseTLS | UseTLS indicates whether health check should enforce TLS. If not specified, health check uses the same protocol as the service if the same port is used for health check. If the port is different, health check is cleartext. |
38+
| useTLS | Specifies if the health check should enforce TLS. If not specified, health check uses the same protocol as the service if the same port is used for health check. If the port is different, health check is cleartext. |
3939

4040
[![A diagram showing the Application Gateway for Containers using custom health probes to determine backend health.](./media/custom-health-probe/custom-health-probe.png)](./media/custom-health-probe/custom-health-probe.png#lightbox)
4141

@@ -56,7 +56,7 @@ When the default health probe is used, the following values for each health prob
5656
| port | The port number used is defined by the backend port number in the Ingress resource or HttpRoute backend port in the HttpRoute resource. |
5757
| (http) host | localhost |
5858
| (http) path | / |
59-
| UseTLS | HTTP for HTTP and HTTPS when TLS is specified. |
59+
| useTLS | HTTP for HTTP and HTTPS when TLS is specified. |
6060

6161
<sup>1</sup> HTTPS is used when a backendTLSPolicy references a target backend service (for Gateway API implementation) or IngressExtension with a backendSetting protocol of HTTPS (for Ingress API implementation) is specified.
6262

@@ -96,6 +96,6 @@ spec:
9696
statusCodes:
9797
- start: 200
9898
end: 299
99-
UseTLS: true
99+
useTLS: true
100100
EOF
101101
```

articles/application-gateway/for-containers/migrate-from-agic-to-agc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application gateway
55
author: greg-lindsay
66
ms.service: azure-appgw-for-containers
77
ms.topic: conceptual
8-
ms.date: 9/16/2024
8+
ms.date: 10/28/2024
99
ms.author: greglin
1010
---
1111

@@ -66,7 +66,7 @@ Here's a summarized list of AGIC annotations and whether Application Gateway for
6666
| [Private frontend](migrate-from-agic-to-agc.md#private-frontend) | appgw.ingress.kubernetes.io/use-private-ip | Not supported | Not supported |
6767
| [WAF](migrate-from-agic-to-agc.md#waf) | appgw.ingress.kubernetes.io/waf-policy-for-path | Not supported | Not supported |
6868
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-hostname | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
69-
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-port | Not supported | Not supported |
69+
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-port | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
7070
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-path | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
7171
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-status-codes | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
7272
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-interval | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |

articles/automation/disable-local-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Disable local authentication in Azure Automation
33
description: This article describes disabling local authentication in Azure Automation.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 11/20/2023
7-
ms.custom: engagement-fy23
6+
ms.date: 06/06/2024
7+
ms.custom: engagement-fy24
88
ms.topic: how-to
99
#Customer intent: As an administrator, I want disable local authentication so that I can enhance security.
1010
ms.service: azure-automation
@@ -40,7 +40,7 @@ The following table describes the behaviors or features that are prevented from
4040
|Starting a runbook using a webhook. | Start a runbook job using Azure Resource Manager template, which uses Microsoft Entra authentication. |
4141
|Using Automation Desired State Configuration.| Use [Azure Policy Guest configuration](../governance/machine-configuration/overview.md).  |
4242
|Using agent-based Hybrid Runbook Workers.| Use [extension-based Hybrid Runbook Workers](./extension-based-hybrid-runbook-worker-install.md).|
43-
|Using Azure Update Manager |Use [Azure Update Manager](../update-manager/overview.md)|
43+
|Using Automation Update Management |Use [Azure Update Manager](../update-manager/overview.md)|
4444

4545

4646
## Next steps

articles/azure-app-configuration/enable-dynamic-configuration-aspnet-core.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ A *sentinel key* is a key that you update after you complete the change of all o
8181

8282
1. Call the `UseAzureAppConfiguration` method. It enables your app to use the App Configuration middleware to update the configuration for you automatically.
8383

84-
Update *Program.cs* withe the following code.
84+
Update *Program.cs* with the following code.
8585

8686
```csharp
8787
// Existing code in Program.cs

0 commit comments

Comments
 (0)