Skip to content

Commit 5895355

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into ehubstack0317
2 parents c35b404 + 24fdf05 commit 5895355

File tree

75 files changed

+1145
-262
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

75 files changed

+1145
-262
lines changed

articles/active-directory/app-provisioning/export-import-provisioning-configuration.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,18 @@ ms.author: chmutali
1818

1919
ms.collection: M365-identity-device-management
2020
---
21-
# Export or import your provisioning configuration by using the Microsoft Graph API
22-
23-
You can use the Microsoft Graph API and the Microsoft Graph Explorer to export your User Provisioning attribute mappings and schema to a JSON file and import it back into Azure AD. You can also use the steps captured here to create a backup of your provisioning configuration.
24-
21+
# Export your provisioning configuration and roll back to a known good state
22+
23+
## Export and import your provisioning configuration from the Azure portal
24+
### How can I export my provisioning configuration?
25+
To export your configuration:
26+
1. In the [Azure portal](https://portal.azure.com/), on the left navigation panel, select **Azure Active Directory**.
27+
2. In the **Azure Active Directory** pane, select **Enterprise applications** and choose your application.
28+
3. In the left navigation pane, select **provisioning**. From the provisioning configuration page, click on **attribute mappings**, then **show advanced options**, and finally **review your schema**. This will take you to the schema editor.
29+
5. Click on download in the command bar at the top of the page to download your schema.
30+
31+
### Disaster recovery - roll back to a known good state
32+
Exporting and saving your configuration allows you to roll back to a previous version of your configuration. We recommend exporting your provisioning configuration and saving it for later use anytime you make a change to your attribute mappings or scoping filters. All you need to do is open up the JSON file that you downloaded in the steps above, copy the entire contents of the JSON file, replace the entire contents of the JSON payload in the schema editor, and then save. If there is an active provisioning cycle, it will complete and the next cycle will use the updated schema. The next cycle will also be an initial cycle, which reevaluates every user and group based on the new configuration.
2533
## Step 1: Retrieve your Provisioning App Service Principal ID (Object ID)
2634

2735
1. Launch the [Azure portal](https://portal.azure.com), and navigate to the Properties section of your provisioning application. For e.g. if you want to export your *Workday to AD User Provisioning application* mapping navigate to the Properties section of that app.

articles/api-management/api-management-transformation-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ This topic provides a reference for the following API Management policies. For i
7373
|Name|Description|Required|Default|
7474
|----------|-----------------|--------------|-------------|
7575
|apply|The attribute must be set to one of the following values.<br /><br /> - always - always apply conversion.<br />- content-type-json - convert only if response Content-Type header indicates presence of JSON.|Yes|N/A|
76-
|consider-accept-header|The attribute must be set to one of the following values.<br /><br /> - true - apply conversion if JSON is requested in request Accept header.<br />- false -always apply conversion.|No|true|
76+
|consider-accept-header|The attribute must be set to one of the following values.<br /><br /> - true - apply conversion if XML is requested in request Accept header.<br />- false -always apply conversion.|No|true|
7777
|parse-date|When set to `false` date values are simply copied during transformation|No|true|
7878

7979
### Usage
@@ -118,7 +118,7 @@ This topic provides a reference for the following API Management policies. For i
118118
|----------|-----------------|--------------|-------------|
119119
|kind|The attribute must be set to one of the following values.<br /><br /> - javascript-friendly - the converted JSON has a form friendly to JavaScript developers.<br />- direct - the converted JSON reflects the original XML document's structure.|Yes|N/A|
120120
|apply|The attribute must be set to one of the following values.<br /><br /> - always - convert always.<br />- content-type-xml - convert only if response Content-Type header indicates presence of XML.|Yes|N/A|
121-
|consider-accept-header|The attribute must be set to one of the following values.<br /><br /> - true - apply conversion if XML is requested in request Accept header.<br />- false -always apply conversion.|No|true|
121+
|consider-accept-header|The attribute must be set to one of the following values.<br /><br /> - true - apply conversion if JSON is requested in request Accept header.<br />- false -always apply conversion.|No|true|
122122

123123
### Usage
124124
This policy can be used in the following policy [sections](https://azure.microsoft.com/documentation/articles/api-management-howto-policies/#sections) and [scopes](https://azure.microsoft.com/documentation/articles/api-management-howto-policies/#scopes).

articles/app-service/app-service-web-tutorial-php-mysql.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,8 @@ az mysql server firewall-rule create --name AllowLocalClient --server <mysql_ser
208208
In the local terminal window, connect to the MySQL server in Azure. Use the value you specified previously for _&lt;mysql_server_name>_. When prompted for a password, use the password you specified when you created the database in Azure.
209209

210210
```bash
211-
mysql -u <admin_user>@<mysql_server_name> -h <mysql_server_name>.mysql.database.azure.com -P 3306 -p
211+
mysql -u <admin_user>@<mysql_server_name> -h <mysql_server_name>.mysql.database.azure.com -P 3306 -p<PASSWORD> --ssl-mode=REQUIRED --ssl-ca=<PATH_TO_PEM>
212+
212213
```
213214

214215
### Create a production database

articles/azure-functions/functions-bindings-timer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ Expressed as a string, the `TimeSpan` format is `hh:mm:ss` when `hh` is less tha
314314
|---------|---------|
315315
|"01:00:00" | every hour |
316316
|"00:01:00"|every minute |
317-
|"24:00:00" | every 24 hours |
317+
|"24:00:00" | every 24 days |
318318
|"1.00:00:00" | every day |
319319

320320
## Scale-out

articles/azure-monitor/platform/alerts-activity-log.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ A simple analogy for understanding conditions on which alert rules can be create
123123

124124

125125
## Azure Resource Manager template
126-
To create an activity log rule by using an Azure Resource Manager template, you create a resource of the type `microsoft.insights/activityLogAlerts`. Then you fill in all related properties. Here's a template that creates an activity log rule:
126+
To create an activity log alert rule by using an Azure Resource Manager template, you create a resource of the type `microsoft.insights/activityLogAlerts`. Then you fill in all related properties. Here's a template that creates an activity log alert rule:
127127

128128
```json
129129
{

0 commit comments

Comments
 (0)