You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-proxy-configure-single-sign-on-with-kcd.md
+17-8Lines changed: 17 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,17 +63,27 @@ The Active Directory configuration varies, depending on whether your Application
63
63
64
64
#### Connector and application server in different domains
65
65
1. For a list of prerequisites for working with KCD across domains, see [Kerberos Constrained Delegation across domains](https://technet.microsoft.com/library/hh831477.aspx).
66
-
2. Use the `principalsallowedtodelegateto` property on the Connector server to enable the Application Proxy to delegate for the Connector server. The application server is `sharepointserviceaccount` and the delegating server is `connectormachineaccount`. For Windows 2012 R2, use this code as an example:
66
+
2. Use the `principalsallowedtodelegateto` property of the service account (computer or dedicated domain user account) of the web application to enable Kerberos authentication delegation from the Application Proxy (connector). The application server is running in the context of `webserviceaccount` and the delegating server is `connectorcomputeraccount`. Run the commands below on a Domain Controller (running Windows Server 2012 R2 or later) in the domain of `webserviceaccount`. Use flat names (non UPN) for both accounts.
1. Publish your application according to the instructions described in [Publish applications with Application Proxy](application-proxy-add-on-premises-application.md). Make sure to select **Azure Active Directory** as the **Preauthentication Method**.
@@ -146,4 +156,3 @@ But, in some cases, the request is successfully sent to the backend application
146
156
147
157
148
158
For the latest news and updates, check out the [Application Proxy blog](https://blogs.technet.com/b/applicationproxyblog/)
Copy file name to clipboardExpand all lines: articles/kinect-dk/multi-camera-sync.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ There are many reasons to use multiple Azure Kinect DK devices, including the fo
25
25
Additional synchronized devices can provide the occluded data.
26
26
- Scan objects in three dimensions.
27
27
- Increase the effective frame rate to a value that's greater than 30 frames per second (FPS).
28
-
- Capture multiple 4K color images of the same scene, all aligned within 100 microseconds (μs) of the start of exposure.
28
+
- Capture multiple 4K color images of the same scene, all aligned within 100 microseconds (μs) of the center of exposure.
29
29
- Increase camera coverage within the space.
30
30
31
31
## Plan your multi-device configuration
@@ -70,9 +70,6 @@ If you want to control the precise timing of each device, we recommend that you
70
70
71
71
In the image capture loop, avoid repeatedly setting the same exposure setting. Call the API only one time when it's needed.
72
72
73
-
#### Timestamp considerations
74
-
Devices that are acting in master or subordinate roles report image timestamps in terms of *Start of Frame* instead of *Center of Frame*.
75
-
76
73
#### Avoiding interference between multiple depth cameras
77
74
78
75
When multiple depth cameras are imaging overlapping fields of view, each camera must image its own associated laser. To prevent the lasers from interfering with one another, the camera captures should be offset from one another by 160μs or more.
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/disk-encryption.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,6 +68,7 @@ For now, customer-managed keys have the following restrictions:
68
68
- All resources related to your customer-managed keys (Azure Key Vaults, disk encryption sets, VMs, disks, and snapshots) must be in the same subscription and region.
69
69
- Disks, snapshots, and images encrypted with customer-managed keys cannot move to another subscription.
70
70
- If you use the Azure portal to create your disk encryption set, you cannot use snapshots for now.
71
+
- Managed disks encrypted using customer-managed keys cannot also be encrypted with Azure Disk Encryption.
71
72
72
73
### CLI
73
74
#### Setting up your Azure Key Vault and DiskEncryptionSet
0 commit comments