Skip to content

Commit 5a8e806

Browse files
authored
Merge pull request #189970 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents de26b94 + 4484a3f commit 5a8e806

File tree

11 files changed

+72
-76
lines changed

11 files changed

+72
-76
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-howto-view-role-policy.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ The **Remediation** dashboard in CloudKnox Permissions Management (CloudKnox) en
3232
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Role/Policies** subtab.
3333

3434
The **Role/Policies list** displays a list of existing roles/policies and the following information about each role/policy
35-
- **Role/Policy name**: The name of the roles/policies available to you.
36-
- **Role/Policy type**: **Custom**, **System**, or **CloudKnox only**
35+
- **Role/Policy Name**: The name of the roles/policies available to you.
36+
- **Role/Policy Type**: **Custom**, **System**, or **CloudKnox Only**
3737
- **Actions**: The type of action you can perform on the role/policy, **Clone**, **Modify**, or **Delete**
3838

3939

@@ -42,24 +42,24 @@ The **Remediation** dashboard in CloudKnox Permissions Management (CloudKnox) en
4242
The **Tasks** list appears, displaying:
4343
- A list of **Tasks**.
4444
- **For AWS:**
45-
- The **Users**, **Groups**, and **Roles** the task is **Directly assigned to**.
46-
- The **Group members** and **Role identities** the task is **Indirectly assessable by**.
45+
- The **Users**, **Groups**, and **Roles** the task is **Directly Assigned To**.
46+
- The **Group Members** and **Role Identities** the task is **Indirectly Accessible By**.
4747

4848
- **For Azure:**
49-
- The **Users**, **Groups**, **Enterprise applications** and **Managed identities** the task is **Directly assigned to**.
50-
- The **Group members** the task is **Indirectly assessable by**.
49+
- The **Users**, **Groups**, **Enterprise Applications** and **Managed Identities** the task is **Directly Assigned To**.
50+
- The **Group Members** the task is **Indirectly Accessible By**.
5151

5252
- **For GCP:**
53-
- The **Users**, **Groups**, and **Service accounts** the task is **Directly assigned to**.
54-
- The **Group members** the task is **Indirectly assessable by**.
53+
- The **Users**, **Groups**, and **Service Accounts** the task is **Directly Assigned To**.
54+
- The **Group Members** the task is **Indirectly Accessible By**.
5555

5656
1. To close the role/policy details, select the arrow to the left of the role/policy name.
5757

5858
## Export information about roles/policies
5959

6060
- **Export CSV**: Select this option to export the displayed list of roles/policies as a comma-separated values (CSV) file.
6161

62-
When the file is successfully exported, a message appears: **Exported successfully.**
62+
When the file is successfully exported, a message appears: **Exported Successfully.**
6363

6464
- Check your email for a message from the CloudKnox Customer Success Team. This email contains a link to:
6565
- The **Role Policy Details** report in CSV format.
@@ -73,20 +73,20 @@ The **Remediation** dashboard in CloudKnox Permissions Management (CloudKnox) en
7373
1. On the CloudKnox home page, select the **Remediation** dashboard, and then select the **Role/Policies** tab.
7474
1. To filter the roles/policies, select from the following options:
7575

76-
- **Authorization system type**: Select **AWS**, **Azure**, or **GCP**.
77-
- **Authorization system**: Select the accounts you want.
78-
- **Role/Policy type**: Select from the following options:
76+
- **Authorization System Type**: Select **AWS**, **Azure**, or **GCP**.
77+
- **Authorization System**: Select the accounts you want.
78+
- **Role/Policy Type**: Select from the following options:
7979

8080
- **All**: All managed roles/policies.
8181
- **Custom**: A customer-managed role/policy.
8282
- **System**: A cloud service provider-managed role/policy.
83-
- **CloudKnox only**: A role/policy created by CloudKnox.
83+
- **CloudKnox Only**: A role/policy created by CloudKnox.
8484

85-
- **Role/Policy status**: Select **All**, **Assigned**, or **Unassigned**.
86-
- **Role/Policy usage**: Select **All** or **Unused**.
85+
- **Role/Policy Status**: Select **All**, **Assigned**, or **Unassigned**.
86+
- **Role/Policy Usage**: Select **All** or **Unused**.
8787
1. Select **Apply**.
8888

89-
To discard your changes, select **Reset filter**.
89+
To discard your changes, select **Reset Filter**.
9090

9191

9292
## Next steps

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-product-data-sources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ You can use the **Data Collectors** dashboard in CloudKnox Permissions Managemen
7676
1. Select the ellipses **(...)** at the end of the row in the table.
7777
1. Select **Delete Configuration**.
7878

79-
The **M-CIEM Onboarding - Summary** box displays.
79+
The **CloudKnox Onboarding - Summary** box displays.
8080
1. Select **Delete**.
8181
1. Check your email for a one time password (OTP) code, and enter it in **Enter OTP**.
8282

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-ui-remediation.md

Lines changed: 45 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -36,29 +36,29 @@ This article provides an overview of the components of the **Remediation** dashb
3636

3737
- **Roles/Policies**: Use this subtab to perform Create Read Update Delete (CRUD) operations on roles/policies.
3838
- **Permissions**: Use this subtab to perform Read Update Delete (RUD) on granted permissions.
39-
- **Role/Policy template**: Use this subtab to create a template for roles/policies template.
39+
- **Role/Policy Template**: Use this subtab to create a template for roles/policies template.
4040
- **Requests**: Use this subtab to view approved, pending, and processed Permission on Demand (POD) requests.
41-
- **My requests**: Use this tab to manage lifecycle of the POD request either created by you or needs your approval.
42-
- **Settings**: Use this subtab to select **Request role/policy filters**, **Request settings**, and **Auto-approve** settings.
41+
- **My Requests**: Use this tab to manage lifecycle of the POD request either created by you or needs your approval.
42+
- **Settings**: Use this subtab to select **Request Role/Policy Filters**, **Request Settings**, and **Auto-Approve** settings.
4343

4444
1. Use the dropdown to select the **Authorization System Type** and **Authorization System**, and then select **Apply**.
4545

4646
## View and create roles/policies
4747

4848
The **Role/Policies** subtab provides the following settings that you can use to view and create a role/policy.
4949

50-
- **Authorization system type**: Displays a dropdown with authorization system types you can access, Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
51-
- **Authorization system**: Displays a list of authorization systems accounts you can access.
52-
- **Role/Policy type**: A dropdown with available role/policy types. You can select **All**, **Custom**, **System**, or **CloudKnox only**.
53-
- **Role/Policy status**: A dropdown with available role/policy statuses. You can select **All**, **Assigned**, or **Unassigned**.
54-
- **Role/Policy usage**: A dropdown with **All** or **Unused** roles/policies.
50+
- **Authorization System Type**: Displays a dropdown with authorization system types you can access, Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
51+
- **Authorization System**: Displays a list of authorization systems accounts you can access.
52+
- **Policy Type**: A dropdown with available role/policy types. You can select **All**, **Custom**, **System**, or **CloudKnox Only**.
53+
- **Policy Status**: A dropdown with available role/policy statuses. You can select **All**, **Assigned**, or **Unassigned**.
54+
- **Policy Usage**: A dropdown with **All** or **Unused** roles/policies.
5555
- **Apply**: Select this option to save the changes you've made.
5656
- **Reset Filter**: Select this option to discard the changes you've made.
5757

58-
The **Role/Policies list** displays a list of existing roles/policies and the following information about each role/policy.
58+
The **Policy list** displays a list of existing roles/policies and the following information about each role/policy.
5959

60-
- **Role/Policy name**: The name of the roles/policies available to you.
61-
- **Role/Policy type**: **Custom**, **System**, or **CloudKnox only**
60+
- **Policy Name**: The name of the roles/policies available to you.
61+
- **Policy Type**: **Custom**, **System**, or **CloudKnox Only**
6262
- **Actions**
6363
- Select **Clone** to create a duplicate copy of the role/policy.
6464
- Select **Modify** to change the existing role/policy.
@@ -69,7 +69,7 @@ Other options available to you:
6969
- **Reload**: Select this option to refresh the displayed list of roles/policies.
7070
- **Export CSV**: Select this option to export the displayed list of roles/policies as a comma-separated values (CSV) file.
7171

72-
When the file is successfully exported, a message appears: **Exported successfully.**
72+
When the file is successfully exported, a message appears: **Exported Successfully.**
7373

7474
- Check your email for a message from the CloudKnox Customer Success Team. This email contains a link to:
7575
- The **Role Policy Details** report in CSV format.
@@ -81,19 +81,19 @@ Other options available to you:
8181

8282
The **Permissions** subtab provides the following settings that you can use to add filters to your permissions.
8383

84-
- **Authorization system type**: Displays a dropdown with authorization system types you can access, AWS, Azure, and GCP.
85-
- **Authorization system**: Displays a list of authorization systems accounts you can access.
86-
- **Search for**: A dropdown from which you can select **Group**, **User**, or **Role**.
87-
- **User status**: A dropdown from which you can select **Any**, **Active**, or **Inactive**.
88-
- **Privilege creep index** (PCI): A dropdown from which you can select a PCI rating of **Any**, **High**, **Medium**, or **Low**.
84+
- **Authorization System Type**: Displays a dropdown with authorization system types you can access, AWS, Azure, and GCP.
85+
- **Authorization System**: Displays a list of authorization systems accounts you can access.
86+
- **Search For**: A dropdown from which you can select **Group**, **User**, or **Role**.
87+
- **User Status**: A dropdown from which you can select **Any**, **Active**, or **Inactive**.
88+
- **Privilege Creep Index** (PCI): A dropdown from which you can select a PCI rating of **Any**, **High**, **Medium**, or **Low**.
8989
- **Task Usage**: A dropdown from which you can select **Any**, **Granted**, **Used**, or **Unused**.
90-
- **Enter a username**: A dropdown from which you can select a username.
90+
- **Enter a Username**: A dropdown from which you can select a username.
9191
- **Enter a Group Name**: A dropdown from which you can select a group name.
9292
- **Apply**: Select this option to save the changes you've made and run the filter.
9393
- **Reset Filter**: Select this option to discard the changes you've made.
9494
- **Export CSV**: Select this option to export the displayed list of roles/policies as a comma-separated values (CSV) file.
9595

96-
When the file is successfully exported, a message appears: **Exported successfully.**
96+
When the file is successfully exported, a message appears: **Exported Successfully.**
9797

9898
- Check your email for a message from the CloudKnox Customer Success Team. This email contains a link to:
9999
- The **Role Policy Details** report in CSV format.
@@ -102,17 +102,17 @@ The **Permissions** subtab provides the following settings that you can use to a
102102

103103
## Create templates for roles/policies
104104

105-
Use the **Role/Policy template** subtab to create a template for roles/policies.
105+
Use the **Role/Policy Template** subtab to create a template for roles/policies.
106106

107107
1. Select:
108-
- **Authorization system type**: Displays a dropdown with authorization system types you can access, WS, Azure, and GCP.
109-
- **Create template**: Select this option to create a template.
108+
- **Authorization System Type**: Displays a dropdown with authorization system types you can access, WS, Azure, and GCP.
109+
- **Create Template**: Select this option to create a template.
110110

111111
1. In the **Details** page, make the required selections:
112-
- **Authorization system type**: Select the authorization system types you want, **AWS**, **Azure**, or **GCP**.
113-
- **Template name**: Enter a name for your template, and then select **Next**.
112+
- **Authorization System Type**: Select the authorization system types you want, **AWS**, **Azure**, or **GCP**.
113+
- **Template Name**: Enter a name for your template, and then select **Next**.
114114

115-
1. In the **Statements** page, complete the **Tasks**, **Resources**, **Request conditions** and **Effect** sections. Then select **Save** to save your role/policy template.
115+
1. In the **Statements** page, complete the **Tasks**, **Resources**, **Request Conditions** and **Effect** sections. Then select **Save** to save your role/policy template.
116116

117117
Other options available to you:
118118
- **Search**: Select this option to search for a specific role/policy.
@@ -123,22 +123,22 @@ Other options available to you:
123123
Use the **Requests** tab to view a list of **Pending**, **Approved**, and **Processed** requests for permissions your team members have made.
124124

125125
- Select:
126-
- **Authorization system type**: Displays a dropdown with authorization system types you can access, AWS, Azure, and GCP.
127-
- **Authorization system**: Displays a list of authorization systems accounts you can access.
126+
- **Authorization System Type**: Displays a dropdown with authorization system types you can access, AWS, Azure, and GCP.
127+
- **Authorization System**: Displays a list of authorization systems accounts you can access.
128128

129129
Other options available to you:
130130

131131
- **Reload**: Select this option to refresh the displayed list of roles/policies.
132132
- **Search**: Select this option to search for a specific role/policy.
133133
- **Columns**: Select one or more of the following to view more information about the request:
134-
- **Submitted by**
135-
- **On behalf of**
136-
- **Authorization system**
137-
- **Tasks/scope/policies**
138-
- **Request date**
134+
- **Submitted By**
135+
- **On Behalf Of**
136+
- **Authorization System**
137+
- **Tasks/Scope/Policies**
138+
- **Request Date**
139139
- **Schedule**
140140
- **Submitted**
141-
- **Reset to default**: Select this option to discard your settings.
141+
- **Reset to Default**: Select this option to discard your settings.
142142

143143
### View pending requests
144144

@@ -174,21 +174,21 @@ The **Processed** table displays information about the requests that have been p
174174
Use the **My Requests** subtab to view a list of **Pending**, **Approved**, and **Processed** requests for permissions your team members have made and you must approve or reject.
175175

176176
- Select:
177-
- **Authorization system type**: Displays a dropdown with authorization system types you can access, AWS, Azure, and GCP.
178-
- **Authorization system**: Displays a list of authorization systems accounts you can access.
177+
- **Authorization System Type**: Displays a dropdown with authorization system types you can access, AWS, Azure, and GCP.
178+
- **Authorization System**: Displays a list of authorization systems accounts you can access.
179179

180180
Other options available to you:
181181

182182
- **Reload**: Select this option to refresh the displayed list of roles/policies.
183183
- **Search**: Select this option to search for a specific role/policy.
184184
- **Columns**: Select one or more of the following to view more information about the request:
185-
- **On behalf of**
186-
- **Authorization system**
187-
- **Tasks/scope/policies**
188-
- **Request date**
185+
- **On Behalf Of**
186+
- **Authorization System**
187+
- **Tasks/Scope/Policies**
188+
- **Request Date**
189189
- **Schedule**
190-
- **Reset to default**: Select this option to discard your settings.
191-
- **New request**: Select this option to create a new request for permissions. For more information, see Create a request for permissions.
190+
- **Reset to Default**: Select this option to discard your settings.
191+
- **New Request**: Select this option to create a new request for permissions. For more information, see Create a request for permissions.
192192

193193
### View pending requests
194194

@@ -218,12 +218,12 @@ The **Processed** table displays information about the requests that have been p
218218

219219
## Make setting selections for requests and auto-approval
220220

221-
The **Settings** subtab provides the following settings that you can use to make setting selections to **Request role/policy filters**, **Request settings**, and **Auto-approve** requests.
221+
The **Settings** subtab provides the following settings that you can use to make setting selections to **Request Role/Policy Filters**, **Request Settings**, and **Auto-Approve** requests.
222222

223-
- **Authorization system type**: Displays a dropdown with authorization system types you can access, AWS, Azure, and GCP.
224-
- **Authorization system**: Displays a list of authorization systems accounts you can access.
223+
- **Authorization System Type**: Displays a dropdown with authorization system types you can access, AWS, Azure, and GCP.
224+
- **Authorization System**: Displays a list of authorization systems accounts you can access.
225225
- **Reload**: Select this option to refresh the displayed list of role/policy filters.
226-
- **Create filter**: Select this option to create a new filter.
226+
- **Create Filter**: Select this option to create a new filter.
227227

228228
## Next steps
229229

articles/azure-government/compare-azure-government-global-azure.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -237,7 +237,6 @@ The following features have known limitations in Azure Government:
237237
- Limitations with B2B Collaboration in supported Azure US Government tenants:
238238
- For more information about B2B collaboration limitations in Azure Government and to find out if B2B collaboration is available in your Azure Government tenant, see [Azure AD B2B in government and national clouds](../active-directory/external-identities/b2b-government-national-clouds.md).
239239
- B2B collaboration via Power BI is not supported. When you invite a guest user from within Power BI, the B2B flow is not used and the guest user won't appear in the tenant's user list. If a guest user is invited through other means, they'll appear in the Power BI user list, but any sharing request to the user will fail and display a 403 Forbidden error.
240-
- Microsoft 365 Groups are not supported for B2B users and can't be enabled.
241240

242241
- Limitations with multifactor authentication:
243242
- Hardware OATH tokens are not available in Azure Government.

articles/cosmos-db/how-to-setup-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -392,7 +392,7 @@ const servicePrincipal = new ClientSecretCredential(
392392
"<client-application-id>",
393393
"<client-application-secret>");
394394
const client = new CosmosClient({
395-
"<account-endpoint>",
395+
endpoint: "<account-endpoint>",
396396
aadCredentials: servicePrincipal
397397
});
398398
```

articles/openshift/tutorial-create-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ az feature register --namespace Microsoft.RedHatOpenShift --name preview
8686
8787
A Red Hat pull secret enables your cluster to access Red Hat container registries along with additional content. This step is optional but recommended.
8888

89-
1. [Navigate to your Red Hat OpenShift cluster manager portal](https://cloud.redhat.com/openshift/install/azure/aro-provisioned) and log in.
89+
1. [Navigate to your Red Hat OpenShift cluster manager portal](https://console.redhat.com/openshift/install/azure/aro-provisioned) and log in.
9090

9191
You will need to log in to your Red Hat account or create a new Red Hat account with your business email and accept the terms and conditions.
9292

articles/postgresql/flexible-server/concepts-compute-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To choose a pricing tier, use the following table as a starting point.
3030
| General Purpose | Most business workloads that require balanced compute and memory with scalable I/O throughput. Examples include servers for hosting web and mobile apps and other enterprise applications.|
3131
| Memory Optimized | High-performance database workloads that require in-memory performance for faster transaction processing and higher concurrency. Examples include servers for processing real-time data and high-performance transactional or analytical apps.|
3232

33-
After you create a server, the compute tier, number of vCores and storage size can be changed up or down within seconds. You also can independently adjust the backup retention period up or down. For more information, see the [Scale resources](#scale-resources) section.
33+
After you create a server, the compute tier, number of vCores can be changed up or down and storage size can be changed up within seconds. You also can independently adjust the backup retention period up or down. For more information, see the [Scale resources](#scale-resources) section.
3434

3535
## Compute tiers, vCores, and server types
3636

0 commit comments

Comments
 (0)