Skip to content

Commit 5e1eb39

Browse files
authored
Merge pull request #113922 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents be9027d + 6157f4d commit 5e1eb39

23 files changed

+78
-36
lines changed

articles/active-directory/cloud-provisioning/how-to-prerequisites.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@ Run the [IdFix tool](https://docs.microsoft.com/office365/enterprise/prepare-dir
4343

4444
1. Identify a domain-joined host server running Windows Server 2012 R2 or greater with a minimum of 4-GB RAM and .NET 4.7.1+ runtime.
4545

46+
1. The PowerShell execution policy on the local server must be set to Undefined or RemoteSigned.
47+
4648
1. If there's a firewall between your servers and Azure AD, configure the following items:
4749
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
4850

articles/active-directory/develop/active-directory-configurable-token-lifetimes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.reviewer: hirsin, jlu, annaba
2020
You can specify the lifetime of a token issued by Azure Active Directory (Azure AD). You can set token lifetimes for all apps in your organization, for a multi-tenant (multi-organization) application, or for a specific service principal in your organization.
2121

2222
> [!IMPORTANT]
23-
> After hearing from customers during the preview, we've implemented [authentication session management capabilities](https://go.microsoft.com/fwlink/?linkid=2083106) in Azure AD Conditional Access. You can use this new feature to configure refresh token lifetimes by setting sign in frequency. After May 1, 2020 you will not be able to use Configurable Token Lifetime policy to configure session and refresh tokens. You can still configure access token lifetimes after the deprecation.
23+
> After hearing from customers during the preview, we've implemented [authentication session management capabilities](https://go.microsoft.com/fwlink/?linkid=2083106) in Azure AD Conditional Access. You can use this new feature to configure refresh token lifetimes by setting sign in frequency. After May 30, 2020 no new tenant will be able to use Configurable Token Lifetime policy to configure session and refresh tokens. The deprecation will happen within several months after that, which means that we will stop honoring existing session and refresh tokens polices. You can still configure access token lifetimes after the deprecation.
2424
2525
In Azure AD, a policy object represents a set of rules that are enforced on individual applications or on all applications in an organization. Each policy type has a unique structure, with a set of properties that are applied to objects to which they are assigned.
2626

articles/active-directory/develop/quickstart-v2-aspnet-webapp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ In this quickstart, you use a code sample to learn how an ASP.NET web app to sig
4040
> 1. Select **New registration**.
4141
> 1. When the **Register an application** page appears, enter your application's registration information:
4242
> - In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `ASPNET-Quickstart`.
43-
> - Add `http://localhost:44368/` in **Redirect URI**, and click **Register**.
43+
> - Add `https://localhost:44368/` in **Redirect URI**, and click **Register**.
4444
> - From the left navigation pane under the Manage section, select **Authentication**
4545
> - Under the **Implicit Grant** sub-section, select **ID tokens**.
4646
> - And then select **Save**.

articles/active-directory/develop/single-sign-on-saml-protocol.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -149,12 +149,12 @@ The `Response` element includes the result of the authorization request. Azure A
149149

150150
### Issuer
151151

152-
Azure AD sets the `Issuer` element to `https://login.microsoftonline.com/<TenantIDGUID>/` where \<TenantIDGUID> is the tenant ID of the Azure AD tenant.
152+
Azure AD sets the `Issuer` element to `https://sts.windows.net/<TenantIDGUID>/` where \<TenantIDGUID> is the tenant ID of the Azure AD tenant.
153153

154154
For example, a response with Issuer element could look like the following sample:
155155

156156
```
157-
<Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> https://login.microsoftonline.com/82869000-6ad1-48f0-8171-272ed18796e9/</Issuer>
157+
<Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> https://sts.windows.net/82869000-6ad1-48f0-8171-272ed18796e9/</Issuer>
158158
```
159159

160160
### Status
@@ -187,7 +187,7 @@ In addition to the `ID`, `IssueInstant` and `Version`, Azure AD sets the followi
187187
This is set to `https://sts.windows.net/<TenantIDGUID>/`where \<TenantIDGUID> is the Tenant ID of the Azure AD tenant.
188188

189189
```
190-
<Issuer>https://login.microsoftonline.com/82869000-6ad1-48f0-8171-272ed18796e9/</Issuer>
190+
<Issuer>https://sts.windows.net/82869000-6ad1-48f0-8171-272ed18796e9/</Issuer>
191191
```
192192

193193
#### Signature

articles/advisor/advisor-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ With Advisor, you can:
1919

2020
You can access Advisor through the [Azure portal](https://aka.ms/azureadvisordashboard). Sign in to the [portal](https://portal.azure.com), locate **Advisor** in the navigation menu, or search for it in the **All services** menu.
2121

22-
The Advisor dashboard displays personalized recommendations for all your subscriptions. You can apply filters to display recommendations for specific subscriptions and resource types. The recommendations are divided into four categories:
22+
The Advisor dashboard displays personalized recommendations for all your subscriptions. You can apply filters to display recommendations for specific subscriptions and resource types. The recommendations are divided into five categories:
2323

2424
* **High Availability**: To ensure and improve the continuity of your business-critical applications. For more information, see [Advisor High Availability recommendations](advisor-high-availability-recommendations.md).
2525
* **Security**: To detect threats and vulnerabilities that might lead to security breaches. For more information, see [Advisor Security recommendations](advisor-security-recommendations.md).

articles/aks/use-network-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -477,7 +477,7 @@ To learn more about policies, see [Kubernetes network policies][kubernetes-netwo
477477

478478
<!-- LINKS - internal -->
479479
[install-azure-cli]: /cli/azure/install-azure-cli
480-
[use-advanced-networking]: configure-advanced-networking.md
480+
[use-advanced-networking]: configure-azure-cni.md
481481
[az-aks-get-credentials]: /cli/azure/aks?view=azure-cli-latest#az-aks-get-credentials
482482
[concepts-network]: concepts-network.md
483483
[az-feature-register]: /cli/azure/feature#az-feature-register

articles/aks/windows-container-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -292,7 +292,7 @@ To learn more about AKS, and walk through a complete code to deployment example,
292292
[kubernetes-service]: concepts-network.md#services
293293
[kubernetes-dashboard]: kubernetes-dashboard.md
294294
[restricted-vm-sizes]: quotas-skus-regions.md#restricted-vm-sizes
295-
[use-advanced-networking]: configure-advanced-networking.md
295+
[use-advanced-networking]: configure-azure-cni.md
296296
[aks-support-policies]: support-policies.md
297297
[aks-faq]: faq.md
298298
[az-extension-add]: /cli/azure/extension#az-extension-add

articles/app-service/environment/firewall-integration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,7 @@ With an Azure Firewall, you automatically get everything below configured with t
170170
|azglobal-red.azglobal.metrics.nsatc.net:443 |
171171
|antares-black.antares.metrics.nsatc.net:443 |
172172
|antares-red.antares.metrics.nsatc.net:443 |
173+
|prod.microsoftmetrics.com:443 |
173174
|maupdateaccount.blob.core.windows.net:443 |
174175
|clientconfig.passport.net:443 |
175176
|packages.microsoft.com:443 |
@@ -186,6 +187,8 @@ With an Azure Firewall, you automatically get everything below configured with t
186187
|admin.core.windows.net:443 |
187188
|prod.warmpath.msftcloudes.com:443 |
188189
|prod.warmpath.msftcloudes.com:80 |
190+
|gcs.prod.monitoring.core.windows.net:80|
191+
|gcs.prod.monitoring.core.windows.net:443|
189192
|azureprofileruploads.blob.core.windows.net:443 |
190193
|azureprofileruploads2.blob.core.windows.net:443 |
191194
|azureprofileruploads3.blob.core.windows.net:443 |

articles/azure-monitor/app/javascript.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,14 @@ Most configuration fields are named such that they can be defaulted to false. Al
141141

142142
By default, this SDK will **not** handle state-based route changing that occurs in single page applications. To enable automatic route change tracking for your single page application, you can add `enableAutoRouteTracking: true` to your setup configuration.
143143

144-
Currently, we offer a separate [React plugin](#react-extensions) which you can initialize with this SDK. It will also accomplish route change tracking for you, as well as collect [other React specific telemetry](https://github.com/microsoft/ApplicationInsights-JS/blob/17ef50442f73fd02a758fbd74134933d92607ecf/extensions/applicationinsights-react-js/README.md).
144+
Currently, we offer a separate [React plugin](#react-extensions), which you can initialize with this SDK. It will also accomplish route change tracking for you, as well as collect [other React specific telemetry](https://github.com/microsoft/ApplicationInsights-JS/blob/17ef50442f73fd02a758fbd74134933d92607ecf/extensions/applicationinsights-react-js/README.md).
145+
146+
> [!NOTE]
147+
> Use `enableAutoRouteTracking: true` only if you are **not** using the React plugin. Both are capable of sending new PageViews when the route changes. If both are enabled, duplicate PageViews may be sent.
148+
149+
## Configuration: autoTrackPageVisitTime
150+
151+
By setting `autoTrackPageVisitTime: true`, the time a user spends on each page is tracked. On each new PageView, the duration the user spent on the *previous* page is sent as a [custom metric](https://docs.microsoft.com/azure/azure-monitor/platform/metrics-custom-overview) named `PageVisitTime`. This custom metric is viewable in the [Metrics Explorer](https://docs.microsoft.com/azure/azure-monitor/platform/metrics-getting-started) as a "log-based metric".
145152

146153
## React extensions
147154

articles/azure-monitor/app/performance-counters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ To collect system performance counters and send them to Application Insights, yo
7070
```csharp
7171
var perfCollectorModule = new PerformanceCollectorModule();
7272
perfCollectorModule.Counters.Add(new PerformanceCounterCollectionRequest(
73-
@"\Process([replace-with-application-process-name])\Page Faults/sec", "PageFaultsPerfSec")));
73+
@"\Process([replace-with-application-process-name])\Page Faults/sec", "PageFaultsPerfSec"));
7474
perfCollectorModule.Initialize(TelemetryConfiguration.Active);
7575
```
7676

0 commit comments

Comments
 (0)