Skip to content

Commit 60d59af

Browse files
authored
Merge branch 'MicrosoftDocs:main' into Spelling-Wave-8
2 parents aa821b3 + e226320 commit 60d59af

File tree

96 files changed

+554
-189
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

96 files changed

+554
-189
lines changed

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 11/04/2024
4+
ms.date: 12/02/2024
55
ms.service: azure-active-directory
66
ms.subservice: b2c
77
ms.topic: whats-new
@@ -19,6 +19,12 @@ manager: CelesteDG
1919

2020
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
2121

22+
## November 2024
23+
24+
### Updated articles
25+
26+
- [Azure Active Directory B2C: Region availability & data residency](data-residency.md) - Updated data residency location
27+
2228
## October 2024
2329

2430
### Updated articles
@@ -35,11 +41,3 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
3541

3642
- [Developer notes for Azure Active Directory B2C](custom-policy-developer-notes.md) - Updated feature availability for China cloud
3743

38-
## August 2024
39-
40-
This month, we changed Twitter to X in numerous articles and code samples.
41-
42-
### Updated articles
43-
44-
- [Tutorial: Configure Keyless with Azure Active Directory B2C](partner-keyless.md) - Editorial updates
45-

articles/analysis-services/analysis-services-addservprinc-admins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ The following Resource Manager template deploys an Analysis Services server with
9595

9696
## Using managed identities
9797

98-
Managed identies that are added to database or server roles will be unable to login to the service or do any operations. Managed identities for service principals are not supported in Azure Analysis Services.
98+
Managed identities that are added to database or server roles will be unable to login to the service or do any operations. Managed identities for service principals are not supported in Azure Analysis Services.
9999

100100
## Related information
101101

articles/analysis-services/analysis-services-database-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ When adding a **service principal** use `app:appid@tenantid`.
6262

6363
To add roles and users to a deployed model database, you must be connected to the server as a Server administrator or already in a database role with administrator permissions.
6464

65-
1. In Object Exporer, right-click **Roles** > **New Role**.
65+
1. In Object Explorer, right-click **Roles** > **New Role**.
6666

6767
2. In **Create Role**, enter a role name and description.
6868

articles/analysis-services/analysis-services-scale-out.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Use SSMS to set ReplicaSyncMode in Advanced Properties. The possible values are:
6161
- `1` (default): Full replica database rehydration in stages (incremental).
6262
- `2`: Optimized synchronization in parallel.
6363

64-
![RelicaSyncMode setting](media/analysis-services-scale-out/aas-scale-out-sync-mode.png)
64+
![ReplicaSyncMode setting](media/analysis-services-scale-out/aas-scale-out-sync-mode.png)
6565

6666
When setting **ReplicaSyncMode=2**, depending on how much of the cache needs to be updated, more memory may be consumed by the query replicas. To keep the database online and available for queries, depending on how much of the data has changed, the operation can require up to *double the memory* on the replica because both the old and new segments are kept in memory simultaneously. Replica nodes have the same memory allocation as the primary node, and there's normally extra memory on the primary node for refresh operations, so it may be unlikely that the replicas would run out of memory. Additionally, the common scenario is that the database is incrementally updated on the primary node, and therefore the requirement for double the memory should be uncommon. If the Sync operation does encounter an out of memory error, it retries using the default technique (attach/detach two at a time).
6767

articles/api-center/manage-apis-azure-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ Use the [az apic api delete](/cli/azure/apic/api#az_apic_api_delete) command to
125125

126126
```azurecli-interactive
127127
az apic api delete \
128-
--resource-group myResoureGroup --service-name myAPICenter \
128+
--resource-group myResourceGroup --service-name myAPICenter \
129129
--api-id petstore-api
130130
```
131131

articles/api-management/api-management-howto-api-inspector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ For information about customizing trace information, see the [trace](trace-polic
149149
In this tutorial, you learned how to:
150150
151151
> [!div class="checklist"]
152-
> * Trace an example call in the test conosle
152+
> * Trace an example call in the test console
153153
> * Review request processing steps
154154
> * Enable tracing for an API
155155

articles/api-management/developer-portal-wordpress-plugin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ In this step, create a new Microsoft Entra app. In later steps, you configure th
6969

7070
`https://<apim-instance-name>.developer.azure-api.net/signin`
7171

72-
1. Select **+ Add a platform** again. Select **Single-page application** agaain.
72+
1. Select **+ Add a platform** again. Select **Single-page application** again.
7373
1. On the **Configure single-page application** page, enter the following redirect URI, substituting the name of your API Management instance, and select **Configure**:
7474

7575
`https://<apim-instance-name>.developer.azure-api.net/`

articles/api-management/http-data-source-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ type User {
128128
</http-data-source>
129129
```
130130

131-
### Resolver for a GraqhQL query that returns a list, using a liquid template
131+
### Resolver for a GraphQL query that returns a list, using a liquid template
132132

133133
The following example uses a liquid template, supported for use in the [set-body](set-body-policy.md) policy, to return a list in the HTTP response to a query. It also renames the `username` field in the response from the REST API to `name` in the GraphQL response.
134134

articles/api-management/private-endpoint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ If a private endpoint connection is in pending status, an owner of the API Manag
166166

167167
If you have sufficient permissions, approve a private endpoint connection on the API Management instance's **Private endpoint connections** page in the portal. In the connection's context (...) menu, select **Approve**.
168168

169-
You can also use the API Management [Private Endpoint Connection - Create Or Update](/rest/api/apimanagement/private-endpoint-connection/create-or-update) REST API to approve pending private endpoint connectionis.
169+
You can also use the API Management [Private Endpoint Connection - Create Or Update](/rest/api/apimanagement/private-endpoint-connection/create-or-update) REST API to approve pending private endpoint connections.
170170

171171
### Optionally disable public network access
172172

articles/api-management/validate-jwt-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ The `validate-jwt` policy enforces existence and validity of a supported JSON we
119119
* The policy supports both symmetric and asymmetric signing algorithms:
120120
* **Symmetric** - The following encryption algorithms are supported: A128CBC-HS256, A192CBC-HS384, A256CBC-HS512.
121121
* If used in the policy, the key must be provided inline within the policy in the Base64-encoded form.
122-
* **Asymmetric** - The following encryption algortithms are supported: PS256, RS256, RS512, ES256.
122+
* **Asymmetric** - The following encryption algorithms are supported: PS256, RS256, RS512, ES256.
123123
* If used in the policy, the key may be provided either via an OpenID configuration endpoint, or by providing the ID of an uploaded certificate (in PFX format) that contains the public key, or the modulus-exponent pair of the public key.
124124
* To configure the policy with one or more OpenID configuration endpoints for use with a self-hosted gateway, the OpenID configuration endpoints URLs must also be reachable by the cloud gateway.
125125
* You can use access restriction policies in different scopes for different purposes. For example, you can secure the whole API with Microsoft Entra authentication by applying the `validate-jwt` policy on the API level, or you can apply it on the API operation level and use `claims` for more granular control.

0 commit comments

Comments
 (0)