You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/tutorial-enable-sspr.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,6 +29,10 @@ In this tutorial you learn how to:
29
29
> * Set up authentication methods and registration options
30
30
> * Test the SSPR process as a user
31
31
32
+
## Video tutorial
33
+
34
+
You can also follow along in a related video: [How to enable and configure SSPR in Azure AD](https://www.youtube.com/embed/rA8TvhNcCvQ?azure-portal=true).
35
+
32
36
## Prerequisites
33
37
34
38
To finish this tutorial, you need the following resources and privileges:
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/github-enterprise-managed-user-tutorial.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,10 +45,10 @@ To configure the integration of GitHub Enterprise Managed User into Azure AD, yo
45
45
46
46
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
47
47
1. On the left navigation pane, select the **Azure Active Directory** service.
48
-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
48
+
1. Navigate to **Enterprise Applications**.
49
49
1. To add new application, select **New application**.
50
-
1.In the **Add from the gallery** section, type**GitHub Enterprise Managed User** in the search box.
51
-
1. Select **GitHub Enterprise Managed User** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
50
+
1.Type**GitHub Enterprise Managed User** in the search box.
51
+
1. Select **GitHub Enterprise Managed User** from results panel and then click on the **Create** button. Wait a few seconds while the app is added to your tenant.
52
52
53
53
54
54
## Configure and test Azure AD SSO for GitHub Enterprise Managed User
@@ -133,4 +133,4 @@ In this section, you'll take the information provided from AAD above and enter t
133
133
134
134
## Next steps
135
135
136
-
GitHub Enterprise Managed User **requires** all accounts to be created through automatic user provisioning, you can find more details [here](./github-enterprise-managed-user-provisioning-tutorial.md) on how to configure automatic user provisioning.
136
+
GitHub Enterprise Managed User **requires** all accounts to be created through automatic user provisioning, you can find more details [here](./github-enterprise-managed-user-provisioning-tutorial.md) on how to configure automatic user provisioning.
Copy file name to clipboardExpand all lines: articles/cosmos-db/how-to-configure-private-endpoints.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -689,6 +689,8 @@ The following limitations apply when you're using Private Link with an Azure Cos
689
689
690
690
* A network administrator should be granted at least the `Microsoft.DocumentDB/databaseAccounts/PrivateEndpointConnectionsApproval/action` permission at the Azure Cosmos account scope to create automatically approved private endpoints.
691
691
692
+
* Currently, you can't approve a rejected private endpoint connection. Instead, re-create the private endpoint to resume the private connectivity. The Cosmos DB private link service automatically approves the re-created private endpoint.
693
+
692
694
### Limitations to private DNS zone integration
693
695
694
696
Unless you're using a private DNS zone group, DNS records in the private DNS zone are not removed automatically when you delete a private endpoint or you remove a region from the Azure Cosmos account. You must manually remove the DNS records before:
Copy file name to clipboardExpand all lines: articles/postgresql/flexible-server/concepts-high-availability.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,7 @@ For flexible servers configured with high availability, these maintenance activi
68
68
Unplanned outages include software bugs or infrastructure component failures that impact the availability of the database. If the primary server becomes unavailable, it is detected by the monitoring system and initiates a failover process. The process includes a few seconds of wait time to make sure it is not a false positive. The replication to the standby replica is severed and the standby replica is activated to be the primary database server. That includes the standby to recovery any residual WAL files. Once it is fully recovered, DNS for the same end point is updated with the standby server's IP address. Clients can then retry connecting to the database server using the same connection string and resume their operations.
69
69
70
70
>[!NOTE]
71
-
> Flexible servers configured with zone-redundant high availability provide a recovery point objective (RPO) of **Zero** (no data loss.The recovery tome objective (RTO) is expected to be **less than 120s** in typical cases. However, depending on the activity in the primary database server at the time of the failover, the failover may take longer.
71
+
> Flexible servers configured with zone-redundant high availability provide a recovery point objective (RPO) of **Zero** (no data loss). The recovery time objective (RTO) is expected to be **less than 120s** in typical cases. However, depending on the activity in the primary database server at the time of the failover, the failover may take longer.
72
72
73
73
After the failover, while a new standby server is being provisioned, applications can still connect to the primary server and proceed with their read/write operations. Once the standby server is established, it will start recovering the logs that were generated after the failover.
Copy file name to clipboardExpand all lines: articles/storage/common/sas-expiration-policy.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,7 +105,7 @@ The SAS expiration period appears in the console output.
105
105
106
106
To log the creation of a SAS that is valid over a longer interval than the SAS expiration policy recommends, first create a diagnostic setting that sends logs to an Azure Log Analytics workspace. For more information, see [Send logs to Azure Log Analytics](../blobs/monitor-blob-storage.md#send-logs-to-azure-log-analytics).
107
107
108
-
Next, use an Azure Monitor log query to determine whether a SAS has expired. Create a new query in your Log Analytics workspace, add the following query text, and press **Run**.
108
+
Next, use an Azure Monitor log query to monitor whether policy has been violated. Create a new query in your Log Analytics workspace, add the following query text, and press **Run**.
109
109
110
110
```kusto
111
111
StorageBlobLogs | where SasExpiryStatus startswith "Policy Violated"
Copy file name to clipboardExpand all lines: articles/synapse-analytics/security/how-to-connect-to-workspace-from-restricted-network.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,7 @@ On the **Resource** tab:
91
91
To access the linked storage with the storage explorer in Azure Synapse Analytics Studio workspace, you must create one private endpoint. The steps for this are similar to those of step 3.
92
92
93
93
On the **Resource** tab:
94
-
* For **Resource type**, select **Microsoft.Synapse/storageAccounts**.
94
+
* For **Resource type**, select **Microsoft.Storage/storageAccounts**.
95
95
* For **Resource**, select the storage account name that you created previously.
96
96
* For **Target sub-resource**, select the endpoint type:
@@ -454,4 +454,4 @@ Preparing a CentOS 7 virtual machine for Azure is very similar to CentOS 6, howe
454
454
455
455
## Next steps
456
456
457
-
You're now ready to use your CentOS Linux virtual hard disk to create new virtual machines in Azure. If this is the first time that you're uploading the .vhd file to Azure, see [Create a Linux VM from a custom disk](upload-vhd.md#option-1-upload-a-vhd).
457
+
You're now ready to use your CentOS Linux virtual hard disk to create new virtual machines in Azure. If this is the first time that you're uploading the .vhd file to Azure, see [Create a Linux VM from a custom disk](upload-vhd.md#option-1-upload-a-vhd).
0 commit comments