Skip to content

Commit 747a571

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into clarLive
2 parents c5488fe + 6d13218 commit 747a571

File tree

55 files changed

+570
-326
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+570
-326
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -346,6 +346,11 @@
346346
"redirect_url": "/azure/azure-monitor/faq#vm-insights",
347347
"redirect_document_id": false
348348
},
349+
{
350+
"source_path_from_root": "/articles/azure-monitor/app/proactive-cloud-services.md" ,
351+
"redirect_url": "https://docs.microsoft.com/azure/azure-monitor/alerts/alerts-overview",
352+
"redirect_document_id": false
353+
},
349354
{
350355
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-log-search.md" ,
351356
"redirect_url": "/azure/azure-monitor/alerts/vminsights-log-query",

articles/active-directory/develop/access-tokens.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,9 @@ Don't use mutable, human-readable identifiers like `email` or `upn` for uniquely
269269

270270
#### Validate application sign-in
271271

272-
Use the `scp` claim to validate that the user has granted the calling application permission to call the API. Ensure the calling client is allowed to call the API using the `appid` claim.
272+
* Use the `scp` claim to validate that the user has granted the calling app permission to call your API.
273+
* Ensure the calling client is allowed to call your API using the `appid` claim (for v1.0 tokens) or the `azp` claim (for v2.0 tokens).
274+
* You only need to validate these claims (`appid`, `azp`) if you want to restrict your web API to be called only by pre-determined applications (e.g., line-of-business applications or web APIs called by well-known frontends). APIs intended to allow access from any calling application do not need to validate these claims.
273275

274276
## User and application tokens
275277

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,7 @@ There are two ways to configure role assignments for a VM:
191191
- Azure Cloud Shell experience
192192

193193
> [!NOTE]
194-
> The Virtual Machine Administrator Login and Virtual Machine User Login roles use `dataActions` and can be assigned at the management group, subscription, resource group, or resource scope. We recommend that you assign the roles at the management group, subscription, or resource level and not at the individual VM level. This practice avoids the risk of reaching the [Azure role assignments limit](../../role-based-access-control/troubleshooting.md#azure-role-assignments-limit) per subscription.
194+
> The Virtual Machine Administrator Login and Virtual Machine User Login roles use `dataActions` and can be assigned at the management group, subscription, resource group, or resource scope. We recommend that you assign the roles at the management group, subscription, or resource level and not at the individual VM level. This practice avoids the risk of reaching the [Azure role assignments limit](../../role-based-access-control/troubleshooting.md#limits) per subscription.
195195
196196
### Azure AD portal
197197

@@ -443,7 +443,7 @@ If you get a message that says the token couldn't be retrieved from the local ca
443443
444444
### Access denied: Azure role not assigned
445445
446-
If you see an "Azure role not assigned" error on your SSH prompt, verify that you've configured Azure RBAC policies for the VM that grants the user either the Virtual Machine Administrator Login role or the Virtual Machine User Login role. If you're having problems with Azure role assignments, see the article [Troubleshoot Azure RBAC](../../role-based-access-control/troubleshooting.md#azure-role-assignments-limit).
446+
If you see an "Azure role not assigned" error on your SSH prompt, verify that you've configured Azure RBAC policies for the VM that grants the user either the Virtual Machine Administrator Login role or the Virtual Machine User Login role. If you're having problems with Azure role assignments, see the article [Troubleshoot Azure RBAC](../../role-based-access-control/troubleshooting.md#limits).
447447
448448
### Problems deleting the old (AADLoginForLinux) extension
449449

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -364,7 +364,7 @@ You might get the following error message when you initiate a remote desktop con
364364
Verify that you've [configured Azure RBAC policies](../../virtual-machines/linux/login-using-aad.md) for the VM that grant the user the Virtual Machine Administrator Login or Virtual Machine User Login role.
365365

366366
> [!NOTE]
367-
> If you're having problems with Azure role assignments, see [Troubleshoot Azure RBAC](../../role-based-access-control/troubleshooting.md#azure-role-assignments-limit).
367+
> If you're having problems with Azure role assignments, see [Troubleshoot Azure RBAC](../../role-based-access-control/troubleshooting.md#limits).
368368
369369
### Unauthorized client or password change required
370370

articles/active-directory/managed-identities-azure-resources/managed-identity-best-practice-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ You'll need to manually delete a user-assigned identity when it's no longer requ
102102
Role assignments aren't automatically deleted when either system-assigned or user-assigned managed identities are deleted. These role assignments should be manually deleted so the limit of role assignments per subscription isn't exceeded.
103103

104104
Role assignments that are associated with deleted managed identities
105-
will be displayed with “Identity not found” when viewed in the portal. [Read more](../../role-based-access-control/troubleshooting.md#role-assignments-with-identity-not-found).
105+
will be displayed with “Identity not found” when viewed in the portal. [Read more](../../role-based-access-control/troubleshooting.md#symptom---role-assignments-with-identity-not-found).
106106

107107
:::image type="content" source="media/managed-identity-best-practice-recommendations/identity-not-found.png" alt-text="Identity not found for role assignment.":::
108108

articles/active-directory/privileged-identity-management/pim-resource-roles-activate-your-roles.md

Lines changed: 73 additions & 71 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# Activate my Azure resource roles in Privileged Identity Management
2121

22-
Use Privileged Identity Management (PIM) in Azure Active Diretory (Azure AD), part of Microsoft Entra, to allow eligible role members for Azure resources to schedule activation for a future date and time. They can also select a specific activation duration within the maximum (configured by administrators).
22+
Use Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, to allow eligible role members for Azure resources to schedule activation for a future date and time. They can also select a specific activation duration within the maximum (configured by administrators).
2323

2424
This article is for members who need to activate their Azure resource role in Privileged Identity Management.
2525

@@ -82,88 +82,90 @@ The following is a sample HTTP request to activate an eligible assignment for an
8282
### Request
8383

8484
````HTTP
85-
PUT https://management.azure.com/providers/Microsoft.Subscription/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/roleEligibilityScheduleRequests/64caffb6-55c0-4deb-a585-68e948ea1ad6?api-version=2020-10-01-preview
85+
PUT https://management.azure.com/providers/Microsoft.Subscription/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/roleAssignmentScheduleRequests/fea7a502-9a96-4806-a26f-eee560e52045?api-version=2020-10-01
8686
````
8787

8888
### Request body
8989

9090
````JSON
91-
{
92-
"properties": {
93-
"principalId": "a3bb8764-cb92-4276-9d2a-ca1e895e55ea",
94-
"roleDefinitionId": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/roleDefinitions/c8d4ff99-41c3-41a8-9f60-21dfdad59608",
95-
"requestType": "SelfActivate",
96-
"linkedRoleEligibilityScheduleId": "b1477448-2cc6-4ceb-93b4-54a202a89413",
97-
"scheduleInfo": {
98-
"startDateTime": "2020-09-09T21:35:27.91Z",
99-
"expiration": {
100-
"type": "AfterDuration",
101-
"endDateTime": null,
102-
"duration": "PT8H"
103-
}
104-
},
105-
"condition": "@Resource[Microsoft.Storage/storageAccounts/blobServices/containers:ContainerName] StringEqualsIgnoreCase 'foo_storage_container'",
106-
"conditionVersion": "1.0"
107-
}
108-
}
91+
{
92+
"properties": {
93+
"principalId": "a3bb8764-cb92-4276-9d2a-ca1e895e55ea",
94+
"roleDefinitionId": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/roleDefinitions/c8d4ff99-41c3-41a8-9f60-21dfdad59608",
95+
"requestType": "SelfActivate",
96+
"linkedRoleEligibilityScheduleId": "b1477448-2cc6-4ceb-93b4-54a202a89413",
97+
"scheduleInfo": {
98+
"startDateTime": "2020-09-09T21:35:27.91Z",
99+
"expiration": {
100+
"type": "AfterDuration",
101+
"endDateTime": null,
102+
"duration": "PT8H"
103+
}
104+
},
105+
"condition": "@Resource[Microsoft.Storage/storageAccounts/blobServices/containers:ContainerName] StringEqualsIgnoreCase 'foo_storage_container'",
106+
"conditionVersion": "1.0"
107+
}
108+
}
109+
109110
````
110111

111112
### Response
112113

113114
Status code: 201
114115

115116
````HTTP
116-
{
117-
"properties": {
118-
"targetRoleAssignmentScheduleId": "c9e264ff-3133-4776-a81a-ebc7c33c8ec6",
119-
"targetRoleAssignmentScheduleInstanceId": null,
120-
"scope": "/providers/Microsoft.Subscription/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f",
121-
"roleDefinitionId": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/roleDefinitions/c8d4ff99-41c3-41a8-9f60-21dfdad59608",
122-
"principalId": "a3bb8764-cb92-4276-9d2a-ca1e895e55ea",
123-
"principalType": "User",
124-
"requestType": "SelfActivate",
125-
"status": "Provisioned",
126-
"approvalId": null,
127-
"scheduleInfo": {
128-
"startDateTime": "2020-09-09T21:35:27.91Z",
129-
"expiration": {
130-
"type": "AfterDuration",
131-
"endDateTime": null,
132-
"duration": "PT8H"
133-
}
134-
},
135-
"ticketInfo": {
136-
"ticketNumber": null,
137-
"ticketSystem": null
138-
},
139-
"justification": null,
140-
"requestorId": "a3bb8764-cb92-4276-9d2a-ca1e895e55ea",
141-
"createdOn": "2020-09-09T21:35:27.91Z",
142-
"condition": "@Resource[Microsoft.Storage/storageAccounts/blobServices/containers:ContainerName] StringEqualsIgnoreCase 'foo_storage_container'",
143-
"conditionVersion": "1.0",
144-
"expandedProperties": {
145-
"scope": {
146-
"id": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f",
147-
"displayName": "Pay-As-You-Go",
148-
"type": "subscription"
149-
},
150-
"roleDefinition": {
151-
"id": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/roleDefinitions/c8d4ff99-41c3-41a8-9f60-21dfdad59608",
152-
"displayName": "Contributor",
153-
"type": "BuiltInRole"
154-
},
155-
"principal": {
156-
"id": "a3bb8764-cb92-4276-9d2a-ca1e895e55ea",
157-
"displayName": "User Account",
158-
"email": "[email protected]",
159-
"type": "User"
160-
}
161-
}
162-
},
163-
"name": "fea7a502-9a96-4806-a26f-eee560e52045",
164-
"id": "/providers/Microsoft.Subscription/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/RoleAssignmentScheduleRequests/fea7a502-9a96-4806-a26f-eee560e52045",
165-
"type": "Microsoft.Authorization/RoleAssignmentScheduleRequests"
166-
}
117+
{
118+
"properties": {
119+
"targetRoleAssignmentScheduleId": "c9e264ff-3133-4776-a81a-ebc7c33c8ec6",
120+
"targetRoleAssignmentScheduleInstanceId": null,
121+
"scope": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f",
122+
"roleDefinitionId": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/roleDefinitions/c8d4ff99-41c3-41a8-9f60-21dfdad59608",
123+
"principalId": "a3bb8764-cb92-4276-9d2a-ca1e895e55ea",
124+
"principalType": "User",
125+
"requestType": "SelfActivate",
126+
"status": "Provisioned",
127+
"approvalId": null,
128+
"scheduleInfo": {
129+
"startDateTime": "2020-09-09T21:35:27.91Z",
130+
"expiration": {
131+
"type": "AfterDuration",
132+
"endDateTime": null,
133+
"duration": "PT8H"
134+
}
135+
},
136+
"ticketInfo": {
137+
"ticketNumber": null,
138+
"ticketSystem": null
139+
},
140+
"justification": null,
141+
"requestorId": "a3bb8764-cb92-4276-9d2a-ca1e895e55ea",
142+
"createdOn": "2020-09-09T21:35:27.91Z",
143+
"condition": "@Resource[Microsoft.Storage/storageAccounts/blobServices/containers:ContainerName] StringEqualsIgnoreCase 'foo_storage_container'",
144+
"conditionVersion": "1.0",
145+
"expandedProperties": {
146+
"scope": {
147+
"id": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f",
148+
"displayName": "Pay-As-You-Go",
149+
"type": "subscription"
150+
},
151+
"roleDefinition": {
152+
"id": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/roleDefinitions/c8d4ff99-41c3-41a8-9f60-21dfdad59608",
153+
"displayName": "Contributor",
154+
"type": "BuiltInRole"
155+
},
156+
"principal": {
157+
"id": "a3bb8764-cb92-4276-9d2a-ca1e895e55ea",
158+
"displayName": "User Account",
159+
"email": "[email protected]",
160+
"type": "User"
161+
}
162+
}
163+
},
164+
"name": "fea7a502-9a96-4806-a26f-eee560e52045",
165+
"id": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/RoleAssignmentScheduleRequests/fea7a502-9a96-4806-a26f-eee560e52045",
166+
"type": "Microsoft.Authorization/RoleAssignmentScheduleRequests"
167+
}
168+
167169
````
168170

169171
## View the status of your requests

articles/azure-monitor/app/java-in-process-agent.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -412,15 +412,15 @@ The following table represents currently supported custom telemetry types that y
412412
- Custom requests, dependencies, and exceptions are supported through `opentelemetry-api`.
413413
- Any type of the custom telemetry is supported through the [Application Insights Java 2.x SDK](#send-custom-telemetry-by-using-the-2x-sdk).
414414

415-
| Custom telemetry type | Micrometer | Log4j, logback, JUL | 2.x SDK | opentelemetry-api |
416-
|---------------------|------------|---------------------|---------|-------------------|
417-
| Custom events | | | Yes | |
418-
| Custom metrics | Yes | | Yes | |
419-
| Dependencies | | | Yes | Yes |
420-
| Exceptions | | Yes | Yes | Yes |
421-
| Page views | | | Yes | |
422-
| Requests | | | Yes | Yes |
423-
| Traces | | Yes | Yes | Yes |
415+
| Custom telemetry type | Micrometer | Log4j, logback, JUL | 2.x SDK | opentelemetry-api |
416+
|-----------------------|------------|---------------------|---------|-------------------|
417+
| Custom events | | | Yes | |
418+
| Custom metrics | Yes | | Yes | Yes |
419+
| Dependencies | | | Yes | Yes |
420+
| Exceptions | | Yes | Yes | Yes |
421+
| Page views | | | Yes | |
422+
| Requests | | | Yes | Yes |
423+
| Traces | | Yes | Yes | Yes |
424424

425425
Currently, we're not planning to release an SDK with Application Insights 3.x.
426426

Binary file not shown.
Binary file not shown.
Binary file not shown.

0 commit comments

Comments
 (0)