Skip to content

Commit 7844a49

Browse files
authored
Merge pull request #173813 from MicrosoftDocs/master
9/28 AM Publish
2 parents be0a071 + 74b9433 commit 7844a49

File tree

53 files changed

+1027
-677
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

53 files changed

+1027
-677
lines changed

articles/active-directory/authentication/concept-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ Password writeback is a highly secure service. To ensure your information is pro
101101
After a user submits a password reset, the reset request goes through several encryption steps before it arrives in your on-premises environment. These encryption steps ensure maximum service reliability and security. They are described as follows:
102102

103103
1. **Password encryption with 2048-bit RSA Key**: After a user submits a password to be written back to on-premises, the submitted password itself is encrypted with a 2048-bit RSA key.
104-
1. **Package-level encryption with AES-GCM**: The entire package, the password plus the required metadata, is encrypted by using AES-GCM. This encryption prevents anyone with direct access to the underlying Service Bus channel from viewing or tampering with the contents.
104+
1. **Package-level encryption with 256-bit AES-GCM**: The entire package, the password plus the required metadata, is encrypted by using AES-GCM (with a key size of 256 bits). This encryption prevents anyone with direct access to the underlying Service Bus channel from viewing or tampering with the contents.
105105
1. **All communication occurs over TLS/SSL**: All the communication with Service Bus happens in an SSL/TLS channel. This encryption secures the contents from unauthorized third parties.
106106
1. **Automatic key rollover every six months**: All keys roll over every six months, or every time password writeback is disabled and then re-enabled on Azure AD Connect, to ensure maximum service security and safety.
107107

articles/active-directory/develop/msal-net-migration.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,9 +49,10 @@ For details about the decision tree below, read [MSAL.NET or Microsoft.Identity.
4949

5050
## Next steps
5151

52+
- Learn about [public client and confidential client applications](msal-client-applications.md).
5253
- Learn how to [migrate confidential client applications built on top of ASP.NET MVC or .NET classic from ADAL.NET to MSAL.NET](msal-net-migration-confidential-client.md).
5354
- Learn how to [migrate public client applications built on top of .NET or .NET classic from ADAL.NET to MSAL.NET](msal-net-migration-public-client.md).
5455
- Learn more about the [Differences between ADAL.NET and MSAL.NET apps](msal-net-differences-adal-net.md).
5556
- Learn how to migrate confidential client applications built on top of ASP.NET Core from ADAL.NET to Microsoft.Identity.Web:
5657
- [Web apps](https://github.com/AzureAD/microsoft-identity-web/wiki/web-apps#migrating-from-previous-versions--adding-authentication)
57-
- [Web APIs](https://github.com/AzureAD/microsoft-identity-web/wiki/web-apis)
58+
- [Web APIs](https://github.com/AzureAD/microsoft-identity-web/wiki/web-apis)

articles/aks/private-clusters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ Perform a Helm install and pass the specific values manifest
151151
az aks command invoke -g <resourceGroup> -n <clusterName> -c "helm repo add bitnami https://charts.bitnami.com/bitnami && helm repo update && helm install my-release -f values.yaml bitnami/nginx" -f values.yaml
152152
```
153153
> [!NOTE]
154-
> Secure access to the AKS Run Command by assigning the "AKS Run Command role" to specific users and/or groups in combination with Just-in-Time access or Conditional Access policies.
154+
> Secure access to the AKS Run Command by creating a Custom role with the "Microsoft.ContainerService/managedClusters/runcommand/action" permissions and assign to specific users and/or groups in combination with Just-in-Time access or Conditional Access policies.
155155
156156
## Virtual network peering
157157

articles/api-management/api-management-howto-aad-b2c.md

Lines changed: 20 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: api-management
99
ms.topic: how-to
10-
ms.date: 07/07/2021
10+
ms.date: 09/28/2021
1111
ms.author: danlep
1212
---
1313

@@ -16,20 +16,20 @@ ms.author: danlep
1616

1717
Azure Active Directory B2C is a cloud identity management solution for consumer-facing web and mobile applications. You can use it to manage access to your API Management developer portal.
1818

19-
This guide shows you the configuration that's required in your API Management service to integrate with Azure Active Directory B2C. If you are using the deprecated legacy developer portal, some steps differ, as noted in this article.
19+
In this tutorial, you'll learn the configuration required in your API Management service to integrate with Azure Active Directory B2C. As noted later in this article, if you are using the deprecated legacy developer portal, some steps will differ.
2020

2121
For information about enabling access to the developer portal by using classic Azure Active Directory, see [How to authorize developer accounts using Azure Active Directory](api-management-howto-aad.md).
2222

2323
## Prerequisites
2424

25-
* An Azure Active Directory B2C tenant to create an application in. For more information, see [Azure Active Directory B2C overview](../active-directory-b2c/overview.md).
26-
* If you don't already have an API Management service, complete the following quickstart: [Create an Azure API Management instance](get-started-create-service-instance.md)
25+
* An Azure Active Directory B2C tenant in which to create an application. For more information, see [Azure Active Directory B2C overview](../active-directory-b2c/overview.md).
26+
* An API Management instance. If you don't already have one, [create an Azure API Management instance](get-started-create-service-instance.md).
2727

2828
[!INCLUDE [premium-dev-standard.md](../../includes/api-management-availability-premium-dev-standard.md)]
2929

3030
## Configure sign up and sign in user flow
3131

32-
In this section, create a user flow in your Azure Active Directory B2C tenant containing both sign up and sign in policies. For detailed steps, see [Create user flows and custom policies in Azure Active Directory B2C](../active-directory-b2c/tutorial-create-user-flows.md?pivots=b2c-us).
32+
In this section, you'll create a user flow in your Azure Active Directory B2C tenant containing both sign up and sign in policies. For detailed steps, see [Create user flows and custom policies in Azure Active Directory B2C](../active-directory-b2c/tutorial-create-user-flows.md?pivots=b2c-us).
3333

3434
1. In the [Azure portal](https://portal.azure.com), access your Azure Active Directory B2C tenant.
3535
1. Under **Policies**, select **User flows** > **+ New user flow**.
@@ -72,11 +72,11 @@ In this section, create a user flow in your Azure Active Directory B2C tenant co
7272
* Record the key in a safe location. This secret value is never displayed again after you leave this page.
7373
1. Switch back to the API Management **Add identity provider** page, and paste the key into the **Client secret** text box.
7474
1. Switch back to the B2C app registration. In the left menu, under **Manage**, select **Authentication**.
75-
* Under **Implicit grant**, select the **Access tokens** check box.
75+
* Under **Implicit grant and hybrid flows**, select both the **Access tokens** and **ID tokens** check boxes.
7676
* Select **Save**.
7777
1. Switch back in the API Management **Add identity provider** page.
7878
* In **Signin tenant**, specify the domain name of the Azure Active Directory B2C tenant.
79-
* The **Authority** field lets you control the Azure AD B2C login URL to use. Set the value to **<your_b2c_tenant_name>.b2clogin.com**.
79+
* The **Authority** field lets you control the Azure Active Directory B2C login URL to use. Set the value to **<your_b2c_tenant_name>.b2clogin.com**.
8080
* Specify the **Signup Policy** and **Signin Policy** from the B2C tenant policies.
8181
* Optionally provide the **Profile Editing Policy** and **Password Reset Policy**.
8282

@@ -85,12 +85,12 @@ In this section, create a user flow in your Azure Active Directory B2C tenant co
8585

8686
After the changes are saved, developers will be able to create new accounts and sign in to the developer portal by using Azure Active Directory B2C.
8787

88-
## Developer portal - add Azure AD B2C account authentication
88+
## Developer portal - add Azure Active Directory B2C account authentication
8989

9090
> [!IMPORTANT]
9191
> You need to [republish the developer portal](api-management-howto-developer-portal-customize.md#publish) when you create or update Azure Active Directory B2C configuration settings for the changes to take effect.
9292
93-
In the developer portal, sign-in with Azure AD B2C is possible with the **Sign-in button: OAuth** widget. The widget is already included on the sign-in page of the default developer portal content.
93+
In the developer portal, sign-in with Azure Active Directory B2C is possible with the **Sign-in button: OAuth** widget. The widget is already included on the sign-in page of the default developer portal content.
9494

9595
1. To sign in by using Azure Active Directory B2C, open a new browser window and go to the developer portal. Select **Sign in**.
9696

@@ -103,30 +103,36 @@ When the signup is complete, you're redirected back to the developer portal. You
103103

104104
:::image type="content" source="media/api-management-howto-aad-b2c/developer-portal-home.png" alt-text="Sign in to developer portal complete":::
105105

106-
Although a new account is automatically created whenever a new user signs in with Azure AD B2C, you may consider adding the same widget to the sign-up page.
106+
Although a new account is automatically created whenever a new user signs in with Azure Active Directory B2C, you may consider adding the same widget to the signup page.
107107

108108
The **Sign-up form: OAuth** widget represents a form used for signing up with OAuth.
109109

110-
## Legacy developer portal - how to sign up with Azure AD B2C
110+
## Legacy developer portal - how to sign up with Azure Active Directory B2C
111111

112112
[!INCLUDE [api-management-portal-legacy.md](../../includes/api-management-portal-legacy.md)]
113113

114-
1. To sign up for a developer account by using Azure AD B2C, open a new browser window and go to the legacy developer portal. Click the **Sign up** button.
114+
> [!NOTE]
115+
> To properly integrate B2C with the legacy developer portal, use **standard v1** user flows, in combination with enabling [password reset](/active-directory-b2c/user-flow-self-service-password-reset.md) before signing up/signing into a developer account using Azure Active Directory B2C.
116+
117+
1. Open a new browser window and go to the legacy developer portal. Click the **Sign up** button.
115118

116119
:::image type="content" source="media/api-management-howto-aad-b2c/b2c-dev-portal.png" alt-text="Sign up in legacy developer portal":::
120+
117121
1. Choose to sign up with **Azure Active Directory B2C**.
118122

119123
:::image type="content" source="media/api-management-howto-aad-b2c/b2c-dev-portal-b2c-button.png" alt-text="Sign up with Azure Active Directory B2C":::
120124

121-
3. You're redirected to the signup policy that you configured in the previous section. Choose to sign up by using your email address or one of your existing social accounts.
125+
1. You're redirected to the signup policy you configured in the previous section. Choose to sign up by using your email address or one of your existing social accounts.
122126

123127
> [!NOTE]
124-
> If Azure Active Directory B2C is the only option that's enabled on the **Identities** tab in the publisher portal, you'll be redirected to the signup policy directly.
128+
> If Azure Active Directory B2C is the only option enabled on the **Identities** tab in the publisher portal, you'll be redirected to the signup policy directly.
125129
126130
:::image type="content" source="media/api-management-howto-aad-b2c/b2c-dev-portal-b2c-options.png" alt-text="Sign up options in legacy developer portal":::
127131

128132
When the signup is complete, you're redirected back to the developer portal. You're now signed in to the developer portal for your API Management service instance.
129133

134+
135+
130136
## Next steps
131137

132138
* [Azure Active Directory B2C overview]

articles/azure-monitor/app/snapshot-collector-release-notes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ For bug reports and feedback, open an issue on GitHub at https://github.com/micr
1717

1818
## Release notes
1919

20-
## [1.4.2](https://www.nuget.org/packages/Microsoft.ApplicationInsights.SnapshotCollector/1.4.1)
20+
## [1.4.2](https://www.nuget.org/packages/Microsoft.ApplicationInsights.SnapshotCollector/1.4.2)
2121
A point release to address a user-reported bug.
2222
### Bug fixes
2323
- Fix [ArgumentException: Delegates must be of the same type.](https://github.com/microsoft/ApplicationInsights-SnapshotCollector/issues/16)

articles/azure-netapp-files/enable-continuous-availability-existing-SMB.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: how-to
16-
ms.date: 08/18/2021
16+
ms.date: 09/28/2021
1717
ms.author: b-juche
1818
---
1919
# Enable Continuous Availability on existing SMB volumes
@@ -33,7 +33,7 @@ You can enable the SMB Continuous Availability (CA) feature when you [create a n
3333
3. On the Edit window that appears, select the **Enable Continuous Availability** checkbox.
3434
![Snapshot that shows the Enable Continuous Availability option.](../media/azure-netapp-files/enable-continuous-availability.png)
3535

36-
4. Reboot the server.
36+
4. Reboot the Windows systems connecting to the existing SMB share.
3737

3838
> [!NOTE]
3939
> Selecting the **Enable Continuous Availability** option alone does not automatically make the existing SMB sessions continuously available. After selecting the option, be sure to reboot the server for the change to take effect.
@@ -50,4 +50,4 @@ You can enable the SMB Continuous Availability (CA) feature when you [create a n
5050
5151
## Next steps
5252
53-
* [Create an SMB volume for Azure NetApp Files](azure-netapp-files-create-volumes-smb.md)
53+
* [Create an SMB volume for Azure NetApp Files](azure-netapp-files-create-volumes-smb.md)

articles/azure-resource-manager/management/delete-resource-group.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Delete resource group and resources
33
description: Describes how to delete resource groups and resources. It describes how Azure Resource Manager orders the deletion of resources when a deleting a resource group. It describes the response codes and how Resource Manager handles them to determine if the deletion succeeded.
44
ms.topic: conceptual
5-
ms.date: 03/18/2021
5+
ms.date: 09/28/2021
66
ms.custom: seodec18, devx-track-azurepowershell
77
---
88

@@ -114,13 +114,13 @@ az resource delete \
114114

115115
---
116116

117-
## Required access
117+
## Required access and deletion failures
118118

119119
To delete a resource group, you need access to the delete action for the **Microsoft.Resources/subscriptions/resourceGroups** resource. You also need delete for all resources in the resource group.
120120

121121
For a list of operations, see [Azure resource provider operations](../../role-based-access-control/resource-provider-operations.md). For a list of built-in roles, see [Azure built-in roles](../../role-based-access-control/built-in-roles.md).
122122

123-
If you have the required access, but the delete request fails, it may be because there's a [lock](lock-resources.md) on the resource group.
123+
If you have the required access, but the delete request fails, it may be because there's a [lock on the resources or resource group](lock-resources.md). Even if you didn't manually lock a resource group, it may have been [automatically locked by a related service](lock-resources.md#managed-applications-and-locks). Or, the deletion can fail if the resources are connected to resources in other resource groups that aren't being deleted. For example, you can't delete a virtual network with subnets that are still in use by a virtual machine.
124124

125125
## Next steps
126126

articles/azure-sql/managed-instance/resource-limits.md

Lines changed: 17 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ ms.devlang:
1010
ms.topic: reference
1111
author: vladai78
1212
ms.author: vladiv
13-
ms.reviewer: mathoma, jovanpop, sachinp
14-
ms.date: 09/14/2020
13+
ms.reviewer: mathoma, vladiv, sachinp
14+
ms.date: 09/28/2021
1515
---
1616
# Overview of Azure SQL Managed Instance resource limits
1717
[!INCLUDE[appliesto-sqlmi](../includes/appliesto-sqlmi.md)]
@@ -136,13 +136,21 @@ The following table shows the **default regional limits** for supported subscrip
136136

137137
|Subscription type| Max number of SQL Managed Instance subnets | Max number of vCore units* |
138138
| :---| :--- | :--- |
139-
|Pay-as-you-go|3|320|
140-
|CSP |8 (15 in some regions**)|960 (1440 in some regions**)|
141-
|Pay-as-you-go Dev/Test|3|320|
142-
|Enterprise Dev/Test|3|320|
143-
|EA|8 (15 in some regions**)|960 (1440 in some regions**)|
144-
|Visual Studio Enterprise|2 |64|
145-
|Visual Studio Professional and MSDN Platforms|2|32|
139+
|CSP |16 (30 in some regions**)|960 (1440 in some regions**)|
140+
|EA|16 (30 in some regions**)|960 (1440 in some regions**)|
141+
|Enterprise Dev/Test|6|320|
142+
|Pay-as-you-go|6|320|
143+
|Pay-as-you-go Dev/Test|6|320|
144+
|Azure Pass|3|64|
145+
|BizSpark|3|64|
146+
|BizSpark Plus|3|64|
147+
|Microsoft Azure Sponsorship|3|64|
148+
|Microsoft Partner Network|3|64|
149+
|Visual Studio Enterprise (MPN)|3|64|
150+
|Visual Studio Enterprise|3|32|
151+
|Visual Studio Enterprise (BizSpark)|3|32|
152+
|Visual Studio Professional|3|32|
153+
|MSDN Platforms|3|32|
146154

147155
\* In planning deployments, please take into consideration that Business Critical (BC) service tier requires four (4) times more vCore capacity than General Purpose (GP) service tier. For example: 1 GP vCore = 1 vCore unit and 1 BC vCore = 4 vCore. To simplify your consumption analysis against the default limits, summarize the vCore units across all subnets in the region where SQL Managed Instance is deployed and compare the results with the instance unit limits for your subscription type. **Max number of vCore units** limit applies to each subscription in a region. There is no limit per individual subnets except that the sum of all vCores deployed across multiple subnets must be lower or equal to **max number of vCore units**.
148156

articles/cognitive-services/Anomaly-Detector/whats-new.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ We've also added links to some user-generated content. Those items will be marke
1717

1818
### September 2021
1919
* Anomaly Detector (univariate) available in Jio India West.
20+
* Multivariate anomaly detection APIs deployed in five more regions: East Asia, West US, Central India, Korea Central, Germany West Central.
2021

2122
### August 2021
2223

articles/event-hubs/.openpublishing.redirection.event-hubs.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,14 +70,24 @@
7070
"redirect_url": "/azure/event-hubs/monitor-event-hubs-reference#resource-logs",
7171
"redirect_document_id": false
7272
},
73+
{
74+
"source_path": "event-hubs-dotnet-framework-getstarted-send.md",
75+
"redirect_url": "/azure/event-hubs/event-hubs-dotnet-standard-getstarted-send",
76+
"redirect_document_id": false
77+
},
78+
{
79+
"source_path": "event-hubs-dotnet-standard-get-started-send-legacy.md",
80+
"redirect_url": "/azure/event-hubs/event-hubs-dotnet-standard-getstarted-send",
81+
"redirect_document_id": false
82+
},
7383
{
7484
"source_path": "event-hubs-dotnet-framework-api-overview.md",
75-
"redirect_url": "/azure/event-hubs/event-hubs-dotnet-framework-getstarted-send",
85+
"redirect_url": "/azure/event-hubs/event-hubs-dotnet-standard-getstarted-send",
7686
"redirect_document_id": false
7787
},
7888
{
7989
"source_path": "event-hubs-dotnet-framework-getstarted-receive-eph.md",
80-
"redirect_url": "/azure/event-hubs/event-hubs-dotnet-framework-getstarted-send",
90+
"redirect_url": "/azure/event-hubs/event-hubs-dotnet-standard-getstarted-send",
8191
"redirect_document_id": false
8292
},
8393
{

0 commit comments

Comments
 (0)