Skip to content

Commit 7900df7

Browse files
authored
Merge pull request #190310 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 957bcc1 + 267bd14 commit 7900df7

File tree

14 files changed

+164
-180
lines changed

14 files changed

+164
-180
lines changed

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Before combined registration, users registered authentication methods for Azure
2121

2222
> [!NOTE]
2323
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration.
24-
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the sepperate legacy registration workflows for MFA and SSPR.
24+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the separate legacy registration workflows for MFA and SSPR.
2525
2626
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
2727

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Before combined registration, users registered authentication methods for Azure
2121

2222
> [!NOTE]
2323
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
24-
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the sepperate legacy registration workflows for MFA and SSPR.
24+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the separate legacy registration workflows for MFA and SSPR.
2525
2626
To make sure you understand the functionality and effects before you enable the new experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
2727

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-all-reports.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,12 @@ This article provides you with a list and description of the system reports avai
2828

2929
## Download a system report
3030

31-
1. In the CloudKnox home page, select the **Reports** tab, and then select the **Systems reports** subtab.
31+
1. In the CloudKnox home page, select the **Reports** tab, and then select the **Systems Reports** subtab.
3232
1. In the **Report Name** column, find the report you want, and then select the down arrow to the right of the report name to download the report.
3333

3434
Or, from the ellipses **(...)** menu, select **Download**.
3535

36-
The following message displays: **Successfully started to generate on demand report.**
36+
The following message displays: **Successfully Started To Generate On Demand Report.**
3737

3838

3939
## Summary of available system reports

articles/active-directory/external-identities/reset-redemption-status.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -60,15 +60,18 @@ If a user wants to sign in using a different email:
6060
>
6161
### Use PowerShell to reset redemption status
6262

63-
Install the latest AzureADPreview PowerShell module and create a new invitation with `InvitedUserEmailAddress` set to the new email address, and `ResetRedemption` set to `true`.
64-
65-
```powershell
66-
Uninstall-Module AzureADPreview
67-
Install-Module AzureADPreview
68-
Connect-AzureAD
69-
$ADGraphUser = Get-AzureADUser -objectID "UPN of User to Reset"
70-
$msGraphUser = New-Object Microsoft.Open.MSGraph.Model.User -ArgumentList $ADGraphUser.ObjectId
71-
New-AzureADMSInvitation -InvitedUserEmailAddress <<external email>> -SendInvitationMessage $True -InviteRedirectUrl "http://myapps.microsoft.com" -InvitedUser $msGraphUser -ResetRedemption $True
63+
```powershell
64+
Install-Module Microsoft.Graph
65+
Select-MgProfile -Name beta
66+
Connect-MgGraph
67+
68+
$user = Get-MgUser -Filter "startsWith(mail, '[email protected]')"
69+
New-MgInvitation `
70+
-InvitedUserEmailAddress $user.Mail `
71+
-InviteRedirectUrl "http://myapps.microsoft.com" `
72+
-ResetRedemption `
73+
-SendInvitationMessage `
74+
-InvitedUser $user
7275
```
7376

7477
### Use Microsoft Graph API to reset redemption status

articles/active-directory/saas-apps/confluencemicrosoft-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ As of now, following versions of Confluence are supported:
5757

5858
- Confluence: 5.0 to 5.10
5959
- Confluence: 6.0.1 to 6.15.9
60-
- Confluence: 7.0.1 to 7.15.0
60+
- Confluence: 7.0.1 to 7.16.2
6161

6262
> [!NOTE]
6363
> Please note that our Confluence Plugin also works on Ubuntu Version 16.04

articles/active-directory/saas-apps/jiramicrosoft-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Use your Microsoft Azure Active Directory account with Atlassian JIRA server to
3030
To configure Azure AD integration with JIRA SAML SSO by Microsoft, you need the following items:
3131

3232
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
33-
- JIRA Core and Software 6.4 to 8.21 or JIRA Service Desk 3.0 to 4.21.0 should installed and configured on Windows 64-bit version
33+
- JIRA Core and Software 6.4 to 8.22.0 or JIRA Service Desk 3.0 to 4.22.0 should installed and configured on Windows 64-bit version
3434
- JIRA server is HTTPS enabled
3535
- Note the supported versions for JIRA Plugin are mentioned in below section.
3636
- JIRA server is reachable on the Internet particularly to the Azure AD login page for authentication and should able to receive the token from Azure AD
@@ -51,8 +51,8 @@ To get started, you need the following items:
5151
5252
## Supported versions of JIRA
5353

54-
* JIRA Core and Software: 6.4 to 8.21
55-
* JIRA Service Desk 3.0 to 4.21.0
54+
* JIRA Core and Software: 6.4 to 8.22.0
55+
* JIRA Service Desk 3.0 to 4.22.0
5656
* JIRA also supports 5.2. For more details, click [Microsoft Azure Active Directory single sign-on for JIRA 5.2](jira52microsoft-tutorial.md)
5757

5858
> [!NOTE]

articles/azure-monitor/app/azure-ad-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ import { DefaultAzureCredential } from "@azure/identity";
107107

108108
const credential = new DefaultAzureCredential();
109109
appInsights.setup("InstrumentationKey=00000000-0000-0000-0000-000000000000;IngestionEndpoint=https://xxxx.applicationinsights.azure.com/").start();
110-
appInsights.defaultClient.aadTokenCredential = credential;
110+
appInsights.defaultClient.config.aadTokenCredential = credential;
111111

112112
```
113113

@@ -123,7 +123,7 @@ const credential = new ClientSecretCredential(
123123
"<YOUR_CLIENT_SECRET>"
124124
);
125125
appInsights.setup("InstrumentationKey=00000000-0000-0000-0000-000000000000;IngestionEndpoint=https://xxxx.applicationinsights.azure.com/").start();
126-
appInsights.defaultClient.aadTokenCredential = credential;
126+
appInsights.defaultClient.config.aadTokenCredential = credential;
127127

128128
```
129129

articles/communication-services/quickstarts/ui-library/includes/get-started-call/ios.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ end
4848

4949
3. Run `pod install --repo-update`.
5050
4. Open the generated `.xcworkspace` with Xcode.
51+
5. (Optional) For Mackbook Pro M1, install and enable [Rosetta](https://support.apple.com/en-us/HT211861) in Xcode.
5152

5253
### Request access to the microphone, camera, etc.
5354

@@ -73,7 +74,7 @@ Set `Enable Bitcode` option to `No` in the project `Build Settings`. To find the
7374

7475
## Initialize composite
7576

76-
Go to 'ViewController'. Here we'll drop the following code to initialize our Composite Components for Call. Replace `<GROUP_CALL_ID>` with either your call group ID or `UUID()` to generate one. Also replace `<DISPLAY_NAME>` with your name, and `<USER_ACCESS_TOKEN>` with your token.
77+
Go to 'ViewController'. Here we'll drop the following code to initialize our Composite Components for Call. Replace `<GROUP_CALL_ID>` with either your call group ID or `UUID()` to generate one. Also replace `<DISPLAY_NAME>` with your name, and `<USER_ACCESS_TOKEN>` with your token. The limit for string length of `<DISPLAY_NAME>` is 256.
7778

7879
```swift
7980
import UIKit

articles/purview/catalog-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Azure Purview uses a set of predefined roles to control who can access what with
2626
- **Collection administrator** - a role for users that will need to assign roles to other users in Azure Purview or manage collections. Collection admins can add users to roles on collections where they're admins. They can also edit collections, their details, and add subcollections.
2727
- **Data curators** - a role that provides access to the data catalog to manage assets, configure custom classifications, set up glossary terms, and view insights. Data curators can create, read, modify, move, and delete assets. They can also apply annotations to assets.
2828
- **Data readers** - a role that provides read-only access to data assets, classifications, classification rules, collections and glossary terms.
29-
- **Data source administrators** - a role that allows a user to manage data sources and scans. If a user is granted only to **Data source admin** role on a given data source, they can run new scans using an existing scan rule. To create new scan rules, the user must be also granted as either **Data reader** or **Data curator** roles.
29+
- **Data source administrator** - a role that allows a user to manage data sources and scans. If a user is granted only to **Data source admin** role on a given data source, they can run new scans using an existing scan rule. To create new scan rules, the user must be also granted as either **Data reader** or **Data curator** roles.
3030
- **Policy author (Preview)** - a role that allows a user to view, update, and delete Azure Purview policies through the policy management app within Azure Purview.
3131

3232
> [!NOTE]

articles/purview/concept-best-practices-glossary.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Purview glossary best practices
33
description: This article provides examples of Azure Purview glossary best practices.
4-
author: zeinam
4+
author: zeinab-mk
55
ms.author: zeinam
66
ms.service: purview
77
ms.subservice: purview-data-catalog
@@ -30,7 +30,7 @@ The adoption by your organization of the business glossary will depend on you pr
3030

3131
## Why is a common business glossary needed?
3232
Without a common business glossary an organization's performance, culture, operations, and strategy often will adversely hinder the business. You will observe, in this hindrance, a condition in which cultural differences arise grounded in an inconsistent business language. These inconsistencies about the business language are communicated between team members and prevents them from leveraging their relevant data assets as a competitive advantage.
33-
You will also observe when there are language barriers, in which, most organizations will spend more time pursuing non-productive and non-collaborative activates as they need to rely on more detailed interactions to reach the same meaning and understanding for their data assets.
33+
You will also observe when there are language barriers, in which, most organizations will spend more time pursuing non-productive and non-collaborative activities as they need to rely on more detailed interactions to reach the same meaning and understanding for their data assets.
3434

3535
## Recommendations for implementing new glossary terms
3636

@@ -71,7 +71,7 @@ When building new term templates in Azure Purview, review the following consider
7171
- When importing terms from a .CSV file, be sure that terms already existing in Azure Purview are intended to be updated. When using the import feature, Azure Purview will overwrite existing terms.
7272
- Before importing terms, test the import in a lab environment to ensure that no unexpected results occur, such as duplicate terms.
7373
- The email address for Stewards and Experts should be the primary address of the user from the Azure Active Directory group. Alternate email, user principal name and non-Azure Active Directory emails are not yet supported.
74-
- Glossary terms provide fours status: draft, approved, expire, alert. Draft is not officially implemented, approved is official/stand/approved for production, expired means should no longer be used, alert need to pay more attention.
74+
- Glossary terms provide fours status: Draft, Approved, Expired, Alert. Draft is not officially implemented, Approved is official/stand/approved for production, Expired means should no longer be used, Alert need to pay more attention.
7575
For more information, see [Create, import, and export glossary terms](./how-to-create-import-export-glossary.md)
7676

7777
## Recommendations for exporting glossary terms
@@ -88,8 +88,8 @@ Exporting terms may be useful in Azure Purview account to account, Backup, or Di
8888
- Manually, using Azure Purview Studio.
8989
- Using Bulk Edit mode to update up to 25 assets, using Azure Purview Studio.
9090
- Curated Code using the Atlas API.
91-
- Use Bulk Edit Mode when assigning terms manually. This feature allows a curator to assign glossary terms, stewards, experts, and classifications in bulk based on selected items from a search result. Multiple searches can be chained by selecting objects in the results. The Bulk Edit will apply to all selected objects. Be sure to clear the selections after the bulk edit has been performed.
92-
- Other bulk edit operations can be performed by using the Atlas API. An example would be using the API to add descriptions or other custom properties to assets in bulk programmatically
91+
- Use Bulk Edit Mode when assigning terms manually. This feature allows a curator to assign glossary terms, owners, experts, classifications and certified in bulk based on selected items from a search result. Multiple searches can be chained by selecting objects in the results. The Bulk Edit will apply to all selected objects. Be sure to clear the selections after the bulk edit has been performed.
92+
- Other bulk edit operations can be performed by using the Atlas API. An example would be using the API to add descriptions or other custom properties to assets in bulk programmatically.
9393

9494
## Next steps
9595
- [Create, import, and export glossary terms](./how-to-create-import-export-glossary.md)

0 commit comments

Comments
 (0)