Skip to content

Commit 7a1543e

Browse files
authored
Merge pull request #294967 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents e6de11e + 5b7a79a commit 7a1543e

File tree

3 files changed

+5
-3
lines changed

3 files changed

+5
-3
lines changed

articles/azure-functions/durable/durable-functions-dotnet-isolated-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ This guide assumes you're starting with a .NET Durable Functions 2.x project.
9494

9595
### Update your project
9696

97-
The first step is to update your project to [Azure Functions .NET isolated](../migrate-version-3-version-4.md). Then, update your Durable Functions NuGet package references.
97+
The first step is to update your project to [Azure Functions .NET isolated](../migrate-dotnet-to-isolated-model.md). Then, update your Durable Functions NuGet package references.
9898

9999
Old:
100100

articles/security/develop/threat-modeling-tool-authentication.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -450,7 +450,9 @@ MSAL also maintains a token cache and refreshes tokens for you when they're clos
450450
| **Applicable Technologies** | Generic, C#, Node.js, |
451451
| **Attributes** | N/A, Gateway choice - Azure IoT Hub |
452452
| **References** | N/A, [Azure IoT hub with .NET](../../iot/tutorial-send-telemetry-iot-hub.md?pivots=programming-language-csharp), [Getting Started with IoT hub and Node JS](../../iot/tutorial-send-telemetry-iot-hub.md?pivots=programming-language-nodejs), [Securing IoT with SAS and certificates](../../iot-hub/iot-hub-dev-guide-sas.md), [Git repository](https://github.com/Azure/azure-iot-sdks/) |
453-
| **Steps** | <ul><li>**Generic:** Authenticate the device using Transport Layer Security (TLS) or IPSec. Infrastructure should support using pre-shared key (PSK) on those devices that cannot handle full asymmetric cryptography. Leverage Microsoft Entra ID, OAuth.</li><li>**C#:** When creating a DeviceClient instance, by default, the Create method creates a DeviceClient instance that uses the AMQP protocol to communicate with IoT Hub. To use the HTTPS protocol, use the override of the Create method that enables you to specify the protocol. If you use the HTTPS protocol, you should also add the `Microsoft.AspNet.WebApi.Client` NuGet package to your project to include the `System.Net.Http.Formatting` namespace.</li></ul>|
453+
454+
| **Steps** | <ul><li>**Generic:** Authenticate the device using Transport Layer Security (TLS) or IPsec. Infrastructure should support using pre-shared key (PSK) on those devices that cannot handle full asymmetric cryptography. Leverage Microsoft Entra ID, OAuth.</li><li>**C#:** When creating a DeviceClient instance, by default, the Create method creates a DeviceClient instance that uses the AMQP protocol to communicate with IoT Hub. To use the HTTPS protocol, use the override of the Create method that enables you to specify the protocol. If you use the HTTPS protocol, you should also add the `Microsoft.AspNet.WebApi.Client` NuGet package to your project to include the `System.Net.Http.Formatting` namespace.</li></ul>|
455+
454456

455457
### Example
456458
```csharp

articles/security/develop/threat-modeling-tool-feature-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Based on the template you select, you can find all the stencils available to use
7878
| **Process** | Applications, browser plug-ins, threads, virtual machines |
7979
| **External interactor** | Authentication providers, browsers, users, web applications |
8080
| **Data store** | Cache, storage, configuration files, databases, registry |
81-
| **Data flow** | Binary, ALPC, HTTP, HTTPS/TLS/SSL, IOCTL, IPSec, named pipe, RPC/DCOM, SMB, UDP |
81+
| **Data flow** | Binary, ALPC, HTTP, HTTPS/TLS/SSL, IOCTL, IPsec, named pipe, RPC/DCOM, SMB, UDP |
8282
| **Trust line/Border boundary** | Corporate networks, internet, machine, sandbox, user/kernel mode |
8383

8484
### Notes/messages

0 commit comments

Comments
 (0)