Skip to content

Commit 7aa7cb4

Browse files
authored
Merge pull request #234951 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 02e8a30 + 0abc7f1 commit 7aa7cb4

29 files changed

+133
-169
lines changed

articles/active-directory/hybrid/how-to-connect-fed-group-claims.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,8 @@ Some applications require the group membership information to appear in the role
162162
Group filtering allows for fine control of the list of groups that's included as part of the group claim. When a filter is configured, only groups that match the filter will be included in the group's claim that's sent to that application. The filter will be applied against all groups regardless of the group hierarchy.
163163

164164
> [!NOTE]
165-
> Group filtering applies to tokens emitted for apps where group claims and filtering was configured in the **Enterprise apps** blade in the portal.
165+
> Group filtering applies to tokens emitted for apps where group claims and filtering was configured in the **Enterprise apps** blade in the portal.
166+
> Group filtering does not apply to Azure AD Roles.
166167
167168
You can configure filters to be applied to the group's display name or `SAMAccountName` attribute. The following filtering operations are supported:
168169

@@ -208,7 +209,7 @@ You can also configure group claims in the [optional claims](../../active-direct
208209
| Selection | Description |
209210
|----------|-------------|
210211
| `All` | Emits security groups, distribution lists, and roles. |
211-
| `SecurityGroup` | Emits security groups that the user is a member of in the group claim. |
212+
| `SecurityGroup` | Emits security groups and Azure AD roles that the user is a member of in the group claim. |
212213
| `DirectoryRole` | If the user is assigned directory roles, they're emitted as a `wids` claim. (A group claim won't be emitted.) |
213214
| `ApplicationGroup` | Emits only the groups that are explicitly assigned to the application and that the user is a member of. |
214215
| `None` | No groups are returned. (It's not case-sensitive, so `none` also works. It can be set directly in the application manifest.) |

articles/active-directory/hybrid/how-to-connect-health-data-retrieval.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,9 @@ To retrieve the email addresses for all of your users that are configured in Azu
3838
4. On the **Notification Setting** blade, you will find the list of email addresses that have been enabled as recipients for health Alert notifications.
3939
![Emails](./media/how-to-connect-health-data-retrieval/retrieve5a.png)
4040

41-
## Retrieve accounts that were flagged with AD FS Bad Password attempts
41+
## Retrieve all sync errors
4242

43-
To retrieve accounts that were flagged with AD FS Bad Password attempts, use the following steps.
43+
To retrieve a list of all sync errors, use the following steps.
4444

4545
1. Starting on the Azure Active Directory Health blade, select **Sync Errors**.
4646
![Sync errors](./media/how-to-connect-health-data-retrieval/retrieve6.png)

articles/active-directory/manage-apps/assign-user-or-group-access-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This article shows you how to assign users and groups to an enterprise applicati
2323

2424
When you assign a group to an application, only users in the group will have access. The assignment doesn't cascade to nested groups.
2525

26-
Group-based assignment requires Azure Active Directory Premium P1 or P2 edition. Group-based assignment is supported for Security groups only. Nested group memberships and Microsoft 365 groups aren't currently supported. For more licensing requirements for the features discussed in this article, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory).
26+
Group-based assignment requires Azure Active Directory Premium P1 or P2 edition. Group-based assignment is supported for Security groups and Microsoft 365 groups whose `SecurityEnabled` setting is set to `True` only. Nested group memberships aren't currently supported. For more licensing requirements for the features discussed in this article, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory).
2727

2828
For greater control, certain types of enterprise applications can be configured to require user assignment. For more information on requiring user assignment for an app, see [Manage access to an application](what-is-access-management.md#requiring-user-assignment-for-an-app).
2929

articles/advisor/advisor-reference-cost-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ Learn more about [Subscription - MySQLReservedCapacity (Consider Database for My
200200

201201
### Consider Database for PostgreSQL reserved instance to save over your pay-as-you-go costs
202202

203-
We analyzed your Database for PostgreSQL usage pattern over last 30 days and recommend reserved instance purchase that maximizes your savings. With reserved instance you can pre-purchase PostgresSQL Database hourly usage and save over your on-demand costs. Reserved instance is a billing benefit and will automatically apply to new or existing deployments. Saving estimates are calculated for individual subscriptions and the usage pattern over last 30 days. Shared scope recommendations are available in reservation purchase experience and can increase savings further.
203+
We analyzed your Database for PostgreSQL usage pattern over last 30 days and recommend reserved instance purchase that maximizes your savings. With reserved instance you can pre-purchase PostgreSQL Database hourly usage and save over your on-demand costs. Reserved instance is a billing benefit and will automatically apply to new or existing deployments. Saving estimates are calculated for individual subscriptions and the usage pattern over last 30 days. Shared scope recommendations are available in reservation purchase experience and can increase savings further.
204204

205205
Learn more about [Subscription - PostgreSQLReservedCapacity (Consider Database for PostgreSQL reserved instance to save over your pay-as-you-go costs)](https://aka.ms/rirecommendations).
206206

articles/aks/learn/tutorial-kubernetes-workload-identity.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -196,6 +196,8 @@ kind: Pod
196196
metadata:
197197
name: quick-start
198198
namespace: ${SERVICE_ACCOUNT_NAMESPACE}
199+
labels:
200+
azure.workload.identity/use: "true"
199201
spec:
200202
serviceAccountName: ${SERVICE_ACCOUNT_NAME}
201203
containers:

articles/applied-ai-services/metrics-advisor/includes/quickstarts/java.md

Lines changed: 1 addition & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -91,66 +91,29 @@ Create and assign persistent environment variables for your key and endpoint.
9191

9292
```CMD
9393
setx METRICS_ADVISOR_ENDPOINT "REPLACE_WITH_YOUR_ENDPOINT_HERE"
94-
```
95-
96-
```CMD
9794
setx METRICS_ADVISOR_KEY "REPLACE_WITH_YOUR_KEY_VALUE_HERE"
98-
```
99-
100-
```CMD
10195
setx METRICS_ADVISOR_API_KEY "REPLACE_WITH_YOUR_KEY_VALUE_HERE"
102-
```
103-
104-
```CMD
10596
setx SQL_CONNECTION_STRING "REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING"
106-
```
107-
108-
```CMD
10997
setx SQL_QUERY "REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA"
11098
```
11199

112100
# [PowerShell](#tab/powershell)
113101

114102
```powershell
115103
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_ENDPOINT', 'REPLACE_WITH_YOUR_ENDPOINT_HERE', 'User')
116-
```
117-
118-
```powershell
119104
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_KEY', 'REPLACE_WITH_YOUR_KEY_VALUE_HERE', 'User')
120-
```
121-
122-
```powershell
123105
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_API_KEY', 'REPLACE_WITH_YOUR_KEY_VALUE_HERE', 'User')
124-
```
125-
126-
```powershell
127106
[System.Environment]::SetEnvironmentVariable('SQL_CONNECTION_STRING', 'REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING', 'User')
128-
```
129-
130-
```powershell
131107
[System.Environment]::SetEnvironmentVariable('SQL_QUERY', 'REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA', 'User')
132108
```
133109

134110
# [Bash](#tab/bash)
135111

136112
```Bash
137113
echo export METRICS_ADVISOR_ENDPOINT="REPLACE_WITH_YOUR_ENDPOINT_HERE" >> /etc/environment && source /etc/environment
138-
```
139-
140-
141-
```Bash
142114
echo export METRICS_ADVISOR_KEY="REPLACE_WITH_YOUR_KEY_VALUE_HERE" >> /etc/environment && source /etc/environment
143-
```
144-
145-
```Bash
146115
echo export METRICS_ADVISOR_API_KEY="REPLACE_WITH_YOUR_KEY_VALUE_HERE" >> /etc/environment && source /etc/environment
147-
```
148-
149-
```Bash
150116
echo export SQL_CONNECTION_STRING="REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING" >> /etc/environment && source /etc/environment
151-
```
152-
153-
```Bash
154117
echo export SQL_QUERY="REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA" >> /etc/environment && source /etc/environment
155118
```
156119

@@ -279,4 +242,4 @@ Run the application with the `run` goal:
279242

280243
```console
281244
gradle run
282-
```
245+
```

articles/azure-maps/about-azure-maps.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -63,9 +63,9 @@ For more information, see the [Geolocation service] documentation.
6363

6464
### Render service
6565

66-
[Render service V2] introduces a new version of the [Get Map Tile V2 API] that supports using Azure Maps tiles not only in the Azure Maps SDKs but other map controls as well. It includes raster and vector tile formats, 256x256 or 512x512 tile sizes (where applicable) and numerous map types such as road, weather, contour, or map tiles. For a complete list, see [TilesetID] in the REST API documentation. It's recommended that you use Render service V2 instead of Render service V1. You're required to display the appropriate copyright attribution on the map anytime you use the Azure Maps Render service V2, either as basemaps or layers, in any third-party map control. For more information, see [How to use the Get Map Attribution API].
66+
[Render V2 service] introduces a new version of the [Get Map Tile V2 API] that supports using Azure Maps tiles not only in the Azure Maps SDKs but other map controls as well. It includes raster and vector tile formats, 256x256 or 512x512 tile sizes (where applicable) and numerous map types such as road, weather, contour, or map tiles. For a complete list, see [TilesetID] in the REST API documentation. It's recommended that you use Render V2 service instead of Render service V1. You're required to display the appropriate copyright attribution on the map anytime you use the Azure Maps Render V2 service, either as basemaps or layers, in any third-party map control. For more information, see [How to use the Get Map Attribution API].
6767

68-
:::image type="content" source="./media/about-azure-maps/intro_map.png" border="false" alt-text="Example of a map from the Render service V2":::
68+
:::image type="content" source="./media/about-azure-maps/intro_map.png" border="false" alt-text="Example of a map from the Render V2 service":::
6969

7070
### Route service
7171

@@ -241,7 +241,7 @@ Stay up to date on Azure Maps:
241241
[Geolocation service]: /rest/api/maps/geolocation
242242
[Get Map Tile V2 API]: /rest/api/maps/render-v2/get-map-tile
243243
[Get Weather along route API]: /rest/api/maps/weather/getweatheralongroute
244-
[Render service V2]: /rest/api/maps/render-v2
244+
[Render V2 service]: /rest/api/maps/render-v2
245245
[REST APIs]: /rest/api/maps/
246246
[Route service]: /rest/api/maps/route
247247
[routeset API]: /rest/api/maps/v20220901preview/routeset

articles/azure-maps/how-to-secure-spa-users.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to secure a single page application with user sign-in
33
titleSuffix: Azure Maps
4-
description: How to configure a single page application which supports Azure AD single-sign-on with Azure Maps Web SDK.
4+
description: How to configure a single page application that supports Azure AD single-sign-on with Azure Maps Web SDK.
55
author: eriklindeman
66
ms.author: eriklind
77
ms.date: 06/12/2020
@@ -13,7 +13,7 @@ ms.custom: devx-track-js
1313

1414
# Secure a single page application with user sign-in
1515

16-
The following guide pertains to an application which is hosted on a content server or has minimal web server dependencies. The application provides protected resources secured only to Azure AD users. The objective of the scenario is to enable the web application to authenticate to Azure AD and call Azure Maps REST APIs on behalf of the user.
16+
The following guide pertains to an application that is hosted on a content server or has minimal web server dependencies. The application provides protected resources secured only to Azure AD users. The objective of the scenario is to enable the web application to authenticate to Azure AD and call Azure Maps REST APIs on behalf of the user.
1717

1818
[!INCLUDE [authentication details](./includes/view-authentication-details.md)]
1919

@@ -23,20 +23,17 @@ Create the web application in Azure AD for users to sign in. The web application
2323

2424
1. In the Azure portal, in the list of Azure services, select **Azure Active Directory** > **App registrations** > **New registration**.
2525

26-
> [!div class="mx-imgBorder"]
27-
> ![App registration](./media/how-to-manage-authentication/app-registration.png)
26+
:::image type="content" source="./media/how-to-manage-authentication/app-registration.png" alt-text="Screenshot showing the new registration page in the App registrations blade in Azure Active Directory.":::
2827

29-
2. Enter a **Name**, choose a **Support account type**, provide a redirect URI which will represent the url which Azure AD will issue the token and is the url where the map control is hosted. For a detailed sample please see [Azure Maps Azure AD samples](https://github.com/Azure-Samples/Azure-Maps-AzureAD-Samples/tree/master/src/ImplicitGrant). Then select **Register**.
28+
2. Enter a **Name**, choose a **Support account type**, provide a redirect URI that represents the url which Azure AD issues the token and is the url where the map control is hosted. For a detailed sample, see [Azure Maps Azure AD samples](https://github.com/Azure-Samples/Azure-Maps-AzureAD-Samples/tree/master/src/ImplicitGrant). Then select **Register**.
3029

3130
3. To assign delegated API permissions to Azure Maps, go to the application. Then under **App registrations**, select **API permissions** > **Add a permission**. Under **APIs my organization uses**, search for and select **Azure Maps**.
3231

33-
> [!div class="mx-imgBorder"]
34-
> ![Add app API permissions](./media/how-to-manage-authentication/app-permissions.png)
32+
:::image type="content" source="./media/how-to-manage-authentication/app-permissions.png" alt-text="Screenshot showing a list of APIs my organization uses.":::
3533

3634
4. Select the check box next to **Access Azure Maps**, and then select **Add permissions**.
3735

38-
> [!div class="mx-imgBorder"]
39-
> ![Select app API permissions](./media/how-to-manage-authentication/select-app-permissions.png)
36+
:::image type="content" source="./media/how-to-manage-authentication/select-app-permissions.png" alt-text="Screenshot showing the request app API permissions screen.":::
4037

4138
5. Enable `oauth2AllowImplicitFlow`. To enable it, in the **Manifest** section of your app registration, set `oauth2AllowImplicitFlow` to `true`.
4239

@@ -62,7 +59,7 @@ Create the web application in Azure AD for users to sign in. The web application
6259
```
6360

6461
7. Configure Azure role-based access control (Azure RBAC) for users or groups. See the [following sections to enable Azure RBAC](#grant-role-based-access-for-users-to-azure-maps).
65-
62+
6663
[!INCLUDE [grant role access to users](./includes/grant-rbac-users.md)]
6764

6865
## Next steps

0 commit comments

Comments
 (0)