Skip to content

Commit 7daee39

Browse files
authored
Merge pull request #201373 from MicrosoftDocs/main
6/13 AM Publish
2 parents 21b9dea + d92eafb commit 7daee39

File tree

61 files changed

+961
-191
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+961
-191
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -434,6 +434,12 @@
434434
"branch": "main",
435435
"branch_mapping": {}
436436
},
437+
{
438+
"path_to_root": "media-services-video-indexer",
439+
"url": "https://github.com/Azure-Samples/media-services-video-indexer",
440+
"branch": "main",
441+
"branch_mapping": {}
442+
},
437443
{
438444
"path_to_root": "remote-monitoring-webui",
439445
"url": "https://github.com/Azure/pcs-remote-monitoring-webui.git",

CODEOWNERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111

1212
# Azure Monitor
1313
articles/azure-monitor/* @bwren
14-
articles/azure-monitor/agents @bwren
14+
articles/azure-monitor/agents @guywi-ms @bwren
1515
articles/azure-monitor/alerts @abbyMSFT
1616
articles/azure-monitor/app @AaronMaxwell
1717
articles/azure-monitor/autoscale @rboucher

articles/active-directory/develop/refresh-tokens.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 05/25/2021
12+
ms.date: 06/10/2022
1313
ms.author: shermanouko
1414
ms.reviewer: mmacy, ludwignick
1515
ms.custom: aaddev, identityplatformtop40, fasttrack-edit
@@ -23,41 +23,41 @@ When a client acquires an access token to access a protected resource, the clien
2323

2424
Before reading through this article, it's recommended that you go through the following articles:
2525

26-
* [ID tokens](id-tokens.md) in the Microsoft identity platform.
27-
* [Access tokens](access-tokens.md) in the Microsoft identity platform.
26+
- [ID tokens](id-tokens.md) in the Microsoft identity platform.
27+
- [Access tokens](access-tokens.md) in the Microsoft identity platform.
2828

2929
## Refresh token lifetime
3030

31-
Refresh tokens have a longer lifetime than access tokens. The default lifetime for the refresh tokens is 24 hours for [single page apps](reference-third-party-cookies-spas.md) and 90 days for all other scenarios. Refresh tokens replace themselves with a fresh token upon every use. The Microsoft identity platform doesn't revoke old refresh tokens when used to fetch new access tokens. Securely delete the old refresh token after acquiring a new one. Refresh tokens need to be stored safely like access tokens or application credentials.
31+
Refresh tokens have a longer lifetime than access tokens. The default lifetime for the refresh tokens is 24 hours for [single page apps](reference-third-party-cookies-spas.md) and 90 days for all other scenarios. Refresh tokens replace themselves with a fresh token upon every use. The Microsoft identity platform doesn't revoke old refresh tokens when used to fetch new access tokens. Securely delete the old refresh token after acquiring a new one. Refresh tokens need to be stored safely like access tokens or application credentials.
3232

33-
>[!IMPORTANT]
34-
> Refresh tokens sent to a redirect URI registered as `spa` expire after 24 hours. Additional refresh tokens acquired using the initial refresh token carry over that expiration time, so apps must be prepared to rerun the authorization code flow using an interactive authentication to get a new refresh token every 24 hours. Users do not have to enter their credentials and usually don't even see any related user experience, just a reload of your application. The browser must visit the log-in page in a top-level frame to show the login session. This is due to [privacy features in browsers that block third party cookies](reference-third-party-cookies-spas.md).
33+
> [!IMPORTANT]
34+
> Refresh tokens sent to a redirect URI registered as `spa` expire after 24 hours. Additional refresh tokens acquired using the initial refresh token carry over that expiration time, so apps must be prepared to rerun the authorization code flow using an interactive authentication to get a new refresh token every 24 hours. Users don't have to enter their credentials and usually don't even see any related user experience, just a reload of your application. The browser must visit the log-in page in a top-level frame to show the login session. This is due to [privacy features in browsers that block third party cookies](reference-third-party-cookies-spas.md).
3535
3636
## Refresh token expiration
3737

38-
Refresh tokens can be revoked at any time, because of timeouts and revocations. Your app must handle rejections by the sign-in service gracefully when this occurs. This is done by sending the user to an interactive sign-in prompt to sign in again.
38+
Refresh tokens can be revoked at any time, because of timeouts and revocations. Your app must handle rejections by the sign-in service gracefully when this occurs. This is done by sending the user to an interactive sign-in prompt to sign in again.
3939

4040
### Token timeouts
4141

4242
You can't configure the lifetime of a refresh token. You can't reduce or lengthen their lifetime. Configure sign-in frequency in Conditional Access to define the time periods before a user is required to sign in again. Learn more about [Configuring authentication session management with Conditional Access](../conditional-access/howto-conditional-access-session-lifetime.md).
4343

44-
Not all refresh tokens follow the rules set in the token lifetime policy. Specifically, refresh tokens used in [single page apps](reference-third-party-cookies-spas.md) are always fixed to 24 hours of activity, as if they have a `MaxAgeSessionSingleFactor` policy of 24 hours applied to them.
44+
Not all refresh tokens follow the rules set in the token lifetime policy. Specifically, refresh tokens used in [single page apps](reference-third-party-cookies-spas.md) are always fixed to 24 hours of activity, as if they have a `MaxAgeSessionSingleFactor` policy of 24 hours applied to them.
4545

4646
### Revocation
4747

48-
Refresh tokens can be revoked by the server because of a change in credentials, user action, or admin action. Refresh tokens fall into two classes: tokens issued to confidential clients (the rightmost column) and tokens issued to public clients (all other columns).
48+
Refresh tokens can be revoked by the server because of a change in credentials, user action, or admin action. Refresh tokens fall into two classes: tokens issued to confidential clients (the rightmost column) and tokens issued to public clients (all other columns).
4949

50-
| Change | Password-based cookie | Password-based token | Non-password-based cookie | Non-password-based token | Confidential client token |
51-
|---|-----------------------|----------------------|---------------------------|--------------------------|---------------------------|
52-
| Password expires | Stays alive | Stays alive | Stays alive | Stays alive | Stays alive |
53-
| Password changed by user | Revoked | Revoked | Stays alive | Stays alive | Stays alive |
54-
| User does SSPR | Revoked | Revoked | Stays alive | Stays alive | Stays alive |
55-
| Admin resets password | Revoked | Revoked | Stays alive | Stays alive | Stays alive |
56-
| User revokes their refresh tokens [via PowerShell](/powershell/module/azuread/revoke-azureadsignedinuserallrefreshtoken) | Revoked | Revoked | Revoked | Revoked | Revoked |
57-
| Admin revokes all refresh tokens for a user [via PowerShell](/powershell/module/azuread/revoke-azureaduserallrefreshtoken) | Revoked | Revoked |Revoked | Revoked | Revoked |
58-
| Single sign-out [on web](v2-protocols-oidc.md#single-sign-out) | Revoked | Stays alive | Revoked | Stays alive | Stays alive |
50+
| Change | Password-based cookie | Password-based token | Non-password-based cookie | Non-password-based token | Confidential client token |
51+
| -------------------------------------------------------------------------------------------------------------------------- | --------------------- | -------------------- | ------------------------- | ------------------------ | ------------------------- |
52+
| Password expires | Stays alive | Stays alive | Stays alive | Stays alive | Stays alive |
53+
| Password changed by user | Revoked | Revoked | Stays alive | Stays alive | Stays alive |
54+
| User does SSPR | Revoked | Revoked | Stays alive | Stays alive | Stays alive |
55+
| Admin resets password | Revoked | Revoked | Stays alive | Stays alive | Stays alive |
56+
| User revokes their refresh tokens [via PowerShell](/powershell/module/azuread/revoke-azureadsignedinuserallrefreshtoken) | Revoked | Revoked | Revoked | Revoked | Revoked |
57+
| Admin revokes all refresh tokens for a user [via PowerShell](/powershell/module/azuread/revoke-azureaduserallrefreshtoken) | Revoked | Revoked | Revoked | Revoked | Revoked |
58+
| Single sign-out [on web](v2-protocols-oidc.md#single-sign-out) | Revoked | Stays alive | Revoked | Stays alive | Stays alive |
5959

6060
## Next steps
6161

62-
* Learn about [configurable token lifetimes](active-directory-configurable-token-lifetimes.md)
63-
* Check out [Primary Refresh Tokens](../devices/concept-primary-refresh-token.md) for more details on primary refresh tokens.
62+
- Learn about [configurable token lifetimes](active-directory-configurable-token-lifetimes.md)
63+
- Check out [Primary Refresh Tokens](../devices/concept-primary-refresh-token.md) for more details on primary refresh tokens.

articles/active-directory/managed-identities-azure-resources/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323

2424
A common challenge for developers is the management of secrets, credentials, certificates, keys etc used to secure communication between services. Managed identities eliminate the need for developers to manage these credentials.
2525

26-
While developers can securely store the secrets in [Azure Key Vault](../../key-vault/general/overview.md), services need a way to access Azure Key Vault. Managed identities provide an automatically managed identity in Azure Active Directory for applications to use when connecting to resources that support Azure Active Directory (Azure AD) authentication. Applications can use managed identities to obtain Azure AD tokens without having manage any credentials.
26+
While developers can securely store the secrets in [Azure Key Vault](../../key-vault/general/overview.md), services need a way to access Azure Key Vault. Managed identities provide an automatically managed identity in Azure Active Directory for applications to use when connecting to resources that support Azure Active Directory (Azure AD) authentication. Applications can use managed identities to obtain Azure AD tokens without having to manage any credentials.
2727

2828
The following video shows how you can use managed identities:</br>
2929

@@ -68,7 +68,7 @@ For using Managed identities, you have should do the following:
6868
1. Create a managed identity in Azure. You can choose between system-assigned managed identity or user-assigned managed identity.
6969
2. In case of user-assigned managed identity, assign the managed identity to the "source" Azure Resource, such as an Azure Logic App or an Azure Web App.
7070
3. Authorize the managed identity to have accees to the "target" service.
71-
4. Use the managed identity to perform access. For this, you can use the Azure SDK with the Azure.Identity library. Some "source" resources offer connectors that know how to use Managed identities for the connections. In that case you simply use the ideantity as a feature of that "source" resource.
71+
4. Use the managed identity to perform access. For this, you can use the Azure SDK with the Azure.Identity library. Some "source" resources offer connectors that know how to use Managed identities for the connections. In that case you simply use the identity as a feature of that "source" resource.
7272

7373

7474
## What Azure services support the feature?<a name="which-azure-services-support-managed-identity"></a>

articles/azure-monitor/app/sampling.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,8 @@ Metric counts such as request rate and exception rate are adjusted to compensate
7070
> [!NOTE]
7171
> This section applies to ASP.NET applications, not to ASP.NET Core applications. [Learn about configuring adaptive sampling for ASP.NET Core applications later in this document.](#configuring-adaptive-sampling-for-aspnet-core-applications)
7272
73+
> With ASP.NET Core and with Microsoft.ApplicationInsights.AspNetCore >= 2.15.0 you can configure AppInsights options via appsettings.json
74+
7375
In [`ApplicationInsights.config`](./configuration-with-applicationinsights-config.md), you can adjust several parameters in the `AdaptiveSamplingTelemetryProcessor` node. The figures shown are the default values:
7476

7577
* `<MaxTelemetryItemsPerSecond>5</MaxTelemetryItemsPerSecond>`

articles/azure-monitor/app/statsbeat.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -65,11 +65,11 @@ N/A
6565
|Metric Name|Unit|Supported dimensions|
6666
|-----|-----|-----|
6767
|Request Success Count|Count| `Resource Provider`, `Attach Type`, `Instrumentation Key`, `Runtime Version`, `Operating System`, `Language`, `Version`, `Endpoint`, `Host`|
68-
|Requests Failure Count|Count| `Resource Provider`, `Attach Type`, `Instrumentation Key`, `Runtime Version`, `Operating System`, `Language`, `Version`, `Endpoint`, `Host`|
68+
|Requests Failure Count|Count| `Resource Provider`, `Attach Type`, `Instrumentation Key`, `Runtime Version`, `Operating System`, `Language`, `Version`, `Endpoint`, `Host`, `Status Code`|
6969
|Request Duration|Count| `Resource Provider`, `Attach Type`, `Instrumentation Key`, `Runtime Version`, `Operating System`, `Language`, `Version`, `Endpoint`, `Host`|
70-
|Retry Count|Count| `Resource Provider`, `Attach Type`, `Instrumentation Key`, `Runtime Version`, `Operating System`, `Language`, `Version`, `Endpoint`, `Host`|
71-
|Throttle Count|Count| `Resource Provider`, `Attach Type`, `Instrumentation Key`, `Runtime Version`, `Operating System`, `Language`, `Version`, `Endpoint`, `Host`|
72-
|Exception Count|Count| `Resource Provider`, `Attach Type`, `Instrumentation Key`, `Runtime Version`, `Operating System`, `Language`, `Version`, `Endpoint`, `Host`|
70+
|Retry Count|Count| `Resource Provider`, `Attach Type`, `Instrumentation Key`, `Runtime Version`, `Operating System`, `Language`, `Version`, `Endpoint`, `Host`, , `Status Code`|
71+
|Throttle Count|Count| `Resource Provider`, `Attach Type`, `Instrumentation Key`, `Runtime Version`, `Operating System`, `Language`, `Version`, `Endpoint`, `Host`, `Status Code`|
72+
|Exception Count|Count| `Resource Provider`, `Attach Type`, `Instrumentation Key`, `Runtime Version`, `Operating System`, `Language`, `Version`, `Endpoint`, `Host`, `Exception Type`|
7373

7474
[!INCLUDE [azure-monitor-log-analytics-rebrand](../../../includes/azure-monitor-instrumentation-key-deprecation.md)]
7575
#### Attach Statsbeat
@@ -113,10 +113,10 @@ You can also disable this feature by setting the environment variable `APPLICATI
113113

114114
#### [Node](#tab/node)
115115

116-
N/A
116+
Not supported yet.
117117

118118
#### [Python](#tab/python)
119119

120-
N/A
120+
Not supported yet.
121121

122122
---

articles/azure-netapp-files/azure-netapp-files-solution-architectures.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This article provides references to best practices that can help you understand
2020

2121
The following diagram summarizes the categories of solution architectures that Azure NetApp Files offers:
2222

23-
![Solution architecture categories](../media/azure-netapp-files/solution-architecture-categories.png)
23+
:::image type="content" source="../media/azure-netapp-files/solution-architecture-categories.png" alt-text="Solution architecture categories." lightbox="../media/azure-netapp-files/solution-architecture-categories.png":::
2424

2525
## Linux OSS Apps and Database solutions
2626

articles/azure-resource-manager/management/move-support-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -600,7 +600,7 @@ Jump to a resource provider namespace:
600600
> [!div class="mx-tableFixed"]
601601
> | Resource type | Resource group | Subscription | Region move |
602602
> | ------------- | ----------- | ---------- | ----------- |
603-
> | communicationservices | Yes | Yes | No |
603+
> | communicationservices | Yes | Yes <br/><br/> Note that resources with attached phone numbers cannot be moved to subscriptions in different data locations, nor subscriptions that do not support having phone numbers. | No |
604604
605605
## Microsoft.Compute
606606

articles/azure-video-indexer/deploy-with-arm-template.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Deploy Azure Video Indexer with ARM template
3-
description: In this tutorial you will create an Azure Video Indexer account by using Azure Resource Manager (ARM) template.
3+
description: Learn how to create an Azure Video Indexer account by using Azure Resource Manager (ARM) template.
44
ms.topic: tutorial
55
ms.date: 05/23/2022
66
ms.author: juliako
@@ -10,13 +10,13 @@ ms.author: juliako
1010

1111
## Overview
1212

13-
In this tutorial you will create an Azure Video Indexer account by using Azure Resource Manager (ARM) template (preview).
13+
In this tutorial, you will create an Azure Video Indexer account by using Azure Resource Manager (ARM) template (preview).
1414
The resource will be deployed to your subscription and will create the Azure Video Indexer resource based on parameters defined in the avam.template file.
1515

1616
> [!NOTE]
1717
> This sample is *not* for connecting an existing Azure Video Indexer classic account to an ARM-based Azure Video Indexer account.
1818
> For full documentation on Azure Video Indexer API, visit the [Developer portal](https://aka.ms/avam-dev-portal) page.
19-
> The current API Version is "2021-10-27-preview". Check this Repo from time to time to get updates on new API Versions.
19+
> For the latest API version for Microsoft.VideoIndexer, see the [template reference](/azure/templates/microsoft.videoindexer/accounts?tabs=bicep).
2020
2121
## Prerequisites
2222

@@ -40,7 +40,6 @@ The resource will be deployed to your subscription and will create the Azure Vid
4040

4141
* Create a new Resource group on the same location as your Azure Video Indexer account, using the [New-AzResourceGroup](/powershell/module/az.resources/new-azresourcegroup) cmdlet.
4242

43-
4443
```powershell
4544
New-AzResourceGroup -Name myResourceGroup -Location eastus
4645
```
@@ -52,7 +51,7 @@ The resource will be deployed to your subscription and will create the Azure Vid
5251
```
5352
5453
> [!NOTE]
55-
> If you would like to work with bicep format, inspect the [bicep file](https://github.com/Azure-Samples/media-services-video-indexer/blob/master/ARM-Quick-Start/avam.template.bicep) on this repo.
54+
> If you would like to work with bicep format, see [Deploy by using Bicep](./deploy-with-bicep.md).
5655
5756
## Parameters
5857

0 commit comments

Comments
 (0)