Skip to content

Commit 7f02931

Browse files
committed
2 parents 484d8d0 + b57b794 commit 7f02931

25 files changed

+316
-243
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-faqs.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -248,6 +248,9 @@ Microsoft Entra ID combines the encrypted client key and message buffer into the
248248
| tgt_key_type | int | The on-premises AD DS key type used for both the client key and the Kerberos session key included in the KERB_MESSAGE_BUFFER. |
249249
| tgt_message_buffer | string | Base64 encoded KERB_MESSAGE_BUFFER. |
250250

251+
### Do users need to be a member of the Domain Users Active Directory group?
252+
Yes. A user must be in the Domain Users group to be able to sign-in using Azure AD Kerberos.
253+
251254
## Next steps
252255

253256
To get started with FIDO2 security keys and hybrid access to on-premises resources, see the following articles:

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,8 @@ First, let's enable SMS-based authentication for your Microsoft Entra tenant.
6666

6767

6868
1. Click **Enable** and select **Target users**. You can choose to enable SMS-based authentication for *All users* or *Select users* and groups.
69+
> [!NOTE]
70+
> To configure SMS-based authentication for first-factor (that is, to allow users to sign in with this method), check the **Use for sign-in** checkbox. Leaving this unchecked makes SMS-based authentication available for multifactor authentication and Self-Service Password Reset only.
6971
7072
![Enable SMS authentication in the authentication method policy window](./media/howto-authentication-sms-signin/enable-sms-authentication-method.png)
7173

articles/active-directory/manage-apps/admin-consent-workflow-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ As an admin, the following options exist for you to determine how users consent
3232
- Disable user consent. For example, a high school may want to turn off user consent so that the school IT administration has full control over all the applications that are used in their tenant.
3333
- Allow users to consent to the required permissions. It's NOT recommended to keep user consent open if you have sensitive data in your tenant.
3434
- If you still want to retain admin-only consent for certain permissions but want to assist your end-users in onboarding their application, you can use the admin consent workflow to evaluate and respond to admin consent requests. This way, you can have a queue of all the requests for admin consent for your tenant and can track and respond to them directly through the Microsoft Entra admin center.
35-
To learn how to configure the admin consent workflow, see [configure-admin-consent-workflow.md](configure-admin-consent-workflow.md).
35+
To learn how to configure the admin consent workflow, see [Configure the admin consent workflow](configure-admin-consent-workflow.md).
3636

3737
## How the admin consent workflow works
3838

articles/advisor/advisor-reference-reliability-recommendations.md

Lines changed: 43 additions & 19 deletions
Large diffs are not rendered by default.

articles/ai-services/openai/tutorials/embeddings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ In this tutorial, you learn how to:
3333
## Prerequisites
3434

3535
* An Azure subscription - [Create one for free](https://azure.microsoft.com/free/cognitive-services?azure-portal=true)
36-
* Access granted to Azure OpenAI in the desired Azure subscription
36+
* Access granted to Azure OpenAI in the desired Azure subscription.
3737
Currently, access to this service is granted only by application. You can apply for access to Azure OpenAI by completing the form at <a href="https://aka.ms/oai/access" target="_blank">https://aka.ms/oai/access</a>. Open an issue on this repo to contact us if you have an issue.
3838
* <a href="https://www.python.org/" target="_blank">Python 3.7.1 or later version</a>
3939
* The following Python libraries: openai, num2words, matplotlib, plotly, scipy, scikit-learn, pandas, tiktoken.

articles/aks/supported-kubernetes-versions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ For the past release history, see [Kubernetes history](https://github.com/kubern
4848
| 1.24 | Apr 2022 | May 2022 | Jul 2022 | Jul 2023 | Until 1.28 GA |
4949
| 1.25 | Aug 2022 | Oct 2022 | Dec 2022 | Dec 2023 | Until 1.29 GA |
5050
| 1.26 | Dec 2022 | Feb 2023 | Apr 2023 | Mar 2024 | Until 1.30 GA |
51-
| 1.27* | Apr 2023 | Jun 2023 | Jul 2023 | Jul 2024, LTS until Jul 2026 | Until 1.31 GA |
51+
| 1.27* | Apr 2023 | Jun 2023 | Jul 2023 | Jul 2024, LTS until Jul 2025 | Until 1.31 GA |
5252
| 1.28 | Aug 2023 | Sep 2023 | Oct 2023 || Until 1.32 GA|
5353

5454
*\* Indicates the version is designated for Long Term Support*

articles/azure-arc/kubernetes/includes/network-requirements.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
ms.service: azure-arc
33
ms.topic: include
4-
ms.date: 08/15/2023
4+
ms.date: 09/28/2023
55
---
66

77
### [Azure Cloud](#tab/azure-cloud)
@@ -73,14 +73,15 @@ GET https://guestnotificationservice.azure.us/urls/allowlist?api-version=2020-01
7373
| ----------------- | ------------- |
7474
| `https://management.chinacloudapi.cn` | Required for the agent to connect to Azure and register the cluster. |
7575
| `https://<region>.dp.kubernetesconfiguration.azure.cn` | Data plane endpoint for the agent to push status and fetch configuration information. |
76-
| `https://login.chinacloudapi.cn`<br/>`https://<region>.login.chinacloudapi.cn`<br/>`login.windows.net`| Required to fetch and update Azure Resource Manager tokens. |
77-
| `https://mcr.microsoft.com`<br/>`https://*.data.mcr.microsoft.com` | Required to pull container images for Azure Arc agents. |
76+
| `https://login.chinacloudapi.cn`<br/>`https://<region>.login.chinacloudapi.cn`<br/>`login.partner.microsoftonline.cn`| Required to fetch and update Azure Resource Manager tokens. |
77+
| `mcr.azk8s.cn` | Required to pull container images for Azure Arc agents. |
7878
| `https://gbl.his.arc.azure.cn` | Required to get the regional endpoint for pulling system-assigned Managed Identity certificates. |
7979
| `https://*.his.arc.azure.cn` | Required to pull system-assigned Managed Identity certificates. |
8080
|`https://k8connecthelm.azureedge.net` | `az connectedk8s connect` uses Helm 3 to deploy Azure Arc agents on the Kubernetes cluster. This endpoint is needed for Helm client download to facilitate deployment of the agent helm chart. |
81-
|`guestnotificationservice.azure.cn`<br/>`*.guestnotificationservice.azure.cn`<br/>`sts.windows.net`<br/>`https://k8sconnectcsp.azureedge.net` | For [Cluster Connect](../cluster-connect.md) and for [Custom Location](../custom-locations.md) based scenarios. |
81+
|`guestnotificationservice.azure.cn`<br/>`*.guestnotificationservice.azure.cn`<br/>`sts.chinacloudapi.cn`<br/>`https://k8sconnectcsp.azureedge.net` | For [Cluster Connect](../cluster-connect.md) and for [Custom Location](../custom-locations.md) based scenarios. |
8282
|`*.servicebus.chinacloudapi.cn` | For [Cluster Connect](../cluster-connect.md) and for [Custom Location](../custom-locations.md) based scenarios. |
8383
|`https://graph.chinacloudapi.cn/` | Required when [Azure RBAC](../azure-rbac.md) is configured. |
84-
| `*.arc.azure.net`| Required to manage connected clusters in Azure portal. |
84+
|`*.arc.azure.cn` | Required to manage connected clusters in Azure portal.|
8585
|`https://<region>.obo.arc.azure.cn:8084/` | Required when [Cluster Connect](../cluster-connect.md) is configured. |
8686
|`dl.k8s.io`| Required when [automatic agent upgrade](../agent-upgrade.md#toggle-automatic-upgrade-on-or-off-when-connecting-a-cluster-to-azure-arc) is enabled. |
87+
|`quay.azk8s.cn`<br/>`registryk8s.azk8s.cn`<br/>`k8sgcr.azk8s.cn`<br/>`usgcr.azk8s.cn`<br/>`dockerhub.azk8s.cn/<repo-name>/<image-name>:<version>`|Container registry proxy servers for Azure China VMs.|

articles/azure-arc/kubernetes/network-requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Arc-enabled Kubernetes network requirements
33
description: Learn about the networking requirements to connect Kubernetes clusters to Azure Arc.
4-
ms.date: 08/15/2023
4+
ms.date: 09/28/2023
55
ms.topic: conceptual
66
ms.custom: references-regions
77
---

articles/azure-functions/functions-bindings-service-bus-output.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,9 +41,13 @@ This article supports both programming models.
4141

4242
# [Isolated worker model](#tab/isolated-process)
4343

44-
The following example shows a [C# function](dotnet-isolated-process-guide.md) that receives a Service Bus queue message, logs the message, and sends a message to different Service Bus queue:
44+
This code defines and initializes the `ILogger`:
4545

46+
:::code language="csharp" source="~/azure-functions-dotnet-worker/samples/Extensions/ServiceBus/ServiceBusReceivedMessageFunctions.cs" id="docsnippet_servicebusmessage_createlogger":::
4647

48+
This example shows a [C# function](dotnet-isolated-process-guide.md) that receives a message and writes it to a second queue:
49+
50+
:::code language="csharp" source="~/azure-functions-dotnet-worker/samples/Extensions/ServiceBus/ServiceBusReceivedMessageFunctions.cs" id="docsnippet_servicebus_readmessage":::
4751

4852
# [In-process model](#tab/in-process)
4953

articles/azure-functions/functions-bindings-service-bus-trigger.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,17 @@ This article supports both programming models.
4444

4545
# [Isolated worker model](#tab/isolated-process)
4646

47-
The following example shows a [C# function](dotnet-isolated-process-guide.md) that receives a Service Bus queue message, logs the message, and sends a message to different Service Bus queue:
47+
This code defines and initializes the `ILogger`:
4848

49+
:::code language="csharp" source="~/azure-functions-dotnet-worker/samples/Extensions/ServiceBus/ServiceBusReceivedMessageFunctions.cs" id="docsnippet_servicebusmessage_createlogger":::
4950

51+
This example shows a [C# function](dotnet-isolated-process-guide.md) that receives a single Service Bus queue message and writes it to the logs:
52+
53+
:::code language="csharp" source="~/azure-functions-dotnet-worker/samples/Extensions/ServiceBus/ServiceBusReceivedMessageFunctions.cs" id="docsnippet_servicebus_readmessage":::
54+
55+
This example shows a [C# function](dotnet-isolated-process-guide.md) that receives multiple Service Bus queue messages in a single batch and writes each to the logs:
56+
57+
:::code language="csharp" source="~/azure-functions-dotnet-worker/samples/Extensions/ServiceBus/ServiceBusReceivedMessageFunctions.cs" id="docsnippet_servicebus_readbatch":::
5058

5159
# [In-process model](#tab/in-process)
5260

0 commit comments

Comments
 (0)