Skip to content

Commit 826b6e8

Browse files
authored
Merge pull request #95531 from MicrosoftDocs/master
11/11 AM Publish
2 parents 6dec090 + c67d3d2 commit 826b6e8

File tree

95 files changed

+712
-536
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+712
-536
lines changed

articles/active-directory/develop/app-registrations-training-guide-for-app-registrations-legacy-users.md

Lines changed: 66 additions & 38 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/msal-net-initializing-client-applications.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ In the code snippets using application builders, a number of `.With` methods can
9898

9999
The modifiers you can set on a public client or confidential client application builder are:
100100

101-
|Parameter | Description|
101+
|Modifier | Description|
102102
|--------- | --------- |
103103
|`.WithAuthority()` 7 overrides | Sets the application default authority to an Azure AD authority, with the possibility of choosing the Azure Cloud, the audience, the tenant (tenant ID or domain name), or providing directly the authority URI.|
104104
|`.WithAdfsAuthority(string)` | Sets the application default authority to be an ADFS authority.|
@@ -117,15 +117,15 @@ The modifiers you can set on a public client or confidential client application
117117

118118
The modifiers you can set on a public client application builder on Xamarin.iOS are:
119119

120-
|Parameter | Description|
120+
|Modifier | Description|
121121
|--------- | --------- |
122122
|`.WithIosKeychainSecurityGroup()` | **Xamarin.iOS only**: Sets the iOS key chain security group (for the cache persistence).|
123123

124124
### Modifiers specific to confidential client applications
125125

126126
The modifiers you can set on a confidential client application builder are:
127127

128-
|Parameter | Description|
128+
|Modifier | Description|
129129
|--------- | --------- |
130130
|`.WithCertificate(X509Certificate2 certificate)` | Sets the certificate identifying the application with Azure AD.|
131131
|`.WithClientSecret(string clientSecret)` | Sets the client secret (app password) identifying the application with Azure AD.|

articles/active-directory/develop/quickstart-v2-android.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -93,26 +93,26 @@ Applications must be represented by an app object in Azure Active Directory so t
9393
9494
> [!div class="sxs-lookup" renderon="portal"]
9595
> 4. Inside **app** > **src** > **main**, open **AndroidManifest.xml**.
96-
> 5. In the **manifest\application** node, replace the **<activity android:name="com.microsoft.identity.client.BrowserTabActivity">** node with the following:
96+
> 5. In the **manifest\application** node, replace the **activity android:name="com.microsoft.identity.client.BrowserTabActivity"** node with the following:
9797
> ```xml
98-
> &lt;!--Intent filter to catch Microsoft's callback after Sign In--&gt;
99-
> &lt;activity android:name=&quot;com.microsoft.identity.client.BrowserTabActivity&quot;&gt;
100-
> &lt;intent-filter&gt;
101-
> &lt;action android:name=&quot;android.intent.action.VIEW&quot; /&gt;
102-
> &lt;category android:name=&quot;android.intent.category.DEFAULT&quot; /&gt;
103-
> &lt;category android:name=&quot;android.intent.category.BROWSABLE&quot; /&gt;
104-
> &lt;!--
98+
> <!--Intent filter to catch Microsoft's callback after Sign In-->
99+
> <activity android:name="com.microsoft.identity.client.BrowserTabActivity">
100+
> <intent-filter>
101+
> <action android:name="android.intent.action.VIEW" />
102+
> <category android:name="android.intent.category.DEFAULT" />
103+
> <category android:name="android.intent.category.BROWSABLE" />
104+
> <!--
105105
> Add in your scheme/host from registered redirect URI
106-
> note that the leading &quot;/&quot; is required for android:path
107-
> --&gt;
108-
> &lt;data android:scheme=&quot;msauth&quot;
109-
> android:host=&quot;Enter_the_Package_Name&quot;
110-
> android:path=&quot;Enter_the_Signature_Hash&quot;
111-
> android:scheme = &quot;msauth&quot; /&gt;
112-
> &lt;/intent-filter&gt;
113-
> &lt;/activity&gt;
106+
> note that the leading "/" is required for android:path
107+
> -->
108+
> <data
109+
> android:host="Enter_the_Package_Name"
110+
> android:path="/Enter_the_Signature_Hash"
111+
> android:scheme= "msauth" />
112+
> </intent-filter>
113+
> </activity>
114114
> ```
115-
> 6. Run the app!
115+
> 6. Run the app!
116116
> The sample app starts on the **Single Account Mode** screen. A default scope, **user.read**, is provided by default, which is used when reading your own profile data during the Microsoft Graph API call. The URL for the Microsoft Graph API call is provided by default. You can change both of these if you wish.
117117
>
118118
> ![MSAL sample app showing single and multiple account usage](./media/quickstart-v2-android/quickstart-sample-app.png)

articles/active-directory/governance/entitlement-management-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323
---
2424
# What is Azure AD entitlement management?
2525

26-
Azure Active Directory (Azure AD) entitlement management is a [identity governance](identity-governance-overview.md) feature that enables organizations to manage identity and access lifecycle at scale, by automating access request workflows, access assignments, reviews, and expiration.
26+
Azure Active Directory (Azure AD) entitlement management is an [identity governance](identity-governance-overview.md) feature that enables organizations to manage identity and access lifecycle at scale, by automating access request workflows, access assignments, reviews, and expiration.
2727

2828
Employees in organizations need access to various groups, applications, and sites to perform their job. Managing this access is challenging, as requirements change - new applications are added or users need additional access rights. This scenario gets more complicated when you collaborate with outside organizations - you may not know who in the other organization needs access to your organization's resources, and they won't know what applications, groups or sites your organization is using.
2929

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,18 @@ Download| [Download Azure AD Connect](https://go.microsoft.com/fwlink/?LinkId=61
3838
While we go through this process, the version number of the release will be shown with an "X" in the minor release number position, as in "1.3.X.0" - this indicates that the release notes in this document are valid for all versions beginning with "1.3.". As soon as we have finalized the release process the release version number will be updated to the most recently released version and the release status will be updated to "Released for download and auto upgrade".
3939
Not all releases of Azure AD Connect will be made available for auto upgrade. The release status will indicate whether a release is made available for auto upgrade or for download only. If auto upgrade was enabled on your Azure AD Connect server then that server will automatically upgrade to the latest version of Azure AD Connect that is released for auto upgrade. Note that not all Azure AD Connect configurations are eligible for auto upgrade. Please follow this link to read more about [auto upgrade](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-install-automatic-upgrade)
4040

41-
## 1.4.25.0
41+
## 1.4.32.0
42+
### Release status
43+
08/11/2019: Released for download. Not available for auto-upgrade
44+
45+
>[!IMPORTANT]
46+
>Due to an internal schema change in this release of Azure AD Connect, if you manage ADFS trust relationship configuration settings using MSOnline PowerShell then you must update your MSOnline PowerShell module to version 1.1.183.57 or higher
47+
### Fixed issues
4248

49+
This version fixes an issue with existing Hybrid Azure AD joined devices. This release contains a new device sync rule that corrects this issue.
50+
Note that this rule change may cause deletion of obsolete devices from Azure AD. This is not a cause for concern, as these device objects are not used by Azure AD during Conditional Access authorization. For some customers, the number of devices that will be deleted through this rule change can exceed the deletion threshold. If you see the deletion of device objects in Azure AD exceeding the Export Deletion Threshold, it is advised to allow the deletions to go through. [How to allow deletes to flow when they exceed the deletion threshold](https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sync-feature-prevent-accidental-deletes)
4351

52+
## 1.4.25.0
4453

4554
### Release status
4655
9/28/2019: Released for auto-upgrade to select tenants. Not available for download.

articles/aks/kubernetes-walkthrough.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
2929

3030
If you choose to install and use the CLI locally, this quickstart requires that you are running the Azure CLI version 2.0.64 or later. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][azure-cli-install].
3131

32-
> [!Note]
32+
> [!NOTE]
3333
> If running the commands in this quickstart locally (instead of Azure Cloud Shell), ensure you run the commands as administrator.
3434
3535
## Create a resource group
@@ -61,7 +61,7 @@ The following example output shows the resource group created successfully:
6161

6262
Use the [az aks create][az-aks-create] command to create an AKS cluster. The following example creates a cluster named *myAKSCluster* with one node. Azure Monitor for containers is also enabled using the *--enable-addons monitoring* parameter. This will take several minutes to complete.
6363

64-
> [NOTE]
64+
> [!NOTE]
6565
> When creating an AKS cluster a second resouce group is automatically created to store the AKS resources. For more information see [Why are two resource groups created with AKS?](https://docs.microsoft.com/azure/aks/faq#why-are-two-resource-groups-created-with-aks)
6666
6767
```azurecli-interactive

articles/aks/servicemesh-consul-about.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The following architecture diagram demonstrates how the various components withi
3232

3333
## Selection criteria
3434

35-
It's important to understand and consider the following areas when evaluating Linkerd for your workloads:
35+
It's important to understand and consider the following areas when evaluating Consul for your workloads:
3636

3737
- [Consul Principles](#consul-principles)
3838
- [Capabilities](#capabilities)
@@ -107,4 +107,4 @@ You can also further explore Consul features and architecture:
107107
[prometheus]: https://prometheus.io/
108108

109109
<!-- LINKS - internal -->
110-
[consul-install]: ./servicemesh-consul-install.md
110+
[consul-install]: ./servicemesh-consul-install.md

articles/aks/spark-job.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -318,6 +318,7 @@ When running the job, instead of indicating a remote jar URL, the `local://` sch
318318
--name spark-pi \
319319
--class org.apache.spark.examples.SparkPi \
320320
--conf spark.executor.instances=3 \
321+
--conf spark.kubernetes.authenticate.driver.serviceAccountName=spark \
321322
--conf spark.kubernetes.container.image=<spark-image> \
322323
local:///opt/spark/work-dir/<your-jar-name>.jar
323324
```

articles/app-service/networking-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ You can learn how to set an address on your app with the tutorial on [Configurin
8787

8888
### Access Restrictions
8989

90-
The Access Restrictions capability lets you filter **inbound** requests based on the origination IP address. The filtering action takes place on the front-end roles that are upstream from the worker rolls where your apps are running. Since the front-end roles are upstream from the workers, the Access Restrictions capability can be regarded as network level protection for your apps. The feature allows you to build a list of allow and deny address blocks that are evaluated in priority order. It is similar to the Network Security Group (NSG) feature that exists in Azure Networking. You can use this feature in an ASE or in the multi-tenant service. When used with an ILB ASE, you can restrict access from private address blocks.
90+
The Access Restrictions capability lets you filter **inbound** requests based on the origination IP address. The filtering action takes place on the front-end roles that are upstream from the worker roles where your apps are running. Since the front-end roles are upstream from the workers, the Access Restrictions capability can be regarded as network level protection for your apps. The feature allows you to build a list of allow and deny address blocks that are evaluated in priority order. It is similar to the Network Security Group (NSG) feature that exists in Azure Networking. You can use this feature in an ASE or in the multi-tenant service. When used with an ILB ASE, you can restrict access from private address blocks.
9191

9292
![Access Restrictions](media/networking-features/access-restrictions.png)
9393

articles/asc-for-iot/event-aggregation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To reduce the memory footprint of the agent, whenever the agent collects an iden
4141

4242
Events are considered identical only when the following conditions are met:
4343

44-
* ProcessCreate events - when **commandLine**, **executable**, **username, and **userid** are identical
44+
* ProcessCreate events - when **commandLine**, **executable**, **username**, and **userid** are identical
4545
* ConnectionCreate events - when **commandLine**, **userId**, **direction**, **local address**, **remote address**, **protocol, and **destination port** are identical
4646
* ProcessTerminate events - when **executable** and **exit status** are identical
4747

0 commit comments

Comments
 (0)