Skip to content

Commit 827f1d1

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into freshness62
2 parents 249b6a6 + e5291cc commit 827f1d1

27 files changed

+460
-277
lines changed

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Before combined registration, users registered authentication methods for Azure
2222
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
2323

2424
> [!div class="nextstepaction"]
25-
> [Enable combined security regiration](howto-registration-mfa-sspr-combined.md)
25+
> [Enable combined security registration](howto-registration-mfa-sspr-combined.md)
2626
2727
![My Profile showing registered Security info for a user](media/concept-registration-mfa-sspr-combined/combined-security-info-defualts-registered.png)
2828

articles/active-directory/hybrid/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ landingContent:
5454
url: whatis-phs.md
5555
- text: What is passthrough authentication?
5656
url: how-to-connect-pta.md
57-
- text: What is federtation?
57+
- text: What is federation?
5858
url: whatis-fed.md
5959
- text: What is single sign-on?
6060
url: how-to-connect-sso.md
@@ -100,4 +100,4 @@ landingContent:
100100

101101

102102

103-
103+

articles/active-directory/saas-apps/highground-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,15 +81,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8181
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
8282

8383
a. In the **Identifier** text box, type a URL using the following pattern:
84-
`https://<SUBDOMAIN>.highground.com/`
84+
`https://app.highground.com/`
8585

8686
b. In the **Reply URL** text box, type a URL using the following pattern:
87-
`https://<SUBDOMAIN>.highground.com/svc/SSONoAuth/<companyName>`
87+
`https://app.highground.com/svc/SSONoAuth/SAML?groupid=<company-guid>`
8888

8989
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
9090

9191
In the **Sign-on URL** text box, type a URL using the following pattern:
92-
`https://app.highground.com/#/login/<companyName>`
92+
`https://app.highground.com/#/login/<company-slug>`
9393

9494
> [!NOTE]
9595
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [HighGround Client support team](https://youearnedit.freshdesk.com/support/home) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.

articles/active-directory/users-groups-roles/TOC.yml

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
href: groups-quickstart-naming-policy.md
1919
- name: Tutorials
2020
items:
21-
- name: Create a dynamically populated group
21+
- name: Create a dynamic group
2222
href: groups-dynamic-tutorial.md
2323
- name: Concepts
2424
expanded: true
@@ -74,8 +74,6 @@
7474
href: domains-manage.md
7575
- name: Delete a directory
7676
href: directory-delete-howto.md
77-
- name: Administrative units
78-
href: directory-administrative-units.md
7977
- name: Multiple directories
8078
href: licensing-directory-independence.md
8179
- name: Self-service signup
@@ -86,52 +84,54 @@
8684
href: /azure/active-directory/connect/active-directory-aadconnect?context=azure/active-directory/users-groups-roles/context/ugr-context
8785
- name: Manage groups
8886
items:
89-
- name: Search group and member lists (preview)
90-
href: groups-members-owners-search.md
87+
- name: Manage access with Azure AD groups
88+
href: /azure/active-directory/fundamentals/active-directory-manage-groups?context=azure/active-directory/users-groups-roles/context/ugr-context
9189
- name: Create a group (Azure portal)
9290
href: /azure/active-directory/fundamentals/active-directory-groups-create-azure-portal?context=azure/active-directory/users-groups-roles/context/ugr-context
93-
- name: Assign sensitivity labels (preview)
94-
href: groups-assign-sensitivity-labels.md
9591
- name: Manage groups PowerShell for Graph (v2)
9692
href: groups-settings-v2-cmdlets.md
97-
- name: Manage groups PowerShell MSOnline
93+
- name: Manage groups with PowerShell MSOnline
9894
href: groups-settings-cmdlets.md
95+
- name: Search group and member lists (preview)
96+
href: groups-members-owners-search.md
9997
- name: Add or remove group members
10098
href: /azure/active-directory/fundamentals/active-directory-groups-members-azure-portal?context=azure/active-directory/users-groups-roles/context/ugr-context
99+
- name: Dynamic groups
100+
items:
101+
- name: Create a dynamic group
102+
href: groups-create-rule.md
103+
- name: Dynamic group rule syntax
104+
href: groups-dynamic-membership.md
105+
- name: Validate a membership rule
106+
href: groups-dynamic-rule-validation.md
107+
- name: Change group membership type
108+
href: groups-change-type.md
101109
- name: Bulk add members (preview)
102110
href: groups-bulk-import-members.md
103111
- name: Bulk remove members (preview)
104112
href: groups-bulk-remove-members.md
105113
- name: Bulk download member list (preview)
106114
href: groups-bulk-download-members.md
107-
- name: Manage group owners
108-
href: /azure/active-directory/fundamentals/active-directory-accessmanagement-managing-group-owners?context=azure/active-directory/users-groups-roles/context/ugr-context
109115
- name: Bulk download groups list (preview)
110116
href: groups-bulk-download.md
117+
- name: Restore deleted groups
118+
href: groups-restore-deleted.md
119+
- name: Manage group settings
120+
href: /azure/active-directory/fundamentals/active-directory-groups-settings-azure-portal?context=azure/active-directory/users-groups-roles/context/ugr-context
121+
- name: Manage group owners
122+
href: /azure/active-directory/fundamentals/active-directory-accessmanagement-managing-group-owners?context=azure/active-directory/users-groups-roles/context/ugr-context
111123
- name: Manage groups in groups
112124
href: /azure/active-directory/fundamentals/active-directory-groups-membership-azure-portal?context=azure/active-directory/users-groups-roles/context/ugr-context
113125
- name: Add group access to SaaS apps
114126
href: groups-saasapps.md
115-
- name: Groups naming reference
127+
- name: Set group naming policy
116128
href: groups-naming-policy.md
117-
- name: Groups expiration reference
129+
- name: Set group expiration policy
118130
href: groups-lifecycle.md
119-
- name: Restore deleted groups
120-
href: groups-restore-deleted.md
121-
- name: Manage group settings
122-
href: /azure/active-directory/fundamentals/active-directory-groups-settings-azure-portal?context=azure/active-directory/users-groups-roles/context/ugr-context
123131
- name: Set up group self-service
124132
href: groups-self-service-management.md
125-
- name: Dynamic groups
126-
items:
127-
- name: Create a dynamic group
128-
href: groups-create-rule.md
129-
- name: Dynamic group rule syntax
130-
href: groups-dynamic-membership.md
131-
- name: Validate a membership rule
132-
href: groups-dynamic-rule-validation.md
133-
- name: Change group membership type
134-
href: groups-change-type.md
133+
- name: Assign sensitivity labels (preview)
134+
href: groups-assign-sensitivity-labels.md
135135
- name: Assign licenses
136136
items:
137137
- name: Assign licenses to a group

articles/active-directory/users-groups-roles/roles-admin-units-add-manage-users.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,11 +46,11 @@ You can assign users to administrative units in two ways.
4646

4747
### PowerShell
4848

49-
$administrative unitObj = Get-AzureADAdministrativeUnit -Filter "displayname eq 'Test administrative unit 2'"
49+
$administrativeunitObj = Get-AzureADAdministrativeUnit -Filter "displayname eq 'Test administrative unit 2'"
5050
$UserObj = Get-AzureADUser -Filter "UserPrincipalName eq '[email protected]'"
51-
Add-AzureADAdministrativeUnitMember -ObjectId $administrative unitObj.ObjectId -RefObjectId $UserObj.ObjectId
51+
Add-AzureADAdministrativeUnitMember -ObjectId $administrativeunitObj.ObjectId -RefObjectId $UserObj.ObjectId
5252

53-
In the above example, the cmdlet Add-AzureADAdministrativeUnitMember is used to add the user to the administrative unit. The object ID of the Administrative Unit where user is to be added and the object ID of the user who is to be added are taken as argument. The highlighted section may be changed as required for the specific environment.
53+
In the above example, the cmdlet Add-AzureADAdministrativeUnitMember is used to add the user to the administrative unit. The object ID of the administrative unit where user is to be added and the object ID of the user who is to be added are taken as argument. The highlighted section may be changed as required for the specific environment.
5454

5555
### Microsoft Graph
5656

articles/azure-government/documentation-government-services-database.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -47,9 +47,9 @@ For details on this service and how to use it, see [Azure SQL Server Stretch Dat
4747
For details on this service and how to use it, see [Azure Cosmos DB documentation](../cosmos-db/index.yml).
4848

4949
### Variations
50-
Azure Cosmos DB is generally available in Azure Government with parity to the public version. One exception is the **Add Azure Cognitive Search** function currently, which isn't available in Cosmos DB for Azure Government.
50+
Azure Cosmos DB is generally available in Azure Government with parity to the public version.
5151

52-
Also, the URLs for accessing Cosmos DB in Azure Government are different:
52+
The URLs for accessing Cosmos DB in Azure Government are different:
5353

5454
| Service Type | Azure Public | Azure Government |
5555
| --- | --- | --- |
@@ -90,7 +90,7 @@ The following information identifies the Azure Government boundary for Azure Cac
9090
For details on this service and how to use it, see [Azure Database for PostgreSQL documentation](../postgresql/index.yml).
9191

9292
### Variations
93-
Advanced Threat Protection, Query Performance Insights and Performance Recommendations for Azure Database for PostgreSQL are **not** available in Azure Government.
93+
Advanced Threat Protection and Private endpoint connections for Azure Database for PostgreSQL are **not** available in Azure Government.
9494

9595
The URLs for accessing and managing Azure Database for PostgreSQL in Azure Government are different:
9696

@@ -109,8 +109,6 @@ The following information identifies the Azure Government boundary for Azure Dat
109109
For details on this service and how to use it, see [Azure Database for MariaDB documentation](../mariadb/index.yml).
110110

111111
### Variations
112-
Query Performance Insights and Performance Recommendations for Azure Database for MariaDB are **not** available in Azure Government.
113-
114112
The URLs for accessing and managing Azure Database for MariaDB in Azure Government are different:
115113

116114
| Service Type | Azure Public | Azure Government |
@@ -128,7 +126,7 @@ The following information identifies the Azure Government boundary for Azure Dat
128126
For details on this service and how to use it, see [Azure Database for MySQL documentation](../mysql/index.yml).
129127

130128
### Variations
131-
Advanced Threat Protection, Query Performance Insights and Performance Recommendations for Azure Database for MySQL are **not** available in Azure Government.
129+
Advanced Threat Protection and Private endpoint connections for Azure Database for MySQL are **not** available in Azure Government.
132130

133131
The URLs for accessing and managing Azure Database for MySQL in Azure Government are different:
134132

articles/azure-resource-manager/templates/define-resource-dependency.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Resource Manager evaluates the dependencies between resources, and deploys them
1212

1313
## dependsOn
1414

15-
Within your template, the dependsOn element enables you to define one resource as a dependent on one or more resources. Its value is a comma-separated list of resource names. The list can include resources that are [conditionally deployed](conditional-resource-deployment.md). When a conditional resource isn't deployed, Azure Resource Manager automatically removes it from the required dependencies.
15+
Within your template, the dependsOn element enables you to define one resource as a dependent on one or more resources. Its value is a JSON array of strings, each of which is a resource name. The array can include resources that are [conditionally deployed](conditional-resource-deployment.md). When a conditional resource isn't deployed, Azure Resource Manager automatically removes it from the required dependencies.
1616

1717
The following example shows a virtual machine scale set that depends on a load balancer, virtual network, and a loop that creates multiple storage accounts. These other resources aren't shown in the following example, but they would need to exist elsewhere in the template.
1818

articles/backup/backup-azure-manage-mars.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ There are two ways to stop protecting Files and Folders backup:
8484

8585
- **Stop protection and retain backup data**.
8686
- This option will stop all future backup jobs from protection.
87-
- Azure Backup service will retain the recovery points that have been backed up based on the retention policy.
87+
- Azure Backup service will retain all existing recovery points indefinitely. Recovery points will not be checked for expiration until protection is resumed.
8888
- You'll be able to restore the backed-up data for unexpired recovery points.
8989
- If you decide to resume protection, then you can use the *Re-enable backup schedule* option. After that, data would be retained based on the new retention policy.
9090
- **Stop protection and delete backup data**.

articles/cosmos-db/spark-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ val writeConfig = Config(Map(
105105
"Masterkey" -> "YOUR-KEY-HERE",
106106
"Database" -> "DepartureDelays",
107107
"Collection" -> "flights_fromsea",
108-
"Upsert" : "true"
108+
"Upsert" -> "true"
109109
))
110110

111111
// Write to Cosmos DB from the flights DataFrame

articles/event-grid/resize-images-on-storage-blob-upload-event.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ In the following command, provide your own unique function app name. The functio
9797
```azurecli-interactive
9898
az functionapp create --name $functionapp --storage-account $functionstorage \
9999
--resource-group $resourceGroupName --consumption-plan-location southeastasia \
100-
--functions_version 2
100+
--functions-version 2
101101
```
102102
103103
Now configure the function app to connect to the Blob storage account you created in the [previous tutorial][previous-tutorial].

0 commit comments

Comments
 (0)