Skip to content

Commit 8e65ca4

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into v-ssaunders-YinglueZhang-MS
2 parents 2b2714d + 8975a79 commit 8e65ca4

File tree

82 files changed

+2788
-1515
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+2788
-1515
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,25 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-dotnet-legacy.md",
5+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-java-legacy.md",
10+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-java",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-python-legacy.md",
15+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-python",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-xamarin.md",
20+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet",
21+
"redirect_document_id": false
22+
},
323
{
424
"source_path": "articles/site-recovery/deploy-vmware-azure-replication-appliance-preview.md",
525
"redirect_url": "/azure/site-recovery/deploy-vmware-azure-replication-appliance-modernized",

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,9 +87,9 @@ The two-gate policy requires two pieces of authentication data, such as an email
8787
* Power BI service administrator
8888
* Privileged Authentication administrator
8989
* Privileged role administrator
90-
* SharePoint administrator
9190
* Security administrator
9291
* Service support administrator
92+
* SharePoint administrator
9393
* Skype for Business administrator
9494
* User administrator
9595

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Smart lockout tracks the last three bad password hashes to avoid incrementing th
2828
> [!NOTE]
2929
> Hash tracking functionality isn't available for customers with pass-through authentication enabled as authentication happens on-premises not in the cloud.
3030
31-
Federated deployments that use AD FS 2016 and AF FS 2019 can enable similar benefits using [AD FS Extranet Lockout and Extranet Smart Lockout](/windows-server/identity/ad-fs/operations/configure-ad-fs-extranet-smart-lockout-protection).
31+
Federated deployments that use AD FS 2016 and AD FS 2019 can enable similar benefits using [AD FS Extranet Lockout and Extranet Smart Lockout](/windows-server/identity/ad-fs/operations/configure-ad-fs-extranet-smart-lockout-protection).
3232

3333
Smart lockout is always on, for all Azure AD customers, with these default settings that offer the right mix of security and usability. Customization of the smart lockout settings, with values specific to your organization, requires Azure AD Premium P1 or higher licenses for your users.
3434

articles/active-directory/authentication/tutorial-enable-sspr-writeback.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,12 @@ To set up the appropriate permissions for password writeback to occur, complete
8383

8484
[ ![Set the appropriate permissions in Active Users and Computers for the account that is used by Azure AD Connect](media/tutorial-enable-sspr-writeback/set-ad-ds-permissions-cropped.png) ](media/tutorial-enable-sspr-writeback/set-ad-ds-permissions.png#lightbox)
8585

86+
1. When ready, select **Apply / OK** to apply the changes.
87+
1. From the **Permissions** tab, select **Add**.
88+
1. For **Principal**, select the account that permissions should be applied to (the account used by Azure AD Connect).
89+
1. In the **Applies to** drop-down list, select **This object and all descendant objects**
90+
1. Under *Permissions*, select the box for the following option:
91+
* **Unexpire Password**
8692
1. When ready, select **Apply / OK** to apply the changes and exit any open dialog boxes.
8793

8894
When you update permissions, it might take up to an hour or more for these permissions to replicate to all the objects in your directory.

articles/active-directory/authentication/tutorial-enable-sspr.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To finish this tutorial, you need the following resources and privileges:
4040
* A working Azure AD tenant with at least an Azure AD free or trial license enabled. In the Free tier, SSPR only works for cloud users in Azure AD. Password change is supported in the Free tier, but password reset is not.
4141
* For later tutorials in this series, you'll need an Azure AD Premium P1 or trial license for on-premises password writeback.
4242
* If needed, [create an Azure account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
43-
* An account with *Global Administrator* privileges.
43+
* An account with *Global Administrator* or *Authentication Policy Administrator* privileges.
4444
* A non-administrator user with a password you know, like *testuser*. You'll test the end-user SSPR experience using this account in this tutorial.
4545
* If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
4646
* A group that the non-administrator user is a member of, likes *SSPR-Test-Group*. You'll enable SSPR for this group in this tutorial.
@@ -55,7 +55,7 @@ Azure AD lets you enable SSPR for *None*, *Selected*, or *All* users. This granu
5555
5656
In this tutorial, set up SSPR for a set of users in a test group. Use the *SSPR-Test-Group* and provide your own Azure AD group as needed:
5757

58-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
58+
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* or *authentication policy administrator* permissions.
5959
1. Search for and select **Azure Active Directory**, then select **Password reset** from the menu on the left side.
6060
1. From the **Properties** page, under the option *Self service password reset enabled*, choose **Selected**.
6161
1. If your group isn't visible, choose **No groups selected**, browse for and select your Azure AD group, like *SSPR-Test-Group*, and then choose *Select*.

articles/api-management/api-management-subscriptions.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: api-management
99
ms.topic: conceptual
10-
ms.date: 01/05/2022
10+
ms.date: 09/27/2022
1111
ms.author: danlep
1212
---
1313
# Subscriptions in Azure API Management
@@ -20,14 +20,11 @@ By publishing APIs through API Management, you can easily secure API access usin
2020
* Rejected immediately by the API Management gateway.
2121
* Not forwarded to the back-end services.
2222

23-
To access APIs, you'll need a subscription and a subscription key. A *subscription* is a named container for a pair of subscription keys.
24-
25-
> [!NOTE]
26-
> Regularly regenerating keys is a common security precaution. Like most Azure services requiring a subscription key, API Management generates keys in pairs. Each application using the service can switch from *key A* to *key B* and regenerate key A with minimal disruption, and vice versa.
23+
To access APIs, developers need a subscription and a subscription key. A *subscription* is a named container for a pair of subscription keys.
2724

2825
In addition,
2926

30-
* Developers can get subscriptions without approval from API publishers.
27+
* Developers can get subscriptions without needing approval from API publishers.
3128
* API publishers can create subscriptions directly for API consumers.
3229

3330
> [!TIP]
@@ -36,6 +33,13 @@ In addition,
3633
> - [Client certificates](api-management-howto-mutual-certificates-for-clients.md)
3734
> - [Restrict caller IPs](./api-management-access-restriction-policies.md#RestrictCallerIPs)
3835
36+
## Manage subscription keys
37+
38+
Regularly regenerating keys is a common security precaution. Like most Azure services requiring a subscription key, API Management generates keys in pairs. Each application using the service can switch from *key A* to *key B* and regenerate key A with minimal disruption, and vice versa.
39+
> [!NOTE]
40+
> * API Management doesn't provide built-in features to manage the lifecycle of subscription keys, such as setting expiration dates or automatically rotating keys. You can develop workflows to automate these processes using tools such as Azure PowerShell or the Azure SDKs.
41+
> * To enforce time-limited access to APIs, API publishers may be able to use policies with subscription keys, or use a mechanism that provides built-in expiration such as token-based authentication.
42+
3943
## Scope of subscriptions
4044

4145
Subscriptions can be associated with various scopes: [product](api-management-howto-add-products.md), all APIs, or an individual API.

articles/automation/disable-local-authentication.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,10 @@ ms.topic: how-to
1010

1111
# Disable local authentication in Automation
1212

13+
> [!IMPORTANT]
14+
> - Update Management patching will not work when local authentication is disabled.
15+
> - When you disable local authentication, it impacts the starting a runbook using a webhook, Automation Desired State Configuration and agent-based Hybrid Runbook Workers. For more information, see the [available alternatives](#compatibility).
16+
1317
Azure Automation provides Microsoft Azure Active Directory (Azure AD) authentication support for all Automation service public endpoints. This critical security enhancement removes certificate dependencies and gives organizations control to disable local authentication methods. This feature provides you with seamless integration when centralized control and management of identities and resource credentials through Azure AD is required.
1418

1519
Azure Automation provides an optional feature to "Disable local authentication" at the Automation account level using the Azure policy [Configure Azure Automation account to disable local authentication](../automation/policy-reference.md#azure-automation). By default, this flag is set to false at the account, so you can use both local authentication and Azure AD authentication. If you choose to disable local authentication, then the Automation service only accepts Azure AD based authentication.
@@ -19,7 +23,7 @@ In the Azure portal, you may receive a warning message on the landing page for t
1923
Disabling local authentication doesn't take effect immediately. Allow a few minutes for the service to block future authentication requests.
2024

2125
>[!NOTE]
22-
> Currently, PowerShell support for the new API version (2021-06-22) or the flag – `DisableLocalAuth` is not available. However, you can use the Rest-API with this API version to update the flag.
26+
> - Currently, PowerShell support for the new API version (2021-06-22) or the flag – `DisableLocalAuth` is not available. However, you can use the Rest-API with this API version to update the flag.
2327
2428
## Re-enable local authentication
2529

@@ -35,10 +39,6 @@ The following table describes the behaviors or features that are prevented from
3539
|Using Automation Desired State Configuration.| Use [Azure Policy Guest configuration](../governance/machine-configuration/overview.md).  |
3640
|Using agent-based Hybrid Runbook Workers.| Use [extension-based Hybrid Runbook Workers (Preview)](./extension-based-hybrid-runbook-worker-install.md).|
3741

38-
## Limitations
39-
40-
Update Management patching will not work when local authentication is disabled.
41-
4242

4343
## Next steps
4444
- [Azure Automation account authentication overview](./automation-security-overview.md)

articles/azure-cache-for-redis/cache-how-to-upgrade.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: flang-msft
66
ms.author: franlanglois
77
ms.service: cache
88
ms.topic: how-to
9-
ms.date: 09/08/2022
9+
ms.date: 09/29/2022
1010
ms.custom: template-how-to
1111
---
1212

@@ -15,7 +15,13 @@ ms.custom: template-how-to
1515

1616
Azure Cache for Redis supports upgrading the version of your Azure Cache for Redis from Redis 4 to Redis 6. Upgrading is permanent, and it might cause a brief connection issue similar to regular monthly maintenance. As a precautionary step, we recommend exporting the data from your existing Redis 4 cache and testing your client application with a Redis 6 cache in a lower environment before upgrading.
1717

18-
For more information, see [here](cache-how-to-import-export-data.md) for details on how to export.
18+
For more details on how to export, see [Import and Export data in Azure Cache for Redis](cache-how-to-import-export-data.md).
19+
20+
> [!IMPORTANT]
21+
> As announced in [What's new](cache-whats-new.md#upgrade-your-azure-cache-for-redis-instances-to-use-redis-version-6-by-june-30-2023), we'll retire version 4 for Azure Cache for Redis instances on June 30, 2023. Before that date, you need to upgrade any of your cache instances to version 6.
22+
>
23+
> For more information on the retirement of Redis 4, see [Retirements](cache-retired-features.md).
24+
>
1925
2026
## Prerequisites
2127

articles/azure-netapp-files/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -249,6 +249,8 @@
249249
href: application-volume-group-manage-volumes.md
250250
- name: Delete an application volume group
251251
href: application-volume-group-delete.md
252+
- name: Configure application volume groups for REST API
253+
href: configure-application-volume-group-sap-hana-api.md
252254
- name: Manage data protection
253255
items:
254256
- name: Manage volume snapshots

0 commit comments

Comments
 (0)