Skip to content

Commit 8f55d1e

Browse files
authored
Merge pull request #182599 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/azure-docs (branch master)
2 parents 1ae1d5e + 1d5ad49 commit 8f55d1e

File tree

7 files changed

+9
-8
lines changed

7 files changed

+9
-8
lines changed

articles/active-directory/fundamentals/security-operations-applications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,7 @@ Alert any time these changes are detected outside of approved change management
207207

208208
The following are links to useful resources:
209209

210-
* Github Azure AD toolkit - [https://github.com/microsoft/AzureADToolkit](https://github.com/microsoft/AzureADToolkit)
210+
* GitHub Azure AD toolkit - [https://github.com/microsoft/AzureADToolkit](https://github.com/microsoft/AzureADToolkit)
211211

212212
* Azure Key Vault security overview and security guidance - [Azure Key Vault security overview](../../key-vault/general/security-features.md)
213213

articles/active-directory/hybrid/how-to-connect-install-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -347,7 +347,7 @@ When you select the domain that you want to federate, Azure AD Connect provides
347347

348348
## Configuring federation with PingFederate
349349
You can configure PingFederate with Azure AD Connect in just a few clicks. The following prerequisites are required:
350-
- PingFederate 8.4 or later. For more information, see [PingFederate integration with Azure Active Directory and Microsoft 365](https://docs.pingidentity.com/bundle/O365IG20_sm_integrationGuide/page/O365IG_c_integrationGuide.html).
350+
- PingFederate 8.4 or later. For more information, see [PingFederate integration with Azure Active Directory and Microsoft 365](https://docs.pingidentity.com/bundle/pingfederate-azuread-office365-integration/).
351351
- A TLS/SSL certificate for the federation service name that you intend to use (for example, sts.contoso.com).
352352

353353
### Verify the domain

articles/active-directory/hybrid/tshoot-connect-sync-errors.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,8 @@ Below are some examples which demonstrate the different weighs of attributes lik
218218
3. If a similar synchronized user with 10 UserCertificates plus for instance 4 subscriptions assigned (with all Service Plans enabled), the maximum number of ProxyAddresses decreases to 311.
219219
4. Now let’s take the above user which already holds the maximum number of ProxyAddresses, and say you need to add 1 more smtp address - to achieve 312 ProxyAddresses you would need to remove at least 3 UserCertificates (depending on the size of the certificate).
220220

221-
> [NOTE] These numbers can vary slightly. As a rule of thumb, it is safer to assume that the limit of smtp addresses in ProxyAddresses is approximately 300 addresses to leave the room for the future growth of the object and its populated attributes.
221+
>[!NOTE]
222+
> These numbers can vary slightly. As a rule of thumb, it is safer to assume that the limit of smtp addresses in ProxyAddresses is approximately 300 addresses to leave the room for the future growth of the object and its populated attributes.
222223
223224
### How to fix
224225

articles/data-factory/create-azure-ssis-integration-runtime-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -575,7 +575,7 @@ if(![string]::IsNullOrEmpty($ExpressCustomSetup))
575575
-ExpressCustomSetup $setups
576576
}
577577
578-
# Add self-hosted integration runtime parameters if you configure a proxy for on-premises data accesss
578+
# Add self-hosted integration runtime parameters if you configure a proxy for on-premises data access
579579
if(![string]::IsNullOrEmpty($DataProxyIntegrationRuntimeName) -and ![string]::IsNullOrEmpty($DataProxyStagingLinkedServiceName))
580580
{
581581
Set-AzDataFactoryV2IntegrationRuntime -ResourceGroupName $ResourceGroupName `

articles/dms/known-issues-mongo-cosmos-db.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Known issues: Migrate from MongoDB to Azure CosmosDB"
2+
title: "Known issues: Migrate from MongoDB to Azure Cosmos DB"
33
titleSuffix: Azure Database Migration Service
44
description: Learn about known issues and migration limitations with migrations from MongoDB to Azure Cosmos DB using the Azure Database Migration Service.
55
services: database-migration
@@ -45,4 +45,4 @@ Known issues and limitations associated with migrations from MongoDB to Cosmos D
4545
## Next steps
4646

4747
* View the tutorial [Migrate MongoDB to Azure Cosmos DB's API for MongoDB online using DMS](tutorial-mongodb-cosmos-db-online.md).
48-
* View the tutorial [Migrate MongoDB to Azure Cosmos DB's API for MongoDB offline using DMS](tutorial-mongodb-cosmos-db.md).
48+
* View the tutorial [Migrate MongoDB to Azure Cosmos DB's API for MongoDB offline using DMS](tutorial-mongodb-cosmos-db.md).

articles/firewall-manager/policy-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.author: victorh
1111

1212
# Azure Firewall Manager policy overview
1313

14-
Firewall Policy the recommended method to configure your Azure Firewall. It's a global resource that can be used across multiple Azure Firewall instances in Secured Virtual Hubs and Hub Virtual Networks. Policies work across regions and subscriptions.
14+
Firewall Policy is the recommended method to configure your Azure Firewall. It's a global resource that can be used across multiple Azure Firewall instances in Secured Virtual Hubs and Hub Virtual Networks. Policies work across regions and subscriptions.
1515

1616
![Azure Firewall Manager policy](media/policy-overview/policy-overview.png)
1717

articles/postgresql/flexible-server/concepts-logical.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Logical decoding:
4343

4444
1. Go to server parameters page on the portal.
4545
2. Set the server parameter `wal_level` to `logical`.
46-
3. If you want to use pglogical extension, search for the `shared_preload_libaries` parameter, and select `pglogical` from the drop-down box.
46+
3. If you want to use pglogical extension, search for the `shared_preload_libraries` parameter, and select `pglogical` from the drop-down box.
4747
4. Update `max_worker_processes` parameter value to at least 16. Otherwise, you may run into issues like `WARNING: out of background worker slots`.
4848
5. Save the changes and restart the server to apply the `wal_level` change.
4949
6. Confirm that your PostgreSQL instance allows network traffic from your connecting resource.

0 commit comments

Comments
 (0)