Skip to content

Commit 8fb30b7

Browse files
author
Larry Franks
committed
Merge branch 'main' of github.com:MicrosoftDocs/azure-docs-pr into image-versions
2 parents 123831e + 72b7042 commit 8fb30b7

File tree

105 files changed

+2227
-656
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+2227
-656
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -798,6 +798,16 @@
798798
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
799799
"redirect_document_id": false
800800
},
801+
{
802+
"source_path_from_root": "/articles/aks/dapr-troubleshooting.md",
803+
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
804+
"redirect_document_id": false
805+
},
806+
{
807+
"source_path_from_root": "/articles/aks/csi-secrets-store-troubleshooting.md",
808+
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
809+
"redirect_document_id": false
810+
},
801811
{
802812
"source_path_from_root": "/articles/cdn/index.yml",
803813
"redirect_url": "/azure/frontdoor",

articles/active-directory/saas-apps/contentkalender-tutorial.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 10/10/2022
12+
ms.date: 11/04/2022
1313
ms.author: jeedes
1414

1515
---
@@ -27,7 +27,7 @@ In this tutorial, you'll learn how to integrate Contentkalender with Azure Activ
2727
To get started, you need the following items:
2828

2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30-
* Contentkalender single sign-on (SSO) enabled subscription.
30+
* Contentkalender single sign-on (SSO) enabled subscription (contact Contentkalender [customer service](mailto:[email protected])).
3131
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
3232
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
3333

@@ -84,19 +84,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8484
| **Identifier** |
8585
|------------|
8686
| `https://login.contentkalender.nl` |
87-
| `https://login.decontentkalender.be` |
88-
| `https://contentkalender-acc.bettywebblocks.com/` |
87+
| `https://contentkalender-acc.bettywebblocks.com/` (only for testing purposes)|
8988

9089
b. In the **Reply URL** text box, type one of the following URLs:
9190

9291
| **Reply URL** |
9392
|-----------|
9493
| `https://login.contentkalender.nl/sso/saml/callback` |
95-
| `https://login.decontentkalender.be/sso/saml/callback` |
96-
| `https://contentkalender-acc.bettywebblocks.com/sso/saml/callback` |
94+
| `https://contentkalender-acc.bettywebblocks.com/sso/saml/callback` (only for testing purposes)|
9795

9896
c. In the **Sign-on URL** text box, type the URL:
99-
`https://contentkalender-acc.bettywebblocks.com/v2/login`
97+
`https://login.contentkalender.nl/v2/login`
10098

10199
1. Your Contentkalender application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Contentkalender expects this to be mapped with the user's email address. For that you can use **user.mail** attribute from the list or use the appropriate attribute value based on your organization configuration.
102100

articles/active-directory/saas-apps/iqualify-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/21/2022
12+
ms.date: 11/04/2022
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure AD SSO integration with iQualify LMS
@@ -108,7 +108,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
108108

109109
| Name | Source Attribute|
110110
| --- | --- |
111-
| email | user.userprincipalname |
111+
| email | user.mail |
112112
| first_name | user.givenname |
113113
| last_name | user.surname |
114114
| person_id | "your attribute" |
60.7 KB
Loading

articles/active-directory/saas-apps/tendium-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/14/2022
12+
ms.date: 11/04/2022
1313
ms.author: jeedes
1414

1515
---
@@ -118,7 +118,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
118118

119119
## Configure Tendium SSO
120120

121-
To configure single sign-on on **Tendium** side, you need to send the **App Federation Metadata Url** to [Tendium support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
121+
To configure single sign-on on **Tendium** side, you need to send the **App Federation Metadata Url** to [Tendium support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.You can also contact Tendium [here](https://tendium.ai/contact/) for more information.
122122

123123
### Create Tendium test user
124124

articles/active-directory/saas-apps/timetabling-solutions-tutorial.md

Lines changed: 31 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/16/2022
12+
ms.date: 06/04/2022
1313
ms.author: jeedes
1414
---
1515

@@ -50,8 +50,6 @@ To configure the integration of Timetabling Solutions into Azure AD, you need to
5050
1. In the **Add from the gallery** section, type **Timetabling Solutions** in the search box.
5151
1. Select **Timetabling Solutions** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5252

53-
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
54-
5553
## Configure and test Azure AD SSO for Timetabling Solutions
5654

5755
Configure and test Azure AD SSO with Timetabling Solutions using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Timetabling Solutions.
@@ -118,11 +116,38 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
118116

119117
## Configure Timetabling Solutions SSO
120118

121-
To configure single sign-on on **Timetabling Solutions** side, you need to send the **Thumbprint Value** and appropriate copied URLs from Azure portal to [Timetabling Solutions support team](https://www.timetabling.com.au/contact-us/). They set this setting to have the SAML SSO connection set properly on both sides.
119+
In this section, you'll populate the relevant SSO values in the Timetabling Solutions Administration Console.
120+
121+
1. In the [Administration Console](https://admin.timetabling.education/), select **5 Settings**, and then select the **SAML SSO** tab.
122+
1. Perform the following steps in the **SAML SSO** section:
123+
124+
![Screenshot for SSO settings.](./media/timetabling-solutions-tutorial/timetabling-configuration.png)
125+
126+
a. Enable SAML Integration.
127+
128+
b. In the **SAML Login Path** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
129+
130+
c. In the **SAML Logout Path** textbox, paste the **Logout URL** value, which you have copied from the Azure portal.
131+
132+
d. In the **SAML Certificate Fingerprint** textbox, paste the **Thumbprint Value**, which you have copied from the Azure portal.
122133

123-
### Create Timetabling Solutions test user
134+
e. Enter the **Custom Domain** name.
135+
136+
f. **Save** the settings.
124137

125-
In this section, you create a user called Britta Simon in Timetabling Solutions. Work with [Timetabling Solutions support team](https://www.timetabling.com.au/contact-us/) to add the users in the Timetabling Solutions platform. Users must be created and activated before you use single sign-on.
138+
139+
## Create Timetabling Solutions test user
140+
141+
In this section, you create a user called Britta Simon in the Timetabling Solutions Administration Console.
142+
143+
1. In the [Administration Console](https://admin.timetabling.education/), select **1 Manage Users**, and click **Add**.
144+
2. Enter the mandatory fields **First Name**, **Family Name** and **Email Address**. Add other appropriate values in the non-mandatory fields.
145+
3. Ensure **Online** is active in Status.
146+
4. Click **Save and Next**.
147+
148+
149+
> [!NOTE]
150+
> Work with [Timetabling Solutions support team](https://www.timetabling.com.au/contact-us/) to add the users in the Timetabling Solutions platform. Users must be created and activated before you use single sign-on.
126151
127152
## Test SSO
128153

articles/aks/csi-secrets-store-troubleshooting.md

Lines changed: 0 additions & 104 deletions
This file was deleted.

articles/aks/dapr-troubleshooting.md

Lines changed: 0 additions & 99 deletions
This file was deleted.

articles/app-service/app-service-undelete.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Restore deleted apps
33
description: Learn how to restore a deleted app in Azure App Service. Avoid the headache of an accidentally deleted app.
4-
author: btardif
5-
ms.author: byvinyal
6-
ms.date: 9/23/2019
4+
author: seligj95
5+
ms.author: jordanselig
6+
ms.date: 11/4/2022
77
ms.topic: article
88
ms.custom: devx-track-azurepowershell
99
---

articles/app-service/includes/tutorial-dotnetcore-sqldb-app/azure-portal-generate-schema-02.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,6 @@ ms.topic: include
55
ms.date: 02/03/2022
66
---
77

8-
1. On the left navigation, select **Firewalls and virtual networks**.
9-
1. In the Firewall Rules section, enter a new **Rule name** of 'MyLocalAccess'. In the **Start IP** and **End IP** fields, paste the IP Address you copied earlier.
8+
1. On the left navigation, select **Networking**.
9+
1. On the **Public access** tab, select **Add your client IPv4 address (xx.xx.xx.xx)** to add a firewall rule that will allow your local computer to access the database.
1010
1. Select **Save** at the top of the screen to persist your changes.

0 commit comments

Comments
 (0)