Skip to content

Commit 91e382f

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into release-ga-purview-policy
2 parents 2ac1d87 + 38e3e33 commit 91e382f

File tree

83 files changed

+847
-443
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

83 files changed

+847
-443
lines changed

articles/active-directory/governance/lifecycle-workflow-tasks.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ For Microsoft Graph the parameters for the **Generate Temporary Access Pass and
181181

182182
### Add user to groups
183183

184-
Allows users to be added to cloud-only groups. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
184+
Allows users to be added to Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
185185

186186
You're able to customize the task name and description for this task.
187187
:::image type="content" source="media/lifecycle-workflow-task/add-group-task.png" alt-text="Screenshot of Workflows task: Add user to group task.":::
@@ -302,7 +302,7 @@ For Microsoft Graph the parameters for the **Run a Custom Task Extension** task
302302
|displayName | Run a Custom Task Extension (Customizable by user) |
303303
|description | Run a Custom Task Extension to call-out to an external system. (Customizable by user) |
304304
|taskDefinitionId | "d79d1fcc-16be-490c-a865-f4533b1639ee |
305-
|argument | Argument contains a name parameter that is the "customTaskExtensionID", and a value parameter that is the ID of the previously created extension that contains information about the Logic App. |
305+
|argument | Argument contains a name parameter that is the "customTaskExtensionID", and a value parameter that is the ID of the previously created extension that contains information about the Logic App. |
306306

307307

308308

@@ -359,7 +359,7 @@ For Microsoft Graph the parameters for the **Disable user account** task are as
359359

360360
### Remove user from selected groups
361361

362-
Allows you to remove a user from cloud-only groups. Dynamic and Privileged Access Groups not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
362+
Allows users to be removed from Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
363363

364364
You're able to customize the task name and description for this task in the Azure portal.
365365
:::image type="content" source="media/lifecycle-workflow-task/remove-group-task.png" alt-text="Screenshot of Workflows task: Remove user from select groups.":::
@@ -398,7 +398,7 @@ For Microsoft Graph the parameters for the **Remove user from selected groups**
398398

399399
### Remove users from all groups
400400

401-
Allows users to be removed from every cloud-only group they're a member of. Dynamic and Privileged Access Groups not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
401+
Allows users to be removed from every Microsoft 365 and cloud-only security group they're a member of. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
402402

403403

404404
You're able to customize the task name and description for this task in the Azure portal.

articles/azure-functions/functions-kubernetes-keda.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ You can remove KEDA from your cluster in one of the following ways:
7878
KEDA has support for the following Azure Function triggers:
7979

8080
* [Azure Storage Queues](functions-bindings-storage-queue.md)
81-
* [Azure Service Bus Queues](functions-bindings-service-bus.md)
81+
* [Azure Service Bus](functions-bindings-service-bus.md)
8282
* [Azure Event / IoT Hubs](functions-bindings-event-hubs.md)
8383
* [Apache Kafka](https://github.com/azure/azure-functions-kafka-extension)
8484
* [RabbitMQ Queue](https://github.com/azure/azure-functions-rabbitmq-extension)
@@ -94,4 +94,4 @@ For more information, see the following resources:
9494
* [Code and test Azure Functions locally](functions-develop-local.md)
9595
* [How the Azure Function Consumption plan works](functions-scale.md)
9696

97-
[func init]: functions-core-tools-reference.md#func-init
97+
[func init]: functions-core-tools-reference.md#func-init

0 commit comments

Comments
 (0)