Skip to content

Commit 95a33b2

Browse files
authored
Merge pull request #294861 from MicrosoftDocs/main
2/18/2025 PM Publish
2 parents 9fdd350 + 5ff7e42 commit 95a33b2

File tree

143 files changed

+597
-331
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

143 files changed

+597
-331
lines changed

articles/active-directory-b2c/partner-ping-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ To create an application in PingAccess for each application in Azure that you wa
209209

210210
Configure the PingFederate authentication policy to federate to the multiple IdPs provided by the Azure AD B2C tenants
211211

212-
1. Create a contract to bridge the attributes between the IdPs and the SP. You should need only one contract unless the SP requires a different set of attributes from each IdP. For more information, see [Federation hub and authentication policy contracts](https://docs.pingidentity.com/access/sources/dita/topic?category=pingfederate&Releasestatus_ce=Current&resourceid=pf_fed_hub_auth_polic_contract) in the Ping Identity documentation.
212+
1. Create a contract to bridge the attributes between the IdPs and the SP. You should need only one contract unless the SP requires a different set of attributes from each IdP. For more information, see [Federation hub and authentication policy contracts](https://docs.pingidentity.com/pingfederate/latest/introduction_to_pingfederate/pf_fed_hub_auth_polic_contract.html) in the Ping Identity documentation.
213213

214214
2. For each IdP, create an IdP connection between the IdP and PingFederate, the federation hub as the SP.
215215

articles/api-management/api-management-howto-api-inspector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ Detailed steps follow.
9898
```json
9999
{
100100
"credentialsExpireAfter": PT1H,
101-
"apiId": ""/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ApiManagement/service/{serviceName}/apis/{apiId}",
101+
"apiId": "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ApiManagement/service/{serviceName}/apis/{apiId}",
102102
"purposes": ["tracing"]
103103
}
104104
```
7.12 KB
Loading

articles/app-service/configure-ssl-certificate.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,8 @@ The service principal app ID or assignee value is the ID for the App Service res
153153

154154
> [!NOTE]
155155
> Do not delete these access policy permissions from key vault. If you do, App Service will not be able to sync your web app with the latest key vault certificate version.
156-
156+
>
157+
> If key vault is configured to disable public access, ensure that Microsoft services have access by checking the 'Allow trusted Microsoft services to bypass this firewall' checkbox. See [Key Vault firewall enabled trusted services only](/azure/key-vault/general/network-security?WT.mc_id=Portal-Microsoft_Azure_KeyVault#key-vault-firewall-enabled-trusted-services-only) documentation for more information.
157158
---
158159

159160
#### [Azure CLI](#tab/azure-cli/rbac)
8.77 KB
Loading
37 KB
Loading
9.8 KB
Loading
19.5 KB
Loading
22.6 KB
Loading
14.7 KB
Loading

0 commit comments

Comments
 (0)