Skip to content

Commit 96fdc97

Browse files
authored
Merge pull request #99489 from MicrosoftDocs/master
12/19 PM Publish
2 parents 9f95a72 + bdf84a7 commit 96fdc97

File tree

520 files changed

+3066
-5239
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

520 files changed

+3066
-5239
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42218,6 +42218,26 @@
4221842218
"redirect_url": "/azure/iot-central/preview/quick-monitor-devices/",
4221942219
"redirect_document_id": true
4222042220
},
42221+
{
42222+
"source_path": "articles/iot-pnp/quickstart-connect-pnp-device-linux.md",
42223+
"redirect_url": "/azure/iot-pnp/quickstart-connect-pnp-device-c-linux/",
42224+
"redirect_document_id": true
42225+
},
42226+
{
42227+
"source_path": "articles/iot-pnp/quickstart-connect-pnp-device.md",
42228+
"redirect_url": "/azure/iot-pnp/quickstart-connect-pnp-device-c-windows/",
42229+
"redirect_document_id": true
42230+
},
42231+
{
42232+
"source_path": "articles/iot-pnp/quickstart-connect-pnp-device-solution.md",
42233+
"redirect_url": "/azure/iot-pnp/quickstart-connect-pnp-device-solution-node/",
42234+
"redirect_document_id": true
42235+
},
42236+
{
42237+
"source_path": "articles/iot-pnp/quickstart-create-pnp-device.md",
42238+
"redirect_url": "/azure/iot-pnp/quickstart-create-pnp-device-windows/",
42239+
"redirect_document_id": true
42240+
},
4222142241
{
4222242242
"source_path": "articles/iot-central/core/overview-iot-options.md",
4222342243
"redirect_url": "/azure/iot-fundamentals/iot-services-and-technologies/",

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Not all releases of Azure AD Connect will be made available for auto upgrade. Th
3838
>
3939
> You need to make sure you are running a recent version of Azure AD Connect to receive an optimal support experience.
4040
>
41-
>If you run a deprecated version of Azure AD Connect you may not have the latest security fixes, performance improvements, toubleshooting and diagnostic tools and service enhancements, and if you require support we may not be able to provide you with the level of service your organization needs.
41+
>If you run a deprecated version of Azure AD Connect you may not have the latest security fixes, performance improvements, troubleshooting and diagnostic tools and service enhancements, and if you require support we may not be able to provide you with the level of service your organization needs.
4242
>
4343
>If you have enabled Azure AD Connect for sync you will soon automatically begin receiving Health notifications that warn you about upcoming deprecations when you are running one of the older versions.
4444
>

articles/active-directory/manage-apps/access-panel-workspaces.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 10/29/2019
16+
ms.date: 12/19/2019
1717
ms.author: mimart
1818
ms.reviewer: kasimpso
1919
ms.collection: M365-identity-device-management
@@ -41,7 +41,7 @@ Your users can use the My Apps (preview) portal to view and start the cloud-base
4141
![User preview features](media/access-panel-workspaces/user-preview-features.png)
4242

4343
> [!NOTE]
44-
> To open the My Apps portal, users can use the link `https://myapps.microsoft.com` or the customized link for your organization, such as `https://myapps.microsoft.com/contoso.com`. If users aren't redirected to the My Apps preview version, users should try `https://myapplications.microsoft.com` or `https://myapplications.microsoft.com/contoso.com`.
44+
> To open the My Apps portal, users can use the link `https://myapps.microsoft.com` or the customized link for your organization, such as `https://myapps.microsoft.com/contoso.com`. After you enable the new My Apps experience, the **An updated My Applications experience is available** banner will display at the top of the My Apps page, and users can select **Try it** to view the new experience. To stop using the new experience, users can select **Yes** from the **Leave new experience** banner at the top of the page.
4545
4646
## Create a workspace
4747

@@ -94,6 +94,15 @@ You can access audit logs in the [Azure portal](https://portal.azure.com) by sel
9494

9595
![Assign roles to users and groups](media/access-panel-workspaces/audit-log-myapps.png)
9696

97+
## Get support for My Account pages
98+
99+
From the My Apps page, a user can select **My account** > **View my account** to open their account settings. On the Azure AD **My Account** page, users can manage their security info, devices, passwords, and more. They can also access their Office account settings.
100+
101+
In case you need to submit a support request for an issue with the Azure AD account page or the Office account page, follow these steps so your request is routed properly:
102+
103+
* For issues with the **Azure AD "My Account"** page, open a support request from within the Azure portal. Go to **Azure portal** > **Azure Active Directory** > **New support request**.
104+
105+
* For issues with the **Office "My account"** page, open a support request from within the Microsoft 365 admin center. Go to **Microsoft 365 admin center** > **Support**.
97106

98107
## Next steps
99108
[End-user experiences for applications in Azure Active Directory](end-user-experiences.md)

articles/active-directory/manage-apps/application-proxy-powershell-samples.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection: M365-identity-device-management
1616

1717
# Azure AD PowerShell examples for Azure AD Application Proxy
1818

19-
The following table includes links to PowerShell script examples for Azure AD Application Proxy. These samples require the Azure Active Directory PowerShell Module Version for Graph. These samples require either the [AzureAD V2 PowerShell for Graph module](https://docs.microsoft.com/powershell/azure/active-directory/install-adv2?view=azureadps-2.0) or the [AzureAD V2 PowerShell for Graph module preview version](https://docs.microsoft.com/powershell/azure/active-directory/install-adv2?view=azureadps-2.0-preview), unless otherwise noted.
19+
The following table includes links to PowerShell script examples for Azure AD Application Proxy. These samples require either the [AzureAD V2 PowerShell for Graph module](https://docs.microsoft.com/powershell/azure/active-directory/install-adv2?view=azureadps-2.0) or the [AzureAD V2 PowerShell for Graph module preview version](https://docs.microsoft.com/powershell/azure/active-directory/install-adv2?view=azureadps-2.0-preview), unless otherwise noted.
2020

2121

2222
For more information about the cmdlets used in these samples, see [Application Proxy Application Management](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0#application_proxy_application_management) and [Application Proxy Connector Management](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0#application_proxy_connector_management).

articles/aks/certificate-rotation.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,13 @@ AKS generates and uses the following certificates, Certificate Authorities, and
3434
* The `kubectl` client has a certificate for communicating with the AKS cluster.
3535

3636
> [!NOTE]
37-
> AKS clusters created prior to March 2019 have certificates that expire after two years. Any cluster created after March 2019 or any cluster that has its certificates rotated have certificates that expire after 30 years.
37+
> AKS clusters created prior to March 2019 have certificates that expire after two years. Any cluster created after March 2019 or any cluster that has its certificates rotated have certificates that expire after 30 years. To verify when your cluster was created, use `kubectl get nodes` to see the *Age* of your node pools.
38+
>
39+
> Additionally, you can check the expiration date of your cluster's certificate. For example, the following command displays the certificate details for the *myAKSCluster* cluster.
40+
> ```console
41+
> kubectl config view --raw -o jsonpath='{.clusters[?(@.name == "myAKSCluster")].cluster.certificate-authority-data}' | base64 -d > my-cert.crt
42+
> openssl x509 -in my-cert.crt -text
43+
> ```
3844
3945
## Rotate your cluster certificates
4046

articles/azure-cache-for-redis/cache-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ The following settings are configured on the **Advanced settings** blade.
116116
By default, non-SSL access is disabled for new caches. To enable the non-SSL port, click **No** for **Allow access only via SSL** on the **Advanced settings** blade and then click **Save**.
117117

118118
> [!NOTE]
119-
> SSL access to Azure Cache for Redis supports TLS 1.0 by default. The minimum supported TLS version can be raised up to TLS 1.2 if desired by using the **Minimum TLS version** dropdown on the **Advanced settings** blade and then click **Save**.
119+
> SSL access to Azure Cache for Redis supports TLS 1.0, 1.1 and 1.2 currently, but versions 1.0 and 1.1 are being retired soon. Please read our [Remove TLS 1.0 and 1.1 page](cache-remove-tls-10-11.md) for more details.
120120
121121
![Azure Cache for Redis Access Ports](./media/cache-configure/redis-cache-access-ports.png)
122122

articles/azure-cache-for-redis/cache-remove-tls-10-11.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,15 @@ ms.author: yegu
1414

1515
There's an industry-wide push toward the exclusive use of Transport Layer Security (TLS) version 1.2 or later. TLS versions 1.0 and 1.1 are known to be susceptible to attacks such as BEAST and POODLE, and to have other Common Vulnerabilities and Exposures (CVE) weaknesses. They also don't support the modern encryption methods and cipher suites recommended by Payment Card Industry (PCI) compliance standards. This [TLS security blog](https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/) explains some of these vulnerabilities in more detail.
1616

17-
Although none of these considerations pose an immediate problem, we recommend that you stop using TLS 1.0 and 1.1 soon. Azure Cache for Redis will stop supporting these TLS versions on March 31, 2020. After that date, your application will be required to use TLS 1.2 or later to communicate with your cache.
17+
As a part of this effort, we'll be making the following changes to Azure Cache for Redis:
18+
19+
* Starting on January 13, 2020 we will configure the default minimum TLS version to be 1.2 for newly created cache instances. Existing cache instances won't be updated at this point. You'll be allowed to [change the minimum TLS version](cache-configure.md#access-ports) back to 1.0 or 1.1 for backward compatibility, if needed. This change can be done through the Azure portal or other management APIs.
20+
* Starting on March 31, 2020 we'll stop supporting TLS versions 1.0 and 1.1. After this change, your application will be required to use TLS 1.2 or later to communicate with your cache.
21+
22+
Additionally, as a part of this change, we'll be removing support for older, insecure cypher suites. Our supported cypher suites will be restricted to the following when the cache is configured with a minimum TLS version of 1.2.
23+
24+
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384
25+
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256
1826

1927
This article provides general guidance about how to detect dependencies on these earlier TLS versions and remove them from your application.
2028

articles/azure-functions/durable/durable-functions-entities.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -199,8 +199,8 @@ public static async Task<HttpResponseMessage> Run(
199199
[DurableClient] IDurableEntityClient client)
200200
{
201201
var entityId = new EntityId(nameof(Counter), "myCounter");
202-
JObject state = await client.ReadEntityStateAsync<JObject>(entityId);
203-
return req.CreateResponse(HttpStatusCode.OK, state);
202+
EntityStateResponse<JObject> stateResponse = await client.ReadEntityStateAsync<JObject>(entityId);
203+
return req.CreateResponse(HttpStatusCode.OK, stateResponse.EntityState);
204204
}
205205
```
206206

@@ -210,7 +210,8 @@ const df = require("durable-functions");
210210
module.exports = async function (context) {
211211
const client = df.getClient(context);
212212
const entityId = new df.EntityId("Counter", "myCounter");
213-
return context.df.readEntityState(entityId);
213+
const stateResponse = await context.df.readEntityState(entityId);
214+
return stateResponse.entityState;
214215
};
215216
```
216217

@@ -245,13 +246,12 @@ module.exports = df.orchestrator(function*(context){
245246

246247
// Two-way call to the entity which returns a value - awaits the response
247248
currentValue = yield context.df.callEntity(entityId, "get");
248-
if (currentValue < 10) {
249-
// One-way signal to the entity which updates the value - does not await a response
250-
yield context.df.signalEntity(entityId, "add", 1);
251-
}
252249
});
253250
```
254251

252+
> [!NOTE]
253+
> JavaScript does not currently support signaling an entity from an orchestrator. Use `callEntity` instead.
254+
255255
Only orchestrations are capable of calling entities and getting a response, which could be either a return value or an exception. Client functions that use the [client binding](durable-functions-bindings.md#entity-client) can only signal entities.
256256

257257
> [!NOTE]

articles/azure-functions/functions-recover-storage-account.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@ We'll walk through the four most common error cases, how to identify, and how to
2727
1. Storage Account credentials invalid
2828
1. Storage Account Inaccessible
2929
1. Daily Execution Quota Full
30+
1. App is behind a firewall
31+
3032

3133
## Storage account deleted
3234

@@ -77,6 +79,12 @@ If you have a Daily Execution Quota configured, your Function App will be tempor
7779
* `The Function App has reached daily usage quota and has been stopped until the next 24 hours time frame.`
7880
* Remove the quota and restart your app to resolve the issue.
7981

82+
## App is behind a firewall
83+
84+
Your function runtime will be unreachable if your function app is hosted in an [internally load balanced App Service Environment](../app-service/environment/create-ilb-ase.md) and is configured to block inbound internet traffic, or has [inbound IP restrictions](/azure-functions/functions-networking-options#inbound-ip-restrictions) configured to block internet access. The Azure portal makes calls directly to the running app to fetch the list of functions and also makes http call to KUDU endpoint. Platform level settings under the `Platform Features` tab will still be available.
85+
86+
* To verify your ASE configuration, navigate to NSG of the subnet where ASE resides and validate inbound rules to allow traffic coming from the public IP of the computer where you are accessing the application. You can also use the portal from a computer connected to the virtual network running your app or a virtual machine running in your virtual network. [Read more about inbound rule configuration here](https://docs.microsoft.com/azure/app-service/environment/network-info#network-security-groups)
87+
8088
## Next Steps
8189

8290
Now that your Function App is back and operational take a look at our quickstarts and developer references to get up and running again!

articles/azure-maps/migrate-from-google-maps-android-app.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -207,14 +207,14 @@ To display a map using the Azure Maps SDK for Android, the following steps need
207207

208208
The map control contains its own lifecycle methods for managing Android's OpenGL lifecycle, which must be called directly from the containing Activity. In order for your app to correctly, call the map control's lifecycle methods, you must override the following lifecycle methods in the Activity that contains the map control and call the respective map control method.
209209

210-
* onCreate(Bundle)
211-
* onStart()
212-
* onResume()
213-
* onPause()
214-
* onStop()
215-
* onDestroy()
216-
* onSaveInstanceState(Bundle)
217-
* onLowMemory()
210+
* `onCreate(Bundle)`
211+
* `onStart()`
212+
* `onResume()`
213+
* `onPause()`
214+
* `onStop()`
215+
* `onDestroy()`
216+
* `onSaveInstanceState(Bundle)`
217+
* `onLowMemory()`
218218

219219
Edit the **MainActivity.java** file as follows:
220220

0 commit comments

Comments
 (0)