You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-f5.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ The secure hybrid access solution for this scenario is made up of the following
59
59
60
60
-**Application** - Backend service being protected by Azure AD B2C and BIG-IP secure hybrid access
61
61
62
-
-**Azure AD B2C** - The IdP and Open ID Connect (OIDC) authorization server, responsible for verification of user credentials, multi-factor authentication (MFA), and SSO to the BIG-IP APM.
62
+
-**Azure AD B2C** - The IdP and Open ID Connect (OIDC) authorization server, responsible for verification of user credentials, multifactor authentication (MFA), and SSO to the BIG-IP APM.
63
63
64
64
-**BIG-IP** - As the reverse proxy for the application, the BIG-IP APM also becomes the OIDC client, delegating authentication to the OIDC authorization server, before performing header-based SSO to the backend service.
65
65
@@ -222,9 +222,9 @@ Here, we'll configure Azure AD B2C as the OAuth2 IdP. You’ll notice that the G
222
222
223
223
|Properties | Descriptions|
224
224
|:---------|:---------|
225
-
| Client ID | The client ID of the application representing the BIG-IP in your Azure AD B2C tenant.|
225
+
| Client ID | The client ID of the application representing the BIG-IP in your Azure AD B2C tenant.|
226
226
| Client secret | The application’s corresponding client secret. |
227
-
|Client-server SSL profile | Setting an SSL profile will ensure the APM communicates with the Azure AD B2C IdP over TLS. Select the default serverssl option.|
227
+
|Client-server SSL profile | Setting an SSL profile will ensure the APM communicates with the Azure AD B2C IdP over TLS. Select the default `serverssl` option.|
228
228
229
229
-**OAuth request settings**
230
230
@@ -281,7 +281,7 @@ Here, we'll configure Azure AD B2C as the OAuth2 IdP. You’ll notice that the G
281
281
| Service port | HTTPS |
282
282
| Enable redirect port | Check to have users auto redirected from http to https |
283
283
| Redirect port | HTTP |
284
-
| Client SSL profile | Swap the pre-defined clientssl profile with the one containing your SSL certificate. Testing with the default profile is also ok but will likely cause a browser alert.|
284
+
| Client SSL profile | Swap the predefined `clientssl` profile with the one containing your SSL certificate. Testing with the default profile is also ok but will likely cause a browser alert.|
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-sync/tutorial-pilot-aadc-aadccp.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -198,7 +198,7 @@ Azure AD Connect sync synchronizes changes occurring in your on-premises directo
198
198
>[!NOTE]
199
199
>If you are running your own custom scheduler for Azure AD Connect sync, then please enable the scheduler.
200
200
201
-
Once the scheduler is enabled, Azure AD Connect will stop exporting any changes on objects with `cloudNoFlow=true` in the metaverse, unless any reference attribute (eg. manager) is being updated. In case there is any reference attribute update on the object, Azure AD Connect will ignore the `cloudNoFlow` signal and export all updates on the object.
201
+
Once the scheduler is enabled, Azure AD Connect will stop exporting any changes on objects with `cloudNoFlow=true` in the metaverse, unless any reference attribute (such as `manager`) is being updated. In case there is any reference attribute update on the object, Azure AD Connect will ignore the `cloudNoFlow` signal and export all updates on the object.
202
202
203
203
## Something went wrong
204
204
In case the pilot does not work as expected, you can go back to the Azure AD Connect sync setup by following the steps below:
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/terms-of-use.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ Azure AD terms of use policies have the following capabilities:
41
41
- Require employees or guests to accept your terms of use policy prior to registering security information in Azure AD Multi-Factor Authentication (MFA).
42
42
- Require employees to accept your terms of use policy prior to registering security information in Azure AD self-service password reset (SSPR).
43
43
- Present a general terms of use policy for all users in your organization.
44
-
- Present specific terms of use policies based on a user attributes (ex. doctors vs nurses or domestic vs international employees, by using [dynamic groups](../enterprise-users/groups-dynamic-membership.md)).
44
+
- Present specific terms of use policies based on a user attributes (such as doctors versus nurses, or domestic versus international employees) by using [dynamic groups](../enterprise-users/groups-dynamic-membership.md)).
45
45
- Present specific terms of use policies when accessing high business impact applications, like Salesforce.
46
46
- Present terms of use policies in different languages.
47
47
- List who has or hasn't accepted to your terms of use policies.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-bigip-deployment-guide.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,9 +42,9 @@ Prior F5 BIG-IP experience or knowledge isn't necessary, however, we do recommen
42
42
43
43
- A wildcard or Subject Alternative Name (SAN) certificate, to publish web applications over Secure Socket Layer (SSL). [Let’s encrypt](https://letsencrypt.org/) offers free 90 days certificate for testing.
44
44
45
-
- An SSL certificate for securing the BIG-IPs management interface. A certificate used to publish web apps can be used, if its subject corresponds to the BIG-IP's Fully qualified domain name (FQDN). For example, a wildcard certificate defined with a subject *.contoso.com would be suitable for `https://big-ip-vm.contoso.com:8443`
45
+
- An SSL certificate for securing the BIG-IPs management interface. A certificate used to publish web apps can be used, if its subject corresponds to the BIG-IP's Fully qualified domain name (FQDN). For example, a wildcard certificate defined with a subject `*.contoso.com` would be suitable for `https://big-ip-vm.contoso.com:8443`
46
46
47
-
VM deployment and base system configs take approx. 30 minutes, at which point your BIG-IP platform will be ready for implementing any of the SHA scenarios listed [here](f5-aad-integration.md).
47
+
VM deployment and base system configs take approximately 30 minutes, at which point your BIG-IP platform will be ready for implementing any of the SHA scenarios listed in [Integrate F5 BIG-IP with Azure Active Directory](f5-aad-integration.md).
48
48
49
49
For testing the scenarios, this tutorial assumes the BIG-IP will be deployed into an Azure resource group containing an Active Directory (AD) environment. The environment should consist of a Domain Controller (DC) and web host (IIS) VMs. Having these servers in other locations to the BIG-IP VM is also ok, providing the BIG-IP has line of sight to each of the roles required to support a given scenario. Scenarios where the BIG-IP VM is connected to another environment over a VPN connection are also supported.
50
50
@@ -230,7 +230,7 @@ The following steps assume the DNS zone of the public domain used for your SHA s
230
230
If you manage your DNS domain namespace using an external provider like [GoDaddy](https://www.godaddy.com/), then you'll need to create records using their own DNS management facility.
231
231
232
232
>[!NOTE]
233
-
>You can also use a PC’s local hosts file if testing and frequently switching DNS records. The localhosts file on a Windows PC can be accessed by pressing Win + R on the keyboard and submitting the word **drivers** in the run box. Just be mindful that a localhost record will only provide DNS resolution for the local PC, not other clients.
233
+
>You can also use a PC’s local hosts file if testing and frequently switching DNS records. The local hosts file on a Windows PC can be accessed by pressing Win + R on the keyboard and entering *drivers* in the **Run** box. Just be mindful that a local host record will only provide DNS resolution for the local PC, not other clients.
234
234
235
235
## Client traffic
236
236
@@ -351,15 +351,15 @@ Provisioning both, Client and Server SSL profiles will have the BIG-IP pre-confi
351
351
352
352
2. From the **Import Type** drop down list, select **PKCS 12(IIS)**
353
353
354
-
3. Provide a name for the imported certificate, for example, `ContosoWilcardCert`
354
+
3. Provide a name for the imported certificate, such as `ContosoWildcardCert`.
355
355
356
356
4. Select **Choose File** to browse to the SSL web certificate who’s subject name corresponds to the domain suffix you plan on using for published services
357
357
358
358
5. Provide the **password** for the imported certificate then select **Import**
359
359
360
360
6. From the left-navigation bar, go to **Local Traffic** > **Profiles** > **SSL** > **Client** and then select **Create**
361
361
362
-
7. In the **New Client SSL Profile** page, provide a unique friendly name for the new client SSL profile and ensure the Parent profile is set to **clientssl**
362
+
7. In the **New Client SSL Profile** page, provide a unique friendly name for the new client SSL profile and ensure the Parent profile is set to `clientssl`.
@@ -371,7 +371,7 @@ Provisioning both, Client and Server SSL profiles will have the BIG-IP pre-confi
371
371
372
372
10. Repeat steps 6-9 to create an **SSL server certificate profile**. From the top ribbon, select **SSL** > **Server** > **Create**.
373
373
374
-
11. In the **New Server SSL Profile** page, provide a unique friendly name for the new server SSL profile and ensure the Parent profile is set to **serverssl**
374
+
11. In the **New Server SSL Profile** page, provide a unique friendly name for the new server SSL profile and ensure the Parent profile is set to `serverssl`.
375
375
376
376
12. Select the far-right check box for the Certificate and Key rows and from the drop-down list select your imported certificate, followed by **Finished**.
Copy file name to clipboardExpand all lines: articles/hdinsight/spark/apache-spark-create-standalone-application.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ In this tutorial, you learn how to:
31
31
32
32
*[Oracle Java Development kit](https://www.azul.com/downloads/azure-only/zulu/). This tutorial uses Java version 8.0.202.
33
33
34
-
* A Java IDE. This article uses [IntelliJ IDEA Community ver. 2018.3.4](https://www.jetbrains.com/idea/download/).
34
+
* A Java IDE. This article uses [IntelliJ IDEA Community 2018.3.4](https://www.jetbrains.com/idea/download/).
35
35
36
36
* Azure Toolkit for IntelliJ. See [Installing the Azure Toolkit for IntelliJ](/java/azure/intellij/azure-toolkit-for-intellij-create-hello-world-web-app#installation-and-sign-in).
37
37
@@ -223,7 +223,7 @@ If you're not going to continue to use this application, delete the cluster that
:::image type="content" source="./media/apache-spark-create-standalone-application/hdinsight-azure-portal-delete-cluster.png" alt-text="Screenshot showing how to delete an HDInsight cluster via the Azure portal." border="true":::
Copy file name to clipboardExpand all lines: articles/hdinsight/spark/apache-spark-intellij-tool-failure-debug.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ This article provides step-by-step guidance on how to use HDInsight Tools in [Az
17
17
18
18
*[Oracle Java Development kit](https://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.html). This tutorial uses Java version 8.0.202.
19
19
20
-
* IntelliJ IDEA. This article uses [IntelliJ IDEA Community ver. 2019.1.3](https://www.jetbrains.com/idea/download/#section=windows).
20
+
* IntelliJ IDEA. This article uses [IntelliJ IDEA Community 2019.1.3](https://www.jetbrains.com/idea/download/#section=windows).
21
21
22
22
* Azure Toolkit for IntelliJ. See [Installing the Azure Toolkit for IntelliJ](/azure/developer/java/toolkit-for-intellij/installation).
Copy file name to clipboardExpand all lines: articles/hdinsight/spark/apache-spark-intellij-tool-plugin.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ In this article, you learn how to:
29
29
30
30
*[Oracle Java Development kit](https://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.html). This article uses Java version 8.0.202.
31
31
32
-
* IntelliJ IDEA. This article uses [IntelliJ IDEA Community ver. 2018.3.4](https://www.jetbrains.com/idea/download/).
32
+
* IntelliJ IDEA. This article uses [IntelliJ IDEA Community 2018.3.4](https://www.jetbrains.com/idea/download/).
33
33
34
34
* Azure Toolkit for IntelliJ. See [Installing the Azure Toolkit for IntelliJ](/azure/developer/java/toolkit-for-intellij/).
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/openshift-container-platform-3x.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -277,7 +277,7 @@ Different releases may have different parameters so verify the necessary paramet
277
277
|`domainName`| Name of the custom domain name to use (if applicable). Set to "none" if not deploying fully private cluster || none |
278
278
|`masterClusterDnsType`| Domain type for OpenShift web console. 'default' will use DNS label of master infra public IP. 'custom' allows you to define your own name | default <br> custom | default |
279
279
|`masterClusterDns`| The custom DNS name to use to access the OpenShift web console if you selected 'custom' for `masterClusterDnsType`|| console.contoso.com |
280
-
|`routingSubDomainType`| If set to 'nipio', `routingSubDomain` will use nip.io. Use 'custom' if you have your own domain that you want to use for routing | nipio <br> custom | nipio |
280
+
|`routingSubDomainType`| If set to `nipio`, `routingSubDomain` will use `nip.io`. Use 'custom' if you have your own domain that you want to use for routing |`nipio` <br> custom |`nipio`|
281
281
|`routingSubDomain`| The wildcard DNS name you want to use for routing if you selected 'custom' for `routingSubDomainType`|| apps.contoso.com |
282
282
|`virtualNetworkNewOrExisting`| Select whether to use an existing Virtual Network or create a new Virtual Network | existing <br> new | new |
283
283
|`virtualNetworkResourceGroupName`| Name of the Resource Group for the new Virtual Network if you selected 'new' for `virtualNetworkNewOrExisting`|| resourceGroup().name |
0 commit comments