You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/billing.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ In this article, learn about MAU and Go Local billing, linking Azure AD B2C tena
22
22
23
23
## MAU overview
24
24
25
-
A monthly active user (MAU) is a unique user that performs an authentication within a given month. A user that authenticates multiple times within a given month is counted as one MAU. Customers aren't charged for a MAU’s subsequent authentications during the month, nor for inactive users. Authentications may include:
25
+
A monthly active user (MAU) is a unique user that performs an authentication within a given month. A user that authenticates at least once within a given month is counted as one MAU. Customers aren't charged for a MAU’s subsequent authentications during the month, nor for inactive users. Authentications may include:
26
26
27
27
- Active, interactive sign in by the user. For example, [sign-up or sign in](add-sign-up-and-sign-in-policy.md), [self-service password reset](add-password-reset-policy.md), or any type of [user flow](user-flow-overview.md) or [custom policy](custom-policy-overview.md).
28
28
- Passive, non-interactive sign in such as [single sign-on (SSO)](session-behavior.md), or any type of token acquisition. For example, authorization code flow, token refresh, or [resource owner password credentials flow](add-ropc-policy.md).
5. Under the **Admin Credentials** section, input your MURAL Identity Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to MURAL Identity. If the connection fails, ensure your MURAL Identity account has Admin permissions and try again.
83
+
1. Under the **Admin Credentials** section, input your MURAL Identity Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to MURAL Identity. If the connection fails, ensure your MURAL Identity account has Admin permissions and try again.
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
87
+
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to MURAL Identity**.
93
+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to MURAL Identity**.
91
94
92
-
9. Review the user attributes that are synchronized from Azure AD to MURAL Identity in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in MURAL Identity for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the MURAL Identity API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
95
+
1. Review the user attributes that are synchronized from Azure AD to MURAL Identity in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in MURAL Identity for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the MURAL Identity API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
93
96
94
-
|Attribute|Type|Supported for filtering|
95
-
|---|---|---|
96
-
|userName|String|✓
97
-
|active|Boolean|
98
-
|emails[type eq "work"].value|String|
99
-
|name.givenName|String|
100
-
|name.familyName|String|
101
-
|externalId|String|
97
+
|Attribute|Type|Supported for filtering|Required by MURAL Identity
98
+
|---|---|---|---
99
+
|userName|String|✓|✓
100
+
|emails[type eq "work"].value|String||✓
101
+
|active|Boolean||
102
+
|name.givenName|String||
103
+
|name.familyName|String||
104
+
|externalId|String||
102
105
106
+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to MURAL Identity**.
103
107
108
+
1. Review the group attributes that are synchronized from Azure AD to MURAL Identity in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in MURAL Identity for update operations. Select the **Save** button to commit any changes.
109
+
110
+
|Attribute|Type|Supported for filtering|Required by MURAL Identity|
111
+
|---|---|---|---|
112
+
|displayName|String|✓|✓
113
+
|members|Reference||
114
+
|externalId|String||
104
115
10. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
105
116
106
117
11. To enable the Azure AD provisioning service for MURAL Identity, change the **Provisioning Status** to **On** in the **Settings** section.
@@ -120,15 +131,18 @@ This operation starts the initial synchronization cycle of all users and groups
120
131
## Step 6. Monitor your deployment
121
132
Once you've configured provisioning, use the following resources to monitor your deployment:
122
133
123
-
1. Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
124
-
2. Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
125
-
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
134
+
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
135
+
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
136
+
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
126
137
127
138
## Troubleshooting Tips
128
139
* When provisioning a user keep in mind that at MURAL we do not support numbers in the name fields (i.e. givenName or familyName).
129
140
* When filtering on **userName** in the GET endpoint make sure that the email address is all lowercase otherwise you will get an empty result. This is because we convert email addresses to lowercase while provisioning accounts.
130
141
* When de-provisioning an end-user (setting the active attribute to false), user will be soft-deleted and lose access to all their workspaces. When that same de-provisioned end-user is later activated again (setting the active attribute to true), user will not have access to the workspaces user previously belonged to. The end-user will see an error message "You’ve been deactivated from this workspace", with an option to request reactivation which the workspace admin must approve.
131
-
* If you have any other issues, please reach out to [MURAL Identity support team](mailto:[email protected])
142
+
* If you have any other issues, please reach out to [MURAL Identity support team](mailto:[email protected]).
143
+
144
+
## Change log
145
+
06/22/2023 - Added support for **Group Provisioning**.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/shopify-plus-provisioning-tutorial.md
+10-6Lines changed: 10 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,12 +101,13 @@ This section guides you through the steps to configure the Azure AD provisioning
101
101
102
102
9. Review the user attributes that are synchronized from Azure AD to Shopify Plus in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Shopify Plus for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Shopify Plus API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
103
103
104
-
|Attribute|Type|Supported for Filtering|
105
-
|---|---|---|
106
-
|userName|String|✓|
104
+
|Attribute|Type|Supported for Filtering|Required by Shopify Plus
105
+
|---|---|---|---
106
+
|userName|String|✓|✓
107
+
|roles|String||
107
108
|active|Boolean|
108
-
|name.givenName|String|
109
-
|name.familyName|String|
109
+
|name.givenName|String||✓
110
+
|name.familyName|String||✓
110
111
111
112
112
113
10. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
@@ -130,7 +131,10 @@ Once you've configured provisioning, use the following resources to monitor your
130
131
131
132
1. Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
132
133
2. Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
133
-
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
134
+
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
Copy file name to clipboardExpand all lines: articles/aks/start-stop-cluster.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,9 @@ You may not need to continuously run your Azure Kubernetes Service (AKS) workloa
12
12
13
13
To better optimize your costs during these periods, you can turn off, or stop, your cluster. This action stops your control plane and agent nodes, allowing you to save on all the compute costs, while maintaining all objects except standalone pods. The cluster state is stored for when you start it again, allowing you to pick up where you left off.
14
14
15
+
> [!NOTE]
16
+
> AKS start operations will restore all objects from ETCD with the exception of standalone pods with the same names and ages. meaning that a pod's age will continue to be calculated from its original creation time. This count will keep increasing over time, regardless of whether the cluster is in a stopped state.
17
+
15
18
## Before you begin
16
19
17
20
This article assumes you have an existing AKS cluster. If you need an AKS cluster, you can create one using [Azure CLI][aks-quickstart-cli], [Azure PowerShell][aks-quickstart-powershell], or the [Azure portal][aks-quickstart-portal].
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/basic-logs-configure.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,12 +50,13 @@ Configure a table for Basic logs if:
50
50
| API Management |[ApiManagementGatewayLogs](/azure/azure-monitor/reference/tables/ApiManagementGatewayLogs)<br>[ApiManagementWebSocketConnectionLogs](/azure/azure-monitor/reference/tables/ApiManagementWebSocketConnectionLogs)|
| Communication Services |[ACSCallAutomationIncomingOperations](/azure/azure-monitor/reference/tables/ACSCallAutomationIncomingOperations)<br>[ACSCallAutomationMediaSummary](/azure/azure-monitor/reference/tables/ACSCallAutomationMediaSummary)<br>[ACSCallRecordingIncomingOperations](/azure/azure-monitor/reference/tables/ACSCallRecordingIncomingOperations)<br>[ACSCallRecordingSummary](/azure/azure-monitor/reference/tables/ACSCallRecordingSummary)<br>[ACSRoomsIncomingOperations](/azure/azure-monitor/reference/tables/acsroomsincomingoperations)|
| Custom tables | All custom tables created with or migrated to the [data collection rule (DCR)-based logs ingestion API.](logs-ingestion-api-overview.md)|
59
+
| Custom log tables | All custom tables created with or migrated to the [data collection rule (DCR)-based logs ingestion API.](logs-ingestion-api-overview.md)|
59
60
| Data Manager for Energy |[OEPDataplaneLogs](/azure/azure-monitor/reference/tables/OEPDataplaneLogs)|
60
61
| Dedicated SQL Pool |[SynapseSqlPoolSqlRequests](/azure/azure-monitor/reference/tables/synapsesqlpoolsqlrequests)<br>[SynapseSqlPoolRequestSteps](/azure/azure-monitor/reference/tables/synapsesqlpoolrequeststeps)<br>[SynapseSqlPoolExecRequests](/azure/azure-monitor/reference/tables/synapsesqlpoolexecrequests)<br>[SynapseSqlPoolDmsWorkers](/azure/azure-monitor/reference/tables/synapsesqlpooldmsworkers)<br>[SynapseSqlPoolWaits](/azure/azure-monitor/reference/tables/synapsesqlpoolwaits)|
61
62
| Dev Center |[DevCenterDiagnosticLogs](/azure/azure-monitor/reference/tables/DevCenterDiagnosticLogs)|
Copy file name to clipboardExpand all lines: articles/backup/azure-backup-architecture-for-sap-hana-backup.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Azure Backup Architecture for SAP HANA Backup
3
3
description: Learn about Azure Backup architecture for SAP HANA backup.
4
4
ms.topic: conceptual
5
-
ms.date: 09/07/2022
5
+
ms.date: 06/20/2023
6
6
ms.service: backup
7
7
ms.custom: ignite-2022
8
8
author: jyothisuri
@@ -65,7 +65,7 @@ See the [high-level architecture of Azure Backup for SAP HANA databases](./sap-h
65
65
66
66
### Backup flow
67
67
68
-
This section provides you an understanding about the backup process of an HANA database running on an Azure VM.
68
+
This section provides you with an understanding about the backup process of an HANA database running on an Azure VM.
69
69
70
70
1. The scheduled backups are managed by crontab entries created on the HANA VM, while the on-demand backups are directly triggered by the Azure Backup service.
71
71
@@ -100,7 +100,7 @@ In the following sections you'll learn about different SAP HANA setups and their
100
100
101
101
:::image type="content" source="./media/azure-backup-architecture-for-sap-hana-backup/azure-network-with-udr-and-nva-or-azure-firewall-and-private-endpoint-or-service-endpoint.png" alt-text="Diagram showing the SAP HANA setup if Azure network with UDR + NVA / Azure Firewall + Private Endpoint or Service Endpoint.":::
102
102
103
-
### Backup architecture for database with HANA System Replication (preview)
103
+
### Backup architecture for database with HANA System Replication
104
104
105
105
The backup service resides in both the physical nodes of the HSR setup. Once you confirm that these nodes are in a replication group (using the [pre-registration script](sap-hana-database-with-hana-system-replication-backup.md#run-the-preregistration-script)), Azure Backup groups the nodes logically, and creates a single backup item during protection configuration.
106
106
@@ -119,7 +119,7 @@ In the following sections, you'll learn about the backup flow for new/existing m
119
119
120
120
##### New machines
121
121
122
-
This section provides you an understanding about the backup process of an HANA database with HANA System replication enabled running on a new Azure VM.
122
+
This section provides you with an understanding about the backup process of an HANA database with HANA System replication enabled running on a new Azure VM.
123
123
124
124
1. Create a custom user and `hdbuserstore` key on all the nodes.
125
125
1. Run the pre-registration script on both the nodes with the custom user as the backup user to implement an ID, which indicates that both the nodes belong to a unique/common group.
@@ -128,7 +128,7 @@ This section provides you an understanding about the backup process of an HANA d
128
128
129
129
##### Existing machines
130
130
131
-
This section provides you an understanding about the backup process of an HANA database with HANA System replication enabled running on an existing Azure VM.
131
+
This section provides you with an understanding about the backup process of an HANA database with HANA System replication enabled running on an existing Azure VM.
132
132
133
133
1. Stop protection and retain data for both the nodes.
134
134
1. Run the pre-registration script on both the nodes with the custom user as the backup user to mention an ID, which indicates that both the nodes belong to a unique/common group.
0 commit comments